Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 ... 7439 ) Next »

SuSE alert: bind8

  • Mailing list (Posted by dave on Nov 16, 2000 6:29 AM EDT)
  • Story Type: Security; Groups: SUSE
BIND, the Berkeley Internet Name Daemon, versions before 8.2.2p7, has been found vulnerable to two denial of service attacks: named may crash after a compressed zone transfer request (ZXFR) and if an SRV record (defined in RFC2782) is sent to the server. Administrators testing the ZXFR bug should be aware that it can take several seconds after the triggering the bug until the nameserver daemon crashes. SuSE versions 6.0 through 6.4 are affected by these two problems. The bind8 package in SuSE-7.0 is not affected because a different version of bind8 (8.2.3) was used in this distribution. By the release time of the SuSE-7.0 distribution our engineers have determined that the problems we had with stalling zone transfers under some obscure conditions were not present with the 8.2.3 release of the package.

SuSE alert: SuSE: miscellaneous

  • Mailing list (Posted by dave on Nov 15, 2000 5:36 AM EDT)
  • Story Type: Security; Groups: SUSE
This notice addresses the latest security advisories from various Linux vendors as well as private contributors on public security forums. The issues have been collected to keep the noise on the public security forums at a reduced level.

SuSE alert: modules

  • Mailing list (Posted by dave on Nov 13, 2000 12:09 AM EDT)
  • Story Type: Security; Groups: SUSE
The modules package is responsible for on-demand loading of kernel modules/drivers. The /sbin/modprobe command, when executed as a new task by the kernel-internal function request_module(), runs with the priviledges of the init process, usually root. Newer versions of the modprobe program contain a bug which allows local users to gain root priviledges. modprobe expands given arguments via /bin/echo and can easily be tricked into executing commands. In order for this bug to be exploitable, a setuid root program must be installed that can trigger the loading of modules (such as ping6).

Debian alert: New version of Debian bind packages released

  • Mailing list (Posted by dave on Nov 11, 2000 11:25 PM EDT)
  • Story Type: Security; Groups: Debian
The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable to a remote denial of service attack, which can cause the nameserver to crash after accessing an uninitialized pointer. This problem is fixed in the current maintenance release of BIND, 8.2.2P7, and in the Debian package version 8.2.2p7-1 for both stable and unstable releases.

Red Hat alert: Updated bind packages fixing DoS attack available

  • Mailing list (Posted by dave on Nov 11, 2000 1:26 AM EDT)
  • Story Type: Security; Groups: Red Hat
A remote DoS (denial of service) attack is possible with bind versions prior to 8.

Debian alert: New version of tcsh released

  • Mailing list (Posted by dave on Nov 10, 2000 6:11 PM EDT)
  • Story Type: Security; Groups: Debian
Proton reported on bugtraq that tcsh did not handle in-here documents correctly. The version of tcsh that is distributed with Debian GNU/Linux 2.2r0 also suffered from this problem.

Debian alert: New version of gnupg installed

  • Mailing list (Posted by dave on Nov 10, 2000 4:51 PM EDT)
  • Story Type: Security; Groups: Debian
The version of gnupg that was distributed in Debian GNU/Linux 2.2 had a logic error in the code that checks for valid signatures which could cause false positive results: Jim Small discovered that if the input contained multiple signed sections the exit-code gnupg returned was only valid for the last section, so improperly signed other sections were not noticed.

Red Hat alert: Updated pine and imap packages are available for Red Hat Linux 5.2, 6.x and 7

  • Mailing list (Posted by dave on Nov 10, 2000 8:47 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated pine and imap packages are available for Red Hat Linux 5.2, 6.x and 7.

Red Hat alert: Updated usermode packages available

  • Mailing list (Posted by dave on Nov 9, 2000 11:49 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated usermode packages are now available for Red Hat Linux 6.x and 7.

Red Hat alert: Updated gnorpm packages are available for Red Hat Linux 6.1, 6.2, and 7.0

  • Mailing list (Posted by dave on Nov 2, 2000 6:08 AM EDT)
  • Story Type: Security; Groups: Red Hat
(This is a re-release of the previous errata caused by a missing patch). A locally-exploitable security hole was found where a normal user could trick root running GnoRPM into writing to arbitrary files due to a bug in the gnorpm tmp file handling.

Red Hat alert: Setuid bits are removed on dump to prevent exploit

  • Mailing list (Posted by dave on Nov 2, 2000 6:06 AM EDT)
  • Story Type: Security; Groups: Red Hat
The Red Hat 7.0 dump is being released for Red Hat 6.x and Red Hat 5.x in order to remove root setuid bits to prevent a known dump exploit (#20111). The new dump packages also include a fix for a buffer overflow (#9899)

Red Hat alert: Updated nss_ldap packages are now available.

  • Mailing list (Posted by dave on Oct 27, 2000 11:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated nss_ldap packages are now available for Red Hat Linux 6.1, 6.2, and 7.

Red Hat alert: Updated Secure Web Server packages now available

  • Mailing list (Posted by dave on Oct 27, 2000 8:47 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Secure Web Server packages are now available for users of Secure Web Server 3.

SuSE alert: ncurses

  • Mailing list (Posted by dave on Oct 27, 2000 7:59 AM EDT)
  • Story Type: Security; Groups: SUSE
The ncurses library is used by many text/console based applications such as mail user agents, ftp clients and other command line utilities. A vulnerability has been found by Jouko Pynnönen <jouko@solutions.fi> in the screen handling functions: Insufficient boundary checking leads to a buffer overflow if a user supplies a specially drafted terminfo database file. If an ncurses-linked binary is installed setuid root, it is possible for a local attacker to exploit this hole and gain elevated privileges.

Red Hat alert: Updated cyrus-sasl packages available for Red Hat Linux 7

  • Mailing list (Posted by dave on Oct 26, 2000 10:26 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated cyrus-sasl packages are now available for Red Hat Linux 7.

Slackware alert: Local /tmp vulnerability fixed in ppp-off

A local /tmp bug in the /usr/sbin/ppp-off program was found. This bug could allow a local user to corrupt system files. A fix has been made and an updated package is now available in the -current branch.

Slackware alert: root exploit with xlockmore fixed

A root exploit has been found in xlockmore packaged with Slackware. By providing a carefully crafted display variable to xlock, it is possible for a local attacker to gain root access. Anyone running xlock on a public machine should upgrade to this version of xlock (or disable xlock altogether) immediately.

Red Hat alert: Updated apache, php, mod_perl, and auth_ldap packages available.

  • Mailing list (Posted by dave on Oct 23, 2000 1:10 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated apache, php, mod_perl, and auth_ldap packages are now available for Red Hat Linux 5.2, 6.0, 6.1, 6.2, and 7.

Red Hat alert: ypbind for Red Hat Linux 5.x, 6.x has a local root exploit

  • Mailing list (Posted by dave on Oct 23, 2000 7:55 AM EDT)
  • Story Type: Security; Groups: Red Hat
ypbind as shipped in Red Hat Linux 5.x and 6.x is vulnerable to a local root exploit. All systems making use of NIS services are encouraged to upgrade.

Red Hat alert: Updated gnupg packages available

  • Mailing list (Posted by dave on Oct 20, 2000 7:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated gnupg packages are now available for Red Hat Linux 6.2 and 7.

« Previous ( 1 ... 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 ... 7439 ) Next »