Linux Advisory Watch - September 16th 2005

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+---------------------------------------------------------------------+
|  LinuxSecurity.com                             Weekly Newsletter    |
|  September 16th, 2005                       Volume 6, Number 38a    |
+---------------------------------------------------------------------+

  Editors:      Dave Wreski                     Benjamin D. Thomas
                dave@xxxxxxxxxxxxxxxxx          ben@xxxxxxxxxxxxxxxxx

Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week.  It includes pointers to updated packages and descriptions of
each vulnerability.

This week, advisories were released for apache, kdelibs, cvs, mod_ssl,
tdiary, squid, mozilla, common-lisp, turqstat, slib, umb-scheme,
psmisc, gtk, file, subversion, unzip, e2fsprogs, selinux-policy-targeted,
firefox, mozilla, vte, xdelta, tvtime, dhcp, gnupg, util-linux,
mc, libwnck, pcre, exim, and squid.  The distributors include, Debian,
Fedora, Gentoo, and Red Hat.

---

## Master of Science in Information Security ##

Earn your Master of Science in Information Security online from Norwich
University. Designated a "Center of Excellence", the program offers a
solid education in the management of information assurance, and the
unique case study method melds theory into practice.  Using today's
e-Learning technology, you can earn this esteemed degree, without
disrupting your career or home life.

LEARN MORE:
http://www.msia.norwich.edu/linux_en

---

Using umask

The umask can be used to control the default file permission on
newly-created files. The umask command controls the default file
and directory creation mode for newly-created files and directories.
It is recommended that you make root's umask 077, which will disable
read, write, and execute permission for other users, unless explictly
changed using chmod.

The umask command can be used to determine the default file creation
mode on your system. It is the octal complement of the desired file
mode. If files are created without any regard to their permissions
settings, a user could inadvertently give read or write permission
to someone that should not have this permission.

The umask for the creation of new executable files is calculated as
follows:

  777 Default Permissions
 -022 Subtract umask value, for example
-----
  755 Allowed Permissions

So in this example we chose 022 as our umask. This shows us that
new executables that are created are given mode 755, which means
that the owner can read, write, and execute the binary, while members
of the group to which the binary belongs, and all others, can only
read and execute it.

The umask for the creation of new text files is calculated as
follows:

 666 Default Permissions
-022 Subtract umask mask, for example
-----
 644 Allowed Permissions

This example shows us that given the default umask of 666, and
subtracting our sample umask value of 022, new text files are
created with mode 644, which states that the owner can read and
write the file, while members of the group to which the file
belongs, and everyone else can only read the new file. Typically
umask settings include 022, 027, and 077, which is the most
restrictive. Normally the umask is set in /etc/profile, so it
applies to all users on the system. The file creation mask must
be set while keeping in mind the purpose of the account.
Permissions that are too restrictive may cause users to start
sharing accounts or passwords, or otherwise compromise security.
For example, you may have a line that looks like this:

  # Set the user's default umask
  umask 033

Be sure to make root's umask to at least 022, which will
disable write and execute permission for other users, unless
explicitly changed using chmod(1).


READ ENTIRE ARTICLE:
http://www.linuxsecurity.com/content/view/117255/141/

----------------------

Linux File & Directory Permissions Mistakes

One common mistake Linux administrators make is having file and directory
permissions that are far too liberal and allow access beyond that which
is needed for proper system operations. A full explanation of unix file
permissions is beyond the scope of this article, so I'll assume you are
familiar with the usage of such tools as chmod, chown, and chgrp. If
you'd like a refresher, one is available right here on linuxsecurity.com.

http://www.linuxsecurity.com/content/view/119415/49/

---

Buffer Overflow Basics

A buffer overflow occurs when a program or process tries to store more
data in a temporary data storage area than it was intended to hold. Since
buffers are created to contain a finite amount of data, the extra
information can overflow into adjacent buffers, corrupting or overwriting
the valid data held in them.

http://www.linuxsecurity.com/content/view/119087/49/

---

Review: The Book of Postfix: State-of-the-Art Message Transport

I was very impressed with "The Book of Postfix" by authors Ralf
Hildebrandt and Pattrick Koetter and feel that it is an incredible
Postfix reference. It gives a great overall view of the operation
and management of Postfix in an extremely systematic and practical
format. It flows in a logical manner, is easy to follow and the
authors did a great job of explaining topics with attention paid
to real world applications and how to avoid many of the associated
pitfalls. I am happy to have this reference in my collection.

http://www.linuxsecurity.com/content/view/119027/49/


--------

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf


+---------------------------------+
|  Distribution: Debian           | ----------------------------//
+---------------------------------+

* Debian: New Apache packages fix HTTP request smuggling
  8th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120330


* Debian: New kdelibs packages fix backup file information leak
  8th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120332


* Debian: New Apache2 packages fix several vulnerabilities
  8th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120338


* Debian: New cvs packages fix insecure temporary files
  9th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120343


* Debian: New mod_ssl packages fix acl restriction bypass
  12th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120360


* Debian: New tdiary packages fix Cross Site Request Forgery
  12th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120370


* Debian: New squid packages fix several vulnerabilities
  13th, September, 2005

Update package.

http://www.linuxsecurity.com/content/view/120374


* Debian: New Mozilla packages fix several vulnerabilities
  13th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120377


* Debian: New common-lisp-controller packages fix arbitrary code
injection
  14th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120380


* Debian: New turqstat packages fix buffer overflow
  15th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120389


* Debian: New centericq packages fix several vulnerabilities
  15th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120392


+---------------------------------+
|  Distribution: Fedora           | ----------------------------//
+---------------------------------+

* Fedora Core 4 Update: slib-3a1-3.fc4
  8th, September, 2005

*.scm and *.init scripts shipped with slib expect that slib is
located directly in /usr/local/lib what's not true. This update fixes
this problem.

http://www.linuxsecurity.com/content/view/120334


* Fedora Core 4 Update: umb-scheme-3.2-39.fc4
  8th, September, 2005

UMB-scheme package conflicts with the SLIB package by instalation of
/usr/share/info/slib.info.gz. This update fixes the issue.

http://www.linuxsecurity.com/content/view/120335


* Fedora Core 4 Update: psmisc-21.5-5
  8th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120336


* Fedora Core 4 Update: glib2-2.6.6-1
  8th, September, 2005

GLib 2.6.6 fixes several bugs in the GOption cmdline option parser,
in the GKeyFile keyfile parser, a possible deadlock with threadpools
and several other bugs.

http://www.linuxsecurity.com/content/view/120340


* Fedora Core 4 Update: gtk2-2.6.10-1
  8th, September, 2005

GTK+ 2.6.10 fixes numerous bugs in the file chooser, the icon view,
and some other widgets. See the release announcements at
http://www.gtk.org for more details.

http://www.linuxsecurity.com/content/view/120341


* Fedora Core 4 Update: file-4.15-fc4.1
  9th, September, 2005

Several bug fixes and new magics.

http://www.linuxsecurity.com/content/view/120344


* Fedora Core 4 Update: subversion-1.2.3-2.1
  9th, September, 2005

This update includes the latest stable release of Subversion,
including a number of bug fixes.

http://www.linuxsecurity.com/content/view/120346


* Fedora Core 3 Update: unzip-5.51-4.fc3
  9th, September, 2005

This update fixes TOCTOU issue in unzip.

http://www.linuxsecurity.com/content/view/120347


* Fedora Core 4 Update: util-linux-2.12p-9.10
  9th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120348


* Fedora Core 4 Update: e2fsprogs-1.38-0.FC4.1
  9th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120349


* Fedora Core 4 Update: selinux-policy-targeted-1.25.4-10.1
  9th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120350


* Fedora Core 3 Update: e2fsprogs-1.38-0.FC3.1
  9th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120351


* Fedora Core 4 Update: firefox-1.0.6-1.2.fc4
  10th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120354


* Fedora Core 3 Update: firefox-1.0.6-1.2.fc3
  10th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120355


* Fedora Core 4 Update: mozilla-1.7.10-1.5.2
  10th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120356


* Fedora Core 3 Update: mozilla-1.7.10-1.3.2
  10th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120357


* Fedora Core 3 Update: vte-0.11.14-3.fc3
  12th, September, 2005

Please report regressions to GNOME Bugzilla.

http://www.linuxsecurity.com/content/view/120361


* Fedora Core 4 Update: vte-0.11.14-3.fc4
  12th, September, 2005

Please report regressions to GNOME Bugzilla.

http://www.linuxsecurity.com/content/view/120362


* Fedora Core 4 Update: slib-3a1-4.fc4
  12th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120364


* Fedora Core 4 Update: xdelta-1.1.3-17.fc4
  12th, September, 2005

xdelta shipped with FC4 isn't compiled with large file support and
uses obsolete glib-1.2 library. The libedsio symbols are missing from
the installed libxdelta library. This release introduces xdelta
ported to glib-2 and fixes the noted issues.

http://www.linuxsecurity.com/content/view/120365


* Fedora Core 3 Update: xdelta-1.1.3-16.fc3
  12th, September, 2005

xdelta shipped with FC3 isn't compiled with large file support and
uses obsolete glib-1.2 library. The libedsio symbols are missing from
the installed libxdelta library. This release introduces xdelta
ported to glib-2 and fixes the noted issues.

http://www.linuxsecurity.com/content/view/120366


* Fedora Core 4 Update: tvtime-1.0.1-0.fc4.1
  12th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120367


* Fedora Core 4 Update: evolution-data-server-1.2.3-3.fc4
  12th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120368


* Fedora Core 4 Update: openssh-4.2p1-fc4.1
  12th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120369


* Fedora Core 4 Update: dhcp-3.0.2-22.FC4
  13th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120373


* Fedora Core 3 Update: gnupg-1.2.7-1
  14th, September, 2005

This update upgrades GnuPG from version 1.2.6 to version 1.2.7,
fixing bug #139209 (~/.gnupg not created when gpg is first run),
among others.

http://www.linuxsecurity.com/content/view/120383


* Fedora Core 4 Update: util-linux-2.12p-9.11
  14th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120384


* Fedora Core 3 Update: mc-4.6.1-2.FC3
  14th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120385


* Fedora Core 3 Update: util-linux-2.12a-24.5
  14th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120386


* Fedora Core 4 Update: mc-4.6.1a-0.12.FC4
  14th, September, 2005

Updated package.

http://www.linuxsecurity.com/content/view/120387


* Fedora Core 4 Update: libwnck-2.10.3-1
  14th, September, 2005

This update upgrades libwnck to version 2.10.3 in order to work well
with metacity 2.10.3. This updated package corrects the behavior of
workspace switching when minized windows from a different workspace
than the current workspace are activated.

http://www.linuxsecurity.com/content/view/120388


+---------------------------------+
|  Distribution: Gentoo           | ----------------------------//
+---------------------------------+

* Gentoo: X.Org Heap overflow in pixmap allocation
  12th, September, 2005

An integer overflow in pixmap memory allocation potentially allows
any X.Org user to execute arbitrary code with elevated privileges.

http://www.linuxsecurity.com/content/view/120363


* Gentoo: Python Heap overflow in the included PCRE library
  12th, September, 2005

The "re" Python module is vulnerable to a heap overflow, possibly
leading to the execution of arbitrary code.

http://www.linuxsecurity.com/content/view/120371


+---------------------------------+
|  Distribution: Red Hat          | ----------------------------//
+---------------------------------+

* RedHat: Moderate: pcre security update
  8th, September, 2005

Updated pcre packages are now available to correct a security issue.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team

http://www.linuxsecurity.com/content/view/120337


* RedHat: Moderate: exim security update
  8th, September, 2005

Updated exim packages that fix a security issue in PCRE and a free
space computation on large file system bug are now available for Red
Hat Enterprise Linux 4. This update has been rated as having moderate
security impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/120339


* RedHat: Critical: firefox security update
  9th, September, 2005

An updated firefox package that fixes as security bug is now
available for Red Hat Enterprise Linux 4. This update has been rated
as having critical security impact by the Red Hat Security Response
Team.

http://www.linuxsecurity.com/content/view/120352


* RedHat: Critical: mozilla security update
  9th, September, 2005

An updated mozilla package that fixes a security bug is now
available. This update has been rated as having critical security
impact by the Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/120353


* RedHat: Important: XFree86 security update
  12th, September, 2005

Updated XFree86 packages that fix several integer overflows are now
available for Red Hat Enterprise Linux 2.1. This update has been
rated as having important security impact by the Red Hat Security
Response Team.

http://www.linuxsecurity.com/content/view/120372


* RedHat: Important: xorg-x11 security update
  13th, September, 2005

Updated X.org packages that fix several integer overflows are now
available for Red Hat Enterprise Linux 4. This update has been rated
as having important security impact by the Red Hat Security Response
Team.

http://www.linuxsecurity.com/content/view/120378


* RedHat: Important: XFree86 security update
  15th, September, 2005

This update has been rated as having important security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/120390


* RedHat: Important: squid security update
  15th, September, 2005

An updated Squid package that fixes security issues is now available.
This update has been rated as having important security impact by the
Red Hat Security Response Team.

http://www.linuxsecurity.com/content/view/120391


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux