[ISN] Linux Advisory Watch - September 16th 2005
InfoSec News
isn at c4i.org
Mon Sep 19 02:08:36 EDT 2005
+---------------------------------------------------------------------+
| LinuxSecurity.com Weekly Newsletter |
| September 16th, 2005 Volume 6, Number 38a |
+---------------------------------------------------------------------+
Editors: Dave Wreski Benjamin D. Thomas
dave at linuxsecurity.com ben at linuxsecurity.com
Linux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the
week. It includes pointers to updated packages and descriptions of
each vulnerability.
This week, advisories were released for apache, kdelibs, cvs, mod_ssl,
tdiary, squid, mozilla, common-lisp, turqstat, slib, umb-scheme,
psmisc, gtk, file, subversion, unzip, e2fsprogs, selinux-policy-targeted,
firefox, mozilla, vte, xdelta, tvtime, dhcp, gnupg, util-linux,
mc, libwnck, pcre, exim, and squid. The distributors include, Debian,
Fedora, Gentoo, and Red Hat.
---
## Master of Science in Information Security ##
Earn your Master of Science in Information Security online from Norwich
University. Designated a "Center of Excellence", the program offers a
solid education in the management of information assurance, and the
unique case study method melds theory into practice. Using today's
e-Learning technology, you can earn this esteemed degree, without
disrupting your career or home life.
LEARN MORE:
http://www.msia.norwich.edu/linux_en
---
Using umask
The umask can be used to control the default file permission on
newly-created files. The umask command controls the default file
and directory creation mode for newly-created files and directories.
It is recommended that you make root's umask 077, which will disable
read, write, and execute permission for other users, unless explictly
changed using chmod.
The umask command can be used to determine the default file creation
mode on your system. It is the octal complement of the desired file
mode. If files are created without any regard to their permissions
settings, a user could inadvertently give read or write permission
to someone that should not have this permission.
The umask for the creation of new executable files is calculated as
follows:
777 Default Permissions
-022 Subtract umask value, for example
-----
755 Allowed Permissions
So in this example we chose 022 as our umask. This shows us that
new executables that are created are given mode 755, which means
that the owner can read, write, and execute the binary, while members
of the group to which the binary belongs, and all others, can only
read and execute it.
The umask for the creation of new text files is calculated as
follows:
666 Default Permissions
-022 Subtract umask mask, for example
-----
644 Allowed Permissions
This example shows us that given the default umask of 666, and
subtracting our sample umask value of 022, new text files are
created with mode 644, which states that the owner can read and
write the file, while members of the group to which the file
belongs, and everyone else can only read the new file. Typically
umask settings include 022, 027, and 077, which is the most
restrictive. Normally the umask is set in /etc/profile, so it
applies to all users on the system. The file creation mask must
be set while keeping in mind the purpose of the account.
Permissions that are too restrictive may cause users to start
sharing accounts or passwords, or otherwise compromise security.
For example, you may have a line that looks like this:
# Set the user's default umask
umask 033
Be sure to make root's umask to at least 022, which will
disable write and execute permission for other users, unless
explicitly changed using chmod(1).
READ ENTIRE ARTICLE:
http://www.linuxsecurity.com/content/view/117255/141/
----------------------
Linux File & Directory Permissions Mistakes
One common mistake Linux administrators make is having file and directory
permissions that are far too liberal and allow access beyond that which
is needed for proper system operations. A full explanation of unix file
permissions is beyond the scope of this article, so I'll assume you are
familiar with the usage of such tools as chmod, chown, and chgrp. If
you'd like a refresher, one is available right here on linuxsecurity.com.
http://www.linuxsecurity.com/content/view/119415/49/
---
Buffer Overflow Basics
A buffer overflow occurs when a program or process tries to store more
data in a temporary data storage area than it was intended to hold. Since
buffers are created to contain a finite amount of data, the extra
information can overflow into adjacent buffers, corrupting or overwriting
the valid data held in them.
http://www.linuxsecurity.com/content/view/119087/49/
---
Review: The Book of Postfix: State-of-the-Art Message Transport
I was very impressed with "The Book of Postfix" by authors Ralf
Hildebrandt and Pattrick Koetter and feel that it is an incredible
Postfix reference. It gives a great overall view of the operation
and management of Postfix in an extremely systematic and practical
format. It flows in a logical manner, is easy to follow and the
authors did a great job of explaining topics with attention paid
to real world applications and how to avoid many of the associated
pitfalls. I am happy to have this reference in my collection.
http://www.linuxsecurity.com/content/view/119027/49/
--------
--> Take advantage of the LinuxSecurity.com Quick Reference Card!
--> http://www.linuxsecurity.com/docs/QuickRefCard.pdf
+---------------------------------+
| Distribution: Debian | ----------------------------//
+---------------------------------+
* Debian: New Apache packages fix HTTP request smuggling
8th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120330
* Debian: New kdelibs packages fix backup file information leak
8th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120332
* Debian: New Apache2 packages fix several vulnerabilities
8th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120338
* Debian: New cvs packages fix insecure temporary files
9th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120343
* Debian: New mod_ssl packages fix acl restriction bypass
12th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120360
* Debian: New tdiary packages fix Cross Site Request Forgery
12th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120370
* Debian: New squid packages fix several vulnerabilities
13th, September, 2005
Update package.
http://www.linuxsecurity.com/content/view/120374
* Debian: New Mozilla packages fix several vulnerabilities
13th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120377
* Debian: New common-lisp-controller packages fix arbitrary code
injection
14th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120380
* Debian: New turqstat packages fix buffer overflow
15th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120389
* Debian: New centericq packages fix several vulnerabilities
15th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120392
+---------------------------------+
| Distribution: Fedora | ----------------------------//
+---------------------------------+
* Fedora Core 4 Update: slib-3a1-3.fc4
8th, September, 2005
*.scm and *.init scripts shipped with slib expect that slib is
located directly in /usr/local/lib what's not true. This update fixes
this problem.
http://www.linuxsecurity.com/content/view/120334
* Fedora Core 4 Update: umb-scheme-3.2-39.fc4
8th, September, 2005
UMB-scheme package conflicts with the SLIB package by instalation of
/usr/share/info/slib.info.gz. This update fixes the issue.
http://www.linuxsecurity.com/content/view/120335
* Fedora Core 4 Update: psmisc-21.5-5
8th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120336
* Fedora Core 4 Update: glib2-2.6.6-1
8th, September, 2005
GLib 2.6.6 fixes several bugs in the GOption cmdline option parser,
in the GKeyFile keyfile parser, a possible deadlock with threadpools
and several other bugs.
http://www.linuxsecurity.com/content/view/120340
* Fedora Core 4 Update: gtk2-2.6.10-1
8th, September, 2005
GTK+ 2.6.10 fixes numerous bugs in the file chooser, the icon view,
and some other widgets. See the release announcements at
http://www.gtk.org for more details.
http://www.linuxsecurity.com/content/view/120341
* Fedora Core 4 Update: file-4.15-fc4.1
9th, September, 2005
Several bug fixes and new magics.
http://www.linuxsecurity.com/content/view/120344
* Fedora Core 4 Update: subversion-1.2.3-2.1
9th, September, 2005
This update includes the latest stable release of Subversion,
including a number of bug fixes.
http://www.linuxsecurity.com/content/view/120346
* Fedora Core 3 Update: unzip-5.51-4.fc3
9th, September, 2005
This update fixes TOCTOU issue in unzip.
http://www.linuxsecurity.com/content/view/120347
* Fedora Core 4 Update: util-linux-2.12p-9.10
9th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120348
* Fedora Core 4 Update: e2fsprogs-1.38-0.FC4.1
9th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120349
* Fedora Core 4 Update: selinux-policy-targeted-1.25.4-10.1
9th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120350
* Fedora Core 3 Update: e2fsprogs-1.38-0.FC3.1
9th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120351
* Fedora Core 4 Update: firefox-1.0.6-1.2.fc4
10th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120354
* Fedora Core 3 Update: firefox-1.0.6-1.2.fc3
10th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120355
* Fedora Core 4 Update: mozilla-1.7.10-1.5.2
10th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120356
* Fedora Core 3 Update: mozilla-1.7.10-1.3.2
10th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120357
* Fedora Core 3 Update: vte-0.11.14-3.fc3
12th, September, 2005
Please report regressions to GNOME Bugzilla.
http://www.linuxsecurity.com/content/view/120361
* Fedora Core 4 Update: vte-0.11.14-3.fc4
12th, September, 2005
Please report regressions to GNOME Bugzilla.
http://www.linuxsecurity.com/content/view/120362
* Fedora Core 4 Update: slib-3a1-4.fc4
12th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120364
* Fedora Core 4 Update: xdelta-1.1.3-17.fc4
12th, September, 2005
xdelta shipped with FC4 isn't compiled with large file support and
uses obsolete glib-1.2 library. The libedsio symbols are missing from
the installed libxdelta library. This release introduces xdelta
ported to glib-2 and fixes the noted issues.
http://www.linuxsecurity.com/content/view/120365
* Fedora Core 3 Update: xdelta-1.1.3-16.fc3
12th, September, 2005
xdelta shipped with FC3 isn't compiled with large file support and
uses obsolete glib-1.2 library. The libedsio symbols are missing from
the installed libxdelta library. This release introduces xdelta
ported to glib-2 and fixes the noted issues.
http://www.linuxsecurity.com/content/view/120366
* Fedora Core 4 Update: tvtime-1.0.1-0.fc4.1
12th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120367
* Fedora Core 4 Update: evolution-data-server-1.2.3-3.fc4
12th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120368
* Fedora Core 4 Update: openssh-4.2p1-fc4.1
12th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120369
* Fedora Core 4 Update: dhcp-3.0.2-22.FC4
13th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120373
* Fedora Core 3 Update: gnupg-1.2.7-1
14th, September, 2005
This update upgrades GnuPG from version 1.2.6 to version 1.2.7,
fixing bug #139209 (~/.gnupg not created when gpg is first run),
among others.
http://www.linuxsecurity.com/content/view/120383
* Fedora Core 4 Update: util-linux-2.12p-9.11
14th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120384
* Fedora Core 3 Update: mc-4.6.1-2.FC3
14th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120385
* Fedora Core 3 Update: util-linux-2.12a-24.5
14th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120386
* Fedora Core 4 Update: mc-4.6.1a-0.12.FC4
14th, September, 2005
Updated package.
http://www.linuxsecurity.com/content/view/120387
* Fedora Core 4 Update: libwnck-2.10.3-1
14th, September, 2005
This update upgrades libwnck to version 2.10.3 in order to work well
with metacity 2.10.3. This updated package corrects the behavior of
workspace switching when minized windows from a different workspace
than the current workspace are activated.
http://www.linuxsecurity.com/content/view/120388
+---------------------------------+
| Distribution: Gentoo | ----------------------------//
+---------------------------------+
* Gentoo: X.Org Heap overflow in pixmap allocation
12th, September, 2005
An integer overflow in pixmap memory allocation potentially allows
any X.Org user to execute arbitrary code with elevated privileges.
http://www.linuxsecurity.com/content/view/120363
* Gentoo: Python Heap overflow in the included PCRE library
12th, September, 2005
The "re" Python module is vulnerable to a heap overflow, possibly
leading to the execution of arbitrary code.
http://www.linuxsecurity.com/content/view/120371
+---------------------------------+
| Distribution: Red Hat | ----------------------------//
+---------------------------------+
* RedHat: Moderate: pcre security update
8th, September, 2005
Updated pcre packages are now available to correct a security issue.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team
http://www.linuxsecurity.com/content/view/120337
* RedHat: Moderate: exim security update
8th, September, 2005
Updated exim packages that fix a security issue in PCRE and a free
space computation on large file system bug are now available for Red
Hat Enterprise Linux 4. This update has been rated as having moderate
security impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/120339
* RedHat: Critical: firefox security update
9th, September, 2005
An updated firefox package that fixes as security bug is now
available for Red Hat Enterprise Linux 4. This update has been rated
as having critical security impact by the Red Hat Security Response
Team.
http://www.linuxsecurity.com/content/view/120352
* RedHat: Critical: mozilla security update
9th, September, 2005
An updated mozilla package that fixes a security bug is now
available. This update has been rated as having critical security
impact by the Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/120353
* RedHat: Important: XFree86 security update
12th, September, 2005
Updated XFree86 packages that fix several integer overflows are now
available for Red Hat Enterprise Linux 2.1. This update has been
rated as having important security impact by the Red Hat Security
Response Team.
http://www.linuxsecurity.com/content/view/120372
* RedHat: Important: xorg-x11 security update
13th, September, 2005
Updated X.org packages that fix several integer overflows are now
available for Red Hat Enterprise Linux 4. This update has been rated
as having important security impact by the Red Hat Security Response
Team.
http://www.linuxsecurity.com/content/view/120378
* RedHat: Important: XFree86 security update
15th, September, 2005
This update has been rated as having important security impact by the
Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/120390
* RedHat: Important: squid security update
15th, September, 2005
An updated Squid package that fixes security issues is now available.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
http://www.linuxsecurity.com/content/view/120391
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email vuln-newsletter-request at linuxsecurity.com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
More information about the ISN
mailing list