-----BEGIN PGP SIGNED MESSAGE-----
To those involved in Linux security:
The latest release of "Linux-Magazin", a monthly German magazine that focuses
on Linux, contains an article by Mirko Dölle about security problems in the
Linux kernel.
In particular, the article argues that IP packets could be forwarded to the
address 208.47.125.33 (there is a PTR record at gary7.nsa.gov, which has an A
record back to the same address).
Many German Linux users have been calling SuSE support to learn details on
how to deal with this problem, not willing to believe that the article is an
April Fool's joke on security. None of the claims are correct, which makes a
kernel update unnecessary for this particular problem.
<p>Now, as inclined readers of security mailing lists may have noticed, there
are indeed security problems in the Linux kernel. These problems are no
backdoors of any kind, and they are not related to the article mentioned
above. In addition, the known kernel security issues are not remotely
exploitable, which means that local shell access is needed to take advantage
of the weaknesses. The weaknesses allow for a local attacker to gain
superuser access to the system.
SuSE will provide update packages for the supported distributions 6.3, 6.4,
7.0 and 7.1 shortly that eliminate the known problems. The SuSE kernels are
standard kernels, equipped with a set of patches that introduce drivers and
many other enhancements to the standard Linux kernel. The update packages are
currently being tested and will be available and announced as soon as
possible.
As an information for those who compile and install their own kernels: The
freshly released Linux kernel version 2.2.19 fixes the known issues in the
kernel. It should run smoothly on all 6.x SuSE Linux distributions, but
please note that 2.2.19 requires update packages for the lvm and/or the
raidtools (formerly mdutils) package if lvm (logical volume manager) or the
software raid facility of the Linux kernel are used. The lvm package is
available for download from our ftp server ftp.suse.com, the raidtools
package will follow soon.
Regards,
Roman Drahtmüller,
SuSE Security
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOsM8uney5gA9JdPZAQGnRggAkh+oXciCyj07rUgi0YJ4DEQVYopJRZQw
oYFcktCTC/CYXE42ZEkChlMO9UA2Op6kiFyqDnaIKo12C1555CxAJgjszQfAjPCe
1b2kxLNtY0GvibkFHjgJ5BLeh7rM3d7bMoA14HKSNXcHDQIuJEUD0Hh0ENe4fNng
qfZNHsd2EIdkjN3ncuQGjqPvy5N+se145OrEUGsOFY5Xb1KajxJhd8SlJ8+VkjTA
5tRi4NvLUZqdk1eKPvcKSkIuuv/rmSSOBEASUr/dEmy4Z8guVNW3qP6jk4HtPjYp
23yTkhZDHaYpCC7S/gMoU3pSrre0nh51W6yQx1oBOqaWZJtLSUJ+2A==
=RpeD
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: eperl
Announcement-ID: SuSE-SA:2001:08
Date: Tuesday, March 27th, 2001 16.00 MEST
Affected SuSE versions: 6.3, 6.4, 7.0, 7.1
Vulnerability Type: local and remote compromise
Severity (1-10): 6
SuSE default package: no
Other affected systems: all system using eperl package
Content of this advisory:
1) security vulnerability resolved: eperl
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The ePerl program is a interpreter for the Embedded Perl 5 Language.
It's main purpose is to serve as Webserver scripting language for dynamic
HTML page programming. Besides this it could also serve as a standalone
Unix filter.
Fumitoshi Ukai and Denis Barbier have found several potential buffer
overflows, which could lead to local privilege escalation if installed
setuid (note: it's not installed setuid per default) or to remote
compromise.
There is currently no efficient measure against the security problems
in the eperl perl interpreter other than not using or updating it.
SuSE provides update packages for the defective software.
SuSE Linux version before 6.3 don't include the eperl package.
Download the update package from locations described below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p> i386 Intel Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/d2/eperl-2.2.14-206.i386.rpm
e613b06d47dcfb7bbcea8c3d0c0e678b
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/eperl-2.2.14-206.src.rpm
c58a95f3b8ae757ea4d72f3157e2ea62
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/d1/eperl-2.2.14-203.i386.rpm
e66520cc0062e25495941542dd5b1f82
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/eperl-2.2.14-203.src.rpm
34d6682524154c9fb7b5fbec4f4ea82e
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/d1/eperl-2.2.14-203.i386.rpm
4b6a5a89899320a8eeb35c149ae111f5
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/eperl-2.2.14-203.src.rpm
062b14716e52f2649f4380a6a6e4e7f9
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/d1/eperl-2.2.14-202.i386.rpm
ba75d7f4a64329a3b5c324b3f0742575
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/eperl-2.2.14-202.src.rpm
c7ae001d4668ba3a0524f94429b1e4e6
<p> Sparc Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/d2/eperl-2.2.14-193.sparc.rpm
9752f8b9df6ac1ffdc68cb4b552d6491
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/eperl-2.2.14-193.src.rpm
f09a1ce9288c201ae63e193914fc84ce
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/d1/eperl-2.2.14-191.sparc.rpm
900eddc134215569fc88d11ce14c11f3
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/eperl-2.2.14-191.src.rpm
76aaa0efa8ae1c84b80201f73462fc26
<p> AXP Alpha Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/d1/eperl-2.2.14-195.alpha.rpm
d7b4be8d988f8cd501a33f9d2fb12a07
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/eperl-2.2.14-195.src.rpm
b0379287f9078fcd244cc720fad92c4d
SuSE-6.4
ftp://ftp.suse.com/pub/suse/axp/update/6.4/d1/eperl-2.2.14-195.alpha.rpm
78241206bc1b3927effdb5b1aa4d0ed5
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/eperl-2.2.14-195.src.rpm
325a04ec8c5c3da6b9c2fdf4e2c6c901
SuSE-6.3
ftp://ftp.suse.com/pub/suse/axp/update/6.3/d1/eperl-2.2.14-194.alpha.rpm
88a09004e5c0c2e6174785207e111318
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/eperl-2.2.14-194.src.rpm
a04cfa3e64aac49f6c148992e9a50189
<p> PPC Power PC Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/d2/eperl-2.2.14-178.ppc.rpm
3e05c702aca97db476155054d113ff95
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/eperl-2.2.14-178.src.rpm
67849b0c1c053eca482508fe2eac3042
SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/d1/eperl-2.2.14-177.ppc.rpm
35584e2f1bcebced98fad2ae241824da
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/eperl-2.2.14-177.src.rpm
98046dce35c4adfba57cc54c018376d7
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/d1/eperl-2.2.14-176.ppc.rpm
9c36bad7ec2e8f6c31307729c7d21bc8
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/eperl-2.2.14-176.src.rpm
eeaf1144dd659fe13b6a943bf40bf65b
<p> S/390 Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/s390/update/7.0/d1/eperl-2.2.14-182.s390.rpm
416974a30c9c9e435e028f2807e15a51
source rpm:
ftp://ftp.suse.com/pub/suse/s390/update/7.0/zq1/eperl-2.2.14-182.src.rpm
b14c7d9cbb969cda54b0d9f599f1b5cc
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- We are in the process of preparing update packages for the man package
which has been found vulnerable to a commandline format string bug.
The man command is installed suid man on SuSE systems. When exploited,
the bug can be used to install a different man binary to introduce a
trojan into the system. As an interim workaround, we recommend to
`chmod -s /usr/bin/manŽ and ignore the warnings and errors when
viewing manpages.
- The file browser MidnightCommander (mc) is vulnerable to unwanted
program execution. Updates are currently being built.
- Two bugs were found in the text editor vim. These bugs are currently
being fixed.
- A bufferoverflow in sudo was discovered and fixed RPMs will be
available as soon as possible. A exploit was not made public until
now.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
______________________________________________________________________________
<p>-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOsG3GXey5gA9JdPZAQGQtQgAmPBgkp8fCIbo0RJ+mJDa0Zx7W0N8S+Ba
LP2tH/cXkW9QPUT5vh1mKbB+LsH6wuG/uv7NG0EMrYHcmy3UFBEFKel4XD4G8XNU
BhAKegayEvjYH/OK8q8poVHYdvctrZ00LtfrW7IQkNfCXEVx0ByfaX5w/Qe/GQxQ
MWlqdw2klUXpnYZnaYj7mMsdTrc6DrIGdL4uCWozdQcyxGLeh/mQArg4TEdpv7KT
OW0LgDgZETo5akS/AwtZn3NE7rh+ZIAUAhPw8iUoK0k6RY+Z+RJa+QFQ+XXv7eHm
EXUcUd0wY47j5CROk+g7WzYy92Vn6VVOY63pcbhiv4R8BuPM9WVWJw==
=QNk3
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
E@mail: thomas(a)suse.de Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
Hi,
I resend advisory SuSE-SA:2001:07, because of a wrong signature.
Have a nice weekend.
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: nkitb/nkitserv
Announcement-ID: SuSE-SA:2001:07
Date: Thursday, March 22th, 2001 19.06 MEST
Affected SuSE versions: 6.1, 6.2, 6.3, 6.4, 7.0, 7.1
Vulnerability Type: remote denial-of-service
Severity (1-10): 4
SuSE default package: yes: in.ftpd, no: timed
Other affected systems: all system using in.ftpd (OpenBSD port) or timed
Content of this advisory:
1) security vulnerability resolved: timed, in.ftpd
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Two parts of the nkitb/nkitserv package are vulnerable to security related
bugs.
in.ftpd(8):
A one-byte bufferoverflow was discovered in the OpenBSD port of the
FTP daemon in.ftpd(8) several weeks ago.
This bug could just be triggered by authenticated users, which have write
access. This bug is believed to not be exploitable under Linux. However,
we prefer to provide a fixed update package to make sure that the daemon
is on the safe side.
in.ftpd(8) will be invoked by inetd(8) and is activated by default.
timed(8):
The time server daemon timed(8), which is started at boot time, tries to
synchronize the local host time with the time of other machines on the
local area network.
A bug in timed(8) was reported by the FreeBSD Security Officer, that could
be triggered remotely to crash the time server daemon.
For SuSE 6.1-6.4 in.ftpd and timed were part of nkitb.
Users of SuSE 7.0 need to download the nkitserv package for both in.ftpd
and timed.
The bug in in.ftpd is fixed in SuSE 7.1, so nkitserv for SuSE 7.1 just
includes a new version of timed(8).
Download the update package from locations desribed below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p><p> i386 Intel Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n1/nkitserv-2001.3.16-0.i386.rpm
c4313f92a36916f0eba0b8837c9c0c81
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/nkitb-2001.3.16-1.src.rpm
ec452523fa25c8aed962fbd3349d1f3d
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n1/nkitserv-2001.3.16-0.i386.rpm
02772824805c6c4293bd1750d7bda6d3
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/nkitb-2001.3.16-1.src.rpm
5d301edc1b1ec9111572815aace33984
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/a1/nkitb-2001.3.16-1.i386.rpm
842dea179cc449c4af25accf0c3f38ec
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/nkitb-2001.3.16-1.src.rpm
c099e7c1194b7706100453a89433b59c
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/a1/nkitb-2001.3.16-0.i386.rpm
768a636df4731cd8efd181aa2eaf2e60
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/nkitb-2001.3.16-0.src.rpm
b705425c4c3cb70ebf9cd1345c92104a
SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/6.2/a1/nkitb-2001.3.16-0.i386.rpm
cbae31148c79c91a1443f79ee1ba34d3
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/nkitb-2001.3.16-0.src.rpm
d287c01d35d00756ecbf8da04556037c
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/a1/nkitb-2001.3.16-0.i386.rpm
5f45ade69a9e8c2756e671c4a6e3522a
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/nkitb-2001.3.16-0.src.rpm
62b969c4e666f3ea71b6ce6b31762718
<p><p> Sparc Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n1/nkitserv-2001.3.16-0.sparc.…
142329dcae76a1603c0d84836192e357
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/nkitb-2001.3.16-0.src.rpm
5bd9123cecba6ddd42cc965c599f383e
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/n1/nkitserv-2001.3.16-0.sparc.…
07ed33c76c7ae2df5b877003b254944d
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/nkitb-2001.3.16-0.src.rpm
66ba7b71624f636e24e2d628c8f06e81
<p><p> AXP Alpha Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/n1/nkitserv-2001.3.16-0.alpha.rpm
5fcf177588788eb069bdb69332046d23
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/nkitb-2001.3.16-0.src.rpm
c27ed3bf0c293eaa77fe5a8fa960e95d
SuSE-6.4
ftp://ftp.suse.com/pub/suse/axp/update/6.4/a1/nkitb-2001.3.16-0.alpha.rpm
385fa60c0c216f1d9e61afd52d37df93
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/nkitb-2001.3.16-0.src.rpm
5ba60084740c9be9f89a729e2d21a77c
SuSE-6.3
ftp://ftp.suse.com/pub/suse/axp/update/6.3/a1/nkitb-2001.3.16-0.alpha.rpm
8a9e207a77e3c7f954e8faa91954f7aa
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/nkitb-2001.3.16-0.src.rpm
53f8a03feacc7fb81b92a726c8e81d21
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/a1/nkitb-2001.3.16-0.alpha.rpm
359a3432f73220cecd42ba0b365d5e06
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/nkitb-2001.3.16-0.src.rpm
e0ccf6395312f9c33518f5f083c9d51f
<p><p> PPC PowerPC Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n1/nkitserv-2001.3.16-0.ppc.rpm
37bf5a963bc93215084b5634e864479c
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/nkitb-2001.3.16-0.src.rpm
c31af637f58d9b43db542657b02bc772
<p> SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/n1/nkitserv-2001.3.16-1.ppc.rpm
ddc1dcfb94ba90f3cbdf395f89dd3b84
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/nkitb-2001.3.16-1.src.rpm
2fa9c58b871248172285a64107e3be7c
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/a1/nkitb-2001.3.16-0.ppc.rpm
1dc4c831b5f6bd344ab8f511497b3fa5
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/nkitb-2001.3.16-0.src.rpm
5529e5f63e2391ab1669efa0a8c33b57
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- joe (configuration file vulnerability): The problem has been reported
on multiple security-related mailing lists. We are about to provide
fixed packages.
- The game spaceboom (SVGA shoot'em up) has been found vulnerable to
multiple vulnerabilities. As a reaction to these bugs, the spaceboom
game has been dropped from the distribution. We recommend to deinstall
the game from our 6.x and 7.x distribution by using the command
`rpm -e spaceŽ, or to remove the suid bit from the file
/usr/games/SpaceBoom/SpaceBoom using the command
`chmod -s /usr/games/SpaceBoom/SpaceBoomŽ.
(Note: removing the suid bit prevents the game from being used by
non-root users and from being reinstalled after removal.)
- We are in the process of preparing update packages for the man package
which has been found vulnerable to a commandline format string bug.
The man command is installed suid man on SuSE systems. When exploited,
the bug can be used to install a different man binary to introduce a
trojan into the system. As an interim workaround, we recommend to
`chmod -s /usr/bin/manŽ and ignore the warnings and errors when
viewing manpages.
- The file browser MidnightCommander (mc) is vulnerable to unwanted
program execution. Updates are currently being built.
- New RPMs, that fix' a vulnerbility in the eperl package for SuSE 6.1-7.1 are
currently being built.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
<p>-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOrpHQ3ey5gA9JdPZAQEWXwf/TwIX3tVUM4l32z6efEOdiLPNe0FmdImz
kgFkyWX+aDSLIVvhoqjpfr7DjD0p2Run9d1BjdLoTGqUgFZf+WR5yZWUbR94+5wN
ahaoKWHMGGxHxynrbr+YnlOFyKH1Zv3HqFbsY/KTrVSsWCsbqsqs1wd8ePVG/El9
oODwYHDBlMHGu+tXRqXAMhxGgrlMw5Id2fQEXVXvQu6/OJjqjzeRDHCA05vw/lZK
hK0vAPbU3UKHkgbHLmA1kKyqMIYJZcSWDngv6IOWrS/5MyoswL8sWcda+7Z3omyL
885DLHrszKcnH2mYzVeVV/ZYE2u711dhVRn+FEHIxukNty0un6rLaQ==
=aQ3n
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
E@mail: thomas(a)suse.de Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
Hi,
I resend advisory SuSE-SA:2001:06, because of a wrong signature.
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: pop
Announcement-ID: SuSE-SA:2001:06
Date: Wednesday, March 21th, 2001 19.19 MEST
Affected SuSE versions: 6.1
Vulnerability Type: remote command execution
Severity (1-10): 2
SuSE default package: no
Other affected systems: all system using the pop package
Content of this advisory:
1) security vulnerability resolved: imapd, ipop2d, ipop3d
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The eMail access daemons imapd(8), ipop2d(8) and ipop3d(8) of SuSE 6.1
are vulnerable to several buffer overflows. Due to a misconfiguration
these vulnerbilities could be triggered remotely after a user had been
authenticated.
Download the update package from locations desribed below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p> i386 Intel Platform:
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/pop-2001.3.21-0.i386.rpm
1277deee87f3d1553ee18ae078d646aa
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/pop-2001.3.21-0.src.rpm
ce326335b36e51b6a635b69fc0106911
<p><p> AXP Alpha Platform:
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/pop-2001.3.21-0.alpha.rpm
33405d29e279795d99853a1235a821f9
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/pop-2001.3.21-0.src.rpm
eecd7c9ac81397f9eb7b2bee01a0154d
<p>______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- joe (configuration file vulnerability): The problem has been reported
on multiple security-related mailing lists. We are about to provide
fixed packages.
- The game spaceboom (SVGA shoot'em up) has been found vulnerable to
multiple vulnerabilities. As a reaction to these bugs, the spaceboom
game has been dropped from the distribution. We recommend to deinstall
the game from our 6.x and 7.x distribution by using the command
`rpm -e spaceŽ, or to remove the suid bit from the file
/usr/games/SpaceBoom/SpaceBoom using the command
`chmod -s /usr/games/SpaceBoom/SpaceBoomŽ.
(Note: removing the suid bit prevents the game from being used by
non-root users and from being reinstalled after removal.)
- We are in the process of preparing update packages for the man package
which has been found vulnerable to a commandline format string bug.
The man command is installed suid man on SuSE systems. When exploited,
the bug can be used to install a different man binary to introduce a
trojan into the system. As an interim workaround, we recommend to
`chmod -s /usr/bin/manŽ and ignore the warnings and errors when
viewing manpages.
- The file browser MidnightCommander (mc) is vulnerable to unwanted
program execution. Updates are currently being built.
- A new nkitb/nkitserv package will be availabe soon. This update adresses
bugs in timed, in.ftpd.
- New RPMs, that fix' a vulnerbility in the eperl package for SuSE 6.1-7.1
are currently being built.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
<p>-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOrpWCXey5gA9JdPZAQEyxwf+PEmG3VQd59s4IEkNpStXAH6cRqEIAIkh
rKXcrukIiBWdj08uNLoiggEgzq7wyUKBQH3thCD3CkolpPM4ViZmiVLAr8uerTmx
fP4Vd+m47VeYzcsdhRPPASpnVzgVHyLVxCiOKOM76QK1sOHZhf2jAzQEZbl9G1Mc
Z2Jo+4tAtFUPxsp0IN9NmfDezGOLeuXH5eIyp+Sgpw1fMa6Mkpk+Eib6Dc0qnM4H
JBqj1WBw539lD2wU8n4N4mM0YdUhzCx179vVJKf9C9XLPdFHUwuyDRR75M/lOH8U
dC5eg3QVdDm4bUDxMyDbvJqfxFpzlRt6dsb/vDk7Q6Hepat3plXhdQ==
=klWl
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
E@mail: thomas(a)suse.de Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: nkitb/nkitserv
Announcement-ID: SuSE-SA:2001:07
Date: Thursday, March 22th, 2001 19.06 MEST
Affected SuSE versions: 6.1, 6.2, 6.3, 6.4, 7.0, 7.1
Vulnerability Type: remote denial-of-service
Severity (1-10): 4
SuSE default package: yes: in.ftpd, no: timed
Other affected systems: all system using in.ftpd (OpenBSD port) or timed
Content of this advisory:
1) security vulnerability resolved: timed, in.ftpd
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Two parts of the nkitb/nkitserv package are vulnerable to security related
bugs.
in.ftpd(8):
A one-byte bufferoverflow was discovered in the OpenBSD port of the
FTP daemon in.ftpd(8) several weeks ago.
This bug could just be triggered by authenticated users, which have write
access. This bug is believed to not be exploitable under Linux. However,
we prefer to provide a fixed update package to make sure that the daemon
is on the safe side.
in.ftpd(8) will be invoked by inetd(8) and is activated by default.
timed(8):
The time server daemon timed(8), which is started at boot time, tries to
synchronize the local host time with the time of other machines on the
local area network.
A bug in timed(8) was reported by the FreeBSD Security Officer, that could
be triggered remotely to crash the time server daemon.
For SuSE 6.1-6.4 in.ftpd and timed were part of nkitb.
Users of SuSE 7.0 need to download the nkitserv package for both in.ftpd
and timed.
The bug in in.ftpd is fixed in SuSE 7.1, so nkitserv for SuSE 7.1 just
includes a new version of timed(8).
Download the update package from locations desribed below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p><p> i386 Intel Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n1/nkitserv-2001.3.16-0.i386.rpm
c4313f92a36916f0eba0b8837c9c0c81
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/nkitb-2001.3.16-1.src.rpm
ec452523fa25c8aed962fbd3349d1f3d
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n1/nkitserv-2001.3.16-0.i386.rpm
02772824805c6c4293bd1750d7bda6d3
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/nkitb-2001.3.16-1.src.rpm
5d301edc1b1ec9111572815aace33984
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/a1/nkitb-2001.3.16-1.i386.rpm
842dea179cc449c4af25accf0c3f38ec
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/nkitb-2001.3.16-1.src.rpm
c099e7c1194b7706100453a89433b59c
SuSE-6.3
ftp://ftp.suse.com/pub/suse/i386/update/6.3/a1/nkitb-2001.3.16-0.i386.rpm
768a636df4731cd8efd181aa2eaf2e60
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/nkitb-2001.3.16-0.src.rpm
b705425c4c3cb70ebf9cd1345c92104a
SuSE-6.2
ftp://ftp.suse.com/pub/suse/i386/update/6.2/a1/nkitb-2001.3.16-0.i386.rpm
cbae31148c79c91a1443f79ee1ba34d3
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/nkitb-2001.3.16-0.src.rpm
d287c01d35d00756ecbf8da04556037c
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/a1/nkitb-2001.3.16-0.i386.rpm
5f45ade69a9e8c2756e671c4a6e3522a
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/nkitb-2001.3.16-0.src.rpm
62b969c4e666f3ea71b6ce6b31762718
<p><p> Sparc Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n1/nkitserv-2001.3.16-0.sparc.…
142329dcae76a1603c0d84836192e357
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/nkitb-2001.3.16-0.src.rpm
5bd9123cecba6ddd42cc965c599f383e
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/n1/nkitserv-2001.3.16-0.sparc.…
07ed33c76c7ae2df5b877003b254944d
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/nkitb-2001.3.16-0.src.rpm
66ba7b71624f636e24e2d628c8f06e81
<p><p> AXP Alpha Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/n1/nkitserv-2001.3.16-0.alpha.rpm
5fcf177588788eb069bdb69332046d23
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/nkitb-2001.3.16-0.src.rpm
c27ed3bf0c293eaa77fe5a8fa960e95d
SuSE-6.4
ftp://ftp.suse.com/pub/suse/axp/update/6.4/a1/nkitb-2001.3.16-0.alpha.rpm
385fa60c0c216f1d9e61afd52d37df93
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/nkitb-2001.3.16-0.src.rpm
5ba60084740c9be9f89a729e2d21a77c
SuSE-6.3
ftp://ftp.suse.com/pub/suse/axp/update/6.3/a1/nkitb-2001.3.16-0.alpha.rpm
8a9e207a77e3c7f954e8faa91954f7aa
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/nkitb-2001.3.16-0.src.rpm
53f8a03feacc7fb81b92a726c8e81d21
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/a1/nkitb-2001.3.16-0.alpha.rpm
359a3432f73220cecd42ba0b365d5e06
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/nkitb-2001.3.16-0.src.rpm
e0ccf6395312f9c33518f5f083c9d51f
<p><p> PPC PowerPC Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n1/nkitserv-2001.3.16-0.ppc.rpm
37bf5a963bc93215084b5634e864479c
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/nkitb-2001.3.16-0.src.rpm
c31af637f58d9b43db542657b02bc772
<p> SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/n1/nkitserv-2001.3.16-1.ppc.rpm
ddc1dcfb94ba90f3cbdf395f89dd3b84
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/nkitb-2001.3.16-1.src.rpm
2fa9c58b871248172285a64107e3be7c
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/a1/nkitb-2001.3.16-0.ppc.rpm
1dc4c831b5f6bd344ab8f511497b3fa5
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/nkitb-2001.3.16-0.src.rpm
5529e5f63e2391ab1669efa0a8c33b57
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- joe (configuration file vulnerability): The problem has been reported
on multiple security-related mailing lists. We are about to provide
fixed packages.
- The game spaceboom (SVGA shoot'em up) has been found vulnerable to
multiple vulnerabilities. As a reaction to these bugs, the spaceboom
game has been dropped from the distribution. We recommend to deinstall
the game from our 6.x and 7.x distribution by using the command
`rpm -e spaceŽ, or to remove the suid bit from the file
/usr/games/SpaceBoom/SpaceBoom using the command
`chmod -s /usr/games/SpaceBoom/SpaceBoomŽ.
(Note: removing the suid bit prevents the game from being used by
non-root users and from being reinstalled after removal.)
- We are in the process of preparing update packages for the man package
which has been found vulnerable to a commandline format string bug.
The man command is installed suid man on SuSE systems. When exploited,
the bug can be used to install a different man binary to introduce a
trojan into the system. As an interim workaround, we recommend to
`chmod -s /usr/bin/manŽ and ignore the warnings and errors when
viewing manpages.
- The file browser MidnightCommander (mc) is vulnerable to unwanted
program execution. Updates are currently being built.
- New RPMs, that fix' a vulnerbility in the eperl package for SuSE 6.1-7.1
are currently being built.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
<p>-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOrpHQ3ey5gA9JdPZAQEWXwf/TwIX3tVUM4l32z6efEOdiLPNe0FmdImz
kgFkyWX+aDSLIVvhoqjpfr7DjD0p2Run9d1BjdLoTGqUgFZf+WR5yZWUbR94+5wN
ahaoKWHMGGxHxynrbr+YnlOFyKH1Zv3HqFbsY/KTrVSsWCsbqsqs1wd8ePVG/El9
oODwYHDBlMHGu+tXRqXAMhxGgrlMw5Id2fQEXVXvQu6/OJjqjzeRDHCA05vw/lZK
hK0vAPbU3UKHkgbHLmA1kKyqMIYJZcSWDngv6IOWrS/5MyoswL8sWcda+7Z3omyL
885DLHrszKcnH2mYzVeVV/ZYE2u711dhVRn+FEHIxukNty0un6rLaQ==
=aQ3n
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
E@mail: thomas(a)suse.de Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: pop
Announcement-ID: SuSE-SA:2001:06
Date: Wednesday, March 21th, 2001 19.19 MEST
Affected SuSE versions: 6.1
Vulnerability Type: remote command execution
Severity (1-10): 2
SuSE default package: no
Other affected systems: all system using the pop package
Content of this advisory:
1) security vulnerability resolved: omap, ipop2d, ipop3d
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The eMail access daemons impad(8), ipop2d(8) and ipop3d(8) of SuSE 6.1
are vulnerable to several buffer overflows. Due to a misconfiguration
these vulnerbilities could be triggered remotely after a user had been
authenticated.
Download the update package from locations desribed below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p> i386 Intel Platform:
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/pop-2001.3.21-0.i386.rpm
1277deee87f3d1553ee18ae078d646aa
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/pop-2001.3.21-0.src.rpm
ce326335b36e51b6a635b69fc0106911
<p><p> AXP Alpha Platform:
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/pop-2001.3.21-0.alpha.rpm
33405d29e279795d99853a1235a821f9
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/pop-2001.3.21-0.src.rpm
eecd7c9ac81397f9eb7b2bee01a0154d
<p>______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- joe (configuration file vulnerability): The problem has been reported
on multiple security-related mailing lists. We are about to provide
fixed packages.
- The game spaceboom (SVGA shoot'em up) has been found vulnerable to
multiple vulnerabilities. As a reaction to these bugs, the spaceboom
game has been dropped from the distribution. We recommend to deinstall
the game from our 6.x and 7.x distribution by using the command
`rpm -e spaceŽ, or to remove the suid bit from the file
/usr/games/SpaceBoom/SpaceBoom using the command
`chmod -s /usr/games/SpaceBoom/SpaceBoomŽ.
(Note: removing the suid bit prevents the game from being used by
non-root users and from being reinstalled after removal.)
- We are in the process of preparing update packages for the man package
which has been found vulnerable to a commandline format string bug.
The man command is installed suid man on SuSE systems. When exploited,
the bug can be used to install a different man binary to introduce a
trojan into the system. As an interim workaround, we recommend to
`chmod -s /usr/bin/manŽ and ignore the warnings and errors when
viewing manpages.
- The file browser MidnightCommander (mc) is vulnerable to unwanted
program execution. Updates are currently being built.
- A new nkitb/nkitserv package will be availabe soon. This update adresses
bugs in timed, in.ftpd (and rwhod).
- A vulnerbility, that exists in the eperl package for SuSE 6.1-7.1 are
currently being built.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
<p>-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOronNHey5gA9JdPZAQHNtwf+JRiIV2do5UeA7+YG3hc0f+RVP3ZAHqM9
u7Pb/2oK9yb6AQrrc2PSJeY1WKMqYGDGAs1RtMuRYykgFux3vFnVsmmZ6/BUKKwz
Ziz8uMe6BwUt3BZZiYwQQTLxEPBTJXxQpY6nF4rNhzVsecUCXM6LFBggkyV9Yd05
Vk3D+bvkkLHlJss5CFG3CITxJGi54MfqIyxab0aapu+723sxRu07MLXsmi1p3lL9
HJpVDr7OM07Sc2Sla3jjq+BiZk8R9SoZUzezn8imSmzXtKpCqZdxdv322weju7Gr
LXQuC0QfnX/Du0w0Ko3ayZK0VXe+8VDdg3DA2UUZdOmBkBPTeqUDVg==
=nRUf
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: cups
Announcement-ID: SuSE-SA:2001:05
Date: Monday, March 5th, 2001 13:10:13 MET
Affected SuSE versions: 7.1
Vulnerability Type: local/remote root compromise
Severity (1-10): 5
SuSE default package: no
Other affected systems: All UN*X-systems using cups < 1.1.6.
Content of this advisory:
1) security vulnerability resolved: cups
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
<p> CUPS is an implementation of the Internet Printing Protocol (IPP) and
is used as an alternative to the lpr and LPRng packages.
The CUPS package aims to be a comprehensive printing solution for
UN*X-systems. In SuSE-7.1 distribution, the cups package is not used by
any configuration utilities unless the admin has decided to configure
the package manually.
The cups package has been introduced in the SuSE-7.1 distribution;
enhanced support for future releases of the SuSE Linux distribution is
planned.
A SuSE-internal security audit conducted by Sebastian Krahmer and Thomas
Biege revealed several overflows as well as insecure file handling.
These bugs have been fixed by adding length-checks and securing the
file-access.
For a temporary workaround, remove the suid-bit from the 'lppasswd'
program.
Make sure nobody from outside your network can access the CUPS-server
running on port 631. Allowing access to this port from outside is a
bad idea regardless whether or not the used version is vulnerable.
No remote-exploits are known yet.
Download the update package from locations desribed below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
<p> i386 Intel Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/d3/cups-devel-1.1.6-13.i386.rpm
23c6484952ab0c1de81e2db38bcd3afc
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n2/cups-1.1.6-13.i386.rpm
812e0c47dcfe508eb9e8ccb38165b6d7
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/cups-1.1.6-13.src.rpm
204cea2ad6a61293c191e70a2cacdc82
<p><p>______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
<p> Effective Monday, March 19 2001, five weeks after the release of the new
SuSE-7.1 distribution, SuSE will discontinue support for the SuSE-linux
distributions SuSE-6.0 SuSE-6.1 and SuSE-6.2.
SuSE puts much effort into adding security improvements (patches) to the
software instead of publishing a new version; the same program with a fix
for a specific problem promises to work just as reliable as the original
version from the distribution, whereas new versions introduce new
functionality which changes the behaviour.
In some cases however, especially if the security leak is based on
problematic design decisions or when the fix(es) are fairly large, the
only reasonable fix for a security problem is to update to a newer version
of the software. These newer versions tend to become incompatible with our
older distribution releases because of missing features in the operating
system environment. This forces us to focus on the distributions of a
newer release date.
The remaining distributions
SuSE-6.3,
SuSE-6.4,
SuSE-7.0 and
SuSE-7.1
for the Intel i386, AXP Alpha, SPARC as well as PPC Power PC platforms
will continue to be supported for a two-year period after the release of
the respective distribution.
<p>______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
===============================================
SuSE's security contact is <security(a)suse.com>.
===============================================
Regards,
Sebastian Krahmer
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048/3D25D3D9 1999/03/06 SuSE Security Team <security(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i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=pIeS
- -----END PGP PUBLIC KEY BLOCK-----
<p><p>-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOqODeXey5gA9JdPZAQHRYQf/aNhY+lHrkpmWlxGtQI29qetDlIuqVbvQ
jUb4jm6vMvYJrFwzhtZ9XpWWYECDiqQjhy9KwmkkaVBrDTtbboNuQ+Wqq93zLzTD
t1uXxGqb3p847p3OtoxZXR9ZUxxB+tn6MS2CGUZVDA+TaYgUD9DW1eb9+z0t5ehN
2cdYZqvAp22BasIdXGlFSvCJ4oBqXT9HmqBk8Q+FS7ZzT0VKvOmXShqv5bWOPRj+
XwuuiPdPGc9Ykwp8lcoymU2Y8b62MASEVYsFT4rynMxrDSfNUaEPXTAhc2RPM9vn
+BgXrT0rfUiPkRWQTNpokp93TO3v8cOFgw0keeLcYRbP1nk36Ng03w==
=BWbh
-----END PGP SIGNATURE-----