openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
October 2002
- 4 participants
- 7 discussions
31 Oct '02
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: lprng, html2ps
Announcement-ID: SuSE-SA:2002:040
Date: Thu Oct 31 11:00:10 MET 2002
Affected products: 7.0, 7.1, 7.2, 7.3, 8.0, 8.1
SuSE eMail Server III, 3.1
SuSE Firewall on CD/Admin host
SuSE Firewall on CD 2
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7
SuSE Linux Office Server
Vulnerability Type: local privilege escalation,
remote command execution
Severity (1-10): 6
SuSE default package: yes
Cross References: -
Content of this advisory:
1) security vulnerability resolved: Local privilege escalation in
runlpr (from lprng package) and remote command execution
via html2ps printfilter.
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds: -
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The lprng package contains the "runlpr" program which allows the lp
user to execute the lpr program as root. Local attackers can pass
certain commandline arguments to lpr running as root, fooling it
to execute arbitrary commands as root. This has been fixed.
Note that this vulnerability can only be exploited if the attacker
has previously gained access to the lp account.
Additionally, the html2ps printfilter, which is installed as part of
the LPRng print system, allowed remote attackers to execute arbitrary
commands in the context of the lp user.
These two issues combined allow attackers to mount a remote root attack.
As a workaround, we recommend to uninstall the html2ps package, and
restrict access to your print services to authorized hosts only.
Access control to lpd is implemented by adding appropriate entries to the
/etc/lpd.perms file. Please consult the lpd.perms(5) manpage, or add the
single line
DEFAULT REJECT
to your /etc/lpd.perms file to deny access to everyone from the outside.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.1
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/html2ps-1.0b3-458.i586…
c1990d8139e33176fb02745f3e5b0a05
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/html2ps-1.0b3-458.src.r…
f42f18d885dc2fe5701bc74812fd6ceb
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/lpdfilter-0.43-63.i586…
cc79a87fd8fcc9cf92356ab4863babc6
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/lpdfilter-0.43-63.src.r…
0ad433931936c4ba5a644de9104b3db4
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/gra1/html2ps-1.0b3-456.i386.rpm
c14c59d1f23575841a95f7d5eaf6f734
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/html2ps-1.0b3-456.src.rpm
7ffd5b01e399ee427a0d3a16d15af4f1
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap1/lpdfilter-0.42-155.i386.rpm
dd04dd60c4c18b5711643f6334b97bfd
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/lpdfilter-0.42-155.src.rpm
4d6b611c572d251f47c0b4cf8ab7a28d
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/gra1/html2ps-1.0b3-457.i386.rpm
28a1aee8dfedfff3eb348fc4ea4a8876
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/html2ps-1.0b3-457.src.rpm
2765c61e39616199cbf5066d719280b3
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/gra1/html2ps-1.0b1-432.i386.rpm
1ab553d151c65505184353ae6e514db6
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/html2ps-1.0b1-432.src.rpm
b71dba7782caeb01954b418e3ffdd6c2
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/gra1/html2ps-1.0b1-431.i386.rpm
1d9adfc7cc1e141f340b844f040bfe85
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/html2ps-1.0b1-431.src.rpm
b1b29ff154fc13cb806dec49fc00ff81
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/gra1/html2ps-1.0b1-428.i386.rpm
7e0bd236c647cd70ba9b0274f7b5cf53
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/html2ps-1.0b1-428.src.rpm
b60e012d057e428e6ade468d46afd4e5
Sparc Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/gra1/html2ps-1.0b3-88.sparc.rpm
b6c1c7399a041477ce0c321a9eda383b
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/html2ps-1.0b3-88.src.rpm
8102e2145e43fb6486cee5ccfc106c67
AXP Alpha Platform:
SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/gra1/html2ps-1.0b1-328.alpha.rpm
83967dc5d7dcf672c6dd902c125a3e81
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/html2ps-1.0b1-328.src.rpm
e3851c0f69017811168213a707431467
PPC Power PC Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/gra1/html2ps-1.0b1-303.ppc.rpm
b9cb5de37503927812f767a0781bfc6a
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/html2ps-1.0b1-303.src.rpm
be58c62e270d5cbc2aa3395beae91009
SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/gra1/html2ps-1.0b1-302.ppc.rpm
a98f5628ae1068b3d7f20b83ace9bb77
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/html2ps-1.0b1-302.src.rpm
5a425dbc64f2e0f2a368ecb566c624eb
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
There is no additional information this time.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBPcEJwHey5gA9JdPZAQGd6wf/bivjnESM1uXxwhFLeUK593HlqiDRdmiF
hTUO2C70QEP902Z9ybzyZW9ykIwdG6EcHgeCz2TaO8U+hN7s6JeDClAy0WqnqwHb
T+Zr1ppJYIpiYDiUFvsY27m4Zeuc8XsYb20mqdOm05tJOKZWrJmVyNfiLG/DsjTF
hbMhy2VdQ4URlNQ5bmFad4yCn3mQLWiSsoQMKoCrSxEeGMBL8ga9EHRdVXXGVcAE
2WeSROggq6qEFHflYVBLeSyagQBqd6h+f8HzW9QvqUt5GPpyvDQnI+vv4RJEJ3XR
4hlL4mhjT153hpSmVD4BFCiCmKJiZa/FYBGuIEkROVp46ZUzm3A6jA==
=r+5n
-----END PGP SIGNATURE-----
--
~
~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer(a)suse.de - SuSE Security Team
~
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: syslog-ng
Announcement-ID: SuSE-SA:2002:039
Date: Thu Oct 31 11:00:00 MET 2002
Affected products: 7.1, 7.2, 7.3, 8.0, 8.1
SuSE eMail Server III, 3.1
SuSE Linux Firewall on CD/Admin host
Vulnerability Type: remote command execution
Severity (1-10): 5
SuSE default package: no
Cross References: http://www.balabit.hu/static/zsa/ZSA-2002-014-en.txt,
CAN-2002-0972
Content of this advisory:
1) security vulnerability resolved: Buffer overflow in syslog-ng.
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- tomcat
- apache scoreboard
- groff
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The syslog-ng package is a portable syslog implementation which can
be used as syslogd replacement.
Syslog-ng contained buffer overflows in its macro expansion routines.
These overflows could be triggered by remote attackers if certain
configuration options were enabled.
Syslog-ng is not used by default on SuSE Linux, and even if installed,
the problematic options are not enabled by default. We recommend an update
of the syslog-ng package nevertheless if you use syslog-ng for logging.
To be sure the update takes effect you have to restart the daemon
by issuing the following command as root:
/etc/init.d/syslog-ng restart
We would like to thank Balazs Scheidler for offering fixes for this
problem.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.1
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/syslog-ng-1.4.14-321.i…
3e18ad784051e4bbfdcb543d39dab688
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/syslog-ng-1.4.14-321.sr…
aa51cb8a4208eda4b25c6a1269d74295
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/syslog-ng-1.4.14-319.i386.rpm
183db354ceea66a48982b795436a0b57
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/syslog-ng-1.4.14-319.src.rpm
c24798a52b9893b24e4cae4b890dcf0e
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/syslog-ng-1.4.12-72.i386.rpm
9c10c9d8f3607a4f9d13ec0e31afb0b0
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/syslog-ng-1.4.12-72.src.rpm
03927a5ccff05e0171dcb0544969a162
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/syslog-ng-1.4.11-89.i386.rpm
a2540127cd93a8c99304e9dbb79b9906
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/syslog-ng-1.4.11-89.src.rpm
09d479f8a75d6fed30da3939ad1d7f39
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n2/syslog-ng-1.4.11-88.i386.rpm
8079c939882b955703a9001aa68e2f11
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/syslog-ng-1.4.11-88.src.rpm
a97ddbad6908356758259a19449dbed4
Sparc Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/syslog-ng-1.4.12-30.sparc.r…
5dbb12897f09b73a150c3c7930431a55
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/syslog-ng-1.4.12-30.src.rpm
db05461d6a2b06cb527b18169c252a4a
AXP Alpha Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n2/syslog-ng-1.4.11-26.alpha.rpm
961b56ba9ed92a79f8c986c92c64a5d7
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/syslog-ng-1.4.11-26.src.rpm
914b26fba99632bf4b5e86dd852927ac
PPC Power PC Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/syslog-ng-1.4.12-57.ppc.rpm
8bbb6ab7c32def35ef39e926b089c2bc
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/syslog-ng-1.4.12-57.src.rpm
85527a7be7d81d739a55be1241cc1b3b
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n2/syslog-ng-1.4.11-30.ppc.rpm
3e923a2fc855031eba588d5db83a12f0
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/syslog-ng-1.4.11-30.src.rpm
8cdd6e6279b2586b639cfbd0d424a052
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- tomcat/jakarta
Remote attackers can obtain the sourcecode of JSP files on unpatched
servers. This has been fixed in the new tomcat packages. The README.SuSE
file of the tomcat package contains further information regarding secure
configuration of the tomcat server. To ensure a certain level of security
we recommend to disable the invoker servlet.
- apache (CAN-2002-0839)
Prior to Apache 1.3.27, the shared memory segment containing the
"score board" was writable by user "wwwrun". This meant that users
able to install CGI scripts etc in a location where they will be
executed by apache were able to modify the contents of this
scoreboard. This can be exploited to cause apache to send the
SIGUSR1 signal to arbitrary processes or arbitrarily spawn new apache
children. This update package contains a patch fixing this problem.
- groff
Someone hyped a format string bug in pic (which is part of the groff
package) already known since August 2001. Fixes have been pusblished
at about the same time. The groff packages in SuSE products have the
fix for this problem since SLES7 (SuSE Linux Enterprise Server, Version
7), appeared in August 2001, and all newer products.
_____________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBPcEAV3ey5gA9JdPZAQE2ggf+IdvYT7LoGbQLdN7tYb87H3I5a5MTlr9J
an6nmCQz9iRaCQreBfUTwR0FEKGbsrlr4Y+1sycp1/114BibZM6MCjY61/KRXy03
n7MBvZPZlTsDRhJJ228KVx3tgNcmNrPU0FIsSz50L1LkK2KNUmHQwZ71Z2aXpWdt
ii5eMQybu4HSnu3mXtke0sWnxUKcJo/92Abs1iC1H8yHqsHWFGHZQGsKI6lEuF+3
ldIrFkUKm5CEI5t3WU7tx4BlvNtoHWXqywb9KQ0Od4MNrmOM1eUMKCc1XyGhpMZs
gntakX5GxnLse+PzKr95cNoQ51oK05VcJpWxXx1Yydq1yxKU7wOQAQ==
=G74G
-----END PGP SIGNATURE-----
--
~
~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer(a)suse.de - SuSE Security Team
~
1
0
-----BEGIN PGP SIGNED MESSAGE-----
Dear suse-security-announce subscriber,
With the release of the SuSE Linux 8.1 i386 ftp version, we announce that
the SuSE Linux 7.0 distribution will be discontinued.
Vulnerabilities found after Monday, November 4 2002, will not be fixed for
SuSE Linux 7.0 any more. After two years of successful use, SuSE Linux 7.0
will free resources for the newly released products. By consequence, the
7.0 distributions directories on the ftp server have been moved to the
discontinued directory structure; the 7.0 directories in the update trees
will follow near the end of November, soon after all update packages have
been published.
SuSE puts much effort into adding security improvements (patches) to the
software instead of publishing a new version; the same program with a fix
for a specific problem promises to work just as reliable as the original
version from the distribution, whereas new versions introduce new
functionality which changes the behaviour.
In some cases however, especially if the security leak is based on
problematic design decisions or when the fix(es) are fairly large, the
only reasonable fix for a security problem is to update to a newer version
of the software. These newer versions tend to become incompatible with our
older distribution releases because of missing features in the operating
system environment. This forces us to focus on the distributions of a
newer release date.
As usual, SuSE will continue to provide update packages for the remaining
distributions
SuSE-7.1
SuSE-7.2
SuSE-7.3
SuSE-8.0
and
SuSE-8.1
for a two-year period after the release of the respective distribution.
Our SLES (SuSE Linux Enterprise Server) products and the products based on
SLES are not affected by this announcement.
If you have any questions regarding this announcement, please do not
hesitate to direct your questions to security(a)suse.de (SuSE security
contact).
Regards,
Roman Drahtmüller,
SuSE Security.
- - --
- -
| Roman Drahtmüller <draht(a)suse.de> // "You don't need eyes to see, |
SuSE Linux AG - Security Phone: // you need vision!"
| Nürnberg, Germany +49-911-740530 // Maxi Jazz, Faithless |
- -
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: http://www.suse.de/
iQEVAwUBPb6T63ey5gA9JdPZAQFhcwf/ew9hxSWvcw/se7kaNfoHb/4Y9DMGL8yj
9z1jpLm+yr4tmBgZhFkmev9NJt9yXGXZ2NbcmdrB0hHXAxdJ558kVO3+Hjs2u9yN
Oui4fkEmxh9C55BMHG5uLDwjAPn1kFEWF4wMb6I8zvTq9UOAWm5D87GqKn6fWCnK
1HxgA2YTn/j3IRRLjU7moZW5eBoDzZLPN1VQZfSnf4XPD4oZMNBQ1DeOWS81s+ex
t8Z83eoszGW+vzckhR/bdY2wm2a0xaO2l7A4EfDJndpO+qF/J3APlrz16SZ1CaU9
PRLul1SYfBfPNrQg5LvsNHjKJos2gGIJXjOP9/sl2Nb22LFPv6uOMg==
=21ua
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: postgresql
Announcement-ID: SuSE-SA:2002:038
Date: Monday, Oct 21th 2002 17:30 MEST
Affected products: 7.0, 7.1, 7.2, 7.3, 8.0
SuSE eMail Server 3.1
SuSE eMail Server III
Vulnerability Type: remote privilege escalation
Severity (1-10): 3
SuSE default package: no
Cross References: CAN-2002-0972
Content of this advisory:
1) security vulnerability resolved: several buffer overflows
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- mod_php4
- kon2
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The PostgreSQL Object-Relational DBMS was found vulnerable to several
security related buffer overflow problems.
The buffer overflows are located in:
* handling long datetime input
* lpad() and rpad() function with multibyte
* repeat() function
* TZ and SET TIME ZONE environment variables
These bugs could just be exploited by attackers who have access to the
postgresql server to gain the privileges postgres user ID .
The PostgreSQL package is not installed by default.
A temporary fix is not known.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap2/postgresql-libs-7.2-103.i38…
295a8b92176718fa0f31d8753b086e3d
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap2/postgresql-libs-7.2-103.i38…
ce9a41bcb3711a369168e6b412881e6d
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-7.2-103.i386.pat…
c39f7b4bf8474b05a690168cb1580cc9
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-7.2-103.i386.rpm
f30d7656ac76b508d02a40fdbab90c4d
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-contrib-7.2-103.…
9b371b39106a4f79ca56d1b03b66eac5
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-contrib-7.2-103.…
b153e3e6ea61e35fb14c4264beecd577
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-devel-7.2-103.i3…
1a1f7922e167f37378f52b59fbde7651
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-devel-7.2-103.i3…
ac259e05005d1cbaf1f34f27ef9b92c7
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-docs-7.2-103.i38…
b5145ffd46e3bf6471c87dcfe1c411b2
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-docs-7.2-103.i38…
866925a31b6e5529440bf08ac787ad7a
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-jdbc-7.2-103.i38…
77bdf60627640b8a6baaccd73f2eef9a
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-jdbc-7.2-103.i38…
e570f6b712bd5a4752a18b8cf1fab9ff
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-odbc-7.2-103.i38…
49362f0d17092e2da8adae5bf81f1906
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-odbc-7.2-103.i38…
4ab42090bd625e5c1cf1741fc05a685a
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-perl-7.2-103.i38…
11ada7e5e749e78eb98d82f7b1846aa6
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-perl-7.2-103.i38…
968526d469a4450550ab4ba5b6f83027
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-python-7.2-103.i…
e7b986baf11871378560d9c2fa61b717
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-python-7.2-103.i…
ad7359f18de98e9bbdb77e92ff0de37f
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-server-7.2-103.i…
b7d92162a97d27e63e8bee03abff0716
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-server-7.2-103.i…
65aba6a9afd5d38efca03cdf708597f2
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-tcl-7.2-103.i386…
547ce19ff0921855fdedbd2f644725cc
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-tcl-7.2-103.i386…
3097e791c00a11b4fd53914009677eb2
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-test-7.2-103.i38…
6a41815ed8de498044b9e58851232135
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-test-7.2-103.i38…
959c2270454ee03bd639b34d677ee1a7
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-tk-7.2-103.i386.…
e8fd82140e1ffd6e29f53bda5d8598ed
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap3/postgresql-tk-7.2-103.i386.…
7ea684c3a96ec347921dba32d70e905e
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/postgresql-7.2-103.src.rpm
a41380367f2b198c697f7d3409769633
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap2/postgresql-libs-7.1.3-116.i…
666fafcf35e113ce1a4f36c79abac810
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-7.1.3-116.i386.r…
f69d09bbcfcf41c36f929de48b48282a
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-contrib-7.1.3-11…
fd4de823cfc05743a9919eaedf
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-devel-7.1.3-116.…
1d5d8b74cae636cd10baa3a6c419bd14
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-docs-7.1.3-116.i…
da9a94d3a582ce37f353a82af8934d5c
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-jdbc-7.1.3-116.i…
a86c849130f63036b8d66f9880c91d98
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-odbc-7.1.3-116.i…
ab55332c9a8742b456dbf44079b93c62
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-perl-7.1.3-116.i…
8f40f336912f9c11222aa8e75a8f42d0
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-python-7.1.3-116…
8e87f0fb3b8b44824ae53cf364f7452d
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-server-7.1.3-116…
738aabbc7c2f86443b6f2f37bdaf45e1
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-tcl-7.1.3-116.i3…
d2741442b2d87d665a400dd20efdd379
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-test-7.1.3-116.i…
122befa7a0b5021e85f7348ec1e959f4
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/ap3/postgresql-tk-7.1.3-116.i38…
9eab7b2c22e0c82f327fd1685a3d9eb1
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/postgresql-7.1.3-116.src.rpm
df2bbdb0e393e98175277351a3ded1ac
Sparc Platform:
Due to lack of resources new packages will be made available later without
any further notice.
AXP Alpha Platform:
Due to lack of resources new packages will be made available later without
any further notice.
PPC Power PC Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap2/postgresql-libs-7.1.3-95.ppc…
e67b7b469ffd9cc90d674159270cb5c9
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-7.1.3-95.ppc.rpm
ee2f6f8d149fc651e88e7b183a33727e
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-contrib-7.1.3-95.…
58e9b9d3e8939fbe8d243ff183d2950d
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-devel-7.1.3-95.pp…
018928248f9052ee0e92a143e35fed44
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-docs-7.1.3-95.ppc…
1d906d52a9de9020bea1cb0f62dcfb1b
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-jdbc-7.1.3-95.ppc…
d7fd91833f8b6cf62334351c1114bc30
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-odbc-7.1.3-95.ppc…
ea2bba775ec4b4518e63f9130d5cf7d6
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-perl-7.1.3-95.ppc…
265b8715c2961cf6e6c53745c14d9c5e
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-python-7.1.3-95.p…
48b0aeb6aacdc4e6a756ff47914bbfa8
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-server-7.1.3-95.p…
5b1a62fe810df234d10a64b7fdba2481
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-tcl-7.1.3-95.ppc.…
c6aa4f989319efb9217df0d1cae51103
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-test-7.1.3-95.ppc…
ec661b2e8e483bda2d3587556f17010f
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/ap3/postgresql-tk-7.1.3-95.ppc.r…
06de87a238751fe6113fb0f8dbe11dd1
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/postgresql-7.1.3-95.src.rpm
c98a8567cb2c9f7d0c2b095fed7daeb1
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-devel-7.0.3-23.pp…
8e005c33619240fda1461fb35c08c9b5
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-jdbc-7.0.3-23.ppc…
06d51dd04c9490064bc4a07c81ee9f24
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-lib-7.0.3-23.ppc.…
e1c07b01422f37c656481c1a6566698e
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-odbc-7.0.3-23.ppc…
c897de110479618be9b122cdc897442e
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-perl-7.0.3-23.ppc…
26e09530d4aba750a93dac74d68aeded
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-python-7.0.3-23.p…
1cc6f6f78dd5459ac3b7573bb40951fd
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-server-7.0.3-23.p…
a38f645bc5ba6046ee2de0fae2be3ee5
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-tcl-7.0.3-23.ppc.…
d0a90015bae1937411f2e424c8d0f2f3
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-test-7.0.3-23.ppc…
967d48e91bed1a41d0a236024d01c95f
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap2/postgresql-tk-7.0.3-23.ppc.r…
2d7e5e348404c467a8bb3a54dbddd4eb
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap3/postgresql-7.0.3-23.ppc.rpm
10500a645eabc14f806e08f43bf238e7
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/postgresql-7.0.3-23.src.rpm
49ad314541f098a1f24884a22049275a
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- mod_php4
There was a mistake in Advisory SuSE-SA:2002:036 in section
"Affected products". SuSE 7.0 and 7.1 are _not_ vulnerable.
- kon2
There is a vulnerability in kon2, a Japanese input manager for the
VGA console, that can be exploited by local users to obtain root
privilege. We recommend to un-install kon2.
__________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (FAQ)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBPbQiLHey5gA9JdPZAQEvlgf/Sg+n/QODOR1kNEYCEqfwaTrtsy6BKSbx
oBHhSDgUGiQ6TRniQSO2vGftAG43eijGUqVC2X2vX9cjdCX5iG8m28Vpe+5BPVsq
9z2cSkloLgyvkeuwayTAgfJ1q2c/A7OgIgSjbDEjQOaw3QKEs/GiHQcK5oKfOZSd
Ki3LjWrldWR/1HlEw81oquWu9rHfMtIhw/gKRKAqoKypr6cE2MjKh48WvnYVyDTn
mjtrjKDj0Hlm43Q72FKuyw73iq1B5q+qjhClyCqSGc/UU7sO8REFm+hGXGvWNgSn
Qu7bIn2SXwLVgpg/qkVTWYWe6QPPI38EOj6kjkQ7OHH//TZ1Wf67xw==
=2pll
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege <thomas(a)suse.de>
SuSE Linux AG,Deutschherrnstr. 15-19,90429 Nuernberg
Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/contact/thomas.asc | pgp -fka"
Key fingerprint = 51 AD B9 C7 34 FC F2 54 01 4A 1C D4 66 64 09 83
--
Cold silence has a tendency to atrophy any sense of compassion
- Maynard James Keenan
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: heartbeat
Announcement-ID: SuSE-SA:2002:037
Date: Monday, Oct 14, 12:00 UTC
Affected products: 8.0, 8.1
Vulnerability Type: remote root
Severity (1-10): 7
SuSE default package: yes
Cross References: http://linux-ha.org/security/sec01.txt
Content of this advisory:
1) security vulnerability resolved: format string bug in heartbeat
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- util-linux
- dhcpcd
- heimdal
- logsurfer
- ghostscript
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Heartbeat is a monitoring service that is used to implement
failover in high-availablity environments. It can be configured to
monitor other systems via serial connections, or via UDP/IP.
Several format string bugs have been discovered in the heartbeat
package. One of these format string bugs is in the normal path
of execution, all the remaining ones can only be triggered if
heartbeat is running in debug mode. Since heartbeat is running with
root privilege, this problem can possibly be exploited by remote
attackers, provided they are able to send packets to the UDP port
heartbeat is listening on (port 694 by default).
Vulnerable versions of heartbeat are included in SuSE Linux 8.0 and
SuSE Linux 8.1.
As a workaround, make sure that your firewall blocks all traffic
to the heartbeat UDP port.
The proper fix is to upgrade to the packages provided by SuSE.
In addition to fixing the format string bug, this update also
changes heartbeat to perform processing of network packets as
user "nobody" instead of root. The update package for SuSE Linux
8.1 also fixes a boot time problem with heartbeat.
SuSE wishes to thank Nathan Wallwork for reporting the bug, and Alan
Robertson for his assistance in dealing with this problem. For more
information on this vulnerability, please refer to
http://linux-ha.org/security/sec01.txt
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
i386 Intel Platform:
SuSE-8.1
- being rebuilt
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap5/heartbeat-0.4.9.1-159.i386.…
510f5a4c4c094ef0a98d46c53deae660
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap5/heartbeat-ldirectd-0.4.9.1-…
86e1d5ae00efedfeb7e29e47cec973f6
ftp://ftp.suse.com/pub/suse/i386/update/8.0/ap5/heartbeat-stonith-0.4.9.1-1…
3067c26bd4a861e255b8e9dc74aad050
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/heartbeat-0.4.9.1-159.src.r…
e1df88a1af12d5e13cabc2662248f2c2
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- util/util-linux
The mount and umount program did not set their umask properly before
creating the mtab file. Local attackers could abuse the mount program
to put arbitrary content into the /etc/mtab file. New packages are
available on our ftp servers which fix this problem. An update is
recommended.
- dhcpcd
The dhcpcd DHCP client daemon has the ability to execute an
external script named /sbin/dhcpcd-<interface>.exe when assigning
a new IP address. It is not installed by default, however.
The script obtains the DHCP information by sourcing a file named
/var/lib/dhcpcd/dhcpcd-<interface>.info, containing a list
of shell variable assignments. Insufficient quoting of these
assignments allowed malicious DHCP servers (or attackers able
to spoof DHCP responses) to execute arbitrary shell commands on
the DHCP client if the user had installed the script.
- heimdal
Within the SuSE Advisory SuSE-SA:2002:034 regarding the Heimdal packages,
the following rpm was missing in the list:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/sec1/heimdal-lib-0.4d-132.i386.…
7356a6c07dfe91d968939f6f52a5879d
If you updated the Heimdal packgages for SuSE 7.3-i386, make sure you also
update this package.
- logsurfer
New logsurfer (logsurf in SuSE-7.0) packages are available for
download. These packages fix two errors (off-by-one overflow,
uninitialized memory) in the logsurfer package that can lead to
a crash of the program, resulting in a denial of service. It is
unknown if the two bugs can be used to execute arbitrary code in
the context of the logsurfer program.
- ghostscript (CVE CAN-2002-0363)
In ghostscript 6.50, setting the interpreter to SAFE mode was
reversible. This could be exploited to subvert the accounts of
users viewing malicious PostScript[tm], as well as the lp acount
if the print system was enabled.
SuSE has released updated RPMs for SuSE Linux 7.3 and SuSE Linux
Enterprise Server 7 for PowerPC. No other SuSE platform is affected.
- gv/ggv/kghostview (CVE CAN-2002-0832)
The ghostview (gv) code had several buffer overflows when handling
PostScript[tm] structural comments. These were also present in the
GNOME and KDE PostScript viewers derived from it. SuSE has released
fixed packages for these vulnerabilities.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
mQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCkYS3yEKeueNWc+z/0Kvff
4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP+Y0PFPboMvKx0FXl/A0d
M+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR8xocQSVCFxcwvwCglVcO
QliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U8c/yE/vdvpN6lF0tmFrK
XBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0ScZqITuZC4CWxJa9GynBE
D3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEhELBeGaPdNCcmfZ66rKUd
G5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtBUVKn4zLUOf6aeBAoV6NM
CC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOoAqajLfvkURHAeSsxXIoE
myW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1nKFvF+rQoU3VTRSBQYWNr
YWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohcBBMRAgAcBQI57vSBBQkD
wmcABAsKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyl8sAJ98BgD40zw0GHJHIf6d
NfnwI2PAsgCgjH1+PnYEl7TFjtZsqhezX7vZvYCIRgQQEQIABgUCOnBeUgAKCRCe
QOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lxyoAejACeOO1HIbActAevk5MUBhNe
LZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWnB/9An5vfiUUE1VQnt+T/EYklES3t
XXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDVwM2OgSEISZxbzdXGnqIlcT08TzBU
D9i579uifklLsnr35SJDZ6ram51/CWOnnaVhUzneOA9gTPSr+/fT3WeVnwJiQCQ3
0kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF5Yryk23pQUPAgJENDEqeU6iIO9Ot
1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3D3EN8C1yPqZd5CvvznYvB6bWBIpW
cRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGuzgpJt9IXSzyohEJB6XG5+D0BiF0E
ExECAB0FAjxqqTQFCQoAgrMFCwcKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyp1f
AJ9dR7saz2KPNwD3U+fy/0BDKXrYGACfbJ8fQcJqCBQxeHvt9yMPDVq0B0W5Ag0E
Oe70khAIAISR0E3ozF/la+oNaRwxHLrCet30NgnxRROYhPaJB/Tu1FQokn2/Qld/
HZnh3TwhBIw1FqrhWBJ7491iAjLR9uPbdWJrn+A7t8kSkPaF3Z/6kyc5a8fas44h
t5h+6HMBzoFCMAq2aBHQRFRNp9Mz1ZvoXXcI1lk1l8OqcUM/ovXbDfPcXsUVeTPT
tGzcAi2jVl9hl3iwJKkyv/RLmcusdsi8YunbvWGFAF5GaagYQo7YlF6UaBQnYJTM
523AMgpPQtsKm9o/w9WdgXkgWhgkhZEeqUS3m5xNey1nLu9iMvq9M/iXnGz4sg6Q
2Y+GqZ+yAvNWjRRou3zSE7Bzg28MI4sAAwYH/2D71Xc5HPDgu87WnBFgmp8MpSr8
QnSs0wwPg3xEullGEocolSb2c0ctuSyeVnCttJMzkukL9TqyF4s/6XRstWirSWaw
JxRLKH6Zjo/FaKsshYKf8gBkAaddvpl3pO0gmUYbqmpQ3xDEYlhCeieXS5MkockQ
1sj2xYdB1xO0ExzfiCiscUKjUFy+mdzUsUutafuZ+gbHog1CN/ccZCkxcBa5IFCH
ORrNjq9pYWlrxsEn6ApsG7JJbM2besW1PkdEoxak74z1senh36m5jQvVjA3U4xq1
wwylxadmmJaJHzeiLfb7G1ZRjZTsB7fyYxqDzMVul6o9BSwO/1XsIAnV1uuITAQY
EQIADAUCOe70kgUJA8JnAAAKCRCoTtronIAKyksiAJsFB3/77SkH3JlYOGrEe1Ol
0JdGwACeKTttgeVPFB+iGJdiwQlxasOfuXyITAQYEQIADAUCPGqpWQUJCgCCxwAK
CRCoTtronIAKyofBAKCSZM2UFyta/fe9WgITK9I5hbxxtQCfX+0ar2CZmSknn3co
SPihn1+OBNyZAQ0DNuEtBAAAAQgAoCRcd7SVZEFcumffyEwfLTcXQjhKzOahzxpo
omuF+HIyU4AGq+SU8sTZ/1SsjhdzzrSAfv1lETACA+3SmLr5KV40Us1w0UC64cwt
A46xowVq1vMlH2Lib+V/qr3b1hE67nMHjysECVx9Ob4gFuKNoR2eqnAaJvjnAT8J
/LoUC20EdCHUqn6v+M9t/WZgC+WNR8cq69uDy3YQhDP/nIan6fm2uf2kSV9A7ZxE
GrwsWl/WX5Q/sQqMWaU6r4az98X3z90/cN+eJJ3vwtA+rm+nxEvyev+jaLuOQBDf
ebh/XA4FZ35xmi+spdiVeJH4F/ubaGlmj7+wDOF3suYAPSXT2QAFEbQlU3VTRSBT
ZWN1cml0eSBUZWFtIDxzZWN1cml0eUBzdXNlLmRlPokBFQMFEDbhLUfkWLKHsco8
RQEBVw4H/1vIdiOLX/7hdzYaG9crQVIk3QwaB5eBbjvLEMvuCZHiY2COUg5QdmPQ
8SlWNZ6k4nu1BLcv2g/pymPUWP9fG4tuSnlUJDrWGm3nhyhAC9iudP2u1YQY37Gb
B6NPVaZiYMnEb4QYFcqv5c/r2ghSXUTYk7etd6SW6WCOpEqizhx1cqDKNZnsI/1X
11pFcO2N7rc6byDBJ1T+cK+F1Ehan9XBt/shryJmv04nli5CXQMEbiqYYMOu8iaA
8AWRgXPCWqhyGhcVD3LRhUJXjUOdH4ZiHCXaoF3zVPxpeGKEQY8iBrDeDyB3wHmj
qY9WCX6cmogGQRgYG6yJqDalLqrDOdmJARUDBRA24S0Ed7LmAD0l09kBAW04B/4p
WH3f1vQn3i6/+SmDjGzUu2GWGq6Fsdwo2hVM2ym6CILeow/K9JfhdwGvY8LRxWRL
hn09j2IJ9P7H1Yz3qDf10AX6V7YILHtchKT1dcngCkTLmDgC4rs1iAAl3f089sRG
BafGPGKv2DQjHfR1LfRtbf0P7c09Tkej1MP8HtQMW9hPkBYeXcwbCjdrVGFOzqx+
AvvJDdT6a+oyRMTFlvmZ83UV5pgoyimgjhWnM1V4bFBYjPrtWMkdXJSUXbR6Q7Pi
RZWCzGRzwbaxqpl3rK/YTCphOLwEMB27B4/fcqtBzgoMOiaZA0M5fFoo54KgRIh0
zinsSx2OrWgvSiLEXXYKiEYEEBECAAYFAjseYcMACgkQnkDjEAAKq6ROVACgjhDM
/3KM+iFjs5QXsnd4oFPOnbkAnjYGa1J3em+bmV2aiCdYXdOuGn4ZiQCVAwUQN7c7
whaQN/7O/JIVAQEB+QP/cYblSAmPXxSFiaHWB+MiUNw8B6ozBLK0QcMQ2YcL6+Vl
D+nSZP20+Ja2nfiKjnibCv5ss83yXoHkYk2Rsa8foz6Y7tHwuPiccvqnIC/c9Cvz
dbIsdxpfsi0qWPfvX/jLMpXqqnPjdIZErgxpwujas1n9016PuXA8K3MJwVjCqSKI
RgQQEQIABgUCOhpCpAAKCRDHUqoysN/3gCt7AJ9adNQMbmA1iSYcbhtgvx9ByLPI
DgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE=
=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iQEVAwUBPartGney5gA9JdPZAQFz3gf+MozfF7JIGqsvbjwgddHGd5yQHf9QL9m9
bbR7Ob8ZnZN9jkqE7T/pCkh+0Y/5PCviJFQlSYPRPf4EBJ0oi1QzmHOLM2C3vRKV
zRBmIbsQrTsnmV/kgD7AJAmhDXCjXv1S/uJK1L7tS42yTA/LN7zg75ss1xCxQVft
KhVRlhAPgAt9zM5Z+KSQmEQgd5jSdQzDyYhIHvVRt6osyzCWEu3hkWdUyByt/IXN
UFF/TyhUoj7DW0EaipnwTwU6AKRKY+tdwQz/veFnIA3wUI4SD+nJp12CTQlPpd6r
6e2tHXo85UR58eG7ja13Qpj9Cz02W8nPWAHM8oss6xDudEuopombYA==
=eS9k
-----END PGP SIGNATURE-----
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: mod_php4
Announcement-ID: SuSE-SA:2002:036
Date: Friday, Oct 4th 2002 10:30 MEST
Affected products: 7.0, 7.1, 7.2, 7.3, 8.0
SuSE eMail Server 3.1
SuSE eMail Server III
SuSE Linux Enterprise Server
SuSE Linux Connectivity Server
SuSE Linux Office Server
Vulnerability Type: remote privilege escalation
Severity (1-10): 5
SuSE default package: no
Cross References: CAN-2002-0985
Content of this advisory:
1) security vulnerability resolved:
- control char injection in mail()
- handling 5th argument of mail() while in "safe mode"
- CRLF injection
2) pending vulnerabilities, solutions, workarounds:
- glibc
- ghostview/kghostview
- fetchmail
- kdelibs
- ethereal
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
PHP is a well known and widely used web programming language.
If a PHP script runs in "safe mode" several restrictions are applied
to it including limits on execution of external programs.
An attacker can pass shell meta-characters or sendmail(8) command line
options via the 5th argument (introduced in version 4.0.5) of the mail()
function to execute shell commands or control the behavior of sendmail(8).
The CRLF injection vulnerabilities in fopen(), file(), header(), ...
allow an attacker to bypass ACLs or trigger cross-side scripting.
The mod_php4 package is not installed by default.
A temporary fix is not known.
Please note, that the following packages were rebuild too:
- mod_php4-core
- mod_php4-aolserver
- mod_php4-devel
- mod_php4-servlet
- mod_php4-roxen
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/mod_php4-4.1.0-257.i386.patc…
00ce030f55f4d0af32528402a5cbe269
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n2/mod_php4-4.1.0-257.i386.rpm
3399c5b577464a282c85a6fcb56be915
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/mod_php4-4.1.0-257.src.rpm
730c4b802dd14b9f9fc0ce2bb83fdc4e
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/mod_php4-4.0.6-193.i386.rpm
c82972d8b1933a388adb6669e625835f
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/mod_php4-4.0.6-193.src.rpm
8a8bf1262e11f4adbfa973b1ba9c9b54
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/mod_php4-4.0.6-192.i386.rpm
b93a3680eef353f3e16de8f7dd13dfb8
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/mod_php4-4.0.6-192.src.rpm
3304dae258e667a56b6d095eb552016f
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n2/mod_php4-4.0.4pl1-142.i386.r…
8a829c7fd56622b736a7f538e2d8cc3c
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/mod_php4-4.0.4pl1-142.src.r…
23e6b8d1f2128dd4885f85d939646078
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n1/mod_php4-4.0.4pl1-135.i386.r…
99e3e87bf1f18a839f2b1a2f80c3f336
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/mod_php4-4.0.4pl1-135.src.r…
68013bd4050dff75267cdde07894e5d8
Sparc Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/mod_php4-4.0.6-66.sparc.rpm
397044fb23b60f444fcb6b76986027bf
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/mod_php4-4.0.6-66.src.rpm
431de04e4b31cf939e0cb9a1881c9e72
SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n2/mod_php4-4.0.4pl1-45.sparc.…
a6146130f0c20821696406e62ab22863
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/mod_php4-4.0.4pl1-45.src.r…
e1019229ec79ea7175f188ecc348e2b6
AXP Alpha Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n2/mod_php4-4.0.4pl1-54.alpha.rpm
8010e1ef878dd366bb3dcce07b5c8a99
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/mod_php4-4.0.4pl1-54.src.rpm
7906462b3a64d505dc78e298512312de
SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/n1/mod_php4-4.0.4pl1-55.alpha.rpm
55e770e7a01a680e3a776bb085d91254
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/mod_php4-4.0.4pl1-55.src.rpm
0e6654da0c43f3170ddcf0b132ae9ac3
PPC Power PC Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/mod_php4-4.0.6-99.ppc.rpm
52421717b8fdd0c9ee4d96d3f0bb1e89
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/mod_php4-4.0.6-99.src.rpm
df7274f651888c62ad3693d3672ccc00
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n2/mod_php4-4.0.4pl1-53.ppc.rpm
b43d618d2eba73477dd8f9e2d2215118
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/mod_php4-4.0.4pl1-53.src.rpm
f9457dc7736cdfecaa2e4a7a01c0c53f
SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/n1/mod_php4-4.0.4pl1-45.ppc.rpm
56d6fb88d0032f5dcc12397f295e42b2
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/mod_php4-4.0.4pl1-45.src.rpm
b684c0aa03ec7ec9c8d75f5558bbea1e
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- glibc
Client applications which use res_search/res_nsreach and/or res_query()/
res_nquery() of libresolv could trigger a DNS decoding error, a SEGV or
leak information by reading beyond the end of a too small 'answer'
buffer.
The update packages are being built and tested. We will publish a security
announcement as soon as they are ready.
- ghostview/kghostview
Bufferoverflows have recently been discovered in these packages. They allow
attackers to execute arbitrary code with the privileges of the user
viewing special crafted documents created by the attacker. New packgaes will
soon be available on our ftp servers.
- fetchmail
Fetchmail contains remotely exploitable overflows in the mail header
parsing functions. In depth discussion of these problems can be found at
http://security.e-matters.de/advisories/032002.html.
New packages will soon be available on our ftp servers.
- kdelibs
KDE's SSL implementation fails to check the trust chain in SSL
certificates. This bug allows faking valid SSL certificates.
New KDE packages will be available soon to fix this and other bugs.
- ethereal
Several potential security issues have been discovered in ethereal
0.9.4. After this package is tested succesfuly it will be relased.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3in
Charset: noconv
iQEVAwUBPaFTRHey5gA9JdPZAQEU5wf9E3Kq7go9IuRddxJBsQHQnz5KLdiOofla
MR5gO0EziakIO47L3U5XnuRQowjuTQ6ADdVSzyI1T3rqZqhF2lVMed2dMqHes6ge
tRCyi1XTJG99UUDG8FuKmCKMepxmwqhM5zK85h/P4wK/0g/6MaxipkLcuDA8EXkk
ikxvKbXA2wdc2aEruRHZRIOmEL/yqSpqZRSY8qSEIxhnKF8DWLN3ZBwyIaFIfCgH
UL8Td51OfajydtAMSfF8IdrrrYS8RKO8UycgoEq/z5U1U4GpdEBy5mS0ure0NNGY
9lxFyn66lgE+eJ0V3v1BiSWyGvZBTlQeuATMsK+n7vMqNBM0st8zSw==
=lMYP
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege <thomas(a)suse.de>
SuSE Linux AG,Deutschherrnstr. 15-19,90429 Nuernberg
Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/contact/thomas.asc | pgp -fka"
Key fingerprint = 51 AD B9 C7 34 FC F2 54 01 4A 1C D4 66 64 09 83
--
Cold silence has a tendency to atrophy any sense of compassion
- Maynard James Keenan
1
0
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: hylafax
Announcement-ID: SuSE-SA:2002:035
Date: Friday, Oct 4th 2002 10:30 MEST
Affected products: 7.0, 7.1, 7.2, 7.3, 8.0
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server
SuSE Linux Office Server
Vulnerability Type: remote privilege escalation
Severity (1-10): 4
SuSE default package: no
Cross References: CAN-2002-1050
Content of this advisory:
1) security vulnerability resolved:
- format string bug in logging
code for TSI
- buffer overflow in faxgetty
while handling image data
2) pending vulnerabilities, solutions, workarounds:
- glibc
- ghostview/kghostview
- fetchmail
- kdelibs
- ethereal
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
HylaFAX is a client-server architecture for receiving and sending
facsimiles.
The logging function of faxgetty prior version 4.1.3 was vulnerable to
a format string bug when handling the TSI value of a received facsimile.
This bug could easily be used to trigger a denial-of-service attack or
to execute arbitrary code remotely.
Another bug in faxgetty, a buffer overflow, can be abused by a remote
attacker by sending a large line of image data to execute arbitrary
commands too.
Several format string bugs in local helper applications were fixed too.
These bugs can not be exploited to gain higher privileges on a system
running SuSE Linux because of the absence of setuid bits.
The hylafax package is not installed by default.
A temporary fix is not known.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/hylafax-4.1-285.i386.patch.r…
3115ebdb9e65027f35809463c5e6ae7e
SuSE-8.0
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/hylafax-4.1-285.i386.rpm
07b0f2d015b0fd83c5bb9be548e7b8fb
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/hylafax-4.1-285.src.rpm
8231586e2de356c737ef3d6f9d17c0ea
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n3/hylafax-4.1-284.i386.rpm
de51bda21cc9ee1a4dd3cd06ccccf71e
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/hylafax-4.1-284.src.rpm
aac2ecddf06934f286960f52f2e7670e
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n3/hylafax-4.1beta2-376.i386.rpm
275c73b0b192da9c883cfebf6638604e
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/hylafax-4.1beta2-376.src.rpm
b8698144b8bb859d880659fcf01eb020
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n3/hylafax-4.1beta2-375.i386.rpm
c322bc9007191e3692341b5702b29200
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/hylafax-4.1beta2-375.src.rpm
4d76cd426565e411941b4aaebf6ad761
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n2/hylafax-4.1beta2-373.i386.rpm
fa7399ce161a44dbad630928cd6b3b84
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/hylafax-4.1beta2-373.src.rpm
0ac9d8b33b75f29b55a5750f17a65b93
Sparc Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n3/hylafax-4.1-112.sparc.rpm
1cabb4113f858df010d305fa576c5a02
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/hylafax-4.1-112.src.rpm
a5ddaee97231c423e04fb71b757532a3
SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n3/hylafax-4.1beta2-218.sparc.…
1449e568071f5fb6080efebb8f2a7a2b
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/hylafax-4.1beta2-218.src.r…
bf8c780206da51bc548e9fd4264b9bfc
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/n2/hylafax-4.1beta2-218.sparc.…
bb265465ea8b84ca31b5c954266daf1d
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/hylafax-4.1beta2-218.src.r…
b5bcae601fe056f399fc8696aa156529
AXP Alpha Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n3/hylafax-4.1beta2-245.alpha.rpm
45d0fd7061f10e4bef9e57c42a9b160d
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/hylafax-4.1beta2-245.src.rpm
baf364ec3636077fe8f810edeb111572
SuSE-7.0
ftp://ftp.suse.com/pub/suse/axp/update/7.0/n2/hylafax-4.1beta2-244.alpha.rpm
856e96ce4a165b74e70ebc9ef3201672
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/hylafax-4.1beta2-244.src.rpm
f68e2260aa36d4d218a3f3589333ea0e
PPC Power PC Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n3/hylafax-4.1-189.ppc.rpm
79846b9ae0f75f8ed9b17fed07ba6263
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/hylafax-4.1-189.src.rpm
98a123cf18cb6b34ffd9018a76ad161f
SuSE-7.1
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/n3/hylafax-4.1beta2-218.ppc.rpm
2bfe866f1bd1d93307449de95d84d6c2
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/hylafax-4.1beta2-218.src.rpm
972c605bd3a9cc15bbbc5aa188dfc864
SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/n2/hylafax-4.1beta2-217.ppc.rpm
00b1ae1c91235ecceb287ffe7aced175
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/hylafax-4.1beta2-217.src.rpm
e905325a032854fb653cf458e0db8942
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- glibc
Client applications which use res_search/res_nsreach and/or res_query()/
res_nquery() of libresolv could trigger a DNS decoding error, a SEGV or
leak information by reading beyond the end of a too small 'answer'
buffer.
The update packages are being built and tested. We will publish a security
announcement as soon as they are ready.
- ghostview/kghostview
Bufferoverflows have recently been discovered in these packages. They
allow attackers to execute arbitrary code with the privileges of the
user viewing special crafted documents created by the attacker. New
packgaes will soon be available on our ftp servers.
- fetchmail
Fetchmail contains remotely exploitable overflows in the mail header
parsing functions. In depth discussion of these problems can be found
at http://security.e-matters.de/advisories/032002.html.
New packages will soon be available on our ftp servers.
- kdelibs
KDE's SSL implementation fails to check the trust chain in SSL
certificates. This bug allows faking valid SSL certificates.
New KDE packages will be available soon to fix this and other bugs.
- ethereal
Several potential security issues have been discovered in ethereal
0.9.4. After this package is tested succesfuly it will be relased.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SuSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security(a)suse.de)
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.
2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SuSE in rpm packages for SuSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SuSE Linux distributions version 7.1 and thereafter install the
key "build(a)suse.de" upon installation or upgrade, provided that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .
- SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security(a)suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe(a)suse.com>.
suse-security-announce(a)suse.com
- SuSE's announce-only mailing list.
Only SuSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe(a)suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info(a)suse.com> or
<suse-security-faq(a)suse.com> respectively.
=====================================================================
SuSE's security contact is <security(a)suse.com> or <security(a)suse.de>.
The <security(a)suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SuSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security(a)suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build(a)suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3in
Charset: noconv
iQEVAwUBPZ2QC3ey5gA9JdPZAQES0gf/Un5d3SHgL+xDlFaseqLg6t7NHa1d4KRw
ZM8eqLE+ClFpfq+o/Rf97DqAaQZYrvUYzleOUUcvci2BLevCFMbqBsRxBc0FvU7G
lvxgJkjslnlBxjAgkvXp/DmEcYN3sVH/4f8eLtq+cUb4AwU01elI7mThE6l3n6P6
Xq2q4NdWnw1RAXmsgfjNkRuX5gNUgULRUYFFlQF/ycKleoml/DQCH7dBet9tBQQP
jem58hBq2cnQmTG2GyFFs0fsb81PCfxk0LrrxveKoMHR/cgH/y2sOBCu01bEzBBe
HhpZPhgOcO1CxijXuEufaPbufXN5d/L2gHJpQK54L7Oc6n8zsDLXmg==
=7yxm
-----END PGP SIGNATURE-----
Bye,
Thomas
--
Thomas Biege <thomas(a)suse.de>
SuSE Linux AG,Deutschherrnstr. 15-19,90429 Nuernberg
Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/contact/thomas.asc | pgp -fka"
Key fingerprint = 51 AD B9 C7 34 FC F2 54 01 4A 1C D4 66 64 09 83
--
Cold silence has a tendency to atrophy any sense of compassion
- Maynard James Keenan
1
0