LINUX SECURITY PROBLEMS AND PATCHES
Caldera OpenLinux security information can be found at:
http://www.caldera.com/news/security/index.html
Debian GNU/Linux maintain a security web page at:
http://www.debian.org/security/
Red Hat Linux maintain a support page at:
http://www.redhat.com/support/
Redhat ftp site:
ftp://updates.redhat.com/
The latest Slackware release and patches can be found at:
ftp://cdrom.com/pub/linux
S.u.S.E. information can be found at:
http://www.suse.com
---------------
Caldera:
No new reports this period.
---------------
Debian:
No new reports this period.
---------------
Red Hat Linux:
A) 04/08/99 - A potential Denial of Service issue has been fixed for
ippl (IP protocol logger) for Linux variations Red Hat and Debian. It
was released by the maintainer and announced on the Freshmeat web site.
Specific ftp sites and other information is available at:
http://tx.us.mirrors.freshmeat.net/news/1999/04/08/923586598.html
---------------
B) 04/01/99 - Red Hat announced several security related fixes and
updates affecting packages pine, mutt, zgv and sysklogd in addition to
the XFree86 issues that have plagued Linux this month (see other
references below). More information and updates/fixes are available
at:
http://www.redhat.com/support/docs/rhl/rh52-errata-general.html\
#XFree86
---------------
C) 03/09/99 - Network Associates issued a security advisory regarding
an TCP/IP implementation flaw in Linux kernel, up to and including
2.0.35, that can result in spoofing of TCP connections without having
to guess the TCP sequence numbers. NAI refers to this as "Blind TCP
Spoofing." The problem arises due to the result of three separate flaws
which are discussed in detail in the advisory. The problem is corrected
in version 2.0.36 of the kernel. CIAC published a bulletin in response
to the NAI advisory and it can be found at:
http://www.ciac.org/ciac/bulletins/j-035.shtml
---------------
Slackware has no official security reports pages. However, a scan of
their reported updates (found in the ChangeLog history) to the current
version of slackware indicate that it contains fixes for the rsync,
procmail and samba packages. More information can be found at:
ftp://cdrom.com/pub/linux/slackware-current/ChangeLog.txt
---------------
S.u.S.E.: A) 03/28/99 - S.u.S.E. reported a security hole in the
xfree86
package xf86-3.3.3-5, that allows for root level privilege to be
exercised. Patches and additional information can be found at:
http://www.suse.de/security/announcements/suse-security-announce-3.txt
---------------
B) 03/19/99 - SuSE reported a fix from Netscape for Communicator 4.5-9.
A vulnerability in the talkback utility allowed for creation of links
and overwriting of files that could be used maliciously. For more
information see the page at:
http://www.suse.de/security/announcements/suse-security-announce-2.txt
---------------
C) 03/19/99 - SuSE reported the Blind TCP Spoof vulnerability for all
Linux 2.0.x kernels except 2.0.36 which makes blind ip-spoofing
possible.
The default permissions on /dev/kmem are insecure. Install version
2.0.36 or 2.2.* of Linux kernels. For more information and site
locations
visit:
http://www.suse.de/security/announcements/suse-security-announce-1.txt
--
To get out of this list, please send email to [EMAIL PROTECTED] with
this text in its body: unsubscribe suse-linux-e
Check out the SuSE-FAQ at http://www.suse.com/Support/Doku/FAQ/ and the
archive at http://www.suse.com/Mailinglists/suse-linux-e/index.html