[LWN Logo]
[LWN.net]

Sections:
 Main page
 Security
 Kernel
 Distributions
 Development
 Commerce
 Linux in the news
 Announcements
 Back page
All in one big page

See also: last week's Security page.

Security


News and editorials

Linux 2.2.16 security release. Alan Cox has released Linux 2.2.16, a new version of the stable Linux tree, to fix several security issues, including a potentially remotely exploitable hole in the sunrpc code. An upgrade to 2.2.16 is recommended immediately for anyone with untrusted local users and/or publicly-accessible kernel sunrpc services.

U.S. To Follow EU Crypto Lead (Wired). Wired reports that the US is watching upcoming decisions on cryptography in Europe and will respond to them. "Commerce Department Undersecretary William Reinsch said Monday that any change, designed to make sure American high-tech companies aren't disadvantaged, will have to wait until the Europeans reach a decision." A dramatic relaxation of cryptography regulations in Europe is currently expected.

After its hard-nosed policy against relaxing cryptographic regulations, the U.S. government likely needs a good excuse before it makes an about-face in policy. However, they seem to know that their current regulations are ineffective, since cryptography is already widely available, sanctioned or not. Given the pressure from U.S. businesses to not be restricted from competition in the global market for encryption products, a European decision to relax regulations will pave the way for the U.S. to respond in kind.

NetBSD developer password exposed (Fairfax I.T.). In the list of most annoying/embarrassing situations, having your password "acquired" has got to be near the top. The Fairfax I.T. in Australia reports on the exposure of Paul Vixie's password. Paul is a well-known developer, working on NetBSD, XFree86 and other projects. Warning, though, the article has no particularly useful information about how the password was acquired, how they became aware of its exposure, etc. No damage appears to have been done.

Kondara MNU/Linux Advisories. Security advisories for Kondara MNU/Linux are now available at http://www.kondara.org/errata/k11-security.html. Currently, the web-site contains updates for dump, kernel, gpm, emacs, imwheel, openldap, cdrecord and xlockmore.

Security Reports

Linux-Mandrake bind update. Linux-Mandrake announced a security update for bind. By default in Linux-Mandrake, bind is launched as user and group root. This setting makes it possible to easily exploit vulnerabilities in bind.

cdrecord. The Linux cdrecord binary is vulnerable to a locally exploitable buffer overflow attack. Check BugTraq ID 1265 for more details. Linux Mandrake 6.1 and 7.0 have been verified as vulnerable. cdrecord 1.9a02 has just been announced and is reported to contain a fix for this overflow.

kdelibs. Kdelibs 1.2.2 has a problem which can allow the exploitation of any setuid root KDE application.

Buffer overflow in inn. A buffer overflow in inn 2.2.2 has been reported that can be an issue if the option "verifycancels" in /etc/news/inn.conf is set to "true". Setting this option to "false" should fix the problem.

Debian: mailx buffer overflow. Debian has put out a security advisory and updates for mailx to fix an exploitable buffer overflow. This is the first report of this problem, so updates from other distributions have not yet been seen.

Debian: splitvt local root vulnerability. Debian has also put out an advisory for splitvt, which contains a buffer overflow that can be exploited to gain access to root on a local system. An upgrade is recommended for all versions of Debian. This problem has been fixed in splitvt 1.6.4.

Xterm Denial-of-Service vulnerability. An exploit has been made available that can cause an xterm window to crash and, in some instances, consume all memory on the system. For more information, check out the BugTraq discussion or BugTraq ID 1298. XFree86 4.0 xterm, rxvt and eterm have been confirmed to be vulnerable. Gnome-terminal, KDE konsole, OpenWindows xterm and Secure CRT are reported not vulnerable.

BRU. The BRU backup and restore facility has an exploitable vulnerability which can be easily fixed by modifying the permission bits to remove the setuid root.

Commercial products. The following commercial products were reported to contain vulnerabilities:

Updates

gdm. A buffer overflow vulnerability was reported in gdm, the Gnome display manager. An upgrade to gdm 2.0beta4-25 is recommended. An exploit for this has been published. (From June 1st).

mailman. An upgrade to mailman-2.0beta2 is recommended to close several security holes. (From June 1st).

Majordomo wrapper vulnerability. (From June 1st).

xlockmore. (From June 1st).

  • COVERT Labs (original report, June 1), contains information from Debian, FreeBSD, NetBSD, OpenBSD, SCO and TurboLinux
  • Linux-Mandrake

Resources

SSH Secure Shell 2.2. SSH Communications Security has announced the release of SSH Secure Shell 2.2, an update to this proprietary product.

Hardening Linux Machines For Web Services (themestream). Here is an article from themestream specifically targeted at people placing their webservers at a co-location facility. It provides a checklist of security issues to consider.

Events

Call-For-Papers.

June/July security events.

June 12-14, 2000. NetSec 2000, San Francisco, California, USA.

June 19-23, 2000. 12th Annual Canadian Information Technology Security Symposium, Ottawa, Ontario, Canada.

June 25-30, 2000. 12th Annual First Conference, Chicago, Illinois, USA.

June 26-28, 2000. SSS2000 Strategic Security Summit, Helsinki, Finland.

June 27-28, 2000. CSCoRE 2000, "Computer Security in a Collaborative Research Environment", Long Island, New York, USA.

July 3-5, 2000. 13th IEEE Computer Security Foundations Workshop, Cambridge, England.

July 10-12, 2000. Fifth Australasian Conference on Information Security and Privacy (ACISP 2000), Brisbane, Australia.

July 14-16, 2000. H2K / HOPE 2000, New York, New York, USA.

July 26-27, 2000. The Black Hat Briefings, Las Vegas, Nevada, USA.

July 28-30, 2000. DEF CON VIII, Las Vegas, Nevada, USA.

Section Editor: Liz Coolbaugh


June 8, 2000


Secure Linux Projects
Bastille Linux
Immunix
Khaos Linux
Nexus
Secure Linux
Secure Linux (Flask)
Trustix

Security List Archives
Bugtraq Archive
Firewall Wizards Archive
ISN Archive

Distribution-specific links
Caldera Advisories
Conectiva Updates
Debian Alerts
Kondara MNU/Linux Advisories LinuxPPC Security Updates
Mandrake Updates
Red Hat Errata
SuSE Announcements
Yellow Dog Errata

Security Software Archives
munitions
ZedZ.net (formerly replay.com)

Miscellaneous Resources
CERT
CIAC
Comp Sec News Daily
Crypto-GRAM
LinuxLock.org
Linux Security Audit Project
LinuxSecurity.com
OpenSSH
OpenSEC
Security Focus
SecurityPortal

 

Next: Kernel

 
Eklektix, Inc. Linux powered! Copyright © 2000 Eklektix, Inc., all rights reserved
Linux ® is a registered trademark of Linus Torvalds