Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs



Top White Papers




More on LinuxToday

Security Linux News for Nov 22, 2000

  • Red Hat Security Advisory: ghostscript uses mktemp instead of mkstemp, and uses an improper LD_RUN_PATH (Nov 22, 2000, 22:12)
    "ghostscript makes use of mktemp instead of mkstemp to create temp files; and also uses improper LD_RUN_PATH values, causing it to search for libraries in the current directory."

  • O'Reilly Network: Insecurities in a Nutshell: Vixie cron Exploit and More (Nov 22, 2000, 21:42)
    "An exploit was announced that uses fopen() and a preserved umask vulnerability in Paul Vixie's cron. An attacker can use this vulnerability to create a world-writable file in /var/spool/cron. They would then be able to write arbitrary cron entries into that file, which would run as the user being attacked. It is reported that Mandrake 7.0, Red Hat versions 6.1 and earlier, Cobalt Linux, and Trustix are not vulnerable."

  • Debian Security Advisory: New version of modutils released (Nov 22, 2000, 21:27)
    "Sebastian Krahmer raised an issue in modutils. In an ideal world modprobe should trust the kernel to only pass valid parameters to modprobe. However he has found at least one local root exploit because high level kernel code passed unverified parameters direct from the user to modprobe. So modprobe no longer trusts kernel input and switches to a safemode."

  • Debian Security Advisory: New version of elvis-tiny released (Nov 22, 2000, 21:15)
    "Topi Miettinen audited elvis-tiny and raised an issue covering the use and creation of temporary files. Those files are created with a predictable pattern and O_EXCL flag is not used when opening. This makes users of elvis-tiny vulnerable to race conditions and/or data lossage."

  • Debian Security Advisory: New Debian xmcd packages released (Nov 22, 2000, 20:48)
    "The Debian GNU/Linux xmcd package has historically installed two setuid helpers for accessing cddb databases and SCSI cdrom drives. More recently, the package offered the administrator the chance to remove these setuid flags, but did so incorrectly."

  • Debian Security Advisory: New Debian ncurses packages released (Nov 22, 2000, 20:41)
    "The version of the ncurses display library shipped with Debian GNU/Linux 2.2 is vulnerable to several buffer overflows in the parsing of terminfo database files."

  • Debian Security Advisory: New version of ethereal released (Nov 22, 2000, 07:31)
    hacksware reported a buffer overflow in the AFS packet parsing code in ethereal. Gerald Combs then found more overflows in the netbios and ntp decoding logic as well. An attacker can exploit those overflows by sending carefully crafted packets to a network that is being monitored by ethereal.

  • Debian Security Advisory: New version of joe released (Nov 22, 2000, 07:25)
    When joe (Joe's Own Editor) dies due to a signal instead of a normal exit it saves a list of the files it is editing to a file called `DEADJOE' in its current directory. Unfortunately this wasn't done safely which made joe vulnerable to a symlink attack.

  • Debian Security Advisory: New version of modutils released (Nov 20, 2000, 20:20)
    "The kmod kernel feature allows the kernel to dynamically load kernel modules if functionality is required that is not present in the running kernel. It does this by invoking the modprobe command with the requested module as parameter. This parameter can be influenced by users, for example by opening a currently non-existing files on a devfs filesystem, or trying to access a non-existing network interface."