dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Slackware Linux Advisories: tcpdump, cvs

Apr 19, 2004, 02:38 (0 Talkback[s])

[slackware-security] tcpdump denial of service (SSA:2004-108-01)

Upgraded tcpdump packages are available for Slackware 8.1, 9.0, 9.1, and -current to fix denial-of-service issues. Sites using tcpdump should upgrade to the new packages.

More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184

The tcpdump advisory from Rapid7 may be found here:
http://www.rapid7.com/advisories/R7-0017.html

Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Sat Apr 17 11:03:35 PDT 2004
patches/packages/tcpdump-3.8.3-i486-1.tgz: Upgraded to tcpdump-3.8.3 and libpcap-0.8.3. This fixes a couple minor bugs that shouldn't affect 32-bit ix86 Slackware, but we might as well have the latest.
According to www.tcpdump.org/:

TCPDUMP version 3.8.3 has been released as of March 30, 2004. 3.8.3 is identical to 3.8.2, but the version number has been incremented to match libpcap.

LIBPCAP version 0.8.3 has been released as of March 30, 2004. 0.8.3 fixes a minor problem with gencode.c on 64-bit architectures. It also carries the correct version numbers. +--------------------------+
Tue Mar 30 22:16:38 PST 2004
patches/packages/tcpdump-3.8.2-i486-1.tgz: Upgraded to tcpdump-3.8.2 and libpcap-0.8.2. Fixes denial-of-service security issues.
For more details, see:
http://www.rapid7.com/advisories/R7-0017.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184 (* Security fix *)
+--------------------------+

WHERE TO FIND THE NEW PACKAGES:

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/tcpdump-3.8.3-i386-1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/tcpdump-3.8.3-i386-1.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/tcpdump-3.8.3-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/tcpdump-3.8.3-i486-2.tgz

MD5 SIGNATURES:

Slackware 8.1 package:
57c3a5656b747b582cea02e19a9056ae tcpdump-3.8.3-i386-1.tgz

Slackware 9.0 package:
95d1c065e62cedb27220b11cbf372dac tcpdump-3.8.3-i386-1.tgz

Slackware 9.1 package:
a67058fc63f2911b26bf389330c635c4 tcpdump-3.8.3-i486-1.tgz

Slackware -current package:
e68de3478dfdbcac5556a7b9646f9206 tcpdump-3.8.3-i486-2.tgz

INSTALLATION INSTRUCTIONS:

Upgrade using upgradepkg (as root):
# upgradepkg tcpdump-3.8.3-i486-1.tgz

+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

[slackware-security] cvs security update (SSA:2004-108-02)

CVS is a client/server version control system. As a server, it is used to host source code repositories. As a client, it is used to access such repositories. This advisory affects both uses of CVS.

A security problem which could allow a server to create arbitrary files on a client machine, and another security problem which may allow a client to view files outside of the CVS repository have been fixed with the release of cvs-1.11.15.

Any sites running CVS should upgrade to the new CVS package.

Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Sat Apr 17 14:09:23 PDT 2004
patches/packages/cvs-1.11.15-i486-1.tgz: Upgraded to cvs-1.11.15.
Fixes two security problems (server creating arbitrary files on a client machine, and client viewing files outside of the CVS repository). For more details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0405
(* Security fix *)
+--------------------------+

WHERE TO FIND THE NEW PACKAGE:

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/cvs-1.11.15-i386-1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/cvs-1.11.15-i386-1.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/cvs-1.11.15-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/cvs-1.11.15-i486-1.tgz

MD5 SIGNATURES:

Slackware 8.1 package:
e8ba67add4c86d0bd8b7dc1ce265752a cvs-1.11.15-i386-1.tgz

Slackware 9.0 package:
177b19dd98655f6811053f29286e4ab7 cvs-1.11.15-i386-1.tgz

Slackware 9.1 package:
80a99f7f4e2606d6c45ad60614cef81b cvs-1.11.15-i486-1.tgz

Slackware -current package:
6e6cbad9deab1a53c1543c72d0acad1c cvs-1.11.15-i486-1.tgz

INSTALLATION INSTRUCTIONS:

First, shut down the cvs server if you are running one.

Then, upgrade the package:
# upgradepkg cvs-1.11.10-i486-1.tgz

Finally, restart the CVS server.

+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com