---

Slackware Linux Advisories: libtiff, apache+mod_ssl

[slackware-security] libtiff (SSA:2004-305-02)

New libtiff packages are available for Slackware 8.1, 9.0, 9.1,
10.1, and -current to fix security issues that could lead to
application crashes, or possibly execution of arbitrary code.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886

Here are the details from the Slackware 10.0 ChangeLog:
+————————–+
patches/packages/libtiff-3.7.0-i486-1.tgz: Upgraded to
libtiff-3.7.0. This fixes several bugs that could lead to crashes,
or could possibly allow arbitrary code to be executed. For more
details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886

(* Security fix *)
+————————–+

Where to find the new packages:

Updated package for Slackware 8.1:

ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/libtiff-3.5.7-i386-3.tgz

Updated package for Slackware 9.0:

ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/libtiff-3.5.7-i386-4.tgz

Updated package for Slackware 9.1:

ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/libtiff-3.5.7-i486-4.tgz

Updated package for Slackware 10.0:

ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/libtiff-3.7.0-i486-1.tgz

Updated package for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/libtiff-3.7.0-i486-1.tgz

MD5 signatures:

Slackware 8.1 package:
13c265d491293ab098ff32f204813ba6 libtiff-3.5.7-i386-3.tgz

Slackware 9.0 package:
04256c3f750ef84e620ef5ac96a3d5ff libtiff-3.5.7-i386-4.tgz

Slackware 9.1 package:
0c767736c44faa6c4e57dbe18b03046e libtiff-3.5.7-i486-4.tgz

Slackware 10.0 package:
44da0e434b86e744e8845b845705e1b7 libtiff-3.7.0-i486-1.tgz

Slackware -current package:
f02243e50f71fccb1b4ec9827e326056 libtiff-3.7.0-i486-1.tgz

Installation instructions:

Upgrade the package as root:
# upgradepkg libtiff-3.7.0-i486-1.tgz

+—–+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

[slackware-security] apache+mod_ssl (SSA:2004-305-01)

New apache packages are available for Slackware 8.1, 9.0, 9.1,
10.0, and -current to fix a security issue. Apache has been
upgraded to version 1.3.33 which fixes a buffer overflow which may
allow local users to execute arbitrary code as the apache user.

The mod_ssl package has also been upgraded to version
2.8.22_1.3.33.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940

Here are the details from the Slackware 10.0 ChangeLog:
+————————–+
patches/packages/apache-1.3.33-i486-1.tgz: Upgraded to
apache-1.3.33.
This fixes one new security issue (the first issue, CAN-2004-0492,
was fixed in apache-1.3.33). The second bug fixed in 1.3.3
(CAN-2004-0940) allows a local user who can create SSI documents to
become “nobody”. The amount of mischief they could cause as nobody
seems low at first glance, but it might allow them to use kill or
killall as nobody to try to create a DoS. Mention PHP’s mhash
dependency in httpd.conf (thanks to Jakub Jankowski).
(* Security fix *)
patches/packages/mod_ssl-2.8.22_1.3.33-i486-1.tgz: Upgraded to
mod_ssl-2.8.22_1.3.33.
+————————–+

Where to find the new packages:

Updated packages for Slackware 8.1:

ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/apache-1.3.33-i386-1.tgz


ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/mod_ssl-2.8.22_1.3.33-i386-1.tgz

Updated packages for Slackware 9.0:

ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/apache-1.3.33-i386-1.tgz


ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/mod_ssl-2.8.22_1.3.33-i386-1.tgz

Updated packages for Slackware 9.1:

ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/apache-1.3.33-i486-1.tgz


ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/mod_ssl-2.8.22_1.3.33-i486-1.tgz

Updated packages for Slackware 10.0:

ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/apache-1.3.33-i486-1.tgz


ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/mod_ssl-2.8.22_1.3.33-i486-1.tgz

Updated packages for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/apache-1.3.33-i486-1.tgz


ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/mod_ssl-2.8.22_1.3.33-i486-1.tgz

MD5 signatures:

Slackware 8.1 packages:
53a9c132945eb4335aacfcb21d5996e0 apache-1.3.33-i386-1.tgz
b0a95e205d3e88597aa9f1241ca7354f
mod_ssl-2.8.22_1.3.33-i386-1.tgz

Slackware 9.0 packages:
429df7fa01205e5c12d3728f4987609f apache-1.3.33-i386-1.tgz
af8345a9edf17dbd4e141b46d908990a
mod_ssl-2.8.22_1.3.33-i386-1.tgz

Slackware 9.1 packages:
adb43447a8abcb7a6100343585d762db apache-1.3.33-i486-1.tgz
00c1338c5c6db89960eb53ac4495ba41
mod_ssl-2.8.22_1.3.33-i486-1.tgz

Slackware 10.0 packages:
22db37b8d3e7a32b75a274520e11e272 apache-1.3.33-i486-1.tgz
1968e2361039e07f69658665dafcf56a
mod_ssl-2.8.22_1.3.33-i486-1.tgz

Slackware -current packages:
c450863cad0ed3771fea628d506b8caf apache-1.3.33-i486-1.tgz
44fdebabf6130cd2fc4e048f5d619683
mod_ssl-2.8.22_1.3.33-i486-1.tgz

Installation instructions:

First, stop apache:

# apachectl stop

Next, upgrade the Apache package as root:

# upgradepkg apache-1.3.33-i486-1.tgz

For mod_ssl users, IMPORTANT: Backup any keys/certificates you
wish to save for mod_ssl (in /etc/apache/ssl.*), then upgrade
mod_ssl:

# upgradepkg mod_ssl-2.8.22_1.3.33-i486-1.tgz

If necessary, restore any mod_ssl config files.

Finally, restart apache:

# apachectl start

Or, if you’re running a secure server with mod_ssl:

# apachectl startssl

+—–+

Slackware Linux Security Team
security@slackware.com
Slackware Packages and Security Alerts are always signed with this
GPG key:
http://slackware.com/gpg-key

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis