[slackware-security] new samba packages (SSA:2004-207-01)
New samba packages are available for Slackware 8.1, 9.0, 9.1,
10.0 and -current to fix security issues.
More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686
Here are the details from the Slackware 10.0 ChangeLog:
+————————–+
Sun Jul 25 14:17:29 PDT 2004
patches/packages/samba-3.0.5-i486-1.tgz: Upgraded to samba-3.0.5.
This fixes a buffer overflow in SWAT and another in the code
supporting the ‘mangling method = hash’ smb.conf option (which is
not the default). For more details, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686
(* Security fix *)
+————————–+
Where to find the new packages:
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/samba-2.2.10-i386-1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/samba-2.2.10-i386-1.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/samba-2.2.10-i486-1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/samba-3.0.5-i486-1.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-3.0.5-i486-1.tgz
MD5 signatures:
Slackware 8.1 package:
03d53b165cf21bab6c0e26f98268d445 samba-2.2.10-i386-1.tgz
Slackware 9.0 package:
99cba95be5231d46327d3ca055a792db samba-2.2.10-i386-1.tgz
Slackware 9.1 package:
75e92332f92858430fbc01e0adf29c7b samba-2.2.10-i486-1.tgz
Slackware 10.0 package:
d4d00d9c748386da1dcd5ab941dbb294 samba-3.0.5-i486-1.tgz
Slackware -current package:
d4d00d9c748386da1dcd5ab941dbb294 samba-3.0.5-i486-1.tgz
Installation instructions:
As root, stop the samba server:
. /etc/rc.d/rc.samba stop
Next, upgrade the samba package(s) with upgradepkg:
upgradepkg samba-3.0.5-i486-1.tgz
Finally, start samba again:
. /etc/rc.d/rc.samba start
+—–+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
[slackware-security] new mod_ssl packages (SSA:2004-207-02)
New mod_ssl packages are available for Slackware 8.1, 9.0, 9.1,
10.0 and -current to fix a security issue. A format string
vulnerability in mod_proxy hook functions could allow an attacker
to run code as the mod_ssl user. Sites using mod_ssl should upgrade
(be sure to back up your existing key files first).
Here are the details from the Slackware 10.0 ChangeLog:
+————————–+
Sun Jul 25 14:17:29 PDT 2004
patches/packages/mod_ssl-2.8.19_1.3.31-i486-1.tgz:
Upgraded to mod_ssl-2.8.19-1.3.31.
This fixes a security hole (ssl_log() related format string
vulnerability in mod_proxy hook functions), so sites using mod_ssl
should upgrade to the new version. Be sure to back up your existing
key files first.
(* Security fix *)
+————————–+
Where to find the new packages:
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/mod_ssl-2.8.19_1.3.31-i386-1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/mod_ssl-2.8.19_1.3.31-i386-1.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/mod_ssl-2.8.19_1.3.31-i486-1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/mod_ssl-2.8.19_1.3.31-i486-1.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/mod_ssl-2.8.19_1.3.31-i486-1.tgz
MD5 signatures:
Slackware 8.1 package:
363f86afca6946e4840d7e2ed5efcc96
mod_ssl-2.8.19_1.3.31-i386-1.tgz
Slackware 9.0 package:
d213da77d2f8822206b76cf9c6c81067
mod_ssl-2.8.19_1.3.31-i386-1.tgz
Slackware 9.1 package:
d304dc1cf684e60c3611c998ac055986
mod_ssl-2.8.19_1.3.31-i486-1.tgz
Slackware 10.0 package:
efb6b8193b4c6189c9ae5fe2035526da
mod_ssl-2.8.19_1.3.31-i486-1.tgz
Slackware -current package:
efb6b8193b4c6189c9ae5fe2035526da
mod_ssl-2.8.19_1.3.31-i486-1.tgz
Installation instructions:
First, stop apache:
# apachectl stop
IMPORTANT: Backup any keys/certificates you wish to save for
mod_ssl (in /etc/apache/ssl.*)
Next, upgrade these packages as root:
# upgradepkg mod_ssl-2.8.19_1.3.31-i486-1.tgz
If necessary, restore any mod_ssl config files.
Finally, restart apache:
# apachectl startssl
+—–+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com