September 16, 2005

Linux Advisory Watch - September 16, 2005

Author: Benjamin D. Thomas

This week, advisories were released for apache, kdelibs, cvs, mod_ssl, tdiary,
squid, mozilla, common-lisp, turqstat, slib, umb-scheme, psmisc, gtk, file,
subversion, unzip, e2fsprogs, selinux-policy-targeted, firefox, mozilla, vte,
xdelta, tvtime, dhcp, gnupg, util-linux, mc, libwnck, pcre, exim, and squid.
The distributors include, Debian, Fedora, Gentoo, and Red Hat.Using umask

The umask can be used to control the default file permission on
newly-created files. The umask command controls the default file
and directory creation mode for newly-created files and directories.
It is recommended that you make root's umask 077, which will disable
read, write, and execute permission for other users, unless explictly
changed using chmod.

The umask command can be used to determine the default file creation
mode on your system. It is the octal complement of the desired file
mode. If files are created without any regard to their permissions
settings, a user could inadvertently give read or write permission
to someone that should not have this permission.

The umask for the creation of new executable files is calculated as
follows:

  777 Default Permissions
 -022 Subtract umask value, for example
-----
  755 Allowed Permissions

So in this example we chose 022 as our umask. This shows us that
new executables that are created are given mode 755, which means
that the owner can read, write, and execute the binary, while members
of the group to which the binary belongs, and all others, can only
read and execute it.

The umask for the creation of new text files is calculated as
follows:

 666 Default Permissions
-022 Subtract umask mask, for example
-----
 644 Allowed Permissions

This example shows us that given the default umask of 666, and
subtracting our sample umask value of 022, new text files are
created with mode 644, which states that the owner can read and
write the file, while members of the group to which the file
belongs, and everyone else can only read the new file. Typically
umask settings include 022, 027, and 077, which is the most
restrictive. Normally the umask is set in /etc/profile, so it
applies to all users on the system. The file creation mask must
be set while keeping in mind the purpose of the account.
Permissions that are too restrictive may cause users to start
sharing accounts or passwords, or otherwise compromise security.
For example, you may have a line that looks like this:

# Set the user's default umask
umask 033

Be sure to make root's umask to at least 022, which will
disable write and execute permission for other users, unless
explicitly changed using chmod(1).

READ ENTIRE ARTICLE:
http://www.linuxsecurity.com/content/view/117255/141/


  Debian: New Apache packages fix HTTP request smuggling
  8th, September, 2005
Updated package.
 
  Debian: New kdelibs packages fix backup file information leak
  8th, September, 2005
Updated package.
 
  Debian: New Apache2 packages fix several vulnerabilities
  8th, September, 2005
Updated package.
 
  Debian: New cvs packages fix insecure temporary files
  9th, September, 2005
Updated package.
 
  Debian: New mod_ssl packages fix acl restriction bypass
  12th, September, 2005
Updated package.
 
  Debian: New tdiary packages fix Cross Site Request Forgery
  12th, September, 2005
Updated package.
 
  Debian: New squid packages fix several vulnerabilities
 

13th, September, 2005

Update package.
 
  Debian: New Mozilla packages fix several vulnerabilities
  13th, September, 2005
Updated package.
 
  Debian: New common-lisp-controller packages fix arbitrary code injection
  14th, September, 2005
Updated package.
 
  Debian: New turqstat packages fix buffer overflow
  15th, September, 2005
Updated package.
 
  Debian: New centericq packages fix several vulnerabilities
  15th, September, 2005
Updated package.
 
  Fedora Core 4 Update: slib-3a1-3.fc4
  8th, September, 2005
*.scm and *.init scripts shipped with slib expect that slib is located directly in /usr/local/lib what's not true. This update fixes this problem.
 
  Fedora Core 4 Update: umb-scheme-3.2-39.fc4
  8th, September, 2005
UMB-scheme package conflicts with the SLIB package by instalation of /usr/share/info/slib.info.gz. This update fixes the issue.
 
  Fedora Core 4 Update: psmisc-21.5-5
 

8th, September, 2005

Updated package.
 
  Fedora Core 4 Update: glib2-2.6.6-1
  8th, September, 2005
GLib 2.6.6 fixes several bugs in the GOption cmdline option parser, in the GKeyFile keyfile parser, a possible deadlock with threadpools and several other bugs.
 
  Fedora Core 4 Update: gtk2-2.6.10-1
  8th, September, 2005
GTK+ 2.6.10 fixes numerous bugs in the file chooser, the icon view, and some other widgets. See the release announcements at http://www.gtk.org for more details.
 
  Fedora Core 4 Update: file-4.15-fc4.1
  9th, September, 2005
Several bug fixes and new magics.
 
  Fedora Core 4 Update: subversion-1.2.3-2.1
  9th, September, 2005
This update includes the latest stable release of Subversion, including a number of bug fixes.
 
  Fedora Core 3 Update: unzip-5.51-4.fc3
  9th, September, 2005
This update fixes TOCTOU issue in unzip.
 
  Fedora Core 4 Update: util-linux-2.12p-9.10
  9th, September, 2005
Updated package.
 
  Fedora Core 4 Update: e2fsprogs-1.38-0.FC4.1
 

9th, September, 2005

Updated package.
 
  Fedora Core 4 Update: selinux-policy-targeted-1.25.4-10.1
  9th, September, 2005
Updated package.
 
  Fedora Core 3 Update: e2fsprogs-1.38-0.FC3.1
  9th, September, 2005
Updated package.
 
  Fedora Core 4 Update: firefox-1.0.6-1.2.fc4
  10th, September, 2005
Updated package.
 
  Fedora Core 3 Update: firefox-1.0.6-1.2.fc3
  10th, September, 2005
Updated package.
 
  Fedora Core 4 Update: mozilla-1.7.10-1.5.2
  10th, September, 2005
Updated package.
 
  Fedora Core 3 Update: mozilla-1.7.10-1.3.2
  10th, September, 2005
Updated package.
 
  Fedora Core 3 Update: vte-0.11.14-3.fc3
 

12th, September, 2005

Please report regressions to GNOME Bugzilla.
 
  Fedora Core 4 Update: vte-0.11.14-3.fc4
  12th, September, 2005
Please report regressions to GNOME Bugzilla.
 
  Fedora Core 4 Update: slib-3a1-4.fc4
  12th, September, 2005
Updated package.
 
  Fedora Core 4 Update: xdelta-1.1.3-17.fc4
  12th, September, 2005
xdelta shipped with FC4 isn't compiled with large file support and uses obsolete glib-1.2 library. The libedsio symbols are missing from the installed libxdelta library. This release introduces xdelta ported to glib-2 and fixes the noted issues.
 
  Fedora Core 3 Update: xdelta-1.1.3-16.fc3
  12th, September, 2005
xdelta shipped with FC3 isn't compiled with large file support and uses obsolete glib-1.2 library. The libedsio symbols are missing from the installed libxdelta library. This release introduces xdelta ported to glib-2 and fixes the noted issues.
 
  Fedora Core 4 Update: tvtime-1.0.1-0.fc4.1
  12th, September, 2005
Updated package.
 
  Fedora Core 4 Update: evolution-data-server-1.2.3-3.fc4
  12th, September, 2005
Updated package.
 
  Fedora Core 4 Update: openssh-4.2p1-fc4.1
 

12th, September, 2005

Updated package.
 
  Fedora Core 4 Update: dhcp-3.0.2-22.FC4
  13th, September, 2005
Updated package.
 
  Fedora Core 3 Update: gnupg-1.2.7-1
  14th, September, 2005
This update upgrades GnuPG from version 1.2.6 to version 1.2.7, fixing bug #139209 (~/.gnupg not created when gpg is first run), among others.
 
  Fedora Core 4 Update: util-linux-2.12p-9.11
  14th, September, 2005
Updated package.
 
  Fedora Core 3 Update: mc-4.6.1-2.FC3
  14th, September, 2005
Updated package.
 
  Fedora Core 3 Update: util-linux-2.12a-24.5
  14th, September, 2005
Updated package.
 
  Fedora Core 4 Update: mc-4.6.1a-0.12.FC4
  14th, September, 2005
Updated package.
 
  Fedora Core 4 Update: libwnck-2.10.3-1
 

14th, September, 2005

This update upgrades libwnck to version 2.10.3 in order to work well with metacity 2.10.3. This updated package corrects the behavior of workspace switching when minized windows from a different workspace than the current workspace are activated.
 
  Gentoo: X.Org Heap overflow in pixmap allocation
  12th, September, 2005
An integer overflow in pixmap memory allocation potentially allows any X.Org user to execute arbitrary code with elevated privileges.
 
  Gentoo: Python Heap overflow in the included PCRE library
  12th, September, 2005
The "re" Python module is vulnerable to a heap overflow, possibly leading to the execution of arbitrary code.
 
  RedHat: Moderate: pcre security update
  8th, September, 2005
Updated pcre packages are now available to correct a security issue. This update has been rated as having moderate security impact by the Red Hat Security Response Team
 
  RedHat: Moderate: exim security update
  8th, September, 2005
Updated exim packages that fix a security issue in PCRE and a free space computation on large file system bug are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team.
 
  RedHat: Critical: firefox security update
  9th, September, 2005
An updated firefox package that fixes as security bug is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team.
 
  RedHat: Critical: mozilla security update
  9th, September, 2005
An updated mozilla package that fixes a security bug is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team.
 
  RedHat: Important: XFree86 security update
 

12th, September, 2005

Updated XFree86 packages that fix several integer overflows are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having important security impact by the Red Hat Security Response Team.
 
  RedHat: Important: xorg-x11 security update
  13th, September, 2005
Updated X.org packages that fix several integer overflows are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team.
 
  RedHat: Important: XFree86 security update
  15th, September, 2005
This update has been rated as having important security impact by the Red Hat Security Response Team.
 
  RedHat: Important: squid security update
  15th, September, 2005
An updated Squid package that fixes security issues is now available. This update has been rated as having important security impact by the Red Hat Security Response Team.
 
Click Here!