TSLSA-2005-0047 - multi
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2005-0047
Package names: apache, openssh, squid
Summary: Multiple vulnerabilities
Date: 2005-09-09
Affected versions: Trustix Secure Linux 2.2
Trustix Secure Linux 3.0
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
apache
Apache is a full featured web server that is freely available, and also
happens to be the most widely used.
openssh
Ssh (Secure Shell) a program for logging into a remote machine and for
executing commands in a remote machine. It is intended to replace
rlogin and rsh, and provide secure encrypted communications between
two untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.
squid
Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single, non-blocking,
I/O-driven process. Squid keeps meta data and especially hot objects
cached in RAM, caches DNS lookups, supports non-blocking DNS lookups,
and implements negative caching of failed requests.
Problem description:
apache < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: ssl_engine_kernel.c in mod_ssl before 2.8.24, when using
"SSLVerifyClient optional" in the global virtual host configuration,
does not properly enforce "SSLVerifyClient require" in a per-location
context, which allows remote attackers to bypass intended access
restrictions.
- The byte-range filter in Apache 2.0 allows remote attackers to cause a
denial of service (memory consumption) via an HTTP header with a large
Range field.
The Common Vulnerabilities and Exposures project has assigned the
name CAN-2005-2700 and CAN-2005-2728 to this issue.
openssh < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- New Upstream
- SECURITY Fix: An error in handling dynamic port forwardings when no
listen address is specified, can cause "GatewayPorts" to be incorrectly
activated.
- An error in handling GSSAPI credential delegation can allow a user, who
did not login using GSSAPI authentication, to be delegated with GSSAPI
credentials.
The Common Vulnerabilities and Exposures project has assigned the
name CAN-2005-2798 to this issue.
squid < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Fixed DOS Vulnerability, Alex Masterov has reported a
vulnerability in Squid, which potentially can be exploited by malicious
people to cause a DoS (Denial of Service). The vulnerability is caused
due to an unspecified error in the "sslConnectTimeout()" function after
handling malformed requests.
- Fixed Squid crashes with the assertion failure in certain conditions
involving aborted requests.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2005/0047/>
MD5sums of the packages:
- --------------------------------------------------------------------------
3df22878f67bad946897344b3733cd39 3.0/rpms/apache-2.0.54-14tr.i586.rpm
18b39fa927f776f34cbce64411e1d94e 3.0/rpms/apache-dbm-2.0.54-14tr.i586.rpm
9af67af95df91f4d9012f317cbf07299 3.0/rpms/apache-devel-2.0.54-14tr.i586.rpm
5b8737e520cef12efecaf965ec2f718e 3.0/rpms/apache-html-2.0.54-14tr.i586.rpm
003cddf5179e10784dc27297f4868b5f 3.0/rpms/apache-manual-2.0.54-14tr.i586.rpm
a2e6a7f9791e7785475b9df5fb01cb0b 3.0/rpms/apache-suexec-2.0.54-14tr.i586.rpm
44220702fc00a30241d37961c0715234 3.0/rpms/openssh-4.2p1-1tr.i586.rpm
72620dff92855350cd1af66464843e39 3.0/rpms/openssh-clients-4.2p1-1tr.i586.rpm
75bfd330db73e9d26151ffd33953bb57 3.0/rpms/openssh-server-4.2p1-1tr.i586.rpm
a1219eb8320809024dd0a740213f24ca
3.0/rpms/openssh-server-config-4.2p1-1tr.i586.rpm
5806dc198b52d7354eee86537848b521 3.0/rpms/squid-2.5.STABLE10-5tr.i586.rpm
07781d51b3258b34ef45db67ac20b020 2.2/rpms/apache-2.0.54-8tr.i586.rpm
cadeb60f7a52640024eef2b1bc1560dd 2.2/rpms/apache-dbm-2.0.54-8tr.i586.rpm
b25261c87cd62d86a5fca8277be486f3 2.2/rpms/apache-devel-2.0.54-8tr.i586.rpm
6c7f8d433abdd279969a476576adf578 2.2/rpms/apache-html-2.0.54-8tr.i586.rpm
5e453ada97b5f5badd584c1deb8130e6 2.2/rpms/apache-manual-2.0.54-8tr.i586.rpm
3b980515b3a00f417195d2e513bf7e51 2.2/rpms/apache-suexec-2.0.54-8tr.i586.rpm
29922c6314c3b53abaf60f085f5d4f37 2.2/rpms/openssh-4.2p1-1tr.i586.rpm
828dd5e0018248a51c9678877f465d0c 2.2/rpms/openssh-clients-4.2p1-1tr.i586.rpm
ae0c4ad993e9635006dec7fb0a19b2ed 2.2/rpms/openssh-server-4.2p1-1tr.i586.rpm
e4d7b7d24bcfedaa4e018cd0b2b6b7c4
2.2/rpms/openssh-server-config-4.2p1-1tr.i586.rpm
79333b68b2dd477cc2b4009fe8de784b 2.2/rpms/squid-2.5.STABLE10-3tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDIWQoi8CEzsK9IksRAmoJAKCzb57JC/yUISs8/+QZHq1lXuJUGQCgjFse
W0v/I01lFWCAtoVIpYz1J/w=
=i+se
-----END PGP SIGNATURE-----