TSLSA-2006-0057 - multi
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0057
Package names: clamav, kernel, php, php4, python, xorg-x11
Summary: Multiple vulnerabilities
Date: 2006-10-18
Affected versions: Trustix Secure Linux 2.2
Trustix Secure Linux 3.0
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
clamav
Clam AntiVirus is a GPL anti-virus toolkit for UNIX. The main purpose
of this software is the integration with mail servers (attachment
scanning). The package provides a flexible and scalable multi-threaded
daemon, a command line scanner, and a tool for automatic updating via
Internet. The programs are based on a shared library distributed with
package, which you can use with your own software. Most importantly,
the virus database is kept up to date .
kernel
The kernel package contains the Linux kernel (vmlinuz), the core of
your Trustix Secure Linux operating system. The kernel handles the
basic functions of the operating system: memory allocation, process
allocation, device input and output, etc.
php
PHP is an HTML-embedded scripting language. PHP attempts to
make it easy for developers to write dynamically generated web
pages. PHP also offers built-in database integration for several
commercial and non-commercial database management systems, so
writing a database-enabled web page with PHP is fairly simple.
The most common use of PHP coding is probably as a replacement
for CGI scripts. The mod_php module enables the Apache web server
to understand and process the embedded PHP language in web pages.
php4
PHP4 is an HTML-embedded scripting language. PHP4 attempts to
make it easy for developers to write dynamically generated web
pages. PHP4 also offers built-in database integration for several
commercial and non-commercial database management systems, so
writing a database-enabled web page with PHP is fairly simple.
The most common use of PHP coding is probably as a replacement
for CGI scripts. The mod_php module enables the Apache web server
to understand and process the embedded PHP language in web pages.
python
Python is an interpreted, interactive, object-oriented programming
language often compared to Tcl, Perl, Scheme or Java. Python includes
modules, classes, exceptions, very high level dynamic data types and
dynamic typing. Python supports interfaces to many system calls and
libraries.
xorg-x11
X.org X11 is an open source implementation of the X Window System.
It provides the basic low level functionality which full fledged
graphical user interfaces (GUIs) such as GNOME and KDE are designed
upon.
Problem description:
clamav < TSL 3.0 > < TSL 2.2 >
- New Upstream.
- SECURITY Fix: Two vulnerabilities have been reported in Clam
AntiVirus, which can be exploited by malicious people to cause
a DoS (SA22370).
- Fixes an unspecified error in the CHM unpacker in chmunpack.c which
can be exploited to cause a DoS.
- Fixes an unspecified error in rebuildpe.c when rebuilding PE files
after unpacking which can be exploited to cause a heap-based buffer
overflow.
kernel < TSL 2.2 >
- SECURITY Fix: A vulnerability has been reported in Linux Kernel,
caused due to an error in the "clip_mkip()" function in the ATM
subsystem and can be exploited to cause a kernel panic.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-4997 to this issue.
kernel < TSL 3.0 >
- New upstream.
- SECURITY FIX: A vulnerability has been identified due to an error
in the ULE (Unidirectional Lightweight Encapsulation) decapsulation
code [drivers/media/dvb/dvb-core/dvb_net.c] that does not properly
handle malformed packets with a SNDU (Sub Network Data Unit) length
of 0, which could be exploited by attackers to crash a vulnerable
system, creating a denial of service condition.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-4623 to this issue.
php < TSL 3.0 > < TSL 2.2 >
- SECURITY Fix: Maksymilian Arciemowicz has reported a vulnerability
in PHP, caused due to an error within the "ini_restore()" function,
which can be exploited to reset certain options to their default
value specified in php.ini.
The Common Vulnerabilities and Exposures project has assigned the
name CVE-2006-4625 to this issue.
php4 < TSL 2.2 >
- SECURITY Fix: Maksymilian Arciemowicz has reported a vulnerability
in PHP, caused due to an error within the "ini_restore()" function,
which can be exploited to reset certain options to their default
value specified in php.ini.
The Common Vulnerabilities and Exposures project has assigned the
name CVE-2006-4625 to this issue.
python < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY FIX: Benjamin C. Wiley Sittler has reported a vulnerability
in Python caused due to incorrect handling of UTF32/UCS-4 encoded
strings within the "repr()" function. If an application uses the
"repr()" function to process attacker supplied data, this can
potentially be exploited to execute arbitrary code.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-4980 to this issue.
xorg-x11 < TSL 3.0 >
- Add patch to build against freetype 2.2.x.
- SECURITY Fix: Some vulnerabilities have been reported in libXfont,
which can be exploited by malicious, local users to gain escalated
privileges. The vulnerabilities are caused due to integer overflows
within the "scan_cid()" function when handling CMAP and CIDFont data
and the "CIDADM()" function when parsing AFM (Adobe Font Metric)
files. These can be exploited to cause buffer overflows via
specially crafted CID encoded Type1 fonts.
- Another security issues have been reported in X.Org X11, caused
due to missing checks whether the setuid() or similar calls have
succeeded. This can be exploited to perform certain actions with
root privileges if the calls fail due to e.g. resource limits.
- An integer overflow flaw in the way the X.org server processes PCF
files was discovered. This could be exploited to cause a denial of
service or potentially execute arbitrary code with root privileges
on the X.org server
The Common Vulnerabilities and Exposures project has assigned the
names CVE-2006-3740, CVE-2006-3739, CVE-2006-4447 and
CVE-2006-3467 to these issues.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2006/0057/>
MD5sums of the packages:
- --------------------------------------------------------------------------
068c6b56410cc486655ad88c301b03ce 3.0/rpms/clamav-0.88.5-1tr.i586.rpm
589e40de1fdd3b352e39dc6aadb7de45 3.0/rpms/clamav-devel-0.88.5-1tr.i586.rpm
e89fc19da0f34965aa12d4f821a34f63 3.0/rpms/kernel-2.6.17.14-1tr.i586.rpm
e489bb0bcedf98217f89374314de4ea9 3.0/rpms/kernel-doc-2.6.17.14-1tr.i586.rpm
2e0853c8d4240cbaa7b6b4d6ed9b77f7 3.0/rpms/kernel-headers-2.6.17.14-1tr.i586.rpm
c26c5874f277d68e2e78a22534432d2e 3.0/rpms/kernel-smp-2.6.17.14-1tr.i586.rpm
c74a566b3efd2a4f804e6f68711271fa
3.0/rpms/kernel-smp-headers-2.6.17.14-1tr.i586.rpm
1f481d8f87dd9bd83293eac166476a7b 3.0/rpms/kernel-source-2.6.17.14-1tr.i586.rpm
ae2070e990610e825d830f7a12c5187a 3.0/rpms/kernel-utils-2.6.17.14-1tr.i586.rpm
098cede5fa9ef74a536269b9d05b26bd 3.0/rpms/php-5.1.6-3tr.i586.rpm
b75a8e5b9fa044d7ad447e02db428a8c 3.0/rpms/php-calendar-5.1.6-3tr.i586.rpm
221d6af1df6af0e5e1ead800eff55c2e 3.0/rpms/php-cli-5.1.6-3tr.i586.rpm
a01fc039a746dd4683242682f706716a 3.0/rpms/php-curl-5.1.6-3tr.i586.rpm
b61f1011301a6e0701103e20919c6f59 3.0/rpms/php-dba-5.1.6-3tr.i586.rpm
a13985263d4300dd2aebb5d7c429c4a3 3.0/rpms/php-devel-5.1.6-3tr.i586.rpm
b9d2de1d757f78d348b50dcd92bcc06d 3.0/rpms/php-exif-5.1.6-3tr.i586.rpm
91b5f1731626cce128bf3c6e8b578e24 3.0/rpms/php-fcgi-5.1.6-3tr.i586.rpm
0c0e6148e06a576a0ddbf07233d531c2 3.0/rpms/php-gd-5.1.6-3tr.i586.rpm
1ad48e7d05bfe06ef9e9587ab750be5f 3.0/rpms/php-imap-5.1.6-3tr.i586.rpm
d0ac1ee27abd41d8eba8c58ea5482377 3.0/rpms/php-ldap-5.1.6-3tr.i586.rpm
e420c4296cc2952203b2bede00835415 3.0/rpms/php-mhash-5.1.6-3tr.i586.rpm
2037b0591cc87a9ad61cc6c5c097e25d 3.0/rpms/php-mysql-5.1.6-3tr.i586.rpm
229387a628b71e74882a77a8a50408a6 3.0/rpms/php-mysqli-5.1.6-3tr.i586.rpm
205842fe1b82aeb0d77abff65178ea98 3.0/rpms/php-pgsql-5.1.6-3tr.i586.rpm
654ea7c79733b3148a4ed3081019e5cf 3.0/rpms/php-pspell-5.1.6-3tr.i586.rpm
aa21d5b9b0aaed996c5ec49884b62b79 3.0/rpms/php-snmp-5.1.6-3tr.i586.rpm
593fedea9f4153715dd85851684d1168 3.0/rpms/php-xslt-5.1.6-3tr.i586.rpm
aeef80dd74b7d94e0af7d4f3056f210c 3.0/rpms/php-zlib-5.1.6-3tr.i586.rpm
5910c93d9fa24370ccf95812f4c7a97c 3.0/rpms/python-2.3.5-6tr.i586.rpm
0995a87fd636423657c1031658849981 3.0/rpms/python-devel-2.3.5-6tr.i586.rpm
a994362aef658ed3af1e60c0fc058d8a 3.0/rpms/python-docs-2.3.5-6tr.i586.rpm
cdd9c074a27a9346e9f7fc138e51082a 3.0/rpms/python-gdbm-2.3.5-6tr.i586.rpm
765e6ef85c647da37504f97cd9bc9c3f 3.0/rpms/python-idle-2.3.5-6tr.i586.rpm
d3f861b74f67967aad40be6af19411d7 3.0/rpms/python-modules-2.3.5-6tr.i586.rpm
7ef2e62deae525db3994f8549ec99b17 3.0/rpms/xorg-x11-6.8.2-12tr.i586.rpm
f5036bd03953842fdfb58586141de931 3.0/rpms/xorg-x11-devel-6.8.2-12tr.i586.rpm
e26db71bce0f9a759bc945d6b89414f1 3.0/rpms/xorg-x11-doc-6.8.2-12tr.i586.rpm
53fe7d3280dba8df09e974f2a7007f5e
3.0/rpms/xorg-x11-fonts-100dpi-6.8.2-12tr.i586.rpm
2f20603e45129789a19ca463b4142d64 3.0/rpms/xorg-x11-fonts-6.8.2-12tr.i586.rpm
3a0a92c24a0b5c1c5fe1a590a0efbd24
3.0/rpms/xorg-x11-fonts-75dpi-6.8.2-12tr.i586.rpm
500a6ab0c8644e6134dd39e6571b8299
3.0/rpms/xorg-x11-fonts-cid-6.8.2-12tr.i586.rpm
5c6e1febe3b55d55bc4e45a728a3f80f
3.0/rpms/xorg-x11-fonts-cyrillic-6.8.2-12tr.i586.rpm
08d4641dbad7de1a476924a15354f83d
3.0/rpms/xorg-x11-fonts-otf-6.8.2-12tr.i586.rpm
309356cd7920aec3d49357ed2cc5e226
3.0/rpms/xorg-x11-fonts-speedo-6.8.2-12tr.i586.rpm
5bc36c02e0ecdaf55111c6bef4439d09
3.0/rpms/xorg-x11-fonts-ttf-6.8.2-12tr.i586.rpm
1a3a423eb920b2c33412c12166067b78
3.0/rpms/xorg-x11-fonts-type1-6.8.2-12tr.i586.rpm
15af41e0946cbbed9830fddcad80aaa8 3.0/rpms/xorg-x11-libs-6.8.2-12tr.i586.rpm
411d23a10ca6134d32241462e8de97ae 3.0/rpms/xorg-x11-sdk-6.8.2-12tr.i586.rpm
d05b1f68e940cfa7c79fd0898603927d 2.2/rpms/clamav-0.88.5-1tr.i586.rpm
19769a8a1e84b59b2fc63d7b578916b9 2.2/rpms/clamav-devel-0.88.5-1tr.i586.rpm
33db0dff5b31d3c8790acdbdeb7d7c3a 2.2/rpms/kernel-2.4.33.3-3tr.i586.rpm
b77f2f01f1d1e033278db8babb523ac4 2.2/rpms/kernel-BOOT-2.4.33.3-3tr.i586.rpm
6b9c45217a3caa70f53a3cb6506ea3e2 2.2/rpms/kernel-doc-2.4.33.3-3tr.i586.rpm
9812c9f96d80952bca7da41f399dc208 2.2/rpms/kernel-smp-2.4.33.3-3tr.i586.rpm
a99277e62814eabd6f45ec743cee6c24 2.2/rpms/kernel-source-2.4.33.3-3tr.i586.rpm
72630ffb82c4b18384fbb27d1705c3cd 2.2/rpms/kernel-utils-2.4.33.3-3tr.i586.rpm
540d02515cb68a0339dfb9f512c92514 2.2/rpms/php-5.1.6-3tr.i586.rpm
f75c1ba56b7a7015d9435d2d7199b099 2.2/rpms/php-cli-5.1.6-3tr.i586.rpm
131043a8a367ce9884a8129bacbc0da8 2.2/rpms/php-curl-5.1.6-3tr.i586.rpm
fc094248ad6d6f5232f737ad7b179d71 2.2/rpms/php-devel-5.1.6-3tr.i586.rpm
379e788aaae006fa8b2263081099bce3 2.2/rpms/php-exif-5.1.6-3tr.i586.rpm
45f2c27bd64f2494c67bd09cda3c5f7e 2.2/rpms/php-fcgi-5.1.6-3tr.i586.rpm
a7e2b70635a71f27dd2d64bca4b3efd8 2.2/rpms/php-gd-5.1.6-3tr.i586.rpm
7d9ce66ca53c581a0b2d5a894f655ab7 2.2/rpms/php-imap-5.1.6-3tr.i586.rpm
51473909f433c3d99cc8ccecedf2fc48 2.2/rpms/php-ldap-5.1.6-3tr.i586.rpm
eddc80244b415b9613f26ee2cdfd2c41 2.2/rpms/php-mhash-5.1.6-3tr.i586.rpm
b78eca41b0db28168f17640dc235d57c 2.2/rpms/php-mysql-5.1.6-3tr.i586.rpm
b75ae56ad5854e57b1a93d05db9e09f0 2.2/rpms/php-mysqli-5.1.6-3tr.i586.rpm
de5a84343ed9c4d64056fad18cb79856 2.2/rpms/php-pgsql-5.1.6-3tr.i586.rpm
ce05ee8cc43af0090c8c35a3122eacb5 2.2/rpms/php-zlib-5.1.6-3tr.i586.rpm
6f7b4b32bd67db00801fe59414b3f548 2.2/rpms/php4-4.4.4-4tr.i586.rpm
d848a4f4cf9ce8808a150f6c3aaedb5e 2.2/rpms/php4-cli-4.4.4-4tr.i586.rpm
47372e4e557041ad2d69d4d9b4ac2fa0 2.2/rpms/php4-curl-4.4.4-4tr.i586.rpm
dd8317d691c5dbcbf1ecde69c185ab49 2.2/rpms/php4-devel-4.4.4-4tr.i586.rpm
a3124c7f698da43bc2ac71a80230a897 2.2/rpms/php4-domxml-4.4.4-4tr.i586.rpm
1c04d5b6e52743d7fb887afd439b159a 2.2/rpms/php4-exif-4.4.4-4tr.i586.rpm
683469508cf284ffc3a25bbf3f4d5bf1 2.2/rpms/php4-fcgi-4.4.4-4tr.i586.rpm
012ed7a21831442934c6190455f0e550 2.2/rpms/php4-gd-4.4.4-4tr.i586.rpm
b0f37cbeaa9c42eb9060280ee8e63481 2.2/rpms/php4-imap-4.4.4-4tr.i586.rpm
71ea59cd587397f38a4c3177ef3d7069 2.2/rpms/php4-ldap-4.4.4-4tr.i586.rpm
949c5e24210e7e88aff618f0b85cecdb 2.2/rpms/php4-mhash-4.4.4-4tr.i586.rpm
605b680196ba4b00a956064b1cb1364b 2.2/rpms/php4-mysql-4.4.4-4tr.i586.rpm
ab1dc2f77f69cb9d3c3955708984c65e 2.2/rpms/php4-pgsql-4.4.4-4tr.i586.rpm
77000b8dbd4712cec5f1ca9fd7a34b44 2.2/rpms/php4-test-4.4.4-4tr.i586.rpm
0b1998c3d8c444d6abf73f60708a9636 2.2/rpms/python-2.2.3-17tr.i586.rpm
0d19ea4f5154cad893aee698b2f43deb 2.2/rpms/python-dbm-2.2.3-17tr.i586.rpm
0eb7a049d1268ea5ad847f574473463b 2.2/rpms/python-devel-2.2.3-17tr.i586.rpm
6416f7fa76cffb71721b29780a78225a 2.2/rpms/python-docs-2.2.3-17tr.i586.rpm
81837a22ca24ec2a2cada3635b047d75 2.2/rpms/python-gdbm-2.2.3-17tr.i586.rpm
21e9612dc1f92dfdc6fc134530a3c7ba 2.2/rpms/python-modules-2.2.3-17tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFFNhbhi8CEzsK9IksRAiG1AKCa7VAipEQOfCZh37Oy5oLFW64LPQCbBN5o
2Pm73/vbA5K9tqJYKaGyfJI=
=pwQP
-----END PGP SIGNATURE-----