Re: [SECURITY] [DSA 149-1] New glibc packages fix security related problems

2002-08-18 Thread Joey Hess
Renee Landers wrote:
> But I choose to reboot since even init is linked with libc.  Obviously, 
> that's
> not always an option in a production environment.

Debian's libc6 package restarts init on upgrade (telinit u).

-- 
see shy jo



Re: [SECURITY] [DSA 149-1] New glibc packages fix security related problems

2002-08-15 Thread Phillip Hofmeister
On Thu, 15 Aug 2002 at 12:22:14PM -0400, Renee Landers wrote:
> But I choose to reboot since even init is linked with libc.  Obviously, 
> that's
> not always an option in a production environment.
I would suggest the reboot also.  I had a Debian server crash for the first time
ever (in many many years) 2 nights ago.  It may or may not have been
attributable to the lib change...

-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/ | gpg --import



Re: [SECURITY] [DSA 149-1] New glibc packages fix security related problems

2002-08-15 Thread Renee Landers

Note that the postinst script restarts a lot of those services for you, too.

The list is:

check="nis smail sendmail exim ssh netbase apache proftpd"
check="$check ssh-nonfree postfix-tls wu-ftpd boa cron postfix"
check="$check wu-ftpd-academ slapd openldapd logind wwwoffle"
check="$check lprng lpr autofs snmpd"

Unless you have DEBIAN_FRONTEND="noninteractive" in your environment,
it will prompt you as to whether or not you want it to restart the services.

But I choose to reboot since even init is linked with libc.  Obviously, that's
not always an option in a production environment.

renee

At 03:23 PM 8/14/2002 -0300, Peter Cordes wrote:

On Tue, Aug 13, 2002 at 06:28:01PM -0500, Paul Baker wrote:
>
> On Tuesday, August 13, 2002, at 03:21 AM, Martin Schulze wrote:
> >
> >-
> >--
> >Debian Security Advisory DSA 149-1
> >[EMAIL PROTECTED]
> >http://www.debian.org/security/ Martin
> >Schulze
> >August 13th, 2002
> >-
> >--
> >
> >Package: glibc
> >Vulnerability  : integer overflow
> >Problem-Type   : remote
> >Debian-specific: no
> >CVE Id : CAN-2002-0391
> >CERT advisory  : VU#192995
>
> Anyone aware of any particular daemon's that need to be restarted just
> to be safe? I'd rather not have to type in the SSL passphrase for
> apache+mod_ssl if I don't have to.

 The advisory said the overflow was "in the RPC library", so things like NFS
and NIS and stuff with origins at Sun might be using that.  Apache shouldn't
be vulnerable unless there are some modules that use RCP stuff.

--
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

"The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces!" -- Plautus, 200 BCE


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA 149-1] New glibc packages fix security related problems

2002-08-14 Thread Peter Cordes
On Tue, Aug 13, 2002 at 06:28:01PM -0500, Paul Baker wrote:
> 
> On Tuesday, August 13, 2002, at 03:21 AM, Martin Schulze wrote:
> >
> >- 
> >--
> >Debian Security Advisory DSA 149-1 
> >[EMAIL PROTECTED]
> >http://www.debian.org/security/ Martin 
> >Schulze
> >August 13th, 2002
> >- 
> >--
> >
> >Package: glibc
> >Vulnerability  : integer overflow
> >Problem-Type   : remote
> >Debian-specific: no
> >CVE Id : CAN-2002-0391
> >CERT advisory  : VU#192995
> 
> Anyone aware of any particular daemon's that need to be restarted just 
> to be safe? I'd rather not have to type in the SSL passphrase for 
> apache+mod_ssl if I don't have to.

 The advisory said the overflow was "in the RPC library", so things like NFS
and NIS and stuff with origins at Sun might be using that.  Apache shouldn't
be vulnerable unless there are some modules that use RCP stuff.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

"The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces!" -- Plautus, 200 BCE



Re: [SECURITY] [DSA 149-1] New glibc packages fix security related problems

2002-08-14 Thread Thiemo Nagel

Paul Baker wrote:


On Tuesday, August 13, 2002, at 03:21 AM, Martin Schulze wrote:



- 
-- 

Debian Security Advisory DSA 149-1 
[EMAIL PROTECTED]
http://www.debian.org/security/ Martin 
Schulze

August 13th, 2002
- 
-- 



Package: glibc
Vulnerability  : integer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id : CAN-2002-0391
CERT advisory  : VU#192995





Anyone aware of any particular daemon's that need to be restarted just 
to be safe? I'd rather not have to type in the SSL passphrase for 
apache+mod_ssl if I don't have to.


I did some ldd's and I did not find a single executable, that wasn't 
dynamically linked against libc. (At least this is my interpretation of 
ldd's output.)


Among those:

sshd
apache
mysqld
bind
postfix
syslogd
sh

I'm thinking about restarting the system.

regards,

Thiemo Nagel


$ ldd  /usr/sbin/apache
libm.so.6 => /lib/libm.so.6 (0x4001b000)
libcrypt.so.1 => /lib/libcrypt.so.1 (0x4003c000)
libdb.so.2 => /lib/libdb.so.2 (0x40069000)
libdb2.so.2 => /lib/libdb2.so.2 (0x40076000)
libexpat.so.1 => /usr/lib/libexpat.so.1 (0x400b7000)
libdl.so.2 => /lib/libdl.so.2 (0x400d8000)
libc.so.6 => /lib/libc.so.6 (0x400db000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /usr/sbin/atd
libc.so.6 => /lib/libc.so.6 (0x4001b000)
libdl.so.2 => /lib/libdl.so.2 (0x40138000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /usr/sbin/cron
libpam.so.0 => /lib/libpam.so.0 (0x4001b000)
libc.so.6 => /lib/libc.so.6 (0x40023000)
libdl.so.2 => /lib/libdl.so.2 (0x4014)
libcrypt.so.1 => /lib/libcrypt.so.1 (0x40143000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /sbin/getty
libc.so.6 => /lib/libc.so.6 (0x4001b000)
libdl.so.2 => /lib/libdl.so.2 (0x40138000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /sbin/klogd
libc.so.6 => /lib/libc.so.6 (0x4001b000)
libdl.so.2 => /lib/libdl.so.2 (0x40138000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /usr/lib/postfix/master
libpostfix-global.so.1 => /usr/lib/libpostfix-global.so.1 
(0x4001b000)

libpostfix-util.so.1 => /usr/lib/libpostfix-util.so.1 (0x40033000)
libgdbm.so.1 => /usr/lib/libgdbm.so.1 (0x40051000)
libdb3.so.3 => /usr/lib/libdb3.so.3 (0x40057000)
libnsl.so.1 => /lib/libnsl.so.1 (0x400ff000)
libresolv.so.2 => /lib/libresolv.so.2 (0x40113000)
libc.so.6 => /lib/libc.so.6 (0x40123000)
libdl.so.2 => /lib/libdl.so.2 (0x4024)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /usr/lib/postfix/pickup
libpostfix-master.so.1 => /usr/lib/libpostfix-master.so.1 
(0x4001b000)
libpostfix-global.so.1 => /usr/lib/libpostfix-global.so.1 
(0x40021000)

libpostfix-util.so.1 => /usr/lib/libpostfix-util.so.1 (0x40039000)
libgdbm.so.1 => /usr/lib/libgdbm.so.1 (0x40057000)
libdb3.so.3 => /usr/lib/libdb3.so.3 (0x4005d000)
libnsl.so.1 => /lib/libnsl.so.1 (0x40105000)
libresolv.so.2 => /lib/libresolv.so.2 (0x40119000)
libc.so.6 => /lib/libc.so.6 (0x40129000)
libdl.so.2 => /lib/libdl.so.2 (0x40246000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
[EMAIL PROTECTED]:/home/admin# ldd /usr/lib/postfix/qmgr
/lib/snoopy.so => /lib/snoopy.so (0x40015000)
libpostfix-master.so.1 => /usr/lib/libpostfix-master.so.1 
(0x4001b000)
libpostfix-global.so.1 => /usr/lib/libpostfix-global.so.1 
(0x40021000)

libpostfix-util.so.1 => /usr/lib/libpostfix-util.so.1 (0x40039000)
libgdbm.so.1 => /usr/lib/libgdbm.so.1 (0x40057000)
libdb3.so.3 => /usr/lib/libdb3.so.3 (0x4005d000)
libnsl.so.1 => /lib/libnsl.so.1 (0x40105000)
libresolv.so.2 => /lib/libresolv.so.2 (0x40119000)
libc.so.6 => /lib/libc.so.6 (0x40129000)
libdl.so.2 => /lib/libdl.so.2 (0x40246000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /usr/sbin/named
libc.so.6 => /lib/libc.so.6 (0x4001b000)
libdl.so.2 => /lib/libdl.so.2 (0x40138000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /usr/sbin/popa3d
libpam.so.0 => /lib/libpam.so.0 (0x4001b000)
libc.so.6 => /lib/libc.so.6 (0x40023000)
libdl.so.2 => /lib/libdl.so.2 (0x4014)
libcrypt.so.1 => /lib/libcrypt.so.1 (0x40143000)
/lib/ld-linux.so.2 => /lib/ld-linux.so.2 (0x4000)
$ ldd /bin/sh
libncurses.so.5 => /lib/libncurses.so.5 (0x4001b000)
libdl.so.2 => /lib/libdl.so.2 (0x40059000)
libc.so.6 => /lib/libc.so.6 (0x4005c000)
/lib/ld-linux.so.2 => /lib/ld-l

Re: [SECURITY] [DSA 149-1] New glibc packages fix security related problems

2002-08-13 Thread Paul Baker


On Tuesday, August 13, 2002, at 03:21 AM, Martin Schulze wrote:


- 
--
Debian Security Advisory DSA 149-1 
[EMAIL PROTECTED]
http://www.debian.org/security/ Martin 
Schulze

August 13th, 2002
- 
--


Package: glibc
Vulnerability  : integer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id : CAN-2002-0391
CERT advisory  : VU#192995


Anyone aware of any particular daemon's that need to be restarted just 
to be safe? I'd rather not have to type in the SSL passphrase for 
apache+mod_ssl if I don't have to.


--
Paul Baker

"They that can give up essential liberty to obtain a little temporary 
safety deserve neither liberty nor safety."

 -- Benjamin Franklin, 1759

GPG Key: http://homepage.mac.com/pauljbaker/public.asc