-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0018

Package names:     kernel, samba
Summary:           Multiple vulnerabilities
Date:              2006-04-04
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  kernel
  The kernel package contains the Linux kernel (vmlinuz), the core of your
  Trustix Secure Linux operating system.  The kernel handles the basic
  functions of the operating system:  memory allocation, process allocation,
  device input and output, etc.

  samba
  Samba provides an SMB server which can be used to provide network
  services to SMB (sometimes called "Lan Manager") clients, including
  various versions of MS Windows, OS/2, and other Linux machines. Samba
  uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI
  (Microsoft Raw NetBIOS frame) protocol.

Problem description:
  kernel < TSL 3.0 >
  - New Upstream.
  - SECURITY Fix: Marco Ivaldi has reported a weakness caused due
    to an error within the "ip_push_pending_frames()" function when
    creating a packet in reply to a received SYN/ACK packet. This
    causes RST packets to be sent with a IP ID value that is 
    incremented per packet. This can potentially be exploited to
    conduct idle scan attacks.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) 
    has assigned the name CVE-2006-1242 to this issue.

  samba < TSL 3.0 > < TSL 2.2 > < TSEL 2 > 
  - New Upstream
  - SECURITY Fix: The winbindd daemon included in previous Samba
    version writes the clear text of server's machine credentials
    to its log file at level 5. The winbindd log files are world
    readable by default and often log files are requested on open
    mailing lists as tools used to debug server misconfigurations.
    This affects servers configured to use domain or ads security
    and possibly Samba domain controllers as well (if configured
    to use winbindd).

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2006-1059 to this issue.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0018/>


MD5sums of the packages:
- --------------------------------------------------------------------------
752ec1ae9e8119c6997d2d54dd3fee68  3.0/rpms/kernel-2.6.16.1-1tr.i586.rpm
b8414417caca1f21c62593b7455aff1b  3.0/rpms/kernel-doc-2.6.16.1-1tr.i586.rpm
c4486f1de26b18545ba7b7527a3cd996  3.0/rpms/kernel-headers-2.6.16.1-1tr.i586.rpm
88cbd45e06c528a21f19664abade9c03  3.0/rpms/kernel-smp-2.6.16.1-1tr.i586.rpm
acc7696781f984cdffed3ce86f29528f  
3.0/rpms/kernel-smp-headers-2.6.16.1-1tr.i586.rpm
3eda5587148ba31f4efbd852993b5554  3.0/rpms/kernel-source-2.6.16.1-1tr.i586.rpm
5ca493aa78ba34575a95cb5258442e78  3.0/rpms/kernel-utils-2.6.16.1-1tr.i586.rpm
bc0f57c310c863b167d78d9c642132dd  3.0/rpms/samba-3.0.22-1tr.i586.rpm
67bc6324359cab44964a40f7299b94d1  3.0/rpms/samba-client-3.0.22-1tr.i586.rpm
4753cc2cdb544b93860ba25a8b99ebe9  3.0/rpms/samba-common-3.0.22-1tr.i586.rpm
ea202d9df679814e120586cb459def63  3.0/rpms/samba-devel-3.0.22-1tr.i586.rpm
a2d8900623e940ea2e536abd7b2828cf  3.0/rpms/samba-mysql-3.0.22-1tr.i586.rpm

aa1bb05ebff5c7a7c487612a6890d241  2.2/rpms/samba-3.0.22-1tr.i586.rpm
f2e7c4dae97c7885a14b8cba0955ab8f  2.2/rpms/samba-client-3.0.22-1tr.i586.rpm
677ac911124f3934d21a1df25ef55a2e  2.2/rpms/samba-common-3.0.22-1tr.i586.rpm
e725b7720fdeb8a3883c7a65e2f4f529  2.2/rpms/samba-devel-3.0.22-1tr.i586.rpm
22a29c309bc3c328bcbfd08665d1dc2c  2.2/rpms/samba-mysql-3.0.22-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEMm3Zi8CEzsK9IksRAu8jAKCFexYuvdy5i0pY7zbh+58kEd5TkACfSo6s
V+NNybSqFCzdiVEuN3MPby0=
=PO/P
-----END PGP SIGNATURE-----
_______________________________________________
tsl-announce mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-announce
_______________________________________________
tsl-discuss mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-discuss

Reply via email to