-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0051

Package names:     bind, kernel, openssl
Summary:           Multiple vulnerabilities
Date:              2006-09-15
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  bind
  BIND (Berkeley Internet Name Domain) is an implementation of the DNS
  (Domain Name System) protocols. BIND includes a DNS server (named),
  which resolves host names to IP addresses, and a resolver library
  (routines for applications to use when interfacing with DNS). A DNS
  server allows clients to name resources or objects and share the
  information with other network machines. The named DNS server can be
  used on workstations as a caching name server, but is generally only
  needed on one machine for an entire network.

  kernel
  The kernel package contains the Linux kernel (vmlinuz), the core of 
  your Trustix Secure Linux operating system. The kernel handles the
  basic functions of the operating system: memory allocation, process
  allocation, device input and output, etc.

  openssl
  A C library that provides various crytographic algorithms and 
  protocols including DES, RC4, RSA, and SSL. Includes shared libraries.

Problem description:
  bind < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - New Upstream.
  - SECURITY Fix: Some vulnerabilities have been reported in BIND,
    which can be exploited by malicious people to cause a DoS.
  - Fix an assertion error within the processing of SIG queries that
    can be exploited to crash either a recursive server when more than
    one SIG(covered) Resource Record set (RRset) is returned or an
    authoritative server serving a RFC 2535 DNSSEC zone where there
    are multiple SIG(covered) RRsets.
  - Fix an error within the handling of multiple recursive queries that
    can be exploited to trigger an INSIST failure by causing the response
    to the query to arrive after all clients looking for the response 
    have left the recursion queue.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2006-4095 and CVE-2006-4096 to these issues.

  kernel < TSL 2.2 >
  - New Upstream.
  - SECURITY Fix: Fix possible UDF deadlock and memory corruption.
  - McAfee Avert Labs has reported a vulnerability in the Linux Kernel,
    which can be exploited by malicious, local users to gain escalated
    privileges. The vulnerability is caused due to an error in the SCTP
    module within the "sctp_make_abort_user()" function and can be 
    exploited to execute arbitrary code with escalated privileges.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2006-4145 and CVE-2006-3745 to these
    issues.
  - Also includes fixes for CVE-2006-0039, CVE-2006-1857, CVE-2006-1858,
    CVE-2006-1864, CVE-2006-2271, CVE-2006-2272, CVE-2006-1525,
    CVE-2006-2274, CVE-2006-1524, CVE-2005-3180, CVE-2005-2709,
    CVE-2005-2708, CVE-2005-2490, CVE-2006-1528 and CVE-2006-4093.

  openssl < TSL 3.0 > < TSL 2.2 > < TSEL 2 > 
  - New Upstream.
  - SECURITY FIX: A vulnerability has been identified which could be
    exploited by attackers to bypass security restrictions. This flaw is
    due to an error when handling and verifying RSA keys with exponent 3,
    which could be exploited by attackers to forge PKCS #1 v1.5 
    signatures and bypass security verifications.
                                                                                
                                           
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-4339.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0051/>


MD5sums of the packages:
- --------------------------------------------------------------------------
8a2c2f1f1da74781b4ecc088ccc76c62  3.0/rpms/bind-9.3.2-4tr.i586.rpm
ac17273772c921b947efaa4bbf045828  3.0/rpms/bind-devel-9.3.2-4tr.i586.rpm
5d0f66272575fcd9d4b4ac8696edfd2e  3.0/rpms/bind-libs-9.3.2-4tr.i586.rpm
4dc5e7726e88ee9071861eb35a14e44c  3.0/rpms/bind-light-9.3.2-4tr.i586.rpm
8a014940633e0a29375c62c3708a4e63  3.0/rpms/bind-light-devel-9.3.2-4tr.i586.rpm
d4da9d9e490b24e847434b47238107dd  3.0/rpms/bind-utils-9.3.2-4tr.i586.rpm
9c69891182a0c1c60870e89b41642f62  3.0/rpms/openssl-0.9.7k-1tr.i586.rpm
f5b5390d931bc5ebd9c4e0d8aadd9286  3.0/rpms/openssl-devel-0.9.7k-1tr.i586.rpm
deb2d3a044994706727989f07f84e70a  3.0/rpms/openssl-support-0.9.7k-1tr.i586.rpm

edcfc0e0b33e584772b3ab38c2ecc120  2.2/rpms/bind-9.3.2-4tr.i586.rpm
7c10280e5e0e85decd471c740651fcf7  2.2/rpms/bind-devel-9.3.2-4tr.i586.rpm
0b31ab1242338a21373a5b5677b38d15  2.2/rpms/bind-libs-9.3.2-4tr.i586.rpm
8715527a40ead4ce8e279ea85e96945b  2.2/rpms/bind-light-9.3.2-4tr.i586.rpm
a6e53d9494c395aa0b9964e91504063f  2.2/rpms/bind-light-devel-9.3.2-4tr.i586.rpm
fc9730b297ec56db37babc9d69f0777f  2.2/rpms/bind-utils-9.3.2-4tr.i586.rpm
2cb53a6092ab2de443576fc493c7c61f  2.2/rpms/kernel-2.4.33.3-1tr.i586.rpm
99ebf5b654d17918297f3ade9a188797  2.2/rpms/kernel-BOOT-2.4.33.3-1tr.i586.rpm
9d2325bf115bc51b97f3a1b7858950cd  2.2/rpms/kernel-doc-2.4.33.3-1tr.i586.rpm
22425048536337cfa6a78b50bc50b227  2.2/rpms/kernel-smp-2.4.33.3-1tr.i586.rpm
13aa3038815b939c4385c48738027097  2.2/rpms/kernel-source-2.4.33.3-1tr.i586.rpm
969b1acbb169f601348b429a1cd65d4b  2.2/rpms/kernel-utils-2.4.33.3-1tr.i586.rpm
d45c46c044c54a836b0a3e8b0ea61bd8  2.2/rpms/openssl-0.9.7e-7tr.i586.rpm
3d60834f48d77853e81606d2bcfbda81  2.2/rpms/openssl-devel-0.9.7e-7tr.i586.rpm
2bc39b5e84a862657dd28999fdddf43c  2.2/rpms/openssl-python-0.9.7e-7tr.i586.rpm
be83cfcd1ceae92288cbaf3d510a0482  2.2/rpms/openssl-support-0.9.7e-7tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFFCrAZi8CEzsK9IksRAvIoAKCjFeJ+3aT++bYdEiclBP9//+xnrwCgm4XM
awIqUWa4H4yxfCDNoVpW2ms=
=Fq5S
-----END PGP SIGNATURE-----
_______________________________________________
tsl-announce mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-announce
_______________________________________________
tsl-discuss mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-discuss

Reply via email to