what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

slackware.70.december.txt

slackware.70.december.txt
Posted Dec 2, 1999

Security patches available for Slackware 7.0. Includes patch information for bind and nfs-server. Slackware 7.0 patches are here.

systems | linux, slackware
SHA-256 | 7b1d4ec9df9f4106e5632f0d35df0738efeedc8aa57b77d2a5af06b2cc7afcf5

slackware.70.december.txt

Change Mirror Download
Date: Tue, 30 Nov 1999 12:14:09 -0800 (PST)
From: David Cantrell <david@slackware.com>
To: slackware-security@slackware.com
Subject: Security Patches for Slackware 7.0 Available

There are several security updates available for Slackware 7.0. We will
always post bug fixes and security fixes to the /patches subdirectory on
the ftp site:

ftp.cdrom.com:/pub/linux/slackware-7.0/patches

The ChangeLog.txt file in that directory will show what has been patched and
why. Here is a short overview of the current patches available:



=======================
BIND-8.2.2-P5 available
=======================

CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND:

http://www.cert.org/advisories/CA-99-14-bind.html

Six vulnerabilities have been found in BIND, the popular domain name
server from the Internet Software Consortium (ISC). One of these
vulnerabilities may allow remote intruders to gain priviledged access
to name servers.

It is recommended that all systems running the BIND package that
shipped with Slackware 7.0 upgrade to this one. Here is the ChangeLog
description:

bind.tgz Upgraded to bind-8.2.2-P5. This fixes a vulnerability
in the processing of NXT records that can be used in a
DoS attack or (theoretically) be exploited to gain access
to the server. It is suggested that everyone running
bind upgrade to this package as soon as possible.



==============================
nfs-server-2.2beta47 available
==============================

It is recommended that all Slackware 7.0 systems using NFS upgrade to
nfs-server 2.2beta47 to patch a possible exploit. Here is the
ChangeLog description:

nfs-server.tgz Upgraded to nfs-server-2.2beta47, to fix a security
problem with the version that shipped with Slackware 7.0
(nfs-server-2.2beta46). By using a long pathname on a
directory NFS mounted read-write, it may be possible for
an attacker to execute arbitrary code on the server. It
is recommended that everyone running an NFS server
upgrade to this package immediately.



These packages are designed to be installed on top of an existing Slackware
7.0 installation. In the case where a package already exists (such as
bind.tgz), it is adviseable to use upgradepkg. For other fixes (such as the
nfs-server.tgz one), you can just use installpkg to install the fix.

NOTE: For packages that replace daemons on the system (such as bind), you
need to make sure that you stop the daemon before installing the package.
Otherwise the file may not be updated properly because it is in use. You
can either stop the daemon manually or go into single user mode and then
go back to multiuser mode. Example:

# telinit 1 Go into single user mode
# upgradepkg bind Perform the upgrade
# telinit 3 Go back to multiuser mode

Remember to back up configuration files before performing upgrades.

- The Slackware Linux Project
http://www.slackware.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close