Re: Linux /usr/bin/gnuplot overflow

From: Marc Heuse (marcat_private)
Date: Sat Mar 06 1999 - 06:23:23 PST

  • Next message: Detlef Hühnlein: "Call for Papers: CQRE"

    Hi,
    
    I apology that SuSE isn't currently fast with it's security fixes :-(
    We've got a heavy work load currently, suse 6.1 is being build, cebit fair
    is coming, holiday of some important guys, and our 2nd security guy will
    begin his work in april. additionally we are currently redesigning our
    security fix process to make it fast and reliable. But we are no magicians
    :-((
    
    below are responses to several comments people made:
    
    > I strongly second this recommendment. I'll mail S.u.S.E. about it, if
    > no-one else does (but then, they're bound to have someone reading bugtraq,
    > right?).
    
    of course ;-)
    
    >Not necessarily. SuSE has still not fixed the lsof buffer overflow either,
    >even though lsof is setgid kmem and /dev/kmem is group writable (!)
    >I mailed them earlier this week and got as response that they have a new
    >lsof which unfortunately would require kernel 2.2. As quick fix they suggested
    >removing the group write permissions from /dev/kmem....
    
    right, this is our current problem. However, this not a solution because an
    attacker can still read from kmem (sniff passwords etc.).
    our paket maintainer in also on holiday that adds to our current trouble,
    not to mention we are currently under heavy activity to release SuSE 6.1.
    
    However I'll try to make a fix available for lsof monday->wednesday.
    
    >If you use SuSE and you care a _lot_ about local security you must edit
    >/etc/rc.config and set PERMISSION_SECURITY="paranoid". That way gnuplot
    >would _not_ be suidroot. See the contents of /etc/permissions.paranoid:
    > [...]
    
    Well, maybe this is the point to talk about seom stuff we are currently
    developing:
    
    1) an (inofficial) SuSE harding script which reconfigures your system after
    answering nine questions
    2) OpenBSD like /etc/security checks which run on a regular basis
    3) two mailing lists:
     suse-securityat_private		 for public discussions and our announcements
     suse-security-announceat_private only for your announcements
     note that you can already subscribe to suse-security, suse-security-announce
     will be set up this week. Both lists will be activated mid march, please be
     patient, we've got a very heavy load currently :-(
    4) automatic announcements ;-) this is currently under development.
    
    I'll email betas of 1) and 2) on our public security mailinglist so people
    can comment and discuss about enhancements.
    
    >I just tried once to fix the disinformation on the list about SuSE
    >xtvscreen suidroot but Aleph One didn't accepted my email. I don't know
    >why Aleph One didn't accepted my first email. Aleph?
    
    xtvscreen is fixed, updated to the newest version and we did put some more
    security checks in. it should be available monday->wednesday on our ftp
    servers
    
    >OTOH, no-one with any kind of security concern on their mind would install
    >SVGAlib, in its current state, would they?
    
    well, I think even a home-end-user might be interesting in a security fix ;-)
    
    
    Greets,
    	Marc
    --
      Marc Heuse, S.u.S.E. GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
      E@mail: marcat_private      Function: Security Support & Auditing
      issue a  "finger marcat_private | pgp -fka" for my public pgp key
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:38:11 PDT