|
Homepage de Owl
Autres langages :
Concepts
Téléchargement (HTTP, FTP, rsync, anoncvs,
CVSweb)
Change logs (en anglais seulement): |
This file lists the major changes made between Owl releases. While
some of the changes listed here may also be made to a stable branch,
the complete lists of stable branch changes are included with those
branches and as errata for the corresponding Owl releases only.
This is very far from an exhaustive list of changes. Small changes to individual packages won't be mentioned here unless they fix a security or a critical reliability problem. They are, however, mentioned in change logs for the packages themselves.
Changes made between Owl 0.1-prerelease and Owl 1.0.
2002/10/14 Owl/doc/fr/* Updated French translations.
2002/10/13 Package: postfix RELIABILITY FIX: Use fcntl(2) locking, not flock(2).
2002/10/12 Package: slang Updated to 1.4.6. Reviewed all of the library code for environment variable uses and restricted those which would be unsafe in SUID/SGID programs (although such uses of slang are strongly discouraged).
2002/09/20 - 2002/10/07 Owl/doc/ru/* New files: Russian translations of the documentation, by Gremlin from Kremlin.
2002/10/05 Package: newt Dropped newt from Owl, it's a Red Hat'ism that we never made use of.
2002/10/04 Package: owl-setup Support for LILO boot loader configuration.
2002/10/01 Package: glibc SECURITY FIX Severity: none to low, remote, passive to active Avoid read buffer overruns in glibc itself and applications that naively assume the length returned by res_* is always less than or equal to the answer buffer size (CERT VU#738331, CVE CAN-2002-1146), by truncating the answer in res_send(3); the patch is by Olaf Kirch of SuSE. Avoid some potential reads beyond end of undersized DNS responses; pointed out by Dmitry V. Levin of ALT Linux.
2002/09/28 Package: tar SECURITY FIX Severity: high, local to remote, passive to active
Fixed two security and one reliability bug, all introduced into GNU
tar with 1.13.19. The contains_dot_dot() bug discovered by 3APA3A and
further analyzed by Mark J Cox of Red Hat and Bencsath Boldizsar
resulted in tar following ".." references to outside the intended
directory tree when extracting archives. Another bug effectively
disabled the symlink safety introduced in 1.13.18 that was meant to
avoid the problem described by Willy TARREAU where tar could be made
to follow a symlink it just extracted and also place a file outside of
the intended directory tree. Finally, there was a hard link storage
bug discovered by Jose Pedro Oliveira. Although the two security bugs
are now fixed, please keep in mind that tar has traditionally been
intended for making and extracting tape backups rather than archives
obtained from untrusted sources. Be very careful with what input you
pass it and what user you run it as.
References:
2002/09/19 - 2002/09/28 Package: xinetd Updated to 2.3.8 with a new set of minor fixes and then to 2.3.9.
2002/09/17 kernel Updated to 2.2.22-ow1.
2002/09/10 kernel SECURITY FIX Severity: high, local, active Updated to Linux 2.2.21-ow2 which includes many security fixes for issues with the Linux kernel discovered during code reviews by Silvio Cesare, Solar Designer, and others.
2002/09/09 Package: owl-setup Support for keyboard layout configuration, thanks to Matthias Schmidt.
2002/08/19 - 2002/08/27 Packages: acct, autoconf, automake, bc, binutils, bison, cpio, diffutils, e2fsprogs, ed, fileutils, findutils, flex, gawk, gcc, gdb, gdbm, glibc, gnupg, gpm, grep, gzip, libtermcap, libtool, m4, make, readline, screen, sed, tar, texinfo, time Adjusted Texinfo directory entries such that the menu looks pretty.
2002/08/22 Packages: owl-cdrom, owl-startup Added a "welcome" script to introduce the user to directory locations on the CDs.
2002/08/22 Packages: SimplePAMApps, pam Patched pam_motd to behave on errors and configured it for login(1).
2002/08/13 Package: procmail Updated to 3.15.2 adding temporary file handling fixes to scripts used during the builds.
2002/07/30 - 2002/08/12 Package: openssl SECURITY FIX Severity: high, remote, passive to active Applied the official security patches against 0.9.6d and then did a series of package updates to ensure Owl always contains the fixes for the currently publicly-known vulnerabilities, ending up with 0.9.6g. Please refer to the package change log for the intermediate steps that occurred during this update process. The vulnerabilities have been discovered by Ben Laurie and others of A.L. Digital Ltd and The Bunker under DARPA's CHATS program, by consultants at Neohapsis, and by Adi Stav and James Yonan. The patches have been prepared by Ben Laurie and Dr. Stephen Henson, with one of the fixes partly based on a version by Adi Stav. The vulnerabilities affect applications that use OpenSSL to provide SSL or TLS or use OpenSSL's ASN.1 parsing code on untrusted input. It hasn't been fully researched whether OpenSSH is affected, but the ASN.1 parsing vulnerability may affect OpenSSH's implementation of SSH protocol 2 in both the server and the client. As Owl currently only includes SSL clients (lftp and links), only passive attacks are possible via the SSL/TLS vulnerabilities on default installs. If, however, any SSL server software that uses OpenSSL is added, active attacks will likely become possible as well.
2002/08/04 - 2002/08/12 Packages: fileutils, sh-utils, textutils; Owl/build/installorder.conf Updated fileutils to 4.1.11 with a number of additional patches.
2002/08/11 Package: perl SECURITY FIX Severity: none to high, remote, active Back-ported bound checking fixes for File::Glob from Perl 5.8.0. Thanks to Pavel Kankovsky for the report and to Michael Tokarev for discussing other possible approaches to fixing this. Without these fixes, it was possible that certain otherwise correct Perl scripts would expose the lack of bound checking in the Perl module code to be exploited via user input to those scripts, which, depending on the nature of such scripts, may be coming from a remote system.
2002/08/11 Package: xinetd Updated to 2.3.6 adding fixes or workarounds for issues introduced after 2.3.3 including the signal pipe leak into child processes (a security hole with 2.3.4+ which never got into Owl).
2002/08/04 Package: glibc Made the FreeSec code (that supports the extended BSDI-style DES-based password hashes) reentrant, adjusted crypt*(3) wrappers and the manual page accordingly. This means that you no longer have to use the plain_crypt option with pam_tcb(8) when support for these password hashes is desired.
2002/08/01 Package: glibc SECURITY FIX Severity: low to high, remote, passive to active Patched two potential integer overflows (and thus buffer overflows) in calloc(3) and Sun RPC xdr_array(3) code (the latter discovered by ISS X-Force). The calloc(3) integer overflow possibility is currently not known to allow for an attack on a particular application, but has been patched as a proactive measure. The Sun RPC xdr_array(3) overflow may allow for passive attacks on mount(8) by malicious or spoofed NFSv3 servers as well as for both passive and active attacks on RPC clients or services that one might install on Owl.
2002/07/30 Package: man-pages Updated to 1.52 with additional corrections.
2002/07/28 Package: mtree Updated to version from current OpenBSD (post-3.1) which is able to encode special characters in filenames.
2002/07/21 - 2002/07/28 Packages: pam_passwdqc, pam Imported the pam_passwdqc(8) manual page back from FreeBSD with minor corrections to it and the README, also moving the pam.d and pam.conf pages to section 5 where they belong.
2002/07/23 Package: gawk Moved profiling gawk (pgawk) into separate subpackage (gawk-profile), not built or installed by default. The PostScript documentation is now installed compressed.
2002/07/14 - 2002/07/18 Package: perl SECURITY FIX Severity: low, local, passive Added File::Temp module to the package and corrected unsafe temporary file handling in the Configure script, perldoc(1) (patch from ALT Linux), perlbug(1), perlcc(1) (by updating to the version from Perl 5.6.1 which actually works), s2p(1), c2ph(1), dotsh.pl, perl5db.pl, and ExtUtils/inst (also making it work with GNU tar). Applied many fixes to documentation and code comments to not suggest bad practices on the use of temporary files. perlbug(1) will now default to using vitmp(1). Corrected the generation of *.ph files and re-considered which C header files to process during package build by default. The package will now try to no longer include information specific to the build system's last kernel compile.
2002/07/15 Package: gawk Updated to 3.1.1 and switched to using Paul Eggert's patch to igawk which makes it not use temporary files at all.
2002/07/13 Package: texinfo Updated to 4.2 with an additional temporary file handling fix to texi2dvi.
2002/06/27 - 2002/07/07 Package: openssh SECURITY FIX Severity: none to high, remote, active Updated to 3.4p1 with a lot of additional modifications to restore most of the functionality lost or broken with the recent rushed update to 3.3p1 and to be safer. Please refer to change log for the package for details. OpenSSH 3.4p1 fixes the lack of bound checking resulting in an integer and buffer overflow with the PAMAuthenticationViaKbdInt code (and thus potentially allowing for a remote server compromise). On Owl, PAMAuthenticationViaKbdInt has always defaulted to no and is in fact not supported by our PAM configuration file for OpenSSH. A comment in /etc/ssh/sshd_config incorrectly seemed to imply that PAMAuthenticationViaKbdInt defaulted to yes, which was never the case. That comment has since been corrected.
2002/07/06 Package: pam pam_limits will now support stacking for account management (as well as for session setup), be fail-close on configuration file reads, and report the "too many logins" via PAM conversation rather than direct printf(3). The first change is needed for the new OpenSSH package.
2002/07/04 - 2002/07/05 Package: glibc SECURITY FIX Severity: none to high, remote, passive Back-ported the fix to a buffer overflow affecting network lookups with getnetby{addr,name}{,_r}(3) family of functions when "dns" is listed on "networks" line in /etc/nsswitch.conf (which is not the default). Added the patch by NISHIMURA Daisuke and Tomohiro 'Tomo-p' KATO of Vine Linux to fix the DNS resolver buffer overflows affecting both host and network lookups in the compatibility code that is used by binaries built against glibc 2.0 (there are no such binaries in Owl itself). Improved the code used to produce unpredictable DNS query IDs to make it generate different sequences of IDs in forked processes (problem noted by Jarno Huuskonen), conserve the kernel's randomness pool (based on feedback from Michael Tokarev), and properly reseed when chrooted.
2002/06/23 - 2002/06/25 Packages: openssh, owl-etc Updated OpenSSH to 3.3p1 with privilege separation enabled by default and a patch to make it work on Linux 2.2 (as well as 2.4).
2002/06/21 - 2002/06/22 Owl/build/buildworld.{sh,conf}, Owl/build/Makefile, Owl/doc/BUILD SRPMs are no longer built by default, the old behavior may be restored by setting BUILDSOURCE=yes in buildworld.conf. Owl does not use SRPMs for anything. The build environment now looks for binary packages to determine which sources and foreign source packages need to be built. Individual packages, both native and foreign, may now be (re-)built with "make PACKAGE=..." as documented in Owl/doc/BUILD. When building on SMP, the number of processors will now be detected automatically unless specified explicitly in buildworld.conf.
2002/06/13 Owl/doc/de/* New files: German translations of the documentation, from Matthias Schmidt.
2002/06/10 - 2002/06/13 Package: modutils Updated to 2.4.16.
2002/06/12 Package: glibc ldd(1) will no longer try to invoke programs directly, even when it seems like that would work. The dynamic linker will be invoked as a program instead. This makes a difference primarily when the program is SGID and is being ldd'ed by root. If the program was executed directly, glibc would detect its SGID status and drop LD_* variables, resulting in the program being actually started rather than ldd'ed. Thanks to Dmitry V. Levin of ALT Linux for suggesting this solution. syslog(3) will now use ctime_r() instead of strftime_r() so that month names will not depend on current locale settings. The patch is originally by Michael Tokarev. The glibcbug script will now use mktemp(1) in a fail-close way, let it use $TMPDIR, and will default to vitmp(1) for the editor.
2002/06/11 Package: bison Updated to 1.35.
2002/06/09 Packages: owl-dev, owl-hier Support Linux 2.4.x's /proc/devices entries. Support and create frame buffer devices. Support up to 8 IDE controllers (16 devices), create device files for 8 IDE devices by default.
2002/05/28 - 2002/06/08 Package: strace; Owl/build/installorder.conf Updated to current CVS version (post-4.4) with an additional fix for displaying all possible ioctl names when there's more than one match for a number. The strace-graph Perl script is now packaged, in its own subpackage.
2002/06/04 Package: silo Updated to 1.2.5.
2002/05/30 - 2002/06/03 Package: iputils Updated to ss020124.
2002/05/25 - 2002/05/27 Package: popa3d Added two interoperability fixes. Please refer to change log for the package for details.
2002/05/27 kernel Updated to Linux 2.2.21-ow1. This changes certain permissions on /proc entries, fixes the getcwd(2) instance of the d_path() truncation problem in the Linux kernel pointed out by Wojciech Purczynski on public mailing lists, and fixes the fsuid/fsgid handling inconsistency in the Linux kernel discovered by Hao Chen.
2002/05/19 Packages: screen, pam, tcb, utempter, owl-etc RELIABILITY FIX: Grant screen(1) access to both chkpwd and utempter helpers such that screen session (un)locking works in our default install. Previously, locked screen sessions couldn't be unlocked by the user because of screen not being able to possess and make use of the privilege of validating the user's password.
2002/05/17 - 2002/05/19 Package: gnupg Updated to 1.0.7.
2002/05/14 Package: findutils Updated to 4.1.7.
2002/05/12 Package: openssl Updated to 0.9.6d with a patch by Ben Laurie for "openssl dgst" to behave on read errors and additional corrections to the package.
2002/05/09 Package: vixie-cron SECURITY FIX Severity: none to low, local, active Ensure all files are closed in crontab(1) when the editor is run. This fixes the problem pointed out by Paul Starzetz on Bugtraq where crontab(1) could leak read-only access to /etc/cron.{allow,deny} even if those files are made readable to just group crontab.
2002/04/25 Package: e2fsprogs Updated to 1.27 (ext3fs support).
2002/04/19 - 2002/04/25 Packages: vim, bash, quota, vixie-cron Updated vim to 6.1 patchlevel 18, with various additional changes to the package. The package now includes vitmp(1), a wrapper around VIM to be used for editing temporary files with in-place rewrites. It is now the default editor for crontab(1), edquota(8), the "fix command" (fc) history editor in bash, and the bashbug script.
2002/04/10 Package: john New package: John the Ripper, a fast password cracker.
2002/04/02 Package: vsftpd Updated to 1.0.2pre3, made use of the new option to hide numeric IDs.
2002/04/01 - 2002/04/02 Packages: iproute2, owl-cdrom, owl-startup, pam_mktemp, pam_userpass, traceroute Applied modifications to better support Alpha in the distribution as a whole. Marked owl-cdrom x86-specific because at this stage it really is. /proc is now mounted early as needed for hwclock(8) and glibc's I/O port access routines. traceroute(8) should no longer do unaligned accesses on 64-bit architectures.
2002/03/30 Package: stmpclean New package: a safe temporary directory cleaner. Modifications have been applied for extra safety and to provide tmpwatch emulation.
2002/03/22 - 2002/03/24 Package: acct Applied bug fixes to sa(8) to properly report real time in minutes or seconds and to lastcomm(1) to properly report process creation times on 64-bit architectures. Heavy documentation corrections and cleanups (both man pages and texinfo).
2002/03/22 Package: popa3d Re-worked all of the UIDL calculation, adding support for multi-line headers and re-considering which headers to use.
2002/03/13 - 2002/03/21 Package: pam_mktemp Make the /tmp/.private directory append-only (where supported) such that the directory or its subdirectories don't get removed by a /tmp cleaner. A third-party /tmp cleaner may complain, but that isn't as bad as removing the directories could be.
2002/03/20 Packages: glibc, pam_mktemp, pam_passwdqc, pam_userpass, popa3d, scanlogd, tcb; Owl/build/buildworld.sh, Owl/build/Makefile The non-Owl-specific pieces of software developed by the Openwall team now live in the Owl CVS tree. This includes crypt_blowfish (a part of the glibc package), pam_mktemp, pam_passwdqc, pam_userpass, popa3d, scanlogd, and tcb. For these, the updated buildworld script may now produce source archives which we may be releasing separately from Owl. Of course, the corresponding Owl packages are built as usual.
2002/03/17 Package: openssh Updated to 3.1p1.
2002/03/15 Package: dev86 Updated to 0.16.0.
2002/03/13 Package: zlib Updated to 1.1.4.
2002/03/13 Package: logrotate Updated to 3.6.2.
2002/03/05 Package: openssh SECURITY FIX Severity: high, local/remote, active/passive Patched an off by one channel id check bug discovered by Joost Pol. The bug could be exploited by either a user able to login into a vulnerable OpenSSH server or a malicious SSH server attacking a vulnerable OpenSSH client. If successful, this could let one execute arbitrary code in the context of the remote server or client process.
2002/03/03 kernel SECURITY FIX Severity: medium to high, local to remote, active Updated to Linux 2.2.20-ow2. This fixes an x86-specific vulnerability in the Linux kernel discovered by Stephan Springl where local users could abuse a binary compatibility interface (lcall) to kill processes not belonging to them (including system processes). Additionally, a kernel instance of the zlib double-free vulnerability is now fixed. Fortunately, the affected parts of the Linux kernel (Deflate compression support for PPP and the experimental Deflate compression extension to IrDA) are normally not used by the Owl userland.
2002/02/15 Package: lilo Updated to 22.1.
2002/02/13 Packages: owl-startup, SysVinit Don't unlink the old /sbin/init on SysVinit package upgrades as that would actually leave it pending for delete on process termination and prevent remounting the filesystem read-only during shutdown. Avoid the same problem with glibc upgrades by linking /sbin/init statically. Combined with the swapoff(2) fix in Linux 2.2.20-ow1+, this completes the changes needed for system shutdown to work cleanly after a "make installworld" over the running system.
2002/02/11 Packages: zlib, rpm, texinfo SECURITY FIX Severity: high, remote, active There was a vulnerability in the zlib data compression library which, on certain invalid input to decompression, could cause segments of dynamically allocated memory to be deallocated twice (a double-free bug). The second attempt at deallocation would incorrectly treat what may happen to be user-supplied input as data structures internal to the dynamic memory implementation. As a result, the worst case impact is ability to execute arbitrary code within the context of the process doing decompression via carefully crafted invalid "compressed" input. On Owl, the zlib vulnerability affected the following packages: gnupg, openssh, rpm, texinfo, and any third-party software which may use the library. Of these, the rpm and texinfo packages contain binaries statically linked against zlib and thus needed a rebuild. They now have a build dependency on the corrected version of zlib introduced. OpenSSH could potentially allow for an active remote attack resulting in a root compromise. If only SSH protocol version 1 is allowed in the OpenSSH server this is reduced to a local attack on the server, but reverse remote attack possibilities by a malicious server remain.
2002/01/24 - 2002/02/08 Owl/doc/CONVENTIONS; Owl/build/buildworld.sh, Owl/build/installworld.sh; Owl/packages/* Defined and moved to new package version numbering conventions which should let us better support multiple branches. At the same time any previously specified conventions have been actually enforced for old packages, heavy cleanups applied to all of the RPM spec files, and lots of minor improvements to the packages have been made.
2002/02/07 Package: iproute2 New package: enhanced IP routing configuration tools.
2002/02/07 Owl/doc/fr/{DOWNLOAD,INSTALL,CONVENTIONS} Updated French translations, from Denis Ducamp.
2002/02/01 Package: bzip2 Updated to 1.0.2, with significant changes to the way the package is built.
2002/01/24 Package: bison Updated to 1.32.
2002/01/11 Package: openssl Updated to 0.9.6c.
2001/12/22 - 2001/12/26 Package: postfix Hardening of the Postfix queue file permissions and access methods, in case someone compromises the postfix account. The fixes are by Wietse Venema and have been back-ported from the 20011217 snapshot. Thanks to Michael Tokarev for his help in handling these issues. At the same time, additional postfix-script fail-closeness fixes have been applied and the package has been updated to 19991231-pl13.
2001/12/16 Package: vsftpd New package: a File Transfer Protocol (FTP) server.
2001/12/14 Package: glibc SECURITY FIX Severity: none to high, remote, active Back-ported a glob(3) buffer overflow fix from the CVS. The bug has been discovered and an initial patch produced by Flavio Veloso of Magnux. While no Owl package is known to be affected by this glibc bug, it is likely that it may result in a security hole with certain third-party software such as FTP servers which support globbing and make use of the glob(3) interface. At the same time, asprintf(3) and vasprintf(3) have been modified to behave on errors and match the semantics of Todd Miller's implementation found on *BSD, -- thanks to Dmitry V. Levin of ALT Linux for discovering and looking into these issues.
2001/12/12 Package: openssh SECURITY FIX Severity: none to high, local, active Updated to 3.0.2p1 which fixes a security problem with UseLogin where, if UseLogin is enabled in the sshd configuration, a local user could gain root access by passing arbitrary environment variable settings to login(1) via authorized_keys file options. UseLogin has never been enabled on Owl by default and its use is discouraged.
2001/12/10 Package: ipchains New package: an interface to the Linux IP packet filtering code.
2001/11/27 Package: logrotate Updated to 3.5.9 with additional corrections.
2001/11/25 Package: telnet New package: Telnet protocol client and server ported from OpenBSD (post-3.0), with significant modifications. The Telnet protocol handling in telnetd is performed in a process running as a dedicated pseudo-user and chrooted to /var/empty. This uses the approach introduced by Chris Evans in his NetKit telnetd patches, but the code is different. Please refer to change log for the package itself for descriptions of the many modifications applied during the week this package was in development.
2001/11/22 Owl/doc/CONVENTIONS New file: explains some of the conventions to follow for those wishing to contribute to the project.
2001/11/19 Packages: SimplePAMApps, pam Use pam_lastlog with login(1). Additionally, several bug fixes and other changes have been applied to libpam, pam_lastlog, pam_securetty, and login. Please refer to change logs for the packages for details.
2001/11/16 Packages: SimplePAMApps, openssh, popa3d, screen, owl-setup Use pam_tcb instead of pam_pwdb.
2001/11/15 Packages: pam, tcb No longer build pam_unix, the tcb package will provide compatibility symlinks instead.
2001/11/13 Package: screen Updated to 3.9.10.
2001/11/13 Package: mktemp Updated to 1.4 (uses $TMPDIR and a hard-coded template by default).
2001/11/12 Packages: tcb, shadow-utils, util-linux This is the first in a series of changes needed for us to move to the tcb password shadowing scheme (please refer to the tcb(5) manual page for information on what tcb is about and why we designed it). The tcb package consists of three components: pam_tcb, libnss_tcb, and libtcb. pam_tcb is a PAM module which supersedes pam_unix. libnss_tcb is the accompanying NSS module. libtcb contains code shared by the PAM and NSS modules and is also used by programs from the updated shadow-utils package. At the same time, the shadow suite (shadow-utils) has been updated to version 4.0.0 with many additional fixes and modifications and, of course, with tcb support added. The non-tcb-specific changes to shadow-utils include: optional mailbox creation in useradd(8), the use of PAM with most user management commands (where that made sense), support for arbitrary password hashing methods for group passwords set with gpasswd(1), packaging of gshadow-aware versions of newgrp(1) and sg(1) commands (previously, newgrp(1) was a part of our util-linux package), numerous bug fixes and reliability improvements, and quite likely new bugs. chpasswd(8) and newusers(8) will now use PAM to set passwords that haven't already been hashed. Other commands which set passwords will invoke the PAM password management stack to possibly rebuild additional password databases. chage(1), once enabled, will now use PAM authentication which is by default set to require non-root users to authenticate themselves prior to being let to see their password aging information. Other user management commands will now support PAM authentication, too, although that isn't of much use given that we don't officially support running user management commands on behalf of trusted but not root-privileged users.
2001/11/09 Package: pam_userpass Updated to 0.5 which is now stackable for password management as well as authentication. This is to be used by programs such as chpasswd(8) and newusers(8).
2001/11/08 Package: netlist New package: a program for regular users to list their active Internet connections and listening sockets despite possible access restrictions on /proc.
2001/11/08 Package: glibc If syslog(3) is called by a SUID/SGID program without a preceding call to openlog(3), don't blindly trust __progname for the syslog ident. This situation may occur because of bad interaction between a program and PAM modules where either a PAM module relies on the program to have initialized logging or one or more of the PAM modules utilize syslog calls followed by a call to closelog(3) and the program doesn't bother to re-initialize its logging before making further calls to syslog(3). All of this is of course a consequence of PAM lacking a logging framework. Without this change to glibc, such situations would go unnoticed while allowing for malicious users to play games with messages logged by privileged programs.
2001/11/08 Package: bison Updated to 1.30.
2001/11/04 Package: pam_passwdqc Updated to 0.4 which permits for stacking of more than one instance of the module (no statics).
2001/11/03 kernel SECURITY FIX Severity: none to medium, remote, active Updated to Linux 2.2.20-ow1. Compared to our previous recommended kernel version/patch (2.2.19-ow3 or 2.2.19-ow4), Linux 2.2.20 adds a workaround for a vulnerability with certain packet filter setups and SYN cookies (http://cr.yp.to/syncookies.html) where the packet filter rules could be bypassed. Additionally, 2.2.20-ow1 moves even more of the support for combined ELF/a.out setups (in particular, uselib(2) and its related a.out library loaders) under the configuration option introduced with 2.2.19-ow4.
2001/10/28 Package: popa3d Updated to 0.5 which adds a popa3d(8) man page.
2001/10/24 - 2001/10/27 Package: bash Updated to 2.05 with many additional fixes.
2001/10/22 kernel RELIABILITY FIX: Updated to Linux 2.2.19-ow4 which fixes a symbol export issue introduced with 2.2.19-ow3 and moves the support for ELF executables which use an a.out format interpreter (dynamic linker) into a separate configuration option (disabled by default).
2001/10/18 kernel SECURITY FIX Severity: low to high, local, active A new revision of the Openwall Linux kernel patch, 2.2.19-ow3, is now available. It contains fixes for two Linux kernel vulnerabilities discovered by Rafal Wojtczuk, and it is strongly recommended for use with Owl. One of the vulnerabilities affected SUID/SGID execution by processes being traced with ptrace(2). It was possible to trick the kernel into recognizing an unsuspecting SUID root program as the (privileged) tracer process. Then, if that program would execute a program supplied by the malicious user (with the user's credentials), the user's program would inherit the ability to trace. Fortunately, there's no program that would meet all of the requirements for this attack in the default Owl install. However, certain supported non-default configurations of Owl are affected. In particular, if newgrp(1) is made available to untrusted users (which is a supported owl-control setting) or certain third-party software that contains SUID root binaries is installed, the vulnerability may become exploitable and result in a local root compromise. The other vulnerability allowed for an effective local DoS attack by causing the kernel to spend an almost arbitrary amount of time on dereferencing a single symlink, without giving a chance for processes to run.
2001/10/08 Packages: sysklogd, owl-etc Updated sysklogd to 1.4.1. Based the new klogd drop root patch on one from CAEN Linux. Added syslogd patches derived from CAEN Linux to allow specifying a bind address for the UDP socket and to let syslogd run as non-root. klogd is now running chrooted to /var/empty (it has been running as non-root since before Owl 0.1-prerelease). syslogd is now running as its dedicated pseudo-user, too.
2001/10/07 Packages: pam, openssh, screen; Owl/build/installorder.conf Updated PAM to Red Hat's 0.75-10 plus our usual patches. Replaced pam_listfile with Michael Tokarev's implementation (see http://archives.neohapsis.com/archives/pam-list/2000-12/0084.html). Patched the new pam_chroot to catch the most common misuses which would result in a security problem, updated its README and example configuration file to discourage such misuses. Moved development libraries and header files into a subpackage, moved the main Linux-PAM documentation into a documentation subpackage.
2001/10/06 Package: gpm Updated to 1.19.6 with some additional fixes.
2001/10/03 Owl/doc/DOWNLOAD, Owl/doc/INSTALL Documented the availability and installation instructions for ISO-9660 images of Owl CDs.
2001/10/02 Package: mktemp Updated to 1.3.1 (built-in $TMPDIR support).
2001/09/27 Package: gzip SECURITY FIX Severity: low, local, passive Patched unsafe temporary file handling in gzexe, zdiff, and znew based on work by Todd Miller of OpenBSD.
2001/09/27 Package: openssh SECURITY FIX Severity: low to high, remote, passive to active Updated to 2.9.9p2, which fixes three security issues compared to our previous package version. The issues are: 1. The "from=" restriction in ~/.ssh/authorized_keys2 could fail to work when the file defines a mix of RSA and DSA keys. 2. A documentation problem that the authorized_keys* options didn't restrict the use of sftp. They do so now. sftp has never been enabled on Owl by default (it is owl-control'able). 3. As discovered by Yang Yu, the "echo simulation" traffic analysis countermeasure produced an extra echo packet for the carriage return after password entry. That could serve as a traffic signature for attackers.
2001/09/11 Package: popa3d Updated to 0.4.9.4. The same popa3d binary may now be run as a standalone server as well as via xinetd, an /etc/xinetd.d file is provided. Parts of the daemon code are now run in a chroot jail.
2001/09/05 Package: man-pages Updated to 1.39 with additional corrections.
2001/09/02 Package: groff SECURITY FIX Severity: none to high, remote, active zen-parse has demonstrated a security problem with format string processing in the plot command of pic(1) when groff is used with LPRng on Red Hat Linux. While Owl doesn't (yet?) include a print server, our groff package did have the unfortunate pic(1) property and did provide a print filter for use on potentially untrusted input by a third-party print server package one could install. This has now been corrected. A patch by Sebastian Krahmer of SuSE Security Team has been applied to pic(1) to restrict the format string processing. The print filter has been dropped from the package. Additionally, the package has been updated to 1.17.2.
2001/09/02 Package: popa3d Updated to 0.4.9.2.
2001/08/30 Package: xinetd Updated to 2.3.3.
2001/07/30 Package: pam RELIABILITY FIX: Fixed a double-free bug in pam_pwdb which caused it to segfault after successful password changes in some cases. The bug was specific to Owl. :-( Fortunately, this had no security impact as the memory area was zeroed out before the second call to free(3) such that no user input would reach it.
2001/07/28 Package: owl-cdrom New package: directory hierarchy changes and additional files needed for Owl bootable CD-ROMs.
2001/07/27 Package: links Updated to 0.96.
2001/07/05 - 2001/07/22 Package: xinetd SECURITY FIX Severity: none to high, remote, active Performed an audit of the xinetd source code for several classes of vulnerabilities, and applied _many_ security and reliability fixes. The patch is 100 KB large. See AUDIT in the package documentation. None of the vulnerabilities are known to affect the default xinetd configuration on Owl.
2001/07/18 Package: vixie-cron Added support for /etc/cron.d directory.
2001/07/12 Package: gdb New package: the GNU debugger.
2001/07/12 Package: scanlogd New package: a tool to detect and log TCP port scans.
2001/07/11 Packages: openssl, openssh Updated OpenSSL to 0.9.6b.
2001/07/10 Package: tar RELIABILITY FIX: There was a bug which caused tar to loop endlessly on a read error when verifying archives (this affected both -W, --verify, and -d, --diff, --compare). The bug is now fixed. Additionally, the package has been updated to 1.13.19 with other patches needed for this new version.
2001/07/06 Package: openssl SECURITY FIX Severity: none to medium, remote, passive to active Applied patches provided by the OpenSSL team to correct a PRNG weakness which under unusual circumstances could allow an attacker to determine internal state of the PRNG and thus to predict future PRNG output. This problem has been discovered and reported to the OpenSSL team by Markku-Juhani O. Saarinen. No applications are known to be affected at this time.
2001/06/29 Package: xinetd SECURITY FIX Severity: none to high, remote, active Updated to 2.3.0, which fixes the problem with xinetd's string handling routines discovered by Sebastian Krahmer of SuSE Security Team. This should complete an earlier security fix to the buffer overflow in the xinetd logging code discovered by zen-parse. The buffer overflow could be triggered by a remote attacker via xinetd's ident (RFC 1413) lookup feature and could allow for the execution of arbitrary code as the user xinetd is running as (typically root). ident lookups are and have always been disabled in the Owl xinetd package by default.
2001/06/29 Owl/doc/fr/* Updated French translations, from Denis Ducamp.
2001/06/29 Package: mktemp Switched to packaging the portable mktemp, now that Todd Miller maintains it in addition to the OpenBSD-specific version. :-)
2001/06/27 Package: gpm SECURITY FIX Severity: none to low, physical, active The mouse event handler gpm-root, if enabled, handled user-supplied configuration files unsafely, allowing a user with physical access to the mouse to gain root privileges on the running system. gpm-root was never started on Owl by default, and has now been moved to a separate subpackage which would need to be explicitly enabled to build. The support for user-supplied configuration files is now patched out and the documentation is updated accordingly. Additionally, many gpm-root reliability bugs including the format string bug reported by Colin Phipps to Debian (http://bugs.debian.org/102031) have been fixed.
2001/06/25 Package: quota New package: tools for monitoring users' disk usage and managing disk usage quotas.
2001/06/24 Owl/doc/CHANGES New file: the system-wide change log will now be maintained.
2001/06/21 Owl build environment First attempt at supporting multiple branches.
2001/06/21 - 2001/06/23 Package: owl-setup RELIABILITY FIX: Set the domain in /etc/resolv.conf, ensure the newly created /etc/resolv.conf and /etc/hosts are mode 644.
2001/06/20 Package: tcsh Updated to 6.10.01 which includes a number of minor bugfixes.
2001/06/18 Package: pwdb Updated to 0.61.1 which adds some header files.
2001/06/17 Package: libnet Support alpha* targets other than plain alpha (don't even try to check for unaligned accesses when building for an Alpha).
2001/06/17 Package: man-pages Updated to 1.38.
2001/06/15 Package: shadow-utils DOCUMENTATION FIX: Rewrote most of the login.defs(5) man page and enabled its packaging. Added more defaults to /etc/login.defs, added a reference to login.defs(5). Fixed a bug in the lastlog(8) man page reported by Jarno Huuskonen.
2001/06/14 Package: openssh SECURITY FIX Severity: none to low, remote, active Prevent additional timing leaks with null passwords (when allowed). The default OpenSSH server configuration on Owl doesn't allow null passwords, making this a non-issue (not that it's much of an issue either way). When null passwords were allowed, the old package made it somewhat easier for a remote attacker to check whether a username is valid.
2001/06/14 Package: pam_userpass RELIABILITY FIX: Deal with null passwords correctly. Before this change null passwords wouldn't work even when allowed for a service.
2001/06/13 Package: glibc
Back-ported a patch from the CVS to handle unaligned relocations on
Alpha. Owl is now able to rebuild all of its packages on an Alpha
without causing a single unaligned trap.
References:
2001/06/12 Package: rpm Updated to 3.0.6.
2001/06/12 Package: screen SECURITY FIX Severity: low, local, passive Updated to 3.9.9, patched the unsafe temporary file handling in the configure script (which made it unsafe to _build_ screen).
2001/06/12 Package: xinetd Updated to 2.1.8.9pre15. With includedir, skip all files with names containing a dot ('.') or ending with a tilde ('~'); this replaces the Red Hat Linux derived patch. Minor man page fixes.
2001/06/11 Package: openssh SECURITY FIX Severity: low, local, active Switch credentials when cleaning up temporary files and sockets to fix the vulnerability reported by zen-parse on Bugtraq which could allow a local user to remove files named "cookies" located anywhere on the system. The patch is by Markus Friedl (intended for testing only) with a later OpenSSH CVS change added and two bugs fixed.
2001/06/10 - 2001/06/13 Package: dialog Updated to 0.9a-20010527 with minor bugfixes.
2001/06/07 Package: links New package: a Lynx-like text WWW browser with support for frames.
2001/06/04 Owl/doc/CONTACT New file: explains Owl public mailing lists (only owl-users at the moment) and e-mail contacts.
2001/06/04 Package: logrotate Enabled the daily cron job now that we have /etc/cron.daily (finally). If log compression is requested, use gzip at its default compression level (no "-9").
2001/06/03 Package: glibc SECURITY FIX Severity: low to medium, local, passive Synced the fts(3) routines with current OpenBSD and FreeBSD; this is triggered by Nick Cleaton's report of yet another FTS vulnerability to FreeBSD, and a discussion with Kris Kennaway and Todd Miller. It should no longer be possible to trick FTS into leaving the intended directory hierarchy, but DoS attacks on FTS itself remain possible. The FTS code is used by software ported from BSD, including the Owl mtree package. GNU software uses other implementations, several of which will need fixing as well (our findutils package includes a fix since before the 0.1-prerelease, but there's room for improvement).
2001/06/03 Package: glibc DOCUMENTATION FIX: Updated to crypt_blowfish-0.4.1 which includes a crypt.3 man page that is more friendly to makewhatis.
2001/05/30 Package: gnupg SECURITY FIX Severity: high, remote, passive Updated to 1.0.6, which includes a fix to the format string vulnerability discovered by fish stiqz of Synnergy Networks. This vulnerability can allow a (possibly remote) attacker to execute arbitrary code as the user who attempted decryption of a specially crafted file. While the potential impact of this vulnerability is high, the chances of its successful exploitation in a real-world attack are low due to technical and social reasons.
2001/05/29 Packages: SysVinit, xinetd, owl-startup SECURITY FIX Severity: none to medium, local, passive to active Ensure the umask is no less restrictive than 022 when starting programs from init, start-stop-daemon, and xinetd. Set umask to 077 in daemon() for the case when a service is started manually rather than from rc.sysinit. Of these, only the xinetd behavior was a real vulnerability on setups we support (Owl with third-party services installed). The change to init is only critical when running certain 2.4.x Linux kernel versions, which we don't yet support. The changes to start-stop-daemon and owl-startup are redundant.
2001/05/27 Package: gawk SECURITY FIX Severity: low, local, passive Patched unsafe temporary file handling in igawk, based on report and patch from Jarno Huuskonen (updated the igawk example in the texinfo documentation for gawk, which is used as the source for building the final igawk script). This is a very minor security problem as igawk is hardly ever used.
2001/05/27 - 2001/06/19 Package: popa3d RELIABILITY FIX: Updated from an earlier development version to 0.4.9 and later to 0.4.9.1.
2001/05/23 Package: sysklogd SECURITY FIX Severity: none to medium, local, active Back-ported a klogd DoS fix from 1.4.1, thanks to the reports from Jarno Huuskonen and Thomas Roessler who initially reported the problem to Debian (see http://bugs.debian.org/85478). The problem would only show up when the kernel or a kernel module incorrectly passes a NUL byte for logging. Linux 2.2.19 isn't known to have bugs like this, some Linux 2.4.x kernels are.
2001/05/18 Owl/doc/CREDITS New file: presents our development team and others involved with Owl.
2001/05/18 - 2001/05/25 Package: crontabs New package: system crontab files which provide the /etc/cron.daily, weekly, and monthly files as required by the LSB specification draft, plus /etc/cron.hourly found on Red Hat Linux. The package is based on a modified version of the run-parts program derived from Debian.
2001/05/18 - 2001/06/12 Package: man Updated to 1.5i and later to 1.5i2. These versions are meant to fix the published ways to attack man when it is installed SUID/SGID, but the fixes are imperfect by design. Owl has never installed man SUID or SGID. Additionally, our makewhatis script was fixed since before we've released. Thus, this isn't a security update.
2001/05/15 Owl/doc/fr/* New files: French translations of the documentation, from Denis Ducamp. $Owl: Owl/doc/CHANGES-1.0,v 1.12 2018/05/23 19:32:15 solar Exp $ |