Slackware: nfs-utils off-by-one overflow vulnerability
Posted by LinuxSecurity.com Team   
Slackware There is an off-by-one overflow in xlog() in the nfs-utils package.

[slackware-security]  nfs-utils packages replaced (SSA:2003-195-01b)

New nfs-utils packages are available for Slackware 8.1, 9.0, and -current
to replace the ones that were issued yesterday.  A bug in has been fixed
in utils/mountd/auth.c that could cause mountd to crash.

Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Tue Jul 15 10:42:58 PDT 2003
patches/packages/nfs-utils-1.0.4-i386-2.tgz:  Fixed a bug in the new
nfs-utils which can result in mountd crashing.  Thanks to Andr� Muezerie
for the report.
+--------------------------+


WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated package for Slackware 8.1: 
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/nfs-utils-1.0.4-i386-2.tgz

Updated package for Slackware 9.0: 
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/nfs-utils-1.0.4-i386-2.tgz

Updated package for Slackware -current: 
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/nfs-utils-1.0.4-i486-2.tgz



MD5 SIGNATURES:
+-------------+

Slackware 8.1 package:
d1e44efb9052b7a57fcc2ac6cad09bca  nfs-utils-1.0.4-i386-2.tgz

Slackware 9.0 package:
aa8a044fe98e91ac2d98c570fad19bdf  nfs-utils-1.0.4-i386-2.tgz

Slackware -current package:
a391e67cd65d082ec3ee2e1cd97c9ac1  nfs-utils-1.0.4-i486-2.tgz


INSTALLATION INSTRUCTIONS:
+------------------------+

First, if the NFS server is running, stop it:
. /etc/rc.d/rc.nfsd stop

Then upgrade using upgradepkg (as root):
upgradepkg nfs-utils-1.0.4-i386-1.tgz

Finally, restart NFS services:
. /etc/rc.d/rc.nfsd start



+-----+

Slackware Linux Security Team 
http://slackware.com/gpg-key
security@slackware.com