*BSD News Article 77540


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.carno.net.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!metro!metro!asstdc.scgt.oz.au!nsw.news.telstra.net!act.news.telstra.net!psgrain!newsfeed.internetmci.com!in3.uu.net!omega.metrics.com!omega.metrics.com!not-for-mail
From: polk@BSDI.COM
Newsgroups: comp.unix.bsd.bsdi.announce
Subject: BSDI: *SECURITY* patch for rdist, note about U210-017
Followup-To: comp.unix.bsd.bsdi.misc
Date: 5 Sep 1996 08:16:22 -0400
Organization: Software Metrics Inc.
Lines: 233
Sender: tomh@omega.metrics.com
Approved: tomh@metrics.com
Message-ID: <50mgam$2sc@omega.metrics.com>
NNTP-Posting-Host: omega.metrics.com


[Clearing a backlog of unposted articles ... my apologies.  --th]


New patch
---------
There is a new patch U210-018 which fixes the recently 
discovered holes in the /usr/bin/rdist program.  There are
actually two versions of this patch U210-018 for all systems
except those running Kerberos, and D210-018 for systems which 
are running Kerberos.  You should only install one of the 
two versions of the patch.

One of the problems fixed by this patch was recently reported in
an 8lgm advisory ([8lgm]-Advisory-26.UNIX.rdist.20-3-1996) and an
exploitation program has been posted in various forums which enables
local users to gain root privileges.

The README entries for the new patches along with their md5
checksums are below.  As always, there are pgp signatures
in the signatures subdirectory of the patches-2.1 directory on
the ftp/patches servers.

Perl Patch Correction
---------------------
The perl patch U210-017 was also updated on July 9.  The only
change in the patch is to remove the executable bits from the 
old versions of the binaries after they are renamed.  If you have
retrieved and installed the older version of the patch, you should
remove the execute bits from the old binaries immediately with 
the following command (as root):

	chmod 444 /usr/bin/suidperl.orig /usr/contrib/bin/sperl5.orig

Any binaries replaced in future patches will be automatically 
disabled as they are renamed.  The new README file entry for 
U210-017 (with its new md5 checksum) is below.  The PGP signature
has also been updated on the ftp/patches servers.

Jeff
--
     /\   Jeff Polk            Berkeley Software Design, Inc. (BSDI)
  /\/  \  polk@BSDI.COM        5575 Tech Center Dr. #110, Colo Spgs, CO 80919

===================================================================

PATCH:
    U210-017

SUMMARY:
    This patch address the security issues as discussed in
    CERT(sm) Advisory CA-96.12 Vulnerability in suidperl
    for BSD/OS 2.1.

md5 checksum: 6224ff121b16bd8f990345b5e1f388df U210-017

===================================================================

PATCH:
    D210-018
    U210-018

SUMMARY:
    This patch addresses a security problem in the rdist program.
    If you have not installed the Kerberos package, install the U210-018
    version of this patch.  You do NOT need to install the D210-018
    version unless you are running Kerberos.

    If you are running Kerberos, you should install the D210-018
    version of the patch instead of the U210-018 version.

    Both versions of the patch install the same binary (/usr/bin/rdist), 
    so installing the second version of the patch will over-write 
    whichever was installed first.

    THE D210-018 VERSION OF THIS PATCH IS FOR THE KERBEROS PACKAGE
    FROM THE DOMESTIC FLOPPY.  IT CONTAINS DES CODE AND MAY NOT BE
    LEGALLY EXPORTED FROM THE UNITED STATES WITHOUT A SPECIFIC
    LICENSE.

md5 checksum: b2060ec4eb9b18ace4e76bcb9441353f D210-018
md5 checksum: 86005d8bbb67eb737120741bd254d26a U210-018

===================================================================


From polk@external.BSDI.COM Fri Aug  9 19:35:29 1996
Received: from relay4.UU.NET by omega.metrics.com (8.6.12/1.37)
	id PAA20325; Fri, 9 Aug 1996 15:35:05 -0400
Received: from external.BSDI.COM by relay4.UU.NET with ESMTP 
	(peer crosschecked as: external.BSDI.COM [205.230.225.2])
	id QQbcbe17014; Fri, 9 Aug 1996 15:34:40 -0400 (EDT)
Received: (from polk@localhost) by external.BSDI.COM (8.7.4/8.7.3) id NAA16778; Fri, 9 Aug 1996 13:30:53 -0600 (MDT)
Date: Fri, 9 Aug 1996 13:30:53 -0600 (MDT)
Message-Id: <199608091930.NAA16778@external.BSDI.COM>
To: customers@bsdi.com
Subject: New patches for BSD/OS 2.1, one security related
From: polk@BSDI.COM
Status: O


New patches
-----------
There are several new patches available from the patches@bsdi.com
server or via the ftp archive at ftp://ftp.bsdi.com/bsdi/patches/patches-2.1
Two of the kernel patches (K210-018 and K210-020) fix problems 
which may result in kernel panics.  The other kernel patch (K210-019)
and the user level patch (U210-019) are performance enhancements.  See
the description below.  The U210-020 user-level patch doesn't really 
replace anything, it just changes permissions on http daemon 
config files.  The README file entries for the new patches are also 
appended.

The K210-019 is the first patch for 2.1 which is not available via
ANONYMOUS ftp.  Only customers with valid service or upgrade
contracts may retrieve this patch.  Customers may retrieve the
patch via email to patches@BSDI.COM or via ftp once you have obtained
a key from the patches@BSDI.COM server.  Send an empty email message
to patches@BSDI.COM for complete instructions on using the server.

The most common cause of problems with the patches email 
server is an incorrect email address in your customer record.  If 
your service contract is `not found' or if you don't get any 
response from the server, your registered address may be incorrect.
To update your registered email address, contact admin@bsdi.com
or call BSDI at 719-593-9445.  Be sure to have your customer number
available if possible.

Networking Performance Enhancements
-----------------------------------
The K210-019 patch provides a significant improvement to TCP
performance under heavy load -- such as when running heavily loaded
HTTP servers.  A 133 MHz Pentium can handle 326 connections per
second with a network throughput of 17.5 Mbits per second (as
measured by WebStone 1.1).  With these patches BSD/OS significantly
outperforms the Microsoft IIS running on Windows NT (see our
benchmark report at http://www.bsdi.com/products/internet-server/benchmarks
for complete details).

Jeff
--
     /\   Jeff Polk            Berkeley Software Design, Inc. (BSDI)
  /\/  \  polk@BSDI.COM        5575 Tech Center Dr. #110, Colo Spgs, CO 80919

===================================================================

PATCH:
    K210-018

SUMMARY:
        This patch supersedes the informal patch K210-rtsock. In addition 
	to the leftover pointer to a freed block, this patch fixes incorrect
	handling of the gateway route. In some cases an incorrect route
	was returned by rtrequest() which actually used a block of memory
	which had been freed. This resulted in a system crash. One symptom
	of the bugs fixed by this patch is that the value which caused the
	crash is sometimes equal to 0xc0001.

md5 checksum: a23c5691c4a587a87b1ce678d576f432 K210-018

===================================================================

PATCH:
    K210-019

SUMMARY:
	This patch adds several TCP performance enhancements.
	    o PCB hashing
	   	 o Optimized delayed ACK processing
	    o Optimized TIME-WAIT state processing
	    o Initial congestion window fixes
	    o Eliminate sending small packets when more data is
	      waiting to be copied from the application, but
	      don't delay them unnecessarily when there isn't.
	
	This patch also includes a new kernel config option,
	INET_SERVER.  Turning on this option will cause the
	PCB hashing code to use a much larger hash table.
	Typically this would be useful on busy WEB servers.

md5 checksum: 9527c357be5a70f718236073a66fad94 K210-019

===================================================================

PATCH:
    K210-020

SUMMARY:
	Fixes certain kernel page fault panics which may occur when 
	mounting and unmounting filesystems.

md5 checksum: f219909d9f9617e7f40d1b9460315bb1 K210-020

===================================================================

PATCH:
    U210-019

SUMMARY:
    This binary patch adds the Squid Internet object cache to
	BSD/OS 2.1 systems.  Squid can act as both an HTTP proxy
	and an HTTP accelerator, providing significant improvements
	in HTTP performance as well as reducing unnecessary network
	traffic.

	Source code is available from:

		ftp://ftp.bsdi.com/bsdi/patches/patches-2.1/squid-src.tar.gz

md5 checksum: e845288889e56b109ffb37a5e33ee426 U210-019
md5 checksum: 0fc5968e44c2100d0a3f45dc2334f7b2 squid-src.tar.gz

===================================================================

PATCH:
    U210-020

SUMMARY:
	This patch changes the ownership of the configuration files
	in /var/www/conf to be owned by root rather than www.  In
	the original configuration (where the configuration files
	were owned by www) compromising the www user could allow
	unauthorized root access.

md5 checksum: c934f2db8b8d727881d473f00b2fb4b1 U210-020

===================================================================


-- 
[ /tom haapanen -- tomh@metrics.com -- software metrics inc -- waterloo, ont ]
[ "until the lions have their own historians,                                ]
[  tales of hunting will always glorify the hunter."         -- zulu proverb ]