5430375 2000-09-04  06:33  /14 rader/ Brevbäraren (som är implementerad i) Python
Mottagare: Bugtraq (import) <12549>
Ärende: [security@slackware.com: [slackware-security] Perl root exploit
------------------------------------------------------------
 in Slackware 7.1 & -current]
	I had fixed this manually, as have a lot of
people.  Nevertheless, this should still be of interest.

Regards,
-- 
    __      ______   ____
   /  \    /  \   \ /   / White Vampire\Rem
   \   \/\/   /\   Y   /  http://www.projectgamma.com/
    \        /  \     /   http://www.webfringe.com/
     \__/\  /    \___/    http://www.gammaforce.org/
          \/ "Silly hacker, root is for administrators."
(5430375) ------------------------------------------
Kommentar i text 5430376 av Brevbäraren (som är implementerad i) Python
Kommentar i text 5430377 av Brevbäraren (som är implementerad i) Python
Läsa nästa kommentar.
5430376 2000-09-04  06:33  /73 rader/ Brevbäraren (som är implementerad i) Python
Mottagare: Bugtraq (import) <12550>
Kommentar till text 5430375 av Brevbäraren (som är implementerad i) Python
Ärende: Bilaga till: [security@slackware.com: [slackware-security] Perl root exploit
------------------------------------------------------------
 in Slackware 7.1 & -current]
Return-Path: <owner-slackware-security@connie.slackware.com>
Delivered-To: whitvamp@localhost
Received: (qmail 9238 invoked from network); 3 Sep 2000 01:04:14 -0000
Received: from localhost (127.0.0.1)
  by localhost with SMTP; 3 Sep 2000 01:04:14 -0000
Delivered-To: whitvamp@monolith.projectgamma.com
Received: from monolith.projectgamma.com [216.226.17.243]
	by localhost with POP3 (fetchmail-5.4.4)
	for whitvamp@localhost (single-drop); Sat, 02 Sep 2000
21:04:14 -0400 (EDT) Received: (qmail 1539 invoked from network); 2
Sep 2000 21:53:43 -0000 Received: from lmtp07.iname.net (HELO
smv18.iname.net) (165.251.8.71)
  by monolith.projectgamma.com with SMTP; 2 Sep 2000 21:53:43 -0000
Received: from connie.slackware.com (connie.slackware.com [204.216.27.13])
	by smv18.iname.net (8.9.3/8.9.1SMV2) with ESMTP id UAA07787;
	Sat, 2 Sep 2000 20:54:13 -0400 (EDT)
Received: (from daemon@localhost)
	by connie.slackware.com (8.9.3/8.9.3) id PAA16487
	for slackware-security-outgoing; Sat, 2 Sep 2000 15:59:28 -0700
Received: from localhost (security@localhost)
	by connie.slackware.com (8.9.3/8.9.3) with ESMTP id PAA16484
	for <slackware-security@slackware.com>; Sat, 2 Sep 2000
15:59:26 -0700 Date: Sat, 2 Sep 2000 15:59:25 -0700 (PDT) From:
Slackware Security Team <security@slackware.com> To:
slackware-security@slackware.com Subject: [slackware-security] Perl
root exploit in Slackware 7.1 & -current Message-ID:
<Pine.LNX.4.10.10009021557500.16479-100000@connie.slackware.com>
MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender:
owner-slackware-security@slackware.com Precedence: bulk Reply-To:
Slackware Security Team <security@slackware.com>

A root exploit was found in the /usr/bin/suidperl5.6.0 program that
shipped with the Slackware 7.1 perl.tgz package.

It is recommended that all users of Slackware 7.1 (and -current)
upgrade to the perl.tgz package available in the Slackware -current
branch.

   ====================================
   perl 5.6.0 AVAILABLE - (d1/perl.tgz)
   ====================================

      The root exploit in /usr/bin/suidperl5.6.0 has been patched.
      Hack attempts are now logged to /var/log/syslog.  The new
      perl.tgz package is available from:

         ftp://ftp.slackware.com/pub/slackware/slackware-current/slakware/d1/

      Here are the md5sums and checksums for the packages:

         1027099174 6464627 ./perl.tgz
         0dfc1c46e3dd22033850fc69928588ec  ./perl.tgz

      INSTALLATION INSTRUCTIONS FOR THE perl.tgz PACKAGE:
      ---------------------------------------------------
      If you have downloaded the new perl.tgz package, you should bring
      the system into runlevel 1 and run upgradepkg on it:

         # telinit 1
         # upgradepkg perl.tgz
         # telinit 3


Remember, it's also a good idea to backup configuration files before
upgrading packages.

- Slackware Linux Security Team
  http://www.slackware.com
(5430376) ------------------------------------------(Ombruten)

5430377 2000-09-04  06:33  /11 rader/ Brevbäraren (som är implementerad i) Python
Mottagare: Bugtraq (import) <12551>
Kommentar till text 5430375 av Brevbäraren (som är implementerad i) Python
Ärende: Bilaga till: [security@slackware.com: [slackware-security] Perl root exploit
------------------------------------------------------------
 in Slackware 7.1 & -current]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5sqKs3+rxmnEDyl8RAi9GAJ9zB0NeWSp0n/pKZI9CTPObP0b5pQCeL//d
8OZrS4gz2WjPq9Mp8UhQFvU=
=MR16
-----END PGP SIGNATURE-----
(5430377) ------------------------------------------