Date: Wed, 21 Jan 2004 14:45:52 +0100
From: Trustix Security Advisor <[email protected]>
To: [email protected]Subject: TSLSA-2004-0005 - slocate
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0005
Package name: slocate
Summary: possible privilege elevation
Date: 2004-01-21
Affected versions: Trustix 1.5, 2.0
- --------------------------------------------------------------------------
Package description:
Slocate is a security-enhanced version of locate. Just like locate,
slocate searches through a central database (which is updated nightly)
for files which match a given pattern. Slocate allows you to quickly
find files anywhere on your system.
Problem description:
Mr. Patrik Hornik discovered a buffer overflow vulnerability in slocate
version 2.6. The vulnerability corrupts heap management structures and
possibly leads to gaining slocate group privileges, which allows reading
the global slocate database and thus obtaining a list of all files in the
system by an unauthorized user.
For further description, see CAN-2003-0848 at http://cve.mitre.org/
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Public testing:
Most updates for Trustix are made available for public testing some time
before release.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://tsldev.trustix.org/cloud/>
You may also use swup for public testing of updates:
site {
class = 0
location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
regexp = ".*"
}
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-1.5/> and
<URI:http://www.trustix.org/errata/trustix-2.0/>
or directly at
<URI:http://www.trustix.org/errata/misc/2004/TSL-2004-0005-slocate.asc.txt>
MD5sums of the packages:
- --------------------------------------------------------------------------
6e170882ef40ea6ae1df77e71a31ce3c 1.5/rpms/slocate-2.7-1tr.i586.rpm
0f68f217f6535003f28b341667cc0d75 1.5/srpms/slocate-2.7-1tr.src.rpm
2a10a4c4542eb42fe6e82745e9ea52c0 2.0/rpms/slocate-2.7-1tr.i586.rpm
b76260e4c12a7127b9cb5a0391ac6cb4 2.0/srpms/slocate-2.7-1tr.src.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQFADnPgi8CEzsK9IksRAh1wAJ9HF2VeuWQBIrHn8c6dQPvdf2YGmACeIC4U
b0rhaUbts4NO4NavZEwUKtU=
=DfEo
-----END PGP SIGNATURE-----