Date: Fri, 24 Jun 2005 15:19:24 +0200
From: Trustix Security Advisor <tsl@trustix.org.>
To: [email protected]Subject: TSLSA-2005-0030 - multi
Message-ID: <20050624131924.GA10128@tsunami.trustix.net.>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2005-0030
Package name: cpio, razor-agents, sudo, telnet
Summary: Multiple security fixes
Date: 2005-06-24
Affected versions: Trustix Secure Linux 2.1
Trustix Secure Linux 2.2
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
cpio:
GNU cpio copies files into or out of a cpio or tar archive.
razor-agents:
Vipul's Razor is a distributed, collaborative, spam detection and
filtering network.
sudo:
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments.
telnet:
Telnet is a popular protocol for logging into remote systems over the
Internet. The telnet package provides a command line telnet client.
Problem description:
cpio:
Fix File Permissions Vulnerability, Race condition in cpio 2.6 and earlier
allows local users to modify permissions of arbitrary files via a hard link
attack on a file while it is being decompressed, whose permissions are changed
by cpio after the decompression is complete.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2005-1111 to this issue.
Fix Directory Traversal Vulnerability, cpio 2.6 and earlier allows remote
attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2005-1229 to this issue.
razor-agents:
New Upstream.
Security Fix:Two vulnerabilities have been reported in
Razor-agents, which can be exploited by malicious people to
cause a DoS (Denial of Service).
An unspecified error in the preprocessing of certain HTML
messages can be exploited to crash the application.
A bug in the discovery logic causes Razor-agents to go into
an infinite loop and consume a large amount of memory when
discovery fails.
sudo:
New Upstream.
Fix A race condition in Sudo's command pathname handling that could
allow a user with Sudo privileges to run arbitrary commands.
telnet:
Security Fix: Telnet information disclosure vulnerability.
Gael Delalleau discovered an information disclosure issue in the way the
telnet client handles messages from a server. An attacker could construct
a malicious telnet server that collects information from the environment of
any victim who connects to it.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0488 to this issue.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.1/> and
<URI:http://www.trustix.org/errata/trustix-2.2/>
or directly at
<URI:http://www.trustix.org/errata/2005/0030/>
MD5sums of the packages:
- --------------------------------------------------------------------------
07d0890876dce9f5844bb41a13a8801e 2.2/rpms/cpio-2.5-10tr.i586.rpm
c1a7335c0fcf397de842d7bba32736bd 2.2/rpms/razor-agents-2.72-1tr.i586.rpm
c2a2d31e3cc1aaaa05c4a9cd5d424da9 2.2/rpms/sudo-1.6.8p9-1tr.i586.rpm
562674ea7eb29624ef4556c7c4d2441d 2.2/rpms/telnet-0.17-11tr.i586.rpm
20ddf56ddb3ec267e629649f8bd102bf 2.1/rpms/cpio-2.5-10tr.i586.rpm
7cc95ef9e66a22eba2e17937d38920bb 2.1/rpms/sudo-1.6.8p9-1tr.i586.rpm
a927853906347545c2a0fc0ef4fa7892 2.1/rpms/telnet-0.17-11tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCvAe0i8CEzsK9IksRAuroAJsHHzNtOSggqzmppifjbpB+UF4WZgCfahX1
1PIVDGSFLdSxDNPer+DnaK8=
=VUWx
-----END PGP SIGNATURE-----