Date: Fri, 19 May 2006 13:43:02 +0200
From: Trustix Security Advisor <tsl@trustix.org.>
To: [email protected]Subject: TSLSA-2006-0028 - multi
Message-ID: <20060519114302.GA20215@tsunami.trustix.net.>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0028
Package names: kernel, mysql
Summary: Multiple vulnerabilities
Date: 2006-05-19
Affected versions: Trustix Secure Linux 2.2
Trustix Secure Linux 3.0
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
kernel
The kernel package contains the Linux kernel (vmlinuz), the core of your
Trustix Secure Linux operating system. The kernel handles the basic
functions of the operating system: memory allocation, process allocation,
device input and output, etc.
mysql
MySQL is a true multi-user, multi-threaded SQL (Structured Query
Language) database server. MySQL is a client/server implementation
that consists of a server daemon (mysqld) and many different client
programs/libraries.
Problem description:
kernel < TSL 3.0 >
- New Upstream.
- SECURITY Fix: Memory leak in __setlease in fs/locks.c allows
attackers to cause a denial of service (memory consumption) via
unspecified actions related to an "uninitialised return value,"
aka "slab leak."
- lease_init in fs/locks.c allows attackers to cause a denial of
service (fcntl_setlease lockup) via actions that cause lease_init
to free a lock that might not have been allocated on the stack.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2006-1859 and CVE-2006-1860 to these issue.
mysql < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Stefano Di Paola has reported some vulnerabilities in
MySQL, which can be exploited by malicious users to disclose
potentially sensitive information and compromise a vulnerable system.
- The check_connection function in sql_parse.cc in MySQL allows remote
attackers to read portions of memory via a username without a trailing
null byte, which causes a buffer over-read.
- sql_parse.cc in MySQL allows remote attackers to obtain sensitive
information via a COM_TABLE_DUMP request with an incorrect packet
length, which includes portions of memory in an error message.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2006-1516 and CVE-2006-1517 to these issues.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2006/0028/>
MD5sums of the packages:
- --------------------------------------------------------------------------
0ed04afc275148c700aeec64e240451c 3.0/rpms/kernel-2.6.16.16-1tr.i586.rpm
3cdf67d6c8c5acc3e96a6543fc9e8cd2 3.0/rpms/kernel-doc-2.6.16.16-1tr.i586.rpm
799147b0868db427695ee833e4414cde 3.0/rpms/kernel-headers-2.6.16.16-1tr.i586.rpm
e2dd897d5bb793d1494e7fd8af78cd2b 3.0/rpms/kernel-smp-2.6.16.16-1tr.i586.rpm
d7c113d49c5e2ba204c27afb60a6e6e2 3.0/rpms/kernel-smp-headers-2.6.16.16-1tr.i586.rpm
91f966873b232ab7b1fbbbbc65cf733f 3.0/rpms/kernel-source-2.6.16.16-1tr.i586.rpm
f44b1a5b6b02fe122319815ab001f14a 3.0/rpms/kernel-utils-2.6.16.16-1tr.i586.rpm
861e6a7a1d2ebdf210a214503a4b20b6 3.0/rpms/mysql-4.1.15-2tr.i586.rpm
756e3989d11e0dcb86622c31b29bab4b 3.0/rpms/mysql-bench-4.1.15-2tr.i586.rpm
cdaafdf4b2fbf60aed648b929e482c07 3.0/rpms/mysql-client-4.1.15-2tr.i586.rpm
3078e6d5af7de569f2e52b6b0ec6c9f0 3.0/rpms/mysql-devel-4.1.15-2tr.i586.rpm
b5f2a20cd65cfddda8c32ef7b0f2ea43 3.0/rpms/mysql-libs-4.1.15-2tr.i586.rpm
4033beeceee58179d87ac983a2926b51 3.0/rpms/mysql-shared-4.1.15-2tr.i586.rpm
c107f7200fa671589f70090fa4382028 2.2/rpms/mysql-4.1.15-2tr.i586.rpm
1fcdaa37f5d4dc507901e9c9e48b18ab 2.2/rpms/mysql-bench-4.1.15-2tr.i586.rpm
e566c6bce526c199eee0d18b3753a6e5 2.2/rpms/mysql-client-4.1.15-2tr.i586.rpm
286a2c5ae1bd5e746502510dc432a931 2.2/rpms/mysql-devel-4.1.15-2tr.i586.rpm
5ba319bd90a5c1c661eae10b8a26407e 2.2/rpms/mysql-libs-4.1.15-2tr.i586.rpm
695adb198f5d6e254173721663bda7f7 2.2/rpms/mysql-shared-4.1.15-2tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEbaHTi8CEzsK9IksRAqXzAKC5LIKmNGpZl/ETfj4LpkTk2uDhzQCgiIq7
btbw8rovnlVUngEpzn+9xbc=
=2llL
-----END PGP SIGNATURE-----