dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Debian Security Advisory: slocate local exploit

Dec 17, 2000, 16:10 (0 Talkback[s])

Date: Sun, 17 Dec 2000 02:53:46 +0100
From: Wichert Akkerman 
To: debian-security-announce@lists.debian.org
Subject: [SECURITY] [DSA-005-1] slocate local exploit
Resent-Date: Sun, 17 Dec 2000 02:10:47 GMT


------------------------------------------------------------------------
Debian Security Advisory DSA-005-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
December 17, 2000
------------------------------------------------------------------------


Package        : slocate
Problem type   : local exploit
Debian-specific: no

Michel Kaempf reported a security problem in slocate (a secure version
of locate, a tool to quickly locate files on a filesystem) on bugtraq
which was originally discovered by zorgon. He discovered there was
a bug in the database reading code which made it overwrite a internal
structure with some input. He then showed this could be exploited
to trick slocate into executing arbitrary code by pointing it to a
carefully crafted database.

This has been fixed in version 2.4-2potato1 and we recommend that you
upgrade your slocate package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.diff.gz
      MD5 checksum: 9d15a0e95b501427f697e9031d8e62e8
    http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.dsc
      MD5 checksum: 7effe675baba70e3b30ce41e9d231835
    http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.dsc
      MD5 checksum: 185520e64e7b194b6d448f034e2f1c7a

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/slocate_2.4-2potato1_alpha.deb
      MD5 checksum: 90888e9f21437c6a3e7c7addbd244fdc

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/slocate_2.4-2potato1_arm.deb
      MD5 checksum: 8904b89a14f7a91f6c205fa37ad67466

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/slocate_2.4-2potato1_m68k.deb
      MD5 checksum: 09bd79672ac452a5c10618a368a4b40a

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/slocate_2.4-2potato1_i386.deb
      MD5 checksum: ff79ebacf5cfa910608f3cdaff043255

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/slocate_2.4-2potato1_powerpc.deb
      MD5 checksum: 1f117700d339fa8acb8de938dab95cfa

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/slocate_2.4-2potato1_sparc.deb
      MD5 checksum: 3059fe27465a9bc8738ea8e7a6f8f3e2

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org