---

Trustix Secure Linux Advisories: mysql, openssh


Trustix Secure Linux Security Advisory #2003-0034

Package name: mysql
Summary: New upstream versions
Date: 2003-09-17
Affected versions: TSL 1.5, 2.0

Package description:
MySQL is a true multi-user, multi-threaded SQL (Structured Query
Language) database server. MySQL is a client/server implementation
that consists of a server daemon (mysqld) and many different client
programs/libraries.

Problem description:
From the mysql advisory:

Fixed buffer overflow in SET PASSWORD which could potentially be
exploited by MySQL users with root privileges to execute random
code or to gain shell access (thanks to Jedi/Sector One for
spotting and reporting this one).

We have updated the packages in 1.5 and 2.0 to the latest stable
versions.

Action:
We recommend that all systems with this package installed be
upgraded. Please note that if you do not need the functionality
provided by this package, you may want to remove it from your
system.

Location:
All TSL updates are available from
<URI:http://www.trustix.net/pub/Trustix/updates/>

<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>

About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers.
With focus on security and stability, the system is painlessly kept
safe and up to date from day one using swup, the automated software
updater.

Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using ‘swup –upgrade’.

Public testing:
These packages have been available for public testing for some
time. If you want to contribute by testing the various packages in
the testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://www.trustix.net/pub/Trustix/testing/>
<URI:ftp://ftp.trustix.net/pub/Trustix/testing/>

You may also use swup for public testing of updates for TSL 2.0
and later:

  site {
      class = 0
      location = "http://snow.trustix.org/cloud/rdfs/latest.rdf"
      regexp = ".*"
  }

Questions?
Check out our mailing lists:
<URI:http://www.trustix.net/support/>

Verification:
This advisory along with all TSL packages are signed with the TSL
sign key. This key is available from:
<URI:http://www.trustix.net/TSL-GPG-KEY>

The advisory itself is available from the errata pages at
<URI:http://www.trustix.net/errata/trustix-1.5/>
and
<URI:http://www.trustix.net/errata/trustix-2.0/>
or directly at
<URI:http://www.trustix.net/errata/misc/2003/TSL-2003-0034-mysql.asc.txt>

MD5sums of the packages:


ae94dfc7600f68670bcf246ce435f2d1
./2.0/SRPMS/mysql-4.0.15-3tr.src.rpm
2ac208f4f0910fa86792f8a20af7f082
./2.0/RPMS/mysql-shared-4.0.15-3tr.i586.rpm
260e4a6f5e8670b579210c5b78dfd49b
./2.0/RPMS/mysql-libs-4.0.15-3tr.i586.rpm
fdf654a3f02998c590778c5172d235e5
./2.0/RPMS/mysql-devel-4.0.15-3tr.i586.rpm
92b7468cd88a4cb7322a671bda6f4235
./2.0/RPMS/mysql-client-4.0.15-3tr.i586.rpm
fb62317fb3243f186c4f821be3d7e300
./2.0/RPMS/mysql-bench-4.0.15-3tr.i586.rpm
151c6bcdfc77ea41098ef5163210faed
./2.0/RPMS/mysql-4.0.15-3tr.i586.rpm
90ad9bb56b009d103c118a250b17b5fe
./1.5/SRPMS/mysql-3.23.58-1tr.src.rpm
8a4d0a8ea2d74718e70b1ddf1ab4c0cc
./1.5/RPMS/mysql-shared-3.23.58-1tr.i586.rpm
6a2a7efcc54ef5d17ce8b0c7fbbb01a6
./1.5/RPMS/mysql-devel-3.23.58-1tr.i586.rpm
99ba83b4de24019b8fa04c34ef638c14
./1.5/RPMS/mysql-client-3.23.58-1tr.i586.rpm
15d6ad9e22e45757a906526be65b9972
./1.5/RPMS/mysql-bench-3.23.58-1tr.i586.rpm
337c341126022123229edb0b567f2825
./1.5/RPMS/mysql-3.23.58-1tr.i586.rpm


Trustix Security Team


Trustix Secure Linux Security Advisory #2003-0033

Package name: openssh
Summary: Buffer Management error
Date: 2003-09-17
Affected versions: TSL 1.2, 1.5, 2.0

Package description:
OpenSSH is OpenBSD’s rework of the last free version of SSH,
bringing it up to date in terms of security and features, as well
as removing all patented algorithms to seperate libraries
(OpenSSL).

Problem description:
Taken from the announcement of openssh 3.7.1:

All versions of OpenSSH’s sshd prior to 3.7.1 contain buffer
management errors. It is uncertain whether these errors are
potentially exploitable, however, we prefer to see bugs fixed
proactively.

OpenSSH 3.7 fixed one of these bugs.

OpenSSH 3.7.1 fixes more similar bugs.

The TSL team has choosen to backport these fixes into the
various versions of openssh packaged in TSL.

Action:
We recommend that all systems with this package installed be
upgraded. Please note that if you do not need the functionality
provided by this package, you may want to remove it from your
system.

Location:
All TSL updates are available from
<URI:http://www.trustix.net/pub/Trustix/updates/>

<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>

About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers.
With focus on security and stability, the system is painlessly kept
safe and up to date from day one using swup, the automated software
updater.

Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using ‘swup –upgrade’.

Users of TSL 1.2 can get SWUP from:
<URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>
(In later versions of TSL, SWUP is included in the default
installation.)

Public testing:
These packages have been available for public testing for some
time. If you want to contribute by testing the various packages in
the testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://www.trustix.net/pub/Trustix/testing/>
<URI:ftp://ftp.trustix.net/pub/Trustix/testing/>

You may also use swup for public testing of updates for TSL 2.0
and later:

  site {
      class = 0
      location = "http://snow.trustix.org/cloud/rdfs/latest.rdf"
      regexp = ".*"
  }

Questions?
Check out our mailing lists:
<URI:http://www.trustix.net/support/>

Verification:
This advisory along with all TSL packages are signed with the TSL
sign key. This key is available from:
<URI:http://www.trustix.net/TSL-GPG-KEY>

The advisory itself is available from the errata pages at
<URI:http://www.trustix.net/errata/trustix-1.2/>,

<URI:http://www.trustix.net/errata/trustix-1.5/>
and
<URI:http://www.trustix.net/errata/trustix-2.0/>

or directly at
<URI:http://www.trustix.net/errata/misc/2003/TSL-2003-0033-openssh.asc.txt>

MD5sums of the packages:


55d636ae51c9e355e02fd9988c78471f
./2.0/SRPMS/openssh-3.6.1p2-4tr.src.rpm
3855df802a31aef02312537c44f24d5f
./2.0/RPMS/openssh-server-config-3.6.1p2-4tr.i586.rpm
3b99832e6d4ee04058c69b4f8767feab
./2.0/RPMS/openssh-server-3.6.1p2-4tr.i586.rpm
68ac388fc68fe725cb6cdd8207017c1f
./2.0/RPMS/openssh-clients-3.6.1p2-4tr.i586.rpm
1bb394fdf22f158a4c5ce154a5284318
./2.0/RPMS/openssh-3.6.1p2-4tr.i586.rpm
abe0f77d98845e40d14548be63f7341c
./1.5/SRPMS/openssh-3.1.0p1-6tr.src.rpm
9af4176b0919f9ee54e83df88248a9dd
./1.5/RPMS/openssh-server-3.1.0p1-6tr.i586.rpm
877030c628b6986e034474068c41e139
./1.5/RPMS/openssh-clients-3.1.0p1-6tr.i586.rpm
d97d217516f01761d7bc610dfd07e51e
./1.5/RPMS/openssh-3.1.0p1-6tr.i586.rpm
abe0f77d98845e40d14548be63f7341c
./1.2/SRPMS/openssh-3.1.0p1-6tr.src.rpm
32a74b28d709f09e4752daeb52113cb3
./1.2/RPMS/openssh-server-3.1.0p1-6tr.i586.rpm
568a01beee4559b803d6457555850507
./1.2/RPMS/openssh-clients-3.1.0p1-6tr.i586.rpm
925a2a23976c90b5f046c4966c7df80b
./1.2/RPMS/openssh-3.1.0p1-6tr.i586.rpm


Trustix Security Team

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis