[PLDSA 27-1] New slocate packages fix buffer overflow
Krzysiek Taraszka
dzimi at pld.org.pl
Sun Feb 9 14:03:52 CET 2003
- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 27-1 security at pld.org.pl
http://www.pld.org.pl/security/ PLD Security Team
03 February 2003 http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------
Package : prior to slocate-2.6-4
Vulnerability : buffer overflow
Problem-Type : local
PLD-specific : no
CVE references : CAN-2003-0056
Upstream URL : www.usg.org.uk/advisories/2003.001.txt
A buffer overflow vulnerability was discovered in slocate by team USG.
The overflow appears when slocate is used with the -c and -r
parameters, using a 1024 (or 10240) byte string.
The above problems have been fixed in version 2.7-1 for the
current stable distribution (ra).
We recommend that you upgrade your slocate packages.
wget -c url
will fetch the file for you
rpm -Uhv file(s)*.rpm
will upgrade the referenced file.
If you are using "poldek" - the package manager, use the line as given below
for upgrade packages
poldek --update
will update the internal database
poldek --upgrade 'slocate*'
will install corrected packages
If you are using "apt" - the package manager, use the line as given below
for upgrade packages
apt-get update
will update the internal database
apt-get upgrade 'slocate*'
will install corrected packages
PLD Linux 1.0 alias ra
- --------------------
Source archives:
ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/slocate-2.7-1.src.rpm
MD5 checksum: d6ea744a7b43a9075910fb8949fbf644
I386 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/slocate-2.7-1.i386.rpm
MD5 checksum: d7c16b1c548f7fb1d64d776be80fbcc2
I586 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/slocate-2.7-1.i586.rpm
MD5 checksum: 0de590acfdc1daf41ec9a5efef367f87
I686 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/slocate-2.7-1.i686.rpm
MD5 checksum: dae764c4361bdfbb02aff0097c40751a
PowerPC Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/slocate-2.7-1.ppc.rpm
MD5 checksum: 6db576ed43768f54c4d85157146258a2
-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.
For i386 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security
More information about the pld-security-announce
mailing list