exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

rhsa.2000-128-02.slocate

rhsa.2000-128-02.slocate
Posted Dec 22, 2000
Site redhat.com

Red Hat Security Advisory - New slocate packages are available for Red Hat Linux 6.x and Red Hat Linux 7. These fix a heap overflow in the database parsing code of slocate allowing group slocate access.

tags | overflow
systems | linux, redhat
SHA-256 | 9ef88c164fb6814d053efbaecb132a8bed3a64a0558c53ee57f3796cba96c540

rhsa.2000-128-02.slocate

Change Mirror Download
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: New slocate packages available to fix local group slocate co
mpromise
Advisory ID: RHSA-2000:128-02
Issue date: 2000-12-19
Updated on: 2000-12-19
Product: Red Hat Linux
Keywords: slocate heap overflow
Cross references:
---------------------------------------------------------------------

1. Topic:

New slocate packages are availble for Red Hat Linux 6.x and Red Hat
Linux 7. These fix a problem with the database parsing code in slocate.
(slocate was not shipped with Red Hat Linux prior to version 6.0, so
earlier versions are not affected.)

2. Relevant releases/architectures:

Red Hat Linux 6.0 - alpha, i386, sparc

Red Hat Linux 6.1 - alpha, i386, sparc

Red Hat Linux 6.2 - alpha, i386, sparc

Red Hat Linux 7.0 - alpha, i386

3. Problem description:

A problem existed in the slocate database parsing code. By using a
carefully
crafted database, a local user could overwrite some of slocate's internal
structures, leading to a local group slocate compromise.

The affect of this compromise is that users could read the entire slocate
database, and therefore learn the locations of files that they normally
would not have permissions to locate.

Thanks to Michel Kaempf, zorgon@linuxstart.com, and Michal Zalewski
for pointing out the vulnerability.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

21388 - heap corruption vulnerability

6. RPMs required:

Red Hat Linux 6.0:

SRPMS:
ftp://updates.redhat.com//6.0/SRPMS/slocate-2.4-0.6.x.src.rpm

alpha:
ftp://updates.redhat.com//6.0/alpha/slocate-2.4-0.6.x.alpha.rpm

i386:
ftp://updates.redhat.com//6.0/i386/slocate-2.4-0.6.x.i386.rpm

sparc:
ftp://updates.redhat.com//6.0/sparc/slocate-2.4-0.6.x.sparc.rpm

Red Hat Linux 6.1:

SRPMS:
ftp://updates.redhat.com//6.1/SRPMS/slocate-2.4-0.6.x.src.rpm

alpha:
ftp://updates.redhat.com//6.1/alpha/slocate-2.4-0.6.x.alpha.rpm
ftp://updates.redhat.com//6.1/alpha/slocate-2.4-0.6.x.alpha.rpm
ftp://updates.redhat.com//6.1/alpha/slocate-2.4-0.6.x.alpha.rpm

i386:
ftp://updates.redhat.com//6.1/i386/slocate-2.4-0.6.x.i386.rpm

sparc:
ftp://updates.redhat.com//6.1/sparc/slocate-2.4-0.6.x.sparc.rpm

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com//6.2/SRPMS/slocate-2.4-0.6.x.src.rpm
ftp://updates.redhat.com//6.2/SRPMS/slocate-2.4-0.6.x.src.rpm
ftp://updates.redhat.com//6.2/SRPMS/slocate-2.4-0.6.x.src.rpm
ftp://updates.redhat.com//6.2/SRPMS/slocate-2.4-1.src.rpm

alpha:
ftp://updates.redhat.com//6.2/alpha/slocate-2.4-0.6.x.alpha.rpm

i386:
ftp://updates.redhat.com//6.2/i386/slocate-2.4-0.6.x.i386.rpm

sparc:
ftp://updates.redhat.com//6.2/sparc/slocate-2.4-0.6.x.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com//7.0/SRPMS/slocate-2.4-1.src.rpm

alpha:
ftp://updates.redhat.com//7.0/alpha/slocate-2.4-1.alpha.rpm

i386:
ftp://updates.redhat.com//7.0/i386/slocate-2.4-1.i386.rpm



7. Verification:

MD5 sum Package Name
--------------------------------------------------------------------------
ba211d65172160c4a6cba5a65bd93f60 6.0/alpha/slocate-2.4-0.6.x.alpha.rpm
8b63c4c1fec7759f79559a616c5f15e9 6.0/i386/slocate-2.4-0.6.x.i386.rpm
eeea0298b59fdfa6e475ee732a385942 6.0/sparc/slocate-2.4-0.6.x.sparc.rpm
ba211d65172160c4a6cba5a65bd93f60 6.1/alpha/slocate-2.4-0.6.x.alpha.rpm
8b63c4c1fec7759f79559a616c5f15e9 6.1/i386/slocate-2.4-0.6.x.i386.rpm
eeea0298b59fdfa6e475ee732a385942 6.1/sparc/slocate-2.4-0.6.x.sparc.rpm
ba211d65172160c4a6cba5a65bd93f60 6.2/alpha/slocate-2.4-0.6.x.alpha.rpm
8b63c4c1fec7759f79559a616c5f15e9 6.2/i386/slocate-2.4-0.6.x.i386.rpm
eeea0298b59fdfa6e475ee732a385942 6.2/sparc/slocate-2.4-0.6.x.sparc.rpm
5ee5ec5f65e200e9d03f4d2dda43ce07 7.0/alpha/slocate-2.4-1.alpha.rpm
ba3b1c1743ec957cb8abb05818e05854 7.0/i386/slocate-2.4-1.i386.rpm
53abff41632acc6764c14ba59384cf84 6.0/SRPMS/slocate-2.4-0.6.x.src.rpm
53abff41632acc6764c14ba59384cf84 6.1/SRPMS/slocate-2.4-0.6.x.src.rpm
53abff41632acc6764c14ba59384cf84 6.2/SRPMS/slocate-2.4-0.6.x.src.rpm
2672ef24c8ca7afbcb6a327622d71c42 7.0/SRPMS/slocate-2.4-1.src.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

http://www.securityfocus.com/bid/2004


Copyright(c) 2000 Red Hat, Inc.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close