lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050624131924.GA10128@tsunami.trustix.net>
Date: Fri, 24 Jun 2005 15:19:24 +0200
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2005-0030 - multi


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2005-0030

Package name: cpio, razor-agents, sudo, telnet
Summary:           Multiple security fixes
Date:              2005-06-24
Affected versions: Trustix Secure Linux 2.1
                   Trustix Secure Linux 2.2
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  cpio:
  GNU cpio copies files into or out of a cpio or tar archive.

  razor-agents:
  Vipul's Razor is a distributed, collaborative, spam detection and
  filtering network.

  sudo:
  Sudo (superuser do) allows a system administrator to give certain
  users (or groups of users) the ability to run some (or all) commands
  as root while logging all commands and arguments.

  telnet:
  Telnet is a popular protocol for logging into remote systems over the
  Internet.  The telnet package provides a command line telnet client.

Problem description:
  cpio:
  Fix File Permissions Vulnerability, Race condition in cpio 2.6 and earlier
  allows local users to modify permissions of arbitrary files via a hard link
  attack on a file while it is being decompressed, whose permissions are changed
  by cpio after the decompression is complete.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the name CAN-2005-1111 to this issue.

  Fix Directory Traversal Vulnerability, cpio 2.6 and earlier allows remote
  attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.

  The Common Vulnerabilities and Exposures project (cve.mitre.org)
  has assigned the name CAN-2005-1229 to this issue.

  razor-agents:
  New Upstream.
  Security Fix:Two vulnerabilities have been  reported in 
  Razor-agents, which can be exploited by malicious  people to
  cause a DoS (Denial of Service).

  An unspecified error in the preprocessing of certain HTML
  messages can be exploited to crash the application.

  A bug in the discovery logic causes Razor-agents to go into
  an infinite loop and consume a large amount of memory when
  discovery fails.

  sudo:
  New Upstream.
  Fix A race condition in Sudo's command pathname handling that could
  allow a user with Sudo privileges to run arbitrary commands.

  telnet:
  Security Fix: Telnet information disclosure vulnerability.
  Gael Delalleau discovered an information disclosure issue in the way the
  telnet client handles messages from a server.  An attacker could construct
  a malicious telnet server that collects information from the environment of
  any victim who connects to it.  

  The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned 
  the name CAN-2005-0488 to this issue.
 

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.1/> and
  <URI:http://www.trustix.org/errata/trustix-2.2/>
  or directly at
  <URI:http://www.trustix.org/errata/2005/0030/>


MD5sums of the packages:
- --------------------------------------------------------------------------
07d0890876dce9f5844bb41a13a8801e  2.2/rpms/cpio-2.5-10tr.i586.rpm
c1a7335c0fcf397de842d7bba32736bd  2.2/rpms/razor-agents-2.72-1tr.i586.rpm
c2a2d31e3cc1aaaa05c4a9cd5d424da9  2.2/rpms/sudo-1.6.8p9-1tr.i586.rpm
562674ea7eb29624ef4556c7c4d2441d  2.2/rpms/telnet-0.17-11tr.i586.rpm

20ddf56ddb3ec267e629649f8bd102bf  2.1/rpms/cpio-2.5-10tr.i586.rpm
7cc95ef9e66a22eba2e17937d38920bb  2.1/rpms/sudo-1.6.8p9-1tr.i586.rpm
a927853906347545c2a0fc0ef4fa7892  2.1/rpms/telnet-0.17-11tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCvAe0i8CEzsK9IksRAuroAJsHHzNtOSggqzmppifjbpB+UF4WZgCfahX1
1PIVDGSFLdSxDNPer+DnaK8=
=VUWx
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ