[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060224140026.GA902@tsunami.trustix.net>
Date: Fri, 24 Feb 2006 15:00:26 +0100
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2006-0010 - multi
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0010
Package names: sudo, tar
Summary: Multiple vulnerabilities
Date: 2006-02-24
Affected versions: Trustix Secure Linux 2.2
Trustix Secure Linux 3.0
Trustix Operating System - Enterprise Server 2
- --------------------------------------------------------------------------
Package description:
sudo
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.
tar
The GNU tar program saves many files together in one archive and can
restore individual files (or all of the files) from that archive. Tar
can also be used to add supplemental files to an archive and to update
or list files in the archive. Tar includes multivolume support,
automatic archive compression/decompression, the ability to perform
remote archives, and the ability to perform incremental and full
backups.
Problem description:
sudo < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- New Upstream
- SECURITY Fix: Tavis Ormandy has reported a vulnerability in Sudo caused
due to an error within the environment cleaning. This can be exploited
by a user with sudo access to a python script to gain access to an
interactive python prompt via the "PYTHONINSPECT" environment variable.
The Common Vulnerabilities and Exposures project has assigned the
name CVE-2006-0151 to this issue.
tar < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Fixed Heap overlfow CVE-2006-0300.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.2/> and
<URI:http://www.trustix.org/errata/trustix-3.0/>
or directly at
<URI:http://www.trustix.org/errata/2006/0010/>
MD5sums of the packages:
- --------------------------------------------------------------------------
95f8080b3b83384fce9eb7ef5701d2d7 3.0/rpms/sudo-1.6.8p12-1tr.i586.rpm
9fb75a447751e340e797095b0268b4cf 3.0/rpms/tar-1.15.1-5tr.i586.rpm
77c71e4be7b102b01836572fcfbb8310 2.2/rpms/sudo-1.6.8p12-1tr.i586.rpm
21f141baeeea7691d0e76158d65afdc8 2.2/rpms/tar-1.14-2tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (GNU/Linux)
iD8DBQFD/wcBi8CEzsK9IksRAsCnAJ9wUR5qXGqbyliUQNn3T3PMQhokwACfdCZp
fRECwBt+iMzxMG74qNONjKs=
=SLHd
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists