lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060519114302.GA20215@tsunami.trustix.net>
Date: Fri, 19 May 2006 13:43:02 +0200
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2006-0028 - multi


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0028

Package names:	   kernel, mysql
Summary:           Multiple vulnerabilities
Date:              2006-05-19
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  kernel
  The kernel package contains the Linux kernel (vmlinuz), the core of your
  Trustix Secure Linux operating system.  The kernel handles the basic
  functions of the operating system:  memory allocation, process allocation,
  device input and output, etc.

  mysql 
  MySQL is a true multi-user, multi-threaded SQL (Structured Query
  Language) database server. MySQL is a client/server implementation
  that consists of a server daemon (mysqld) and many different client
  programs/libraries. 

Problem description:
  kernel < TSL 3.0 >
  - New Upstream.
  - SECURITY Fix: Memory leak in __setlease in fs/locks.c allows
    attackers to cause a denial of service (memory consumption) via
    unspecified actions related to an "uninitialised return value,"
    aka "slab leak."
  - lease_init in fs/locks.c allows attackers to cause a denial of
    service (fcntl_setlease lockup) via actions that cause lease_init
    to free a lock that might not have been allocated on the stack.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2006-1859 and CVE-2006-1860 to these issue.

  mysql < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - SECURITY Fix: Stefano Di Paola has reported some vulnerabilities in
    MySQL, which can be exploited by malicious users to disclose
    potentially sensitive information and compromise a vulnerable system.
  - The check_connection function in sql_parse.cc in MySQL allows remote
    attackers to read portions of memory via a username without a trailing
    null byte, which causes a buffer over-read.
  - sql_parse.cc in MySQL allows remote attackers to obtain sensitive
    information via a COM_TABLE_DUMP request with an incorrect packet
    length, which includes portions of memory in an error message.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2006-1516 and CVE-2006-1517 to these issues.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0028/>


MD5sums of the packages:
- --------------------------------------------------------------------------
0ed04afc275148c700aeec64e240451c  3.0/rpms/kernel-2.6.16.16-1tr.i586.rpm
3cdf67d6c8c5acc3e96a6543fc9e8cd2  3.0/rpms/kernel-doc-2.6.16.16-1tr.i586.rpm
799147b0868db427695ee833e4414cde  3.0/rpms/kernel-headers-2.6.16.16-1tr.i586.rpm
e2dd897d5bb793d1494e7fd8af78cd2b  3.0/rpms/kernel-smp-2.6.16.16-1tr.i586.rpm
d7c113d49c5e2ba204c27afb60a6e6e2  3.0/rpms/kernel-smp-headers-2.6.16.16-1tr.i586.rpm
91f966873b232ab7b1fbbbbc65cf733f  3.0/rpms/kernel-source-2.6.16.16-1tr.i586.rpm
f44b1a5b6b02fe122319815ab001f14a  3.0/rpms/kernel-utils-2.6.16.16-1tr.i586.rpm
861e6a7a1d2ebdf210a214503a4b20b6  3.0/rpms/mysql-4.1.15-2tr.i586.rpm
756e3989d11e0dcb86622c31b29bab4b  3.0/rpms/mysql-bench-4.1.15-2tr.i586.rpm
cdaafdf4b2fbf60aed648b929e482c07  3.0/rpms/mysql-client-4.1.15-2tr.i586.rpm
3078e6d5af7de569f2e52b6b0ec6c9f0  3.0/rpms/mysql-devel-4.1.15-2tr.i586.rpm
b5f2a20cd65cfddda8c32ef7b0f2ea43  3.0/rpms/mysql-libs-4.1.15-2tr.i586.rpm
4033beeceee58179d87ac983a2926b51  3.0/rpms/mysql-shared-4.1.15-2tr.i586.rpm

c107f7200fa671589f70090fa4382028  2.2/rpms/mysql-4.1.15-2tr.i586.rpm
1fcdaa37f5d4dc507901e9c9e48b18ab  2.2/rpms/mysql-bench-4.1.15-2tr.i586.rpm
e566c6bce526c199eee0d18b3753a6e5  2.2/rpms/mysql-client-4.1.15-2tr.i586.rpm
286a2c5ae1bd5e746502510dc432a931  2.2/rpms/mysql-devel-4.1.15-2tr.i586.rpm
5ba319bd90a5c1c661eae10b8a26407e  2.2/rpms/mysql-libs-4.1.15-2tr.i586.rpm
695adb198f5d6e254173721663bda7f7  2.2/rpms/mysql-shared-4.1.15-2tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEbaHTi8CEzsK9IksRAqXzAKC5LIKmNGpZl/ETfj4LpkTk2uDhzQCgiIq7
btbw8rovnlVUngEpzn+9xbc=
=2llL
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ