Linux Security
    Linux Security
    Linux Security

    Debian: 'slocate' vulnerability

    Date 16 Dec 2000
    3450
    Posted By LinuxSecurity Advisories
    Michel Kaempf reported a security problem in slocate on bugtraqwhich was originally discovered by zorgon.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-005-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                         Wichert Akkerman
    December 17, 2000
    - ------------------------------------------------------------------------
    
    
    Package        : slocate
    Problem type   : local exploit
    Debian-specific: no
    
    Michel Kaempf reported a security problem in slocate (a secure version
    of locate, a tool to quickly locate files on a filesystem) on bugtraq
    which was originally discovered by zorgon. He discovered there was
    a bug in the database reading code which made it overwrite a internal
    structure with some input. He then showed this could be exploited
    to trick slocate into executing arbitrary code by pointing it to a
    carefully crafted database.
    
    This has been fixed in version 2.4-2potato1 and we recommend that you
    upgrade your slocate package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         https://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.diff.gz
          MD5 checksum: 9d15a0e95b501427f697e9031d8e62e8
         https://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.dsc
          MD5 checksum: 7effe675baba70e3b30ce41e9d231835
         https://security.debian.org/dists/stable/updates/main/source/slocate_2.4.orig.tar.gz
          MD5 checksum: 185520e64e7b194b6d448f034e2f1c7a
    
      Alpha architecture:
         https://security.debian.org/dists/stable/updates/main/binary-alpha/slocate_2.4-2potato1_alpha.deb
          MD5 checksum: 90888e9f21437c6a3e7c7addbd244fdc
    
      ARM architecture:
         https://security.debian.org/dists/stable/updates/main/binary-arm/slocate_2.4-2potato1_arm.deb
          MD5 checksum: 8904b89a14f7a91f6c205fa37ad67466
    
      Motorola 680x0 architecture:
         https://security.debian.org/dists/stable/updates/main/binary-m68k/slocate_2.4-2potato1_m68k.deb
          MD5 checksum: 09bd79672ac452a5c10618a368a4b40a
    
      Intel ia32 architecture:
         https://security.debian.org/dists/stable/updates/main/binary-i386/slocate_2.4-2potato1_i386.deb
          MD5 checksum: ff79ebacf5cfa910608f3cdaff043255
    
      PowerPC architecture:
         https://security.debian.org/dists/stable/updates/main/binary-powerpc/slocate_2.4-2potato1_powerpc.deb
          MD5 checksum: 1f117700d339fa8acb8de938dab95cfa
    
      Sun Sparc architecture:
         https://security.debian.org/dists/stable/updates/main/binary-sparc/slocate_2.4-2potato1_sparc.deb
          MD5 checksum: 3059fe27465a9bc8738ea8e7a6f8f3e2
    
      These files will be moved into
       ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    
    
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.