Debian: 'slocate' vulnerability
Summary
Package : slocate
Problem type : local exploit
Debian-specific: no
Michel Kaempf reported a security problem in slocate (a secure version
of locate, a tool to quickly locate files on a filesystem) on bugtraq
which was originally discovered by zorgon. He discovered there was
a bug in the database reading code which made it overwrite a internal
structure with some input. He then showed this could be exploited
to trick slocate into executing arbitrary code by pointing it to a
carefully crafted database.
This has been fixed in version 2.4-2potato1 and we recommend that you
upgrade your slocate package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Source archives:
MD5 checksum: 9d15a0e95b501427f697e9031d8e62e8
MD5 checksum: 7effe675baba70e3b30ce41e9d231835
MD5 checksum: 185520e64e7b194b6d448f034e2f1c7a
Alpha architecture:
MD5 checksum: 90888e9f21437c6a3e7c7addbd244fdc
ARM architecture:
MD5 checksum: 8904b89a14f7a91f6c205fa37ad67466
Motorola 680x0 architecture:
MD5 checksum: 09bd79672ac452a5c10618a368a4b40a
Intel ia32 architecture:
MD5 checksum: ff79ebacf5cfa910608f3cdaff043255
PowerPC architecture:
MD5 checksum: 1f117700d339fa8acb8de938dab95cfa
Sun Sparc architecture:
MD5 checksum: 3059fe27465a9bc8738ea8e7a6f8f3e2
These files will be moved into
soon.
For not yet released architectures please refer to the appropriate
directory .