SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   slocate Vendors:   Lindsay, Kevin
(Red Hat Issues Fix) slocate Bug in Processing Long Paths Lets Local Users Deny Service
SecurityTracker Alert ID:  1014753
SecurityTracker URL:  http://securitytracker.com/id/1014753
CVE Reference:   CVE-2005-2499   (Links to External Site)
Date:  Aug 22 2005
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.7
Description:   A vulnerability was reported in slocate. A local user can cause denial of service conditions.

A local user can create a specially crafted directory structure with very long paths to prevent updatedb from fully scanning the system. As a result, the slocate database will be incomplete.

Miloslav Trmac reported this vulnerability.

Impact:   A local user can cause the slocate database to be incomplete.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c slocate-2.7-1.el2.1.src.rpm

i386:
422f42516805c04797c817a4e8c4d333 slocate-2.7-1.el2.1.i386.rpm

ia64:
68f823b854a10eec8a180b05cca7a240 slocate-2.7-1.el2.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c slocate-2.7-1.el2.1.src.rpm

ia64:
68f823b854a10eec8a180b05cca7a240 slocate-2.7-1.el2.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c slocate-2.7-1.el2.1.src.rpm

i386:
422f42516805c04797c817a4e8c4d333 slocate-2.7-1.el2.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c slocate-2.7-1.el2.1.src.rpm

i386:
422f42516805c04797c817a4e8c4d333 slocate-2.7-1.el2.1.i386.rpm

Vendor URL:  www.geekreview.org/slocate/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  2.1

Message History:   This archive entry is a follow-up to the message listed below.
Aug 22 2005 slocate Bug in Processing Long Paths Lets Local Users Deny Service



 Source Message Contents

Subject:  [RHSA-2005:747-02] Low: slocate security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: slocate security update
Advisory ID:       RHSA-2005:747-02
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-747.html
Issue date:        2005-08-22
Updated on:        2005-08-22
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-2499
- ---------------------------------------------------------------------

1. Summary:

An updated slocate package that fixes a denial of service issue is now
available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Slocate is a security-enhanced version of locate. Like locate, slocate
searches through a nightly-updated central database for files that match a
given pattern.

A bug was found in the way slocate processes very long paths. A local user
could create a carefully crafted directory structure that would prevent
updatedb from completing its file system scan, resulting in an incomplete
slocate database. The Common Vulnerabilities and Exposures project has
assigned the name CAN-2005-2499 to this issue.

Users are advised to upgrade to this updated package, which includes a
backported patch to resolve this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

165430 - CAN-2005-2499 slocate DOS


6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c  slocate-2.7-1.el2.1.src.rpm

i386:
422f42516805c04797c817a4e8c4d333  slocate-2.7-1.el2.1.i386.rpm

ia64:
68f823b854a10eec8a180b05cca7a240  slocate-2.7-1.el2.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c  slocate-2.7-1.el2.1.src.rpm

ia64:
68f823b854a10eec8a180b05cca7a240  slocate-2.7-1.el2.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c  slocate-2.7-1.el2.1.src.rpm

i386:
422f42516805c04797c817a4e8c4d333  slocate-2.7-1.el2.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/slocate-2.7-1.el2.1.src.rpm
48bc2399648a71b9cdc6f7eee3457f5c  slocate-2.7-1.el2.1.src.rpm

i386:
422f42516805c04797c817a4e8c4d333  slocate-2.7-1.el2.1.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2499

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFDCeA5XlSAg2UNWIIRAoS6AJ9Jic50A9zX3HHTbGiodEaG4N0HCgCgoygR
AznF3V+gwnjw3LRKSiBMH0E=
=v3Cf
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC