-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Trustix Secure Linux Security Advisory #2006-0028 Package names: kernel, mysql Summary: Multiple vulnerabilities Date: 2006-05-19 Affected versions: Trustix Secure Linux 2.2 Trustix Secure Linux 3.0 Trustix Operating System - Enterprise Server 2 - -------------------------------------------------------------------------- Package description: kernel The kernel package contains the Linux kernel (vmlinuz), the core of your Trustix Secure Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. mysql MySQL is a true multi-user, multi-threaded SQL (Structured Query Language) database server. MySQL is a client/server implementation that consists of a server daemon (mysqld) and many different client programs/libraries. Problem description: kernel < TSL 3.0 > - New Upstream. - SECURITY Fix: Memory leak in __setlease in fs/locks.c allows attackers to cause a denial of service (memory consumption) via unspecified actions related to an "uninitialised return value," aka "slab leak." - lease_init in fs/locks.c allows attackers to cause a denial of service (fcntl_setlease lockup) via actions that cause lease_init to free a lock that might not have been allocated on the stack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2006-1859 and CVE-2006-1860 to these issue. mysql < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: Stefano Di Paola has reported some vulnerabilities in MySQL, which can be exploited by malicious users to disclose potentially sensitive information and compromise a vulnerable system. - The check_connection function in sql_parse.cc in MySQL allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read. - sql_parse.cc in MySQL allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2006-1516 and CVE-2006-1517 to these issues. Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this package, you may want to remove it from your system. Location: All Trustix Secure Linux updates are available from <URI:http://http.trustix.org/pub/trustix/updates/> <URI:ftp://ftp.trustix.org/pub/trustix/updates/> About Trustix Secure Linux: Trustix Secure Linux is a small Linux distribution for servers. With focus on security and stability, the system is painlessly kept safe and up to date from day one using swup, the automated software updater. Automatic updates: Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'. Questions? Check out our mailing lists: <URI:http://www.trustix.org/support/> Verification: This advisory along with all Trustix packages are signed with the TSL sign key. This key is available from: <URI:http://www.trustix.org/TSL-SIGN-KEY> The advisory itself is available from the errata pages at <URI:http://www.trustix.org/errata/trustix-2.2/> and <URI:http://www.trustix.org/errata/trustix-3.0/> or directly at <URI:http://www.trustix.org/errata/2006/0028/> MD5sums of the packages: - -------------------------------------------------------------------------- 0ed04afc275148c700aeec64e240451c 3.0/rpms/kernel-2.6.16.16-1tr.i586.rpm 3cdf67d6c8c5acc3e96a6543fc9e8cd2 3.0/rpms/kernel-doc-2.6.16.16-1tr.i586.rpm 799147b0868db427695ee833e4414cde 3.0/rpms/kernel-headers-2.6.16.16-1tr.i586.rpm e2dd897d5bb793d1494e7fd8af78cd2b 3.0/rpms/kernel-smp-2.6.16.16-1tr.i586.rpm d7c113d49c5e2ba204c27afb60a6e6e2 3.0/rpms/kernel-smp-headers-2.6.16.16-1tr.i586.rpm 91f966873b232ab7b1fbbbbc65cf733f 3.0/rpms/kernel-source-2.6.16.16-1tr.i586.rpm f44b1a5b6b02fe122319815ab001f14a 3.0/rpms/kernel-utils-2.6.16.16-1tr.i586.rpm 861e6a7a1d2ebdf210a214503a4b20b6 3.0/rpms/mysql-4.1.15-2tr.i586.rpm 756e3989d11e0dcb86622c31b29bab4b 3.0/rpms/mysql-bench-4.1.15-2tr.i586.rpm cdaafdf4b2fbf60aed648b929e482c07 3.0/rpms/mysql-client-4.1.15-2tr.i586.rpm 3078e6d5af7de569f2e52b6b0ec6c9f0 3.0/rpms/mysql-devel-4.1.15-2tr.i586.rpm b5f2a20cd65cfddda8c32ef7b0f2ea43 3.0/rpms/mysql-libs-4.1.15-2tr.i586.rpm 4033beeceee58179d87ac983a2926b51 3.0/rpms/mysql-shared-4.1.15-2tr.i586.rpm c107f7200fa671589f70090fa4382028 2.2/rpms/mysql-4.1.15-2tr.i586.rpm 1fcdaa37f5d4dc507901e9c9e48b18ab 2.2/rpms/mysql-bench-4.1.15-2tr.i586.rpm e566c6bce526c199eee0d18b3753a6e5 2.2/rpms/mysql-client-4.1.15-2tr.i586.rpm 286a2c5ae1bd5e746502510dc432a931 2.2/rpms/mysql-devel-4.1.15-2tr.i586.rpm 5ba319bd90a5c1c661eae10b8a26407e 2.2/rpms/mysql-libs-4.1.15-2tr.i586.rpm 695adb198f5d6e254173721663bda7f7 2.2/rpms/mysql-shared-4.1.15-2tr.i586.rpm - -------------------------------------------------------------------------- Trustix Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEbaHTi8CEzsK9IksRAqXzAKC5LIKmNGpZl/ETfj4LpkTk2uDhzQCgiIq7 btbw8rovnlVUngEpzn+9xbc= =2llL -----END PGP SIGNATURE-----