Debian: 'slocate' vulnerability
Posted by Team   
Debian Michel Kaempf reported a security problem in slocate on bugtraqwhich was originally discovered by zorgon.

- ------------------------------------------------------------------------
Debian Security Advisory DSA-005-1                                  Wichert Akkerman
December 17, 2000
- ------------------------------------------------------------------------

Package        : slocate
Problem type   : local exploit
Debian-specific: no

Michel Kaempf reported a security problem in slocate (a secure version
of locate, a tool to quickly locate files on a filesystem) on bugtraq
which was originally discovered by zorgon. He discovered there was
a bug in the database reading code which made it overwrite a internal
structure with some input. He then showed this could be exploited
to trick slocate into executing arbitrary code by pointing it to a
carefully crafted database.

This has been fixed in version 2.4-2potato1 and we recommend that you
upgrade your slocate package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
      MD5 checksum: 9d15a0e95b501427f697e9031d8e62e8
      MD5 checksum: 7effe675baba70e3b30ce41e9d231835
      MD5 checksum: 185520e64e7b194b6d448f034e2f1c7a

  Alpha architecture:
      MD5 checksum: 90888e9f21437c6a3e7c7addbd244fdc

  ARM architecture:
      MD5 checksum: 8904b89a14f7a91f6c205fa37ad67466

  Motorola 680x0 architecture:
      MD5 checksum: 09bd79672ac452a5c10618a368a4b40a

  Intel ia32 architecture:
      MD5 checksum: ff79ebacf5cfa910608f3cdaff043255

  PowerPC architecture:
      MD5 checksum: 1f117700d339fa8acb8de938dab95cfa

  Sun Sparc architecture:
      MD5 checksum: 3059fe27465a9bc8738ea8e7a6f8f3e2

  These files will be moved into*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory$arch/ .