Bugtraq mailing list archives

Immunix Secured OS 7+ file update


From: Immunix Security Team <security () immunix com>
Date: Tue, 3 Jun 2003 18:13:19 -0700

-----------------------------------------------------------------------
        Immunix Secured OS Security Advisory

Packages updated:       file
Affected products:      Immunix OS 7+
Bugs fixed:             CAN-2003-0102
Date:                   Tue Jun  3 2003
Advisory ID:            IMNX-2003-7+-012-01
Author:                 Seth Arnold <sarnold () wirex com>
-----------------------------------------------------------------------

Description:
  An anonymous reporter has reported to iDEFENSE a vulnerability in file
  that could allow for a root compromise, should root run file on a
  specially crafted file. This is a local exploit, and requires a user
  to run "file" on potentially untrusted files.

  This release fixes this vulnerability, and adds a newer magic
  databased.

  References: http://www.securityfocus.com/archive/1/313837

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/file-3.30-7_imnx_3.41_1.i386.rpm

Immunix OS 7+ md5sums:
  bea08bde8952bb723993ad6dd8f5e188  RPMS/file-3.30-7_imnx_3.41_1.i386.rpm


GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security () wirex com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.

Attachment: _bin
Description:


Current thread: