Immunix Secured OS 7+ file update

From: Immunix Security Team (securityat_private)
Date: Tue Jun 03 2003 - 18:13:19 PDT

  • Next message: Immunix Security Team: "Immunix Secured OS 7+ wget update"

    -----------------------------------------------------------------------
    	Immunix Secured OS Security Advisory
    
    Packages updated:	file
    Affected products:	Immunix OS 7+
    Bugs fixed:		CAN-2003-0102
    Date:			Tue Jun  3 2003
    Advisory ID:		IMNX-2003-7+-012-01
    Author:			Seth Arnold <sarnoldat_private>
    -----------------------------------------------------------------------
    
    Description:
      An anonymous reporter has reported to iDEFENSE a vulnerability in file
      that could allow for a root compromise, should root run file on a
      specially crafted file. This is a local exploit, and requires a user
      to run "file" on potentially untrusted files.
    
      This release fixes this vulnerability, and adds a newer magic
      databased.
    
      References: http://www.securityfocus.com/archive/1/313837
    
    Package names and locations:
      Precompiled binary packages for Immunix 7+ are available at:
      http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/file-3.30-7_imnx_3.41_1.i386.rpm
    
    Immunix OS 7+ md5sums:
      bea08bde8952bb723993ad6dd8f5e188  RPMS/file-3.30-7_imnx_3.41_1.i386.rpm
    
    
    GPG verification:                                                               
      Our public key is available at <http://wirex.com/security/GPG_KEY>.           
    
    NOTE:
      Ibiblio is graciously mirroring our updates, so if the links above are
      slow, please try:
        ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
      or one of the many mirrors available at:
        http://www.ibiblio.org/pub/Linux/MIRRORS.html
    
      ImmunixOS 6.2 is no longer officially supported.
      ImmunixOS 7.0 is no longer officially supported.
    
    Contact information:
      To report vulnerabilities, please contact securityat_private WireX 
      attempts to conform to the RFP vulnerability disclosure protocol
      <http://www.wiretrip.net/rfp/policy.html>.
    
    
    



    This archive was generated by hypermail 2b30 : Wed Jun 04 2003 - 09:14:59 PDT