Home page logo

bugtraq logo Bugtraq mailing list archives

Trustix Security Advisory - bind, openldap
From: Trustix Secure Linux Team <tsl () TRUSTIX COM>
Date: Mon, 29 Jan 2001 15:12:23 +0100


Trustix today released security updates for the following packages:

Trustix specific: no
Distribution versions: All
A remote hole in bind allows for the environment of the server process
to be leaked to an attacker.

Trustix specific: yes
Distribution versions: 1.2 from jan. 19. 2000
A silly bug in the rpm spec file for openldap makes the server run by
default, which violates Trustix' standard of no running services by
default.  Note that there are no known remote security holes in openldap
as shipped by Trustix.

People who have this version of openldap installed on their systems
without intentions of using it should run this set of commands:
# chkconfig ldap off
# service ldap stop

1ff0878fb7b01f51c23607c1a06b28e5  bind-8.2.3-1tr.i586.rpm
048b5aae3b80be0e9a844726292471ef  bind-devel-8.2.3-1tr.i586.rpm
9794142fc249de3946ed38202b53e5f1  bind-utils-8.2.3-1tr.i586.rpm

2773155e1e5d634a629c003f3d9991cf  bind-8.2.3-1tr.i586.rpm
5e7aa542e892540626ff7f0d424dc8fe  bind-devel-8.2.3-1tr.i586.rpm
fcaff512f1486ad16241da80f9ff1e0a  bind-utils-8.2.3-1tr.i586.rpm

Use the 1.1 packages.

Packages can be downloaded from:

Or from one of our mirrors:

1.2 users who have installed the optional SWUP-package (from
ftp://ftp.trustix.com/pub/Trustix/software/swup/) can use
'swup --upgrade' to automatically download and install the new packages.

For a full update history of the 1.2 release, see:

Trustix Security Team

  By Date           By Thread  

Current thread:
  • Trustix Security Advisory - bind, openldap Trustix Secure Linux Team (Jan 29)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]