[LWN Logo]
[Timeline]
To: tsl-announce@trustix.com
Subject: Trustix Security Advisory - stunnel
From: Trustix Secure Linux Team <tsl@trustix.com>
Date: 19 Dec 2000 12:40:01 +0100

Hi

Following the advisory on bugtraq concerning a hole in stunnel, Trustix
has released a patched version of this package.

The hole is a plain old "format bug in wrongly written syslog() call",
which could probably yield remote root under the right circumstances.

All versions of Trustix Secure Linux are vulnerable provided that the
server is actually configured to use stunnel.  This means that a default 
install of the system will technically not be vulnerable, but we suggest 
that our users follow security updates regardless of what is actually
run today.

MD5sum:
a041597b699e18cb760d5b37bb6930eb  1.2/RPMS/stunnel-3.8p4-2tr.i586.rpm
d44db0c9424bc396cd77689f50bcada2  1.1/RPMS/stunnel-3.8p4-2tr.i586.rpm

Users of v1.0x should as usual use the update built for v1.1.

Get the updates here:
ftp://ftp.trustix.net/pub/Trustix/updates/
http://www.trustix.net/pub/Trustix/updates/

For version 1.2, the distribution tree and the iso images have been
updated on our sites, and will be available on mirrors shortly.  The
build date of the iso images is 20001219.

-- 
Trustix Security Advisory Board
-
To unsubscribe, send a message to majordomo@trustix.com with the
following line in the BODY:
unsubscribe tsl-announce