[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1CoVAc-0005LK-E4@updates.mandrakesoft.com>
Date: Tue, 11 Jan 2005 16:11:26 -0700
From: Mandrake Linux Security Team <security@...ux-mandrake.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:005 - Updated nfs-utils packages fix 64bit vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: nfs-utils
Advisory ID: MDKSA-2005:005
Date: January 11th, 2005
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
Arjan van de Ven discovered a buffer overflow in rquotad on 64bit
architectures; an improper integer conversion could lead to a
buffer overflow. An attacker with access to an NFS share could send a
specially crafted request which could then lead to the execution of
arbitrary code.
The updated packages are provided to prevent this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
71991bf34674e4bebd4870c24dce4929 10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.i586.rpm
1c6231362def3c56d747b3ccc22b7597 10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.i586.rpm
bf52589c8d97f63f3024f90a79c201c9 10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
28bc6309e5488cd7bf294ae1a4ce68b2 amd64/10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.amd64.rpm
ed8b7dfa77200e5badb473678a91bb2a amd64/10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.amd64.rpm
bf52589c8d97f63f3024f90a79c201c9 amd64/10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm
Mandrakelinux 10.1:
bb7161793b2154c3e122adabaed9ed60 10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.i586.rpm
e219e85405758a9ef9511eacf4118e07 10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.i586.rpm
7510d378225740169ae1a3dbaf0f223f 10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
ed70043e2d95cbebc2cd12e0f973a29f x86_64/10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.x86_64.rpm
7c086dfb028423e9105525111194aff5 x86_64/10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.x86_64.rpm
7510d378225740169ae1a3dbaf0f223f x86_64/10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm
Corporate Server 2.1:
cc1b1f4c8232db49f40df9117d2237f8 corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.i586.rpm
8af58044e57d46921c0ad8745826d1dd corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.i586.rpm
9d167452a31fc1e5ef4f43086f0d7b34 corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
c7f8d994d4d261d41f6bf246c280fb10 x86_64/corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.x86_64.rpm
77be17723eb840715500edb3cf8c687b x86_64/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.x86_64.rpm
9d167452a31fc1e5ef4f43086f0d7b34 x86_64/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm
Mandrakelinux 9.2:
00f2319415647d9fa85926cc05271793 9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.i586.rpm
680ef7be663350d18ad5b7f94bbc2e21 9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.i586.rpm
4a49c7508d166c62b6d76e7c1cccbacd 9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
c0e275ce5838575eda14efb2d582aefc amd64/9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.amd64.rpm
779856f22f146342ab6e42c4f20acd95 amd64/9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.amd64.rpm
4a49c7508d166c62b6d76e7c1cccbacd amd64/9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFB5F0emqjQ0CJFipgRAg3wAKDBYs/rXJUwddiDT27a+ij2yMOS7QCfY11g
cDdxBS2vNnkYW79o+n63YRk=
=ggoY
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists