lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1Ihb8B-0002EF-4H@artemis.annvix.ca>
Date: Mon, 15 Oct 2007 19:21:59 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:198 ] - Updated util-linux packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:198
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : util-linux
 Date    : October 15, 2007
 Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 The mount and umount programs in util-linux called the setuid() and
 setgid() functions in the wrong order and did not check the return
 values, which could allow attackers to grain privileges via helper
 applications such as mount.nfs.
 
 Updated packages have been patched to fix this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 64440de5b0e17ede0ff6d5647ed2ff59  2007.0/i586/losetup-2.12r-8.3mdv2007.0.i586.rpm
 15992ebb5aad91809aa77fd95d18ca0d  2007.0/i586/mount-2.12r-8.3mdv2007.0.i586.rpm
 b60fa731a619023d9ee621193fb774f5  2007.0/i586/util-linux-2.12r-8.3mdv2007.0.i586.rpm 
 67d816f2242c4c3d20f98caaa49aeb67  2007.0/SRPMS/util-linux-2.12r-8.3mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 b3fc22fbec0cab2444bb266551ece54a  2007.0/x86_64/losetup-2.12r-8.3mdv2007.0.x86_64.rpm
 2d1a2b67e27f03f1478b6d403101360f  2007.0/x86_64/mount-2.12r-8.3mdv2007.0.x86_64.rpm
 b55391c2d42ae2be0ec64816b0a4709f  2007.0/x86_64/util-linux-2.12r-8.3mdv2007.0.x86_64.rpm 
 67d816f2242c4c3d20f98caaa49aeb67  2007.0/SRPMS/util-linux-2.12r-8.3mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 c3f01c2633e3154e8c70165187e1cfee  2007.1/i586/losetup-2.12r-12.2mdv2007.1.i586.rpm
 085d5d11a4b37c3f6726ee0332b9d0aa  2007.1/i586/mount-2.12r-12.2mdv2007.1.i586.rpm
 451974eed97067c69bf34c6e9a59fa7a  2007.1/i586/util-linux-2.12r-12.2mdv2007.1.i586.rpm 
 89c2fe31fd555a760fe14d0a8cfa3b6f  2007.1/SRPMS/util-linux-2.12r-12.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 ce09e5fc6f050ca135f524bd5f9b3fbe  2007.1/x86_64/losetup-2.12r-12.2mdv2007.1.x86_64.rpm
 71273a5d58a55f79c85dd7a7dda54476  2007.1/x86_64/mount-2.12r-12.2mdv2007.1.x86_64.rpm
 fd27c8e4b14da14c3a13e61580f8b74a  2007.1/x86_64/util-linux-2.12r-12.2mdv2007.1.x86_64.rpm 
 89c2fe31fd555a760fe14d0a8cfa3b6f  2007.1/SRPMS/util-linux-2.12r-12.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 65d5eb89c2588aab19f877d085fb5a53  2008.0/i586/util-linux-ng-2.13-3.1mdv2008.0.i586.rpm 
 0fa5be0c17f9d0c403a60c1504600dac  2008.0/SRPMS/util-linux-ng-2.13-3.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 e36da656cc73ec8e1eab5032ada23a49  2008.0/x86_64/util-linux-ng-2.13-3.1mdv2008.0.x86_64.rpm 
 0fa5be0c17f9d0c403a60c1504600dac  2008.0/SRPMS/util-linux-ng-2.13-3.1mdv2008.0.src.rpm

 Corporate 3.0:
 860c4c8418f1143264994b2c83e7d95f  corporate/3.0/i586/losetup-2.12-2.3.C30mdk.i586.rpm
 a32e5441007cfd710275deb76e8fbd3a  corporate/3.0/i586/mount-2.12-2.3.C30mdk.i586.rpm
 541e29f0531f46dfc786e8b7f7d1d7ac  corporate/3.0/i586/util-linux-2.12-2.3.C30mdk.i586.rpm 
 4a56621eef79c176b447b0c494a0d1e9  corporate/3.0/SRPMS/util-linux-2.12-2.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 e5128f44cf0a79b0a0dc3c23aaa3a690  corporate/3.0/x86_64/losetup-2.12-2.3.C30mdk.x86_64.rpm
 18c0bb4e45301d8df328026b19630724  corporate/3.0/x86_64/mount-2.12-2.3.C30mdk.x86_64.rpm
 4de1c1120f72dee868cf4561bca2c2ac  corporate/3.0/x86_64/util-linux-2.12-2.3.C30mdk.x86_64.rpm 
 4a56621eef79c176b447b0c494a0d1e9  corporate/3.0/SRPMS/util-linux-2.12-2.3.C30mdk.src.rpm

 Corporate 4.0:
 611b8878518021dd4852eca879ec9249  corporate/4.0/i586/losetup-2.12q-7.3.20060mlcs4.i586.rpm
 ed5fb53165d477aed270025f6bdc1506  corporate/4.0/i586/mount-2.12q-7.3.20060mlcs4.i586.rpm
 0b6627c6dd614e379f50818b696e6245  corporate/4.0/i586/util-linux-2.12q-7.3.20060mlcs4.i586.rpm 
 b151e4a0ba69681a503a41a1345812e0  corporate/4.0/SRPMS/util-linux-2.12q-7.3.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 20319f51172a26bfc749e730426394f1  corporate/4.0/x86_64/losetup-2.12q-7.3.20060mlcs4.x86_64.rpm
 e5b0f3559fbdd0b8624d45113c77d96e  corporate/4.0/x86_64/mount-2.12q-7.3.20060mlcs4.x86_64.rpm
 253f7975ab30effa3b9e8611a38dee67  corporate/4.0/x86_64/util-linux-2.12q-7.3.20060mlcs4.x86_64.rpm 
 b151e4a0ba69681a503a41a1345812e0  corporate/4.0/SRPMS/util-linux-2.12q-7.3.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 6b6ff10041f39974ffaf2f0f2205ef1b  mnf/2.0/i586/losetup-2.12-2.3.M20mdk.i586.rpm
 232fb2749c37aebcd84a37579a77f651  mnf/2.0/i586/mount-2.12-2.3.M20mdk.i586.rpm
 79be57ad149e0ad500b717c08840a3e3  mnf/2.0/i586/util-linux-2.12-2.3.M20mdk.i586.rpm 
 52f76435ff50cacd708dfe1af359bce4  mnf/2.0/SRPMS/util-linux-2.12-2.3.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHE+ZxmqjQ0CJFipgRAvT9AJ9yamgaWnv6Yl0o/61pOoQOIMV+EgCgzwNT
G8LcTc8rLcIWMFe+EgqZOZI=
=dngK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ