lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1LNHyf-0003Cq-39@titan.mandriva.com>
Date: Wed, 14 Jan 2009 19:29:00 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:011 ] virtualbox


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:011
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : virtualbox
 Date    : January 14, 2009
 Affected: 2008.0, 2008.1, 2009.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability have been discovered and corrected in VirtualBox,
 affecting versions prior to 2.0.6, which allows local users
 to overwrite arbitrary files via a symlink attack on a
 /tmp/.vbox-qateam-ipc/lock temporary file (CVE-2008-5256).
 
 The updated packages have been patched to prevent this.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5256
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.0:
 0faad982e37288846205d6d33d590ee1  2008.0/i586/dkms-vboxadd-1.5.0-6.1mdv2008.0.i586.rpm
 ec69afc3908bd606bae77b8422e39558  2008.0/i586/dkms-vboxvfs-1.5.0-6.1mdv2008.0.i586.rpm
 c27d1bd07d9dc67f4cefbdf33472acca  2008.0/i586/dkms-virtualbox-1.5.0-6.1mdv2008.0.i586.rpm
 9964702ee96bcf6c6edf0c31835d20e7  2008.0/i586/virtualbox-1.5.0-6.1mdv2008.0.i586.rpm
 435eb23fb1847074783ee59f21afa05d  2008.0/i586/virtualbox-guest-additions-1.5.0-6.1mdv2008.0.i586.rpm
 dbf4cd4d51e6690ed54a01751d7eb6e3  2008.0/i586/x11-driver-input-vboxmouse-1.5.0-6.1mdv2008.0.i586.rpm
 89984e4e53d3eda593e1a384b97acd14  2008.0/i586/x11-driver-video-vboxvideo-1.5.0-6.1mdv2008.0.i586.rpm 
 d0edb2542a83e4ab966bb9990b9c3a88  2008.0/SRPMS/virtualbox-1.5.0-6.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 0bfb5b9d8c8a16f1e04fd490e6379e63  2008.0/x86_64/dkms-virtualbox-1.5.0-6.1mdv2008.0.x86_64.rpm
 3bc3251552c50c2ba8270a69c5f353d7  2008.0/x86_64/virtualbox-1.5.0-6.1mdv2008.0.x86_64.rpm 
 d0edb2542a83e4ab966bb9990b9c3a88  2008.0/SRPMS/virtualbox-1.5.0-6.1mdv2008.0.src.rpm

 Mandriva Linux 2008.1:
 c4e028f64685550f1b54d658cac8033c  2008.1/i586/dkms-vboxadd-1.5.6-1.1mdv2008.1.i586.rpm
 0ba02b82975789a2e074562c266e3880  2008.1/i586/dkms-vboxvfs-1.5.6-1.1mdv2008.1.i586.rpm
 91fb1e876d76370c40f2bc20271dcdbb  2008.1/i586/dkms-virtualbox-1.5.6-1.1mdv2008.1.i586.rpm
 42dd201c14fab3dd1ff218969f88612c  2008.1/i586/virtualbox-1.5.6-1.1mdv2008.1.i586.rpm
 5feeef63896de6093cdd6365258df60d  2008.1/i586/virtualbox-guest-additions-1.5.6-1.1mdv2008.1.i586.rpm
 3d3fc94cb178e2a6853679f01f7f4198  2008.1/i586/x11-driver-input-vboxmouse-1.5.6-1.1mdv2008.1.i586.rpm
 79b78be2abe7b3a6d8e95d547139afa4  2008.1/i586/x11-driver-video-vboxvideo-1.5.6-1.1mdv2008.1.i586.rpm 
 6c18b42e2ff43d79009dedc817fa19e9  2008.1/SRPMS/virtualbox-1.5.6-1.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 4d261638ff0134079fa6c52d0a368664  2008.1/x86_64/dkms-virtualbox-1.5.6-1.1mdv2008.1.x86_64.rpm
 6ccec4ff2f35d1308f73e10679651ce0  2008.1/x86_64/virtualbox-1.5.6-1.1mdv2008.1.x86_64.rpm 
 6c18b42e2ff43d79009dedc817fa19e9  2008.1/SRPMS/virtualbox-1.5.6-1.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 53e13912d97abe5b7044887eab1028fd  2009.0/i586/dkms-vboxadd-2.0.2-2.1mdv2009.0.i586.rpm
 9441661b095cf9c65c50c3a81f1fb89b  2009.0/i586/dkms-vboxvfs-2.0.2-2.1mdv2009.0.i586.rpm
 2977fa2971f66d6b554ab73f03b80ba6  2009.0/i586/dkms-virtualbox-2.0.2-2.1mdv2009.0.i586.rpm
 acddf8b8a168c148f1f5e7a548a610bd  2009.0/i586/virtualbox-2.0.2-2.1mdv2009.0.i586.rpm
 edfc2bc624a87ab96f238345fbe38529  2009.0/i586/virtualbox-guest-additions-2.0.2-2.1mdv2009.0.i586.rpm
 e3650d3c5fedb2dccdc4a2e108414b95  2009.0/i586/x11-driver-input-vboxmouse-2.0.2-2.1mdv2009.0.i586.rpm
 6d28714532427680f82c86fe34fee3e0  2009.0/i586/x11-driver-video-vboxvideo-2.0.2-2.1mdv2009.0.i586.rpm 
 93f4904d403da2dd75ca4d444d298846  2009.0/SRPMS/virtualbox-2.0.2-2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 667f19d7803c5eb163364ce221b367be  2009.0/x86_64/dkms-vboxadd-2.0.2-2.1mdv2009.0.x86_64.rpm
 e4439eb5b8a5ef7e09924989058a69b8  2009.0/x86_64/dkms-vboxvfs-2.0.2-2.1mdv2009.0.x86_64.rpm
 3da3bc075de10484211b0da29a0a14cc  2009.0/x86_64/dkms-virtualbox-2.0.2-2.1mdv2009.0.x86_64.rpm
 1aba902daf9019cbcf4e62e8a64d0a82  2009.0/x86_64/virtualbox-2.0.2-2.1mdv2009.0.x86_64.rpm
 da486be54760b618a3d84e23c3ad067e  2009.0/x86_64/virtualbox-guest-additions-2.0.2-2.1mdv2009.0.x86_64.rpm
 a3adf7c94132553f43dc6a0cd765bcc8  2009.0/x86_64/x11-driver-input-vboxmouse-2.0.2-2.1mdv2009.0.x86_64.rpm
 ca82cc1b8e6b5d85d1a7601a37367562  2009.0/x86_64/x11-driver-video-vboxvideo-2.0.2-2.1mdv2009.0.x86_64.rpm 
 93f4904d403da2dd75ca4d444d298846  2009.0/SRPMS/virtualbox-2.0.2-2.1mdv2009.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJbnEzmqjQ0CJFipgRAtaKAKCw/UI12LmoHfiopLbrwfYw9hpjYwCeII/w
cG8DdjRcqRGXazcDy+z623M=
=XDR6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ