[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041125234235.13305.qmail@updates.mandrakesoft.com>
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKSA-2004:140 - Updated a2ps packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: a2ps
Advisory ID: MDKSA-2004:140
Date: November 25th, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
The GNU a2ps utility fails to properly sanitize filenames, which can
be abused by a malicious user to execute arbitray commands with the
privileges of the user running the vulnerable application.
The updated packages have been patched to prevent this problem.
_______________________________________________________________________
References:
http://www.securityfocus.com/bid/11025
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
0bf1c46cdf3a997c80ffa55a04b53144 10.0/RPMS/a2ps-4.13b-5.1.100mdk.i586.rpm
ca914fbd0811bef76be2c39924cdf2a1 10.0/RPMS/a2ps-devel-4.13b-5.1.100mdk.i586.rpm
c33b533dc073d747b31393b9e041da03 10.0/RPMS/a2ps-static-devel-4.13b-5.1.100mdk.i586.rpm
c7248cd5bc4defb373a64e9cdfc2333c 10.0/SRPMS/a2ps-4.13b-5.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
6504506036c88ffbe443c2d537d27da9 amd64/10.0/RPMS/a2ps-4.13b-5.1.100mdk.amd64.rpm
fab58ecff86622a511e8b1652476f6fe amd64/10.0/RPMS/a2ps-devel-4.13b-5.1.100mdk.amd64.rpm
3fa0c58c19e86837f613a1bb9e304044 amd64/10.0/RPMS/a2ps-static-devel-4.13b-5.1.100mdk.amd64.rpm
c7248cd5bc4defb373a64e9cdfc2333c amd64/10.0/SRPMS/a2ps-4.13b-5.1.100mdk.src.rpm
Mandrakelinux 10.1:
fc5b71001b6026112eed7a9eede99df5 10.1/RPMS/a2ps-4.13b-5.1.101mdk.i586.rpm
78ce0c31be6b53057a634b2043479aee 10.1/RPMS/a2ps-devel-4.13b-5.1.101mdk.i586.rpm
27e916c46412c26970339a099c844136 10.1/RPMS/a2ps-static-devel-4.13b-5.1.101mdk.i586.rpm
07c4873e2c4bd8cdedcefc4b9c320100 10.1/SRPMS/a2ps-4.13b-5.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
00b9ef256d69081035981b62217c5d45 x86_64/10.1/RPMS/a2ps-4.13b-5.1.101mdk.x86_64.rpm
51d1efed305bdccea43df7c1e7edea05 x86_64/10.1/RPMS/a2ps-devel-4.13b-5.1.101mdk.x86_64.rpm
eb1a73a1770c13ffc7a4cc305ebf6bf9 x86_64/10.1/RPMS/a2ps-static-devel-4.13b-5.1.101mdk.x86_64.rpm
07c4873e2c4bd8cdedcefc4b9c320100 x86_64/10.1/SRPMS/a2ps-4.13b-5.1.101mdk.src.rpm
Corporate Server 2.1:
336ec30048b5ad2fa05180994987c6fa corporate/2.1/RPMS/a2ps-4.13-14.1.C21mdk.i586.rpm
82712d8a212252f79b109b25991cfb04 corporate/2.1/RPMS/a2ps-devel-4.13-14.1.C21mdk.i586.rpm
060d1b6ab37de7ca0f4a557da8460c34 corporate/2.1/RPMS/a2ps-static-devel-4.13-14.1.C21mdk.i586.rpm
e8bf67681741edfb61fb6fc171dd2f8f corporate/2.1/SRPMS/a2ps-4.13-14.1.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
03da1d600f76bf0719276b6676cae414 x86_64/corporate/2.1/RPMS/a2ps-4.13-14.1.C21mdk.x86_64.rpm
20ae91d5efc781cd07af91c25ac2d444 x86_64/corporate/2.1/RPMS/a2ps-devel-4.13-14.1.C21mdk.x86_64.rpm
76cbf03ba34f5c51bf066e4ce9419235 x86_64/corporate/2.1/RPMS/a2ps-static-devel-4.13-14.1.C21mdk.x86_64.rpm
e8bf67681741edfb61fb6fc171dd2f8f x86_64/corporate/2.1/SRPMS/a2ps-4.13-14.1.C21mdk.src.rpm
Mandrakelinux 9.2:
57cde82f819f69584e29dc96a0d68431 9.2/RPMS/a2ps-4.13b-5.1.92mdk.i586.rpm
4557bbde873d94394cce32c64f544783 9.2/RPMS/a2ps-devel-4.13b-5.1.92mdk.i586.rpm
678978ae070b88ac922d74bb7d3df7cf 9.2/RPMS/a2ps-static-devel-4.13b-5.1.92mdk.i586.rpm
5824c8481814e78bc430bf780d22fd84 9.2/SRPMS/a2ps-4.13b-5.1.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
6b72be6ec18fb727987ef32db913730d amd64/9.2/RPMS/a2ps-4.13b-5.1.92mdk.amd64.rpm
00f3f4b88dd753fd655e459bf6cd2e64 amd64/9.2/RPMS/a2ps-devel-4.13b-5.1.92mdk.amd64.rpm
ee628914ed89857c10ce2391d6985e2d amd64/9.2/RPMS/a2ps-static-devel-4.13b-5.1.92mdk.amd64.rpm
5824c8481814e78bc430bf780d22fd84 amd64/9.2/SRPMS/a2ps-4.13b-5.1.92mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFBpm3rmqjQ0CJFipgRAvwfAJ9u9BB6Zbakn0/+UJ2R8cL0SKrXWQCfYWk3
1VxwXm4YJnbvxmtbVUsRnkg=
=WtSF
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists