lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1J1tWn-00013n-6l@artemis.annvix.ca>
Date: Mon, 10 Dec 2007 18:03:17 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:242 ] - Updated e2fsprogs packages
	fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:242
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : e2fsprogs
 Date    : December 10, 2007
 Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 Rafal Wojtczuk of McAfee AVERT Research found that e2fsprogs contained
 multiple integer overflows in memory allocations, based on sizes
 taken directly from filesystem information.  These flaws could result
 in heap-based overflows potentially allowing for the execution of
 arbitrary code.
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 ff40ef940d3bbce7c4314d0bf06d529f  2007.0/i586/e2fsprogs-1.39-2.1mdv2007.0.i586.rpm
 3159902d97bdc6871faec84838c9a5ab  2007.0/i586/libext2fs2-1.39-2.1mdv2007.0.i586.rpm
 ec4e5539f5168aa045899458ec2b82c3  2007.0/i586/libext2fs2-devel-1.39-2.1mdv2007.0.i586.rpm 
 8cb48b6e43625f33f37554445f65f2f0  2007.0/SRPMS/e2fsprogs-1.39-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 31ad9695ac03879d202ae8e1800e8df4  2007.0/x86_64/e2fsprogs-1.39-2.1mdv2007.0.x86_64.rpm
 3fe3232e9f750d3855796e9ada2c7b18  2007.0/x86_64/lib64ext2fs2-1.39-2.1mdv2007.0.x86_64.rpm
 cd1392e26b4c68be93c232cd991b0ef8  2007.0/x86_64/lib64ext2fs2-devel-1.39-2.1mdv2007.0.x86_64.rpm 
 8cb48b6e43625f33f37554445f65f2f0  2007.0/SRPMS/e2fsprogs-1.39-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 7d550dee8465b402dbc01e6881aa27a0  2007.1/i586/e2fsprogs-1.39-5.2mdv2007.1.i586.rpm
 9f54587c0eb5b7af5241560bfee74b55  2007.1/i586/libext2fs2-1.39-5.2mdv2007.1.i586.rpm
 4b30c50260a5d433c80e56800787c27c  2007.1/i586/libext2fs2-devel-1.39-5.2mdv2007.1.i586.rpm 
 3e4c659c9eaabf743382b604e2cb6fe4  2007.1/SRPMS/e2fsprogs-1.39-5.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 82d1bd6787634b85c34ae44641f52a4f  2007.1/x86_64/e2fsprogs-1.39-5.2mdv2007.1.x86_64.rpm
 26ef510b1e3b4fbcd0e27170908176c3  2007.1/x86_64/lib64ext2fs2-1.39-5.2mdv2007.1.x86_64.rpm
 27a5dee786f11a543544f20a78811ce3  2007.1/x86_64/lib64ext2fs2-devel-1.39-5.2mdv2007.1.x86_64.rpm 
 3e4c659c9eaabf743382b604e2cb6fe4  2007.1/SRPMS/e2fsprogs-1.39-5.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 d4be99f5ff36d4d5ef62787611b626ff  2008.0/i586/e2fsprogs-1.40.2-5.1mdv2008.0.i586.rpm
 2a7239249e195efd3b617061cdd0dcf7  2008.0/i586/libext2fs-devel-1.40.2-5.1mdv2008.0.i586.rpm
 00c482bc1cf18b4a30968ad6a24b3d81  2008.0/i586/libext2fs2-1.40.2-5.1mdv2008.0.i586.rpm 
 1bc32b40c67ac660d97b9261e29a9b2c  2008.0/SRPMS/e2fsprogs-1.40.2-5.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 e67a66424204013c42c54f8bd478d5ff  2008.0/x86_64/e2fsprogs-1.40.2-5.1mdv2008.0.x86_64.rpm
 3a4b98d08dad0321199e981b8a1cd80a  2008.0/x86_64/lib64ext2fs-devel-1.40.2-5.1mdv2008.0.x86_64.rpm
 af9c4dec36ca727fc1baba6a83766cb6  2008.0/x86_64/lib64ext2fs2-1.40.2-5.1mdv2008.0.x86_64.rpm 
 1bc32b40c67ac660d97b9261e29a9b2c  2008.0/SRPMS/e2fsprogs-1.40.2-5.1mdv2008.0.src.rpm

 Corporate 3.0:
 403bda3951bdca8b82113c0d0baabd2d  corporate/3.0/i586/e2fsprogs-1.34-5.1.C30mdk.i586.rpm
 d90ee27030d07a346a5237fe2938260f  corporate/3.0/i586/libext2fs2-1.34-5.1.C30mdk.i586.rpm
 7f3b1d7a825278d7288eb7c60282ed73  corporate/3.0/i586/libext2fs2-devel-1.34-5.1.C30mdk.i586.rpm 
 e7a4b7eac4f2b68ce7bd4707321fff69  corporate/3.0/SRPMS/e2fsprogs-1.34-5.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 bed3787f200681b1b71920a47f3f8d74  corporate/3.0/x86_64/e2fsprogs-1.34-5.1.C30mdk.x86_64.rpm
 1511236c38ef773820c2f45b9310b677  corporate/3.0/x86_64/lib64ext2fs2-1.34-5.1.C30mdk.x86_64.rpm
 4d4d9749858131a86acbf27f61f9f9aa  corporate/3.0/x86_64/lib64ext2fs2-devel-1.34-5.1.C30mdk.x86_64.rpm 
 e7a4b7eac4f2b68ce7bd4707321fff69  corporate/3.0/SRPMS/e2fsprogs-1.34-5.1.C30mdk.src.rpm

 Corporate 4.0:
 8cf5c9086da533ab006087e69d544c40  corporate/4.0/i586/e2fsprogs-1.38-3.2.20060mdk.i586.rpm
 9e16d9df63f786c06c0fe41d0e9988f4  corporate/4.0/i586/libext2fs2-1.38-3.2.20060mdk.i586.rpm
 8014e6c373d68a5a998586599ea4cd52  corporate/4.0/i586/libext2fs2-devel-1.38-3.2.20060mdk.i586.rpm 
 05a7b67cf7dcfcb587aec47f2d3f8493  corporate/4.0/SRPMS/e2fsprogs-1.38-3.2.20060mdk.src.rpm

 Corporate 4.0/X86_64:
 8b3b8a6ce94076b52978e43cf9e12f48  corporate/4.0/x86_64/e2fsprogs-1.38-3.2.20060mdk.x86_64.rpm
 30b74422fda6bd3c157179613752a264  corporate/4.0/x86_64/lib64ext2fs2-1.38-3.2.20060mdk.x86_64.rpm
 95784fca97d5fea9d54603b3f6b8a8cc  corporate/4.0/x86_64/lib64ext2fs2-devel-1.38-3.2.20060mdk.x86_64.rpm 
 05a7b67cf7dcfcb587aec47f2d3f8493  corporate/4.0/SRPMS/e2fsprogs-1.38-3.2.20060mdk.src.rpm

 Multi Network Firewall 2.0:
 4d98c367af2d9f27df8d4b88a5afdf1f  mnf/2.0/i586/e2fsprogs-1.34-5.1.M20mdk.i586.rpm
 a952ade257bea9787ba8bc6f3fc71fd7  mnf/2.0/i586/libext2fs2-1.34-5.1.M20mdk.i586.rpm
 bd6b983acf88cba046a86e1172e036a8  mnf/2.0/i586/libext2fs2-devel-1.34-5.1.M20mdk.i586.rpm 
 cad219a6351f58e7ae7299e894229a71  mnf/2.0/SRPMS/e2fsprogs-1.34-5.1.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHXbjmmqjQ0CJFipgRAtkBAJ4sQYEn5ZNrljrb8BPwkHjn+7sJoQCbBQLK
R2nNIpmB6zImuYkF7lJAZrQ=
=Uusl
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ