lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1SZM7d-00063T-4u@titan.mandriva.com>
Date: Tue, 29 May 2012 15:06:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2012:083 ] util-linux

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:083
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : util-linux
 Date    : May 29, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in
 util-linux:
 
 mount in util-linux 2.19 and earlier attempts to append to the
 /etc/mtab.tmp file without first checking whether resource limits
 would interfere, which allows local users to trigger corruption of
 the /etc/mtab file via a process with a small RLIMIT_FSIZE value,
 a related issue to CVE-2011-1089 (CVE-2011-1675).
 
 mount in util-linux 2.19 and earlier does not remove the /etc/mtab~
 lock file after a failed attempt to add a mount entry, which has
 unspecified impact and local attack vectors (CVE-2011-1677).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1675
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1677
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 eb33512cb8c77f92e3ae20caf9816e21  2010.1/i586/libblkid1-2.17.1-5.2mdv2010.2.i586.rpm
 0d698e8c0285b41ac4f21da74055b53f  2010.1/i586/libblkid-devel-2.17.1-5.2mdv2010.2.i586.rpm
 20625cbebd2937da67473e412ba85002  2010.1/i586/libuuid1-2.17.1-5.2mdv2010.2.i586.rpm
 6447b8e0c59791f819d0167711e41c52  2010.1/i586/libuuid-devel-2.17.1-5.2mdv2010.2.i586.rpm
 3b268915155a2ba0344a818ac55a16da  2010.1/i586/util-linux-ng-2.17.1-5.2mdv2010.2.i586.rpm
 8cb97af8918c24b7c97fdba26d694654  2010.1/i586/uuidd-2.17.1-5.2mdv2010.2.i586.rpm 
 fa7cf3d671f48207748ddba3163d6e04  2010.1/SRPMS/util-linux-ng-2.17.1-5.2mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 5b7fbd17545d05402b7fd3093f478541  2010.1/x86_64/lib64blkid1-2.17.1-5.2mdv2010.2.x86_64.rpm
 668e001d143871750eb066d12c5caaaa  2010.1/x86_64/lib64blkid-devel-2.17.1-5.2mdv2010.2.x86_64.rpm
 54498dbf1f4b96e05c8c3f286f848498  2010.1/x86_64/lib64uuid1-2.17.1-5.2mdv2010.2.x86_64.rpm
 bd7221119d3fb8093eb1184b68201dbe  2010.1/x86_64/lib64uuid-devel-2.17.1-5.2mdv2010.2.x86_64.rpm
 713270191f5f0d960058618cf531b175  2010.1/x86_64/util-linux-ng-2.17.1-5.2mdv2010.2.x86_64.rpm
 4090da6706b918116d8d5c9b33629ba9  2010.1/x86_64/uuidd-2.17.1-5.2mdv2010.2.x86_64.rpm 
 fa7cf3d671f48207748ddba3163d6e04  2010.1/SRPMS/util-linux-ng-2.17.1-5.2mdv2010.2.src.rpm

 Mandriva Linux 2011:
 f4296ecbf617d6cf79d238c82a239ca1  2011/i586/libblkid1-2.19-3.2-mdv2011.0.i586.rpm
 f2589d8d181fadd8dd48b9e17e09753d  2011/i586/libblkid-devel-2.19-3.2-mdv2011.0.i586.rpm
 0b70339706521110774e4fe69855b084  2011/i586/libmount1-2.19-3.2-mdv2011.0.i586.rpm
 d0d6714a01f21bb5a63bdc796bb23842  2011/i586/libmount-devel-2.19-3.2-mdv2011.0.i586.rpm
 1c039ab95c469325cf1a569e83c71ce7  2011/i586/libuuid1-2.19-3.2-mdv2011.0.i586.rpm
 8c663e3959f2df874aac320573817cdb  2011/i586/libuuid-devel-2.19-3.2-mdv2011.0.i586.rpm
 f8114ff872f7a96862d378393f95e941  2011/i586/util-linux-2.19-3.2-mdv2011.0.i586.rpm
 0d526fe3160339f8257ac37fe446ba24  2011/i586/uuidd-2.19-3.2-mdv2011.0.i586.rpm 
 f769bd8d30ad0bbcb0fabd14a376cd35  2011/SRPMS/util-linux-2.19-3.2.src.rpm

 Mandriva Linux 2011/X86_64:
 d2e42bece7164b872cd9239730c77088  2011/x86_64/lib64blkid1-2.19-3.2-mdv2011.0.x86_64.rpm
 7eec7897a5eab8ea7ed4246878833e02  2011/x86_64/lib64blkid-devel-2.19-3.2-mdv2011.0.x86_64.rpm
 cfe9df69ce0232bcf01d1cfcf6d404b3  2011/x86_64/lib64mount1-2.19-3.2-mdv2011.0.x86_64.rpm
 19890d2f4785a5a3a5dcfa14965e6ee1  2011/x86_64/lib64mount-devel-2.19-3.2-mdv2011.0.x86_64.rpm
 b1ba68d40d06aabe0b210833f45018c2  2011/x86_64/lib64uuid1-2.19-3.2-mdv2011.0.x86_64.rpm
 3b47499459a4063e15669b7845278f07  2011/x86_64/lib64uuid-devel-2.19-3.2-mdv2011.0.x86_64.rpm
 9b818496386cbecdf91fb9f7ad053df5  2011/x86_64/util-linux-2.19-3.2-mdv2011.0.x86_64.rpm
 87bd197faa88b2b78ab8a24508eb6b20  2011/x86_64/uuidd-2.19-3.2-mdv2011.0.x86_64.rpm 
 f769bd8d30ad0bbcb0fabd14a376cd35  2011/SRPMS/util-linux-2.19-3.2.src.rpm

 Mandriva Enterprise Server 5:
 5b2a978234b5084ba8afad897d07074e  mes5/i586/util-linux-ng-2.14.1-4.3mdvmes5.2.i586.rpm 
 2613be1900a25de3f7816ec4b56c76df  mes5/SRPMS/util-linux-ng-2.14.1-4.3mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 c8166d1bacf04f5069a97c75714869c2  mes5/x86_64/util-linux-ng-2.14.1-4.3mdvmes5.2.x86_64.rpm 
 2613be1900a25de3f7816ec4b56c76df  mes5/SRPMS/util-linux-ng-2.14.1-4.3mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPxJvJmqjQ0CJFipgRAruMAKCyJ1H4ORN+SniMzHz0ppCmQXUQ5gCg3r9F
hzavW7FUgY5jLG/66aYVH6k=
=X0Oo
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ