[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 91/04 - Two Mandrake Security Advisories



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 91/04 dated 27.02.04  Time: 15:05  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Two Mandrake Security Advisories:

1. Updated x86_64 kernel packages fix multiple vulnerabilities

2. Updated mtools packages fix local root vulnerability


Detail
====== 

1. pdated x86_64 kernel packages fix multiple vulnerabilities

2. Sebastian Krahmer found that the mformat program, when installed  
   suid root, can create any file with 0666 permissions as root, and
   that it also does not drop privileges when reading local configuration 
    files.





1.               Mandrakelinux Security Update Advisory  

 Package name:           kernel
 Advisory ID:            MDKSA-2004:015-1
 Date:                   February 25th, 2004
 Original Advisory Date: February 24th, 2004
 Affected versions:	 Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Paul Staretz discovered a flaw in return value checking in the
 mremap() function in the Linux kernel, versions 2.4.24 and previous  that could allow a local user to obtain root privileges.
 
 A vulnerability was found in the R128 DRI driver by Alan Cox.  This  could allow local privilege escalation.
 
 A flaw in the ncp_lookup() function in the ncpfs code (which is used  to mount NetWare volumes or print to NetWare printers) was found by  Arjen van de Ven that could allow local privilege escalation.
 
 The Vicam USB driver in Linux kernel versions prior to 2.4.25 does  not use the copy_from_user function to access userspace, which crosses  security boundaries.  This problem does not affect the Mandrake Linux  9.2 kernel.
 
 Additionally, a ptrace hole that only affects the amd64/x86_64  platform has been corrected.
 
 The provided packages are patched to fix these vulnerabilities.  All  users are encouraged to upgrade to these updated kernels.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandrakesecure.net/en/kernelupdate.php
  
Update:

 Kernels for Corporate Server 2.1/x86_64 are now available.  _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0003
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0075
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077
 ______________________________________________________________________

 Updated Packages:
  
 Corporate Server 2.1/x86_64:
 7cb10d389a3676af5467cde13aeeffc5  x86_64/corporate/2.1/RPMS/kernel-2.4.19.39mdk-1-1mdk.x86_64.rpm
 aa90188586bec669ee2dd4c21849ef63  x86_64/corporate/2.1/RPMS/kernel-secure-2.4.19.39mdk-1-1mdk.x86_64.rpm
 29a349a070109e5452d56e85d636fe73  x86_64/corporate/2.1/RPMS/kernel-smp-2.4.19.39mdk-1-1mdk.x86_64.rpm
 cb2af78f251c5665f4cd9e7ecc3faff1  x86_64/corporate/2.1/RPMS/kernel-source-2.4.19-39mdk.x86_64.rpm
 4e3c46ba37b6180670c79ba50b23b9b4  x86_64/corporate/2.1/SRPMS/kernel-2.4.19.39mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification  of md5 checksums and GPG signatures is performed automatically for you.

 A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

 All packages are signed by Mandrakesoft for security.  You can obtain  the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

 Please be aware that sometimes it takes the mirrors a few hours to  update.

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesecure.net/en/advisories/

 Mandrakesoft has several security-related mailing list services that  anyone can subscribe to.  Information on these lists can be obtained by
 visiting:

  http://www.mandrakesecure.net/en/mlist.php

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAPUD5mqjQ0CJFipgRAnV8AKDbtOBNQj0HJBynnGAcQlEgT/+KCgCgiYcB
OwaDE76JuUIzwcwUgm4jpZ8=
=Xt4R
- -----END PGP SIGNATURE-----





2.                Mandrake Linux Security Update Advisory 

 Package name:           mtools
 Advisory ID:            MDKSA-2004:016
 Date:                   February 25th, 2004

 Affected versions:	 9.2
 ______________________________________________________________________

 Problem Description:

 Sebastian Krahmer found that the mformat program, when installed  suid root, can create any file with 0666 permissions as root, and that  it also does not drop privileges when reading local configuration  files.
 
 The updated packages remove the suid bit from mformat.  ______________________________________________________________________

 Updated Packages:
  
 Mandrake Linux 9.2:
 92f97fa2f63b3bcb1f657c919152381e  9.2/RPMS/mtools-3.9.9-2.1.92mdk.i586.rpm
 4346ec1081a440772fa3f40f9d07632d  9.2/SRPMS/mtools-3.9.9-2.1.92mdk.src.rpm

 Mandrake Linux 9.2/AMD64:
 11cde05b045fcf389c276199589c051d  amd64/9.2/RPMS/mtools-3.9.9-2.1.92mdk.amd64.rpm
 4346ec1081a440772fa3f40f9d07632d  amd64/9.2/SRPMS/mtools-3.9.9-2.1.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification  of md5 checksums and GPG signatures is performed automatically for you.

 A list of FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

 All packages are signed by MandrakeSoft for security.  You can obtain  the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

 Please be aware that sometimes it takes the mirrors a few hours to  update.

 You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

 MandrakeSoft has several security-related mailing list services that  anyone can subscribe to.  Information on these lists can be obtained by
 visiting:

  http://www.mandrakesecure.net/en/mlist.php

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAPMgQmqjQ0CJFipgRAoZKAJ4yanFF01W5pgE95GzyLhEPdfcB3gCghdvN
O3xfNlJv2oLUeCjmXBwiw1o=
=ZOTm
- -----END PGP SIGNATURE-----






- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Mandrake for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQD9c84pao72zK539AQHcfgP/VlkctLbJRP9quo/CdYOgDk0Zj3qTdbwO
7mgXi+QzqW6zHmxcwrAVS6Ey1PrydGg6vehxyeNs1XQwbck1Z2sSrhoVGYLKG2y9
/+aPqirirvcJ8/rdSaSO1OqaRXN737Mvhr5DrQQMuUr3giYv5IJzDGTtvYHZ4Yw7
owfnZPulHu8=
=/Wo7
-----END PGP SIGNATURE-----