MDKSA-2004:145 - Updated rp-pppoe packages fix vulnerability

From: Mandrake Linux Security Team (security_at_linux-mandrake.com)
Date: 12/07/04

  • Next message: Mandrake Linux Security Team: "MDKSA-2004:144 - Updated lvm1 packages fix temporary file vulnerability"
    Date: 7 Dec 2004 02:36:44 -0000
    To: bugtraq@securityfocus.com
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

     _______________________________________________________________________

                     Mandrakelinux Security Update Advisory
     _______________________________________________________________________

     Package name: rp-pppoe
     Advisory ID: MDKSA-2004:145
     Date: December 6th, 2004

     Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
                             Multi Network Firewall 8.2
     ______________________________________________________________________

     Problem Description:

     Max Vozeler discovered a vulnerability in pppoe, part of the rp-pppoe
     package. When pppoe is running setuid root, an attacker can overwrite
     any file on the system. Mandrakelinux does not install pppoe setuid
     root, however the packages have been patched to prevent this problem.
     _______________________________________________________________________

     References:

      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0564
     ______________________________________________________________________

     Updated Packages:
      
     Mandrakelinux 10.0:
     0e485ee8443f57b18ab629f53ff75518 10.0/RPMS/rp-pppoe-3.5-3.1.100mdk.i586.rpm
     0bec0bb1083b159594bbd1f525d7d677 10.0/RPMS/rp-pppoe-gui-3.5-3.1.100mdk.i586.rpm
     1c7993034cb99ef05f3242c887a8b155 10.0/SRPMS/rp-pppoe-3.5-3.1.100mdk.src.rpm

     Mandrakelinux 10.0/AMD64:
     150a55e440c43c8a684d39a459a5fa0a amd64/10.0/RPMS/rp-pppoe-3.5-3.1.100mdk.amd64.rpm
     eb5fdb187452a121dc88fc627715113a amd64/10.0/RPMS/rp-pppoe-gui-3.5-3.1.100mdk.amd64.rpm
     1c7993034cb99ef05f3242c887a8b155 amd64/10.0/SRPMS/rp-pppoe-3.5-3.1.100mdk.src.rpm

     Mandrakelinux 10.1:
     100d90b8ea25ff714a4fd3800f3b7bbf 10.1/RPMS/rp-pppoe-3.5-4.1.101mdk.i586.rpm
     c249795e0c437f3578b9f3ab83d33d78 10.1/RPMS/rp-pppoe-gui-3.5-4.1.101mdk.i586.rpm
     ae1e810107aa2c8c5dfca216634765fd 10.1/SRPMS/rp-pppoe-3.5-4.1.101mdk.src.rpm

     Mandrakelinux 10.1/X86_64:
     2cb2f26a1dbd9f43c558c0d4d66ae4f4 x86_64/10.1/RPMS/rp-pppoe-3.5-4.1.101mdk.x86_64.rpm
     3d5f0f3faff6ba1f54052115ab874e2c x86_64/10.1/RPMS/rp-pppoe-gui-3.5-4.1.101mdk.x86_64.rpm
     ae1e810107aa2c8c5dfca216634765fd x86_64/10.1/SRPMS/rp-pppoe-3.5-4.1.101mdk.src.rpm

     Corporate Server 2.1:
     f56f79c9a883a101ccc6496670af1e91 corporate/2.1/RPMS/rp-pppoe-3.5-1.1.C21mdk.i586.rpm
     a5eaaad05db008190963f803f390b05f corporate/2.1/RPMS/rp-pppoe-gui-3.5-1.1.C21mdk.i586.rpm
     42cc82a8e8b6af877aa807c0476496bd corporate/2.1/SRPMS/rp-pppoe-3.5-1.1.C21mdk.src.rpm

     Corporate Server 2.1/x86_64:
     016c9eda79d4d3805ae796846085d4c6 x86_64/corporate/2.1/RPMS/rp-pppoe-3.5-1.1.C21mdk.x86_64.rpm
     8642a8fcf2631e7bbba67eecd21bc1bc x86_64/corporate/2.1/RPMS/rp-pppoe-gui-3.5-1.1.C21mdk.x86_64.rpm
     42cc82a8e8b6af877aa807c0476496bd x86_64/corporate/2.1/SRPMS/rp-pppoe-3.5-1.1.C21mdk.src.rpm

     Mandrakelinux 9.2:
     d745440cd787c14637521c8cf5188471 9.2/RPMS/rp-pppoe-3.5-3.1.92mdk.i586.rpm
     52f63dcedbcab1c4b80834f83512ce70 9.2/RPMS/rp-pppoe-gui-3.5-3.1.92mdk.i586.rpm
     2f03184db0df85eb6ba618a1360f781a 9.2/SRPMS/rp-pppoe-3.5-3.1.92mdk.src.rpm

     Mandrakelinux 9.2/AMD64:
     946b85cba1ea6780274d0d9ee9ecf91c amd64/9.2/RPMS/rp-pppoe-3.5-3.1.92mdk.amd64.rpm
     b6b4ced3a16da1799dfd0e0805bcadb6 amd64/9.2/RPMS/rp-pppoe-gui-3.5-3.1.92mdk.amd64.rpm
     2f03184db0df85eb6ba618a1360f781a amd64/9.2/SRPMS/rp-pppoe-3.5-3.1.92mdk.src.rpm

     Multi Network Firewall 8.2:
     daf4bf7d46a2fda22ed3299709923055 mnf8.2/RPMS/rp-pppoe-3.3-2.1.M82mdk.i586.rpm
     e49e7dbbdd6f9b1a0db804fa61a21cd8 mnf8.2/RPMS/rp-pppoe-gui-3.3-2.1.M82mdk.i586.rpm
     80ff456dbdacdde58d3e29c2634de34c mnf8.2/SRPMS/rp-pppoe-3.3-2.1.M82mdk.src.rpm
     _______________________________________________________________________

     To upgrade automatically use MandrakeUpdate or urpmi. The verification
     of md5 checksums and GPG signatures is performed automatically for you.

     All packages are signed by Mandrakesoft for security. You can obtain
     the GPG public key of the Mandrakelinux Security Team by executing:

      gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

     You can view other update advisories for Mandrakelinux at:

      http://www.mandrakesoft.com/security/advisories

     If you want to report vulnerabilities, please contact

      security_linux-mandrake.com

     Type Bits/KeyID Date User ID
     pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
      <security linux-mandrake.com>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)

    iD8DBQFBtRc8mqjQ0CJFipgRAkEIAKDh5MESdxZogfDaUFmT8rEv0GR1aQCg5h5x
    rRrRkAgKYOjPhPsN/VKi7e4=
    =z/5i
    -----END PGP SIGNATURE-----


  • Next message: Mandrake Linux Security Team: "MDKSA-2004:144 - Updated lvm1 packages fix temporary file vulnerability"

    Relevant Pages