MDKSA-2004:145 - Updated rp-pppoe packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: rp-pppoe
Advisory ID: MDKSA-2004:145
Date: December 6th, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________
Problem Description:
Max Vozeler discovered a vulnerability in pppoe, part of the rp-pppoe
package. When pppoe is running setuid root, an attacker can overwrite
any file on the system. Mandrakelinux does not install pppoe setuid
root, however the packages have been patched to prevent this problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0564
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
0e485ee8443f57b18ab629f53ff75518 10.0/RPMS/rp-pppoe-3.5-3.1.100mdk.i586.rpm
0bec0bb1083b159594bbd1f525d7d677
10.0/RPMS/rp-pppoe-gui-3.5-3.1.100mdk.i586.rpm
1c7993034cb99ef05f3242c887a8b155 10.0/SRPMS/rp-pppoe-3.5-3.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
150a55e440c43c8a684d39a459a5fa0a
amd64/10.0/RPMS/rp-pppoe-3.5-3.1.100mdk.amd64.rpm
eb5fdb187452a121dc88fc627715113a
amd64/10.0/RPMS/rp-pppoe-gui-3.5-3.1.100mdk.amd64.rpm
1c7993034cb99ef05f3242c887a8b155
amd64/10.0/SRPMS/rp-pppoe-3.5-3.1.100mdk.src.rpm
Mandrakelinux 10.1:
100d90b8ea25ff714a4fd3800f3b7bbf 10.1/RPMS/rp-pppoe-3.5-4.1.101mdk.i586.rpm
c249795e0c437f3578b9f3ab83d33d78
10.1/RPMS/rp-pppoe-gui-3.5-4.1.101mdk.i586.rpm
ae1e810107aa2c8c5dfca216634765fd 10.1/SRPMS/rp-pppoe-3.5-4.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
2cb2f26a1dbd9f43c558c0d4d66ae4f4
x86_64/10.1/RPMS/rp-pppoe-3.5-4.1.101mdk.x86_64.rpm
3d5f0f3faff6ba1f54052115ab874e2c
x86_64/10.1/RPMS/rp-pppoe-gui-3.5-4.1.101mdk.x86_64.rpm
ae1e810107aa2c8c5dfca216634765fd
x86_64/10.1/SRPMS/rp-pppoe-3.5-4.1.101mdk.src.rpm
Corporate Server 2.1:
f56f79c9a883a101ccc6496670af1e91
corporate/2.1/RPMS/rp-pppoe-3.5-1.1.C21mdk.i586.rpm
a5eaaad05db008190963f803f390b05f
corporate/2.1/RPMS/rp-pppoe-gui-3.5-1.1.C21mdk.i586.rpm
42cc82a8e8b6af877aa807c0476496bd
corporate/2.1/SRPMS/rp-pppoe-3.5-1.1.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
016c9eda79d4d3805ae796846085d4c6
x86_64/corporate/2.1/RPMS/rp-pppoe-3.5-1.1.C21mdk.x86_64.rpm
8642a8fcf2631e7bbba67eecd21bc1bc
x86_64/corporate/2.1/RPMS/rp-pppoe-gui-3.5-1.1.C21mdk.x86_64.rpm
42cc82a8e8b6af877aa807c0476496bd
x86_64/corporate/2.1/SRPMS/rp-pppoe-3.5-1.1.C21mdk.src.rpm
Mandrakelinux 9.2:
d745440cd787c14637521c8cf5188471 9.2/RPMS/rp-pppoe-3.5-3.1.92mdk.i586.rpm
52f63dcedbcab1c4b80834f83512ce70 9.2/RPMS/rp-pppoe-gui-3.5-3.1.92mdk.i586.rpm
2f03184db0df85eb6ba618a1360f781a 9.2/SRPMS/rp-pppoe-3.5-3.1.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
946b85cba1ea6780274d0d9ee9ecf91c
amd64/9.2/RPMS/rp-pppoe-3.5-3.1.92mdk.amd64.rpm
b6b4ced3a16da1799dfd0e0805bcadb6
amd64/9.2/RPMS/rp-pppoe-gui-3.5-3.1.92mdk.amd64.rpm
2f03184db0df85eb6ba618a1360f781a
amd64/9.2/SRPMS/rp-pppoe-3.5-3.1.92mdk.src.rpm
Multi Network Firewall 8.2:
daf4bf7d46a2fda22ed3299709923055 mnf8.2/RPMS/rp-pppoe-3.3-2.1.M82mdk.i586.rpm
e49e7dbbdd6f9b1a0db804fa61a21cd8
mnf8.2/RPMS/rp-pppoe-gui-3.3-2.1.M82mdk.i586.rpm
80ff456dbdacdde58d3e29c2634de34c mnf8.2/SRPMS/rp-pppoe-3.3-2.1.M82mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFBtRc8mqjQ0CJFipgRAkEIAKDh5MESdxZogfDaUFmT8rEv0GR1aQCg5h5x
rRrRkAgKYOjPhPsN/VKi7e4=
=z/5i
-----END PGP SIGNATURE-----