Updated tripware packages are available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: tripwire
Advisory ID: MDKSA-2004:057
Date: June 7th, 2004
Affected versions: 10.0, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
Paul Herman discovered a format string vulnerability in tripwire that could allow a local user to execute arbitrary code with the rights of the user running tripwire (typically root). This vulnerability only exists when tripwire is generating an email report.
Updated krb5 packages are available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: krb5
Advisory ID: MDKSA-2004:056
Date: June 3rd, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________
Problem Description:
Multiple buffer overflows exist in the krb5_aname_to_localname() library function that if exploited could lead to unauthorized root privileges. In order to exploit this flaw, an attacker must first successfully authenticate to a vulnerable service, which must be configured to enable the explicit mapping or rules-based mapping functionality of krb5_aname_to_localname, which is not a default configuration.
Mandrakesoft encourages all users to upgrade to these patched krb5 packages.
An updated drakxtools package is available for Mandrakelinux 10.0
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: drakxtools
Advisory ID: MDKA-2004:030
Date: June 2nd, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
- authentication: install autofs for nis authentication (florin & fcrozat)
- diskdrake: disable package instead of removing nfs-utils or samba-server (when "diskdrake --fileshare" disables a export kind) (pixel, #9804)
- drakbackup: fix dropped .txt files when running mkisofs (stew) (Anthill #799)
o late breaking typo fix in tape restore (Federico Belvisi)
- drakconnect:
o prevent identification mismatch on ethtool results (#9669)
o fix card name lookup when driver does not support GDRVINFO command from ETHTOOL ioctl and there's only one card managed by this driver
o fallback on sysfs in order to get driver and card description when ethtool is not supported (eg: ipw2100 driver for intel centrino)
- drakfirewall: handle BitTorrent (robert vojta)
- drakTermServ: add /etc/modprobe* mount points for client hardware
config (stew)
- keyboardrake (pablo):
o support more keyboards
o Nepali uses devanagari script
- localedrake: handle Latgalian language (pablo)
- net_monitor: ignore sit0
______________________________________________________________________
An update mod_ssl packages is available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: mod_ssl
Advisory ID: MDKSA-2004:054
Date: June 1st, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________
Problem Description:
A stack-based buffer overflow exists in the ssl_util_uuencode_binary function in ssl_engine_kernel.c in mod_ssl for Apache 1.3.x. When mod_ssl is configured to trust the issuing CA, a remote attacker may be able to execute arbitrary code via a client certificate with a long subject DN.
The provided packages are patched to prevent this problem.
Updated xpcd packages are available for Mandrakelinux 9.2 and 10.0
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: xpcd
Advisory ID: MDKSA-2004:053
Date: June 1st, 2004
Affected versions: 10.0, 9.2
______________________________________________________________________
Problem Description:
A vulnerability in xpcd-svga, part of xpcd, was discovered by Jaguar. xpcd-svga uses svgalib to display graphics on the console and it would copy user-supplied data of an arbitrary length into a fixed-size buffer in the pcd_open function.
As well, Steve Kemp previously discovered a buffer overflow in xpcd-svga that could be triggered by a long HOME environment variable, which could be exploited by a local attacker to obtain root privileges.
The updated packages resolve these vulnerabilities.
Updated apache2 packages are available for Mandrakelinux 9.1, 9.2, and 10.0
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: apache2
Advisory ID: MDKSA-2004:055
Date: June 1st, 2004
Affected versions: 10.0, 9.1, 9.2
______________________________________________________________________
Problem Description:
A stack-based buffer overflow exists in the ssl_util_uuencode_binary function in ssl_util.c in Apache. When mod_ssl is configured to trust the issuing CA, a remote attacker may be able to execute arbitrary code via a client certificate with a long subject DN.
The provided packages are patched to prevent this problem.
Updated mdkonline packages are available for Mandrakelinux 10.0
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: mdkonline
Advisory ID: MDKA-2004:029
Date: June 1st, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
Mdkonline as shipped in 10.0 has some issues comparing squid release versions. This package is a mandatory upgrade to get fully functional Mandrake Online services.
DistroWatch reports that the first snapshot of the upcoming second release of the Mandrakemove live CD is now available for download and testing
Read more
An updated kolab-server package has been released for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: kolab-server
Advisory ID: MDKSA-2004:052
Date: May 26th, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
Luca Villani reported the disclosure of critical configuration information within Kolab, the KDE Groupware server. The affected versions store OpenLDAP passwords in plain text. The heart of Kolab is an engine written in Perl that rewrites configuration for certain applications based on templates. The build() function in the engine left slapd.conf world-readable exhibiting the OpenLDAP root password.
Updated mailmain packages are available for Mandrakelinux 10.0 and 9.2
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: mailman
Advisory ID: MDKSA-2004:051
Date: May 26th, 2004
Affected versions: 10.0, 9.2
______________________________________________________________________
Problem Description:
Mailman versions >= 2.1 have an issue where 3rd parties can retrieve member passwords from the server. The updated packages have a patch backported from 2.1.5 to correct the issue.
Updated postfix packages are available for Mandrakelinux 10.0
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: postfix
Advisory ID: MDKA-2004:028
Date: May 26th, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
The Postfix 2.1.1 official release provides completely revised documentation and some minor bugfixes.
DistroWatch reports that Mandrakelinux 10.0 Official is now available for download
Updated Kernel packages are available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: kernel
Advisory ID: MDKSA-2004:050
Date: May 21st, 2004
Affected versions: 10.0, 9.2
______________________________________________________________________
Problem Description:
Brad Spender discovered an exploitable bug in the cpufreq code in the Linux 2.6 kernel (CAN-2004-0228).
As well, a permissions problem existed on some SCSI drivers; a fix from Olaf Kirch is provided that changes the mode from 0777 to 0600.
An updated mkinitrd-net package has been released for Mandrakelinux 10.0
_______________________________________________________________________
Mandrakelinux Update Advisory
_______________________________________________________________________
Package name: mkinitrd-net
Advisory ID: MDKA-2004:026
Date: May 20th, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
The include-modules script in the mkinitrd-net package has a debugging statement, "basename: $basename" left in it, which causes problems in booting a client machine. This update had been built back in March, but never made it into the distribution.
Updated apache-mod_perl packages are available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: apache-mod_perl
Advisory ID: MDKSA-2004:046-1
Date: May 20th, 2004
Original Advisory Date: May 17th, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
Four security vulnerabilities were fixed with the 1.3.31 release of Apache. All of these issues have been backported and applied to the provided packages. Thanks to Ralf Engelschall of OpenPKG for providing the patches.
Mandrakelinux 10.0 Official packs are available:
The new Mandrakelinux 10.0 Official range of packs is now available!
Mandrakelinux 10.0 Official offers you all the greatest Mandrakelinux features in a professional package which includes documentation and support, as well as valuable commercial add-ons.
The 4th Edition of the Definitive Mandrakelinux Guide is now available. From the Mandrakesoft newsletter:
This new release has been thoroughly updated and expanded to cover the recently released Mandrakelinux 10.0.
"The Definitive Guide to Using Mandrakelinux" contains everything needed to install, understand, and use the popular Mandrakelinux distribution. Perfect for computer users who are new to Linux, as well as forexperts who need quality reference documentation, this new edition of "The Definitive Guide to Using Mandrake Linux" is available now for pre-order at MandrakeStore.com.
Updated libneon packages are available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: libneon
Advisory ID: MDKSA-2004:049
Date: May 19th, 2004
Affected versions: 10.0, 9.2
______________________________________________________________________
Problem Description:
It was discovered that in portions of neon, sscanf() is used in an unsafe manner. This will result in an overflow of a static heap variable.
The updated packages provide a patched libneon to correct these problems.
A cvs update is available for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: cvs
Advisory ID: MDKSA-2004:048
Date: May 19th, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
Stefan Esser discovered that malformed "Entry" lines in combination with Is-modified and Unchanged can be used to overflow malloc()ed memory in a way that can be remotely exploited.
The updated packages contain a patch to correct the problem.
Updated kdelibs packages has been released for Mandrakelinux
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: kdelibs
Advisory ID: MDKSA-2004:047
Date: May 18th, 2004
Affected versions: 10.0, 9.2
______________________________________________________________________
Problem Description:
A vulnerability in the Opera web browser was identified by iDEFENSE; the same type of vulnerability exists in KDE. The telnet, rlogin, ssh, and mailto URI handlers do not check for '-' at the beginning of the hostname passed, which makes it possible to pass an option to the programs started by the handlers. This can allow remote attackers to create or truncate arbitrary files.
The updated packages contain patches provided by the KDE team to fix this problem.