Mandriva 1275 Published by Philipp Esselbach 0

Updated tripware packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: tripwire
Advisory ID: MDKSA-2004:057
Date: June 7th, 2004

Affected versions: 10.0, 9.2, Corporate Server 2.1
______________________________________________________________________

Problem Description:

Paul Herman discovered a format string vulnerability in tripwire that could allow a local user to execute arbitrary code with the rights of the user running tripwire (typically root). This vulnerability only exists when tripwire is generating an email report.

Mandriva 1275 Published by Philipp Esselbach 0

Updated krb5 packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: krb5
Advisory ID: MDKSA-2004:056
Date: June 3rd, 2004

Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________

Problem Description:

Multiple buffer overflows exist in the krb5_aname_to_localname() library function that if exploited could lead to unauthorized root privileges. In order to exploit this flaw, an attacker must first successfully authenticate to a vulnerable service, which must be configured to enable the explicit mapping or rules-based mapping functionality of krb5_aname_to_localname, which is not a default configuration.

Mandrakesoft encourages all users to upgrade to these patched krb5 packages.

Mandriva 1275 Published by Philipp Esselbach 0

An updated drakxtools package is available for Mandrakelinux 10.0
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: drakxtools
Advisory ID: MDKA-2004:030
Date: June 2nd, 2004

Affected versions: 10.0
______________________________________________________________________

Problem Description:

- authentication: install autofs for nis authentication (florin & fcrozat)
- diskdrake: disable package instead of removing nfs-utils or samba-server (when "diskdrake --fileshare" disables a export kind) (pixel, #9804)
- drakbackup: fix dropped .txt files when running mkisofs (stew) (Anthill #799)
o late breaking typo fix in tape restore (Federico Belvisi)
- drakconnect:
o prevent identification mismatch on ethtool results (#9669)
o fix card name lookup when driver does not support GDRVINFO command from ETHTOOL ioctl and there's only one card managed by this driver
o fallback on sysfs in order to get driver and card description when ethtool is not supported (eg: ipw2100 driver for intel centrino)
- drakfirewall: handle BitTorrent (robert vojta)
- drakTermServ: add /etc/modprobe* mount points for client hardware
config (stew)
- keyboardrake (pablo):
o support more keyboards
o Nepali uses devanagari script
- localedrake: handle Latgalian language (pablo)
- net_monitor: ignore sit0
______________________________________________________________________

Mandriva 1275 Published by Philipp Esselbach 0

An update mod_ssl packages is available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: mod_ssl
Advisory ID: MDKSA-2004:054
Date: June 1st, 2004

Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________

Problem Description:

A stack-based buffer overflow exists in the ssl_util_uuencode_binary function in ssl_engine_kernel.c in mod_ssl for Apache 1.3.x. When mod_ssl is configured to trust the issuing CA, a remote attacker may be able to execute arbitrary code via a client certificate with a long subject DN.

The provided packages are patched to prevent this problem.

Mandriva 1275 Published by Philipp Esselbach 0

Updated xpcd packages are available for Mandrakelinux 9.2 and 10.0

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: xpcd
Advisory ID: MDKSA-2004:053
Date: June 1st, 2004

Affected versions: 10.0, 9.2
______________________________________________________________________

Problem Description:

A vulnerability in xpcd-svga, part of xpcd, was discovered by Jaguar. xpcd-svga uses svgalib to display graphics on the console and it would copy user-supplied data of an arbitrary length into a fixed-size buffer in the pcd_open function.

As well, Steve Kemp previously discovered a buffer overflow in xpcd-svga that could be triggered by a long HOME environment variable, which could be exploited by a local attacker to obtain root privileges.

The updated packages resolve these vulnerabilities.

Mandriva 1275 Published by Philipp Esselbach 0

Updated apache2 packages are available for Mandrakelinux 9.1, 9.2, and 10.0
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: apache2
Advisory ID: MDKSA-2004:055
Date: June 1st, 2004

Affected versions: 10.0, 9.1, 9.2
______________________________________________________________________

Problem Description:

A stack-based buffer overflow exists in the ssl_util_uuencode_binary function in ssl_util.c in Apache. When mod_ssl is configured to trust the issuing CA, a remote attacker may be able to execute arbitrary code via a client certificate with a long subject DN.

The provided packages are patched to prevent this problem.

Mandriva 1275 Published by Philipp Esselbach 0

Updated mdkonline packages are available for Mandrakelinux 10.0
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: mdkonline
Advisory ID: MDKA-2004:029
Date: June 1st, 2004

Affected versions: 10.0
______________________________________________________________________

Problem Description:

Mdkonline as shipped in 10.0 has some issues comparing squid release versions. This package is a mandatory upgrade to get fully functional Mandrake Online services.

Mandriva 1275 Published by Philipp Esselbach 0

DistroWatch reports that the first snapshot of the upcoming second release of the Mandrakemove live CD is now available for download and testing

Read more

Mandriva 1275 Published by Philipp Esselbach 0

An updated kolab-server package has been released for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: kolab-server
Advisory ID: MDKSA-2004:052
Date: May 26th, 2004

Affected versions: 10.0
______________________________________________________________________

Problem Description:

Luca Villani reported the disclosure of critical configuration information within Kolab, the KDE Groupware server. The affected versions store OpenLDAP passwords in plain text. The heart of Kolab is an engine written in Perl that rewrites configuration for certain applications based on templates. The build() function in the engine left slapd.conf world-readable exhibiting the OpenLDAP root password.

Mandriva 1275 Published by Philipp Esselbach 0

Updated mailmain packages are available for Mandrakelinux 10.0 and 9.2
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: mailman
Advisory ID: MDKSA-2004:051
Date: May 26th, 2004

Affected versions: 10.0, 9.2
______________________________________________________________________

Problem Description:

Mailman versions >= 2.1 have an issue where 3rd parties can retrieve member passwords from the server. The updated packages have a patch backported from 2.1.5 to correct the issue.

Mandriva 1275 Published by Philipp Esselbach 0

Updated postfix packages are available for Mandrakelinux 10.0

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: postfix
Advisory ID: MDKA-2004:028
Date: May 26th, 2004

Affected versions: 10.0
______________________________________________________________________

Problem Description:

The Postfix 2.1.1 official release provides completely revised documentation and some minor bugfixes.

Mandriva 1275 Published by Philipp Esselbach 0

Updated Kernel packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: kernel
Advisory ID: MDKSA-2004:050
Date: May 21st, 2004

Affected versions: 10.0, 9.2
______________________________________________________________________

Problem Description:

Brad Spender discovered an exploitable bug in the cpufreq code in the Linux 2.6 kernel (CAN-2004-0228).

As well, a permissions problem existed on some SCSI drivers; a fix from Olaf Kirch is provided that changes the mode from 0777 to 0600.

Mandriva 1275 Published by Philipp Esselbach 0

An updated mkinitrd-net package has been released for Mandrakelinux 10.0
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: mkinitrd-net
Advisory ID: MDKA-2004:026
Date: May 20th, 2004

Affected versions: 10.0
______________________________________________________________________

Problem Description:

The include-modules script in the mkinitrd-net package has a debugging statement, "basename: $basename" left in it, which causes problems in booting a client machine. This update had been built back in March, but never made it into the distribution.

Mandriva 1275 Published by Philipp Esselbach 0

Updated apache-mod_perl packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: apache-mod_perl
Advisory ID: MDKSA-2004:046-1
Date: May 20th, 2004
Original Advisory Date: May 17th, 2004
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1
______________________________________________________________________

Problem Description:

Four security vulnerabilities were fixed with the 1.3.31 release of Apache. All of these issues have been backported and applied to the provided packages. Thanks to Ralf Engelschall of OpenPKG for providing the patches.

Mandriva 1275 Published by Philipp Esselbach 0

Mandrakelinux 10.0 Official packs are available:

The new Mandrakelinux 10.0 Official range of packs is now available!

Mandrakelinux 10.0 Official offers you all the greatest Mandrakelinux features in a professional package which includes documentation and support, as well as valuable commercial add-ons.

Mandriva 1275 Published by Philipp Esselbach 0

The 4th Edition of the Definitive Mandrakelinux Guide is now available. From the Mandrakesoft newsletter:

This new release has been thoroughly updated and expanded to cover the recently released Mandrakelinux 10.0.

"The Definitive Guide to Using Mandrakelinux" contains everything needed to install, understand, and use the popular Mandrakelinux distribution. Perfect for computer users who are new to Linux, as well as forexperts who need quality reference documentation, this new edition of "The Definitive Guide to Using Mandrake Linux" is available now for pre-order at MandrakeStore.com.

Mandriva 1275 Published by Philipp Esselbach 0

Updated libneon packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: libneon
Advisory ID: MDKSA-2004:049
Date: May 19th, 2004

Affected versions: 10.0, 9.2
______________________________________________________________________

Problem Description:

It was discovered that in portions of neon, sscanf() is used in an unsafe manner. This will result in an overflow of a static heap variable.

The updated packages provide a patched libneon to correct these problems.

Mandriva 1275 Published by Philipp Esselbach 0

A cvs update is available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: cvs
Advisory ID: MDKSA-2004:048
Date: May 19th, 2004

Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1
______________________________________________________________________

Problem Description:

Stefan Esser discovered that malformed "Entry" lines in combination with Is-modified and Unchanged can be used to overflow malloc()ed memory in a way that can be remotely exploited.

The updated packages contain a patch to correct the problem.

Mandriva 1275 Published by Philipp Esselbach 0

Updated kdelibs packages has been released for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: kdelibs
Advisory ID: MDKSA-2004:047
Date: May 18th, 2004

Affected versions: 10.0, 9.2
______________________________________________________________________

Problem Description:

A vulnerability in the Opera web browser was identified by iDEFENSE; the same type of vulnerability exists in KDE. The telnet, rlogin, ssh, and mailto URI handlers do not check for '-' at the beginning of the hostname passed, which makes it possible to pass an option to the programs started by the handlers. This can allow remote attackers to create or truncate arbitrary files.

The updated packages contain patches provided by the KDE team to fix this problem.