Mandriva 1271 Published by

Updated nfs-utils packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: nfs-utils
Advisory ID: MDKSA-2005:005
Date: January 11th, 2005

Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
______________________________________________________________________

Problem Description:

Arjan van de Ven discovered a buffer overflow in rquotad on 64bit architectures; an improper integer conversion could lead to a buffer overflow. An attacker with access to an NFS share could send a specially crafted request which could then lead to the execution of arbitrary code.

The updated packages are provided to prevent this issue.



_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946
______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
71991bf34674e4bebd4870c24dce4929 10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.i586.rpm
1c6231362def3c56d747b3ccc22b7597 10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.i586.rpm
bf52589c8d97f63f3024f90a79c201c9 10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
28bc6309e5488cd7bf294ae1a4ce68b2 amd64/10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.amd64.rpm
ed8b7dfa77200e5badb473678a91bb2a amd64/10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.amd64.rpm
bf52589c8d97f63f3024f90a79c201c9 amd64/10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm

Mandrakelinux 10.1:
bb7161793b2154c3e122adabaed9ed60 10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.i586.rpm
e219e85405758a9ef9511eacf4118e07 10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.i586.rpm
7510d378225740169ae1a3dbaf0f223f 10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
ed70043e2d95cbebc2cd12e0f973a29f x86_64/10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.x86_64.rpm
7c086dfb028423e9105525111194aff5 x86_64/10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.x86_64.rpm
7510d378225740169ae1a3dbaf0f223f x86_64/10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm

Corporate Server 2.1:
cc1b1f4c8232db49f40df9117d2237f8 corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.i586.rpm
8af58044e57d46921c0ad8745826d1dd corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.i586.rpm
9d167452a31fc1e5ef4f43086f0d7b34 corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
c7f8d994d4d261d41f6bf246c280fb10 x86_64/corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.x86_64.rpm
77be17723eb840715500edb3cf8c687b x86_64/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.x86_64.rpm
9d167452a31fc1e5ef4f43086f0d7b34 x86_64/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm

Mandrakelinux 9.2:
00f2319415647d9fa85926cc05271793 9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.i586.rpm
680ef7be663350d18ad5b7f94bbc2e21 9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.i586.rpm
4a49c7508d166c62b6d76e7c1cccbacd 9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
c0e275ce5838575eda14efb2d582aefc amd64/9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.amd64.rpm
779856f22f146342ab6e42c4f20acd95 amd64/9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.amd64.rpm
4a49c7508d166c62b6d76e7c1cccbacd amd64/9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com