5260854 2000-07-07 21:04 /79 rader/ Postmaster Mottagare: Bugtraq (import) <11634> Ärende: [Security Announce] man update ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com X-Authentication-Warning: devel.danen.net: vdanen set sender t vdanen@mandrakesoft.com using -f Mail-Followup-To: security-announce@linux-mandrake.com Linux Mandrake Security <mdk-security@freezer-burn.org> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit User-Agent: Mutt/1.2.2i X-Operating-System: Linux Mandrake 2.2.15-4mdk i586 X-Loop: security-announce@linux-mandrake.com X-Sequence: 104 Precedence: list Message-ID: <20000707094101.B3678@mandrakesoft.com> Date: Fri, 7 Jul 2000 09:41:01 -0600 Reply-To: security-discuss@linux-mandrake.com Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Vincent Danen <vdanen@MANDRAKESOFT.COM> Organization: Danen Consulting Services (www.danen.net) X-To: security-announce@linux-mandrake.com X-cc: Linux Mandrake Security <mdk-security@freezer-burn.org> To: BUGTRAQ@SECURITYFOCUS.COM _____________________________________________________________________ Linux-Mandrake Security Update Advisory. _____________________________________________________________________ Date: July 7th, 2000 Package name: man Affected versions: 6.0, 6.1, 7.0, 7.1 Problem: Internet Security Systems (ISS) X-Force has identified a vulnerability in the makewhatis Bourne shell script that ships with many Linux distributions. It is found in versions 1.5e and higher of man, and handles temporary files insecurely. Local users may gain a variety of privileges depending on the complexity of the exploit. The mode of any file on the system can be changed to 0700. Any file on the system may be created or overwritten as root. Local users may also be able to read any system file by forcing a copy of it into the whatis database. Please upgrade to: md5sum: f4f87cab84a716a2ccb8c74b3325c0c9 6.0/RPMS/man-1.5g-15mdk.i586.rpm md5sum: 52d021732aa09d517eeff8b60d427a69 6.0/SRPMS/man-1.5g-15mdk.src.rpm md5sum: 2b01457036a6813fa616adbca97fcb36 6.1/RPMS/man-1.5g-15mdk.i586.rpm md5sum: 52d021732aa09d517eeff8b60d427a69 6.1/SRPMS/man-1.5g-15mdk.src.rpm md5sum: ea883685faa409148f9b55c442a0438c 7.0/RPMS/man-1.5g-15mdk.i586.rpm md5sum: 52d021732aa09d517eeff8b60d427a69 7.0/SRPMS/man-1.5g-15mdk.src.rpm md5sum: fbc1b9e04d75f267650f291d99f467f1 7.1/RPMS/man-1.5g-15mdk.i586.rpm md5sum: 52d021732aa09d517eeff8b60d427a69 7.1/SRPMS/man-1.5g-15mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". All mirrors are listed on http://www.mandrake.com/en/ftp.php3. Updated packages are available in the "updates/" directory. For example, if you are looking for an updated RPM package for Mandrake 7.1, look for it in: updates/7.1/RPMS/ Notes: - We give the md5 sum for each package. It lets you check the integrity of the downloaded package by running the md5sum command on the package ("md5sum package.rpm"). - You generally do not need to download the source package with a .src.rpm suffix - All the updated packages are listed on the website on http://www.linux-mandrake.com/en/fupdates.php3 - To subscribe/unsubscribe from the "security-announce" list and subscribe/unsubscribe from the "security-discuss" list see: http://www.linux-mandrake.com/en/flists.php3#security (5260854) ------------------------------------------(Ombruten)