From: Linux Mandrake Security Team <security@linux-mandrake.com>
Subject: MDKSA-2001:050 - vixie-cron update
Date: 10 May 2001 23:08:49 -0600
______________________________________________________________________
Linux-Mandrake Security Update Advisory
______________________________________________________________________
Package name: vixie-cron
Date: May 10th, 2001
Advisory ID: MDKSA-2001:050
Affected versions: 7.1, 7.2, 8.0, Corporate Server 1.0.1
______________________________________________________________________
Problem Description:
A recent security fix to cron introduced a new problem with giving up
privileges before invoking the editor. A malicious local user could
exploit this to gain root acces.
______________________________________________________________________
References:
http://www.securityfocus.com/frames/?content=/vdb/bottom.html?vid=2687
______________________________________________________________________
Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:
rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at
http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.
Linux-Mandrake 7.1:
53b4beefcd4582e0dfe885c82f1221e9 7.1/RPMS/vixie-cron-3.0.1-46.4mdk.i586.rpm
51e96cbcfc44216eb099f514b2a01eff 7.1/SRPMS/vixie-cron-3.0.1-46.4mdk.src.rpm
Linux-Mandrake 7.2:
ad448a558a7466c08ac90a7c8de15e5d 7.2/RPMS/vixie-cron-3.0.1-46.3mdk.i586.rpm
2454ea0ed26c3b1dfb1335c522fe8c40 7.2/SRPMS/vixie-cron-3.0.1-46.3mdk.src.rpm
Linux-Mandrake 8.0:
c464b6c019defb09c8749800f3ecef79 8.0/RPMS/vixie-cron-3.0.1-51.1mdk.i586.rpm
f5fb6b648d1d87578c9cd7e44ec909ea 8.0/SRPMS/vixie-cron-3.0.1-51.1mdk.src.rpm
Corporate Server 1.0.1:
53b4beefcd4582e0dfe885c82f1221e9 1.0.1/RPMS/vixie-cron-3.0.1-46.4mdk.i586.rpm
51e96cbcfc44216eb099f514b2a01eff 1.0.1/SRPMS/vixie-cron-3.0.1-46.4mdk.src.rpm
______________________________________________________________________
Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
______________________________________________________________________
To upgrade automatically, use MandrakeUpdate.
If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".
You can download the updates directly from one of the mirror sites
listed at:
http://www.linux-mandrake.com/en/ftp.php3.
Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Linux-Mandrake 8.0, look for it in "updates/8.0/RPMS/". Updated source
RPMs are available as well, but you generally do not need to download
them.
Please be aware that sometimes it takes the mirrors a few hours to
update.
You can view other security advisories for Linux-Mandrake at:
http://www.linux-mandrake.com/en/security/
If you want to report vulnerabilities, please contact
security@linux-mandrake.com
______________________________________________________________________
Linux-Mandrake has two security-related mailing list services that
anyone can subscribe to:
security-announce@linux-mandrake.com
Linux-Mandrake's security announcements mailing list. Only
announcements are sent to this list and it is read-only.
security-discuss@linux-mandrake.com
Linux-Mandrake's security discussion mailing list. This list is open
to anyone to discuss Linux-Mandrake security specifically and Linux
security in general.
To subscribe to either list, send a message to
sympa@linux-mandrake.com
with "subscribe [listname]" in the body of the message.
To remove yourself from either list, send a message to
sympa@linux-mandrake.com
with "unsubscribe [listname]" in the body of the message.
To get more information on either list, send a message to
sympa@linux-mandrake.com
with "info [listname]" in the body of the message.
Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:
http://www.linux-mandrake.com/en/flists.php3#security