Mandrake Linux Security Update Advisory
Package name: | kernel |
Advisory ID: | MDKSA-2003:066-1 |
Date: | July 21st, 2003 |
Original Advisory Date: | June 11th, 2003 |
Affected versions: | 9.1 |
Problem Description:
Multiple vulnerabilities were discovered and fixed in the Linux
kernel.
- CAN-2003-0001: Multiple ethernet network card drivers do not
pad frames with null bytes which allows remote attackers to obtain
information from previous packets or kernel memory by using special
malformed packets. - CAN-2003-0244: The route cache implementation in the 2.4 kernel
and the Netfilter IP conntrack module allows remote attackers to
cause a Denial of Service (DoS) via CPU consumption due to packets
with forged source addresses that cause a large number of hash
table collisions related to the PREROUTING chain. - CAN-2003-0246: The ioperm implementation in 2.4.20 and earlier
kernels does not properly restrict privileges, which allows local
users to gain read or write access to certain I/O ports. - CAN-2003-0247: A vulnerability in the TTY layer of the 2.4
kernel allows attackers to cause a kernel oops resulting in a
DoS. - CAN-2003-0248: The mxcsr code in the 2.4 kernel allows
attackers to modify CPU state registers via a malformed
address.
As well, a number of bug fixes were made in the 9.1 kernel
including:
- Support for more machines that did not work with APIC
- Audigy2 support
- New/updated modules: prims25, adiusbadsl, thinkpad, ieee1394,
orinoco, via-rhine, - Fixed SiS IOAPIC
- IRQ balancing has been fixed for SMP
- Updates to ext3
- The previous ptrace fix has been redone to work better
MandrakeSoft encourages all users to upgrade to these new
kernels. Updated kernels will be available shortly for other
supported platforms and architectures.
For full instructions on how to properly upgrade your kernel,
please review http://www.mandrakesecure.net/en/docs/magic.php.
Update:
These new packages fix some bugs with compiling kernels using
xconfig and also fix problems with XFS ACLs not being present in
the kernel. Problems with ipsec have also been corrected. A problem
with gdb not working on systems where XFS was used for the root
filesystem has also been corrected. They also address
CAN-2003-0476: A file read race existed in the execve() system
call.
9.1/PPC kernels are now also available.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0246
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0248
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0476
http://marc.theaimsgroup.com/?l=bugtraq&m=105664924024009&w=2
Updated Packages:
Mandrake Linux 9.1:
de26b46560fd8c94f198201bb8d9d64a
9.1/RPMS/kernel-2.4.21.0.24mdk-1-1mdk.i586.rpm
26aa70b3cda0ec6a01e4beba8b2dcf52
9.1/RPMS/kernel-BOOT-2.4.21.0.24mdk-1-1mdk.i586.rpm
7bb22382a913e4c68a8ecbc3bd5ab68b
9.1/RPMS/kernel-doc-2.4.21-0.24mdk.i586.rpm
0fa207b6d896878a88fb13b2dad0c47e
9.1/RPMS/kernel-enterprise-2.4.21.0.24mdk-1-1mdk.i586.rpm
d5ea0fa59457a2751c48f2442e14e463
9.1/RPMS/kernel-secure-2.4.21.0.24mdk-1-1mdk.i586.rpm
eef8908074ce54a62c267f313e4cb166
9.1/RPMS/kernel-smp-2.4.21.0.24mdk-1-1mdk.i586.rpm
bf8b9b0db8b2d7c835730bfe083739dc
9.1/RPMS/kernel-source-2.4.21-0.24mdk.i586.rpm
7da367a51f5a0f11c642be2a6f6249d6
9.1/SRPMS/kernel-2.4.21.0.24mdk-1-1mdk.src.rpm
Mandrake Linux 9.1/PPC:
ee35a54f64dc5f5d4d3f3f98e77837a7
ppc/9.1/RPMS/kernel-2.4.21.0.24mdk-1-1mdk.ppc.rpm
d47813ca471e45164452af47402e92eb
ppc/9.1/RPMS/kernel-doc-2.4.21-0.24mdk.ppc.rpm
753c0854e112ef6d8db829279915a9bd
ppc/9.1/RPMS/kernel-enterprise-2.4.21.0.24mdk-1-1mdk.ppc.rpm
5b59c4607068150a82a353e4fee4a329
ppc/9.1/RPMS/kernel-smp-2.4.21.0.24mdk-1-1mdk.ppc.rpm
22956b70bba1abe85dc859b850a966da
ppc/9.1/RPMS/kernel-source-2.4.21-0.24mdk.ppc.rpm
7da367a51f5a0f11c642be2a6f6249d6
ppc/9.1/SRPMS/kernel-2.4.21.0.24mdk-1-1mdk.src.rpm
Bug IDs fixed (see https://qa.mandrakesoft.com for
more information):
3615 – no acls in XFS
4059 – xconfig aborts with an error
4060 – xconfig unable to disable certain options
To upgrade automatically, use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
A list of FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
All packages are signed by MandrakeSoft for security. You can
obtain the GPG public key of the Mandrake Linux Security Team by
executing:
gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98
Please be aware that sometimes it takes the mirrors a few hours
to update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type | Bits/KeyID | Date | User ID |
pub | 1024D/22458A98 | 2000-07-10 | Linux Mandrake Security Team |
<security linux-mandrake.com>
Mandrake Linux Security Update Advisory
Package name: | apache2 |
Advisory ID: | MDKSA-2003:075 |
Date: | July 21st, 2003 |
Affected versions: | 9.1 |
Problem Description:
Several vulnerabilities were discovered in Apache 2.x versions
prior to 2.0.47. From the Apache 2.0.47 release notes:
Certain sequences of per-directory renegotiations and the
SSLCipherSuite directive being used to upgrade from a weak
ciphersuite to a strong one could result in the weak ciphersuite
being used in place of the new one (CAN-2003-0192).
Certain errors returned by accept() on rarely accessed ports
could cause temporary Denial of Service due to a bug in the prefork
MPM (CAN-2003-0253).
Denial of Service was caused when target host is IPv6 but FTP
proxy server can’t create IPv6 socket (CAN-2003-0254).
The server would crash when going into an infinite loop due to
too many subsequent internal redirects and nested subrequests
(VU#379828).
The Apache Software Foundation thanks Saheed Akhtar and Yoshioka
Tsuneo for responsibly reporting these issues.
To upgrade these apache packages, first stop Apache by issuing,
as root:
service httpd stop
After the upgrade, restart Apache with:
service httpd start
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254
http://www.kb.cert.org/vuls/id/379828
http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
Updated Packages:
Mandrake Linux 9.1:
6878287e750c587d3240e23f809ee9f4
9.1/RPMS/apache-conf-2.0.44-11.1mdk.i586.rpm
847ee399abf4caea566db066d725c215
9.1/RPMS/apache2-2.0.47-1.1mdk.i586.rpm
b96ec2e4ae78347e54bcdee5174268ea
9.1/RPMS/apache2-common-2.0.47-1.1mdk.i586.rpm
693fa8f4b57865352c052e6ed056f8d2
9.1/RPMS/apache2-devel-2.0.47-1.1mdk.i586.rpm
b52cc16627ecc10e75cf0064b23cdd79
9.1/RPMS/apache2-manual-2.0.47-1.1mdk.i586.rpm
5e53cb7985228e1387363b98235fbf27
9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.i586.rpm
7bb48f701eb345b2dfbc7a2b4f5a58a1
9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.i586.rpm
e0b5a5df69eff6d11c1ee3d153bf4522
9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.i586.rpm
0d7aad34a3609bed609d0144eafe8c67
9.1/RPMS/apache2-modules-2.0.47-1.1mdk.i586.rpm
a6fe923d55c30533a257194b90175898
9.1/RPMS/apache2-source-2.0.47-1.1mdk.i586.rpm
58f60b14beda6d52843fd59c7b4ae45b
9.1/RPMS/libapr0-2.0.47-1.1mdk.i586.rpm
6ca5928088016125c0493ba42e42d8bd
9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm
a649bb491709936ab8c69944d8daae9f
9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm
Mandrake Linux 9.1/PPC:
6f1c1f3393a2517d2a6efc060986d5f6
ppc/9.1/RPMS/apache-conf-2.0.44-11.1mdk.ppc.rpm
7692cc8ceb9570d00bdcd14a31635ea8
ppc/9.1/RPMS/apache2-2.0.47-1.1mdk.ppc.rpm
4d0a1f922b53da1cad75c0ffe92b6eb6
ppc/9.1/RPMS/apache2-common-2.0.47-1.1mdk.ppc.rpm
6428efa29c215a11d16af2eb19c66df0
ppc/9.1/RPMS/apache2-devel-2.0.47-1.1mdk.ppc.rpm
4e09ede360c766be3480f26f06e898da
ppc/9.1/RPMS/apache2-manual-2.0.47-1.1mdk.ppc.rpm
d8a9778144123ed670e69efae82704df
ppc/9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.ppc.rpm
1d11cb6e70fb41ab59fe97291c883825
ppc/9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.ppc.rpm
c555df0597fbaf7a7600c86b77470830
ppc/9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.ppc.rpm
870f375144db36fa7f97b4e4a220b76f
ppc/9.1/RPMS/apache2-modules-2.0.47-1.1mdk.ppc.rpm
36afbb4e44d0525a97f36a22eddc3fea
ppc/9.1/RPMS/apache2-source-2.0.47-1.1mdk.ppc.rpm
190aa752b6b00ac28d5c246d35d9cdef
ppc/9.1/RPMS/libapr0-2.0.47-1.1mdk.ppc.rpm
6ca5928088016125c0493ba42e42d8bd
ppc/9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm
a649bb491709936ab8c69944d8daae9f
ppc/9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm
Bug IDs fixed (see https://qa.mandrakesoft.com for
more information):
To upgrade automatically, use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
A list of FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
All packages are signed by MandrakeSoft for security. You can
obtain the GPG public key of the Mandrake Linux Security Team by
executing:
gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98
Please be aware that sometimes it takes the mirrors a few hours
to update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type | Bits/KeyID | Date | User ID |
pub | 1024D/22458A98 | 2000-07-10 | Linux Mandrake Security Team |
<security linux-mandrake.com>
Mandrake Linux Security Update Advisory
Package name: | nfs-utils |
Advisory ID: | MDKSA-2003:076 |
Date: | July 21st, 2003 |
Affected versions: | 8.2, 9.0, 9.1, Corporate Server 2.1 |
Problem Description:
An off-by-one buffer overflow was found in the logging code in
nfs-utils when adding a newline to the string being logged. This
could allow an attacker to execute arbitrary code or cause a DoS
(Denial of Service) on the server by sending certain RPC
requests.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0252
Updated Packages:
Corporate Server 2.1:
afe02ce4c5f8ca99c44ec7e86c2a87b1
corporate/2.1/RPMS/nfs-utils-1.0.1-1.1mdk.i586.rpm
2101dbdd6f7a09daf744b2405db03244
corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.1mdk.i586.rpm
b49f189c0cd2ffa058e1facaac42e1b3
corporate/2.1/SRPMS/nfs-utils-1.0.1-1.1mdk.src.rpm
Corporate Server 2.1/x86_64:
1cd88757f7fe256a7ceb5d9cc61635d8
x86_64/corporate/2.1/RPMS/nfs-utils-1.0.1-1.1mdk.x86_64.rpm
8e3d571ba1288eb3b54e8652a7f47626
x86_64/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.1mdk.x86_64.rpm
b49f189c0cd2ffa058e1facaac42e1b3
x86_64/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.1mdk.src.rpm
Mandrake Linux 8.2:
4c558ba4b7fdb4b42822e9d73878a508
8.2/RPMS/nfs-utils-0.3.3-3.1mdk.i586.rpm
9f1f54ab94f3abd067a5e40b6d81100a
8.2/RPMS/nfs-utils-clients-0.3.3-3.1mdk.i586.rpm
672f5a3ca5f042bef35d9f8427cad174
8.2/SRPMS/nfs-utils-0.3.3-3.1mdk.src.rpm
Mandrake Linux 8.2/PPC:
11bc4cf63a43a2f6f6e6913c207717d1
ppc/8.2/RPMS/nfs-utils-0.3.3-3.1mdk.ppc.rpm
f4e1d4eb7c9cebb6d356c26472382155
ppc/8.2/RPMS/nfs-utils-clients-0.3.3-3.1mdk.ppc.rpm
672f5a3ca5f042bef35d9f8427cad174
ppc/8.2/SRPMS/nfs-utils-0.3.3-3.1mdk.src.rpm
Mandrake Linux 9.0:
afe02ce4c5f8ca99c44ec7e86c2a87b1
9.0/RPMS/nfs-utils-1.0.1-1.1mdk.i586.rpm
2101dbdd6f7a09daf744b2405db03244
9.0/RPMS/nfs-utils-clients-1.0.1-1.1mdk.i586.rpm
b49f189c0cd2ffa058e1facaac42e1b3
9.0/SRPMS/nfs-utils-1.0.1-1.1mdk.src.rpm
Mandrake Linux 9.1:
374e0e896893eed5574bd07e5fc3e98a
9.1/RPMS/nfs-utils-1.0.1-1.1mdk.i586.rpm
bead87e084c6c8af03d7cddd3eab8725
9.1/RPMS/nfs-utils-clients-1.0.1-1.1mdk.i586.rpm
b49f189c0cd2ffa058e1facaac42e1b3
9.1/SRPMS/nfs-utils-1.0.1-1.1mdk.src.rpm
Mandrake Linux 9.1/PPC:
8884a5489b3973660c266dc261826c87
ppc/9.1/RPMS/nfs-utils-1.0.1-1.1mdk.ppc.rpm
53362acc8a956809004c08f3cf3428ba
ppc/9.1/RPMS/nfs-utils-clients-1.0.1-1.1mdk.ppc.rpm
b49f189c0cd2ffa058e1facaac42e1b3
ppc/9.1/SRPMS/nfs-utils-1.0.1-1.1mdk.src.rpm
Bug IDs fixed (see https://qa.mandrakesoft.com for
more information):
To upgrade automatically, use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
A list of FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
All packages are signed by MandrakeSoft for security. You can
obtain the GPG public key of the Mandrake Linux Security Team by
executing:
gpg –recv-keys –keyserver www.mandrakesecure.net
0x22458A98
Please be aware that sometimes it takes the mirrors a few hours
to update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services
that anyone can subscribe to. Information on these lists can be
obtained by visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type | Bits/KeyID | Date | User ID |
pub | 1024D/22458A98 | 2000-07-10 | Linux Mandrake Security Team |
<security linux-mandrake.com>