Date: Fri, 07 Dec 2007 14:20:58 -0700
From: [email protected]Subject: [ MDKSA-2007:240 ] - Updated libnfsidmap packages fix username lookup
flaw
To: [email protected]
Reply-To: [email protected]
Message-id: <E1J0kd0-0007qC-EA@artemis.annvix.ca.>
X-SA-Exim-Connect-IP: 10.0.5.11
X-SA-Exim-Mail-From: [email protected]
X-SA-Exim-Version: 4.2.1 (built Fri, 02 Feb 2007 19:02:33 -0700)
X-SA-Exim-Scanned: Yes (on hades.annvix.org)
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:240
http://www.mandriva.com/security/
_______________________________________________________________________
Package : libnfsidmap
Date : December 7, 2007
Affected: 2007.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
The NFSv4 ID mapper prior to 0.17 did not properly handle return values
from the getpwnam_r() function when performing a username lookup, which
could cause it to report a file as being owned by 'root' instead of
'nobody' if the file exists on the server but not the client.
The updated packages have been patched to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4135
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
5aef6c7623566cc2a391116dece6220b 2007.0/i586/libnfsidmap0-0.17-1.1mdv2007.0.i586.rpm
e8661c0ff0f783c29daaea66bdce2b3e 2007.0/i586/libnfsidmap0-devel-0.17-1.1mdv2007.0.i586.rpm
7435851468fbcd95f235a2e1787ed07a 2007.0/SRPMS/libnfsidmap-0.17-1.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
f93421025abea5901002700e3941e1b0 2007.0/x86_64/lib64nfsidmap0-0.17-1.1mdv2007.0.x86_64.rpm
732e6bc94139643eb1aae9a3422b60d7 2007.0/x86_64/lib64nfsidmap0-devel-0.17-1.1mdv2007.0.x86_64.rpm
7435851468fbcd95f235a2e1787ed07a 2007.0/SRPMS/libnfsidmap-0.17-1.1mdv2007.0.src.rpm
Corporate 4.0:
3e393903868616a16d0ff4a2fc0c469a corporate/4.0/i586/libnfsidmap0-0.17-0.1.20060mlcs4.i586.rpm
8238c4ca2a5a40d402d6eeb80cc5d378 corporate/4.0/i586/libnfsidmap0-devel-0.17-0.1.20060mlcs4.i586.rpm
c1bee04955de16cabf915ac1c78a12f9 corporate/4.0/SRPMS/libnfsidmap-0.17-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
1b6ce310cc6912e6fa39211a95c597bc corporate/4.0/x86_64/lib64nfsidmap0-0.17-0.1.20060mlcs4.x86_64.rpm
9eba703fe240251fd065d4aa6451e74e corporate/4.0/x86_64/lib64nfsidmap0-devel-0.17-0.1.20060mlcs4.x86_64.rpm
c1bee04955de16cabf915ac1c78a12f9 corporate/4.0/SRPMS/libnfsidmap-0.17-0.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHWY46mqjQ0CJFipgRAmqQAKDSzfR9RBMqmBJz/WuWURY8hxs22QCgneKT
at+sAB0BtJw2RgiGGrmCLt4=
=+ogL
-----END PGP SIGNATURE-----