what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2006.107

Mandriva Linux Security Advisory 2006.107
Posted Jun 27, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-107 - A vulnerability in the artswrapper program, when installed setuid root, could enable a local user to elevate their privileges to that of root. By default, Mandriva Linux does not ship artswrapper setuid root, however if a user or system administrator enables the setuid bit on artswrapper, their system could be at risk.

tags | advisory, local, root
systems | linux, mandriva
advisories | CVE-2006-2916
SHA-256 | b3f323edbd50720927d1f54f1a36d93220ada4ce218425b6630ad80e743ac9af

Mandriva Linux Security Advisory 2006.107

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:107
http://www.mandriva.com/security/
_______________________________________________________________________

Package : arts
Date : June 20, 2006
Affected: 2006.0, Corporate 3.0
_______________________________________________________________________

Problem Description:

A vulnerability in the artswrapper program, when installed setuid root,
could enable a local user to elevate their privileges to that of root.

By default, Mandriva Linux does not ship artswrapper setuid root,
however if a user or system administrator enables the setuid bit on
artswrapper, their system could be at risk,

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
e339aeda7d29179cd1cccf4733d2ea5b 2006.0/RPMS/arts-1.4.2-2.1.20060mdk.i586.rpm
14e035c5433c17569f4c5a75da34fc46 2006.0/RPMS/libarts1-1.4.2-2.1.20060mdk.i586.rpm
885d2af8b77254f40864647597d3c18c 2006.0/RPMS/libarts1-devel-1.4.2-2.1.20060mdk.i586.rpm
3e874718f3d7b2a3bdf2e643552328a8 2006.0/SRPMS/arts-1.4.2-2.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
0b7bb98d6daca9786a6c9992b5ad1eef x86_64/2006.0/RPMS/arts-1.4.2-2.1.20060mdk.x86_64.rpm
c8b93580c689da29229596b927b6c936 x86_64/2006.0/RPMS/lib64arts1-1.4.2-2.1.20060mdk.x86_64.rpm
ce00bbf335ff2dbe72440a9bb78eaa7a x86_64/2006.0/RPMS/lib64arts1-devel-1.4.2-2.1.20060mdk.x86_64.rpm
3e874718f3d7b2a3bdf2e643552328a8 x86_64/2006.0/SRPMS/arts-1.4.2-2.1.20060mdk.src.rpm

Corporate 3.0:
3efc2cfa891604328401a3e53bd9727a corporate/3.0/RPMS/arts-1.2-3.2.C30mdk.i586.rpm
a531b00e63a0d34045334c2d1645ca3f corporate/3.0/RPMS/libarts1-1.2-3.2.C30mdk.i586.rpm
0317b8018843410946c4baaece545dff corporate/3.0/RPMS/libarts1-devel-1.2-3.2.C30mdk.i586.rpm
cb18544a65b1569fce30b44f8bf39a8e corporate/3.0/SRPMS/arts-1.2-3.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
0760ea71b7ec135405845cc198b0f381 x86_64/corporate/3.0/RPMS/arts-1.2-3.2.C30mdk.x86_64.rpm
d5aaa5ae052accc669a1f407ee29e822 x86_64/corporate/3.0/RPMS/lib64arts1-1.2-3.2.C30mdk.x86_64.rpm
28b7737a8a3fea6aee46eda6c0cdd6d8 x86_64/corporate/3.0/RPMS/lib64arts1-devel-1.2-3.2.C30mdk.x86_64.rpm
cb18544a65b1569fce30b44f8bf39a8e x86_64/corporate/3.0/SRPMS/arts-1.2-3.2.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEmHAKmqjQ0CJFipgRArl0AKDaVJ1qJ+tuFR3eZPfWNLxu5PteagCdFLgr
UbyzPbW44C8Fafmdfv37Cu0=
=Is3F
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close