-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:083 http://www.mandriva.com/security/ _______________________________________________________________________ Package : util-linux Date : May 29, 2012 Affected: 2010.1, 2011., Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and corrected in util-linux: mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089 (CVE-2011-1675). mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors (CVE-2011-1677). The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1675 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1677 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: eb33512cb8c77f92e3ae20caf9816e21 2010.1/i586/libblkid1-2.17.1-5.2mdv2010.2.i586.rpm 0d698e8c0285b41ac4f21da74055b53f 2010.1/i586/libblkid-devel-2.17.1-5.2mdv2010.2.i586.rpm 20625cbebd2937da67473e412ba85002 2010.1/i586/libuuid1-2.17.1-5.2mdv2010.2.i586.rpm 6447b8e0c59791f819d0167711e41c52 2010.1/i586/libuuid-devel-2.17.1-5.2mdv2010.2.i586.rpm 3b268915155a2ba0344a818ac55a16da 2010.1/i586/util-linux-ng-2.17.1-5.2mdv2010.2.i586.rpm 8cb97af8918c24b7c97fdba26d694654 2010.1/i586/uuidd-2.17.1-5.2mdv2010.2.i586.rpm fa7cf3d671f48207748ddba3163d6e04 2010.1/SRPMS/util-linux-ng-2.17.1-5.2mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 5b7fbd17545d05402b7fd3093f478541 2010.1/x86_64/lib64blkid1-2.17.1-5.2mdv2010.2.x86_64.rpm 668e001d143871750eb066d12c5caaaa 2010.1/x86_64/lib64blkid-devel-2.17.1-5.2mdv2010.2.x86_64.rpm 54498dbf1f4b96e05c8c3f286f848498 2010.1/x86_64/lib64uuid1-2.17.1-5.2mdv2010.2.x86_64.rpm bd7221119d3fb8093eb1184b68201dbe 2010.1/x86_64/lib64uuid-devel-2.17.1-5.2mdv2010.2.x86_64.rpm 713270191f5f0d960058618cf531b175 2010.1/x86_64/util-linux-ng-2.17.1-5.2mdv2010.2.x86_64.rpm 4090da6706b918116d8d5c9b33629ba9 2010.1/x86_64/uuidd-2.17.1-5.2mdv2010.2.x86_64.rpm fa7cf3d671f48207748ddba3163d6e04 2010.1/SRPMS/util-linux-ng-2.17.1-5.2mdv2010.2.src.rpm Mandriva Linux 2011: f4296ecbf617d6cf79d238c82a239ca1 2011/i586/libblkid1-2.19-3.2-mdv2011.0.i586.rpm f2589d8d181fadd8dd48b9e17e09753d 2011/i586/libblkid-devel-2.19-3.2-mdv2011.0.i586.rpm 0b70339706521110774e4fe69855b084 2011/i586/libmount1-2.19-3.2-mdv2011.0.i586.rpm d0d6714a01f21bb5a63bdc796bb23842 2011/i586/libmount-devel-2.19-3.2-mdv2011.0.i586.rpm 1c039ab95c469325cf1a569e83c71ce7 2011/i586/libuuid1-2.19-3.2-mdv2011.0.i586.rpm 8c663e3959f2df874aac320573817cdb 2011/i586/libuuid-devel-2.19-3.2-mdv2011.0.i586.rpm f8114ff872f7a96862d378393f95e941 2011/i586/util-linux-2.19-3.2-mdv2011.0.i586.rpm 0d526fe3160339f8257ac37fe446ba24 2011/i586/uuidd-2.19-3.2-mdv2011.0.i586.rpm f769bd8d30ad0bbcb0fabd14a376cd35 2011/SRPMS/util-linux-2.19-3.2.src.rpm Mandriva Linux 2011/X86_64: d2e42bece7164b872cd9239730c77088 2011/x86_64/lib64blkid1-2.19-3.2-mdv2011.0.x86_64.rpm 7eec7897a5eab8ea7ed4246878833e02 2011/x86_64/lib64blkid-devel-2.19-3.2-mdv2011.0.x86_64.rpm cfe9df69ce0232bcf01d1cfcf6d404b3 2011/x86_64/lib64mount1-2.19-3.2-mdv2011.0.x86_64.rpm 19890d2f4785a5a3a5dcfa14965e6ee1 2011/x86_64/lib64mount-devel-2.19-3.2-mdv2011.0.x86_64.rpm b1ba68d40d06aabe0b210833f45018c2 2011/x86_64/lib64uuid1-2.19-3.2-mdv2011.0.x86_64.rpm 3b47499459a4063e15669b7845278f07 2011/x86_64/lib64uuid-devel-2.19-3.2-mdv2011.0.x86_64.rpm 9b818496386cbecdf91fb9f7ad053df5 2011/x86_64/util-linux-2.19-3.2-mdv2011.0.x86_64.rpm 87bd197faa88b2b78ab8a24508eb6b20 2011/x86_64/uuidd-2.19-3.2-mdv2011.0.x86_64.rpm f769bd8d30ad0bbcb0fabd14a376cd35 2011/SRPMS/util-linux-2.19-3.2.src.rpm Mandriva Enterprise Server 5: 5b2a978234b5084ba8afad897d07074e mes5/i586/util-linux-ng-2.14.1-4.3mdvmes5.2.i586.rpm 2613be1900a25de3f7816ec4b56c76df mes5/SRPMS/util-linux-ng-2.14.1-4.3mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: c8166d1bacf04f5069a97c75714869c2 mes5/x86_64/util-linux-ng-2.14.1-4.3mdvmes5.2.x86_64.rpm 2613be1900a25de3f7816ec4b56c76df mes5/SRPMS/util-linux-ng-2.14.1-4.3mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFPxJvJmqjQ0CJFipgRAruMAKCyJ1H4ORN+SniMzHz0ppCmQXUQ5gCg3r9F hzavW7FUgY5jLG/66aYVH6k= =X0Oo -----END PGP SIGNATURE-----