----------------------------------------------------------------------- Immunix Secured OS Security Advisory Packages updated: LPRng Affected products: Immunix OS 7+ Bugs fixed: CAN-2003-0136 Date: Wed Jun 4 2003 Advisory ID: IMNX-2003-7+-013-01 Author: Seth Arnold <sarnold@immunix.com> ----------------------------------------------------------------------- Description: Quoting from the Red Hat security advisory: LPRng is a print spooler. LPRng includes a program, psbanner, that can be used to produce Postscript banner pages to separate print jobs. A vulnerability has been found in psbanner, which creates a temporary file with a known filename in an insecure manner. An attacker could create a symbolic link and cause arbitrary files to be written as the 'lp' user. Our thanks to Karol Lewandowski for discovering this problem. We've also changed ownership of the utility programs from lp:lp to root:root, which should help mitigate the potential problems in the event of future security problems in LPRng. References: http://www.securityfocus.com/archive/1/319673 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0136 Package names and locations: Precompiled binary packages for Immunix 7+ are available at: http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/LPRng-3.6.24-2_imnx_1.i386.rpm A source package for Immunix 7+ is available at: http://download.immunix.org/ImmunixOS/7+/Updates/SRPMS/LPRng-3.6.24-2_imnx_1.src.rpm Immunix OS 7+ md5sums: 476f927a3679c20d0d4015ca709ee455 RPMS/LPRng-3.6.24-2_imnx_1.i386.rpm 5fe1a6d04c389c0b553717849100dab1 SRPMS/LPRng-3.6.24-2_imnx_1.src.rpm GPG verification: Our public key is available at <http://wirex.com/security/GPG_KEY>. NOTE: Ibiblio is graciously mirroring our updates, so if the links above are slow, please try: ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/ or one of the many mirrors available at: http://www.ibiblio.org/pub/Linux/MIRRORS.html ImmunixOS 6.2 is no longer officially supported. ImmunixOS 7.0 is no longer officially supported. Contact information: To report vulnerabilities, please contact security@wirex.com. WireX attempts to conform to the RFP vulnerability disclosure protocol <http://www.wiretrip.net/rfp/policy.html>.
Attachment:
pgp00365.pgp
Description: PGP signature