-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Update Advisory _______________________________________________________________________ Package name: texinfo Advisory ID: MDKSA-2005:175 Date: October 6th, 2005 Affected versions: 10.1, 10.2, 2006.0, Corporate 3.0, Corporate Server 2.1 ______________________________________________________________________ Problem Description: Frank Lichtenheld has discovered that texindex insecurely creates temporary files with predictable filenames. This is exploitable if a local attacker were to create symbolic links in the temporary files directory, pointing to a valid file on the filesystem. When texindex is executed, the file would be overwitten with the rights of the user running texindex. The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3011 ______________________________________________________________________ Updated Packages: Mandrivalinux 10.1: 76e53b496b39c7b28f0267a90ba586a8 10.1/RPMS/info-4.7-2.1.101mdk.i586.rpm 10cd78726493bda942913b5584bcf0ea 10.1/RPMS/info-install-4.7-2.1.101mdk.i586.rpm 25b0fff505495b5b4b80ffcf113ecb15 10.1/RPMS/texinfo-4.7-2.1.101mdk.i586.rpm e47fb813ed54544bd93b6897031b6d2d 10.1/SRPMS/texinfo-4.7-2.1.101mdk.src.rpm Mandrivalinux 10.1/X86_64: 5f47ff5b3e06addb1924f92b8ade046f x86_64/10.1/RPMS/info-4.7-2.1.101mdk.x86_64.rpm 66cb5ffb24e9e263cfe2af552b5f2ac1 x86_64/10.1/RPMS/info-install-4.7-2.1.101mdk.x86_64.rpm bda2aa2a304be57fa28f2879b85fc9c0 x86_64/10.1/RPMS/texinfo-4.7-2.1.101mdk.x86_64.rpm e47fb813ed54544bd93b6897031b6d2d x86_64/10.1/SRPMS/texinfo-4.7-2.1.101mdk.src.rpm Mandrivalinux 10.2: da38f9033ba2495d786bbb95bcee6c9f 10.2/RPMS/info-4.8-1.1.102mdk.i586.rpm e1dbdf1b7c0ad41fde7bab6cab92be6f 10.2/RPMS/info-install-4.8-1.1.102mdk.i586.rpm 2b0c6e496d0adfa9b8c486c048c5cd65 10.2/RPMS/texinfo-4.8-1.1.102mdk.i586.rpm e018dbb4a415940d5c5062c4cdd01a1f 10.2/SRPMS/texinfo-4.8-1.1.102mdk.src.rpm Mandrivalinux 10.2/X86_64: 9baa45ce2070d15f35062c41a574bf4f x86_64/10.2/RPMS/info-4.8-1.1.102mdk.x86_64.rpm 821d86aeae3923411e2667ea8cca3723 x86_64/10.2/RPMS/info-install-4.8-1.1.102mdk.x86_64.rpm 54c74f133bcf8cf6791cc97ef9c2e2f2 x86_64/10.2/RPMS/texinfo-4.8-1.1.102mdk.x86_64.rpm e018dbb4a415940d5c5062c4cdd01a1f x86_64/10.2/SRPMS/texinfo-4.8-1.1.102mdk.src.rpm Mandrivalinux 2006.0: 8b6d88e8dc11347d15daaecea9614350 2006.0/RPMS/info-4.8-1.1.20060mdk.i586.rpm db1fb3ef2f3810ad044f7ceb0e7f28ba 2006.0/RPMS/info-install-4.8-1.1.20060mdk.i586.rpm 71bd982b51dd4ce475bff38b13e602ee 2006.0/RPMS/texinfo-4.8-1.1.20060mdk.i586.rpm 727c5b4c31890156019eeaa67693d169 2006.0/SRPMS/texinfo-4.8-1.1.20060mdk.src.rpm Mandrivalinux 2006.0/X86_64: 1ebc92ec90e633ed7bd2c23df56db8e6 x86_64/2006.0/RPMS/info-4.8-1.1.20060mdk.x86_64.rpm 52a3c172223d5c4fac673719232df4b5 x86_64/2006.0/RPMS/info-install-4.8-1.1.20060mdk.x86_64.rpm ad9da3a4cfa7e804c2880a94622bbe66 x86_64/2006.0/RPMS/texinfo-4.8-1.1.20060mdk.x86_64.rpm 727c5b4c31890156019eeaa67693d169 x86_64/2006.0/SRPMS/texinfo-4.8-1.1.20060mdk.src.rpm Corporate Server 2.1: af212fb87728fcb48c736f5f30f0a906 corporate/2.1/RPMS/info-4.2-5.1.C21mdk.i586.rpm 256c91dbdf2650f5323c9294916eb25c corporate/2.1/RPMS/info-install-4.2-5.1.C21mdk.i586.rpm 37f29e7fc13e78f1de4213591a028723 corporate/2.1/RPMS/texinfo-4.2-5.1.C21mdk.i586.rpm 8c4df474276402f88497af71c8e6586a corporate/2.1/SRPMS/texinfo-4.2-5.1.C21mdk.src.rpm Corporate Server 2.1/X86_64: 32d0a4f0f9e9d14bfb34368f5d5e429e x86_64/corporate/2.1/RPMS/info-4.2-5.1.C21mdk.x86_64.rpm 8df053321dd699e94bfed39387df0541 x86_64/corporate/2.1/RPMS/info-install-4.2-5.1.C21mdk.x86_64.rpm 44a60c312004ed7490a802521559ddae x86_64/corporate/2.1/RPMS/texinfo-4.2-5.1.C21mdk.x86_64.rpm 8c4df474276402f88497af71c8e6586a x86_64/corporate/2.1/SRPMS/texinfo-4.2-5.1.C21mdk.src.rpm Corporate 3.0: 9556168c04d13c9a6a3f6e7015a398de corporate/3.0/RPMS/info-4.6-1.1.C30mdk.i586.rpm ed35b999cc4037b9ad7f838eb641a837 corporate/3.0/RPMS/info-install-4.6-1.1.C30mdk.i586.rpm 7f26434349820297ee62871c754c61d4 corporate/3.0/RPMS/texinfo-4.6-1.1.C30mdk.i586.rpm 83cb27358b6e352de4f1173407175823 corporate/3.0/SRPMS/texinfo-4.6-1.1.C30mdk.src.rpm Corporate 3.0/X86_64: 217fc652b60c5aac4e9c17ea69f5ab33 x86_64/corporate/3.0/RPMS/info-4.6-1.1.C30mdk.x86_64.rpm 7c3eee4af8b915337903ed6f8e8cedaf x86_64/corporate/3.0/RPMS/info-install-4.6-1.1.C30mdk.x86_64.rpm 11af71727eee1214d330d34ff9dbfe54 x86_64/corporate/3.0/RPMS/texinfo-4.6-1.1.C30mdk.x86_64.rpm 83cb27358b6e352de4f1173407175823 x86_64/corporate/3.0/SRPMS/texinfo-4.6-1.1.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFDReZ8mqjQ0CJFipgRAoymAKDLn6IhPLD9vE+NqmNAAuin7vxb0ACgkEAi KXYDLCSKSV2dxCpZ/Rq1BqM= =axcM -----END PGP SIGNATURE-----