PROGENY-SA-2001-08: Local root vulnerability in sendfiled

From: Progeny Security Team (securityat_private)
Date: Fri Apr 20 2001 - 11:11:35 PDT

  • Next message: Microsoft Product Security: "Microsoft Security Bulletin MS01-015 (version 2.0)"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    
     ---------------------------------------------------------------------------
     PROGENY LINUX SYSTEMS -- SECURITY ADVISORY               PROGENY-SA-2001-08
     ---------------------------------------------------------------------------
    
        Topic:          Local root vulnerability in sendfiled
    
        Software:       sendfile
        Announced:      2001-04-19
        Credits:        Colin Phipps <cphippsat_private>
                        Daniel Kobras
                        Ulli Horlacher <framstagat_private-stuttgart.de>
                        Martin Schulze <joeyat_private>
        Affects:        Progeny Debian (sendfile prior to 2.1-24)
                        Debian GNU/Linux potato (sendfile prior to 2.1-20.2)
                        Debian GNU/Linux woody/sid (sendfile prior to 2.1-24)
        Vendor-Status:  New Version Released (sendfile 2.1-24)
        Corrected:      2001-04-20
        Progeny Only:   NO
    
        $Id: PROGENY-SA-2001-08,v 1.2 2001/04/20 18:05:01 jgoerzen Exp $
    
     ---------------------------------------------------------------------------
    
    
    DESCRIPTION
    
    Local users on a system may be able to exploit security flaws in
    sendfiled to obtain root privileges.
    
    
    SOLUTION (See also: UPDATING VIA APT-GET)
    
    Upgrade to a fixed version of sendfile. sendfile version 2.1-24
    corrects the problem. For your convenience, you may upgrade to the
    sendfile_2.1-24 package.
    
    
    WORKAROUND
    
    sendfile may not be a vital system utility in every installation.  If
    you prefer, you can remove rather than upgrade sendfile.  To remove
    it, use this command:
    
      dpkg --remove sendfile
    
    
    UPDATING VIA APT-GET
    
     1. Ensure that your /etc/apt/sources.list file has a URI for Progeny's
        update repository:
    
            deb http://archive.progeny.com/progeny updates/newton/
    
     2. Update your cache of available packages for apt(8).
    
        Example:
    
            # apt-get update
    
     3. Using apt(8), install the new package. apt(8) will download the
        update, verify its integrity with md5, and then install the
        package on your system with dpkg(8).
    
        Example:
    
            # apt-get install sendfile
    
    
    UPDATING VIA DPKG
    
     1. Using your preferred FTP/HTTP client to retrieve the following
        updated files from Progeny's update archive at:
    
        http://archive.progeny.com/progeny/updates/newton/
    
        MD5 Checksum                     Filename
        -------------------------------- -------------------------------------
        903eef59cc9253d6d732326eafe9c307 sendfile_2.1-24_i386.deb
    
        Example:
    
            # wget \
            http://archive.progeny.com/progeny/updates/newton/sendfile_2.1-24_i386.deb
    
     2. Use the md5sum command on the retrieved files to verify that they
        match the md5sum provided in this advisory:
    
        Example:
    
            # md5sum sendfile_2.1-24_i386.deb
    
     3. Then install the replacement package(s) using the dpkg command.
    
        Example:
    
            # dpkg --install sendfile_2.1-24_i386.deb
    
    
    MORE INFORMATION
    
    This issue was first documented at bug #74068 in the Debian GNU/Linux
    bug tracking system.  Information on this bug report is available at
    http://bugs.debian.org/76048.
    
    Progeny advisories can be found at http://www.progeny.com/security/.
    
    
     ---------------------------------------------------------------------------
    
    pub  1024D/F92D4D1F 2001-04-04 Progeny Security Team <securityat_private>
    
    - -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v1.0.4 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    mQGiBDrKpVkRBACS4/hjUliUt9UGTHMUGSZpQlKfBk9OFHmyLHTdjyIBCWRMmOBn
    RRhag0FgPicVIDndoQvYw3+ESC/RtbuPCBf6DZ7S0+NHhm1SHEbZyHFLkRXJm+IS
    29oFmKrfXnXHckCrJFDZbOznRF6dVe7hV8CYi3FtoTjlRbuiHPQCMuy4ewCghAfv
    eYxfB25AoTdBT7WiG8jd4w8D/iFweuqzTwcWtXEgDbDd21W9hNPLEELgguimCCdP
    l3GHqw/MUJpIvdYfYhCzTaf4VpvkM5xlJGAcelCUL9qAufwyU8U8JI2YzlbqSlO8
    qRwaiwq9qisTKEBb3IQadFqug+ihVdUeP8cuXPvbUEbFt7ILWyUD/kntgFdf1Apo
    zZWlA/0SM45hV6yomcM7z08tyh4hZTrWX/RUJqe+U1niNAmzPg4P+r8SfXdIkjb2
    fZT5h5cYLIiK+kUEkqyPmZwUlgMCCn4IYVd2pcKXKXWE8ympuf3E5wGYeiVpLBM/
    th7qdEF87sViV8McfiRuXEonYrs1nSQZX+f4OxvTQqaP46u10rQsUHJvZ2VueSBT
    ZWN1cml0eSBUZWFtIDxzZWN1cml0eUBwcm9nZW55LmNvbT6IVwQTEQIAFwUCOsql
    WQULBwoDBAMVAwIDFgIBAheAAAoJEEnBfSP5LU0f/sUAnjDpQs5SnFotNJ7GeIWx
    Ftf7AvBBAJ0cygWS0XRXxJJq2PKbCbdln+i4d7kEDQQ6yqcjEBAA465SSuC/yvN7
    WeZAN9XperqZtxLCVe8hLfrLZ+9/Xn2ysuEEe90rYe1X0HbsB/mInHF3VmT+XvHB
    VdDQ7o0VMw7aeDgprt3jDQgT8gIesSOhZvulDujmLhykE+FT/V4lKpqO8prv7Ujs
    AfuC7g/X2dcV1+imNOeivLaCM0+HrwUhdvifWFDwE97wBkrda/vhu9zs3NwMeBVN
    UYfkRLPm+DGUSQVrteNiYJchhqfJB0mjrd+3FgnpCVgdU4c42epZ2ez/WTgTchoT
    duMCd1sM9gzvQIih56KzxlGL82PVS2m0PNxSQ8iZpheMMGWregjpjpMRcrRbSXy+
    WmPBacOiE/MyxXand+lGzig/9Srm6msUT5jE/lDcfySznJWH8B/fqD7KM5Z0ZM+b
    3xV0PzGyMld+m3BfGolqsd5bpo8HaWCWsZVYfgdXjoDPYptsoPdLesN6WIAHA1kU
    n2kckccz4xOoI/8MqKhkzZe0q5a9sv6RLBWDeVLxJnDuXZgcwCc4OvpcR4HnOE7c
    U5VsyjYwTkzGWWuQxb8uxng3akHTK2PqeZAnC0tvtuwI7QFhOq/dzz+zHzVH2+Qh
    55Aq6DjA9yEs3P7g31wb3duGdWtuIXn+N85GiJdZ1EmJESQCuOYOSHsV4bGxKcpg
    PIpoSr5QBAUtUOTwN+xC8nNjZtC5OzsAAwYP/1OD/eiEraGpy7Z9scgXBjjb1kly
    tgq06zGlSMWPEQoN3F87YeMiOsXSeDxJG+cnhvlys1Qoytp9/drsDLANi+Q61A/b
    aka2IJLudiDu4iUDFb1rgRUERBciA31karPf2IwNjdU8lbulHfxQcjtjj7rbSWOG
    gxzlPcLp2F5ee3h0qs+XW4UpD6K9f/u9gGT4nMr3owG06uNomlBAsGCVpk9XlRxG
    x96161vrbmTPUx/o6NhqHNuf5Zh8ZmxQ3PYydywiE9njOtS04TTad24qbdPlVQh2
    kjkTdsMCFRGaAB8EYImMT3F0ofon1Q/XWZrRlhkZpzuAKLhdSOW5G+tygNy2IqsH
    wCYa/rDitYZeNN4EUb5At4HnSBCy86GFQgj+sDFO6yp+h7NLIMeTm0csaSbKEt6o
    cbn0iMaRbLdHmAm0UHATPho+M2brf3mTztvAPONta2FC9TP1L1ojTDd4mtO9IcdM
    hjOVqNbuyLXkWgPcSmwhhjB61p3/1M1Y/zfXxLOsi/XJlstYzzKzHa68F1e9dTEz
    kgeYo1hG5TqMKv1sXfPJHw4N/QVcLoUlpUJZ/kI2OQD5mAhCCZ9PbT2fT4gLhy7U
    sn0blh/R/0HFSFDwHgmx8mNfw7w0qFbba9/FEE8D5qhyyCx5KTk0OkvRL9OpzO7E
    jzjdcfb6B2XpgSC8iEYEGBECAAYFAjrKpyMACgkQScF9I/ktTR90vgCggiX108DO
    S3rhSkmfFuHey8w4RlIAn3nD+uCe+sjCFqVwb+LY2jO3ybjB
    =6dRm
    - -----END PGP PUBLIC KEY BLOCK-----
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.4 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iEYEARECAAYFAjrgerIACgkQScF9I/ktTR8itgCfVmpmQYR441nOjP5NPmuZpdCv
    zr0An1HFl63QVm16tp+09QTTv2XcubV+
    =48Yj
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Sun Apr 22 2001 - 14:11:06 PDT