From: jpcpt@earthlink.net (Joseph S Price)
To: jpcpt@earthlink.net
Cc: =?ISO-8859-1?Q?=08I=F4=08@avocet.mail.pas.earthlink.net?=
Subject: FWD: [RHSA-2000:108-02] Updated modutils fixing local root
Date: Sat, 27 May 2001 21:11:25 [thread overview]
Message-ID: <27200125529513.Amiga@SMTP.earthlink.net> (raw)
[-- Attachment #1: Type: text/plain, Size: 3312 bytes --]
On Thu, 16 Nov 2000 12:31 -0500 you talked about...
>---------------------------------------------------------------------
> Red Hat, Inc. Security Advisory
>
>Synopsis: Updated modutils fixing local root security bug
available
>Advisory ID: RHSA-2000:108-02
>Issue date: 2000-11-16
>Updated on: 2000-11-16
>Product: Red Hat Linux
>Keywords: modutils root exploit security
>Cross references: N/A
>---------------------------------------------------------------------
>
>1. Topic:
>
>A local root exploit in modutils has been fixed.
>
>2. Relevant releases/architectures:
>
>Red Hat Linux 6.2 - i386, alpha, sparc
>Red Hat Linux 6.2EE - i386, alpha, sparc
>Red Hat Linux 7.0 - i386
>Red Hat Linux 7.0J - i386
>
>3. Problem description:
>
>modutils, a package that helps the kernel automatically load kernel modules
>(device drivers etc.) when they're needed, could be abused to execute code
>as root.
>
>
>
>modutils versions between 2.3.0 and 2.3.20 are affected.
>
>4. Solution:
>
>For each RPM for your particular architecture, run:
>
>
>
>rpm -Fvh [filename]
>
>
>
>where filename is the name of the RPM.
>
>5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more
info):
>
>20749 - local root exploit via modutils
>
>
>6. RPMs required:
>
>Red Hat Linux 6.2:
>
>alpha:
>ftp://updates.redhat.com/6.2/alpha/modutils-2.3.20-0.6.2.alpha.rpm
>
>sparc:
>ftp://updates.redhat.com/6.2/sparc/modutils-2.3.20-0.6.2.sparc.rpm
>
>i386:
>ftp://updates.redhat.com/6.2/i386/modutils-2.3.20-0.6.2.i386.rpm
>
>sources:
>ftp://updates.redhat.com/6.2/SRPMS/modutils-2.3.20-0.6.2.src.rpm
>
>Red Hat Linux 7.0:
>
>i386:
>ftp://updates.redhat.com/7.0/i386/modutils-2.3.20-1.i386.rpm
>
>sources:
>ftp://updates.redhat.com/7.0/SRPMS/modutils-2.3.20-1.src.rpm
>
>7. Verification:
>
>MD5 sum Package Name
>--------------------------------------------------------------------------
>0b4bb8f26ac126db756cfbc84543d7cf 6.2/SRPMS/modutils-2.3.20-0.6.2.src.rpm
>7540818796b9ab0961465f67118ffac9 6.2/alpha/modutils-2.3.20-0.6.2.alpha.rpm
>206cb6ccd33a0f16803695e0246abb35 6.2/i386/modutils-2.3.20-0.6.2.i386.rpm
>d8226ab998719f79f3df9d4e9a6bb88a 6.2/sparc/modutils-2.3.20-0.6.2.sparc.rpm
>1502c3cc848fec4ecdaf5903b9f2cbb4 7.0/SRPMS/modutils-2.3.20-1.src.rpm
>166b7512c784ffaa4233e8f71ef712cd 7.0/i386/modutils-2.3.20-1.i386.rpm
>
>These packages are GPG signed by Red Hat, Inc. for security. Our key
>is available at:
>http://www.redhat.com/corp/contact.html
>
>You can verify each package with the following command:
> rpm --checksig <filename>
>
>If you only wish to verify that each package has not been corrupted or
>tampered with, examine only the md5sum with the following command:
> rpm --checksig --nogpg <filename>
>
>8. References:
>
>N/A
>
>
>Copyright(c) 2000 Red Hat, Inc.
>
>
>
>_______________________________________________
>Redhat-watch-list mailing list
>To unsubscribe, visit:
https://listman.redhat.com/mailman/listinfo/redhat-watch-list
>
>
Regards,
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
next reply other threads:[~2001-05-27 1:14 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2001-05-27 21:11 Joseph S Price [this message]
2001-05-27 1:25 ` FWD: [RHSA-2000:108-02] Updated modutils fixing local root Keith Owens
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=27200125529513.Amiga@SMTP.earthlink.net \
--to=jpcpt@earthlink.net \
--cc==?ISO-8859-1?Q?=08I=F4=08@avocet.mail.pas.earthlink.net?= \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox