Gentoo Archives: gentoo-ppc-dev

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-security@g.o
Cc: gentoo-user@g.o, gentoo-dev@g.o, gentoo-desktop@g.o, gentooppc-user@g.o, gentooppc-dev@g.o, gentoo-sparc@g.o, security-announce@g.o
Subject: [gentooppc-dev] GLSA: OpenAFS
Date: Sat, 03 Aug 2002 18:39:28
Message-Id: 200208040139.19166.aliz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT
6 - - --------------------------------------------------------------------
7
8 PACKAGE :openafs
9 SUMMARY :remote root
10 DATE :2002-08-03 23:26 UTC
11
12 - - --------------------------------------------------------------------
13
14 OVERVIEW
15
16 A remote user may be able to gain root access to an OpenAFS database
17 server or fileserver host. In addition, certain administrative clients
18 may be attacked if they make requests to a rogue server.
19
20 DETAIL
21
22 There is an integer overflow bug in the SUNRPC-derived RPC library
23 used by OpenAFS that could be exploited to crash certain OpenAFS
24 servers (volserver, vlserver, ptserver, buserver) or to obtain
25 unauthorized root access to a host running one of these processes.
26
27 In addition, it is possible for a rogue server to attack certain
28 administrative clients (vos, pts, backup, butc, rxstat), but only
29 if certain RPC requests are made to the rogue server.
30
31 The OpenAFS fileserver and cache manager (client) are not vulnerable
32 to these attacks. No exploits are presently known to be available
33 for this vulnerability.
34
35 The full advisory may be found here:
36 http://www.openafs.org/pages/security/OPENAFS-SA-2002-001.txt
37
38 SOLUTION
39
40 This security issue was fixed in ebuild version 1.2.5-r1 uploaded to
41 portage on Fri Aug 2 22:47:20 2002 UTC. The OpenAFS team has released
42 OpenAFS 1.2.6 to fix this security issue.
43
44 It is recommended that all Gentoo Linux users who has OpenAFS installed
45 update their systems as follows.
46
47 emerge rsync
48 emerge openafs
49 emerge clean
50
51 - - --------------------------------------------------------------------
52 Daniel Ahlberg
53 aliz@g.o
54 - - --------------------------------------------------------------------
55 -----BEGIN PGP SIGNATURE-----
56 Version: GnuPG v1.0.7 (GNU/Linux)
57
58 iD8DBQE9TGmlfT7nyhUpoZMRAsL3AKC+ZvjuRFBXxSDCvwzeFtRjihclawCghcwF
59 EppTLAfmlWfN5P5pcBVDedk=
60 =dEvV
61 -----END PGP SIGNATURE-----