Skip to navigation

Security Advisory Updated mm packages fix temporary file handling

Advisory: RHSA-2002:153-07
Type: Security Advisory
Severity: N/A
Issued on: 2002-07-24
Last updated on: 2002-07-30
Affected Products: Red Hat Linux 7.0
Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
CVEs (cve.mitre.org): CVE-2002-0658

Details

Updated mm packages are now available for Red Hat Linux 7, 7.1, 7.2, and
7.3. These updates address possible vulnerabilities in how the MM library
opens temporary files.

The MM library provides an abstraction layer which allows related processes
to share data easily. On systems where shared memory or other
inter-process communication mechanisms are not available, the MM library
emulates them using temporary files. MM is used in Red Hat Linux to
providing shared memory pools to Apache modules.

Versions of MM up to and including 1.1.3 open temporary files in an unsafe
manner, allowing a malicious local user to cause an application which uses
MM to overwrite any file to which it has write access.

All users are advised to upgrade to these errata packages, which contain a
patched version of MM that is not vulnerable to this issue.

Thanks to Marcus Meissner for providing a patch for this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Linux 7.0

SRPMS:
mm-1.1.3-8.src.rpm
File outdated by:  RHBA-2002:273
    MD5: 3dc7e2430ce3da32af9aafa8bae46841
 
Alpha:
mm-1.1.3-8.alpha.rpm
File outdated by:  RHBA-2002:273
    MD5: b4a2e44c38d3a8fb9bc1e99a74b8f1db
mm-devel-1.1.3-8.alpha.rpm
File outdated by:  RHBA-2002:273
    MD5: d3e17dc578429445764dd94e8a1ab0e0
 
IA-32:
mm-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: 37fd8b2c978aaaf7cab7c7a656003f86
mm-devel-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: fe662adb1eecb6b7cddae8b2571982fd
 
Red Hat Linux 7.1

SRPMS:
mm-1.1.3-8.src.rpm
File outdated by:  RHBA-2002:273
    MD5: 3dc7e2430ce3da32af9aafa8bae46841
 
Alpha:
mm-1.1.3-8.alpha.rpm
File outdated by:  RHBA-2002:273
    MD5: b4a2e44c38d3a8fb9bc1e99a74b8f1db
mm-devel-1.1.3-8.alpha.rpm
File outdated by:  RHBA-2002:273
    MD5: d3e17dc578429445764dd94e8a1ab0e0
 
IA-32:
mm-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: 37fd8b2c978aaaf7cab7c7a656003f86
mm-devel-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: fe662adb1eecb6b7cddae8b2571982fd
 
IA-64:
mm-1.1.3-8.ia64.rpm
File outdated by:  RHBA-2002:273
    MD5: 8feb62fa917c0f2e4136d8267a91b096
mm-devel-1.1.3-8.ia64.rpm
File outdated by:  RHBA-2002:273
    MD5: 5f1acb83aa8359f02e4cb7161b153fb7
 
Red Hat Linux 7.2

SRPMS:
mm-1.1.3-8.src.rpm
File outdated by:  RHBA-2002:273
    MD5: 3dc7e2430ce3da32af9aafa8bae46841
 
IA-32:
mm-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: 37fd8b2c978aaaf7cab7c7a656003f86
mm-devel-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: fe662adb1eecb6b7cddae8b2571982fd
 
IA-64:
mm-1.1.3-8.ia64.rpm
File outdated by:  RHBA-2002:273
    MD5: 8feb62fa917c0f2e4136d8267a91b096
mm-devel-1.1.3-8.ia64.rpm
File outdated by:  RHBA-2002:273
    MD5: 5f1acb83aa8359f02e4cb7161b153fb7
 
Red Hat Linux 7.3

SRPMS:
mm-1.1.3-8.src.rpm
File outdated by:  RHBA-2002:273
    MD5: 3dc7e2430ce3da32af9aafa8bae46841
 
IA-32:
mm-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: 37fd8b2c978aaaf7cab7c7a656003f86
mm-devel-1.1.3-8.i386.rpm
File outdated by:  RHBA-2002:273
    MD5: fe662adb1eecb6b7cddae8b2571982fd
 

Bugs fixed (see bugzilla for more information)

59504 - *-config scripts suggests bad CFLAGS
68895 - mm not compiled to use SysV shared memory or semaphores
68896 - mm doesn't change ownership properly of SysV semaphores


References


Keywords

file, mm, temporary


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/