Home > Security > Advisories

Advisories

Mandriva Advisories

Package name libsafe
Date April 11th, 2002
Advisory ID MDKSA-2002:026
Affected versions 7.1, 7.2, 8.0, 8.1, 8.2, CS1.0
Synopsis Updated libsafe packages fix inadequate format string protection

Problem Description

Wojciech Purczynski discovered that format string protection in libsafe
can be easily bypassed by using flag characters that are implemented in
glibc but are not implemented in libsafe. It was also discovered that
*printf function wrappers incorrectly parse argument indexing in format
strings, making some incorrect assumptions on the number of arguments
and conversion specifications.

These problems were fixed by the libsafe authors in 2.0-12.

Updated Packages

Mandrakelinux 7.1

 2e5051889cc2aa3c6aec0f9e284d627c  7.1/RPMS/libsafe-2.0.13-1.2mdk.i586.rpm
9a8f35d46d0f59b02cfdde585ad26520  7.1/SRPMS/libsafe-2.0.13-1.2mdk.src.rpm

Mandrakelinux 7.2

 4a709ce0e447ee0b419adfd29a8c3e5e  7.2/RPMS/libsafe-2.0.13-1.3mdk.i586.rpm
07f1c27a01efc4934d4ecf21c9b16519  7.2/SRPMS/libsafe-2.0.13-1.3mdk.src.rpm

Mandrakelinux 8.0

 1d0a81906bbc693b0509816013acac98  8.0/RPMS/libsafe-2.0.13-1.2mdk.i586.rpm
9a8f35d46d0f59b02cfdde585ad26520  8.0/SRPMS/libsafe-2.0.13-1.2mdk.src.rpm

Mandrakelinux 8.1

 2ec21f68a7521aed44aa5d31be8d7da9  8.1/RPMS/libsafe-2.0.13-1.2mdk.i586.rpm
9a8f35d46d0f59b02cfdde585ad26520  8.1/SRPMS/libsafe-2.0.13-1.2mdk.src.rpm

Mandrakelinux 8.2

 4de44dea8f94c02d3f4350479dafe4e5  8.2/RPMS/libsafe-2.0.13-1.2mdk.i586.rpm
9a8f35d46d0f59b02cfdde585ad26520  8.2/SRPMS/libsafe-2.0.13-1.2mdk.src.rpm

Corporate Server 1.0.1

 2e5051889cc2aa3c6aec0f9e284d627c  1.0.1/RPMS/libsafe-2.0.13-1.2mdk.i586.rpm
9a8f35d46d0f59b02cfdde585ad26520  1.0.1/SRPMS/libsafe-2.0.13-1.2mdk.src.rpm

References

http://online.securityfocus.com/bid/4326
http://online.securityfocus.com/bid/4327

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.