Home > Security > Advisories

Advisories

Mandriva Advisories

Package name uucp
Date September 21st, 2001
Advisory ID MDKSA-2001:078
Affected versions 7.1, 7.2, 8.0, CS1.0
Synopsis Updated uucp packages fix local vulnerability

Problem Description

Zen Parse discovered that an argument handling problem that exists in
the uucp package can allow a local attacker to gain access to the uucp
user or group.

Updated Packages

Mandrakelinux 7.1

 fa65ca8883349b9be0e6cf7db7dea76b  7.1/RPMS/uucp-1.06.1-14.1mdk.i586.rpm
e28726519e93e1980d40dab2f06483af  7.1/SRPMS/uucp-1.06.1-14.1mdk.src.rpm

Mandrakelinux 7.2

 63dec090a832b711ff3a05577de6e375  7.2/RPMS/uucp-1.06.1-17.1mdk.i586.rpm
5e0b73597aaf0b0c731919e0e2608e2b  7.2/SRPMS/uucp-1.06.1-17.1mdk.src.rpm

Mandrakelinux 8.0

 1d285f9a496ae17aac3a43faaf93046a  8.0/RPMS/uucp-1.06.1-18.1mdk.i586.rpm
231f4436c3d4ba45190b6f00430a8b0d  8.0/SRPMS/uucp-1.06.1-18.1mdk.src.rpm

Mandrakelinux 8.0/PPC

 9634b394fe43ab951969ab5088a071f3  ppc/8.0/RPMS/uucp-1.06.1-18.1mdk.ppc.rpm
519859d31a9a04d84d8090a6a4885431  ppc/8.0/SRPMS/uucp-1.06.1-18.1mdk.src.rpm

Corporate Server 1.0.1

 fa65ca8883349b9be0e6cf7db7dea76b  1.0.1/RPMS/uucp-1.06.1-14.1mdk.i586.rpm
e28726519e93e1980d40dab2f06483af  1.0.1/SRPMS/uucp-1.06.1-14.1mdk.src.rpm

References

http://www.securityfocus.com/archive/1/212892

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.