Mandrake: 'Mesa' vulnerability
Posted by LinuxSecurity.com Team   
Mandrake Ben Collins identified a temporary file race in the Utah-glx component of the Mesa package which affects Linux-Mandrake 7.2.

________________________________________________________________________

                Linux-Mandrake Security Update Advisory
________________________________________________________________________

Package name:           Mesa
Date:                   March 13th, 2001
Advisory ID:            MDKSA-2001:029

Affected versions:      7.2
________________________________________________________________________

Problem Description:

 Ben Collins identified a temporary file race in the Utah-glx component
 of the Mesa package which affects Linux-Mandrake 7.2.  The
 /tmp/glxmemory file is created by Utah-glx and because it is not
 created securely could be used in a symlink attack which allows files
 to be overwritten the next time the X server is started.
________________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at
   http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 7.2:
d75f85f30af6c8fb57938b76323067ce  7.2/RPMS/Mesa-3.3-14.1mdk.i586.rpm
1a8bddaf0f26c5d1caa5c3af44d1c108  7.2/RPMS/Mesa-common-3.3-14.1mdk.i586.rpm
ffd886a66f866faaf9ae0b7402644cde  7.2/RPMS/Mesa-common-devel-3.3-14.1mdk.i586.rpm
c9f32276cd54d8772c31afba619bf856  7.2/RPMS/Mesa-demos-3.3-14.1mdk.i586.rpm
593a5bb2a4d51460727f3affb0a78fdd  7.2/SRPMS/Mesa-3.3-14.1mdk.src.rpm
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:

   http://www.linux-mandrake.com/en/ftp.php3.

Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other security advisories for Linux-Mandrake at:

   http://www.linux-mandrake.com/en/security/

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
________________________________________________________________________

Linux-Mandrake has two security-related mailing list services that
anyone can subscribe to:

security-announce@linux-mandrake.com

  Linux-Mandrake's security announcements mailing list.  Only
  announcements are sent to this list and it is read-only.

security-discuss@linux-mandrake.com

  Linux-Mandrake's security discussion mailing list.  This list is open
  to anyone to discuss Linux-Mandrake security specifically and Linux
  security in general.

To subscribe to either list, send a message to
  sympa@linux-mandrake.com
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
  sympa@linux-mandrake.com
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
  sympa@linux-mandrake.com
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:

   http://www.linux-mandrake.com/en/flists.php3#security
________________________________________________________________________