Bug 134657
| Summary: | CAN-2004-0884 privilege escalation | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 3 | Reporter: | Josh Bressers <bressers> | ||||
| Component: | cyrus-sasl | Assignee: | Nalin Dahyabhai <nalin> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 3.0 | CC: | michal, security-response-team | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2004-10-07 14:51:41 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
Josh Bressers
2004-10-05 14:24:02 UTC
Created attachment 104781 [details]
Upstream patch
*** Bug 134658 has been marked as a duplicate of this bug. *** This issue also affects RHEL2.1 This issue goes public on 2004-10-07 Removing embargo An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-546.html An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-546.html It is a bit confusing what is really in CAN-2004-0884, as it is marked now ** RESERVED **, but Gentoo GLSA 200410-05 advisory, http://www.securityfocus.com/archive/1/377775/2004-10-04/2004-10-10/0 says also "Cyrus-SASL contains a remote buffer overflow in the digestmda5.c file". See http://www.securityfocus.com/bid/11347 as well. Somehow I do no see in the recent code patches anything which would address that concern; or this is something new and not mentioned by CAN-2004-0884? The digestmda5.c issue was separate to CAN-2004-0884 and did not affect any version of cryus-sasl with Red Hat Enterprise Linux (or Fedora Core). |