Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 19469 - net-dialup/mgetty
Summary: net-dialup/mgetty
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: Highest critical (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-04-17 06:08 UTC by Daniel Ahlberg (RETIRED)
Modified: 2003-04-29 04:10 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Ahlberg (RETIRED) gentoo-dev 2003-04-17 06:08:29 UTC
[RHSA-2003:036-01] Updated mgetty packages available 
 
From:  
bugzilla@redhat.com 
 
 
To:  
redhat-watch-list@redhat.com, redhat-announce-list@redhat.com 
 
 
CC:  
bugtraq@securityfocus.com, full-disclosure@lists.netsys.com 
 
 
Date:  
2003-04-08 14.17 
 
 
--------------------------------------------------------------------- 
                   Red Hat Security Advisory 
 
Synopsis:          Updated mgetty packages available 
Advisory ID:       RHSA-2003:036-01 
Issue date:        2003-04-08 
Updated on:        2003-04-08 
Product:           Red Hat Linux 
Keywords:          mgetty spool permission 
Cross references:   
Obsoletes:         RHSA-2001:050 
CVE Names:         CAN-2002-1391 CAN-2002-1392 
--------------------------------------------------------------------- 
 
1. Topic: 
 
Updated mgetty packages are now available for Red Hat Linux 7.1, 
7.2,  7.3, and 8.0.  These updates close a possible buffer overflow and a 
permissions problem present in versions of mgetty prior to version 1.1.29. 
 
2. Relevant releases/architectures: 
 
Red Hat Linux 7.1 - i386 
Red Hat Linux 7.2 - i386, ia64 
Red Hat Linux 7.3 - i386 
Red Hat Linux 8.0 - i386 
 
3. Problem description: 
 
mgetty is a getty replacement for use with data and fax modems. 
 
mgetty can be configured to run an external program to decide whether or 
not to answer an incoming call based on Caller ID information.  Unpatched 
versions of mgetty prior to 1.1.29 would overflow an internal buffer if the 
caller name reported by the modem was too long. 
 
Additionally, the faxspool script supplied with versions of mgetty prior to 
1.1.29 used a simple permissions scheme to allow or deny fax transmission 
privileges.  This scheme was easily circumvented because the spooling 
directory used for outgoing faxes was world-writable. 
 
All users of mgetty should upgrade to these errata packages, which 
contain mgetty 1.1.30 and are not vulnerable to these issues. 
 
4. Solution: 
 
Before applying this update, make sure all previously released errata 
relevant to your system have been applied. 
 
To update all RPMs for your particular architecture, run: 
 
rpm -Fvh [filenames] 
 
where [filenames] is a list of the RPMs you wish to upgrade.  Only those 
RPMs which are currently installed will be updated.  Those RPMs which are 
not installed but included in the list will not be updated.  Note that you 
can also use wildcards (*.rpm) if your current directory *only* contains the 
desired RPMs. 
 
Please note that this update is also available via Red Hat Network.  Many 
people find this an easier way to apply updates.  To use Red Hat Network, 
launch the Red Hat Update Agent with the following command: 
 
up2date 
 
This will start an interactive process that will result in the appropriate 
RPMs being upgraded on your system. 
 
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 
 
78543 - Mgetty 1.1.29 fixes security issue 
 
6. RPMs required: 
 
Red Hat Linux 7.1: 
 
SRPMS: 
ftp://updates.redhat.com/7.1/en/os/SRPMS/mgetty-1.1.30-0.7.src.rpm 
 
i386: 
ftp://updates.redhat.com/7.1/en/os/i386/mgetty-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.1/en/os/i386/mgetty-sendfax-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.1/en/os/i386/mgetty-voice-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.1/en/os/i386/mgetty-viewfax-1.1.30-0.7.i386.rpm 
 
Red Hat Linux 7.2: 
 
SRPMS: 
ftp://updates.redhat.com/7.2/en/os/SRPMS/mgetty-1.1.30-0.7.src.rpm 
 
i386: 
ftp://updates.redhat.com/7.2/en/os/i386/mgetty-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.2/en/os/i386/mgetty-sendfax-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.2/en/os/i386/mgetty-voice-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.2/en/os/i386/mgetty-viewfax-1.1.30-0.7.i386.rpm 
 
ia64: 
ftp://updates.redhat.com/7.2/en/os/ia64/mgetty-1.1.30-0.7.ia64.rpm 
ftp://updates.redhat.com/7.2/en/os/ia64/mgetty-sendfax-1.1.30-0.7.ia64.rpm 
ftp://updates.redhat.com/7.2/en/os/ia64/mgetty-voice-1.1.30-0.7.ia64.rpm 
ftp://updates.redhat.com/7.2/en/os/ia64/mgetty-viewfax-1.1.30-0.7.ia64.rpm 
 
Red Hat Linux 7.3: 
 
SRPMS: 
ftp://updates.redhat.com/7.3/en/os/SRPMS/mgetty-1.1.30-0.7.src.rpm 
 
i386: 
ftp://updates.redhat.com/7.3/en/os/i386/mgetty-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.3/en/os/i386/mgetty-sendfax-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.3/en/os/i386/mgetty-voice-1.1.30-0.7.i386.rpm 
ftp://updates.redhat.com/7.3/en/os/i386/mgetty-viewfax-1.1.30-0.7.i386.rpm 
 
Red Hat Linux 8.0: 
 
SRPMS: 
ftp://updates.redhat.com/8.0/en/os/SRPMS/mgetty-1.1.30-0.8.0.src.rpm 
 
i386: 
ftp://updates.redhat.com/8.0/en/os/i386/mgetty-1.1.30-0.8.0.i386.rpm 
ftp://updates.redhat.com/8.0/en/os/i386/mgetty-sendfax-1.1.30-0.8.0.i386.rpm 
ftp://updates.redhat.com/8.0/en/os/i386/mgetty-voice-1.1.30-0.8.0.i386.rpm 
ftp://updates.redhat.com/8.0/en/os/i386/mgetty-viewfax-1.1.30-0.8.0.i386.rpm 
 
 
 
7. Verification: 
 
MD5 sum                          Package Name 
-------------------------------------------------------------------------- 
61f0f82bcb856400af7ed07d8f14e7c5 7.1/en/os/SRPMS/mgetty-1.1.30-0.7.src.rpm 
0b9d994a33d2da4a8aa863f451932dae 7.1/en/os/i386/mgetty-1.1.30-0.7.i386.rpm 
31c4d0bc42d5ec9576b8e1928d57564f 7.1/en/os/i386/mgetty-sendfax-1.1.30-0.7.i386.rpm 
6435235949e4c553c8f3f116d86c9988 7.1/en/os/i386/mgetty-viewfax-1.1.30-0.7.i386.rpm 
0a5d8b01d6ec299da69332d597c5b0f2 7.1/en/os/i386/mgetty-voice-1.1.30-0.7.i386.rpm 
61f0f82bcb856400af7ed07d8f14e7c5 7.2/en/os/SRPMS/mgetty-1.1.30-0.7.src.rpm 
0b9d994a33d2da4a8aa863f451932dae 7.2/en/os/i386/mgetty-1.1.30-0.7.i386.rpm 
31c4d0bc42d5ec9576b8e1928d57564f 7.2/en/os/i386/mgetty-sendfax-1.1.30-0.7.i386.rpm 
6435235949e4c553c8f3f116d86c9988 7.2/en/os/i386/mgetty-viewfax-1.1.30-0.7.i386.rpm 
0a5d8b01d6ec299da69332d597c5b0f2 7.2/en/os/i386/mgetty-voice-1.1.30-0.7.i386.rpm 
f26f33d9868f6212df1a86984661f202 7.2/en/os/ia64/mgetty-1.1.30-0.7.ia64.rpm 
d8b0cea6d7b8b61493f80727078930d2 7.2/en/os/ia64/mgetty-sendfax-1.1.30-0.7.ia64.rpm 
a16dc07d8740a8dd3ff37f90540dd96e 7.2/en/os/ia64/mgetty-viewfax-1.1.30-0.7.ia64.rpm 
ebe71154e65a6f75b4150023413b09b8 7.2/en/os/ia64/mgetty-voice-1.1.30-0.7.ia64.rpm 
61f0f82bcb856400af7ed07d8f14e7c5 7.3/en/os/SRPMS/mgetty-1.1.30-0.7.src.rpm 
0b9d994a33d2da4a8aa863f451932dae 7.3/en/os/i386/mgetty-1.1.30-0.7.i386.rpm 
31c4d0bc42d5ec9576b8e1928d57564f 7.3/en/os/i386/mgetty-sendfax-1.1.30-0.7.i386.rpm 
6435235949e4c553c8f3f116d86c9988 7.3/en/os/i386/mgetty-viewfax-1.1.30-0.7.i386.rpm 
0a5d8b01d6ec299da69332d597c5b0f2 7.3/en/os/i386/mgetty-voice-1.1.30-0.7.i386.rpm 
55d0d8d95275d776e515e9206acd5ecf 8.0/en/os/SRPMS/mgetty-1.1.30-0.8.0.src.rpm 
7a2efcddc4bc8a7ff014d3e5697aef3a 8.0/en/os/i386/mgetty-1.1.30-0.8.0.i386.rpm 
d6efc4787ee443b942ef720ffceb8531 8.0/en/os/i386/mgetty-sendfax-1.1.30-0.8.0.i386.rpm 
677a355141fcd582be34cd9f60639ce2 8.0/en/os/i386/mgetty-viewfax-1.1.30-0.8.0.i386.rpm 
9c226ac2e4c2aeb84e0cd49dc3619cba 8.0/en/os/i386/mgetty-voice-1.1.30-0.8.0.i386.rpm 
 
 
These packages are GPG signed by Red Hat for security.  Our key is 
available at http://www.redhat.com/solutions/security/news/publickey/ 
 
You can verify each package with the following command: 
     
    rpm --checksig -v <filename> 
 
If you only wish to verify that each package has not been corrupted or 
tampered with, examine only the md5sum with the following command: 
     
    md5sum <filename> 
 
 
8. References: 
 
http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenie.muc.de&max_results=1&type=long&domain=ml-mgetty 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1391 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1392 
 
9. Contact: 
 
The Red Hat security contact is <security@redhat.com>.  More contact 
details at http://www.redhat.com/solutions/security/news/contact/ 
 
Copyright 2003 Red Hat, Inc. 
 
 
 
_______________________________________________ 
Redhat-watch-list mailing list 
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list
Comment 1 TGL 2003-04-28 10:57:29 UTC
Hi,

From http://www.leo.org/~doering/mgetty/mgetty_5.html :
 "Before you can run `make install' to setup and install everything, make sure 
  that the user that you specified for `FAX_OUT_USER' in `Makefile' exists in
  your system."

Maybe this should be checked by the 1.1.30 ebuild? Because if this user does not
exist, then emerge fails:

make[1]: Entering directory `/var/tmp/portage/mgetty-1.1.30/work/mgetty-1.1.30/fax'
for i in faxspool faxrunq faxq faxrm ; do \
        mv -f /var/tmp/portage/mgetty-1.1.30/image//usr/bin/$i /var/tmp/portage/mgetty-1.1.30/image//usr/bin/$i.old 2>/dev/null ; \
        install -c -o bin -g bin -m 755 $i /var/tmp/portage/mgetty-1.1.30/image//usr/bin ; \
done
install -c -o bin -g bin -m 755 faxrunqd /var/tmp/portage/mgetty-1.1.30/image//usr/sbin
install -c -o bin -g bin faxq-helper /var/tmp/portage/mgetty-1.1.30/image//usr/lib/mgetty+sendfax
chown fax /var/tmp/portage/mgetty-1.1.30/image//usr/lib/mgetty+sendfax/faxq-helperchown: `fax': invalid user
make[1]: *** [install] Error 1
make[1]: Leaving directory `/var/tmp/portage/mgetty-1.1.30/work/mgetty-1.1.30/fax'make: *** [install.bin] Error 2
 
It would be better if emerge could stop before compiling anything, with some 
info about the need to create a "fax" user.

Thanks,

-- 
Thomas.
Comment 2 Daniel Ahlberg (RETIRED) gentoo-dev 2003-04-29 04:10:29 UTC
glsa sent and fixed fax user problem.