Rapid7 Vulnerability & Exploit Database

RHSA-2002:153: Updated mm packages fix temporary file handling

Back to Search

RHSA-2002:153: Updated mm packages fix temporary file handling

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
08/12/2002
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated mm packages are now available for Red Hat Linux 7, 7.1, 7.2, and 7.3. These updates address possible vulnerabilities in how the MM library opens temporary files.

The MM library provides an abstraction layer which allows related processes to share data easily. On systems where shared memory or other inter-process communication mechanisms are not available, the MM library emulates them using temporary files. MM is used in Red Hat Linux to providing shared memory pools to Apache modules. Versions of MM up to and including 1.1.3 open temporary files in an unsafe manner, allowing a malicious local user to cause an application which uses MM to overwrite any file to which it has write access. All users are advised to upgrade to these errata packages, which contain a patched version of MM that is not vulnerable to this issue. Thanks to Marcus Meissner for providing a patch for this issue.

Solution(s)

  • redhat-upgrade-mm
  • redhat-upgrade-mm-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;