The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Security Update: [CSSA-2002-018.0] Linux: Race condition in fileutils


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Mon, 29 Apr 2002 15:46:22 -0700
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2002-018.0] Linux: Race condition in fileutils

--Kj7319i9nmIyA2yE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

To: [email protected] [email protected] security-alerts@li=
nuxsecurity.com

___________________________________________________________________________=
___

		Caldera International, Inc.  Security Advisory

Subject:		Linux: Race condition in fileutils
Advisory number: 	CSSA-2002-018.0
Issue date: 		2002 April 26
Cross reference:
___________________________________________________________________________=
___


1. Problem Description

	A race condition in various utilities from the GNU fileutils
	package may cause a root user to delete the whole filesystem.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to fileutils-4.1-4.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to fileutils-4.1-4.i386.rpm

	OpenLinux 3.1 Server		prior to fileutils-4.1-4.i386.rpm

	OpenLinux 3.1 Workstation	prior to fileutils-4.1-4.i386.rpm


3. Solution

	The proper solution is to install the latest packages.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

	4.2 Packages

	608a5485dd9a8799795254ba7d2089da	fileutils-4.1-4.i386.rpm

	4.3 Installation

	rpm -Fvh fileutils-4.1-4.i386.rpm

	4.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

	4.5 Source Packages

	c44a43f1ce810a01978ce2e8efadadbf	fileutils-4.1-4.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

	5.2 Packages

	f10c905587b4221fc794cefaf262e9ee	fileutils-4.1-4.i386.rpm

	5.3 Installation

	rpm -Fvh fileutils-4.1-4.i386.rpm

	5.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

	5.5 Source Packages

	7e5519acdca5c17d12b3598847ec1ded	fileutils-4.1-4.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

	6.2 Packages

	334154c1635b50ad81a2f1b841ccadd8	fileutils-4.1-4.i386.rpm

	6.3 Installation

	rpm -Fvh fileutils-4.1-4.i386.rpm

	6.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

	6.5 Source Packages

	6a12bbcaefb252eac3fe4b79464881e4	fileutils-4.1-4.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

	7.2 Packages

	2db4e5565fc7d38ee5cdf3be57f86301	fileutils-4.1-4.i386.rpm

	7.3 Installation

	rpm -Fvh fileutils-4.1-4.i386.rpm

	7.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

	7.5 Source Packages

	1b5ef3933f229b68cd8e24fb75c5a0de	fileutils-4.1-4.src.rpm


8. References

	Specific references for this advisory:

		http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002440.html
		http://isec.pl/vulnerabilities/0002.txt Wojciech Purczynski (iSEC

	Caldera OpenLinux security resources:
		http://www.caldera.com/support/security/index.html

	Caldera UNIX security resources:
		http://stage.caldera.com/support/security/

	This security fix closes Caldera incidents sr862917, fz520627,
	erg712018.


9. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on this website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera products.


10. Acknowledgements

	Wojciech Purczynski (iSEC Security Research, http://isec.pl)
	reported this vulnerability.=20

___________________________________________________________________________=
___

--Kj7319i9nmIyA2yE
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjzNzT4ACgkQbluZssSXDTFQiwCcCoAwLbU87GDlzBYSOfx3d1Do
J6sAoJw6pyluJ2wrIadDzOCy/o7b5uWC
=Mpr+
-----END PGP SIGNATURE-----

--Kj7319i9nmIyA2yE--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру