Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in util-linux
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in util-linux
ID: SSA:2005-255-02
Distribution: Slackware
Plattformen: Slackware -current, Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1
Datum: Di, 13. September 2005, 10:01
Referenzen: http://www.securityfocus.com/archive/1/410333
Applikationen: util-linux

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] util-linux umount privilege escalation (SSA:2005-255-02)

New util-linux packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, and -current to fix a security issue with umount. A bug in the
'-r' option could allow flags in /etc/fstab to be improperly dropped
on user-mountable volumes, allowing a user to gain root privileges.

For more details, see David Watson's post to BugTraq:

http://www.securityfocus.com/archive/1/410333


Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
patches/packages/util-linux-2.12p-i486-2.tgz: Patched an issue with
umount where if the umount failed when the '-r' option was used, the
filesystem would be remounted read-only but without any extra flags
specified in /etc/fstab. This could allow an ordinary user able to
mount a floppy or CD (but with nosuid, noexec, nodev, etc in
/etc/fstab) to run a setuid binary from removable media and gain
root privileges.
Reported to BugTraq by David Watson:
http://www.securityfocus.com/archive/1/410333
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 8.1:
util-linux-2.11r-i386-3.tgz

Updated package for Slackware 9.0:
util-linux-2.11z-i386-2.tgz

Updated package for Slackware 9.1:
util-linux-2.12-i486-2.tgz

Updated package for Slackware 10.0:
util-linux-2.12a-i486-2.tgz

Updated package for Slackware 10.1:
util-linux-2.12p-i486-2.tgz

Updated package for Slackware -current:
util-linux-2.12p-i486-2.tgz


MD5 signatures:
+-------------+

Slackware 8.1 package:
3b3025faf0a40428f2861fa2967c13d3 util-linux-2.11r-i386-3.tgz

Slackware 9.0 package:
41b08961548899ca10fa93d16a7ab516 util-linux-2.11z-i386-2.tgz

Slackware 9.1 package:
4890b834bac6d7490c1daf5bc7bbff55 util-linux-2.12-i486-2.tgz

Slackware 10.0 package:
3e628cf4d6db843a1dd63e2fa7f3aba1 util-linux-2.12a-i486-2.tgz

Slackware 10.1 package:
01722ab0146969c6cde9f99698864606 util-linux-2.12p-i486-2.tgz

Slackware -current package:
21e318a9f04dc6588916945713312bf3 util-linux-2.12p-i486-2.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg util-linux-2.12p-i486-2.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)

iD8DBQFDJnhHakRjwEAQIjMRAnRgAJ4koUiXWEIKlPrhWZhm49Bb+pY3ywCdGh7p
AO6UfTCrhJJxnWtj3pKHo3A=
=fkin
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung