Login
Newsletter
Werbung

Sicherheit: Unbeabsichtigtes Löschen von Dateien in rm und mv
Aktuelle Meldungen Distributionen
Name: Unbeabsichtigtes Löschen von Dateien in rm und mv
ID: CSSA-2002-018.0
Distribution: Caldera
Plattformen: Caldera Server 3.1, Caldera Workstation 3.1, Caldera Server 3.1.1, Caldera Workstation 3.1.1
Datum: Di, 30. April 2002, 13:00
Referenzen: Keine Angabe
Applikationen: GNU Coreutils

Originalnachricht

--Kj7319i9nmIyA2yE
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

To: bugtraq@securityfocus.com announce@lists.caldera.com
security-alerts@linuxsecurity.com

______________________________________________________________________________

Caldera International, Inc. Security Advisory

Subject: Linux: Race condition in fileutils
Advisory number: CSSA-2002-018.0
Issue date: 2002 April 26
Cross reference:
______________________________________________________________________________


1. Problem Description

A race condition in various utilities from the GNU fileutils
package may cause a root user to delete the whole filesystem.


2. Vulnerable Supported Versions

System Package
----------------------------------------------------------------------

OpenLinux 3.1.1 Server prior to fileutils-4.1-4.i386.rpm

OpenLinux 3.1.1 Workstation prior to fileutils-4.1-4.i386.rpm

OpenLinux 3.1 Server prior to fileutils-4.1-4.i386.rpm

OpenLinux 3.1 Workstation prior to fileutils-4.1-4.i386.rpm


3. Solution

The proper solution is to install the latest packages.


4. OpenLinux 3.1.1 Server

4.1 Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

4.2 Packages

608a5485dd9a8799795254ba7d2089da fileutils-4.1-4.i386.rpm

4.3 Installation

rpm -Fvh fileutils-4.1-4.i386.rpm

4.4 Source Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

4.5 Source Packages

c44a43f1ce810a01978ce2e8efadadbf fileutils-4.1-4.src.rpm


5. OpenLinux 3.1.1 Workstation

5.1 Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

5.2 Packages

f10c905587b4221fc794cefaf262e9ee fileutils-4.1-4.i386.rpm

5.3 Installation

rpm -Fvh fileutils-4.1-4.i386.rpm

5.4 Source Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

5.5 Source Packages

7e5519acdca5c17d12b3598847ec1ded fileutils-4.1-4.src.rpm


6. OpenLinux 3.1 Server

6.1 Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

6.2 Packages

334154c1635b50ad81a2f1b841ccadd8 fileutils-4.1-4.i386.rpm

6.3 Installation

rpm -Fvh fileutils-4.1-4.i386.rpm

6.4 Source Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

6.5 Source Packages

6a12bbcaefb252eac3fe4b79464881e4 fileutils-4.1-4.src.rpm


7. OpenLinux 3.1 Workstation

7.1 Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

7.2 Packages

2db4e5565fc7d38ee5cdf3be57f86301 fileutils-4.1-4.i386.rpm

7.3 Installation

rpm -Fvh fileutils-4.1-4.i386.rpm

7.4 Source Package Location

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

7.5 Source Packages

1b5ef3933f229b68cd8e24fb75c5a0de fileutils-4.1-4.src.rpm


8. References

Specific references for this advisory:

http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002440.html
http://isec.pl/vulnerabilities/0002.txt Wojciech Purczynski (iSEC

Caldera OpenLinux security resources:
http://www.caldera.com/support/security/index.html

Caldera UNIX security resources:
http://stage.caldera.com/support/security/

This security fix closes Caldera incidents sr862917, fz520627,
erg712018.


9. Disclaimer

Caldera International, Inc. is not responsible for the misuse
of any of the information we provide on this website and/or
through our security advisories. Our advisories are a service
to our customers intended to promote secure installation and
use of Caldera products.


10. Acknowledgements

Wojciech Purczynski (iSEC Security Research, http://isec.pl)
reported this vulnerability.

______________________________________________________________________________

--Kj7319i9nmIyA2yE
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjzNzT4ACgkQbluZssSXDTFQiwCcCoAwLbU87GDlzBYSOfx3d1Do
J6sAoJw6pyluJ2wrIadDzOCy/o7b5uWC
=Mpr+
-----END PGP SIGNATURE-----

--Kj7319i9nmIyA2yE--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung