drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Unbeabsichtigtes Löschen von Dateien in rm und mv
Name: |
Unbeabsichtigtes Löschen von Dateien in rm und mv
|
|
ID: |
CSSA-2002-018.0 |
|
Distribution: |
Caldera |
|
Plattformen: |
Caldera Server 3.1, Caldera Workstation 3.1, Caldera Server 3.1.1, Caldera Workstation 3.1.1 |
|
Datum: |
Di, 30. April 2002, 13:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
GNU Coreutils |
|
Originalnachricht |
--Kj7319i9nmIyA2yE Content-Disposition: inline Content-Transfer-Encoding: quoted-printable
To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com
______________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: Linux: Race condition in fileutils Advisory number: CSSA-2002-018.0 Issue date: 2002 April 26 Cross reference: ______________________________________________________________________________
1. Problem Description
A race condition in various utilities from the GNU fileutils package may cause a root user to delete the whole filesystem.
2. Vulnerable Supported Versions
System Package ----------------------------------------------------------------------
OpenLinux 3.1.1 Server prior to fileutils-4.1-4.i386.rpm
OpenLinux 3.1.1 Workstation prior to fileutils-4.1-4.i386.rpm
OpenLinux 3.1 Server prior to fileutils-4.1-4.i386.rpm
OpenLinux 3.1 Workstation prior to fileutils-4.1-4.i386.rpm
3. Solution
The proper solution is to install the latest packages.
4. OpenLinux 3.1.1 Server
4.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS
4.2 Packages
608a5485dd9a8799795254ba7d2089da fileutils-4.1-4.i386.rpm
4.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
4.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS
4.5 Source Packages
c44a43f1ce810a01978ce2e8efadadbf fileutils-4.1-4.src.rpm
5. OpenLinux 3.1.1 Workstation
5.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS
5.2 Packages
f10c905587b4221fc794cefaf262e9ee fileutils-4.1-4.i386.rpm
5.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
5.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS
5.5 Source Packages
7e5519acdca5c17d12b3598847ec1ded fileutils-4.1-4.src.rpm
6. OpenLinux 3.1 Server
6.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
6.2 Packages
334154c1635b50ad81a2f1b841ccadd8 fileutils-4.1-4.i386.rpm
6.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
6.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS
6.5 Source Packages
6a12bbcaefb252eac3fe4b79464881e4 fileutils-4.1-4.src.rpm
7. OpenLinux 3.1 Workstation
7.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS
7.2 Packages
2db4e5565fc7d38ee5cdf3be57f86301 fileutils-4.1-4.i386.rpm
7.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
7.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS
7.5 Source Packages
1b5ef3933f229b68cd8e24fb75c5a0de fileutils-4.1-4.src.rpm
8. References
Specific references for this advisory:
http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002440.html http://isec.pl/vulnerabilities/0002.txt Wojciech Purczynski (iSEC
Caldera OpenLinux security resources: http://www.caldera.com/support/security/index.html
Caldera UNIX security resources: http://stage.caldera.com/support/security/
This security fix closes Caldera incidents sr862917, fz520627, erg712018.
9. Disclaimer
Caldera International, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera products.
10. Acknowledgements
Wojciech Purczynski (iSEC Security Research, http://isec.pl) reported this vulnerability.
______________________________________________________________________________
--Kj7319i9nmIyA2yE Content-Disposition: inline
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjzNzT4ACgkQbluZssSXDTFQiwCcCoAwLbU87GDlzBYSOfx3d1Do J6sAoJw6pyluJ2wrIadDzOCy/o7b5uWC =Mpr+ -----END PGP SIGNATURE-----
--Kj7319i9nmIyA2yE--
|
|
|
|