Security Update: [CSSA-2002-018.0] Linux: Race condition in fileutils
Date: Mon, 29 Apr 2002 15:46:22 -0700
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2002-018.0] Linux: Race condition in fileutils
--Kj7319i9nmIyA2yE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
To: [email protected] [email protected] security-alerts@li=
nuxsecurity.com
___________________________________________________________________________=
___
Caldera International, Inc. Security Advisory
Subject: Linux: Race condition in fileutils
Advisory number: CSSA-2002-018.0
Issue date: 2002 April 26
Cross reference:
___________________________________________________________________________=
___
1. Problem Description
A race condition in various utilities from the GNU fileutils
package may cause a root user to delete the whole filesystem.
2. Vulnerable Supported Versions
System Package
----------------------------------------------------------------------
OpenLinux 3.1.1 Server prior to fileutils-4.1-4.i386.rpm
OpenLinux 3.1.1 Workstation prior to fileutils-4.1-4.i386.rpm
OpenLinux 3.1 Server prior to fileutils-4.1-4.i386.rpm
OpenLinux 3.1 Workstation prior to fileutils-4.1-4.i386.rpm
3. Solution
The proper solution is to install the latest packages.
4. OpenLinux 3.1.1 Server
4.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS
4.2 Packages
608a5485dd9a8799795254ba7d2089da fileutils-4.1-4.i386.rpm
4.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
4.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS
4.5 Source Packages
c44a43f1ce810a01978ce2e8efadadbf fileutils-4.1-4.src.rpm
5. OpenLinux 3.1.1 Workstation
5.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS
5.2 Packages
f10c905587b4221fc794cefaf262e9ee fileutils-4.1-4.i386.rpm
5.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
5.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS
5.5 Source Packages
7e5519acdca5c17d12b3598847ec1ded fileutils-4.1-4.src.rpm
6. OpenLinux 3.1 Server
6.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
6.2 Packages
334154c1635b50ad81a2f1b841ccadd8 fileutils-4.1-4.i386.rpm
6.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
6.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS
6.5 Source Packages
6a12bbcaefb252eac3fe4b79464881e4 fileutils-4.1-4.src.rpm
7. OpenLinux 3.1 Workstation
7.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS
7.2 Packages
2db4e5565fc7d38ee5cdf3be57f86301 fileutils-4.1-4.i386.rpm
7.3 Installation
rpm -Fvh fileutils-4.1-4.i386.rpm
7.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS
7.5 Source Packages
1b5ef3933f229b68cd8e24fb75c5a0de fileutils-4.1-4.src.rpm
8. References
Specific references for this advisory:
http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002440.html
http://isec.pl/vulnerabilities/0002.txt Wojciech Purczynski (iSEC
Caldera OpenLinux security resources:
http://www.caldera.com/support/security/index.html
Caldera UNIX security resources:
http://stage.caldera.com/support/security/
This security fix closes Caldera incidents sr862917, fz520627,
erg712018.
9. Disclaimer
Caldera International, Inc. is not responsible for the misuse
of any of the information we provide on this website and/or
through our security advisories. Our advisories are a service
to our customers intended to promote secure installation and
use of Caldera products.
10. Acknowledgements
Wojciech Purczynski (iSEC Security Research, http://isec.pl)
reported this vulnerability.=20
___________________________________________________________________________=
___
--Kj7319i9nmIyA2yE
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjzNzT4ACgkQbluZssSXDTFQiwCcCoAwLbU87GDlzBYSOfx3d1Do
J6sAoJw6pyluJ2wrIadDzOCy/o7b5uWC
=Mpr+
-----END PGP SIGNATURE-----
--Kj7319i9nmIyA2yE--