Caldera Advisory

From: synapse (synat_private)
Date: Tue Apr 27 1999 - 19:26:16 PDT

  • Next message: Lukasz Luzar: "KKIS.28041999.002.b"

    Heya Aleph,
    
    Not sure if this had come accross the list.
    
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    ______________________________________________________________________________
                       Caldera Systems, Inc.  Security Advisory
    
    Subject:                COAS
    Advisory number:        CSSA-1999:009.0
    Issue date:             1999 04 27
    Cross reference:
    ______________________________________________________________________________
    
    
    1. Problem Description
    
       /etc/shadow may get world readable
    
    
    2. Vulnerable Versions
    
       Systems:     OpenLinux 2.2.
       Packages:    previous to coas-1.0-8
    
    
    3. Solutions
    
    
       The proper solution is to upgrade to the coas-1.0-8 package.
       If /etc/shadow is world-readable, this is fixed with
    
            chmod 600 /etc/shadow
    
    
    4. Location of Fixed Packages
    
       The upgrade packages can be found on Caldera's FTP site at:
    
       ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/
    
       The corresponding source code package can be found at:
    
       ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS
    
    
    5. Installing Fixed Packages
    
       Upgrade the affected packages with the following commands:
    
       rpm -q coas && rpm -U coas-1.0-8.i386.rpm
    
    
    6. Verification
    
       The MD5 checksums (from the "md5sum" command) for these packages are:
    
       1efa8cde40f5684293e03c2499f2f59f  README
       b3fa473f6ba574052991bf2254bd378d  RPMS/coas-1.0-8.i386.rpm
       3bfa00aa3230f97537e8baa2c0454d08  SRPMS/coas-1.0-8.src.rpm
    
    
    7. References
    
       This and other Caldera security resources are located at:
    
       http://www.calderasystems.com/news/security/index.html
    
       Additional documentation on this problem can be found in:
    
    
       This security fix closes Caldera's internal Problem Report 4544.
    
    
    8. Disclaimer
    
       Caldera Systems, Inc. is not responsible for the misuse of any of the
       information we provide on this website and/or through our security
       advisories. Our advisories are a service to our customers intended to
       promote secure installation and use of Caldera OpenLinux.
    
    ______________________________________________________________________________
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3i
    Charset: noconv
    
    iQCVAwUBNyW4/+n+9R4958LpAQHntgP/cHhIOaKUPRfeBOtMQP7lZ2NQlEPrqzkq
    cu/Q9IvIqrvm/mFikznaMTdehz0Jql2NuY2Zjs0MUdF0Rm7KsgBQ6BYX+10GAE2W
    HAZIuYQ2zeM2acGcrvzGYExkKmrLOfhD77V9l7rZ9WieQO7B8vmj5N4nGdkUNz2U
    j+AigG8FJNI=
    =O2I/
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:44:12 PDT