Security Update: [CSSA-2002-018.0] Linux: Race condition in fileutils

From: securityat_private
Date: Mon Apr 29 2002 - 15:46:22 PDT

  • Next message: researchteam5at_private: "eSecurityOnline Security Advisory 3761 - Sun Solaris lbxproxy dis play name buffer overflow vulnerability"

    To: bugtraqat_private announceat_private security-alertsat_private
    
    ______________________________________________________________________________
    
    		Caldera International, Inc.  Security Advisory
    
    Subject:		Linux: Race condition in fileutils
    Advisory number: 	CSSA-2002-018.0
    Issue date: 		2002 April 26
    Cross reference:
    ______________________________________________________________________________
    
    
    1. Problem Description
    
    	A race condition in various utilities from the GNU fileutils
    	package may cause a root user to delete the whole filesystem.
    
    
    2. Vulnerable Supported Versions
    
    	System				Package
    	----------------------------------------------------------------------
    
    	OpenLinux 3.1.1 Server		prior to fileutils-4.1-4.i386.rpm
    
    	OpenLinux 3.1.1 Workstation	prior to fileutils-4.1-4.i386.rpm
    
    	OpenLinux 3.1 Server		prior to fileutils-4.1-4.i386.rpm
    
    	OpenLinux 3.1 Workstation	prior to fileutils-4.1-4.i386.rpm
    
    
    3. Solution
    
    	The proper solution is to install the latest packages.
    
    
    4. OpenLinux 3.1.1 Server
    
    	4.1 Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS
    
    	4.2 Packages
    
    	608a5485dd9a8799795254ba7d2089da	fileutils-4.1-4.i386.rpm
    
    	4.3 Installation
    
    	rpm -Fvh fileutils-4.1-4.i386.rpm
    
    	4.4 Source Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS
    
    	4.5 Source Packages
    
    	c44a43f1ce810a01978ce2e8efadadbf	fileutils-4.1-4.src.rpm
    
    
    5. OpenLinux 3.1.1 Workstation
    
    	5.1 Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS
    
    	5.2 Packages
    
    	f10c905587b4221fc794cefaf262e9ee	fileutils-4.1-4.i386.rpm
    
    	5.3 Installation
    
    	rpm -Fvh fileutils-4.1-4.i386.rpm
    
    	5.4 Source Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS
    
    	5.5 Source Packages
    
    	7e5519acdca5c17d12b3598847ec1ded	fileutils-4.1-4.src.rpm
    
    
    6. OpenLinux 3.1 Server
    
    	6.1 Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
    
    	6.2 Packages
    
    	334154c1635b50ad81a2f1b841ccadd8	fileutils-4.1-4.i386.rpm
    
    	6.3 Installation
    
    	rpm -Fvh fileutils-4.1-4.i386.rpm
    
    	6.4 Source Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS
    
    	6.5 Source Packages
    
    	6a12bbcaefb252eac3fe4b79464881e4	fileutils-4.1-4.src.rpm
    
    
    7. OpenLinux 3.1 Workstation
    
    	7.1 Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS
    
    	7.2 Packages
    
    	2db4e5565fc7d38ee5cdf3be57f86301	fileutils-4.1-4.i386.rpm
    
    	7.3 Installation
    
    	rpm -Fvh fileutils-4.1-4.i386.rpm
    
    	7.4 Source Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS
    
    	7.5 Source Packages
    
    	1b5ef3933f229b68cd8e24fb75c5a0de	fileutils-4.1-4.src.rpm
    
    
    8. References
    
    	Specific references for this advisory:
    
    		http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002440.html
    		http://isec.pl/vulnerabilities/0002.txt Wojciech Purczynski (iSEC
    
    	Caldera OpenLinux security resources:
    		http://www.caldera.com/support/security/index.html
    
    	Caldera UNIX security resources:
    		http://stage.caldera.com/support/security/
    
    	This security fix closes Caldera incidents sr862917, fz520627,
    	erg712018.
    
    
    9. Disclaimer
    
    	Caldera International, Inc. is not responsible for the misuse
    	of any of the information we provide on this website and/or
    	through our security advisories. Our advisories are a service
    	to our customers intended to promote secure installation and
    	use of Caldera products.
    
    
    10. Acknowledgements
    
    	Wojciech Purczynski (iSEC Security Research, http://isec.pl)
    	reported this vulnerability. 
    
    ______________________________________________________________________________
    
    
    



    This archive was generated by hypermail 2b30 : Mon Apr 29 2002 - 18:34:54 PDT