SuSE: util < 2.10f
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: util < 2.10f
Date: Thu Feb 10 20:03:43 CET 2000
Affected SuSE versions: all
Vulnerability Type: (unlikely) local root compromise
SuSE default package: yes
Other affected systems: all linux systems using util < 2.10f
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The mount/umount command doesn't do proper bounds checking on user input.
2. Impact
If an attacker executes mount/umount with a long relative pathname, it
will overwrite dynamic allocated memory of the realpath function.
It is possible that an attacker could gain root privileges by modifying
the heap data, however we were not able to exploit it.
3. Solution
Update the package from our FTP server or remove the suid bits.
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)
8fffa6e7ce36b51f190652189629a2c0 /6.1/a1/util-2.10f-4.alpha.rpm
121bf103d58cc9e959f910a0437285bd /6.3/a1/util-2.10f-0.alpha.rpm
96166ddbe17ef1aabf6531a34e48d386
285c0d41b2932b068fdac3f860e3446e /6.2/a1/util-2.10f-4.i386.rpm
452143c94bcae39ec9adc5922be9acc9 ______________________________________________________________________________
You can find updates on our ftp-Server:
for Intel processors for Alpha processors
or try the following web pages for a list of mirrors:
SUSE – Open-Source-Lösungen für Enterprise Server und Cloud | SUSE
Our webpage for patches:
SUSE – Open-Source-Lösungen für Enterprise Server und Cloud | SUSE
Our webpage for security announcements:
SUSE – Open-Source-Lösungen für Enterprise Server und Cloud | SUSE
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
References