Skip to navigation

Security Advisory util-linux and mount security update

Advisory: RHSA-2005:782-12
Type: Security Advisory
Severity: Moderate
Issued on: 2005-10-11
Last updated on: 2005-10-11
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2001-1494
CVE-2005-2876

Details

Updated util-linux and mount packages that fix two security issues are now
available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

The util-linux package contains a large variety of low-level system
utilities that are necessary for a Linux system to function.

The mount package contains the mount, umount, swapon and swapoff programs.

A bug was found in the way the umount command is executed by normal users.
It may be possible for a user to gain elevated privileges if the user is
able to execute the "umount -r" command on a mounted file system. The
file system will be re-mounted only with the "readonly" flag set, clearing
flags such as "nosuid" and "noexec". The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-2876 to
this issue.

This update also fixes a hardlink bug in the script command for Red Hat
Enterprise Linux 2.1. If a local user places a hardlinked file named
"typescript" in a directory they have write access to, the file will be
overwritten if the user running script has write permissions to the
destination file. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2001-1494 to this issue.

All users of util-linux and mount should upgrade to these updated packages,
which contain backported patches to correct these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
util-linux-2.11y-31.11.src.rpm
File outdated by:  RHSA-2007:0969
    MD5: 7a562d571237203634c8009d2c506921
 
IA-32:
losetup-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: b89a7d466e3cead507c00776aae3b437
mount-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: df678149ef9fe3c088f7ca6af1697337
util-linux-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: e5fa25f4caa04749eb39430e45ab7bd3
 
x86_64:
losetup-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: d7a946efdfbf418dad33828622c9f550
mount-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: b90e15d4e39913757550b9362a98bfb2
util-linux-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 6f2df633740943a84fa5f06d3ff41f54
 
Red Hat Desktop (v. 4)

SRPMS:
util-linux-2.12a-16.EL4.12.src.rpm
File outdated by:  RHBA-2011:0233
    MD5: fbbc6f06d4675b42e2bd0ba1bd1d6c57
 
IA-32:
util-linux-2.12a-16.EL4.12.i386.rpm
File outdated by:  RHBA-2011:0233
    MD5: beb2444974794726ad73218c92ca2336
 
x86_64:
util-linux-2.12a-16.EL4.12.x86_64.rpm
File outdated by:  RHBA-2011:0233
    MD5: f8f59f58506acb3ba4c3ce9b5a8cebc0
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
mount-2.11g-9.src.rpm     MD5: d3282353910c50c68ebfb44cacb6c30f
util-linux-2.11f-20.8.src.rpm     MD5: 8a7547d3dd15711353a976fd47e04176
 
IA-32:
losetup-2.11g-9.i386.rpm     MD5: 7e1c7b7c2c2fa29085e7e6897e88078d
mount-2.11g-9.i386.rpm     MD5: ffaa56d9acad22b210f2f4ea509b5ec1
util-linux-2.11f-20.8.i386.rpm     MD5: 3e64e8635bd18d364511ad564dab373f
 
IA-64:
losetup-2.11g-9.ia64.rpm     MD5: 6f83321e29bfe52139ae9255dead0f9c
mount-2.11g-9.ia64.rpm     MD5: 8ce58c073113458c7a35df7912ea3746
util-linux-2.11f-20.8.ia64.rpm     MD5: ea0ede106e89ece2883f5dfa545c1429
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
util-linux-2.11y-31.11.src.rpm
File outdated by:  RHSA-2007:0969
    MD5: 7a562d571237203634c8009d2c506921
 
IA-32:
losetup-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: b89a7d466e3cead507c00776aae3b437
mount-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: df678149ef9fe3c088f7ca6af1697337
util-linux-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: e5fa25f4caa04749eb39430e45ab7bd3
 
IA-64:
losetup-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: ebbb6f700b72357c03220f32a1e8a164
mount-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 67526f76a9e66c74faad8ce7ce290a9d
util-linux-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 00657fbd14ab30ddec29724783288fb1
 
PPC:
losetup-2.11y-31.11.ppc.rpm
File outdated by:  RHSA-2007:0969
    MD5: b4fb144ebf8ba11e59fbac9de6bd2b95
mount-2.11y-31.11.ppc.rpm
File outdated by:  RHSA-2007:0969
    MD5: 2638872b02dd777c17bc30e2f6489f04
util-linux-2.11y-31.11.ppc.rpm
File outdated by:  RHSA-2007:0969
    MD5: 70a8b932588c3c36232b9e447c4bb9c3
 
s390:
losetup-2.11y-31.11.s390.rpm
File outdated by:  RHSA-2007:0969
    MD5: e4f001ff1d9fd90e0c582031fa3b0216
mount-2.11y-31.11.s390.rpm
File outdated by:  RHSA-2007:0969
    MD5: a6a1ca2a10b378fb25d4a862ef3cb645
util-linux-2.11y-31.11.s390.rpm
File outdated by:  RHSA-2007:0969
    MD5: 068f5f2c4f13dd5b45af98a9ea3c9da5
 
s390x:
losetup-2.11y-31.11.s390x.rpm
File outdated by:  RHSA-2007:0969
    MD5: 303c1e4eb9a401bb562e95f112cb86ad
mount-2.11y-31.11.s390x.rpm
File outdated by:  RHSA-2007:0969
    MD5: 5ad992ec8f902bced723a7b06c5febb2
util-linux-2.11y-31.11.s390x.rpm
File outdated by:  RHSA-2007:0969
    MD5: b0d09f13c674c79fb04a389765517473
 
x86_64:
losetup-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: d7a946efdfbf418dad33828622c9f550
mount-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: b90e15d4e39913757550b9362a98bfb2
util-linux-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 6f2df633740943a84fa5f06d3ff41f54
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
util-linux-2.12a-16.EL4.12.src.rpm
File outdated by:  RHBA-2011:0233
    MD5: fbbc6f06d4675b42e2bd0ba1bd1d6c57
 
IA-32:
util-linux-2.12a-16.EL4.12.i386.rpm
File outdated by:  RHBA-2011:0233
    MD5: beb2444974794726ad73218c92ca2336
 
IA-64:
util-linux-2.12a-16.EL4.12.ia64.rpm
File outdated by:  RHBA-2011:0233
    MD5: 811dcc7c533e68518555267c9c793b6e
 
PPC:
util-linux-2.12a-16.EL4.12.ppc.rpm
File outdated by:  RHBA-2011:0233
    MD5: deedcd5da6fcedff331a3e71b09b74c6
 
s390:
util-linux-2.12a-16.EL4.12.s390.rpm
File outdated by:  RHBA-2011:0233
    MD5: 390077578fdd458b402328d53ab574b8
 
s390x:
util-linux-2.12a-16.EL4.12.s390x.rpm
File outdated by:  RHBA-2011:0233
    MD5: c3324d5388df1577789df5b486ec810b
 
x86_64:
util-linux-2.12a-16.EL4.12.x86_64.rpm
File outdated by:  RHBA-2011:0233
    MD5: f8f59f58506acb3ba4c3ce9b5a8cebc0
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
mount-2.11g-9.src.rpm     MD5: d3282353910c50c68ebfb44cacb6c30f
util-linux-2.11f-20.8.src.rpm     MD5: 8a7547d3dd15711353a976fd47e04176
 
IA-32:
losetup-2.11g-9.i386.rpm     MD5: 7e1c7b7c2c2fa29085e7e6897e88078d
mount-2.11g-9.i386.rpm     MD5: ffaa56d9acad22b210f2f4ea509b5ec1
util-linux-2.11f-20.8.i386.rpm     MD5: 3e64e8635bd18d364511ad564dab373f
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
util-linux-2.11y-31.11.src.rpm
File outdated by:  RHSA-2007:0969
    MD5: 7a562d571237203634c8009d2c506921
 
IA-32:
losetup-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: b89a7d466e3cead507c00776aae3b437
mount-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: df678149ef9fe3c088f7ca6af1697337
util-linux-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: e5fa25f4caa04749eb39430e45ab7bd3
 
IA-64:
losetup-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: ebbb6f700b72357c03220f32a1e8a164
mount-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 67526f76a9e66c74faad8ce7ce290a9d
util-linux-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 00657fbd14ab30ddec29724783288fb1
 
x86_64:
losetup-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: d7a946efdfbf418dad33828622c9f550
mount-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: b90e15d4e39913757550b9362a98bfb2
util-linux-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 6f2df633740943a84fa5f06d3ff41f54
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
util-linux-2.12a-16.EL4.12.src.rpm
File outdated by:  RHBA-2011:0233
    MD5: fbbc6f06d4675b42e2bd0ba1bd1d6c57
 
IA-32:
util-linux-2.12a-16.EL4.12.i386.rpm
File outdated by:  RHBA-2011:0233
    MD5: beb2444974794726ad73218c92ca2336
 
IA-64:
util-linux-2.12a-16.EL4.12.ia64.rpm
File outdated by:  RHBA-2011:0233
    MD5: 811dcc7c533e68518555267c9c793b6e
 
x86_64:
util-linux-2.12a-16.EL4.12.x86_64.rpm
File outdated by:  RHBA-2011:0233
    MD5: f8f59f58506acb3ba4c3ce9b5a8cebc0
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
mount-2.11g-9.src.rpm     MD5: d3282353910c50c68ebfb44cacb6c30f
util-linux-2.11f-20.8.src.rpm     MD5: 8a7547d3dd15711353a976fd47e04176
 
IA-32:
losetup-2.11g-9.i386.rpm     MD5: 7e1c7b7c2c2fa29085e7e6897e88078d
mount-2.11g-9.i386.rpm     MD5: ffaa56d9acad22b210f2f4ea509b5ec1
util-linux-2.11f-20.8.i386.rpm     MD5: 3e64e8635bd18d364511ad564dab373f
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
util-linux-2.11y-31.11.src.rpm
File outdated by:  RHSA-2007:0969
    MD5: 7a562d571237203634c8009d2c506921
 
IA-32:
losetup-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: b89a7d466e3cead507c00776aae3b437
mount-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: df678149ef9fe3c088f7ca6af1697337
util-linux-2.11y-31.11.i386.rpm
File outdated by:  RHSA-2007:0969
    MD5: e5fa25f4caa04749eb39430e45ab7bd3
 
IA-64:
losetup-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: ebbb6f700b72357c03220f32a1e8a164
mount-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 67526f76a9e66c74faad8ce7ce290a9d
util-linux-2.11y-31.11.ia64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 00657fbd14ab30ddec29724783288fb1
 
x86_64:
losetup-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: d7a946efdfbf418dad33828622c9f550
mount-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: b90e15d4e39913757550b9362a98bfb2
util-linux-2.11y-31.11.x86_64.rpm
File outdated by:  RHSA-2007:0969
    MD5: 6f2df633740943a84fa5f06d3ff41f54
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
util-linux-2.12a-16.EL4.12.src.rpm
File outdated by:  RHBA-2011:0233
    MD5: fbbc6f06d4675b42e2bd0ba1bd1d6c57
 
IA-32:
util-linux-2.12a-16.EL4.12.i386.rpm
File outdated by:  RHBA-2011:0233
    MD5: beb2444974794726ad73218c92ca2336
 
IA-64:
util-linux-2.12a-16.EL4.12.ia64.rpm
File outdated by:  RHBA-2011:0233
    MD5: 811dcc7c533e68518555267c9c793b6e
 
x86_64:
util-linux-2.12a-16.EL4.12.x86_64.rpm
File outdated by:  RHBA-2011:0233
    MD5: f8f59f58506acb3ba4c3ce9b5a8cebc0
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
mount-2.11g-9.src.rpm     MD5: d3282353910c50c68ebfb44cacb6c30f
util-linux-2.11f-20.8.src.rpm     MD5: 8a7547d3dd15711353a976fd47e04176
 
IA-64:
losetup-2.11g-9.ia64.rpm     MD5: 6f83321e29bfe52139ae9255dead0f9c
mount-2.11g-9.ia64.rpm     MD5: 8ce58c073113458c7a35df7912ea3746
util-linux-2.11f-20.8.ia64.rpm     MD5: ea0ede106e89ece2883f5dfa545c1429
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

161337 - CAN-2001-1494 hardlink vulnerability in 'script' command
168206 - CAN-2005-2876 umount unsafe -r usage
168209 - CAN-2005-2876 umount unsafe -r usage


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/