int(1831)

Boletines de Vulnerabilidades


Vulnerabilidad en umount (util-linux)

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Aumento de la visibilidad
Dificultad Principiante
Requerimientos del atacante Acceso remoto con cuenta

Información sobre el sistema

Propiedad Valor
Fabricant afectat GNU/Linux
Software afectado util-linux 2.8-2.12q, 2.13-pre1, 2.13-pre2

Descripción

Se ha descubierto una vulnerabilidad en la utilidad umount del paquete util-linux. La vulnerabilidad reside en la opción "-r" que podría eliminar opciones restrictivas como "nosuid" sobre dispositivos montados en el sistema.

La explotación de esta vulnerabilidad podría permitir a un atacante local obtener un aumento de visibilidad en el sistema. Por ejemplo podría ejecutar programas setuid de un dispositivo removible montado previamente con la opción "nosuid".

Solución



Actualización de software

Mandriva

Mandrakelinux 10.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/losetup-2.12-2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/mount-2.12-2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/util-linux-2.12-2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/util-linux-2.12-2.1.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/losetup-2.12-2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/mount-2.12-2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/util-linux-2.12-2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/util-linux-2.12-2.1.100mdk.src.rpm

Mandrakelinux 10.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/losetup-2.12a-5.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/mount-2.12a-5.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/util-linux-2.12a-5.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/util-linux-2.12a-5.1.101mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/losetup-2.12a-5.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/mount-2.12a-5.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/util-linux-2.12a-5.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/util-linux-2.12a-5.1.101mdk.src.rpm

Corporate Server 2.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/losetup-2.11u-5.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/mount-2.11u-5.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/util-linux-2.11u-5.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/util-linux-2.11u-5.1.C21mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/losetup-2.11u-5.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/mount-2.11u-5.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/util-linux-2.11u-5.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/util-linux-2.11u-5.1.C21mdk.src.rpm

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/losetup-2.12-2.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/mount-2.12-2.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/util-linux-2.12-2.1.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/util-linux-2.12-2.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/losetup-2.12-2.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/mount-2.12-2.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/util-linux-2.12-2.1.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/util-linux-2.12-2.1.C30mdk.src.rpm

Multi Network Firewall 2.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/losetup-2.12-2.1.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/mount-2.12-2.1.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/util-linux-2.12-2.1.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/util-linux-2.12-2.1.M20mdk.src.rpm

Mandrivalinux LE2005
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/losetup-2.12a-12.1.102mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/mount-2.12a-12.1.102mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/util-linux-2.12a-12.1.102mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/util-linux-2.12a-12.1.102mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/losetup-2.12a-12.1.102mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/mount-2.12a-12.1.102mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/util-linux-2.12a-12.1.102mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/util-linux-2.12a-12.1.102mdk.src.rpm

Debian (util-linux)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1.dsc
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1.diff.gz
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/u/util-linux/util-linux-locales_2.11n-7woody1_all.deb
Alpha
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_alpha.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_alpha.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_alpha.deb
ARM
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_arm.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_arm.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_i386.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_i386.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_ia64.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_ia64.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_hppa.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_hppa.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_m68k.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_m68k.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_mips.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_mips.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_mipsel.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_mipsel.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_powerpc.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_powerpc.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_s390.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_s390.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_sparc.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_sparc.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_sparc.deb

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1.dsc
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1.diff.gz
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/u/util-linux/util-linux-locales_2.12p-4sarge1_all.deb
Alpha
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_alpha.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_alpha.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_amd64.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_amd64.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_amd64.deb
ARM
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_arm.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_arm.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_i386.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_i386.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_ia64.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_ia64.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_hppa.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_hppa.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_m68k.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_m68k.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_mips.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_mips.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_mipsel.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_mipsel.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_powerpc.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_s390.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_s390.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_sparc.deb
http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_sparc.deb
http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_sparc.deb

Debian (loop-aes-utils)

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1.dsc
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1.diff.gz
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_amd64.deb
ARM
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_sparc.deb

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Red Hat

Red Hat Desktop (v. 3) / SRPMS
util-linux-2.11y-31.11.src.rpm

Red Hat Desktop (v. 3) / IA-32
losetup-2.11y-31.11.i386.rpm
mount-2.11y-31.11.i386.rpm
util-linux-2.11y-31.11.i386.rpm

Red Hat Desktop (v. 3) / x86_64
losetup-2.11y-31.11.x86_64.rpm
mount-2.11y-31.11.x86_64.rpm
util-linux-2.11y-31.11.x86_64.rpm

Red Hat Desktop (v. 4) / SRPMS
util-linux-2.12a-16.EL4.12.src.rpm

Red Hat Desktop (v. 4) / IA-32
util-linux-2.12a-16.EL4.12.i386.rpm

Red Hat Desktop (v. 4) / x86_64
util-linux-2.12a-16.EL4.12.x86_64.rpm

Red Hat Enterprise Linux AS (v. 2.1) / SRPMS
mount-2.11g-9.src.rpm
util-linux-2.11f-20.8.src.rpm

Red Hat Enterprise Linux AS (v. 2.1) / IA-32
losetup-2.11g-9.i386.rpm
mount-2.11g-9.i386.rpm
util-linux-2.11f-20.8.i386.rpm

Red Hat Enterprise Linux AS (v. 2.1) / IA-64
losetup-2.11g-9.ia64.rpm
mount-2.11g-9.ia64.rpm
util-linux-2.11f-20.8.ia64.rpm

Red Hat Enterprise Linux AS (v. 3) / SRPMS
util-linux-2.11y-31.11.src.rpm

Red Hat Enterprise Linux AS (v. 3) / IA-32
losetup-2.11y-31.11.i386.rpm
mount-2.11y-31.11.i386.rpm
util-linux-2.11y-31.11.i386.rpm

Red Hat Enterprise Linux AS (v. 3) / IA-64
losetup-2.11y-31.11.ia64.rpm
mount-2.11y-31.11.ia64.rpm
util-linux-2.11y-31.11.ia64.rpm

Red Hat Enterprise Linux AS (v. 3) / PPC
losetup-2.11y-31.11.ppc.rpm
mount-2.11y-31.11.ppc.rpm
util-linux-2.11y-31.11.ppc.rpm

Red Hat Enterprise Linux AS (v. 3) / s390
losetup-2.11y-31.11.s390.rpm
mount-2.11y-31.11.s390.rpm
util-linux-2.11y-31.11.s390.rpm

Red Hat Enterprise Linux AS (v. 3) / s390x
losetup-2.11y-31.11.s390x.rpm
mount-2.11y-31.11.s390x.rpm
util-linux-2.11y-31.11.s390x.rpm

Red Hat Enterprise Linux AS (v. 3) / x86_64
losetup-2.11y-31.11.x86_64.rpm
mount-2.11y-31.11.x86_64.rpm
util-linux-2.11y-31.11.x86_64.rpm

Red Hat Enterprise Linux AS (v. 4) / SRPMS
util-linux-2.12a-16.EL4.12.src.rpm

Red Hat Enterprise Linux AS (v. 4) / IA-32
util-linux-2.12a-16.EL4.12.i386.rpm

Red Hat Enterprise Linux AS (v. 4) / IA-64
util-linux-2.12a-16.EL4.12.ia64.rpm

Red Hat Enterprise Linux AS (v. 4) / PPC
util-linux-2.12a-16.EL4.12.ppc.rpm

Red Hat Enterprise Linux AS (v. 4) / s390
util-linux-2.12a-16.EL4.12.s390.rpm

Red Hat Enterprise Linux AS (v. 4) / s390x
util-linux-2.12a-16.EL4.12.s390x.rpm

Red Hat Enterprise Linux AS (v. 4) / x86_64
util-linux-2.12a-16.EL4.12.x86_64.rpm

Red Hat Enterprise Linux ES (v. 2.1) / SRPMS
mount-2.11g-9.src.rpm
util-linux-2.11f-20.8.src.rpm

Red Hat Enterprise Linux ES (v. 2.1) / IA-32
losetup-2.11g-9.i386.rpm
mount-2.11g-9.i386.rpm
util-linux-2.11f-20.8.i386.rpm

Red Hat Enterprise Linux ES (v. 3) / SRPMS
util-linux-2.11y-31.11.src.rpm

Red Hat Enterprise Linux ES (v. 3) / IA-32
losetup-2.11y-31.11.i386.rpm
mount-2.11y-31.11.i386.rpm
util-linux-2.11y-31.11.i386.rpm

Red Hat Enterprise Linux ES (v. 3) / IA-64
losetup-2.11y-31.11.ia64.rpm
mount-2.11y-31.11.ia64.rpm
util-linux-2.11y-31.11.ia64.rpm

Red Hat Enterprise Linux ES (v. 3) / x86_64
losetup-2.11y-31.11.x86_64.rpm
mount-2.11y-31.11.x86_64.rpm
util-linux-2.11y-31.11.x86_64.rpm

Red Hat Enterprise Linux ES (v. 4) / SRPMS
util-linux-2.12a-16.EL4.12.src.rpm

Red Hat Enterprise Linux ES (v. 4) / IA-32
util-linux-2.12a-16.EL4.12.i386.rpm

Red Hat Enterprise Linux ES (v. 4) / IA-64
util-linux-2.12a-16.EL4.12.ia64.rpm

Red Hat Enterprise Linux ES (v. 4) / x86_64
util-linux-2.12a-16.EL4.12.x86_64.rpm

Red Hat Enterprise Linux WS (v. 2.1) / SRPMS
mount-2.11g-9.src.rpm
util-linux-2.11f-20.8.src.rpm

Red Hat Enterprise Linux WS (v. 2.1) / IA-32
losetup-2.11g-9.i386.rpm
mount-2.11g-9.i386.rpm
util-linux-2.11f-20.8.i386.rpm

Red Hat Enterprise Linux WS (v. 3) / SRPMS
util-linux-2.11y-31.11.src.rpm

Red Hat Enterprise Linux WS (v. 3) / IA-32
losetup-2.11y-31.11.i386.rpm
mount-2.11y-31.11.i386.rpm
util-linux-2.11y-31.11.i386.rpm

Red Hat Enterprise Linux WS (v. 3) / IA-64
losetup-2.11y-31.11.ia64.rpm
mount-2.11y-31.11.ia64.rpm
util-linux-2.11y-31.11.ia64.rpm

Red Hat Enterprise Linux WS (v. 3) / x86_64
losetup-2.11y-31.11.x86_64.rpm
mount-2.11y-31.11.x86_64.rpm
util-linux-2.11y-31.11.x86_64.rpm

Red Hat Enterprise Linux WS (v. 4) / SRPMS
util-linux-2.12a-16.EL4.12.src.rpm

Red Hat Enterprise Linux WS (v. 4) / IA-32
util-linux-2.12a-16.EL4.12.i386.rpm

Red Hat Enterprise Linux WS (v. 4) / IA-64
util-linux-2.12a-16.EL4.12.ia64.rpm

Red Hat Enterprise Linux WS (v. 4) / x86_64
util-linux-2.12a-16.EL4.12.x86_64.rpm

Red Hat Linux Advanced Workstation 2.1 Itanium / SRPMS
mount-2.11g-9.src.rpm
util-linux-2.11f-20.8.src.rpm

Red Hat Linux Advanced Workstation 2.1 Itanium / IA-64
losetup-2.11g-9.ia64.rpm
mount-2.11g-9.ia64.rpm
util-linux-2.11f-20.8.ia64.rpm

SGI
Advanced Linux Environment 3 / RPM / Patch 10235
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10235
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Identificadores estándar

Propiedad Valor
CVE CAN-2005-2876
BID

Recursos adicionales

Mandriva Security Advisory (MDKSA-2005:167)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:167

Debian Security Advisory (DSA 823-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00215.html

Debian Security Advisory (DSA 825-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00217.html

SUSE Security Advisory (SUSE-SR:2005:021)
http://www.novell.com/linux/security/advisories/2005_21_sr.html

Red Hat Security Advisory (RHSA-2005:782-12)
https://rhn.redhat.com/errata/RHSA-2005-782.html

SGI Security Advisory (20051003-01-U)
ftp://patches.sgi.com/support/free/security/advisories/20051003-01-U.asc

Histórico de versiones

Versión Comentario Data
1.0 Aviso emitido 2005-09-22
1.1 Avisos emitidos por Debian (DSA 823-1 y DSA 825-1) 2005-10-04
1.2 Aviso emitido por Suse (SUSE-SR:2005:021) 2005-10-10
1.3 Aviso emitido por Red Hat (RHSA-2005:782-12) 2005-10-18
1.4 Aviso emitido por SGI (20051003-01-U) 2005-10-26
Ministerio de Defensa
CNI
CCN
CCN-CERT