Boletines de Vulnerabilidades |
Vulnerabilidad en umount (util-linux) |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Aumento de la visibilidad |
Dificultad | Principiante |
Requerimientos del atacante | Acceso remoto con cuenta |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | util-linux 2.8-2.12q, 2.13-pre1, 2.13-pre2 |
Descripción |
|
Se ha descubierto una vulnerabilidad en la utilidad umount del paquete util-linux. La vulnerabilidad reside en la opción "-r" que podría eliminar opciones restrictivas como "nosuid" sobre dispositivos montados en el sistema. La explotación de esta vulnerabilidad podría permitir a un atacante local obtener un aumento de visibilidad en el sistema. Por ejemplo podría ejecutar programas setuid de un dispositivo removible montado previamente con la opción "nosuid". |
|
Solución |
|
Actualización de software Mandriva Mandrakelinux 10.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/losetup-2.12-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/mount-2.12-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/util-linux-2.12-2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/util-linux-2.12-2.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/losetup-2.12-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/mount-2.12-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/util-linux-2.12-2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/util-linux-2.12-2.1.100mdk.src.rpm Mandrakelinux 10.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/losetup-2.12a-5.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/mount-2.12a-5.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/util-linux-2.12a-5.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/util-linux-2.12a-5.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/losetup-2.12a-5.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/mount-2.12a-5.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/util-linux-2.12a-5.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/util-linux-2.12a-5.1.101mdk.src.rpm Corporate Server 2.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/losetup-2.11u-5.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/mount-2.11u-5.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/util-linux-2.11u-5.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/util-linux-2.11u-5.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/losetup-2.11u-5.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/mount-2.11u-5.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/util-linux-2.11u-5.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/util-linux-2.11u-5.1.C21mdk.src.rpm Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/losetup-2.12-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/mount-2.12-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/util-linux-2.12-2.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/util-linux-2.12-2.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/losetup-2.12-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/mount-2.12-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/util-linux-2.12-2.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/util-linux-2.12-2.1.C30mdk.src.rpm Multi Network Firewall 2.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/losetup-2.12-2.1.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/mount-2.12-2.1.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/util-linux-2.12-2.1.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/util-linux-2.12-2.1.M20mdk.src.rpm Mandrivalinux LE2005 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/losetup-2.12a-12.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/mount-2.12a-12.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/util-linux-2.12a-12.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/util-linux-2.12a-12.1.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/losetup-2.12a-12.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/mount-2.12a-12.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/util-linux-2.12a-12.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/util-linux-2.12a-12.1.102mdk.src.rpm Debian (util-linux) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1.dsc http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1.diff.gz http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/u/util-linux/util-linux-locales_2.11n-7woody1_all.deb Alpha http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_alpha.deb ARM http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_m68k.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_m68k.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.11n-7woody1_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.11n-7woody1_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.11n-7woody1_sparc.deb Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1.dsc http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1.diff.gz http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/u/util-linux/util-linux-locales_2.12p-4sarge1_all.deb Alpha http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_amd64.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_amd64.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_m68k.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_m68k.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge1_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge1_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge1_sparc.deb Debian (loop-aes-utils) Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1.dsc http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1.diff.gz http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_amd64.deb ARM http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge1_sparc.deb Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux Red Hat Red Hat Desktop (v. 3) / SRPMS util-linux-2.11y-31.11.src.rpm Red Hat Desktop (v. 3) / IA-32 losetup-2.11y-31.11.i386.rpm mount-2.11y-31.11.i386.rpm util-linux-2.11y-31.11.i386.rpm Red Hat Desktop (v. 3) / x86_64 losetup-2.11y-31.11.x86_64.rpm mount-2.11y-31.11.x86_64.rpm util-linux-2.11y-31.11.x86_64.rpm Red Hat Desktop (v. 4) / SRPMS util-linux-2.12a-16.EL4.12.src.rpm Red Hat Desktop (v. 4) / IA-32 util-linux-2.12a-16.EL4.12.i386.rpm Red Hat Desktop (v. 4) / x86_64 util-linux-2.12a-16.EL4.12.x86_64.rpm Red Hat Enterprise Linux AS (v. 2.1) / SRPMS mount-2.11g-9.src.rpm util-linux-2.11f-20.8.src.rpm Red Hat Enterprise Linux AS (v. 2.1) / IA-32 losetup-2.11g-9.i386.rpm mount-2.11g-9.i386.rpm util-linux-2.11f-20.8.i386.rpm Red Hat Enterprise Linux AS (v. 2.1) / IA-64 losetup-2.11g-9.ia64.rpm mount-2.11g-9.ia64.rpm util-linux-2.11f-20.8.ia64.rpm Red Hat Enterprise Linux AS (v. 3) / SRPMS util-linux-2.11y-31.11.src.rpm Red Hat Enterprise Linux AS (v. 3) / IA-32 losetup-2.11y-31.11.i386.rpm mount-2.11y-31.11.i386.rpm util-linux-2.11y-31.11.i386.rpm Red Hat Enterprise Linux AS (v. 3) / IA-64 losetup-2.11y-31.11.ia64.rpm mount-2.11y-31.11.ia64.rpm util-linux-2.11y-31.11.ia64.rpm Red Hat Enterprise Linux AS (v. 3) / PPC losetup-2.11y-31.11.ppc.rpm mount-2.11y-31.11.ppc.rpm util-linux-2.11y-31.11.ppc.rpm Red Hat Enterprise Linux AS (v. 3) / s390 losetup-2.11y-31.11.s390.rpm mount-2.11y-31.11.s390.rpm util-linux-2.11y-31.11.s390.rpm Red Hat Enterprise Linux AS (v. 3) / s390x losetup-2.11y-31.11.s390x.rpm mount-2.11y-31.11.s390x.rpm util-linux-2.11y-31.11.s390x.rpm Red Hat Enterprise Linux AS (v. 3) / x86_64 losetup-2.11y-31.11.x86_64.rpm mount-2.11y-31.11.x86_64.rpm util-linux-2.11y-31.11.x86_64.rpm Red Hat Enterprise Linux AS (v. 4) / SRPMS util-linux-2.12a-16.EL4.12.src.rpm Red Hat Enterprise Linux AS (v. 4) / IA-32 util-linux-2.12a-16.EL4.12.i386.rpm Red Hat Enterprise Linux AS (v. 4) / IA-64 util-linux-2.12a-16.EL4.12.ia64.rpm Red Hat Enterprise Linux AS (v. 4) / PPC util-linux-2.12a-16.EL4.12.ppc.rpm Red Hat Enterprise Linux AS (v. 4) / s390 util-linux-2.12a-16.EL4.12.s390.rpm Red Hat Enterprise Linux AS (v. 4) / s390x util-linux-2.12a-16.EL4.12.s390x.rpm Red Hat Enterprise Linux AS (v. 4) / x86_64 util-linux-2.12a-16.EL4.12.x86_64.rpm Red Hat Enterprise Linux ES (v. 2.1) / SRPMS mount-2.11g-9.src.rpm util-linux-2.11f-20.8.src.rpm Red Hat Enterprise Linux ES (v. 2.1) / IA-32 losetup-2.11g-9.i386.rpm mount-2.11g-9.i386.rpm util-linux-2.11f-20.8.i386.rpm Red Hat Enterprise Linux ES (v. 3) / SRPMS util-linux-2.11y-31.11.src.rpm Red Hat Enterprise Linux ES (v. 3) / IA-32 losetup-2.11y-31.11.i386.rpm mount-2.11y-31.11.i386.rpm util-linux-2.11y-31.11.i386.rpm Red Hat Enterprise Linux ES (v. 3) / IA-64 losetup-2.11y-31.11.ia64.rpm mount-2.11y-31.11.ia64.rpm util-linux-2.11y-31.11.ia64.rpm Red Hat Enterprise Linux ES (v. 3) / x86_64 losetup-2.11y-31.11.x86_64.rpm mount-2.11y-31.11.x86_64.rpm util-linux-2.11y-31.11.x86_64.rpm Red Hat Enterprise Linux ES (v. 4) / SRPMS util-linux-2.12a-16.EL4.12.src.rpm Red Hat Enterprise Linux ES (v. 4) / IA-32 util-linux-2.12a-16.EL4.12.i386.rpm Red Hat Enterprise Linux ES (v. 4) / IA-64 util-linux-2.12a-16.EL4.12.ia64.rpm Red Hat Enterprise Linux ES (v. 4) / x86_64 util-linux-2.12a-16.EL4.12.x86_64.rpm Red Hat Enterprise Linux WS (v. 2.1) / SRPMS mount-2.11g-9.src.rpm util-linux-2.11f-20.8.src.rpm Red Hat Enterprise Linux WS (v. 2.1) / IA-32 losetup-2.11g-9.i386.rpm mount-2.11g-9.i386.rpm util-linux-2.11f-20.8.i386.rpm Red Hat Enterprise Linux WS (v. 3) / SRPMS util-linux-2.11y-31.11.src.rpm Red Hat Enterprise Linux WS (v. 3) / IA-32 losetup-2.11y-31.11.i386.rpm mount-2.11y-31.11.i386.rpm util-linux-2.11y-31.11.i386.rpm Red Hat Enterprise Linux WS (v. 3) / IA-64 losetup-2.11y-31.11.ia64.rpm mount-2.11y-31.11.ia64.rpm util-linux-2.11y-31.11.ia64.rpm Red Hat Enterprise Linux WS (v. 3) / x86_64 losetup-2.11y-31.11.x86_64.rpm mount-2.11y-31.11.x86_64.rpm util-linux-2.11y-31.11.x86_64.rpm Red Hat Enterprise Linux WS (v. 4) / SRPMS util-linux-2.12a-16.EL4.12.src.rpm Red Hat Enterprise Linux WS (v. 4) / IA-32 util-linux-2.12a-16.EL4.12.i386.rpm Red Hat Enterprise Linux WS (v. 4) / IA-64 util-linux-2.12a-16.EL4.12.ia64.rpm Red Hat Enterprise Linux WS (v. 4) / x86_64 util-linux-2.12a-16.EL4.12.x86_64.rpm Red Hat Linux Advanced Workstation 2.1 Itanium / SRPMS mount-2.11g-9.src.rpm util-linux-2.11f-20.8.src.rpm Red Hat Linux Advanced Workstation 2.1 Itanium / IA-64 losetup-2.11g-9.ia64.rpm mount-2.11g-9.ia64.rpm util-linux-2.11f-20.8.ia64.rpm SGI Advanced Linux Environment 3 / RPM / Patch 10235 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10235 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-2876 |
BID | |
Recursos adicionales |
|
Mandriva Security Advisory (MDKSA-2005:167) http://www.mandriva.com/security/advisories?name=MDKSA-2005:167 Debian Security Advisory (DSA 823-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00215.html Debian Security Advisory (DSA 825-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00217.html SUSE Security Advisory (SUSE-SR:2005:021) http://www.novell.com/linux/security/advisories/2005_21_sr.html Red Hat Security Advisory (RHSA-2005:782-12) https://rhn.redhat.com/errata/RHSA-2005-782.html SGI Security Advisory (20051003-01-U) ftp://patches.sgi.com/support/free/security/advisories/20051003-01-U.asc |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2005-09-22 |
1.1 | Avisos emitidos por Debian (DSA 823-1 y DSA 825-1) | 2005-10-04 |
1.2 | Aviso emitido por Suse (SUSE-SR:2005:021) | 2005-10-10 |
1.3 | Aviso emitido por Red Hat (RHSA-2005:782-12) | 2005-10-18 |
1.4 | Aviso emitido por SGI (20051003-01-U) | 2005-10-26 |