- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHSA-2009:0981 - Security Advisory
Synopsis
Low: util-linux security and bug fix update
Type/Severity
Security Advisory: Low
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated util-linux package that fixes one security issue and several
bugs is now available.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
Description
The util-linux package contains a collection of basic system utilities,
such as fdisk and mount.
A log injection attack was found in util-linux when logging log in attempts
via the audit subsystem of the Linux kernel. A remote attacker could use
this flaw to modify certain parts of logged events, possibly hiding their
activities on a system. (CVE-2008-1926)
This updated package also fixes the following bugs:
- partitions created by VMware ESX™ were not included in the list of
recognized file systems used by fdisk. Consequently, if VMware ESX was
installed, "fdisk -l" returned "Unknown" for these partitions. With this
update, information regarding the VMKcore and VMFS partitions has been
added to the file systems list. On systems running VMware ESX, "fdisk -l"
now lists information about these partitions as expected. (BZ#447264)
- if a username was not set, the login command would fail with a
Segmentation fault. With this update, login lets the audit system handle
NULL usernames (it sends an AUDIT_USER_LOGIN message to the audit system in
the event there is no username set). (BZ#456213)
- the nfs(5) man page listed version 2 as the default. This is incorrect:
unless otherwise specified, the NFS client uses NFS version 3. The man page
has been corrected. (BZ#458539)
- in certain situations, backgrounded NFS mounts died shortly after being
backgrounded when the mount command was executed by the initlog command,
which, for example, would occur when running an init script, such as
running the "service netfs start" command. In these situations, running the
"ps -ef" command showed backgrounded NFS mounts disappearing shortly after
being backgrounded. In this updated package, backgrounded mount processes
detach from the controlling terminal, which resolves this issue.
(BZ#461488)
- if a new partition's starting cylinder was beyond one terabyte, fdisk
could not create the partition. This has been fixed. (BZ#471372)
- in rare cases "mount -a" ignored fstab order and tried to re-mount file
systems on mpath devices. With this update, mount honors fstab order even
in the rare cases reported. (BZ#472186)
- the "mount --move" command moved a file system's mount point as expected
(for example, /proc/mounts showed the changed mount point as expected) but
did not update /etc/mtab properly. With this update, the "mount --move"
command gathers all necessary information about the old mount point, copies
it to the new mount point and then deletes the old point, ensuring
/etc/mtab is updated properly. (BZ#485004)
Util-linux users are advised to upgrade to this updated package, which
addresses this vulnerability and resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 443925 - CVE-2008-1926 util-linux: audit log injection via login
- BZ - 447264 - RHEL4: VMware fdisk partitions
- BZ - 456213 - RHEL4: login segfaults on EOF
- BZ - 456379 - RHEL4: audit log injection attack via login
- BZ - 458539 - man nfs : wrong information about nfs version used
- BZ - 461488 - Backgrounded NFS mounts dies soon after "service netfs start" command is issued
- BZ - 471372 - RHEL4: fdisk cannot create partition with starting beyond 1 TB
- BZ - 472186 - mount -a has problems with duplicate labels in a mpath setup
- BZ - 485004 - Move mount doesn't correctly update mtab
CVEs
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
util-linux-2.12a-24.el4.src.rpm | SHA-256: 9a91778c37759bc36b1449240d39f9b00802ad68879e9fadbe69823f7fa16140 |
x86_64 | |
util-linux-2.12a-24.el4.x86_64.rpm | SHA-256: 93d2568026371bcf7e9d296b9b11b3761e4574461224b3765e187a78c0c928bf |
util-linux-2.12a-24.el4.x86_64.rpm | SHA-256: 93d2568026371bcf7e9d296b9b11b3761e4574461224b3765e187a78c0c928bf |
ia64 | |
util-linux-2.12a-24.el4.ia64.rpm | SHA-256: d3e1d740ee9b7d6881b9e5444f413a45c0dd9538daaeb9c5d2892f4ddfa94ed2 |
util-linux-2.12a-24.el4.ia64.rpm | SHA-256: d3e1d740ee9b7d6881b9e5444f413a45c0dd9538daaeb9c5d2892f4ddfa94ed2 |
i386 | |
util-linux-2.12a-24.el4.i386.rpm | SHA-256: 1e87ed11881c5e5c4cac7386011710fc31515469d3f1e881c6a052322a455dbb |
util-linux-2.12a-24.el4.i386.rpm | SHA-256: 1e87ed11881c5e5c4cac7386011710fc31515469d3f1e881c6a052322a455dbb |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
util-linux-2.12a-24.el4.src.rpm | SHA-256: 9a91778c37759bc36b1449240d39f9b00802ad68879e9fadbe69823f7fa16140 |
x86_64 | |
util-linux-2.12a-24.el4.x86_64.rpm | SHA-256: 93d2568026371bcf7e9d296b9b11b3761e4574461224b3765e187a78c0c928bf |
ia64 | |
util-linux-2.12a-24.el4.ia64.rpm | SHA-256: d3e1d740ee9b7d6881b9e5444f413a45c0dd9538daaeb9c5d2892f4ddfa94ed2 |
i386 | |
util-linux-2.12a-24.el4.i386.rpm | SHA-256: 1e87ed11881c5e5c4cac7386011710fc31515469d3f1e881c6a052322a455dbb |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
util-linux-2.12a-24.el4.src.rpm | SHA-256: 9a91778c37759bc36b1449240d39f9b00802ad68879e9fadbe69823f7fa16140 |
x86_64 | |
util-linux-2.12a-24.el4.x86_64.rpm | SHA-256: 93d2568026371bcf7e9d296b9b11b3761e4574461224b3765e187a78c0c928bf |
i386 | |
util-linux-2.12a-24.el4.i386.rpm | SHA-256: 1e87ed11881c5e5c4cac7386011710fc31515469d3f1e881c6a052322a455dbb |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
util-linux-2.12a-24.el4.src.rpm | SHA-256: 9a91778c37759bc36b1449240d39f9b00802ad68879e9fadbe69823f7fa16140 |
s390x | |
util-linux-2.12a-24.el4.s390x.rpm | SHA-256: 00fafcb17c95989dc4095600ed6d1ba92aa6c5fcab2833d61c6a5350b3b60729 |
s390 | |
util-linux-2.12a-24.el4.s390.rpm | SHA-256: ba5f38fe32654c49976b938037af65dfb74b8fd6c19f4c7dd298511f575fa3c4 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
util-linux-2.12a-24.el4.src.rpm | SHA-256: 9a91778c37759bc36b1449240d39f9b00802ad68879e9fadbe69823f7fa16140 |
ppc | |
util-linux-2.12a-24.el4.ppc.rpm | SHA-256: 41b5362de140e30b43e53bf677b07ce15d0b52fed355df63d3056ea108cca5b5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.