[LWN Logo]
[Timeline]
Date: Tue, 5 Dec 2000 18:16:40 -0200
To: lwn@lwn.net, bugtraq@securityfocus.com, security-alert@linuxsecurity.com,
Subject: [CLA-2000:350] Conectiva Linux Security Announcement - bash
From: secure@conectiva.com.br

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- -----------------------------------------------------------------------

PACKAGE   : bash
SUMMARY   : Insecure temporary file creation in << redirects
DATE      : 2000-12-05 18:14:00
ID        : CLA-2000:350
RELEVANT
RELEASES  : 4.0, 4.0es, 4.1, 4.2, 5.0, prg gráficos, ecommerce, 5.1, 6.0

- ----------------------------------------------------------------------

DESCRIPTION
 Bash is the default shell used in a standard Conectiva Linux
 installation.
 There is a vulnerability regarding the use of "<<" redirectors. If
 used, the shell creates a temporary file in /tmp with a predictable
 filename (the only variant is the PID). Additionally, it was not
 being opened exclusively. This can be used by an attacker to
 overwrite arbitrary files in the system. At least one initialization
 script (rc.sysinit) uses "<<", and it is run as root at boot time.


SOLUTION
 All users should upgrade immediately.


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/4.0/SRPMS/bash-1.14.7-24cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.0/i386/bash-1.14.7-24cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.0es/SRPMS/bash-1.14.7-24cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.0es/i386/bash-1.14.7-24cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/bash-1.14.7-24cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.1/i386/bash-1.14.7-24cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/bash-1.14.7-24cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.2/i386/bash-1.14.7-24cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/bash-1.14.7-26cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/bash-1.14.7-26cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/bash-1.14.7-29cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/bash-1.14.7-29cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/bash1-1.14.7-31cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/bash1-1.14.7-31cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/SRPMS/bash-1.14.7-26cl.src.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/bash-1.14.7-26cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/SRPMS/bash-1.14.7-26cl.src.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/bash-1.14.7-26cl.i386.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- ----------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key can be 
obtained at http://www.conectiva.com.br/contato

- -----------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://www.conectiva.com.br/suporte/atualizacoes

- ----------------------------------------------------------------------
subscribe: atualizacoes-anuncio-subscribe@papaleguas.conectiva.com.br
unsubscribe: atualizacoes-anuncio-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6LU0m42jd0JmAcZARAs1EAKCbGKd8IyFKg9XpjOHLsMVtXdMoEgCgsOfA
eNMS/x0AvM8MgRJlCDjdJ3g=
=Y56B
-----END PGP SIGNATURE-----