[LWN Logo]

Date: 29 Aug 1999 00:44:52 -0000
From: listmaster@locutus.calderasystems.com
To: announce@lists.calderasystems.com
Subject: Security Advisory 25

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		buffer overflow in man
Advisory number: 	CSSA-1999:025.0
Issue date: 		1999 August, 27
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a buffer overflow in man, the manual pager. As it is
   setgid to group man, a local user can obtain group man
   privilege by exploiting this hole.

2. Vulnerable Versions

   Systems : COL 2.2
   Packages: previous to /man-1.5f-5

3. Solutions

   Workaround:

	Disable the setgid bit on /usr/man/man:
		chmod g-s /usr/man/man
	This will stop any caching of formatted manual pages, but
	displaying manual pages will continue to work.

   The proper solution is to upgrade to the latest packages

	rpm -U man-1.5f-5.i386.rpm
	
4. Location of Fixed Packages

   The upgrade packages can be found on Caldera's FTP site at:

   ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/

   The corresponding source code package can be found at:

   ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS


5. Installing Fixed Packages

   Upgrade the affected packages with the following commands:

        rpm -U man-1.5f-5.i386.rpm
	
6. Verification

   77c77978a2031b0219532794572e3163  RPMS/man-1.5f-5.i386.rpm
   af2406b378c270d77a6529858f23218d  SRPMS/man-1.5f-5.src.rpm

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/news/security/index.html

   This security fix closes Caldera's internal Problem Report 5033

8. Disclaimer
   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

______________________________________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBN8a+Kun+9R4958LpAQGYFQP9ETggpLZX7CHnN2tvugka9zYcu8MKi2kq
pNrrJqpIeizdNKkKW30T1P2LmyxPWv1YdlSqILNmhTOMCNtHq5Tm8TwKOQQwH2OT
OlZQu2YaE2K5XEaID0FCyPXa51ZcI5hTRcMFEY9XOP4Z61+JYuysurahLyTm77T0
svm831l9I0U=
=BUb8
-----END PGP SIGNATURE-----
 --
Note: To learn how to use this list server, email a "help" command to
majordomo@lists.calderasystems.com.