SuSE Security Announcement: make-3.77-44 and earlierFeb 10, 2000, 19:29 (0 Talkback[s])
(Other stories by Thomas Biege)
Date: Wed, 9 Feb 2000 17:15:49 +0100
Package: make-3.77-44 and earlier
Affected SuSE versions: 6.1, 6.3
A security hole was discovered in the package mentioned above. Please update it as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package.
1. Problem Description
If GNU make is fed with Makefiles via stdin it creates temporary files in /tmp without checking for links.
A malicous user could execute commands with the privileges of the user executing make. This security hole could lead to local root compromise if root passes Makefiles to make through stdin.
Update the package from our FTP server.
Please verify these md5 checksums of the updates before installing: (For SuSE 6.0, please use the 6.1 updates)
You can find updates on our ftp-Server:
Our webpage for patches:
Our webpage for security announcements:
If you want to report vulnerabilities, please contact email@example.com
SuSE has got two free security mailing list services to which any interested party may subscribe:
firstname.lastname@example.org - moderated and for general/linux/SuSE security discussions. All SuSE security announcements are sent to this list.
email@example.com - SuSE's announce-only mailing list. Only SuSE's security annoucements are sent to this list.
To subscribe to the list, send a message to:
To remove your address from the list, send a message to: