SuSE Security Announcement - mountFeb 10, 2000, 22:27 (1 Talkback[s])
(Other stories by Marc Heuse)
Date: Thu, 10 Feb 2000 23:05:55 +0100 (MET)
SuSE Security Announcement
Package: util < 2.10f
Affected SuSE versions: all
A security hole was discovered in the package mentioned above. Please update it as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package.
1. Problem Description
The mount/umount command doesn't do proper bounds checking on user input.
If an attacker executes mount/umount with a long relative pathname, it will overwrite dynamic allocated memory of the realpath function. It is possible that an attacker could gain root privileges by modifying the heap data, however we were not able to exploit it.
Update the package from our FTP server or remove the suid bits.
Please verify these md5 checksums of the updates before installing: (For SuSE 6.0, please use the 6.1 updates)
You can find updates on our ftp-Server:
Our webpage for patches:
Our webpage for security announcements:
If you want to report vulnerabilities, please contact email@example.com
SuSE has got two free security mailing list services to which any interested party may subscribe:
firstname.lastname@example.org - moderated and for general/linux/SuSE security discussions. All SuSE security announcements are sent to this list.
email@example.com - SuSE's announce-only mailing list. Only SuSE's security annoucements are sent to this list.
To subscribe to the list, send a message to:
To remove your address from the list, send a message to: