1. Problem Description /etc/shadow may get world readable 2. Vulnerable Versions Systems: OpenLinux 2.2. Packages: previous to coas-1.0-8 3. Solutions The proper solution is to upgrade to the coas-1.0-8 package. If /etc/shadow is world-readable, this is fixed with chmod 600 /etc/shadow 4. Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS 5. Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -q coas && rpm -U coas-1.0-8.i386.rpm 6. Verification The MD5 checksums (from the "md5sum" command) for these packages are: 1efa8cde40f5684293e03c2499f2f59f README b3fa473f6ba574052991bf2254bd378d RPMS/coas-1.0-8.i386.rpm 3bfa00aa3230f97537e8baa2c0454d08 SRPMS/coas-1.0-8.src.rpm 7. References This and other Caldera security resources are located at: http://www.calderasystems.com/news/security/index.html Additional documentation on this problem can be found in: This security fix closes Caldera's internal Problem Report 4544. 8. Disclaimer Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux.
Caldera updates COAS package
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis