Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 283-1 (xfsdump)

Information

Severity

Severity

High

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing an update to xfsdump announced via advisory DSA 283-1.

Insight

Insight

Ethan Benson discovered a problem in xfsdump, that contains administrative utilities for the XFS filesystem. When filesystem quotas are enabled xfsdump runs xfsdq to save the quota information into a file at the root of the filesystem being dumped. The manner in which this file is created is unsafe. While fixing this, a new option ``-f path'' has been added to xfsdq(8) to specify an output file instead of using the standard output stream. This file is created by xfsdq and xfsdq will fail to run if it exists already. The file is also created with a more appropriate mode than whatever the umask happened to be when xfsdump(8) was run. For the stable distribution (woody) this problem has been fixed in version 2.0.1-2. The old stable distribution (potato) is not affected since it doesn't contain xfsdump packages. For the unstable distribution (sid) this problem has been fixed in version 2.2.8-1. We recommend that you upgrade your lpr package immediately.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20283-1

Common Vulnerabilities and Exposures (CVE)