lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 11 Jan 2008 16:00:29 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:009 ] - Updated autofs packages fix insecure hosts
 configuration


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:009
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : autofs
 Date    : January 11, 2008
 Affected: 2007.0, 2007.1, 2008.0
 _______________________________________________________________________
 
 Problem Description:
 
 The default behaviour of autofs 5 for the hosts map did not specify the
 nosuid and nodev mount options.  This could allow a local user with
 control of a remote NFS server to create a setuid root executable on
 the exported filesystem of the remote NFS server.  If this filesystem
 was mounted with the default hosts map, it would allow the user to
 obtain root privileges (CVE-2007-5964).  Likewise, the same scenario
 would be available for local users able to create device files on
 the exported filesystem which could allow the user to gain access to
 important system devices (CVE-2007-6285).
 
 Because the default behaviour of autofs was to mount -hosts map
 entries with the dev and suid options enabled by default, autofs has
 been altered to always use nodev and nosuid by default.  In order
 to have the old behaviour, the configuration must now explicitly set
 the dev and/or suid options.
 
 This change only affects the -hosts map which corresponds to the /net
 entry in the default configuration.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5964
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6285
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 3390bf55832dffd626f5f8ce0e8ad8ea  2007.0/i586/autofs-5.0.1-0.rc3.1.2mdv2007.0.i586.rpm 
 11c33cfb8d77ff2639c70e32ac04ed73  2007.0/SRPMS/autofs-5.0.1-0.rc3.1.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 3667ed52652d4d622e3f6d5308ef8699  2007.0/x86_64/autofs-5.0.1-0.rc3.1.2mdv2007.0.x86_64.rpm 
 11c33cfb8d77ff2639c70e32ac04ed73  2007.0/SRPMS/autofs-5.0.1-0.rc3.1.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 5e14c8e8dd49af8edb3a341c0cbcad9d  2007.1/i586/autofs-5.0.2-8.3mdv2007.1.i586.rpm 
 a2eb4b39b2b08884996ec57f903c05b4  2007.1/SRPMS/autofs-5.0.2-8.3mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 3970bd93953401bbbe1c38218f0decb9  2007.1/x86_64/autofs-5.0.2-8.3mdv2007.1.x86_64.rpm 
 a2eb4b39b2b08884996ec57f903c05b4  2007.1/SRPMS/autofs-5.0.2-8.3mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 ab967ba2caa70946b72296ee7aae057d  2008.0/i586/autofs-5.0.2-8.3mdv2008.0.i586.rpm 
 30079164e7eaacaeb3f61dc3afbb9749  2008.0/SRPMS/autofs-5.0.2-8.3mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 15001d59d62d3c0909fce6ce2dbcb9bd  2008.0/x86_64/autofs-5.0.2-8.3mdv2008.0.x86_64.rpm 
 30079164e7eaacaeb3f61dc3afbb9749  2008.0/SRPMS/autofs-5.0.2-8.3mdv2008.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHh8pWmqjQ0CJFipgRAnIKAJ9b+Gn2KsVTOTu2qW1vBN5rH2cqQwCg7qHW
clyU0JzCNNl6+5y2ntsp4hI=
=QbIM
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ