[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JDoUh-00053X-3u@artemis.annvix.ca>
Date: Sat, 12 Jan 2008 15:06:23 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:009-1 ] - Updated autofs packages fix insecure hosts
configuration
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:009-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : autofs
Date : January 12, 2008
Affected: 2007.1, 2008.0
_______________________________________________________________________
Problem Description:
The default behaviour of autofs 5 for the hosts map did not specify the
nosuid and nodev mount options. This could allow a local user with
control of a remote NFS server to create a setuid root executable on
the exported filesystem of the remote NFS server. If this filesystem
was mounted with the default hosts map, it would allow the user to
obtain root privileges (CVE-2007-5964). Likewise, the same scenario
would be available for local users able to create device files on
the exported filesystem which could allow the user to gain access to
important system devices (CVE-2007-6285).
Because the default behaviour of autofs was to mount -hosts map
entries with the dev and suid options enabled by default, autofs has
been altered to always use nodev and nosuid by default. In order
to have the old behaviour, the configuration must now explicitly set
the dev and/or suid options.
This change only affects the -hosts map which corresponds to the /net
entry in the default configuration.
Update:
The previous update shipped with an incorrect LDAP lookup module
that would prevent the automount daemon from starting. This update
corrects that problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6285
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
c326dd1684ec0da4619c492d59052116 2007.1/i586/autofs-5.0.2-8.4mdv2007.1.i586.rpm
e83f2a80aab1b6a2dcd3bd1cd7f2d3b6 2007.1/SRPMS/autofs-5.0.2-8.4mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
17ec256f10b709523ac8551b87a86004 2007.1/x86_64/autofs-5.0.2-8.4mdv2007.1.x86_64.rpm
e83f2a80aab1b6a2dcd3bd1cd7f2d3b6 2007.1/SRPMS/autofs-5.0.2-8.4mdv2007.1.src.rpm
Mandriva Linux 2008.0:
ad1b96d23f0fcaaed1e6d3cff10943fa 2008.0/i586/autofs-5.0.2-8.4mdv2008.0.i586.rpm
7e4772f6ef649bfb9c426af73267f3ad 2008.0/SRPMS/autofs-5.0.2-8.4mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
86a63d2ff73733036da50f643e994359 2008.0/x86_64/autofs-5.0.2-8.4mdv2008.0.x86_64.rpm
7e4772f6ef649bfb9c426af73267f3ad 2008.0/SRPMS/autofs-5.0.2-8.4mdv2008.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
iD8DBQFHiRE4mqjQ0CJFipgRAhlQAKCuj8LaVWStW/5vtt78QS0Yr+wp9gCfdGav
708U++mrKxYSz5SoiBkn+aY=
=tFLb
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists