<<< Date Index >>>     <<< Thread Index >>>

[ MDVSA-2008:009-1 ] - Updated autofs packages fix insecure hosts configuration



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                       MDVSA-2008:009-1
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : autofs
 Date    : January 12, 2008
 Affected: 2007.1, 2008.0
 _______________________________________________________________________
 
 Problem Description:
 
 The default behaviour of autofs 5 for the hosts map did not specify the
 nosuid and nodev mount options.  This could allow a local user with
 control of a remote NFS server to create a setuid root executable on
 the exported filesystem of the remote NFS server.  If this filesystem
 was mounted with the default hosts map, it would allow the user to
 obtain root privileges (CVE-2007-5964).  Likewise, the same scenario
 would be available for local users able to create device files on
 the exported filesystem which could allow the user to gain access to
 important system devices (CVE-2007-6285).
 
 Because the default behaviour of autofs was to mount -hosts map
 entries with the dev and suid options enabled by default, autofs has
 been altered to always use nodev and nosuid by default.  In order
 to have the old behaviour, the configuration must now explicitly set
 the dev and/or suid options.
 
 This change only affects the -hosts map which corresponds to the /net
 entry in the default configuration.

 Update:

 The previous update shipped with an incorrect LDAP lookup module
 that would prevent the automount daemon from starting.  This update
 corrects that problem.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5964
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6285
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 c326dd1684ec0da4619c492d59052116  
2007.1/i586/autofs-5.0.2-8.4mdv2007.1.i586.rpm 
 e83f2a80aab1b6a2dcd3bd1cd7f2d3b6  
2007.1/SRPMS/autofs-5.0.2-8.4mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 17ec256f10b709523ac8551b87a86004  
2007.1/x86_64/autofs-5.0.2-8.4mdv2007.1.x86_64.rpm 
 e83f2a80aab1b6a2dcd3bd1cd7f2d3b6  
2007.1/SRPMS/autofs-5.0.2-8.4mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 ad1b96d23f0fcaaed1e6d3cff10943fa  
2008.0/i586/autofs-5.0.2-8.4mdv2008.0.i586.rpm 
 7e4772f6ef649bfb9c426af73267f3ad  
2008.0/SRPMS/autofs-5.0.2-8.4mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 86a63d2ff73733036da50f643e994359  
2008.0/x86_64/autofs-5.0.2-8.4mdv2008.0.x86_64.rpm 
 7e4772f6ef649bfb9c426af73267f3ad  
2008.0/SRPMS/autofs-5.0.2-8.4mdv2008.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHiRE4mqjQ0CJFipgRAhlQAKCuj8LaVWStW/5vtt78QS0Yr+wp9gCfdGav
708U++mrKxYSz5SoiBkn+aY=
=tFLb
-----END PGP SIGNATURE-----