[ GLSA 200710-18 ] util-linux: Local privilege escalation



- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200710-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: util-linux: Local privilege escalation
Date: October 18, 2007
Bugs: #195390
ID: 200710-18

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

The mount and umount programs might allow local attackers to gain root
privileges.

Background
==========

util-linux is a suite of Linux programs including mount and umount,
programs used to mount and unmount filesystems.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 sys-apps/util-linux < 2.12r-r8 >= 2.12r-r8

Description
===========

Ludwig Nussel discovered that the check_special_mountprog() and
check_special_umountprog() functions call setuid() and setgid() in the
wrong order and do not check the return values, which can lead to
privileges being dropped improperly.

Impact
======

A local attacker may be able to exploit this vulnerability by using
mount helpers such as the mount.nfs program to gain root privileges and
run arbitrary commands.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All util-linux users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.12r-r8"

References
==========

[ 1 ] CVE-2007-5191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200710-18.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@xxxxxxxxxx or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Attachment: pgpFYGHgDb5ow.pgp
Description: PGP signature



Relevant Pages

  • [Full-disclosure] [ GLSA 200710-18 ] util-linux: Local privilege escalation
    ... Title: util-linux: Local privilege escalation ... The mount and umount programs might allow local attackers to gain root ... privileges being dropped improperly. ...
    (Full-Disclosure)
  • Re: [RCF] [PATCH] unprivileged mount/umount
    ... > themselves determine privileges. ... > determiner of basic privileges is the process capabilities. ... If process A accesses a filesystem controlled by process B, ... user can mount. ...
    (Linux-Kernel)
  • util-linux and data encryption
    ... I'm posting here because util-linux is at kernel.org. ... Today, trying to mount the file, 'mount' claimed ... How do I encrypt important data for the future? ... send the line "unsubscribe linux-kernel" in ...
    (Linux-Kernel)
  • mount-2.12r-ggk.tar.gz
    ... The present situation of util-linux and mount is not quite clear to me. ... On kernel.org under utils/util-linux nothing has happened for over a year, ... a patch to add support for shared subtrees to the mount from ...
    (Linux-Kernel)
  • Re: FC5 upgrade - No mount privileges
    ... Did you click on the dvd icon you can find in nautilus? ... install more software from the DVD and was unable to mount the CD/DVD. ... but both continue to give the 'no privileges' error message. ...
    (Fedora)