Subject: | |
From: | |
Reply To: | |
Date: | Thu, 22 Dec 2011 11:29:55 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
This email announces a reissue of the nfs-utils package due to a bug in
the build environment. Users experiencing issues with umount.nfs can
correct the error by downgrading nfs-utils to the previous version (yum
downgrade nfs-utils), cleaning their repodata (yum clean all), and
updating nfs-utils again (yum update nfs-utils). All Scientific Linux
mirrors will acquire this update at their next sync.
-------
Synopsis: Low: nfs-utils security, bug fix, and enhancement update
Issue Date: 2011-12-06
CVE Numbers: CVE-2011-1749
CVE-2011-2500
The nfs-utils packages provide a daemon for the kernel Network File System
(NFS) server, and related tools such as the mount.nfs, umount.nfs, and
showmount programs.
A flaw was found in the way nfs-utils performed IP based authentication of
mount requests. In configurations where a directory was exported to a group
of systems using a DNS wildcard or NIS (Network Information Service)
netgroup, an attacker could possibly gain access to other directories
exported to a specific host or subnet, bypassing intended access
restrictions. (CVE-2011-2500)
It was found that the mount.nfs tool did not handle certain errors
correctly when updating the mtab (mounted file systems table) file. A local
attacker could use this flaw to corrupt the mtab file. (CVE-2011-1749)
This update also fixes several bugs and adds an enhancement.
Users of nfs-utils are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues and add this
enhancement. After installing this update, the nfs service will be
restarted automatically.
SL6:
i386
nfs-utils-1.2.3-15.el6.i686.rpm
nfs-utils-debuginfo-1.2.3-15.el6.i686.rpm
x86_64
nfs-utils-1.2.3-15.el6.x86_64.rpm
nfs-utils-debuginfo-1.2.3-15.el6.x86_64.rpm
- Scientific Linux Development Team
|
|
|