Lucene search

K
centosCentOS ProjectCESA-2013:0120
HistoryJan 09, 2013 - 7:21 p.m.

quota security update

2013-01-0919:21:22
CentOS Project
lists.centos.org
49

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

EPSS

0.005

Percentile

76.8%

CentOS Errata and Security Advisory CESA-2013:0120

The quota package provides system administration tools for monitoring
and limiting user and group disk usage on file systems.

It was discovered that the rpc.rquotad service did not use tcp_wrappers
correctly. Certain hosts access rules defined in “/etc/hosts.allow” and
“/etc/hosts.deny” may not have been honored, possibly allowing remote
attackers to bypass intended access restrictions. (CVE-2012-3417)

This issue was discovered by the Red Hat Security Response Team.

This update also fixes the following bugs:

  • Prior to this update, values were not properly transported via the remote
    procedure call (RPC) and interpreted by the client when querying the quota
    usage or limits for network-mounted file systems if the quota values were
    2^32 kilobytes or greater. As a consequence, the client reported mangled
    values. This update modifies the underlying code so that such values are
    correctly interpreted by the client. (BZ#667360)

  • Prior to this update, warnquota sent messages about exceeded quota limits
    from a valid domain name if the warnquota tool was enabled to send warning
    e-mails and the superuser did not change the default warnquota
    configuration. As a consequence, the recipient could reply to invalid
    addresses. This update modifies the default warnquota configuration to use
    the reserved example.com. domain. Now, warnings about exceeded quota limits
    are sent from the reserved domain that inform the superuser to change to
    the correct value. (BZ#680429)

  • Previously, quota utilities could not recognize the file system as having
    quotas enabled and refused to operate on it due to incorrect updating of
    /etc/mtab. This update prefers /proc/mounts to get a list of file systems
    with enabled quotas. Now, quota utilities recognize file systems with
    enabled quotas as expected. (BZ#689822)

  • Prior to this update, the setquota(8) tool on XFS file systems failed
    to set disk limits to values greater than 2^31 kilobytes. This update
    modifies the integer conversion in the setquota(8) tool to use a 64-bit
    variable big enough to store such values. (BZ#831520)

All users of quota are advised to upgrade to this updated package, which
contains backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-January/081260.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-January/026693.html

Affected packages:
quota

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:0120

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

EPSS

0.005

Percentile

76.8%