Lucene search

K
gentooGentoo FoundationGLSA-200509-15
HistorySep 20, 2005 - 12:00 a.m.

util-linux: umount command validation error

2005-09-2000:00:00
Gentoo Foundation
security.gentoo.org
10

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

39.4%

Background

util-linux is a suite of useful Linux programs including umount, a program used to unmount filesystems.

Description

When a regular user mounts a filesystem, they are subject to restrictions in the /etc/fstab configuration file. David Watson discovered that when unmounting a filesystem with the ‘-r’ option, the read-only bit is set, while other bits, such as nosuid or nodev, are not set, even if they were previously.

Impact

An unprivileged user facing nosuid or nodev restrictions can umount -r a filesystem clearing those bits, allowing applications to be executed suid, or have device nodes interpreted. In the case where the user can freely modify the contents of the filesystem, privilege escalation may occur as a custom program may execute with suid permissions.

Workaround

Two workarounds exist, first, the suid bit can be removed from the umount utility, or users can be restricted from mounting and unmounting filesystems in /etc/fstab.

Resolution

All util-linux users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.12q-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/util-linux< 2.12q-r3UNKNOWN

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

39.4%