Debian Bug report logs -
#633155
Mixed IP/name-based access control can be bypassed (CVE-2011-2500)
Reported by: Ben Hutchings <ben@decadent.org.uk>
Date: Sat, 9 Jul 2011 03:15:01 UTC
Severity: grave
Tags: fixed-upstream, patch, upstream
Found in version nfs-utils/1:1.2.3-3
Fixed in version nfs-utils/1:1.2.4-1
Done: Luk Claes <luk@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>
:
Bug#633155
; Package nfs-kernel-server
.
(Sat, 09 Jul 2011 03:15:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Ben Hutchings <ben@decadent.org.uk>
:
New Bug report received and forwarded. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>
.
(Sat, 09 Jul 2011 03:15:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: nfs-kernel-server
Version: 1:1.2.3-3
Severity: grave
Tags: patch
>From <https://bugzilla.redhat.com/show_bug.cgi?id=716949>:
> A security flaw was found in the way nfs-utils performed authentication
> of an incoming request, when an IP based authentication mechanism was used
> and certain file systems were exported to either to a netgroup or a wildcard
> (e.g. *.my.domain), and some file systems (either the same or different to
> the first set) were exported to specific hosts, IP addresses, or a subnet.
> A remote attacker, able to create global DNS entries could use this flaw
> to access above listed, exported file systems.
>
> References:
> [1] https://bugzilla.novell.com/show_bug.cgi?id=701702
> [2] http://www.openwall.com/lists/oss-security/2011/06/27/7
> (CVE Request)
>
> Relevant upstream patch:
> [3] http://marc.info/?l=linux-nfs&m=130875695821953&w=2
This bug appears to have been introduced in upstream version 1.2.3-rc4
and therefore should not affect squeeze or lenny.
Ben.
-- System Information:
Debian Release: wheezy/sid
APT prefers proposed-updates
APT policy: (500, 'proposed-updates'), (500, 'oldstable-proposed-updates'), (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (x86_64)
Kernel: Linux 2.6.39-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Added tag(s) upstream, pending, and fixed-upstream.
Request was from Luk Claes <luk@debian.org>
to control@bugs.debian.org
.
(Sat, 09 Jul 2011 12:51:02 GMT) (full text, mbox, link).
Reply sent
to Luk Claes <luk@debian.org>
:
You have taken responsibility.
(Sat, 09 Jul 2011 15:09:18 GMT) (full text, mbox, link).
Notification sent
to Ben Hutchings <ben@decadent.org.uk>
:
Bug acknowledged by developer.
(Sat, 09 Jul 2011 15:09:18 GMT) (full text, mbox, link).
Message #12 received at 633155-close@bugs.debian.org (full text, mbox, reply):
Source: nfs-utils
Source-Version: 1:1.2.4-1
We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:
nfs-common_1.2.4-1_i386.deb
to main/n/nfs-utils/nfs-common_1.2.4-1_i386.deb
nfs-kernel-server_1.2.4-1_i386.deb
to main/n/nfs-utils/nfs-kernel-server_1.2.4-1_i386.deb
nfs-utils_1.2.4-1.debian.tar.bz2
to main/n/nfs-utils/nfs-utils_1.2.4-1.debian.tar.bz2
nfs-utils_1.2.4-1.dsc
to main/n/nfs-utils/nfs-utils_1.2.4-1.dsc
nfs-utils_1.2.4.orig.tar.bz2
to main/n/nfs-utils/nfs-utils_1.2.4.orig.tar.bz2
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 633155@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Luk Claes <luk@debian.org> (supplier of updated nfs-utils package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 09 Jul 2011 16:28:32 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source i386
Version: 1:1.2.4-1
Distribution: unstable
Urgency: low
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Luk Claes <luk@debian.org>
Description:
nfs-common - NFS support files common to client and server
nfs-kernel-server - support for NFS kernel server
Closes: 619877 626478 633155
Changes:
nfs-utils (1:1.2.4-1) unstable; urgency=low
.
* New upstream version
- Fix host_reliable_addrinfo (Closes: #633155)
- Allow multiple RPC listeners to share listener port number
(Closes: #619877)
- Add --enable-libmount-mount (Closes: #626478)
- 12-svcgssd-document-n-option.patch applied upstream
- Refresh 19-exports.man-Fix-comment-syntax.patch
- 21-anticipate-RLIMIT_FSIZE.patch applied upstream
- Add nfsidmap binary and manpage
- Use autoreconf to avoid build failure
Checksums-Sha1:
2a6db0e8b6faf8a05a54ee6b6841d028a0da196d 1468 nfs-utils_1.2.4-1.dsc
dcd6d2f55976df574005c40dded43078544e5664 664358 nfs-utils_1.2.4.orig.tar.bz2
18be6c2d62b893ef04aa3840da0edbd6ae1ccd9c 38658 nfs-utils_1.2.4-1.debian.tar.bz2
abf27f573ce62a4982e0905532f445e26f553a09 164210 nfs-kernel-server_1.2.4-1_i386.deb
0867a02b7b943f25c33d4ed75119a24731699067 258820 nfs-common_1.2.4-1_i386.deb
Checksums-Sha256:
28211b382436d7ee5fa5995f399cc2e1fd1c91198033d83e7062b2cf999d1c29 1468 nfs-utils_1.2.4-1.dsc
6ff1c702b1d61dc6e8c69cd977f79ab7d662dc870337ef89ca6d1b41bad026c0 664358 nfs-utils_1.2.4.orig.tar.bz2
75b91a7f2b49a68823e06dade81dc59a667ede5c99966169d810dd33c4539534 38658 nfs-utils_1.2.4-1.debian.tar.bz2
8effec7c7baa7f758911d9b2b87838720d2ef0622b387ae8e7a548d2736c7256 164210 nfs-kernel-server_1.2.4-1_i386.deb
2e15814b8d31b2548be7551575dbccb453ce0af68a40960a58484319afc3f43f 258820 nfs-common_1.2.4-1_i386.deb
Files:
9274b8f45c875cd1b9454005e7b63781 1468 net standard nfs-utils_1.2.4-1.dsc
938dc0574f3eb9891a8ed4746f806277 664358 net standard nfs-utils_1.2.4.orig.tar.bz2
c9d3ab8c74c632890620abd88a666269 38658 net standard nfs-utils_1.2.4-1.debian.tar.bz2
54d3db1a214b843053edd6f2aad15e2d 164210 net optional nfs-kernel-server_1.2.4-1_i386.deb
5f331bc98fb7b2f690c16dd3483854d5 258820 net standard nfs-common_1.2.4-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk4YaEUACgkQ5UTeB5t8Mo0DtgCdGKfPR94faoyLbTq399qTeJFd
xhEAn12B3KO6OPZZmxc17mlDsMkgkjY6
=d6jB
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Wed, 17 Aug 2011 07:37:05 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 15:39:34 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.