[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#310982: marked as done (smbmount does not honor uid and gid options with 2.4 kernel)



Your message dated Sat, 17 Feb 2007 12:10:08 +0000
with message-id <E1HIOOG-0005Le-F9@ries.debian.org>
and subject line Bug#310982: fixed in kernel-image-2.4.27-ia64 2.4.27-10sarge5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: smbfs
Version: 3.0.14a-1
Severity: serious
Justification: break security on upgrade

Hello Debian samba maintainers,

smbmount does not honour the uid and gid option with the sarge 2.4
kernel when the server has 'unix extensions' enabled.

The security problem is that 'unix extension' are not enabled with woody samba
server but are enabled by the upgrade to sarge (since this is the
default). At this point the bug in smbmount on the samba client allow
users on the client to access the samba share with the same permission
they would have on the server disregarding the uid/gid option passed to
smbmount.

Cheers,
-- 
Bill. <ballombe@debian.org>

Imagine a large red swirl here. 

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27-2-386
Locale: LANG=fr_FR, LC_CTYPE=fr_FR (charmap=ISO-8859-1)



--- End Message ---
--- Begin Message ---
Source: kernel-image-2.4.27-ia64
Source-Version: 2.4.27-10sarge5

We believe that the bug you reported is fixed in the latest version of
kernel-image-2.4.27-ia64, which is due to be installed in the Debian FTP archive:

kernel-build-2.4.27-3_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge5_ia64.deb
kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
kernel-headers-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
kernel-headers-2.4.27-3_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge5_ia64.deb
kernel-image-2.4-itanium-smp_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge5_ia64.deb
kernel-image-2.4-itanium_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge5_ia64.deb
kernel-image-2.4-mckinley-smp_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge5_ia64.deb
kernel-image-2.4-mckinley_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge5_ia64.deb
kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
kernel-image-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
kernel-image-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
kernel-image-2.4.27-ia64_2.4.27-10sarge5.dsc
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge5.dsc
kernel-image-2.4.27-ia64_2.4.27-10sarge5.tar.gz
  to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge5.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 310982@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated kernel-image-2.4.27-ia64 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  5 Dec 2006 02:22:55 -0700
Source: kernel-image-2.4.27-ia64
Binary: kernel-image-2.4.27-3-itanium kernel-image-2.4-mckinley-smp kernel-image-2.4.27-3-itanium-smp kernel-image-2.4-itanium kernel-headers-2.4.27-3-mckinley kernel-image-2.4.27-3-mckinley-smp kernel-build-2.4.27-3 kernel-headers-2.4.27-3-mckinley-smp kernel-image-2.4-itanium-smp kernel-image-2.4-mckinley kernel-headers-2.4.27-3 kernel-image-2.4.27-3-mckinley kernel-headers-2.4.27-3-itanium kernel-headers-2.4.27-3-itanium-smp
Architecture: ia64 source 
Version: 2.4.27-10sarge5
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 kernel-build-2.4.27-3 - Headers for building modules for Linux 2.4.27
 kernel-headers-2.4.27-3 - Header files related to Linux kernel version 2.4.27
 kernel-headers-2.4.27-3-itanium - Linux kernel headers 2.4.27 on ia64
 kernel-headers-2.4.27-3-itanium-smp - Linux kernel headers 2.4.27 on Itanium SMP
 kernel-headers-2.4.27-3-mckinley - Linux kernel headers 2.4.27 on ia64
 kernel-headers-2.4.27-3-mckinley-smp - Linux kernel headers 2.4.27 on Itanium II SMP
 kernel-image-2.4-itanium - Linux kernel image for version 2.4 on Itanium
 kernel-image-2.4-itanium-smp - Linux kernel image for version 2.4 on Itanium SMP
 kernel-image-2.4-mckinley - Linux kernel image for version 2.4 on Itanium II
 kernel-image-2.4-mckinley-smp - Linux kernel image for version 2.4 on Itanium II SMP
 kernel-image-2.4.27-3-itanium - Linux kernel image for version 2.4.27 on Itanium
 kernel-image-2.4.27-3-itanium-smp - Linux kernel image for version 2.4.27 on Itanium SMP
 kernel-image-2.4.27-3-mckinley - Linux kernel image for version 2.4.27 on Itanium II
 kernel-image-2.4.27-3-mckinley-smp - Linux kernel image for version 2.4.27 on Itanium II SMP
Closes: 310982
Changes: 
 kernel-image-2.4.27-ia64 (2.4.27-10sarge5) stable-security; urgency=high
 .
   * Build against kernel-tree-2.4.27-10sarge5:
     * 233_ia64-sparc-cross-region-mappings.diff
       [SECURITY] Prevent cross-region mappings on ia64 and sparc which
       could be used in a local DoS attack (system crash)
       See CVE-2006-4538
     * 234_atm-clip-freed-skb-deref.diff
       [SECURITY] Avoid dereferencing an already freed skb, preventing a
       potential remote DoS (system crash) vector
       See CVE-2006-4997
     * 235_ppc-alignment-exception-table-check.diff
       [SECURITY][ppc] Avoid potential DoS which can be triggered by some
       futex ops
       See CVE-2006-5649
     * 236_s390-uaccess-memleak.diff
       [SECURITY][s390] Fix memory leak in copy_from_user by clearing the
       remaining bytes of the kernel buffer after a fault on the userspace
       address in copy_from_user()
       See CVE-2006-5174
     * 237_smbfs-honor-mount-opts.diff
       Honor uid, gid and mode mount options for smbfs even when unix extensions
       are enabled (closes: #310982)
       See CVE-2006-5871
     * 238_ppc-hid0-dos.diff
       [SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
       PPC970 at boot time
       See CVE-2006-4093
Files: 
 00cf535d95cb5a827d53219de9d2b0a1 7290 base optional kernel-image-2.4-mckinley_2.4.27-10sarge5_ia64.deb
 093e0825e05675fd728a7db694531f1a 7302 base optional kernel-image-2.4-mckinley-smp_2.4.27-10sarge5_ia64.deb
 11c5c2ea12f3cab5865b225f765d71c0 16630570 base optional kernel-image-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
 14ed081560b4008f6e391b325b39544f 243234 devel optional kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
 3dbd1ce3bbfed1c7c4aeb3de2396cf77 242570 devel optional kernel-headers-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
 4acf18300727b24afe4f223623e5c44d 242366 devel optional kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge5_ia64.deb
 4cc86fa5dd7f157ab7fa3747f9ac8573 7262 base optional kernel-image-2.4-itanium_2.4.27-10sarge5_ia64.deb
 75b4b47d8ebd8cd91327cfeaf76dd0d9 17037020 base optional kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge5_ia64.deb
 7b6dec36049b6f277b72c2c6a24dd538 7274 base optional kernel-image-2.4-itanium-smp_2.4.27-10sarge5_ia64.deb
 b40d48a972ee0cb277b63a649e0d01f2 7486 devel optional kernel-build-2.4.27-3_2.4.27-10sarge5_ia64.deb
 b5ef21aee13412359cdb7fb5e039de74 4689752 devel optional kernel-headers-2.4.27-3_2.4.27-10sarge5_ia64.deb
 aa5d275cbb5e611a430558c75d2ddce6 1143 devel optional kernel-image-2.4.27-ia64_2.4.27-10sarge5.dsc
 d997c6d47e3592b0ab8c82917548102b 16677620 base optional kernel-image-2.4.27-3-itanium_2.4.27-10sarge5_ia64.deb
 e8517a3876c679cf01ccdbdaf666c4fd 55593 devel optional kernel-image-2.4.27-ia64_2.4.27-10sarge5.tar.gz
 f48e9a34ea714966024f24277293d1d6 243558 devel optional kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb
 f8b022aa39e91bccc24ab3adaab2c7aa 16988538 base optional kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge5_ia64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFeEYNhuANDBmkLRkRAo4vAJ9f8wX6QesZIlOs7jXkH4tNQmI1pgCfU59R
JSlXOR/rOGJtsxKqAOKIU6E=
=2FW2
-----END PGP SIGNATURE-----


--- End Message ---

Reply to: