Bug#310982: marked as done (smbmount does not honor uid and gid options with 2.4 kernel)
Your message dated Sat, 17 Feb 2007 12:10:11 +0000
with message-id <E1HIOOJ-0005Pf-CF@ries.debian.org>
and subject line Bug#310982: fixed in kernel-patch-powerpc-2.4.27 2.4.27-10sarge5
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: smbmount does not honor uid and gid options with 2.4 kernel
- From: Bill Allombert <ballombe@debian.org>
- Date: Fri, 27 May 2005 15:14:01 +0200
- Message-id: <20050527131401.GA28161@yellowpig.yi.org>
Package: smbfs
Version: 3.0.14a-1
Severity: serious
Justification: break security on upgrade
Hello Debian samba maintainers,
smbmount does not honour the uid and gid option with the sarge 2.4
kernel when the server has 'unix extensions' enabled.
The security problem is that 'unix extension' are not enabled with woody samba
server but are enabled by the upgrade to sarge (since this is the
default). At this point the bug in smbmount on the samba client allow
users on the client to access the samba share with the same permission
they would have on the server disregarding the uid/gid option passed to
smbmount.
Cheers,
--
Bill. <ballombe@debian.org>
Imagine a large red swirl here.
-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.4.27-2-386
Locale: LANG=fr_FR, LC_CTYPE=fr_FR (charmap=ISO-8859-1)
--- End Message ---
--- Begin Message ---
- To: 310982-close@bugs.debian.org
- Subject: Bug#310982: fixed in kernel-patch-powerpc-2.4.27 2.4.27-10sarge5
- From: dann frazier <dannf@debian.org>
- Date: Sat, 17 Feb 2007 12:10:11 +0000
- Message-id: <E1HIOOJ-0005Pf-CF@ries.debian.org>
Source: kernel-patch-powerpc-2.4.27
Source-Version: 2.4.27-10sarge5
We believe that the bug you reported is fixed in the latest version of
kernel-patch-powerpc-2.4.27, which is due to be installed in the Debian FTP archive:
kernel-build-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
kernel-build-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
kernel-build-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
kernel-build-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
kernel-headers-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
kernel-headers-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
kernel-headers-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
kernel-image-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
kernel-image-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
kernel-image-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
kernel-image-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
kernel-patch-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
kernel-patch-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
kernel-patch-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.dsc
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.dsc
kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.tar.gz
to pool/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 310982@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated kernel-patch-powerpc-2.4.27 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 5 Dec 2006 02:23:21 -0700
Source: kernel-patch-powerpc-2.4.27
Binary: kernel-patch-2.4.27-powerpc kernel-build-2.4.27-nubus kernel-image-2.4.27-nubus kernel-headers-2.4.27-powerpc kernel-image-2.4.27-powerpc kernel-patch-2.4.27-apus kernel-build-2.4.27-apus kernel-headers-2.4.27-nubus kernel-image-2.4.27-powerpc-small kernel-build-2.4.27-powerpc-smp kernel-image-2.4.27-powerpc-smp kernel-image-2.4.27-apus kernel-patch-2.4.27-nubus kernel-headers-2.4.27-apus kernel-build-2.4.27-powerpc kernel-build-2.4.27-powerpc-small
Architecture: powerpc source
Version: 2.4.27-10sarge5
Distribution: stable-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description:
kernel-build-2.4.27-apus - build infrastructure for kernel version 2.4.27-apus
kernel-build-2.4.27-nubus - build infrastructure for kernel version 2.4.27-nubus
kernel-build-2.4.27-powerpc - build infrastructure for kernel version 2.4.27-powerpc
kernel-build-2.4.27-powerpc-small - build infrastructure for kernel version 2.4.27-powerpc-small
kernel-build-2.4.27-powerpc-smp - build infrastructure for kernel version 2.4.27-powerpc-smp
kernel-headers-2.4.27-apus - Linux/APUS kernel headers.
kernel-headers-2.4.27-nubus - Linux/nubus kernel headers.
kernel-headers-2.4.27-powerpc - Linux/nubus kernel headers.
kernel-image-2.4.27-apus - Linux/APUS kernel binary image.
kernel-image-2.4.27-nubus - Linux/nubus kernel binary image.
kernel-image-2.4.27-powerpc - Linux/PowerPC kernel binary image for the powerpc flavour
kernel-image-2.4.27-powerpc-small - Linux/PowerPC kernel binary image for the powerpc-small flavour
kernel-image-2.4.27-powerpc-smp - Linux/PowerPC kernel binary image for the powerpc-smp flavour
kernel-patch-2.4.27-apus - Diffs to the kernel source for APUS
kernel-patch-2.4.27-nubus - Diffs to the kernel source for nubus
kernel-patch-2.4.27-powerpc - Diffs to the kernel source for nubus
Closes: 310982
Changes:
kernel-patch-powerpc-2.4.27 (2.4.27-10sarge5) stable-security; urgency=high
.
* Build against kernel-tree-2.4.27-10sarge5:
* 233_ia64-sparc-cross-region-mappings.diff
[SECURITY] Prevent cross-region mappings on ia64 and sparc which
could be used in a local DoS attack (system crash)
See CVE-2006-4538
* 234_atm-clip-freed-skb-deref.diff
[SECURITY] Avoid dereferencing an already freed skb, preventing a
potential remote DoS (system crash) vector
See CVE-2006-4997
* 235_ppc-alignment-exception-table-check.diff
[SECURITY][ppc] Avoid potential DoS which can be triggered by some
futex ops
See CVE-2006-5649
* 236_s390-uaccess-memleak.diff
[SECURITY][s390] Fix memory leak in copy_from_user by clearing the
remaining bytes of the kernel buffer after a fault on the userspace
address in copy_from_user()
See CVE-2006-5174
* 237_smbfs-honor-mount-opts.diff
Honor uid, gid and mode mount options for smbfs even when unix extensions
are enabled (closes: #310982)
See CVE-2006-5871
* 238_ppc-hid0-dos.diff
[SECURITY] [ppc] Fix local DoS by clearing HID0 attention enable on
PPC970 at boot time
See CVE-2006-4093
Files:
b0f73596dd19e6c41d0fa64f5c3d7e22 65868 devel optional kernel-patch-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
33f89f6ff68d4697590dc56da8f5c85b 4684386 devel optional kernel-headers-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
794593451ab3047561014f148290650c 2502696 base optional kernel-image-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
dbd3e6559ab4d24640e78fa5096b8d4d 143604 devel optional kernel-build-2.4.27-apus_2.4.27-10sarge5_powerpc.deb
c537fc249b24e8d4c57165e6f4d6ad5a 11006 devel optional kernel-patch-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
0d7e24209c0c22ad726ddc7d2046f5e4 4694600 devel optional kernel-headers-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
026d70d2989c1f5345280777f8430d33 1819296 base optional kernel-image-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
0ac835db06b6feb1b662ffe7cee6b1ca 143402 devel optional kernel-build-2.4.27-nubus_2.4.27-10sarge5_powerpc.deb
11f29b35752d4f50ea28b345001efb2b 10928 devel optional kernel-patch-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
dc4bb7170432243f61d1ccf10820518f 4802248 devel optional kernel-headers-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
c02196059ed6f7103d6faa2a45320828 13486360 base optional kernel-image-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
df24d8751cee33c2ec3490fe3c58aab5 157358 devel optional kernel-build-2.4.27-powerpc_2.4.27-10sarge5_powerpc.deb
3af28a8ab21e298043311c0e15b19184 13792416 base optional kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
19f3fa73f641f93a734b5a0c1d92800a 157408 devel optional kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge5_powerpc.deb
e9108a2f987765ff915435b199bda15e 12759400 base optional kernel-image-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
f95e05ad17a85a314f36ad794231bd19 157652 devel optional kernel-build-2.4.27-powerpc-small_2.4.27-10sarge5_powerpc.deb
6b22f4ecad2ce3d2404d606c77da9dc7 1131 devel optional kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.dsc
d1891087138beef4e77784e3b29230b5 1464751 devel optional kernel-patch-powerpc-2.4.27_2.4.27-10sarge5.tar.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFeFQ1huANDBmkLRkRAt58AJ9jDY11cZLIa/Za1JOmAjhUBs4QSgCgiYI8
6lh1vpyj3JqGxTFCfq/fnYM=
=zbRt
-----END PGP SIGNATURE-----
--- End Message ---
Reply to: