Bug 892330 (CVE-2013-0157)
Summary: | CVE-2013-0157 util-linux: mount folder existence information disclosure | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bblaskov, jonathan, kzak, mluscon |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-08-22 06:17:58 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 892391, 892456, 892471 | ||
Bug Blocks: | 855229, 892331 |
Description
Kurt Seifried
2013-01-06 18:00:55 UTC
Created util-linux tracking bugs for this issue Affects: fedora-16 [bug 892391] The following upstream commits address this issue: (For both util-linux as well as util-linux-ng) 1. Adds canonicalize_path_restricted() to canonicalize without suid permisssions http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=33c5fd0c5a774458470c86f9d318d8c48a9c9ccb 2. sanitize path for non-root users (mount): http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=5ebbc3865d1e53ef42e5f121c41faab23dd59075 3. sanitize path for non-root users (umount): http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=cc8cc8f32c863f3ae6a8a88e97b47bcd6a21825f 4. drop the --guess-fstype option: http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=0377ef91270d06592a0d4dd009c29e7b1ff9c9b8 This issue affects the version of util-linux as shipped with Fedora 16 and Fedora-17 Created util-linux tracking bugs for this issue Affects: fedora-17 [bug 892456] This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0517 https://rhn.redhat.com/errata/RHSA-2013-0517.html Statement: Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. |