Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 491572 - (CVE-2009-1072) CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root
CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root
Status: ASSIGNED
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20090319,source=lkml,reported=...
: Reopened, Security
Depends On: 499072 499073 499074 499075 499076
Blocks:
  Show dependency treegraph
 
Reported: 2009-03-23 00:15 EDT by Eugene Teo (Security Response)
Modified: 2018-08-28 17:48 EDT (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-03-27 03:02:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch (1.55 KB, patch)
2009-03-23 00:18 EDT, Eugene Teo (Security Response)
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1081 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2009-06-03 11:36:49 EDT
Red Hat Product Errata RHSA-2009:1106 normal SHIPPED_LIVE Important: kernel security and bug fix update 2009-06-16 18:34:13 EDT
Red Hat Product Errata RHSA-2009:1132 normal SHIPPED_LIVE Important: kernel security and bug fix update 2009-06-30 04:06:02 EDT

  None (edit)
Description Eugene Teo (Security Response) 2009-03-23 00:15:43 EDT
Description of problem:
Since creating a device node is normally an operation requiring special privilege, Igor Zhbanov points out that it is surprising (to say the least) that a client can, for example, create a device node on a filesystem exported with root_squash.

So, make sure CAP_MKNOD is among the capabilities dropped when an nfsd thread handles a request from a non-root user.

References:
http://groups.google.com/group/fa.linux.kernel/browse_thread/thread/665b99fdc970bee3
http://article.gmane.org/gmane.comp.security.oss.general/1581
Comment 11 errata-xmlrpc 2009-06-03 11:37:08 EDT
This issue has been addressed in following products:

  MRG for RHEL-5

Via RHSA-2009:1081 https://rhn.redhat.com/errata/RHSA-2009-1081.html
Comment 12 errata-xmlrpc 2009-06-16 18:34:37 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1106 https://rhn.redhat.com/errata/RHSA-2009-1106.html
Comment 13 errata-xmlrpc 2009-06-30 04:06:28 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2009:1132 https://rhn.redhat.com/errata/RHSA-2009-1132.html

Note You need to log in before you can comment on or make changes to this bug.