Bugzilla – Bug 694598
VUL-0: CVE-2011-2709: libgssglue / libgssapi untrusted input dlopen()
Last modified: 2013-07-29 09:00:16 UTC
libgssglue, as linked against the suid mount.nfs is using getenv("GSSAPI_MECH_CONF") in its initialization functions and parsing that file subsequently. It used dlopen() on the resulting input, therefore, via mount.nfs code as root can be executed, depending on the setup (users must be allowed to mount a NFS share). libgssglue might be used inside other +s programs as well, so mount.nfs is not the only vector. While fixing this for suids, we also need to ensure that fscaps are also honored.
ignore: p5->p3 mass change
The SWAMPID for this issue is 41150. This issue was rated as important. Please submit fixed packages until 2011-06-03. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
library was called libgssapi in sles10 times, same flaw
submitted sle10 + sle11 packages + patchinfos. opensuse 11.3 and 11.4 will be done when public.
released
Update released for: libgssapi Products: SLE-DESKTOP 10-SP4 (i386, x86_64) SLE-SERVER 10-SP4 (i386, ia64, ppc, s390x, x86_64)
Update released for: libgssglue, libgssglue-devel, libgssglue1 Products: SLE-DEBUGINFO 11-SP1 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP1 (i386, x86_64) SLE-SDK 11-SP1 (i386, ia64, ppc64, s390x, x86_64) SLE-SERVER 11-SP1 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP1 (i386, x86_64)
CVE-2011-2709
This is an autogenerated message for OBS integration: This bug (694598) was mentioned in https://build.opensuse.org/request/show/184581 Factory / libgssglue