rhsa-2012:0902
Vulnerability from csaf_redhat
Published
2012-06-19 15:23
Modified
2024-11-22 05:08
Summary
Red Hat Security Advisory: cifs-utils security, bug fix, and enhancement update
Notes
Topic
An updated cifs-utils package that fixes one security issue, multiple bugs,
and adds various enhancements is now available for Red Hat
Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The cifs-utils package contains tools for mounting and managing shares on
Linux using the SMB/CIFS protocol. The CIFS shares can be used as standard
Linux file systems.
A file existence disclosure flaw was found in mount.cifs. If the tool was
installed with the setuid bit set, a local attacker could use this flaw to
determine the existence of files or directories in directories not
accessible to the attacker. (CVE-2012-1586)
Note: mount.cifs from the cifs-utils package distributed by Red Hat does
not have the setuid bit set. We recommend that administrators do not
manually set the setuid bit for mount.cifs.
This update also fixes the following bugs:
* The cifs.mount(8) manual page was previously missing documentation for
several mount options. With this update, the missing entries have been
added to the manual page. (BZ#769923)
* Previously, the mount.cifs utility did not properly update the
"/etc/mtab" system information file when remounting an existing CIFS
mount. Consequently, mount.cifs created a duplicate entry of the existing
mount entry. This update adds the del_mtab() function to cifs.mount, which
ensures that the old mount entry is removed from "/etc/mtab" before adding
the updated mount entry. (BZ#770004)
* The mount.cifs utility did not properly convert user and group names to
numeric UIDs and GIDs. Therefore, when the "uid", "gid" or "cruid" mount
options were specified with user or group names, CIFS shares were mounted
with default values. This caused shares to be inaccessible to the intended
users because UID and GID is set to "0" by default. With this update, user
and group names are properly converted so that CIFS shares are now mounted
with specified user and group ownership as expected. (BZ#796463)
* The cifs.upcall utility did not respect the "domain_realm" section in
the "krb5.conf" file and worked only with the default domain.
Consequently, an attempt to mount a CIFS share from a different than the
default domain failed with the following error message:
mount error(126): Required key not available
This update modifies the underlying code so that cifs.upcall handles
multiple Kerberos domains correctly and CIFS shares can now be mounted as
expected in a multi-domain environment. (BZ#805490)
In addition, this update adds the following enhancements:
* The cifs.upcall utility previously always used the "/etc/krb5.conf" file
regardless of whether the user had specified a custom Kerberos
configuration file. This update adds the "--krb5conf" option to
cifs.upcall allowing the administrator to specify an alternate
krb5.conf file. For more information on this option, refer to the
cifs.upcall(8) manual page. (BZ#748756)
* The cifs.upcall utility did not optimally determine the correct service
principal name (SPN) used for Kerberos authentication, which occasionally
caused krb5 authentication to fail when mounting a server's unqualified
domain name. This update improves cifs.upcall so that the method used to
determine the SPN is now more versatile. (BZ#748757)
* This update adds the "backupuid" and "backupgid" mount options to the
mount.cifs utility. When specified, these options grant a user or a group
the right to access files with the backup intent. For more information on
these options, refer to the mount.cifs(8) manual page. (BZ#806337)
All users of cifs-utils are advised to upgrade to this updated package,
which contains backported patches to fix these issues and add these
enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated cifs-utils package that fixes one security issue, multiple bugs,\nand adds various enhancements is now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The cifs-utils package contains tools for mounting and managing shares on\nLinux using the SMB/CIFS protocol. The CIFS shares can be used as standard\nLinux file systems.\n\nA file existence disclosure flaw was found in mount.cifs. If the tool was\ninstalled with the setuid bit set, a local attacker could use this flaw to\ndetermine the existence of files or directories in directories not\naccessible to the attacker. (CVE-2012-1586)\n\nNote: mount.cifs from the cifs-utils package distributed by Red Hat does\nnot have the setuid bit set. We recommend that administrators do not\nmanually set the setuid bit for mount.cifs.\n\nThis update also fixes the following bugs:\n\n* The cifs.mount(8) manual page was previously missing documentation for\nseveral mount options. With this update, the missing entries have been\nadded to the manual page. (BZ#769923)\n\n* Previously, the mount.cifs utility did not properly update the\n\"/etc/mtab\" system information file when remounting an existing CIFS\nmount. Consequently, mount.cifs created a duplicate entry of the existing\nmount entry. This update adds the del_mtab() function to cifs.mount, which\nensures that the old mount entry is removed from \"/etc/mtab\" before adding\nthe updated mount entry. (BZ#770004)\n\n* The mount.cifs utility did not properly convert user and group names to\nnumeric UIDs and GIDs. Therefore, when the \"uid\", \"gid\" or \"cruid\" mount\noptions were specified with user or group names, CIFS shares were mounted\nwith default values. This caused shares to be inaccessible to the intended\nusers because UID and GID is set to \"0\" by default. With this update, user\nand group names are properly converted so that CIFS shares are now mounted\nwith specified user and group ownership as expected. (BZ#796463)\n\n* The cifs.upcall utility did not respect the \"domain_realm\" section in\nthe \"krb5.conf\" file and worked only with the default domain.\nConsequently, an attempt to mount a CIFS share from a different than the\ndefault domain failed with the following error message:\n\n mount error(126): Required key not available\n\nThis update modifies the underlying code so that cifs.upcall handles\nmultiple Kerberos domains correctly and CIFS shares can now be mounted as\nexpected in a multi-domain environment. (BZ#805490)\n\nIn addition, this update adds the following enhancements:\n\n* The cifs.upcall utility previously always used the \"/etc/krb5.conf\" file\nregardless of whether the user had specified a custom Kerberos\nconfiguration file. This update adds the \"--krb5conf\" option to\ncifs.upcall allowing the administrator to specify an alternate\nkrb5.conf file. For more information on this option, refer to the\ncifs.upcall(8) manual page. (BZ#748756)\n\n* The cifs.upcall utility did not optimally determine the correct service\nprincipal name (SPN) used for Kerberos authentication, which occasionally\ncaused krb5 authentication to fail when mounting a server\u0027s unqualified\ndomain name. This update improves cifs.upcall so that the method used to\ndetermine the SPN is now more versatile. (BZ#748757)\n\n* This update adds the \"backupuid\" and \"backupgid\" mount options to the\nmount.cifs utility. When specified, these options grant a user or a group\nthe right to access files with the backup intent. For more information on\nthese options, refer to the mount.cifs(8) manual page. (BZ#806337)\n\nAll users of cifs-utils are advised to upgrade to this updated package,\nwhich contains backported patches to fix these issues and add these\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0902", "url": "https://access.redhat.com/errata/RHSA-2012:0902" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "748756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=748756" }, { "category": "external", "summary": "748757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=748757" }, { "category": "external", "summary": "807252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0902.json" } ], "title": "Red Hat Security Advisory: cifs-utils security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:08:31+00:00", "generator": { "date": "2024-11-22T05:08:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:0902", "initial_release_date": "2012-06-19T15:23:00+00:00", "revision_history": [ { "date": "2012-06-19T15:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-19T15:28:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:08:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "product": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "product_id": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils-debuginfo@4.8.1-10.el6?arch=x86_64" } } }, { "category": "product_version", "name": "cifs-utils-0:4.8.1-10.el6.x86_64", "product": { "name": "cifs-utils-0:4.8.1-10.el6.x86_64", "product_id": "cifs-utils-0:4.8.1-10.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils@4.8.1-10.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "product": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "product_id": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils-debuginfo@4.8.1-10.el6?arch=i686" } } }, { "category": "product_version", "name": "cifs-utils-0:4.8.1-10.el6.i686", "product": { "name": "cifs-utils-0:4.8.1-10.el6.i686", "product_id": "cifs-utils-0:4.8.1-10.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils@4.8.1-10.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "cifs-utils-0:4.8.1-10.el6.src", "product": { "name": "cifs-utils-0:4.8.1-10.el6.src", "product_id": "cifs-utils-0:4.8.1-10.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils@4.8.1-10.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "product": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "product_id": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils-debuginfo@4.8.1-10.el6?arch=ppc64" } } }, { "category": "product_version", "name": "cifs-utils-0:4.8.1-10.el6.ppc64", "product": { "name": "cifs-utils-0:4.8.1-10.el6.ppc64", "product_id": "cifs-utils-0:4.8.1-10.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils@4.8.1-10.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "product": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "product_id": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils-debuginfo@4.8.1-10.el6?arch=s390x" } } }, { "category": "product_version", "name": "cifs-utils-0:4.8.1-10.el6.s390x", "product": { "name": "cifs-utils-0:4.8.1-10.el6.s390x", "product_id": "cifs-utils-0:4.8.1-10.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cifs-utils@4.8.1-10.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-0:4.8.1-10.el6.src" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-0:4.8.1-10.el6.src" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-0:4.8.1-10.el6.src" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-0:4.8.1-10.el6.src" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.i686" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" }, "product_reference": "cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1586", "discovery_date": "2012-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "807252" } ], "notes": [ { "category": "description", "text": "mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.", "title": "Vulnerability description" }, { "category": "summary", "text": "cifs-utils: mount.cifs file existence disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of samba/samba3x as shipped with Red Hat Enterprise Linux 5. This issue is not currently planned to be addressed in future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:cifs-utils-0:4.8.1-10.el6.i686", "6Client:cifs-utils-0:4.8.1-10.el6.ppc64", "6Client:cifs-utils-0:4.8.1-10.el6.s390x", "6Client:cifs-utils-0:4.8.1-10.el6.src", "6Client:cifs-utils-0:4.8.1-10.el6.x86_64", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.i686", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.ppc64", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.s390x", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.src", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.x86_64", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6Server:cifs-utils-0:4.8.1-10.el6.i686", "6Server:cifs-utils-0:4.8.1-10.el6.ppc64", "6Server:cifs-utils-0:4.8.1-10.el6.s390x", "6Server:cifs-utils-0:4.8.1-10.el6.src", "6Server:cifs-utils-0:4.8.1-10.el6.x86_64", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6Workstation:cifs-utils-0:4.8.1-10.el6.i686", "6Workstation:cifs-utils-0:4.8.1-10.el6.ppc64", "6Workstation:cifs-utils-0:4.8.1-10.el6.s390x", "6Workstation:cifs-utils-0:4.8.1-10.el6.src", "6Workstation:cifs-utils-0:4.8.1-10.el6.x86_64", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1586" }, { "category": "external", "summary": "RHBZ#807252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1586", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1586" } ], "release_date": "2012-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-19T15:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client:cifs-utils-0:4.8.1-10.el6.i686", "6Client:cifs-utils-0:4.8.1-10.el6.ppc64", "6Client:cifs-utils-0:4.8.1-10.el6.s390x", "6Client:cifs-utils-0:4.8.1-10.el6.src", "6Client:cifs-utils-0:4.8.1-10.el6.x86_64", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.i686", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.ppc64", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.s390x", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.src", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.x86_64", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6Server:cifs-utils-0:4.8.1-10.el6.i686", "6Server:cifs-utils-0:4.8.1-10.el6.ppc64", "6Server:cifs-utils-0:4.8.1-10.el6.s390x", "6Server:cifs-utils-0:4.8.1-10.el6.src", "6Server:cifs-utils-0:4.8.1-10.el6.x86_64", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6Workstation:cifs-utils-0:4.8.1-10.el6.i686", "6Workstation:cifs-utils-0:4.8.1-10.el6.ppc64", "6Workstation:cifs-utils-0:4.8.1-10.el6.s390x", "6Workstation:cifs-utils-0:4.8.1-10.el6.src", "6Workstation:cifs-utils-0:4.8.1-10.el6.x86_64", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0902" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:cifs-utils-0:4.8.1-10.el6.i686", "6Client:cifs-utils-0:4.8.1-10.el6.ppc64", "6Client:cifs-utils-0:4.8.1-10.el6.s390x", "6Client:cifs-utils-0:4.8.1-10.el6.src", "6Client:cifs-utils-0:4.8.1-10.el6.x86_64", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Client:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.i686", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.ppc64", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.s390x", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.src", "6ComputeNode:cifs-utils-0:4.8.1-10.el6.x86_64", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6ComputeNode:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6Server:cifs-utils-0:4.8.1-10.el6.i686", "6Server:cifs-utils-0:4.8.1-10.el6.ppc64", "6Server:cifs-utils-0:4.8.1-10.el6.s390x", "6Server:cifs-utils-0:4.8.1-10.el6.src", "6Server:cifs-utils-0:4.8.1-10.el6.x86_64", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Server:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64", "6Workstation:cifs-utils-0:4.8.1-10.el6.i686", "6Workstation:cifs-utils-0:4.8.1-10.el6.ppc64", "6Workstation:cifs-utils-0:4.8.1-10.el6.s390x", "6Workstation:cifs-utils-0:4.8.1-10.el6.src", "6Workstation:cifs-utils-0:4.8.1-10.el6.x86_64", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.i686", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.ppc64", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.s390x", "6Workstation:cifs-utils-debuginfo-0:4.8.1-10.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "cifs-utils: mount.cifs file existence disclosure vulnerability" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…