http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2192 http://www.debian.org/security/2010/dsa-2063 Dan Rosenberg discovered that pmount, a wrapper around the standard mount program which permits normal users to mount removable devices without a matching /etc/fstab entry, creates files in /var/lock insecurely. A local attacker could overwrite arbitrary files utilising a symlink attack. Test and stabilize: =sys-apps/pmount-0.9.23
amd64 stable
CVE-2010-2192 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2192): The make_lockdir_name function in policy.c in pmount 0.9.18 allow local users to overwrite arbitrary files via a symlink attack on a file in /var/lock/.
Builds fine on x86. Rdeps build against it without any problem. Able to start ivman and detects pmount while starting.
alpha/arm/ia64/sh/sparc/x86 stable, thanks Myckel
Stable for HPPA.
ppc64 stable
ppc stable
glsa request filed.
Ping. Is this thing alive?
This issue was resolved and addressed in GLSA 201412-08 at http://security.gentoo.org/glsa/glsa-201412-08.xml by GLSA coordinator Sean Amoss (ackle).