A vulnerability has been reported in util-linux, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. The vulnerability is caused due to the mount and umount programs incorrectly checking the return values of the "setuid()" and "setgid()" functions when dropping privileges. This can potentially be exploited to perform certain actions with escalated privileges via e.g. the mount.nfs utility. The vulnerability is reported in version 2.12r. Other versions may also be affected. Solution: Fixed in the util-linux-ng repository. http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=commit;h=ebbeb2c7ac1b00b6083905957837a271e80b187e
You already applied the patch in -r8 a few days ago, but I couldn't find an appropriate security bug for this issue. Do you have plans to stabilise util-linux-2.12r-r8? Our latest stable version is vulnerable.
i dont have any plans for anything whatever security team wants to push is up to them, 2.12r-r8 is fine
Arches pleases test and mark stable sys-apps/util-linux-2.12r-r8 target "alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
x86 stable
Stable for HPPA
amd64 stable
Stable for SPARC.
stable on ppc64
alpha/ia64 stable
ppc stable, ready for glsa
(In reply to comment #10) > ppc stable, ready for glsa request filed.
GLSA 200710-18
mips stable.