Dan Rosenberg discovered that pmount, a wrapper around the standard mount program which permits normal users to mount removable devices without a matching /etc/fstab entry, creates files in /var/lock insecurely. A local attacker could overwrite arbitrary files utilising a symlink attack.
Test and stabilize:
The make_lockdir_name function in policy.c in pmount 0.9.18 allow
local users to overwrite arbitrary files via a symlink attack on a
file in /var/lock/.
Builds fine on x86. Rdeps build against it without any problem. Able to start ivman and detects pmount while starting.
alpha/arm/ia64/sh/sparc/x86 stable, thanks Myckel
Stable for HPPA.
glsa request filed.
Ping. Is this thing alive?
This issue was resolved and addressed in
GLSA 201412-08 at http://security.gentoo.org/glsa/glsa-201412-08.xml
by GLSA coordinator Sean Amoss (ackle).