Skip to navigation

Security Advisory Low: quota security and bug fix update

Advisory: RHSA-2013:0120-1
Type: Security Advisory
Severity: Low
Issued on: 2013-01-08
Last updated on: 2013-01-08
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2012-3417

Details

An updated quota package that fixes one security issue and multiple bugs is
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The quota package provides system administration tools for monitoring
and limiting user and group disk usage on file systems.

It was discovered that the rpc.rquotad service did not use tcp_wrappers
correctly. Certain hosts access rules defined in "/etc/hosts.allow" and
"/etc/hosts.deny" may not have been honored, possibly allowing remote
attackers to bypass intended access restrictions. (CVE-2012-3417)

This issue was discovered by the Red Hat Security Response Team.

This update also fixes the following bugs:

* Prior to this update, values were not properly transported via the remote
procedure call (RPC) and interpreted by the client when querying the quota
usage or limits for network-mounted file systems if the quota values were
2^32 kilobytes or greater. As a consequence, the client reported mangled
values. This update modifies the underlying code so that such values are
correctly interpreted by the client. (BZ#667360)

* Prior to this update, warnquota sent messages about exceeded quota limits
from a valid domain name if the warnquota tool was enabled to send warning
e-mails and the superuser did not change the default warnquota
configuration. As a consequence, the recipient could reply to invalid
addresses. This update modifies the default warnquota configuration to use
the reserved example.com. domain. Now, warnings about exceeded quota limits
are sent from the reserved domain that inform the superuser to change to
the correct value. (BZ#680429)

* Previously, quota utilities could not recognize the file system as having
quotas enabled and refused to operate on it due to incorrect updating of
/etc/mtab. This update prefers /proc/mounts to get a list of file systems
with enabled quotas. Now, quota utilities recognize file systems with
enabled quotas as expected. (BZ#689822)

* Prior to this update, the setquota(8) tool on XFS file systems failed
to set disk limits to values greater than 2^31 kilobytes. This update
modifies the integer conversion in the setquota(8) tool to use a 64-bit
variable big enough to store such values. (BZ#831520)

All users of quota are advised to upgrade to this updated package, which
contains backported patches to resolve these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
quota-3.13-8.el5.src.rpm     MD5: a7b3af3232ade187989fdd735f5cd503
SHA-256: 85c1d39dd6a09d92dcf2b0205961c3f53ad58f6dcb7f023196b43833279bd024
 
IA-32:
quota-3.13-8.el5.i386.rpm     MD5: 3e366271880fcdaaa45e93c8fa53eb03
SHA-256: 648fb4d6a83bfb7969b2043f7a666285bf2c403cd482ab9cb4e3559fd0bfabdc
quota-debuginfo-3.13-8.el5.i386.rpm     MD5: 38c934ab9112bb6aa800a7b3dc24dd5a
SHA-256: 03bd196c680b7ea18f9c8d92fa9f9cad1cfb409d18a1ff91bdbda304475173a3
 
IA-64:
quota-3.13-8.el5.ia64.rpm     MD5: 93e4a33e39ed35e1bca47eb5efbaa6f0
SHA-256: 466acd65dfd202e48bb4c84494fbec14cad0c992fb292a0f9f31db4e47b93ea3
quota-debuginfo-3.13-8.el5.ia64.rpm     MD5: f7d53199b8cef9ca4a2c4517f0312e71
SHA-256: 53bf848506df759cd4aee3c93d1b0e128e2447cd3d38cc7eb2d5f4bf08ba30b3
 
PPC:
quota-3.13-8.el5.ppc.rpm     MD5: 30261c256adf4aea29779d9bad351348
SHA-256: e02364f0dc867d3898bdb3e59bbceb12218b8c996c43e691ef69b0d5ad4c4e41
quota-debuginfo-3.13-8.el5.ppc.rpm     MD5: 1a6b444a0ed822283ddc600a86bf7eb5
SHA-256: 234db0a734a9842d7a578e97783e8de3a314ea23e530ee4054d8b1d03282c1a7
 
s390x:
quota-3.13-8.el5.s390x.rpm     MD5: 93ffd0a84da84c38ce42e5e80cd1fddc
SHA-256: 1d29455846686f22dc413167b65ba6908492902536b3a4d6ff4d862697cd083e
quota-debuginfo-3.13-8.el5.s390x.rpm     MD5: 9cb7aec9f147bd2947b6aa089ed712fb
SHA-256: e33642c5be23334e739a3dadea8c12e53651db75822df76c8720bed36b127191
 
x86_64:
quota-3.13-8.el5.x86_64.rpm     MD5: f2d41563a002a459781b9af9db3f3977
SHA-256: 5f1cbdb7a87d3b3a583a60a5ad6fbfe83cc5cf20b30312144e48d0bc119df8ae
quota-debuginfo-3.13-8.el5.x86_64.rpm     MD5: ed6afba122dad3e1edb24cd84a6155b1
SHA-256: 768c625ef138e6ce17a1ba076f9e0193e559add35dc0e454d3cdec2f6120b60f
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
quota-3.13-8.el5.src.rpm     MD5: a7b3af3232ade187989fdd735f5cd503
SHA-256: 85c1d39dd6a09d92dcf2b0205961c3f53ad58f6dcb7f023196b43833279bd024
 
IA-32:
quota-3.13-8.el5.i386.rpm     MD5: 3e366271880fcdaaa45e93c8fa53eb03
SHA-256: 648fb4d6a83bfb7969b2043f7a666285bf2c403cd482ab9cb4e3559fd0bfabdc
quota-debuginfo-3.13-8.el5.i386.rpm     MD5: 38c934ab9112bb6aa800a7b3dc24dd5a
SHA-256: 03bd196c680b7ea18f9c8d92fa9f9cad1cfb409d18a1ff91bdbda304475173a3
 
x86_64:
quota-3.13-8.el5.x86_64.rpm     MD5: f2d41563a002a459781b9af9db3f3977
SHA-256: 5f1cbdb7a87d3b3a583a60a5ad6fbfe83cc5cf20b30312144e48d0bc119df8ae
quota-debuginfo-3.13-8.el5.x86_64.rpm     MD5: ed6afba122dad3e1edb24cd84a6155b1
SHA-256: 768c625ef138e6ce17a1ba076f9e0193e559add35dc0e454d3cdec2f6120b60f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

566717 - CVE-2012-3417 quota: incorrect use of tcp_wrappers
667360 - rpc.rquotad can't handle quotas >4TB


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/