Skip to navigation

Security Advisory nfs-utils security update

Advisory: RHSA-2005:014-04
Type: Security Advisory
Severity: Important
Issued on: 2005-01-12
Last updated on: 2005-01-12
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2004-0946
CVE-2004-1014

Details

An updated nfs-utils package that fixes various security issues is now
available.

The nfs-utils package provides a daemon for the kernel NFS server and
related tools.

SGI reported that the statd daemon did not properly handle the SIGPIPE
signal. A misconfigured or malicious peer could cause statd to crash,
leading to a denial of service. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-1014 to this issue.

Arjan van de Ven discovered a buffer overflow in rquotad. On 64-bit
architectures, an improper integer conversion can lead to a buffer
overflow. An attacker with access to an NFS share could send a specially
crafted request which could lead to the execution of arbitrary code. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0946 to this issue.

All users of nfs-utils should upgrade to this updated package, which
resolves these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-11/i386/nfs-utils-0.3.3-11.i386.rpm
Missing file
    MD5: b5e37053bfa2a629ad89cf8aa55fdd81
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-11/ia64/nfs-utils-0.3.3-11.ia64.rpm
Missing file
    MD5: 1acfa8622a1a9a98f676e8d5e8ada932
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-11/i386/nfs-utils-0.3.3-11.i386.rpm
Missing file
    MD5: b5e37053bfa2a629ad89cf8aa55fdd81
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-11/i386/nfs-utils-0.3.3-11.i386.rpm
Missing file
    MD5: b5e37053bfa2a629ad89cf8aa55fdd81
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/nfs-utils/0.3.3-11/ia64/nfs-utils-0.3.3-11.ia64.rpm
Missing file
    MD5: 1acfa8622a1a9a98f676e8d5e8ada932
 

Bugs fixed (see bugzilla for more information)

138063 - CAN-2004-0946 buffer overflow in rquotad
144652 - CAN-2004-1014 DoS in statd


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/