- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Low: util-linux security and bug fix update
Advisory ID:       RHSA-2007:0235-02
Advisory URL:      https://access.redhat.com/errata/RHSA-2007:0235.html
Issue date:        2007-05-01
Updated on:        2007-05-01
Product:           Red Hat Enterprise Linux
Keywords:          mount fdisk login
CVE Names:         CVE-2006-7108 
- ---------------------------------------------------------------------1. Summary:

An updated util-linux package that corrects a security issue and fixes
several bugs is now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The util-linux package contains a collection of basic system utilities.

A flaw was found in the way the login process handled logins which did not
require authentication. Certain processes which conduct their own
authentication could allow a remote user to bypass intended access policies
which would normally be enforced by the login process. (CVE-2006-7108)

This update also fixes the following bugs:

* The partx, addpart and delpart commands were not documented.

* The "umount -l" command did not work on hung NFS mounts with cached data.

* The mount command did not mount NFS V3 share where sec=none was specified.

* The mount command did not read filesystem LABEL from unpartitioned disks.

* The mount command did not recognize labels on VFAT filesystems.

* The fdisk command did not support 4096 sector size for the "-b" option.

* The mount man page did not list option "mand" or information about
/etc/mtab limitations.

All users of util-linux should upgrade to these updated packages, which
contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

169299 - umount -l should work on hung NFS mounts with cached data
177331 - CVE-2006-7108 login omits pam_acct_mgmt & pam_chauthtok when authentication is skipped.
187370 - Unable to mount NFS V3 share where sec=none is specified
188099 - can't mount iscsi ext3 fs by label.
197768 - man mount' does not list option 'mand'

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
b55ecbe0eac80ed7482e5e31265eb372  util-linux-2.12a-16.EL4.25.src.rpm

i386:
ff7c2ff0b317f3d23d8c86f07d101c55  util-linux-2.12a-16.EL4.25.i386.rpm
5d8435d17fd695098f82bab92b67894f  util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm

ia64:
111cedb53d72339a1eb57880a463f669  util-linux-2.12a-16.EL4.25.ia64.rpm
952ccc2d0f0255f9d534b45e3e4d5f56  util-linux-debuginfo-2.12a-16.EL4.25.ia64.rpm

ppc:
900880d8faadebd6216952c6eaa8ee31  util-linux-2.12a-16.EL4.25.ppc.rpm
46ed5fd2cb84f16380a5f538b2cc6d53  util-linux-debuginfo-2.12a-16.EL4.25.ppc.rpm

s390:
85ab4e837ed645340d8d31687c9c2543  util-linux-2.12a-16.EL4.25.s390.rpm
1f839d8cac1ce9eea1f33364f46ae04b  util-linux-debuginfo-2.12a-16.EL4.25.s390.rpm

s390x:
051a5321c719ee77c56f218a4f360b7d  util-linux-2.12a-16.EL4.25.s390x.rpm
735b7dda37760e12c3ec62eb2ff6f42e  util-linux-debuginfo-2.12a-16.EL4.25.s390x.rpm

x86_64:
4566fc204cdc0b6420f71f87959b82e2  util-linux-2.12a-16.EL4.25.x86_64.rpm
4728ab213aa22b059794f61e8800c465  util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
b55ecbe0eac80ed7482e5e31265eb372  util-linux-2.12a-16.EL4.25.src.rpm

i386:
ff7c2ff0b317f3d23d8c86f07d101c55  util-linux-2.12a-16.EL4.25.i386.rpm
5d8435d17fd695098f82bab92b67894f  util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm

x86_64:
4566fc204cdc0b6420f71f87959b82e2  util-linux-2.12a-16.EL4.25.x86_64.rpm
4728ab213aa22b059794f61e8800c465  util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
b55ecbe0eac80ed7482e5e31265eb372  util-linux-2.12a-16.EL4.25.src.rpm

i386:
ff7c2ff0b317f3d23d8c86f07d101c55  util-linux-2.12a-16.EL4.25.i386.rpm
5d8435d17fd695098f82bab92b67894f  util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm

ia64:
111cedb53d72339a1eb57880a463f669  util-linux-2.12a-16.EL4.25.ia64.rpm
952ccc2d0f0255f9d534b45e3e4d5f56  util-linux-debuginfo-2.12a-16.EL4.25.ia64.rpm

x86_64:
4566fc204cdc0b6420f71f87959b82e2  util-linux-2.12a-16.EL4.25.x86_64.rpm
4728ab213aa22b059794f61e8800c465  util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
b55ecbe0eac80ed7482e5e31265eb372  util-linux-2.12a-16.EL4.25.src.rpm

i386:
ff7c2ff0b317f3d23d8c86f07d101c55  util-linux-2.12a-16.EL4.25.i386.rpm
5d8435d17fd695098f82bab92b67894f  util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm

ia64:
111cedb53d72339a1eb57880a463f669  util-linux-2.12a-16.EL4.25.ia64.rpm
952ccc2d0f0255f9d534b45e3e4d5f56  util-linux-debuginfo-2.12a-16.EL4.25.ia64.rpm

x86_64:
4566fc204cdc0b6420f71f87959b82e2  util-linux-2.12a-16.EL4.25.x86_64.rpm
4728ab213aa22b059794f61e8800c465  util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.

RedHat: Low: util-linux security and bug fix update RHSA-2007:0235-02

An updated util-linux package that corrects a security issue and fixes several bugs is now available.A flaw was found in the way the login process handled logins which did not req...

Summary



Summary

The util-linux package contains a collection of basic system utilities. A flaw was found in the way the login process handled logins which did not require authentication. Certain processes which conduct their own authentication could allow a remote user to bypass intended access policies which would normally be enforced by the login process. (CVE-2006-7108) This update also fixes the following bugs: * The partx, addpart and delpart commands were not documented. * The "umount -l" command did not work on hung NFS mounts with cached data. * The mount command did not mount NFS V3 share where sec=none was specified. * The mount command did not read filesystem LABEL from unpartitioned disks. * The mount command did not recognize labels on VFAT filesystems. * The fdisk command did not support 4096 sector size for the "-b" option. * The mount man page did not list option "mand" or information about /etc/mtab limitations. All users of util-linux should upgrade to these updated packages, which contain backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
169299 - umount -l should work on hung NFS mounts with cached data 177331 - CVE-2006-7108 login omits pam_acct_mgmt & pam_chauthtok when authentication is skipped. 187370 - Unable to mount NFS V3 share where sec=none is specified 188099 - can't mount iscsi ext3 fs by label. 197768 - man mount' does not list option 'mand'
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: b55ecbe0eac80ed7482e5e31265eb372 util-linux-2.12a-16.EL4.25.src.rpm
i386: ff7c2ff0b317f3d23d8c86f07d101c55 util-linux-2.12a-16.EL4.25.i386.rpm 5d8435d17fd695098f82bab92b67894f util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm
ia64: 111cedb53d72339a1eb57880a463f669 util-linux-2.12a-16.EL4.25.ia64.rpm 952ccc2d0f0255f9d534b45e3e4d5f56 util-linux-debuginfo-2.12a-16.EL4.25.ia64.rpm
ppc: 900880d8faadebd6216952c6eaa8ee31 util-linux-2.12a-16.EL4.25.ppc.rpm 46ed5fd2cb84f16380a5f538b2cc6d53 util-linux-debuginfo-2.12a-16.EL4.25.ppc.rpm
s390: 85ab4e837ed645340d8d31687c9c2543 util-linux-2.12a-16.EL4.25.s390.rpm 1f839d8cac1ce9eea1f33364f46ae04b util-linux-debuginfo-2.12a-16.EL4.25.s390.rpm
s390x: 051a5321c719ee77c56f218a4f360b7d util-linux-2.12a-16.EL4.25.s390x.rpm 735b7dda37760e12c3ec62eb2ff6f42e util-linux-debuginfo-2.12a-16.EL4.25.s390x.rpm
x86_64: 4566fc204cdc0b6420f71f87959b82e2 util-linux-2.12a-16.EL4.25.x86_64.rpm 4728ab213aa22b059794f61e8800c465 util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: b55ecbe0eac80ed7482e5e31265eb372 util-linux-2.12a-16.EL4.25.src.rpm
i386: ff7c2ff0b317f3d23d8c86f07d101c55 util-linux-2.12a-16.EL4.25.i386.rpm 5d8435d17fd695098f82bab92b67894f util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm
x86_64: 4566fc204cdc0b6420f71f87959b82e2 util-linux-2.12a-16.EL4.25.x86_64.rpm 4728ab213aa22b059794f61e8800c465 util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: b55ecbe0eac80ed7482e5e31265eb372 util-linux-2.12a-16.EL4.25.src.rpm
i386: ff7c2ff0b317f3d23d8c86f07d101c55 util-linux-2.12a-16.EL4.25.i386.rpm 5d8435d17fd695098f82bab92b67894f util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm
ia64: 111cedb53d72339a1eb57880a463f669 util-linux-2.12a-16.EL4.25.ia64.rpm 952ccc2d0f0255f9d534b45e3e4d5f56 util-linux-debuginfo-2.12a-16.EL4.25.ia64.rpm
x86_64: 4566fc204cdc0b6420f71f87959b82e2 util-linux-2.12a-16.EL4.25.x86_64.rpm 4728ab213aa22b059794f61e8800c465 util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: b55ecbe0eac80ed7482e5e31265eb372 util-linux-2.12a-16.EL4.25.src.rpm
i386: ff7c2ff0b317f3d23d8c86f07d101c55 util-linux-2.12a-16.EL4.25.i386.rpm 5d8435d17fd695098f82bab92b67894f util-linux-debuginfo-2.12a-16.EL4.25.i386.rpm
ia64: 111cedb53d72339a1eb57880a463f669 util-linux-2.12a-16.EL4.25.ia64.rpm 952ccc2d0f0255f9d534b45e3e4d5f56 util-linux-debuginfo-2.12a-16.EL4.25.ia64.rpm
x86_64: 4566fc204cdc0b6420f71f87959b82e2 util-linux-2.12a-16.EL4.25.x86_64.rpm 4728ab213aa22b059794f61e8800c465 util-linux-debuginfo-2.12a-16.EL4.25.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108 http://www.redhat.com/security/updates/classification/#low

Package List


Severity
Advisory ID: RHSA-2007:0235-02
Advisory URL: https://access.redhat.com/errata/RHSA-2007:0235.html
Issued Date: : 2007-05-01
Updated on: 2007-05-01
Product: Red Hat Enterprise Linux
Keywords: mount fdisk login
CVE Names: CVE-2006-7108 An updated util-linux package that corrects a security issue and fixes several bugs is now available. This update has been rated as having low security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News