[Git][security-tracker-team/security-tracker][master] Add CVE-2019-3689/nfs-utils

Salvatore Bonaccorso carnil at debian.org
Thu Sep 19 21:36:23 BST 2019



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b5e88aff by Salvatore Bonaccorso at 2019-09-19T20:36:03Z
Add CVE-2019-3689/nfs-utils

Whilst the CVE description itself mentions SuSE packages only Debian has
a similar approach and chowns /var/lib/nfs to statd user. The issue
exploitability per se is mitigated by the default enabled kernel
hardening for fs.protected_symlinks.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -35991,7 +35991,11 @@ CVE-2019-3691
 CVE-2019-3690
 	RESERVED
 CVE-2019-3689 (The nfs-utils package in SUSE Linux Enterprise Server 12 before and in ...)
-	TODO: check
+	- nfs-utils <unfixed>
+	NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1150733
+	NOTE: When adressing this a related patch to make statd take the user-id from
+	NOTE: /var/lib/nfs/sm is needed, cf. https://bugzilla.suse.com/show_bug.cgi?id=1150733#c3
+	NOTE: Exploitabliity as well mitigated by fs.protected_symlinks kernel hardening.
 CVE-2019-3688
 	RESERVED
 CVE-2019-3687



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b5e88affbda734081d6299eb9150009dd69ad9c5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b5e88affbda734081d6299eb9150009dd69ad9c5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190919/8038dd31/attachment.html>


More information about the debian-security-tracker-commits mailing list