Package: nfs-kernel-server
Version: 1:1.0.6-3.1
Severity: critical
Justification: root security hole


NFS uses root_squash by default, in part (mainly?) so as to make it more
difficult to create a setuid-root file in a writable export: protect the
exporting server from a compromise of the mounting client. With Debian
policy, group staff is root-equivalent: an evil client could create a
setgid-staff file, and with that trojanize /usr/local/bin (drop a
suitable ls or xterm or bash file).

There is a warning in "man exports" against other sensitive UIDs, but
not against sensitive GIDs. There are no sensitive UIDs on a default
Debian installation, but there is a sensitive GID mandated by policy;
there is no default or easy gid_squash on NFS exports. The intended
security benefit of root_squash is defeated.

(This is not really a bug in NFS, but a result of broken policy; maybe
NFS could document the issue, or help change policy.)

Please see also bug#299007 http://bugs.debian.org/299007 .

Cheers,

Paul Szabo   [EMAIL PROTECTED]   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-spm1.5
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages nfs-kernel-server depends on:
ii  debconf                     1.4.30.13    Debian configuration management sy
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libwrap0                    7.6.dbs-8    Wietse Venema's TCP wrappers libra
ii  nfs-common                  1:1.0.6-3.1  NFS support files common to client
ii  sysvinit                    2.86.ds1-1   System-V like init

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to