Package : nfs-utils Version : 1.2.8-9+deb8u1 CVE ID : CVE-2019-3689 Debian Bug : 940848 In the nfs-utils package, providing support files for Network File System (NFS) including the rpc.statd daemon, the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system. For Debian 8 "Jessie", this problem has been fixed in version 1.2.8-9+deb8u1. We recommend that you upgrade your nfs-utils packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Summary: Debian LTS: DLA-1965-1: nfs-utils security update => Debian LTS: DLA-1965-1: nfs-utils security update (CVE-2019-3689)
Thank you for drawing this to our attention. Bug title is re Debian LTS: DLA-1965-1 Assigning to Guillaume for nfs-utils, CC DavidW for security.
Summary: Debian LTS: DLA-1965-1: nfs-utils security update (CVE-2019-3689) => nfs-utils security update (CVE-2019-3689) : /var/lib/nfs/ is owned by statd ; if this is compromised, root access is possibleComponent: RPM Packages => SecurityCC: (none) => luigiwalserQA Contact: (none) => securitySource RPM: nfs-utils => nfs-utils-2.3.4-3.mga7.src.rpm
Assignee: bugsquad => guillomovitch
Zombie, please provide a link to the advisory and don't copy and paste the text. Lewis, I am the security group, so I already get the e-mails. You don't need to CC me.
Advisory link from October 19: https://www.debian.org/lts/security/2019/dla-1965 This is a Debian-specific issue.
Resolution: (none) => INVALIDStatus: NEW => RESOLVED