A vulnerability in LinuxCIFS may allow a remote code execution via a command line option.
Package | net-fs/cifs-utils on all architectures |
---|---|
Affected versions | < 6.11 |
Unaffected versions | >= 6.11 |
The LinuxCIFS utils are a collection of tools for managing Linux CIFS Client Filesystems.
The mount.cifs utility had a shell injection issue where one can embed shell commands via the username mount option. Those commands will be run via popen() in the context of the user calling mount.
A remote attacker could entice a user to use a specially crafted argument using mount.cifs, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All LinuxCIFS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/cifs-utils-6.11"
Release date
September 29, 2020
Latest revision
September 29, 2020: 1
Severity
normal
Exploitable
remote
Bugzilla entries