LinuxCIFS: Shell injection — GLSA 202009-16

A vulnerability in LinuxCIFS may allow a remote code execution via a command line option.

Affected packages

net-fs/cifs-utils on all architectures
Affected versions < 6.11
Unaffected versions >= 6.11

Background

The LinuxCIFS utils are a collection of tools for managing Linux CIFS Client Filesystems.

Description

The mount.cifs utility had a shell injection issue where one can embed shell commands via the username mount option. Those commands will be run via popen() in the context of the user calling mount.

Impact

A remote attacker could entice a user to use a specially crafted argument using mount.cifs, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All LinuxCIFS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-fs/cifs-utils-6.11"
 

References

Release date
September 29, 2020

Latest revision
September 29, 2020: 1

Severity
normal

Exploitable
remote

Bugzilla entries