CVE-2019-3689

NameCVE-2019-3689
DescriptionThe nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1965-1
NVD severityhigh
Debian Bugs940848

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nfs-utils (PTS)jessie1:1.2.8-9vulnerable
jessie (security)1:1.2.8-9+deb8u1fixed
stretch1:1.3.4-2.1vulnerable
bullseye, buster, sid1:1.3.4-2.5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nfs-utilssource(unstable)(unfixed)940848
nfs-utilssourcejessie1:1.2.8-9+deb8u1DLA-1965-1

Notes

[buster] - nfs-utils <no-dsa> (Minor issue)
[stretch] - nfs-utils <no-dsa> (Minor issue)
https://bugzilla.suse.com/show_bug.cgi?id=1150733
When adressing this a related patch to make statd take the user-id from
/var/lib/nfs/sm is needed, cf. https://bugzilla.suse.com/show_bug.cgi?id=1150733#c3

Search for package or bug name: Reporting problems