Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
SSA-2003-141-06a REVISED quotacheck security fix in rc.M
Detailed Explanation for this Vulnerability Assessment
NOTE: The original advisory quotes a section of the Slackware ChangeLog
which had inadvertently reversed the options to quotacheck. The correct
option to use is 'm'. A corrected advisory follows:
An upgraded sysvinit package is available which fixes a problem with
the use of quotacheck in /etc/rc.d/rc.M. The original version of
rc.M calls quotacheck like this:
echo "Checking filesystem quotas: /sbin/quotacheck -avugM"
The 'M' option is wrong. This causes the filesystem to be remounted,
and in the process any mount flags such as nosuid, nodev, noexec,
and the like, will be reset. The correct option to use here is 'm',
which does not attempt to remount the partition:
echo "Checking filesystem quotas: /sbin/quotacheck -avugm"
We recommend sites using file system quotas upgrade to this new package,
or edit /etc/rc.d/rc.M accordingly.
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi
No Discussions have been posted on this vulnerability.