March 2007.
-openafs (1.3.81-3sarge1) testing-proposed-updates; urgency=medium
+openafs (1.3.81-3sarge2) stable-security; urgency=high
+ * Non-maintainer upload by the Security Team.
+ * Apply upstream patch to disable setuid status on all cells by default.
+ Prior versions of AFS defaulted to honoring setuid bits in the local
+ cell, but since unauthenticated file access in AFS is unencrypted, an
+ attacker could forge packets from an AFS file server to synthesize a
+ setuid binary in AFS. (CVE-2007-1507, OPENAFS-SA-2007-001)
+
+ -- Noah Meyerhans <noahm@debian.org> Mon, 19 Mar 2007 15:56:43 -0400
+
+openafs (1.3.81-3sarge1) unstable; urgency=high
+
+ [ Russ Allbery ]
* libpam-openafs-kaserver: Fix compilation so that the PAM module isn't
missing symbols and therefore unusable. (Closes: #308844)
* In the init script, handle modules named either with or without the
--- /dev/null
+openafs (1.3.81-3sarge2) stable-security; urgency=high
+
+ As of this release of the OpenAFS kernel module, all cells, including
+ the local cell, have setuid support turned off by default due to the
+ possibility of an attacker forging AFS fileserver responses to create a
+ fake setuid binary. Prior releases enabled setuid support for the local
+ cell. Those binaries will now run with normal permissions by default.
+
+ This security fix will only take effect once you've installed a kernel
+ module from openafs-modules-source 1.4.2-6 or later. Doing so is highly
+ recommended. In the meantime, you can disable setuid support by
+ running:
+
+ fs setcell -cell <localcell> -nosuid
+
+ as root (where <localcell> is your local cell, the one listed in
+ /etc/openafs/ThisCell).
+
+ If you are certain there is no security risk of an attacker forging AFS
+ fileserver responses, you can enable setuid status selectively using the
+ fs setcell command.
+
+ -- Russ Allbery <rra@debian.org> Sun, 11 Mar 2007 22:28:07 -0700
+
# dh_installmanpages
dh_installinfo
dh_installchangelogs
+ install -m 644 debian/openafs-client.NEWS \
+ debian/$(srcpkg)/usr/share/doc/$(srcpkg)/NEWS.Debian
dh_link
dh_compress
dh_fixperms
tc->vlport = AFS_VLPORT;
RWLOCK_INIT(&tc->lock, "cell lock");
newc = 1;
- if (afs_thiscell && !strcmp(acellName, afs_thiscell))
- aflags &= ~CNoSUID;
+ aflags |= CNoSUID;
}
ObtainWriteLock(&tc->lock, 688);