VMware Security Advisory - There is an OpenPegasus PAM authentication buffer overflow and updated service console packages are available.
483d9d8f7624eaf97e973bf1a873f074836e2faa50411880fd4a74ea047d49c1
VMware Security Advisory - Alexander Sotirov from VMware Security Research discovered a buffer overflow vulnerability in the OpenPegasus Management server. Additionally, various service console packages have been updated.
be7e78ccb4f20704221fb7366e2271392d4aa26ec0d833801cc6ea984541e69f
Debian Security Advisory 1450-1 - It was discovered that util-linux, Miscellaneous system utilities, did not drop privileged users and groups in the correct order in the mount and umount commands. This could potentially allow a local user to gain additional privileges.
4734fc3adec246db57dff268bd354db2f13d0fcb4816a74542256e9fba9110ac
Debian Security Advisory 1449-1 - It was discovered that loop-aes-utils, tools for mounting and manipulating filesystems, didn't drop privileged users and groups in the correct order in the mount and umount commands. This could potentially allow a local user to gain additional privileges.
7ba837b3c03fe2093d868d969cfff17ad96234f1fbca2104edfba253113b86c4
Ubuntu Security Notice 533-1 - Ludwig Nussel discovered that mount and umount did not properly drop privileges when using helper programs. Local attackers may be able to bypass security restrictions and gain root privileges using programs such as mount.nfs or mount.cifs.
452e663fa6ac02624ced4b9e311d931598da9b08d6c91f7ebe13d2f56c4521f4
Gentoo Linux Security Advisory GLSA 200710-18 - Ludwig Nussel discovered that the check_special_mountprog() and check_special_umountprog() functions call setuid() and setgid() in the wrong order and do not check the return values, which can lead to privileges being dropped improperly. Versions less than 2.12r-r8 are affected.
50f3319e4e75be09131765eacc9544265c63c59560154b3055e4fb1df1ac3acc
Mandriva Linux Security Advisory - The mount and umount programs in util-linux called the setuid() and setgid() functions in the wrong order and did not check the return values, which could allow attackers to grain privileges via helper applications such as mount.nfs.
0eda8e230b5744477117303ec526fad47744d0cde3481d188716d2398ad9472e