-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0034
                  Low: quota security and bug fix update
                              9 January 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           quota
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 5
                   Red Hat Enterprise Linux WS/Desktop 5
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-3417  

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2013-0120.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running quota check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: quota security and bug fix update
Advisory ID:       RHSA-2013:0120-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0120.html
Issue date:        2013-01-08
CVE Names:         CVE-2012-3417 
=====================================================================

1. Summary:

An updated quota package that fixes one security issue and multiple bugs is
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64

3. Description:

The quota package provides system administration tools for monitoring
and limiting user and group disk usage on file systems.

It was discovered that the rpc.rquotad service did not use tcp_wrappers
correctly. Certain hosts access rules defined in "/etc/hosts.allow" and
"/etc/hosts.deny" may not have been honored, possibly allowing remote
attackers to bypass intended access restrictions. (CVE-2012-3417)

This issue was discovered by the Red Hat Security Response Team.

This update also fixes the following bugs:

* Prior to this update, values were not properly transported via the remote
procedure call (RPC) and interpreted by the client when querying the quota
usage or limits for network-mounted file systems if the quota values were
2^32 kilobytes or greater. As a consequence, the client reported mangled
values. This update modifies the underlying code so that such values are
correctly interpreted by the client. (BZ#667360)

* Prior to this update, warnquota sent messages about exceeded quota limits
from a valid domain name if the warnquota tool was enabled to send warning
e-mails and the superuser did not change the default warnquota
configuration. As a consequence, the recipient could reply to invalid
addresses. This update modifies the default warnquota configuration to use
the reserved example.com. domain. Now, warnings about exceeded quota limits
are sent from the reserved domain that inform the superuser to change to
the correct value. (BZ#680429)

* Previously, quota utilities could not recognize the file system as having
quotas enabled and refused to operate on it due to incorrect updating of
/etc/mtab. This update prefers /proc/mounts to get a list of file systems
with enabled quotas. Now, quota utilities recognize file systems with
enabled quotas as expected. (BZ#689822)

* Prior to this update, the setquota(8) tool on XFS file systems failed
to set disk limits to values greater than 2^31 kilobytes. This update
modifies the integer conversion in the setquota(8) tool to use a 64-bit
variable big enough to store such values. (BZ#831520)

All users of quota are advised to upgrade to this updated package, which
contains backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

566717 - CVE-2012-3417 quota: incorrect use of tcp_wrappers
667360 - rpc.rquotad can't handle quotas >4TB

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/quota-3.13-8.el5.src.rpm

i386:
quota-3.13-8.el5.i386.rpm
quota-debuginfo-3.13-8.el5.i386.rpm

x86_64:
quota-3.13-8.el5.x86_64.rpm
quota-debuginfo-3.13-8.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/quota-3.13-8.el5.src.rpm

i386:
quota-3.13-8.el5.i386.rpm
quota-debuginfo-3.13-8.el5.i386.rpm

ia64:
quota-3.13-8.el5.ia64.rpm
quota-debuginfo-3.13-8.el5.ia64.rpm

ppc:
quota-3.13-8.el5.ppc.rpm
quota-debuginfo-3.13-8.el5.ppc.rpm

s390x:
quota-3.13-8.el5.s390x.rpm
quota-debuginfo-3.13-8.el5.s390x.rpm

x86_64:
quota-3.13-8.el5.x86_64.rpm
quota-debuginfo-3.13-8.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-3417.html
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFQ68IYXlSAg2UNWIIRAkqSAKC+IUvF8E9OB8RonMuwzLplmOsygACfUOak
s2CkRGJ4joxosW6kT58inMc=
=X76p
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=erWN
-----END PGP SIGNATURE-----