A vulnerability in LinuxCIFS may allow a remote code execution via a command line option.
|Package||net-fs/cifs-utils on all architectures|
|Affected versions||< 6.11|
|Unaffected versions||>= 6.11|
The LinuxCIFS utils are a collection of tools for managing Linux CIFS Client Filesystems.
The mount.cifs utility had a shell injection issue where one can embed shell commands via the username mount option. Those commands will be run via popen() in the context of the user calling mount.
A remote attacker could entice a user to use a specially crafted argument using mount.cifs, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All LinuxCIFS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/cifs-utils-6.11"
September 29, 2020
September 29, 2020: 1