Candidate: CVE-2007-0004 Description: The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a filesystem is mounted with the noacl option, checks permissions for the open system call via vfs_permission (mode bits) data rather than an NFS ACCESS call to the server, which allows local client processes to obtain a false success status from open calls that the server would deny, and possibly obtain sensitive information about file permissions on the server, as demonstrated in a root_squash environment. NOTE: it is uncertain whether any scenarios involving this issue cross privilege boundaries. References: https://bugzilla.redhat.com/show_bug.cgi?id=199715 Ubuntu-Description: Notes: dannf> Don't know that this bug every affected upstream, but looks like we may have introduced it into 2.4.27 w/ 084_ea_acl-2.diff dannf> Unknown security implications (though certainly a bug), and RHEL3 never included the patch in their bugzilla, so ignoring Bugs: upstream: N/A linux-2.6: N/A 2.6.18-etch-security: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: ignored (2.4.27-10sarge6) 2.6.15-dapper-security: N/A 2.6.17-edgy-security: ignored (EOL) 2.6.20-feisty-security: N/A 2.6.22-gutsy-security: N/A 2.6.24-hardy-security: N/A