{"id":"CVE-2011-2709","details":"libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.","modified":"2026-01-27T04:10:54.010540Z","published":"2012-06-21T15:55:10Z","withdrawn":"2026-01-27T04:10:54.010540Z","related":["openSUSE-SU-2024:10085-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/45075"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50785"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50973"},{"type":"FIX","url":"http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz"},{"type":"REPORT","url":"https://bugzilla.novell.com/show_bug.cgi?id=694598"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html"},{"type":"WEB","url":"http://lwn.net/Alerts/449415/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2011/07/21/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2011/07/22/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2011/08/12/10"},{"type":"WEB","url":"http://www.securityfocus.com/bid/48490"}],"schema_version":"1.7.3"}