|
Message-ID: <20090724163743.20554a34@redhat.com> Date: Fri, 24 Jul 2009 16:37:43 +0200 From: Tomas Hoger <thoger@...hat.com> To: OSS Security <oss-security@...ts.openwall.com> Subject: nilfs-utils privilege escalation Hi! During the package review of nilfs-utils packages before their inclusion into Fedora, it was pointed out that upstream Makefiles install files in /sbin as setuid root: https://bugzilla.redhat.com/show_bug.cgi?id=505374 Apart from the fact that those utils most likely don't need to be setuid on normal installs, Steve Grubb also noticed that mkfs.nilfs2 executes external command using system(), making it easy to elevate privileges. Issue should be fixed in 2.0.14 released this Mon, with patches linked in the bug mentioned above. From a quick look, this should not affect Debian / Ubuntu packages (thanks to dh_fixperms, it seems), Gentoo does not seem to have any stable version. I've not looked at other distros. -- Tomas Hoger / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.