|
Message-ID: <34ddbebf-ee5e-a8de-918b-bc9878352e84@orlitzky.com> Date: Fri, 12 Jun 2020 08:16:23 -0400 From: Michael Orlitzky <michael@...itzky.com> To: oss-security@...ts.openwall.com Subject: Re: icinga2: CVE-2020-14004: prepare-dirs script allows for symlink attack in the icinga user context On 2020-06-12 05:54, Matthias Gerstner wrote: > Hello list, > > during the review of directories with special permissions in openSUSE > distributions I noticed an icinga user privilege escalation issue in the > icinga2 monitoring software [1]. face -> palm https://github.com/Icinga/icinga2/issues/5793 > But it could still turn out to be subject to > race conditions on older or alternative `chown` implementations. It > would also be problematic if the Linux kernel hardlink protection is > turned off for some reason. Hardlink protection is off by default in the vanilla kernel.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.