Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <34ddbebf-ee5e-a8de-918b-bc9878352e84@orlitzky.com>
Date: Fri, 12 Jun 2020 08:16:23 -0400
From: Michael Orlitzky <michael@...itzky.com>
To: oss-security@...ts.openwall.com
Subject: Re: icinga2: CVE-2020-14004: prepare-dirs script
 allows for symlink attack in the icinga user context

On 2020-06-12 05:54, Matthias Gerstner wrote:
> Hello list,
> 
> during the review of directories with special permissions in openSUSE
> distributions I noticed an icinga user privilege escalation issue in the
> icinga2 monitoring software [1].

face -> palm

https://github.com/Icinga/icinga2/issues/5793


> But it could still turn out to be subject to
> race conditions on older or alternative `chown` implementations. It
> would also be problematic if the Linux kernel hardlink protection is
> turned off for some reason.

Hardlink protection is off by default in the vanilla kernel.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.