[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Add CVE-2017-18018/coreutils
Salvatore Bonaccorso
carnil at debian.org
Thu Jan 4 17:10:12 UTC 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c344c58b by Salvatore Bonaccorso at 2018-01-04T18:08:15+01:00
Add CVE-2017-18018/coreutils
This item should probably be marked as unimportant.
https://lists.gnu.org/archive/html/coreutils/2017-12/msg00071.html
> On 12/28/2017 04:36 PM, Michael Orlitzky wrote:
>
> Does anyone mind if I reserve a CVE for this?
>
>
> Of course not - but I doubt that we can do much about it:
> the chown(1) binary is just a wrapper around chown(2)/lchown(2),
> so whatever (other) utility uses these system calls in a recursive
> way will be prone to that trap.
>
> I think the best way to handle this is to keep teaching sysadmins
> to avoid the --dereference option together with -R; usually
> "chown -R" with the default -P is probably good enough.
>
> It would probably be good to add a clarifying sentence to the Texinfo
> documentation. Would you like to propose a sentence?
Will just be fixed by clarifying documentation about security risk.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -267,7 +267,12 @@ CVE-2017-18020 (On Samsung mobile devices with L(5.x), M(6.x), and N(7.x) softwa
CVE-2017-18019 (In K7 Total Security before 15.1.0.305, user-controlled input to the ...)
NOT-FOR-US: K7 Total Security
CVE-2017-18018 (In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not ...)
- TODO: check
+ - coreutils <unfixed>
+ NOTE: http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
+ NOTE: http://www.openwall.com/lists/oss-security/2018/01/04/3
+ NOTE: Documentation patches proposed:
+ NOTE: https://lists.gnu.org/archive/html/coreutils/2017-12/msg00072.html
+ NOTE: https://lists.gnu.org/archive/html/coreutils/2017-12/msg00073.html
CVE-2018-5078 (Online Ticket Booking has XSS via the admin/eventlist.php cast ...)
NOT-FOR-US: Online Ticket Booking
CVE-2018-5077 (Online Ticket Booking has XSS via the admin/movieedit.php moviename ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/c344c58b5b43178b0c3bb6d5fd4011cef2a5e329
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/c344c58b5b43178b0c3bb6d5fd4011cef2a5e329
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180104/9df44a00/attachment.html>
More information about the Secure-testing-commits
mailing list