Issue metadata
Sign in to add a comment
|
CrOS: Vulnerability reported in sys-libs/glibc |
||||||||||||||||||||||
Issue descriptionAutomated analysis has detected that the following third party packages have had vulnerabilities publicly reported. NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package. Package Name: sys-libs/glibc Package Version: [cpe:/a:gnu:glibc:2.23] Advisory: CVE-2017-16997 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-16997 CVSS severity score: 9.3/10.0 Confidence: high Description: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
,
Jan 8 2018
yeah i don't think this has an impact on us. CL is up here: https://chromium-review.googlesource.com/854769
,
Jan 9 2018
,
Jan 9 2018
,
Jan 10 2018
,
Jan 10 2018
,
Jan 10 2018
,
Jan 11 2018
Lakitu has two binaries which has rpath set to $ORIGIN /usr/lib64/gconv/UHC.so and /usr/lib64/gconv/JOHAB.so
,
Jan 11 2018
Fortunately lakitu has two setuid binaries: /usr/bin/sudo and /usr/libexec/dbus-daemon-launch-helper both of which are not linked with gconv libraries. If my understanding is correct, bug only impacts for binaries which have setuid bit set and RPATH set to $ORIGIN. Based on above, I think there is no need for backporting the changes to stable* branches. Only updating head should suffice.
,
Jan 30 2018
yunlian@, is 800007 fixed and if so, is this fixed as well based on https://chromium-review.googlesource.com/c/chromiumos/overlays/chromiumos-overlay/+/854769? I'd like to clean up the security bug queue.
,
Jan 30 2018
Yes, it is fixed based on that CL.
,
Feb 8 2018
,
Mar 12 2018
,
Mar 19 2018
,
May 9 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by allenwebb@chromium.org
, Jan 8 2018Labels: Security_Severity-Low
Status: Available (was: Untriaged)