Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 280363 (CVE-2009-2657) - <sys-fs/nilfs-utils-2.0.14 privilege escalation (CVE-2009-2657)
Summary: <sys-fs/nilfs-utils-2.0.14 privilege escalation (CVE-2009-2657)
Status: RESOLVED INVALID
Alias: CVE-2009-2657
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~1 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-08-04 19:26 UTC by Stefan Behte (RETIRED)
Modified: 2009-08-04 23:33 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2009-08-04 19:26:31 UTC
CVE-2009-2657 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2657):
  nilfs-utils before 2.0.14 installs multiple programs with unnecessary
  setuid privileges, which allows local users to execute arbitrary
  commands via the device string in a -c command line option to
  mkfs.nilfs2.
Comment 1 MATSUU Takuto (RETIRED) gentoo-dev 2009-08-04 22:32:31 UTC
I had dropped setuid by files/nilfs-utils-2.0.12-gentoo.patch. I contacted to upstream and got an answer that it has no effect in gentoo.

cf.
https://www.nilfs.org/pipermail/users/2009-July/000826.html
> Users using a distro package do not suffer the problem because the
suid bit is dropped in that case.
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2009-08-04 23:33:56 UTC
Ok, thanks & sorry! Closing INVALID.