Summary: | app-emulation/virtualbox-? Insecure temp file usage (CVE-2008-5256) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | flameeyes, jokey, swapon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504149 | ||
Whiteboard: | ~3 [ebuild] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
2008-11-07 13:12:48 UTC
Thanks for pointing this out Robert, the attached patch can be applied to 1.6.6 and 2.x ebuilds as well, (as reported by upstream), i just updated the ebuilds on jokey's overlay. *** Bug 248750 has been marked as a duplicate of this bug. *** jokey, are you going to merge the contents of the overlay into the tree? virtualbox-* 2.0.6 ebuild bumped on jokey's overlay[1], the patch is not needed for this release because upstream already included this changes (as report on their Changelog[2]). [1] http://overlays.gentoo.org/dev/jokey [2] http://www.virtualbox.org/wiki/Changelog CVE-2008-5256 is out now - The AcquireDaemonLock function in ipcdUnix.cpp in Sun Innotek VirtualBox before 2.0.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/.vbox-$USER-ipc/lock temporary file. CVE-2008-5256 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5256): The AcquireDaemonLock function in ipcdUnix.cpp in Sun Innotek VirtualBox before 2.0.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/.vbox-$USER-ipc/lock temporary file. Whoops. I updated the topic via script and did not see your comment... I've committed Alessio's ebuilds to portage just now. Closing as it's just ~3. |