Summary: | <sys-fs/nilfs-utils-2.0.14 privilege escalation (CVE-2009-2657) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | major | CC: | matsuu |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=505374 | ||
Whiteboard: | ~1 [ebuild] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
2009-08-04 19:26:31 UTC
I had dropped setuid by files/nilfs-utils-2.0.12-gentoo.patch. I contacted to upstream and got an answer that it has no effect in gentoo. cf. https://www.nilfs.org/pipermail/users/2009-July/000826.html > Users using a distro package do not suffer the problem because the suid bit is dropped in that case. Ok, thanks & sorry! Closing INVALID. |