Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 635704

Summary: <dev-db/mariadb-{10.0.30-r1,10.0.32-r1,10.1.24-r1,10.1.26-r1,10.2.9}: root privilege escalation via "chown"
Product: Gentoo Security Reporter: Thomas Deutschmann (RETIRED) <whissi>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: major CC: mysql-bugs
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B1 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on:    
Bug Blocks: 630822    

Description Thomas Deutschmann (RETIRED) gentoo-dev 2017-10-28 17:50:00 UTC
This package uses eclasses which were vulnerable to root privilege escalation via "chown", see bug 630822 for details. The eclasses were fixed, however a rev bump is required to ensure that the vulnerability is completely removed.
Comment 1 Larry the Git Cow gentoo-dev 2017-10-28 18:11:10 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=8f9f34e3c825f97e487e9aa0782621231810c702

commit 8f9f34e3c825f97e487e9aa0782621231810c702
Author:     Thomas Deutschmann <whissi@gentoo.org>
AuthorDate: 2017-10-28 18:05:54 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2017-10-28 18:10:50 +0000

    dev-db/mariadb: Rev bump to fix CVE-2017-15945
    
    Bug: https://bugs.gentoo.org/635704
    Package-Manager: Portage-2.3.13, Repoman-2.3.4
    RepoMan-Options: --force

 dev-db/mariadb/mariadb-10.0.30-r1.ebuild | 212 ++++++++++++++++++++++++++++
 dev-db/mariadb/mariadb-10.0.32-r1.ebuild | 209 ++++++++++++++++++++++++++++
 dev-db/mariadb/mariadb-10.1.24-r1.ebuild | 227 ++++++++++++++++++++++++++++++
 dev-db/mariadb/mariadb-10.1.26-r1.ebuild | 228 +++++++++++++++++++++++++++++++
 4 files changed, 876 insertions(+)}
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2017-10-28 18:16:38 UTC
All done, repository is clean.

New GLSA request filed.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2017-11-10 22:47:49 UTC
This issue was resolved and addressed in
 GLSA 201711-04 at https://security.gentoo.org/glsa/201711-04
by GLSA coordinator Aaron Bauman (b-man).