Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 635706 - <dev-db/mysql-{5.6.36-r1,5.6.37-r1,5.6.38}: root privilege escalation via "chown"
Summary: <dev-db/mysql-{5.6.36-r1,5.6.37-r1,5.6.38}: root privilege escalation via "ch...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B1 [glsa cve]
Keywords:
Depends on:
Blocks: CVE-2017-15945
  Show dependency tree
 
Reported: 2017-10-28 17:51 UTC by Thomas Deutschmann
Modified: 2017-11-10 22:47 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann gentoo-dev Security 2017-10-28 17:51:42 UTC
This package uses eclasses which were vulnerable to root privilege escalation via "chown", see bug 630822 for details. The eclasses were fixed, however a rev bump is required to ensure that the vulnerability is completely removed.
Comment 1 Larry the Git Cow gentoo-dev 2017-10-28 18:11:14 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c3f948792073c6f485cdd1fa99ad9dce6602d757

commit c3f948792073c6f485cdd1fa99ad9dce6602d757
Author:     Thomas Deutschmann <whissi@gentoo.org>
AuthorDate: 2017-10-28 18:08:13 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2017-10-28 18:10:54 +0000

    dev-db/mysql: Rev bump to fix CVE-2017-15945
    
    Bug: https://bugs.gentoo.org/635706
    Package-Manager: Portage-2.3.13, Repoman-2.3.4
    RepoMan-Options: --force

 dev-db/mysql/mysql-5.6.36-r1.ebuild | 177 ++++++++++++++++++++++++++++++++++
 dev-db/mysql/mysql-5.6.37-r1.ebuild | 183 ++++++++++++++++++++++++++++++++++++
 2 files changed, 360 insertions(+)}
Comment 2 Thomas Deutschmann gentoo-dev Security 2017-10-28 18:18:34 UTC
All done, repository is clean.

Added to an existing GLSA request.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2017-11-10 22:47:57 UTC
This issue was resolved and addressed in
 GLSA 201711-04 at https://security.gentoo.org/glsa/201711-04
by GLSA coordinator Aaron Bauman (b-man).