Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 897924 (CVE-2023-26266) - <app-forensics/aflplusplus-4.06c: code execution via untrusted CWD
Summary: <app-forensics/aflplusplus-4.06c: code execution via untrusted CWD
Status: RESOLVED FIXED
Alias: CVE-2023-26266
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://github.com/AFLplusplus/AFLplu...
Whiteboard: B2 [glsa+]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-02-26 17:46 UTC by John Helmert III
Modified: 2024-08-11 14:41 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-02-26 17:46:42 UTC
CVE-2023-26266

In AFL++ 4.05c, the CmpLog component uses the current working directory to resolve and execute unprefixed fuzzing targets, allowing code execution.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-10-08 23:49:00 UTC
Looks like the patch is in 4.06c and beyond.
Comment 2 Larry the Git Cow gentoo-dev 2024-08-11 14:41:21 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=381bbaa4bcd407a37bfc03f2c0ef9303acc6e22b

commit 381bbaa4bcd407a37bfc03f2c0ef9303acc6e22b
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2024-08-11 14:41:12 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2024-08-11 14:41:19 +0000

    [ GLSA 202408-27 ] AFLplusplus: Arbitrary Code Execution
    
    Bug: https://bugs.gentoo.org/897924
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202408-27.xml | 42 ++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)