Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 02 Nov 2011 10:03:07 +0000
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Subject: kiwi shell meta char injection

Hi,
my colleagues found the following:
https://github.com/openSUSE/kiwi/commit/f0f74b3f6ac6d47f7919aa9db380c0ad41ffe55f

CVE-2011-3180: The path of overlay files was not escaped which allowed
shell meta character injection via the chown(1) command-line.

https://github.com/openSUSE/kiwi/commit/88bf491d16942766016c606e4210b4e072c1019f
CVE-2011-4195: The image name was not escaped properly and can be used
in conjunction with other applications to execute arbitrary shell
commands.

Cheers,
Thomas
-- 
Thomas Biege <thomas@...e.de>, Project Manager IT-Security
SUSE LINUX GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imend├Ârffer, HRB
21284 (AG N├╝rnberg)
--
  Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
                            -- Marie von Ebner-Eschenbach


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ