Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 8 Mar 2011 16:24:48 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: glibc locale escaping issue



----- Original Message -----
> Hi!
> 
> Following glibc upstream and gentoo bug reports describe a bug in the
> way locale command escapes its output.
> 
> http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904
> http://bugs.gentoo.org/show_bug.cgi?id=330923
> 
> Gentoo bug points out possible security implications. I've not managed to
> find an example where the locale command is used in a problematic way and
> where this may cross trust boundaries, so I wonder if this is worth
> handling as security fix vs. security enhancement. Comments are welcome.
> 
> The issue was fixed in GLSA 201011-01, but its text really only mentions
> Tavis' issues.
> 

I think this deserves an ID: CVE-2011-1095

The documentation clearly states that the output of this command will be
properly quoted. Even if we can't find a bad usage, there is quite likely a
shell script doing this in the universe.

I think the line between fix vs enhancement is crossed when we're talking
about documented behavior.

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.