Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 20 Sep 2012 20:25:39 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>, security@...key-project.com
Subject: Re: CVE-request: monkey fails to drop supplemental
 groups when lowering privileges

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/20/2012 11:35 AM, Henri Salo wrote:
> Hello,
> 
> Please assign 2012 CVE-identifier for following monkey
> vulnerability:
> 
> Monkey webserver fails to drop supplemental groups when lowering
> privileges. This allows any local user on the system to read any
> fine that root's supplemental groups can access. Monkey does
> perform a filesystem access check to make sure that its EUID/EGID
> can access the target file, but this check is subject to TOCTOU
> flaws.
> 
> Reported by John Lightsey in
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688007 Affected
> Debian-version is 0.9.3-1 (haven't tested upstream package) Project
> page: http://www.monkey-project.com/
> 
> - Henri Salo

Please use CVE-2012-4442 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=xZ6Y
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.