[Secure-testing-team] Bug#884615: src:glibc: CVE-2017-16997: incorrect RPATH/RUNPATH handling for SUID binaries

Aurelien Jarno aurel32 at debian.org
Sun Dec 17 17:33:05 UTC 2017


Package: src:glibc
Version: 2.19-1
Severity: important
Tags: upstream security patch
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=22625

The following vulnerability was published for glibc:

| CVE-2017-16997: Incorrect handling of RPATH or RUNPATH containing $ORIGIN
| for AT_SECURE or SUID binaries could be used to load libraries from the
| current directory.

See https://sourceware.org/bugzilla/show_bug.cgi?id=22625 for more details.

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE= (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


More information about the Secure-testing-team mailing list