[Secure-testing-team] Bug#887001: glibc: CVE-2018-1000001: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation

Salvatore Bonaccorso carnil at debian.org
Fri Jan 12 12:43:14 UTC 2018


Source: glibc
Version: 2.19-18
Severity: grave
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18203

Hi glibc maintainers,

the following vulnerability was published for glibc, filling as grave
due to the privilege escalation potential, but by default in Debian
unprivileged userns clone is not enabled, so the attack reduced. The
issue should we think preferably be fixed in a point release.

CVE-2018-1000001[0]:
Libc Realpath Buffer Underflow

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-1000001
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001
[1] http://www.openwall.com/lists/oss-security/2018/01/11/5
[2] https://sourceware.org/bugzilla/show_bug.cgi?id=18203
[3] https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/

Regards,
Salvatore



More information about the Secure-testing-team mailing list