Source: opentmpfiles
Version: 0.2+2019.05.21.git.44a55796ba-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/OpenRC/opentmpfiles/issues/3
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for opentmpfiles.

CVE-2017-18188[0]:
| OpenRC opentmpfiles through 0.1.3, when the fs.protected_hardlinks
| sysctl is turned off, allows local users to obtain ownership of
| arbitrary files by creating a hard link inside a directory on which
| "chown -R" will be run.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-18188
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18188
[1] https://github.com/OpenRC/opentmpfiles/issues/3

Regards,
Salvatore

Reply via email to