diff options
author | Aaron Bauman <bman@gentoo.org> | 2019-04-02 00:23:54 -0400 |
---|---|---|
committer | Aaron Bauman <bman@gentoo.org> | 2019-04-02 00:23:54 -0400 |
commit | 0152d1c9b68b5870dfd6753490f2b652c783e9a9 (patch) | |
tree | 2c1b8adba20ff570dee69190393f6d3a3b0f5ed0 /glsa-201904-05.xml | |
parent | [ GLSA 201904-04 ] Poppler: Multiple vulnerabilities (diff) | |
download | glsa-0152d1c9b68b5870dfd6753490f2b652c783e9a9.tar.gz glsa-0152d1c9b68b5870dfd6753490f2b652c783e9a9.tar.bz2 glsa-0152d1c9b68b5870dfd6753490f2b652c783e9a9.zip |
[ GLSA 201904-05 ] BURP: Root privilege escalation
Signed-off-by: Aaron Bauman <bman@gentoo.org>
Diffstat (limited to 'glsa-201904-05.xml')
-rw-r--r-- | glsa-201904-05.xml | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/glsa-201904-05.xml b/glsa-201904-05.xml new file mode 100644 index 00000000..32f4490f --- /dev/null +++ b/glsa-201904-05.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201904-05"> + <title>BURP: Root privilege escalation</title> + <synopsis>A vulnerability was discovered in Gentoo's ebuild for BURP which + could lead to root privilege escalation. + </synopsis> + <product type="ebuild">burp</product> + <announced>2019-04-02</announced> + <revised count="1">2019-04-02</revised> + <bug>641842</bug> + <access>local</access> + <affected> + <package name="app-backup/burp" auto="yes" arch="*"> + <unaffected range="ge">2.1.32-r1</unaffected> + <vulnerable range="lt">2.1.32-r1</vulnerable> + </package> + </affected> + <background> + <p>A network backup and restore program.</p> + </background> + <description> + <p>It was discovered that Gentoo’s BURP ebuild does not properly set + permissions or place the pid file in a safe directory. Additionally, the + first set of patches did not completely address this. As such, a + revision has been made available that addresses all concerns of the + initial report. + </p> + </description> + <impact type="normal"> + <p>A local attacker could escalate privileges.</p> + </impact> + <workaround> + <p>Users should ensure the proper permissions are set as discussed in the + referenced bugs. + </p> + </workaround> + <resolution> + <p>All BURP users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-backup/burp-2.1.32-r1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-18285">CVE-2017-18285</uri> + </references> + <metadata tag="requester" timestamp="2019-03-27T01:35:48Z">BlueKnight</metadata> + <metadata tag="submitter" timestamp="2019-04-02T04:23:38Z">b-man</metadata> +</glsa> |