GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Jul 12, 2009 11:26 pm Post subject: [ GLSA 200907-10 ] Syslog-ng: Chroot escape |
|
|
Gentoo Linux Security Advisory
Title: Syslog-ng: Chroot escape (GLSA 200907-10)
Severity: low
Exploitable: local
Date: July 12, 2009
Bug(s): #247278
ID: 200907-10
Synopsis
Syslog-ng does not properly initialize its chroot jail allowing for an
escape if a separate vulnerability in Syslog-ng is exploited.
Background
Syslog-ng is a flexible and scalable system logger.
Affected Packages
Package: app-admin/syslog-ng
Vulnerable: < 2.1.3
Unaffected: >= 2.0.10 < 2.0.11
Unaffected: >= 2.1.3
Architectures: All supported architectures
Description
Florian Grandel reported that Syslog-ng does not call chdir() before
chroot() which leads to an inherited file descriptor to the current
working directory.
Impact
A local attacker might exploit a separate vulnerability in Syslog-ng
and use this vulnerability to escape the chroot jail.
Workaround
There is no known workaround at this time.
Resolution
All Syslog-ng 2.0 users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.0.10" |
All Syslog-ng 2.1 users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.1.3" |
References
CVE-2008-5110
Last edited by GLSA on Sat Jul 19, 2014 4:28 am; edited 2 times in total |
|