Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1044846 - (CVE-2013-7172) CVE-2013-7172 libiodbc: insecure RPATH in certain binaries
CVE-2013-7172 libiodbc: insecure RPATH in certain binaries
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20131217,repor...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2013-12-19 00:41 EST by Murray McAllister
Modified: 2015-07-31 07:57 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-12-19 00:42:56 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Murray McAllister 2013-12-19 00:41:58 EST
It was reported that the iodbctest and iodbctestw tools provided by the libiodbc package had an insecure RPATH (/tmp/) entry:

http://seclists.org/bugtraq/2013/Dec/93

This could lead to arbitrary code execution with the privileges of the user running the affected tools.

This issue did not affect the libiodbc packages in Fedora or EPEL, as the packages are built in /buildir/ and not /tmp/.

CVE request: http://seclists.org/oss-sec/2013/q4/525
Comment 1 Murray McAllister 2013-12-19 22:45:15 EST
CVE-2013-7172 was assigned to this issue: http://seclists.org/oss-sec/2013/q4/527
Comment 2 Rex Dieter 2013-12-20 14:09:22 EST
As an addendum to comment #1 about fedora/epel packages not being vulnerable, we explicitly delete the rpaths from the binaries in question as part of the build process (using chrpath --delete)

Note You need to log in before you can comment on or make changes to this bug.