Bug 1516915 (CVE-2017-15288) - CVE-2017-15288 scala: Privilege escalation in Scala compilation daemon
Summary: CVE-2017-15288 scala: Privilege escalation in Scala compilation daemon
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-15288
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1516916
Blocks: 1516920
TreeView+ depends on / blocked
 
Reported: 2017-11-23 14:54 UTC by Pedro Sampaio
Modified: 2021-02-17 01:12 UTC (History)
24 users (show)

Fixed In Version: Scala 2.10.7, Scala 2.11.12, Scala 2.12.4
Clone Of:
Environment:
Last Closed: 2018-04-27 18:21:46 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2017-11-23 14:54:59 UTC
A flaw was found in Scala versions 2.1.6-2.10.6; 2.11.0-2.11.11; 2.12.0-2.12.3. An insecure use of temporary files may permit privilege escalation through the compile daemon leading to code execution and arbitrary class files writing as the user that started the daemon.

Upstream bug:

https://github.com/scala/scala/pull/6108

Upstream patch:

https://github.com/scala/scala/pull/6108/commits/b64ad85d1cfdfff29d0836a66736d6d2b0830c0e

References:

http://scala-lang.org/news/security-update-nov17.html

Comment 1 Pedro Sampaio 2017-11-23 14:55:57 UTC
Created scala tracking bugs for this issue:

Affects: fedora-all [bug 1516916]

Comment 2 Dhiru Kholia 2018-01-23 06:58:16 UTC
Mitigation:

1. Use "scala -nocompdaemon MyScript.scala" rather than "scala MyScript.scala" to disable the implicit startup and use of the daemon.

2. Avoid explicitly starting fsc.

This text is borrowed from the upstream security advisory.


Note You need to log in before you can comment on or make changes to this bug.