Bug 881982 (CVE-2014-3981) - VUL-1: CVE-2014-3981: php53: symlink attack on the /tmp/phpglibccheck file
Summary: VUL-1: CVE-2014-3981: php53: symlink attack on the /tmp/phpglibccheck file
Status: RESOLVED WONTFIX
: 884993 (view as bug list)
Alias: CVE-2014-3981
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/99360/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-06-10 08:49 UTC by Johannes Segitz
Modified: 2016-04-27 20:17 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2014-06-10 08:49:41 UTC
acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file. 

References: 
https://bugzilla.redhat.com/show_bug.cgi?id=1104978
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3981
http://openwall.com/lists/oss-security/2014/06/06/12
https://bugs.php.net/bug.php?id=67390
Comment 2 SMASH SMASH 2014-06-10 09:00:16 UTC
Affected packages:

SLE-11-SP3: php53
Comment 3 Petr Gajdos 2014-07-01 07:23:55 UTC
*** Bug 884993 has been marked as a duplicate of this bug. ***
Comment 4 Petr Gajdos 2014-07-01 07:25:30 UTC
https://bugzilla.redhat.com/show_bug.cgi?id=1104978#c4
https://bugzilla.redhat.com/show_bug.cgi?id=1104978#c5

I think we do not support compiling from source.

Suggest to close WONTFIX.
Comment 5 Marcus Meissner 2014-09-01 14:00:17 UTC
we do not support that, correct, wontfix