Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Register
  • Sign in
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Graph
    • Compare revisions
  • Issues 663
    • Issues 663
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 300
    • Merge requests 300
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • alpinealpine
  • aportsaports
  • Issues
  • #12539
Closed
Open
Issue created Mar 22, 2021 by Kevin Daudt@kdaudt💻Owner5 of 5 checklist items completed5/5 checklist items

haserl: information disclosure due to setuid binaries (CVE-2021-29133)

Lack of verification in haserl, a component of Alpine Linux Configuration Framework, in version 0.9.35 an below, allows local users to read the contents of any file on the filesystem.

Affected versions

  • v0.9.35 and below

Fixed in version

  • v0.9.36

References

  • https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29133
  • https://nvd.nist.gov/vuln/detail/CVE-2021-29133
  • https://twitter.com/steaIth/status/1364940271054712842
  • https://github.com/rapid7/metasploit-framework/pull/14833
  • #12491 (closed)

Branches

  • master haserl-0.9.36-r0 (9ed42b36)
  • 3.13-stable haserl-0.9.36-r0 (c82aabb0)
  • 3.12-stable haserl-0.9.36-r0 (88cf7914)
  • 3.11-stable haserl-0.9.36-r0 (4f43aaca)
  • 3.10-stable haserl-0.9.36-r0 (691d020d)
Edited Mar 30, 2021 by Kevin Daudt
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking