On Tue, 27 May 2025 at 14:43:44 -0700, Alan Coopersmith forwarded:
The vulnerability is exploitable when:

  1. A user passes the key specification in traditional format (
  +0.18446744073709551615R)

How would an attacker trigger this? Is this only exploitable if the attacker has control over the sort key (equivalent of -k), *and* the key is passed in to sort(1) via the traditional +POS syntax rather than the POSIX -k option?

I ask because, if there's no reasonable scenario where this is attacker-triggerable, then this would not be a security vulnerability but instead just an ordinary bug (which of course is worth fixing, but doesn't have to come with the urgency and overhead of dealing with a security vulnerability). Assigning CVE numbers to ordinary bugs dilutes their value for tracking genuinely exploitable vulnerabilities.

I would normally have assumed that sort(1) is meant to be resistant to attacker-supplied input (stdin or the contents of the file(s) given on the command-line), but not intended to be given untrusted and potentially attacker-chosen options?

In particular, if an attacker can give sort(1) completely arbitrary command-line options, then that's already an obvious arbitrary file overwrite via the -o option - which I would consider to be sort(1) operating as designed (not a vulnerability, it's only doing what its documentation says it will do), and instead a vulnerability in whatever higher-level component is providing it with attacker-chosen command-line options.

Thanks,
    smcv

Reply via email to