Package: coreutils
Version: 5.2.1-2
Severity: important
Tags: security

Our coreutils seems to be vulnerable to the problem described in
CAN-2005-1039.

http://www.securityfocus.com/archive/1/395489

A quick strace of "mkdir -m 400 foo" shows the problem:

mkdir("foo", 0400)                      = 0
chmod("foo", 0400)                      = 0

So if this is run in a directory where the attacker has access, such as
a group writable directory (as commonly used for teams in eg, the Debian
project; on alioth, etc), then the attacker can race between the mkdir
and chmod calls, (re)moving the new directory and replacing it with a
symlink to a file or directory owned by the user who ran mkdir. The
chmod will then follow the symlink and act on that directory. And
similar for the other commands.

A fix would be to create the directory/device with the right perms
and not chmod it again afterwards.

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to