Package: unattended-upgrades
Version: 0.79.5
Severity: normal
Tags: security
/var/log/unattended-upgrades/ is readable by all, so when this package is
run on a multi-user system, non-admin users can trawl the upgrade logs
for interesting information.
I don't know what they might find.. Which is the concern. When writing a
postinst script, the assumption is probably that only an admin, or
possibly a shoulder-surfer might see its output. So I'd not be surprised
if some of them leak information that is in some way sensative, though
probably not password-level sensitive.
Ah, let's pick on one of my own packages -- when etckeeper is installed,
it makes commits of changes in /etc and allows git to display its usual
summary of changes. So the log can contain something like this:
[master d7acbf4] saving uncommitted changes in /etc prior to apt run
2 files changed, 317 insertions(+)
create mode 100644 ssl/private/apache.pem
create mode 100644 ssl/certs/apache.pem
.. Exposing the contents of directories that normal users
cannot see inside of. I would not worry much if a shoulder-surfer saw that,
but it's worrying to think that a user could extract all such messages from
all the upgrade logs and combine them to facilitate other attacks.
For example, in this case, a wily attacker might notice that I seem to
accidentially have an insecure o+r mode on the apache ssl cert, which is
protected only by the mode of /etc/ssl/private. Now they can look for a
security hole that allows hard linking to arbitrary files as root..
Any reason not to make the directory 750 root.adm?
--
see shy jo
signature.asc
Description: Digital signature