diff options
author | simon <simon@FreeBSD.org> | 2005-04-12 16:24:48 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-04-12 16:24:48 +0800 |
commit | 48b207a8784fe41ed318dc94828066018959a9e5 (patch) | |
tree | 3fc4cde6e0d12d4c87162a468ed33851d079c909 /security | |
parent | 8bc697940643b0d63687c7af39e53ab6db34821a (diff) | |
download | freebsd-ports-gnome-48b207a8784fe41ed318dc94828066018959a9e5.tar.gz freebsd-ports-gnome-48b207a8784fe41ed318dc94828066018959a9e5.tar.zst freebsd-ports-gnome-48b207a8784fe41ed318dc94828066018959a9e5.zip |
Fix and document insecure temporary file handling in portupgrade.
Security: CAN-2005-0610
Security: http://vuxml.FreeBSD.org/22f00553-a09d-11d9-a788-0001020eed82.html
Approved by: erwin (mentor), maintainer timeout
OK'ed by: portmgr
Reviewed by: nectar
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 318940a8f7af..0a202a190347 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,57 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="22f00553-a09d-11d9-a788-0001020eed82"> + <topic>portupgrade -- insecure temporary file handling + vulnerability</topic> + <affects> + <package> + <name>portupgrade</name> + <range><lt>20041226_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Simon L. Nielsen discovered that portupgrade handles + temporary files in an insecure manner. This could allow an + unprivileged local attacker to execute arbitrary commands or + overwrite arbitrary files with the permissions of the user + running portupgrade, typically root, by way of a symlink + attack.</p> + <p>The following issues exist where the temporary files are + created, by default in the world writeable directory + /var/tmp, with the permissions of the user running + portupgrade:</p> + <ul> + <li>pkg_fetch download packages with a predictable local + filename allowing a local attacker to overwrite arbitrary + local files or potentially replace the downloaded package + after download but before install with a package with + malicious content, allowing the attacker to run arbitrary + commands.</li> + <li>portupgrade will, when upgrading ports/packages, write + the old package to a predictable temporary file, allowing + an attacker to overwrite arbitrary files via a symlink + attack.</li> + <li>portupgrade will <q>touch</q> a temporary temporary file + with a constant filename (pkgdb.fixme) allowing an + attacker to create arbitrary zero-byte files via a symlink + attack.</li> + </ul> + <p>A workaround for these issues is to set the + <code>PKG_TMPDIR</code> environment variable to a directory + only write-able by the user running portupgrade.</p> + </body> + </description> + <references> + <cvename>CAN-2005-0610</cvename> + </references> + <dates> + <discovery>2005-04-12</discovery> + <entry>2005-04-12</entry> + </dates> + </vuln> + <vuln vid="ecf68408-a9f5-11d9-a788-0001020eed82"> <topic>gaim -- jabber remote crash</topic> <affects> |