Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 200506-08 ] GNU shtool, ocaml-mysql: Insecure temporary file creation
Date: Sat, 11 Jun 2005 16:58:03
Message-Id: 42AB0F45.4000704@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200506-08
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: GNU shtool, ocaml-mysql: Insecure temporary file creation
9 Date: June 11, 2005
10 Bugs: #93782, #93784
11 ID: 200506-08
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 GNU shtool and ocaml-mysql are vulnerable to symlink attacks,
19 potentially allowing a local user to overwrite arbitrary files.
20
21 Background
22 ==========
23
24 GNU shtool is a compilation of small shell scripts into a single shell
25 tool. The ocaml-mysql package includes the GNU shtool code.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-util/shtool < 2.0.1-r2 >= 2.0.1-r2
34 2 dev-ml/ocaml-mysql < 1.0.3-r1 >= 1.0.3-r1
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 Eric Romang has discovered that GNU shtool insecurely creates temporary
43 files with predictable filenames (CAN-2005-1751). On closer inspection,
44 Gentoo Security discovered that the shtool temporary file, once
45 created, was being reused insecurely (CAN-2005-1759).
46
47 Impact
48 ======
49
50 A local attacker could create symbolic links in the temporary files
51 directory, pointing to a valid file somewhere on the filesystem. When a
52 GNU shtool script is executed, this would result in the file being
53 overwritten with the rights of the user running the script, which could
54 be the root user.
55
56 Workaround
57 ==========
58
59 There is no known workaround at this time.
60
61 Resolution
62 ==========
63
64 All GNU shtool users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=dev-util/shtool-2.0.1-r2"
68
69 All ocaml-mysql users should upgrade to the latest version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose ">=dev-ml/ocaml-mysql-1.0.3-r1"
73
74 References
75 ==========
76
77 [ 1 ] CAN-2005-1751
78 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751
79 [ 2 ] CAN-2005-1759
80 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1759
81
82 Availability
83 ============
84
85 This GLSA and any updates to it are available for viewing at
86 the Gentoo Security Website:
87
88 http://security.gentoo.org/glsa/glsa-200506-08.xml
89
90 Concerns?
91 =========
92
93 Security is a primary focus of Gentoo Linux and ensuring the
94 confidentiality and security of our users machines is of utmost
95 importance to us. Any security concerns should be addressed to
96 security@g.o or alternatively, you may file a bug at
97 http://bugs.gentoo.org.
98
99 License
100 =======
101
102 Copyright 2005 Gentoo Foundation, Inc; referenced text
103 belongs to its owner(s).
104
105 The contents of this document are licensed under the
106 Creative Commons - Attribution / Share Alike license.
107
108 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature