Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 430358 (CVE-2012-3457) - <net-analyzer/pnp4nagios-0.6.19-r1: world-readable process_perfdata.cfg may result in information disclosure (CVE-2012-3457)
Summary: <net-analyzer/pnp4nagios-0.6.19-r1: world-readable process_perfdata.cfg may r...
Status: RESOLVED FIXED
Alias: CVE-2012-3457
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://seclists.org/oss-sec/2012/q3/190
Whiteboard: C4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-08-07 21:19 UTC by Giuseppe
Modified: 2017-11-04 23:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Giuseppe 2012-08-07 21:19:02 UTC
Hi.

process_perfdata.cfg shouldn't be world-readable.
Event though not used per default, it contains the "KEY"
option which may be used (in alternative to "KEY_FILE") to hold
the Gearman shared secret,
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2012-08-12 12:09:18 UTC
CVE-2012-3457 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3457):
  PNP4Nagios 0.6 through 0.6.16 uses world-readable permissions for
  process_perfdata.cfg, which allows local users to obtain the Gearman shared
  secret by reading the file.
Comment 2 Christian Ruppert (idl0r) gentoo-dev 2012-09-11 20:38:14 UTC
Feel free to stabilize pnp4nagios-0.6.18.
Comment 3 Tim Sammut (RETIRED) gentoo-dev 2012-09-13 02:40:14 UTC
(In reply to comment #2)
> Feel free to stabilize pnp4nagios-0.6.18.

Hi, do we know if 0.6.18 is fixed? I cannot see anything relevant in the ChangeLog or repo.
Comment 4 Christian Ruppert (idl0r) gentoo-dev 2012-09-13 18:09:05 UTC
Hm, sorry.. Somehow I thought I've read that it has been fixed in .19 but apparently it hasn't.
I fixed it by hand though, in 0.6.19-r1.
Comment 5 Tim Sammut (RETIRED) gentoo-dev 2012-09-13 18:20:18 UTC
Great, thank you.

Arches, please test and mark stable:
=net-analyzer/pnp4nagios-0.6.19-r1
Target keywords : "amd64 ppc ppc64 x86"
Comment 6 Agostino Sarubbo gentoo-dev 2012-09-14 14:20:29 UTC
amd64 stable
Comment 7 Andreas Schürch gentoo-dev 2012-09-17 08:13:44 UTC
x86 done
Comment 8 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2012-09-26 15:28:26 UTC
ppc64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2012-11-29 17:01:08 UTC
ppc stable
Comment 10 Sean Amoss (RETIRED) gentoo-dev Security 2012-11-29 17:06:22 UTC
Thanks, everyone.

Closing noglsa for C4 issue.
Comment 11 Larry the Git Cow gentoo-dev 2017-11-04 23:40:09 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=184ae2c637ba60cd8f65d33c9098a2f4a079b4dc

commit 184ae2c637ba60cd8f65d33c9098a2f4a079b4dc
Author:     Michael Orlitzky <mjo@gentoo.org>
AuthorDate: 2017-11-02 17:08:14 +0000
Commit:     Michael Orlitzky <mjo@gentoo.org>
CommitDate: 2017-11-04 23:37:20 +0000

    net-analyzer/pnp4nagios: new revision with a better fix for CVE-2012-3457.
    
    In CVE-2012-3457, it was reported that one particular file should not
    be world-readable. To fix that, our ebuild made all of /etc/pnp
    unreadable; that made other permissions issues difficult to work
    around. This r2 sets o-rwx only on /etc/pnp/process_perfdata.cfg.
    
    Bug: https://bugs.gentoo.org/430358
    Package-Manager: Portage-2.3.8, Repoman-2.3.3

 ...0.6.26-r1.ebuild => pnp4nagios-0.6.26-r2.ebuild} | 21 +++++++--------------
 1 file changed, 7 insertions(+), 14 deletions(-)}