Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 79844 - app-arch/cpio possible permission issue
Summary: app-arch/cpio possible permission issue
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://savannah.gnu.org/patch/index.p...
Whiteboard: A4 [noglsa] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2005-01-28 07:07 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2005-02-06 18:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-01-28 07:07:24 UTC
Candidate: CAN-1999-1572
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1572
Reference: MISC:http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391

cpio on FreeBSD 2.1.0, and possibly other operating systems, uses a 0
umask when creating files using the -O (archive) option, which creates
the files with mode 0666 and allows local users to read or overwrite
those files.
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-01-28 07:07:53 UTC
Vapier please check and advise.
Comment 2 SpanKY gentoo-dev 2005-01-28 20:20:27 UTC
example test shows same misbehavior with cpio-2.6
Comment 3 SpanKY gentoo-dev 2005-01-28 20:53:43 UTC
2.6-r1 has the tiny patch to fix this ... i guess if we want to consider this as a serious issue, we'll need the arch guys come in and push 2.6-r1 to stable ... we've had 2.5.90 since Dec 17 2004 and the actual 2.6 release since Jan 03 2005 ... all known issues were fixed with the 2.6 release so it should be a sane candidate for stable

i also filed a bug with upstream GNU cpio to have this added upstream
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-01-28 23:13:07 UTC
Thx spanKY, please mark stable for sh.

Arches please test and mark 2.6-r1 stable.
Comment 5 Markus Rothe (RETIRED) gentoo-dev 2005-01-29 00:48:41 UTC
stable on ppc64
Comment 6 Michael Hanselmann (hansmi) (RETIRED) gentoo-dev 2005-01-29 02:15:54 UTC
Stable on ppc.
Comment 7 Jan Brinkmann (RETIRED) gentoo-dev 2005-01-29 07:51:40 UTC
stable on amd64
Comment 8 Jason Wever (RETIRED) gentoo-dev 2005-01-29 09:43:44 UTC
Stable on sparc.
Comment 9 SpanKY gentoo-dev 2005-01-29 19:51:20 UTC
arm/hppa/ia64/s390/sh/x86 stable
Comment 10 Bryan Østergaard (RETIRED) gentoo-dev 2005-01-30 11:34:53 UTC
Stable on alpha.
Comment 11 Thierry Carrez (RETIRED) gentoo-dev 2005-01-31 13:42:46 UTC
Please vote on GLSA... I don't think one is needed. Yes it's a bug leading to errors but I don't see where it's a vulnerability...
Comment 12 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-02-02 11:03:18 UTC
Debian released an advisory:

http://www.debian.org/security/2005/dsa-664
Comment 13 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-02-04 04:15:04 UTC
Ubuntu released one too:

http://www.ubuntulinux.org/support/documentation/usn/usn-75-1

Security please vote!
Comment 14 Matthias Geerdsen (RETIRED) gentoo-dev 2005-02-04 04:21:22 UTC
I slightly tend towards a GLSA, especially since Debian and Ubuntu published one and a CAN (CAN-1999-1572) exists too. Although it's not too big of a thing.
So maybe half a vote towards a GLSA ;-)
Comment 15 Luke Macken (RETIRED) gentoo-dev 2005-02-04 05:10:20 UTC
I give 1/4 of a vote towards a GLSA.

So vorlon and I now have 3/4's of a real vote!
Comment 16 Thierry Carrez (RETIRED) gentoo-dev 2005-02-04 08:50:47 UTC
Let's consider that lewk+vorlon makes one YES, and my vote one NO. jaervosz, you decide (after all, it's your draft).
Comment 17 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-02-04 12:23:46 UTC
I won't cast a vote here -> closing without GLSA.

If anyone disagree feel free to reopen.
Comment 18 Joshua Kinard gentoo-dev 2005-02-06 18:38:03 UTC
mips stable.