Summary: | www-servers/varnish: world-readable logdir (CVE-2013-0345) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness, idl0r |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/02/22/14 | ||
Whiteboard: | B4 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() This should be fixed in varnish-4.0.0-r1. Is the vulnerability present in 3.0.X? Or is it only 4.0.X? If it is 3.0.X we will need to stabilize. CVE-2013-0345 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0345): varnish 3.0.3 uses world-readable permissions for the /var/log/varnish/ directory and the log files in the directory, which allows local users to obtain sensitive information by reading the files. NOTE: some of these details are obtained from third party information. It is already fixed, it seems (in our tree too). Added to existing glsa draft. Please re-verify that this is indeed fixed, I'm seeing -rw-r--r-- 1 root root 5 Jun 29 13:17 access.log still doing a fresh install of www-servers/varnish-3.0.5-r3 in a VM. (In reply to Christian Ruppert (idl0r) from comment #1) > This should be fixed in varnish-4.0.0-r1. This issue was resolved and addressed in GLSA 201412-30 at http://security.gentoo.org/glsa/glsa-201412-30.xml by GLSA coordinator Mikle Kolyada (Zlogene). |