| Summary: | <net-misc/iodine-0.7.0-r1: Insecure file permissions on /etc/conf.d/iodined | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Christian Hoffmann <christian> |
| Component: | Default Configs | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | trivial | CC: | root, vostorga, zx2c4 |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | ~3 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Christian Hoffmann
2013-07-16 19:18:22 UTC
@maintainer(s), could you please adjust the permissions appropriately for the configuration file post install? It does contain passwords that are world readable. Bumped with hardened configuration file permissions: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=508426be9fae3be1f70cfb9e642b40d2e258a040 Cleanup: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=82d62d66c8eef722a36e6136398521d92d07c644 This was thoughtlessly analyzed. The solution committed is not adequate. /etc/conf.d/iodined may be chmodded to 600. It does not to be owned by nogroup, since it is parsed by /etc/init.d/iodined as root. After /etc/init.d/iodined reads /etc/conf.d/iodined, the invoked /usr/sbin/iodined drops privileges. I'll fix things and commit it to the tree. |