Package: bzip2
Version: 1.0.2-5
Severity: normal
Tags: security

According to
http://marc.theaimsgroup.com/?l=bugtraq&m=111229375217633&w=2:

  If a malicious local user has write access to a directory in which a
  target user is using bzip2 to extract or compress a file to then a
  TOCTOU bug can be exploited to change the permission of any file
  belonging to that user.

  On decompressing bzip2 copies the permissions from the compressed
  bzip2 file to the
  uncompressed file. However there is a gap between the uncompressed
  file being written (and it's file handler being close) and the
  permissions of the file being changed.

  During this gap a malicious user can remove the decompressed file and
  replace it with a hard-link to another file belonging to the user.
  bzip2 will then change the permissions on the  hard-linked file to be
  the same as that of the bzip2 file.

This is a low impact security hole as it requires a local user to
exploit a race, and bzip2 must be run in a directory that the attacker
can write to (and +t directories probably don't work), and all you
can do is change a file permissions. 

If you fix this hole, please refer to CAN-2005-0953 in your changelog.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages bzip2 depends on:
ii  libbz2-1.0                  1.0.2-5      high-quality block-sorting file co
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an

-- no debconf information

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to