reopen 645516
retitle 645516 hardlink: Security issue on changing trees
thanks

On Sun, Oct 16, 2011 at 05:24:17PM +0200, Julian Andres Klode wrote:
> On Sun, Oct 16, 2011 at 05:08:08PM +0200, Luciano Bello wrote:
> > Package: hardlink
> > Severity: grave
> > Tags: security
> > 
> > Hi Julian,
> >    A security problem in hardlink had been reported:
> > http://www.openwall.com/lists/oss-security/2011/10/15/2
> > 
> >    The report refers to Fedora. Can you check if any Debian version is 
> > affected?
> 
> It affects a version of hardlink written in C. Our version is
> written in Python. Both have the same name, but are implemented
> differently.

Well, they are implemented differently but still both affected
by the attack stated in CVE-2011-3632. The following patch will
be included in the next release of hardlink.

From fc4da208525366aba289c7a150eb8a7d304d2238 Mon Sep 17 00:00:00 2001
From: Julian Andres Klode <j...@debian.org>
Date: Tue, 28 Feb 2012 16:27:11 +0100
Subject: [PATCH 1/2] Document security issues (Closes: #645516, like
 CVE-2011-3632)

It seems that we are just as well affected by the same problem
as CVE-2011-3632 in the original hardlink.c tool.
---
 debian/changelog |    1 +
 hardlink.1       |    9 +++++++++
 2 files changed, 10 insertions(+), 0 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index 21922b7..1649e07 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -2,6 +2,7 @@ hardlink (0.1.2) UNRELEASED; urgency=low
 
   * Support files on the command line (Closes: #608864)
   * Mention duplicate and identical in the description (Closes: #619851)
+  * Document security issues (Closes: #645516, like CVE-2011-3632)
   * Upgrade to debhelper 9
   * Upgrade to Policy 3.9.3 and copyright-format 1.0
 
diff --git a/hardlink.1 b/hardlink.1
index 71e7632..83ce1c0 100644
--- a/hardlink.1
+++ b/hardlink.1
@@ -54,6 +54,15 @@ is used without \-\-exclude, only files matched by the 
pattern are included.
 .B hardlink
 takes one or more directories which will be searched for files to be linked.
 
+.SH BUGS
+.B hardlink
+assumes that the trees it operates on do not change during
+operation. If a tree does change, the result is undefined and potentially
+dangerous. For example, if a regular file is replaced by a device, hardlink
+may start reading from the device. If a component of a path is replaced by
+a symbolic link or file permissions change, security may be compromised. Do
+not run hardlink on a changing tree or on a tree controlled by another user.
+
 .SH AUTHOR
 The program hardlink and this manpage have been written by Julian Andres Klode,
 and are licensed under the MIT license. See the code of hardlink for further
-- 
1.7.9.1



-- 
Julian Andres Klode  - Debian Developer, Ubuntu Member

See http://wiki.debian.org/JulianAndresKlode and http://jak-linux.org/.

Attachment: pgpGKJgjQyA06.pgp
Description: PGP signature

Reply via email to