Your message dated Thu, 08 Sep 2005 11:32:06 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#310757: fixed in davfs2 0.2.4-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 25 May 2005 18:51:42 +0000
>From [EMAIL PROTECTED] Wed May 25 11:51:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from jade.metnet.navy.mil (mail.metnet.navy.mil) [192.16.167.28] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1Db0yk-0007TG-00; Wed, 25 May 2005 11:51:42 -0700
Received: (qmail 12980 invoked from network); 25 May 2005 18:51:10 -0000
Received: from unknown (HELO localhost.localdomain) (10.100.105.92)
  by mail.metnet.navy.mil with SMTP; 25 May 2005 18:51:10 -0000
Received: from andrew by localhost.localdomain with local (Exim 4.50)
        id 1Db0yE-0000MO-FX; Wed, 25 May 2005 11:51:10 -0700
Date: Wed, 25 May 2005 11:51:10 -0700
From: Andrew Pimlott <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: davfs2: doesn't enforce permissions
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 3.12
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: davfs2
Version: 0.2.3-2
Severity: grave
Tags: security
Justification: user security hole

It appears that davfs2 does not enforce unix permissions.  I just
mounted a DAV share as root.  When I list permissions in the root of the
mount, I see

    % ls -ld .
    drwxr-xr-x  1 root root 512 2005-05-25 11:43 .
    % ls -l   
    total 950
    -rwxr-xr-x  0 root root      6 2005-05-25 11:43 file
    drwxr-xr-x  1 root root    512 2005-05-10 05:18 dir

However, as a regular user, I can create and modify files with no
restrictions.  For example "touch foo" and "echo hello > file" both work
fine.  I also tried mounting with mode=0700, and nothing changed, not
even the permissions displayed.  So it appears that there is no way to
restrict access to the mounted DAV share.

Also, on a possibly related note, I see that if I create a file with
"touch foo", foo has the permissions

    -rw-rw-r--  0 root root      0 2005-05-25 11:48 foo

However, if I unmount and remount, then the permissions revent to

    -rwxr-xr-x  0 root root      0 2005-05-25 11:48 foo

Andrew

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-2-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages davfs2 depends on:
ii  libc6                      2.3.2.ds1-22  GNU C Library: Shared libraries an
ii  libneon24                  0.24.7.dfsg-2 An HTTP and WebDAV client library
ii  libssl0.9.7                0.9.7g-1      SSL shared libraries
ii  libxml2                    2.6.16-7      GNOME XML library
ii  zlib1g                     1:1.2.2-4     compression library - runtime

-- no debconf information

---------------------------------------
Received: (at 310757-close) by bugs.debian.org; 8 Sep 2005 18:42:15 +0000
>From [EMAIL PROTECTED] Thu Sep 08 11:42:15 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EDRBu-0002sD-00; Thu, 08 Sep 2005 11:32:06 -0700
From: Luciano Bello <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#310757: fixed in davfs2 0.2.4-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 08 Sep 2005 11:32:06 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: davfs2
Source-Version: 0.2.4-1

We believe that the bug you reported is fixed in the latest version of
davfs2, which is due to be installed in the Debian FTP archive:

davfs2_0.2.4-1.diff.gz
  to pool/main/d/davfs2/davfs2_0.2.4-1.diff.gz
davfs2_0.2.4-1.dsc
  to pool/main/d/davfs2/davfs2_0.2.4-1.dsc
davfs2_0.2.4-1_i386.deb
  to pool/main/d/davfs2/davfs2_0.2.4-1_i386.deb
davfs2_0.2.4.orig.tar.gz
  to pool/main/d/davfs2/davfs2_0.2.4.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luciano Bello <[EMAIL PROTECTED]> (supplier of updated davfs2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  1 Aug 2005 21:41:35 -0300
Source: davfs2
Binary: davfs2
Architecture: source i386
Version: 0.2.4-1
Distribution: unstable
Urgency: high
Maintainer: Luciano Bello <[EMAIL PROTECTED]>
Changed-By: Luciano Bello <[EMAIL PROTECTED]>
Description: 
 davfs2     - mount a WebDAV resource as a regular file system
Closes: 303533 310757 311286
Changes: 
 davfs2 (0.2.4-1) unstable; urgency=high
 .
   * New upstream version 0.2.4.
     - Solve CAN-2005-1774 .Permit users to mount their owns resources,
       considering the right permissions (closes: Bug#310757).
     - Configuration is allocated in a config file.
     - Support for SSL certificates.
   * The source doesn't unnecessary build libraries any more.
   * Support for URLs with spaces are included now (closes: Bug#311286).
   * Support for kernels 2.4 and 2.6 through a script wrapper
     (closes: Bug#303533).
Files: 
 a8d9bc7e674e40c1648420e3a38b0d0a 639 utils extra davfs2_0.2.4-1.dsc
 f8f76634ddd7a26f0f277f86262887b6 141438 utils extra davfs2_0.2.4.orig.tar.gz
 888cda19333b2a97f7f4569762fd417e 31024 utils extra davfs2_0.2.4-1.diff.gz
 70cf1a0ccc14e7f809b77b898638545b 53652 utils extra davfs2_0.2.4-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDIH+25UTeB5t8Mo0RAnrHAJ0dw1H5Wwh5jyvm5iVcjT6XCRU2UgCbBliu
sBuymPE9xRNzop0VJtUWeKk=
=ryd5
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to