On 08/13/2011 12:56 PM, Mike O'Connor wrote:
> Package: dtc-common
> Severity: critical
> Tags: security
> Justification: root security hole
> 
> 
> the install script gives sudo access to the dtc user (the user that is running
> apache) unrestricted access to chrootuid, which essentially gives root access
> to the dtc account:
> 
> root@testdtc:/var/lib/dtc/etc# su - dtc
> $ whoami
> dtc
> $ sudo chrootuid / root /bin/bash
> root@testdtc:/# whoami
> root
> root@testdtc:/# wc -l /etc/shadow
> 27 /etc/shadow
> rot@testdtc:/# grep dtc /etc/sudoers
> Defaults:dtc !set_logname
> dtc      ALL= NOPASSWD: /usr/bin/chrootuid *

But users are jailed in a chroot when they run web scripts or shell
access, so I don't see how this can happen. In their chroot they can't
do that.

Thomas



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to