Package: libutempter0 Version: 1.1.5-4 Severity: normal Tags: security libutempter0 package contains a setgid helper binary, utempter, which is supposed to be used to modify utmp records on behalf of "semi-privileged" users. For this reason it is installed as setgid-utmp. And in order to restrict who can run it, the binary is placed into a subdirectory which is supposed to be accessible by members of a single group, also called utempter. This is, at least, how I interpret this whole thing.
However, libutempter0 package goes on to set proper group for the directory, but fails to set proper permissions, and the directory has regular 0755 permissions, even if owned by utempter group. So the "semi-privileged" part of the picture isn't enforced, and everyone is able to run the sgid helper and apparently mess up with utmp records. This is just my understanding, I might be wrong. But at any rate the resulting setup is quite unusual - we should either enforce the restrition (by removing "x" permission for "others" for this dir), or stop shipping the helper in a subdirectory, putting it directly into /usr/lib. If the former, I think statoverride mechanism shuold be used for this, instead of chgrp'ing the directory in postinst script. Adding `security' tag because this issue has possible security implications. Thanks, /mjt -- To UNSUBSCRIBE, email to debian-qt-kde-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20130728142945.15444.71592.reportbug@gandalf.local