CVE-2010-0826: allows local users to obtain sensitive information via a symlink attack involving a setgid or setuid application that uses this module.

Related Vulnerabilities: CVE-2010-0826  

Debian Bug report logs - #577057
CVE-2010-0826: allows local users to obtain sensitive information via a symlink attack involving a setgid or setuid application that uses this module.

version graph

Reported by: Giuseppe Iuculano <iuculano@debian.org>

Date: Fri, 9 Apr 2010 09:33:01 UTC

Severity: critical

Tags: security

Fixed in version libnss-db/2.2.3pre1-3.2

Done: Aurelien Jarno <aurel32@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Piotr Roszatycki <dexter@debian.org>:
Bug#577057; Package libnss-db. (Fri, 09 Apr 2010 09:33:04 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <iuculano@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Piotr Roszatycki <dexter@debian.org>. (Fri, 09 Apr 2010 09:33:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <iuculano@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2010-0826: allows local users to obtain sensitive information via a symlink attack involving a setgid or setuid application that uses this module.
Date: Fri, 09 Apr 2010 11:26:12 +0200
Package: libnss-db
Severity: important
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libnss-db.

CVE-2010-0826[0]:
| The Free Software Foundation (FSF) Berkeley DB NSS module (aka
| libnss-db) 2.2.3pre1 reads the DB_CONFIG file in the current working
| directory, which allows local users to obtain sensitive information
| via a symlink attack involving a setgid or setuid application that
| uses this module.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0826
    http://security-tracker.debian.org/tracker/CVE-2010-0826


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAku+8rIACgkQNxpp46476arazQCdEeT99R+RjheufWMZGPStt86t
5swAniH/EMnFLJN+XkF0irBdpVBtiyEo
=smYk
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Piotr Roszatycki <dexter@debian.org>:
Bug#577057; Package libnss-db. (Fri, 01 Oct 2010 21:36:04 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Piotr Roszatycki <dexter@debian.org>. (Fri, 01 Oct 2010 21:36:05 GMT) (full text, mbox, link).


Message #10 received at 577057@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: dexter@debian.org
Cc: 577057@bugs.debian.org
Subject: Re: CVE-2010-0826: allows local users to obtain sensitive information via a symlink attack involving a setgid or setuid application that uses this module.
Date: Fri, 1 Oct 2010 23:34:00 +0200
On Fri, Apr 09, 2010 at 11:26:12AM +0200, Giuseppe Iuculano wrote:
> Package: libnss-db
> Severity: important
> Tags: security
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for libnss-db.
> 
> CVE-2010-0826[0]:
> | The Free Software Foundation (FSF) Berkeley DB NSS module (aka
> | libnss-db) 2.2.3pre1 reads the DB_CONFIG file in the current working
> | directory, which allows local users to obtain sensitive information
> | via a symlink attack involving a setgid or setuid application that
> | uses this module.
> 
> If you fix the vulnerability please also make sure to include the
> CVE id in your changelog entry.
> 
> For further information see:
> 
> [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0826
>     http://security-tracker.debian.org/tracker/CVE-2010-0826

What's the status? This is unfixed for nearly half a year now!

Cheers,
        Moritz




Severity set to 'critical' from 'important' Request was from Ondřej Surý <ondrej@sury.org> to control@bugs.debian.org. (Tue, 12 Apr 2011 16:27:03 GMT) (full text, mbox, link).


Reply sent to Aurelien Jarno <aurel32@debian.org>:
You have taken responsibility. (Wed, 04 May 2011 06:24:06 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <iuculano@debian.org>:
Bug acknowledged by developer. (Wed, 04 May 2011 06:24:06 GMT) (full text, mbox, link).


Message #17 received at 577057-close@bugs.debian.org (full text, mbox, reply):

From: Aurelien Jarno <aurel32@debian.org>
To: 577057-close@bugs.debian.org
Subject: Bug#577057: fixed in libnss-db 2.2.3pre1-3.2
Date: Wed, 04 May 2011 06:20:30 +0000
Source: libnss-db
Source-Version: 2.2.3pre1-3.2

We believe that the bug you reported is fixed in the latest version of
libnss-db, which is due to be installed in the Debian FTP archive:

libnss-db_2.2.3pre1-3.2.diff.gz
  to main/libn/libnss-db/libnss-db_2.2.3pre1-3.2.diff.gz
libnss-db_2.2.3pre1-3.2.dsc
  to main/libn/libnss-db/libnss-db_2.2.3pre1-3.2.dsc
libnss-db_2.2.3pre1-3.2_amd64.deb
  to main/libn/libnss-db/libnss-db_2.2.3pre1-3.2_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 577057@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <aurel32@debian.org> (supplier of updated libnss-db package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 04 May 2011 07:31:48 +0200
Source: libnss-db
Binary: libnss-db
Architecture: source amd64
Version: 2.2.3pre1-3.2
Distribution: unstable
Urgency: medium
Maintainer: Piotr Roszatycki <dexter@debian.org>
Changed-By: Aurelien Jarno <aurel32@debian.org>
Description: 
 libnss-db  - NSS module for using Berkeley Databases as a naming service
Closes: 548484 577057
Changes: 
 libnss-db (2.2.3pre1-3.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Build depends on libdb-dev (>> 4.6) instead of libdb4.6-dev.  Closes:
     #548484.
   * Fix security issue which allows to read arbitrary file contents
     (CVE-2010-0826), patch taken from Ubuntu. Closes: #577057.
Checksums-Sha1: 
 7fc3340a3c8df876b9e95f271b1e3f3777e02320 1307 libnss-db_2.2.3pre1-3.2.dsc
 4243f0a44642e6b6517af28a2513b648b0c29904 18551 libnss-db_2.2.3pre1-3.2.diff.gz
 756797386a5d62b4dcd66f496c74077216881237 29728 libnss-db_2.2.3pre1-3.2_amd64.deb
Checksums-Sha256: 
 d7847b0cdb4da5d601bf7c5dbb6943a60ecf70bd50ef78a27b6ba3e5cd370808 1307 libnss-db_2.2.3pre1-3.2.dsc
 b4f2d9cab5f26e0b05b6dfb1d17e54e9d1f16af13d355948fe42f8ac5956515a 18551 libnss-db_2.2.3pre1-3.2.diff.gz
 a7b8b773acc4d81da2a24516b832ae2d9dd23a01ea1d7e10d5a0bc57215f640a 29728 libnss-db_2.2.3pre1-3.2_amd64.deb
Files: 
 daf32e1b8f39dfee3d89a71b45ee3411 1307 admin standard libnss-db_2.2.3pre1-3.2.dsc
 4cc3d777041da5163d88732727f8a29d 18551 admin standard libnss-db_2.2.3pre1-3.2.diff.gz
 7d5036da15e0052109ffe6728d00a9e6 29728 admin standard libnss-db_2.2.3pre1-3.2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFNwOnnw3ao2vG823MRAkSiAJ9pftKt6Ut09BQxtBsUp+iUyXdBTgCggHfo
CIuNU4Z4UFo48nA6bKw6Uis=
=L279
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 05 May 2013 07:50:36 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:38:13 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.