[Secure-testing-team] Bug#543785: backintime-common: backintime make world readable file in backup when it remove old backup
Rémi Vanicat
vanicat at debian.org
Wed Aug 26 22:04:49 UTC 2009
Package: backintime-common
Version: 0.9.26-2
Severity: grave
Tags: security
Justification: user security hole
When asking backintime to remove an old backup, it first change mode
of all file of the backup to 777, allowing potentially every local
user to read and modify those before they are deleted (and this could take some
time).
Worst still, if a file is shared between several backup, as the file's
mode are also shared, it stay world readable and writable in those
other backup.
Note that one do not need to change the mode of a file to suppress it:
only the mode of the directory need to be changed. The other advantage
to change the mode only for directories is that they are not shared
between backup, so the changed mode don't stay for long period of
time.
-- System Information:
Debian Release: squeeze/sid
APT prefers transitional
APT policy: (500, 'transitional'), (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.30.4 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages backintime-common depends on:
ii cron 3.0pl1-106 process scheduling daemon
ii python 2.5.4-2 An interactive high-level object-o
ii python-support 1.0.3 automated rebuilding support for P
ii rsync 3.0.6-1 fast remote file copy program (lik
backintime-common recommends no packages.
backintime-common suggests no packages.
-- no debconf information
More information about the Secure-testing-team
mailing list