Package: ldap-git-backup
Version: 1.0.3-2
Severity: critical
Tags: security fixed-upstream pending
Justification: root security hole

Citing from RT#4170 to have a public bug report to refer to:

Hans Spaans wrote:
> On a default system the directory /var/backups/ldap is created with
> permissions root:root 0755. This exposes all files in this directory
> to be readable by any process on the system and some of those files
> contain password hashes which are part of the LDAP-dump. Reducing
> the permission to root:root 0700 should resolve the issue.

Yves-Alexis Perez wrote:
> As ldap-git-backup is not in stable or testing, we won't issue a
> DSA.
>
> Please use CVE-2013-1425 for this issue (local information
> disclosure).

Upstream fixed the issue at
https://github.com/elmar/ldap-git-backup/commit/a90f3217fce87962db82d212f73af70693087124

                Regards, Axel
-- 
 ,''`.  |  Axel Beckert <a...@debian.org>, http://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE
  `-    |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to