reassign 407231 adduser
retitle 407231 adduser: with addgroup, users may gain system group access on 
package installation by coincidence
thanks

Quoting Leonard NorrgÄrd ([EMAIL PROTECTED]):
> Package: passwd
> Version: 1:4.0.18.1-6
> Severity: critical
> Tags: security
> Justification: root security hole
> 
> 
> An ordinary user may end up with group ownership of system files
> in the following scenario [2]:
> 
>  1. A user is added, and receives the user and group ids, <name>.
>  2. Later, a package is installed that asks for an identically named
>     system group to be created, using 'addgroup --system <name>'.
>  3. Addgroup returns with a success exit status, showing the message
>     'The group `<name>' already exists as a system group. Exiting.",
>     even though the pre-existing <name> group, as a group added for
>     a user has a non-system id (ie. outside the range 100-999 [1].
>  4. The user <name> now has access to all system files that are
>     installed for the <name> group.
> 
> The problem occurs because in /usr/sbin/addgroup, the code on/after
> line 247 to existing_group_ok fails to check for and handle
> the situation where the existing GID is outside of the system GID
> boundaries.
> 
> [1] http://www.debian.org/doc/debian-policy/ch-opersys.html#s9.2.2)
> [2] I discovered this while working on the packaging for kvm, which
>     will create a 'kvm' group, likely to collide with existing user
>     id:s on some systems.


Thanks for your detailed explanations and bug report. I won't go into
the details, essentially because this bug report is misdirected. At
first glance, you seem to be right and the bug seems easy to handle.

You identified the bug as a bug in the "addgroup" utility. However
"dpkg -S /usr/sbin/addgroup" will show you that this utility belongs
to the "adduser" package, not passwd.

I'm therefore reassigning this bug to adduser.

Again, thanks a lot for your care investigating this issue.


Attachment: signature.asc
Description: Digital signature

Reply via email to