Package: wims
Version: 4.01c
Severity: serious
Tags: security

Hello Georges,

wims.postinst do:

      dpkg-statoverride --update --force --add root root 6755 $rootwrapper 
2>/dev/null

See policy 10.9.1. The use of `dpkg-statoverride'

  There is one type of situation, though, where calls to
  `dpkg-statoverride' would be needed in the maintainer scripts, and
  that involves packages which use dynamically allocated user or group ids.  

This is clearly not the case here: root is statically allocated, so you
should instead ship the program suid in the .deb.

But I really wonder if this file is necessary at all and whether this does not
create security issues. the source code is in wims/src/Misc/chroot.c
it does fun stuff like

int execuid=15999;
int execgid=15999;
...
    if(setregid(execgid,execgid)<0) goto abandon;
    if(setreuid(execuid,execuid)<0) goto abandon;

without any regard for the existence of an account with UID/GID 15999
and seems riddled with security issues.

Cheers,
-- 
Bill. <[email protected]>

Imagine a large red swirl here. 



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to