*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Jamie Strandboge 
(jdstrand):

Binary package hint: mythtv

Mysql passwords are leaked on the command line, visible by any local
user running "ps".

See:
./debian/mythtv-database.config:            while ! echo "show databases;" | 
mysql --host="$HOST" --user="$USER" --password="$PASSWORD" >/dev/null 2>&1; do
./mythplugins/mythvideo/contrib/videometadata:     echo "UPDATE  videometadata 
SET coverfile=\"$THUMB_PATH\"  WHERE filename=\"${DATEI}\" ;" | mysql -u $USER 
--password=$PASSW -D $DATABASE -h $HOST
./mythplugins/mythvideo/contrib/videometadata:    echo "UPDATE  videometadata 
SET coverfile=\"$THUMB_PATH\"  WHERE filename=\"${DATEI}\" ;" | mysql -u $USER 
--password=$PASSW -D $DATABASE -h $HOST
./mythplugins/mythvideo/contrib/videometadata:echo "UPDATE  videometadata SET 
showlevel=$SHOWLEVEL  WHERE filename LIKE '$RATED_DIR/%' ;" | mysql -u $USER 
--password=$PASSW -D $DATABASE -h $HOST

and

./debian/mythtv-database.postinst:        mysql $SECURITY_INFO $database
./debian/mythtv-database.postinst:        mysql $SECURITY_INFO "$database" 
>/dev/null 2>&1; then
./debian/mythtv-database.postinst:        mysql $SECURITY_INFO "$database" 
>/dev/null 2>&1; then
./debian/mythtv-database.postinst:    SECURITY_INFO="--host=\"$hostname\" 
--user=\"$admin_username\" $admin_password"
./debian/mythtv-database.postinst:        mysql $SECURITY_INFO "$database" 
>/dev/null 2>&1; then
./debian/mythtv-database.postinst:        mysql $SECURITY_INFO "$database" 
>/dev/null 2>&1; then
./debian/mythtv-database.postinst:        
SECURITY_INFO="--defaults-file=/etc/mysql/debian.cnf"
./debian/mythtv-database.postinst:        SECURITY_INFO="--host=\"$hostname\" 
--user=\"$admin_username\" $admin_password"
./debian/mythtv-database.postinst:    if ! echo "SELECT NULL;" | mysql 
$SECURITY_INFO "$database" >/dev/null 2>&1; then
./debian/mythtv-database.postinst:        while ! echo "CREATE DATABASE 
$database;" | mysql $SECURITY_INFO ; do
./debian/mythtv-database.postinst:    if ! echo "SELECT value FROM settings 
LIMIT 1, 1;" | mysql $SECURITY_INFO "$database" >/dev/null 2>&1; then


The proper fix is to use a --defaults-file containing the password, per:
 * 
http://dev.mysql.com/doc/refman/5.1/en/option-files.html#option_general_defaults-file

** Affects: mythtv (Ubuntu)
     Importance: Undecided
         Status: New

-- 
passwords leaked on command line
https://bugs.launchpad.net/bugs/789356
You received this bug notification because you are a member of Ubuntu Bugs, 
which is a direct subscriber.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to