blob: 210e00bf4fd8f5da5f3bfcb5c6c10c4841e8690d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-12">
<title>rsnapshot: Local privilege escalation</title>
rsnapshot allows a local user to take ownership of local files, resulting
in privilege escalation.
<product type="ebuild">rsnapshot</product>
<announced>April 13, 2005</announced>
<revised>December 30, 2007: 05</revised>
<package name="app-backup/rsnapshot" auto="yes" arch="*">
<unaffected range="ge">1.2.1</unaffected>
<unaffected range="rge">1.1.7</unaffected>
<vulnerable range="lt">1.2.1</vulnerable>
rsnapshot is a filesystem snapshot utility based on rsync, allowing
local and remote systems backups.
The copy_symlink() subroutine in rsnapshot follows symlinks when
changing file ownership, instead of changing the ownership of the
symlink itself.
<impact type="high">
Under certain circumstances, local attackers can exploit this
vulnerability to take ownership of arbitrary files, resulting in local
privilege escalation.
The copy_symlink() subroutine is not called if the cmd_cp parameter has
been enabled.
All rsnapshot users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose app-backup/rsnapshot</code>
<uri link="">rsnapshot Security Advisory 001</uri>
<uri link="">CVE-2005-1064</uri>
<metadata tag="requester" timestamp="Mon, 11 Apr 2005 07:57:07 +0000">
<metadata tag="bugReady" timestamp="Mon, 11 Apr 2005 21:22:40 +0000">
<metadata tag="submitter" timestamp="Wed, 13 Apr 2005 08:59:16 +0000">