[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #2694 [Tor bundles/installation]: Local privilege escalation vulnerability in our rpms



#2694: Local privilege escalation vulnerability in our rpms
--------------------------------------+-------------------------------------
 Reporter:  arma                      |          Owner:  erinn
     Type:  defect                    |         Status:  new  
 Priority:  normal                    |      Milestone:       
Component:  Tor bundles/installation  |        Version:       
 Keywords:                            |         Parent:       
   Points:                            |   Actualpoints:       
--------------------------------------+-------------------------------------

Comment(by weasel):

 Replying to [comment:2 rransom]:

 > > That -R will let an attacker who gets control of the _tor user get
 control of other files on the system.
 >
 > Not on any system with a recent version of GNU coreutils.

 What changed, and when?

 > > The fix is to remove the -R from that line.
 >
 > Or to add the -P option specified in POSIX 2001.  (This is the default
 behaviour of chown in GNU coreutils 8.5.)

 That takes care of symlinks.  What about hardlinks?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2694#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs