Bug 475452 - (CVE-2008-5397) CVE-2008-5397 tor: does not properly process User/Group configuration options (privilege escalation)
CVE-2008-5397 tor: does not properly process User/Group configuration options...
Status: CLOSED WORKSFORME
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
http://blog.torproject.org/blog/tor-0...
public=20081204,reported=20081208,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-12-09 04:52 EST by Jan Lieskovsky
Modified: 2008-12-09 08:35 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-12-09 05:23:09 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2008-12-09 04:52:17 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5397 to
the following vulnerability:

Tor before 0.2.0.32 does not properly process the (1) User and (2)
Group configuration options, which might allow local users to gain
privileges by leveraging unintended supplementary group memberships of
the Tor process.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5397
http://blog.torproject.org/blog/tor-0.2.0.32-released
http://www.securityfocus.com/bid/32648
http://secunia.com/advisories/33025
http://xforce.iss.net/xforce/xfdb/47101

Patch from Jacob Appelbaum
and Steven Murdoch (BTS 848 and 857):
https://svn.torproject.org/cgi-bin/viewcvs.cgi?rev=17255&view=rev
Comment 1 Jan Lieskovsky 2008-12-09 04:54:26 EST
This issue affects the versions of the tor package, as shipped 
with Fedora releases of 8,9 and 10. 

Please upgrade to latest upstream version of apply the above patch.
Comment 3 Tomas Hoger 2008-12-09 05:29:29 EST
(In reply to comment #2)
> All current Fedora versions are already updated to upstream version 0.2.0.23:

Bah, 0.2.0.32 that should be, of course...
Comment 4 Enrico Scholz 2008-12-09 08:35:52 EST
fwiw, this bug never affected any tor version shipped by fedora.
There was always a patch like

http://cvs.fedora.redhat.com/viewvc/rpms/tor/F-7/tor-0.1.1.26-setgroups.patch?revision=1.1&root=extras&view=markup

dropping supplementary groups.

Note You need to log in before you can comment on or make changes to this bug.