An information disclosure flaw was found in the way libuser, an user and group account administration library, performed movement of user's home directory. Previously, during the move the ownership of all the (sub)entries present in directory tree, to be moved, were changed from privileged user account to the effective user id of the user, the home directory should belong to. A local attacker could use this flaw to conduct hardlink attacks and possibly obtain unauthorized access to arbitrary system file.
This issue was found by Miloslav Trmač of Red Hat.
This issue affects the versions of the libuser package, as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the versions of the libuser package, as shipped with Fedora release of 16 and 17.
This issue was assigned CVE-2012-5644
Created libuser tracking bugs for this issue
Affects: fedora-all [bug 928846]
CVE-2012-5630 and CVE-2012-5644 were addressed upstream via the following set of commits (This also includes a some code refactoring, functionality changes and some minor cleanups):
Minimal backport to fedora version of libuser avoiding other code cleanups:
Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Is there any steps for mitigation that we can apply for a workaround?
Also share steps for reproduction.
(In reply to Sonu Khan from comment #11)
> Is there any steps for mitigation that we can apply for a workaround?
> Also share steps for reproduction.
I don’t think we typically share reproducers, anyway please contact Product Security at email@example.com .