An unsafe umask (user file-creation mode mask) mode flaw was found in the way ACPI daemon event handler performed actions execution. A local attacker could use this flaw to read or alter files, created by and belonging to particular acpid action, during its execution. References: [1] http://www.tedfelix.com/linux/acpid-netlink.html [2] http://www.openwall.com/lists/oss-security/2011/12/06/2 (CVE request) [3] http://www.openwall.com/lists/oss-security/2011/12/06/3 (CVE assignment)
This issue affects the versions of the acpid package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue did NOT affect the versions of the acpid package, as shipped with Fedora release of 15 and 16. The acpid package version in those releases have been updated to upstream acpid-2.0.13 version.
Relevant upstream patch (related difference between v2.0.10 and v2.0.11 tarballs): diff -uprs acpid-2.0.10/event.c acpid-2.0.11/event.c --- acpid-2.0.10/event.c 2011-03-12 17:18:09.000000000 +0100 +++ acpid-2.0.11/event.c 2011-06-23 18:35:19.000000000 +0200 @@ -641,6 +641,7 @@ do_cmd_rule(struct rule *rule, const cha if (acpid_debug && logevents) { fprintf(stdout, "BEGIN HANDLER MESSAGES\n"); } + umask(0077); execl("/bin/sh", "/bin/sh", "-c", action, NULL); /* should not get here */ acpid_log(LOG_ERR, "execl(): %s", strerror(errno));
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2011-4578