An information leak flaw was found in the way Bacula, a cross platform network backup tool, enforced access control list (ACL) rules prior providing information about a particular resource. A remote attacker could use this flaw to obtain (possibly sensitive) information. References: [1] https://secunia.com/advisories/50535/ [2] http://sourceforge.net/projects/bacula/files/bacula/5.2.11/ReleaseNotes/view [3] http://www.openwall.com/lists/oss-security/2012/09/14/11 [4] http://www.openwall.com/lists/oss-security/2012/09/15/2 Upstream patch: [5] http://www.bacula.org/git/cgit.cgi/bacula/commit/?id=67debcecd3d530c429e817e1d778e79dcd1db905
This issue affects the version of the bacula package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the version of the bacula package, as shipped with Fedora release of 16. Please schedule an update. This issue did NOT affect the version of the bacula package, as shipped with Fedora release of 17 (it got updated already). -- This issue affects the version of the bacula package, as shipped with Fedora EPEL 5. Please schedule an update.
Created bacula tracking bugs for this issue Affects: fedora-16 [bug 857957] Affects: epel-5 [bug 857958]
bacula-2.4.4-12.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
bacula-5.0.3-33.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2012-4430