[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: security bug in cp(1)

From: Eric Blake
Subject: Re: security bug in cp(1)
Date: Thu, 16 Aug 2007 21:24:42 -0600
User-agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv: Gecko/20070728 Thunderbird/ Mnenhy/

Hash: SHA1

According to Soren Spies on 8/16/2007 8:16 PM:
> I just noticed that cp -p doesn't update the group on a file before
> writing data into the target.  That means that during the copy, users
> you didn't intend to be able to read the file can read the file.

This was already noticed and fixed in 6.9.  From the NEWS file:

 "cp --preserve=mode" would create directories that briefly had
  too-generous permissions in some cases.  For example, when copying a
  directory with permissions 777 the destination directory might
  temporarily be setgid on some file systems, which would allow other
  users to create subfiles with the same group as the directory.  Fix
  similar problems with 'install' and 'mv'.

Consider upgrading.

> cp(1) says that <address@hidden> is the place for cp bugs.
> Is there a way to search the bug database?


> gnu.org's fileutils page
> (<http://www.gnu.org/software/fileutils/doc/manual/html/fileutils.html>)
> has a link to bugs but it leads to a file-not-found page.  :P

fileutils is obsolete, ever since it was folded into coreutils.  We try to
correct those pages as people find and report them.

- --
Don't work too hard, make some time for fun as well!

Eric Blake             address@hidden
Version: GnuPG v1.4.5 (Cygwin)
Comment: Public key at home.comcast.net/~ericblake/eblake.gpg
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org


reply via email to

[Prev in Thread] Current Thread [Next in Thread]