/etc/couchdb and /var/log/couchdb owned by couchdb:couchdb
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
desktopcouch |
Invalid
|
Undecided
|
Unassigned | ||
couchdb (Ubuntu) |
Fix Released
|
Undecided
|
Chad Miller |
Bug Description
The ownership of these files introduces security risk (from couchdb*.postinst):
chown -R couchdb:couchdb /etc/couchdb
chmod 0775 /etc/couchdb
chmod 0664 /etc/couchdb/
chmod 0664 /etc/couchdb/
mkdir -p /var/lib/
mkdir -p /var/log/couchdb
chown -R couchdb:couchdb /var/lib/couchdb
chown -R couchdb:couchdb /var/log/couchdb
chmod 0770 /var/lib/couchdb /var/lib/
chmod 0770 /var/log/couchdb
The worst scenario: If couchdb user creates hardlink to root owned file/device in one of these directories and couchdb package is reinstalled then hardlink would be writable by couchdb user, leading to privilege escalation.
Reference: http://
Related branches
Changed in couchdb (Ubuntu): | |
assignee: | nobody → Chad Miller (cmiller) |
visibility: | private → public |
Changed in couchdb (Ubuntu): | |
status: | New → Triaged |
This isn't a bug in desktopcouch, as far as I can tell.