Debian Bug report logs -
#314604
prelink: Prelink leaving memory addresses in /var/log/prelink.log
Reported by: Martin Pitt <martin.pitt@canonical.com>
Date: Fri, 17 Jun 2005 12:03:04 UTC
Severity: normal
Tags: security
Fixed in version prelink/0.0.20050610-1
Done: AndrésRoldán <aroldan@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Andrés Roldán <aroldan@debian.org>:
Bug#314604; Package prelink.
(full text, mbox, link).
Acknowledgement sent to Martin Pitt <martin.pitt@canonical.com>:
New Bug report received and forwarded. Copy sent to Andrés Roldán <aroldan@debian.org>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: prelink
Serverity: important
Tags: security
Hi Andrés!
An Ubuntu user (who is a security addict) pointed out an important
information disclosure in prelink. I quickly fixed that in Ubuntu
using
http://patches.ubuntu.com/patches/prelink.nomemmap.diff
Can you please consider applying this (or fix it in prelink itself, so
that you get the linked libraries without the addresses)?
Thanks and have a nice day!
Martin
----- Forwarded message from Jamie Jones <jamie_jones_au@yahoo.com.au> -----
Subject: Prelink leaving memory addresses in /var/log/prelink.log
From: Jamie Jones <jamie_jones_au@yahoo.com.au>
To: martin.pitt@ubuntu.com
Date: Wed, 27 Apr 2005 22:29:28 +1000
X-Spam-Status: No, score=0.0 required=4.0 tests=BAYES_50 autolearn=no
version=3.0.2
G'day Martin,
Thanks for signing my key today. Had to leave a bit earlier then
expected, but I should make at least 1 more day.
Package: prelink
Vulnerablity: Information Leak
Problem-Type: local
Tested-On: Hoary
After being enabled by the user, prelink installs cron job to run
prelink daily. Upon completion prelink leaves a /var/log/prelink.log
file that is readable by the Ubuntu user account created during install.
This log file contains a memory map of every program installed on the
Ubuntu system. This could be used to target further attacks on the
system eg to gain root control.
Attached is a prelink.log from an amd64 system clearly showing all
memory addresses in the log file.
How to reproduce.
apt-get install prelink
$editor /etc/default/prelink (and follow instructions in file)
sudo /etc/cron.daily/prelink (this may take a while)
optionaly reboot :)
cat /var/log/prelink.log
PS, If this isn't the right address to send this to, please point me in
the right direction.
Jamie
--
GPG/PGP signed mail preferred. No HTML mail. No MS Word attachments
PGP Key ID 0x42E2C1E5
Fingerprint 3C77 9621 84C5 C32F D409 A38D A035 7E65 42E2 C1E5
----- End forwarded message -----
--
Martin Pitt http://www.piware.de
Ubuntu Developer http://www.ubuntu.com
Debian Developer http://www.debian.org
[signature.asc (application/pgp-signature, inline)]
Reply sent to Andrés Roldán <aroldan@debian.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Martin Pitt <martin.pitt@canonical.com>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #10 received at 314604-close@bugs.debian.org (full text, mbox, reply):
Source: prelink
Source-Version: 0.0.20050610-1
We believe that the bug you reported is fixed in the latest version of
prelink, which is due to be installed in the Debian FTP archive:
prelink_0.0.20050610-1.diff.gz
to pool/main/p/prelink/prelink_0.0.20050610-1.diff.gz
prelink_0.0.20050610-1.dsc
to pool/main/p/prelink/prelink_0.0.20050610-1.dsc
prelink_0.0.20050610-1_i386.deb
to pool/main/p/prelink/prelink_0.0.20050610-1_i386.deb
prelink_0.0.20050610.orig.tar.gz
to pool/main/p/prelink/prelink_0.0.20050610.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 314604@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andrés Roldán <aroldan@debian.org> (supplier of updated prelink package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 17 Jun 2005 16:11:01 +0000
Source: prelink
Binary: prelink
Architecture: source i386
Version: 0.0.20050610-1
Distribution: unstable
Urgency: low
Maintainer: Andrés Roldán <aroldan@debian.org>
Changed-By: Andrés Roldán <aroldan@debian.org>
Description:
prelink - ELF prelinking utility to speed up dynamic linking
Closes: 301097 314604
Changes:
prelink (0.0.20050610-1) unstable; urgency=low
.
* New upstream release.
* debian/prelink.cron.daily:
- Don't run prelink with -v option as this gives sensible information of
the memory of the binaries on the system. Patch taken from Ubuntu.
Thanks to Martin Pitt <martin.pitt@canonical.com>. (Closes: #314604)
* debian/control:
- Adds ppc64 support. (Closes: #301097)
Files:
ea805531c13f9d0d8d96023fe1a87bbc 790 admin optional prelink_0.0.20050610-1.dsc
f6e89fac77b6c6ce48c6011fd4f377d9 1019142 admin optional prelink_0.0.20050610.orig.tar.gz
4b01adfc3b81a3e25b040609f1f43973 18129 admin optional prelink_0.0.20050610-1.diff.gz
8ec1b992dbf253fed9e16b00193bcd5e 684050 admin optional prelink_0.0.20050610-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCsydz2OByS7KTlusRAvTbAJ9hShBWvpVFJQ5HtU1I8H4aUve49wCeI2q7
iVJbi4jQCvhKmZ87mtzeucY=
=j0Fo
-----END PGP SIGNATURE-----
Bug unarchived.
Request was from Stefano Zacchiroli <zack@debian.org>
to control@bugs.debian.org.
(Sun, 10 Apr 2011 08:46:43 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Mon, 09 May 2011 07:32:03 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Oct 11 12:06:37 2017;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.