oss-sec mailing list archives
Re: CVE Request -- Multiple instances of insecure temporary file use
From: Kurt Seifried <kseifried () redhat com>
Date: Mon, 27 Feb 2012 09:36:43 -0700
On 02/27/2012 05:07 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, vendors, multiple instances (by checking for ATM technology support, checking for Xtables extension support, checking for setns() system call support, and in dhcp-client-script example script) of insecure temporary file use were found in iproute. A local attacker could use this flaw to conduct symbolic link attacks (modify or remove files via specially-crafted link names). References: [1] https://bugzilla.redhat.com/show_bug.cgi?id=797878 Upstream patches: [2] http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commitdiff;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8 [3] http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commitdiff;h=20ed7b24df05eadf83168d1d0ce0052a31380928 Could you allocate a CVE identifier for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Please use CVE-2012-1088 for these issues (same codebase/same discoverer/same issue type/same version so merging). -- Kurt Seifried Red Hat Security Response Team (SRT)
Current thread:
- CVE Request -- Multiple instances of insecure temporary file use Jan Lieskovsky (Feb 27)
- Re: CVE Request -- Multiple instances of insecure temporary file use Kurt Seifried (Feb 27)