oss-sec mailing list archives
CVE Request -- Multiple instances of insecure temporary file use
From: Jan Lieskovsky <jlieskov () redhat com>
Date: Mon, 27 Feb 2012 13:07:59 +0100
Hello Kurt, Steve, vendors, multiple instances (by checking for ATM technology support, checking for Xtables extension support, checking for setns() system call support, and in dhcp-client-script example script) of insecure temporary file use were found in iproute. A local attacker could use this flaw to conduct symbolic link attacks (modify or remove files via specially-crafted link names). References: [1] https://bugzilla.redhat.com/show_bug.cgi?id=797878 Upstream patches:[2] http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commitdiff;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8
[3] http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commitdiff;h=20ed7b24df05eadf83168d1d0ce0052a31380928
Could you allocate a CVE identifier for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Current thread:
- CVE Request -- Multiple instances of insecure temporary file use Jan Lieskovsky (Feb 27)
- Re: CVE Request -- Multiple instances of insecure temporary file use Kurt Seifried (Feb 27)