oss-sec mailing list archives

Re: CVE Request -- Multiple instances of insecure temporary file use


From: Kurt Seifried <kseifried () redhat com>
Date: Mon, 27 Feb 2012 09:36:43 -0700

On 02/27/2012 05:07 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, vendors,

  multiple instances (by checking for ATM technology support, checking
for Xtables
extension support, checking for setns() system call support, and in
dhcp-client-script example script) of insecure temporary file use were
found
in iproute. A local attacker could use this flaw to conduct symbolic link
attacks (modify or remove files via specially-crafted link names).

References:
[1] https://bugzilla.redhat.com/show_bug.cgi?id=797878

Upstream patches:
[2]
http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commitdiff;h=e557d1ac3a156ba7521ba44b0b412af4542f83f8


[3]
http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git;a=commitdiff;h=20ed7b24df05eadf83168d1d0ce0052a31380928


Could you allocate a CVE identifier for this?

Thank you && Regards, Jan.
-- 
Jan iankko Lieskovsky / Red Hat Security Response Team

Please use CVE-2012-1088 for these issues (same codebase/same
discoverer/same issue type/same version so merging).

-- 
Kurt Seifried Red Hat Security Response Team (SRT)


Current thread: