Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 8 Dec 2009 15:35:19 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Jim Meyering <meyering@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- coreutils -- unsafe temporary
 directory location use

Please use CVE-2009-4135 for this.

Thanks.

-- 
    JB


----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote:

> Hi Steve, vendors,
> 
>    Jim Meyering reported a flaw in coreutils in the way, its
> "distcheck" Makefile rule used to set up a temporary directory
> location to be used later for performing its own tasks.
> This might allow local attacker to conduct symlink attacks or
> potentially execute arbitrary code under certain circumstances.
> 
> Upstream patch:
> --------------
> http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5
> 
> Affected versions:
> ------------------
> coreutils-5.2.1 through to coreutils-8.1
> 
> References:
> -----------
> https://bugzilla.redhat.com/show_bug.cgi?id=545439
> http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5
> http://thread.gmane.org/gmane.comp.gnu.coreutils.bugs/19199
> 
> Could you allocate a CVE identifier for this issue?
> 
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ