Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 12 Dec 2011 09:24:56 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: rocksndiamonds world-writable working/config directory

rocksndiamonds creates its ~/.rocksndiamonds/ directory as
world-writable.  This could allow a local attacker to replace a cache
file with a symbolic link to a file they would not otherwise have access
to, and the next time the victim loaded the game, it would be
overwritten.

Could a CVE be assigned to this please?

References:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651620
https://bugzilla.redhat.com/show_bug.cgi?id=766805

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ