Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 7 Jun 2010 10:46:10 -0400 (EDT)
From: "Steven M. Christey" <>
cc: Guillem Jover <>,
        AnĂ­bal Monsalve Salazar <>,
        "Steven M. Christey" <>
Subject: Re: CVE Request -- rpcbind -- Insecure (predictable)
 temporary file use

On Fri, 4 Jun 2010, Josh Bressers wrote:

> Please use CVE-2010-2061 for this.

My read of Guillem's report at suggests that we 
might have two distinct issues here:

- "*any* user can craft those two files before the daemon
has started for the first time, which the daemon will parse."  Nothing to 
do with symlinks.

- symlinks are followed on creation of those files

So we may need two CVEs here.

- Steve

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.