Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 06 Nov 2011 20:20:13 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: David Holland <dholland-oss-security@...bsd.org>
Subject: Re: caml-light insecure temporary files

On 11/06/2011 01:09 PM, David Holland wrote:
> I apologize for sending this out on a weekend... but I found out it
> accidentally got broadcast to one of our mailing lists so there's
> nothing much to be gained from waiting. And besides, it's neither
> particularly critical nor of particularly broad interest.
>
> Anyway.
>
> I don't know if anyone besides us still ships caml-light; it is long
> dead upstream and obsoleted by ocaml. AFAICT neither Debian nor Red
> Hat does. But just in case: it uses mktemp() insecurely, and also does
> unsafe things in /tmp during make install.
>
> Patches follow; reference URL (including copies of the patches) is
> http://gnats.netbsd.org/45558.
>
> I'm not sure it's worth allocating a CVE number for this if it turns
> out nobody else ships it.

Please use CVE-2011-4119 for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.