Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 11 Jan 2014 13:37:51 -0700
From: "Vincent Danen" <>
To: "Open Source Security" <>
Subject: Re: CVE assignment for jinja2

On 01/10/2014, at 22:34 PM, Kurt Seifried wrote:

> dirname = '_jinja2-cache-%d' % os.getuid()
> Arun Babu Neelicattu of Red Hat spotted this commit which introduces a
> temporary file creation vulnerability. This issue has been assigned
> CVE-2014-0012. For information on how to safely create temporary files
> please see
> For Python simply use ?mkstemp? for files and ?mkdtemp? for
> directories from the ?tempfile? module.

MITRE assigned CVE-2014-1402 to this yesterday: (the report, the followup has the CVE assignment).

That means you'll need to reject this assignment; the commit that Arun spotted was due to the Debian bug report (which the git commit notes, and Ratul linked to in his initial CVE request to the list).

Vincent Danen / Red Hat Security Response Team
Download attachment "signature.asc" of type "application/pgp-signature" (711 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.