Date: Mon, 27 Jan 2020 10:43:58 +0100 From: Matthias Gerstner <mgerstner@...e.de> To: oss-security@...ts.openwall.com Subject: Re: CVE-2019-18932: sarg: insecure usage of /tmp/sarg allows privilege escalation / DoS attack vector > I've informed the upstream maintainer about this issue on 2019-11-13 and > discussed various aspects of a suitable security fix with him. No > agreement on a suitable publication date for this finding or a final > patch could be achieved and I did not hear back for around a month by > now. I've been informed by a third party that an upstream release sarg-2.4.0  containing a fix  is now available. : https://sourceforge.net/projects/sarg/files/sarg/sarg-2.4.0/ : https://sourceforge.net/p/sarg/code/ci/8ec6d20be8c0da3c885aba78e63251f2e5080748 Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.