Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20111028131026.GA32179@devzero.fr>
Date: Fri, 28 Oct 2011 15:10:26 +0200
From: vladz <vladz@...zero.fr>
To: oss-security@...ts.openwall.com
Cc: rcvalle@...hat.com
Subject: Re: Request for CVE Identifier: bzexe insecure
	temporary file


Hi,

On Fri, Oct 28, 2011 at 02:22:13PM +0200, Hanno Böck wrote:
> Am Fri, 28 Oct 2011 07:48:16 -0400 (EDT) schrieb Ramon de C Valle <rcvalle@...hat.com>:
> > This is a security issue reported by vladz in bzexe. This is a low
> > impact security issue, since bzexe is rarely used and the race
> > condition window is very narrow, but still exploitable.
> 
> Have you checked if this also affects gzexe? It is pretty much the same
> as bzexe, just using gzip instead of bzip2. (afaik, no xzexe exists)

I already checked gzexe and it's not affected because it use "mktemp" to
create its temporary directory.  For the same purposes, bzexe use
"/tmp/command" as directory name.

Best regards,
vladz.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.