Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20160701194235.46558EBC4E6@smtpvmsrv1.mitre.org>
Date: Fri,  1 Jul 2016 15:42:35 -0400 (EDT)
From: cve-assign@...re.org
To: astieger@...e.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: SQLite Tempdir Selection Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

>> Title: SQLite Tempdir Selection Vulnerability
>> Publication URL: https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt

>>      Affected Vendor: SQLite/Hwaci
>>      Affected Product: SQLite
>>      Affected Version: All versions prior to 3.13.0
>>      Platform: UNIX, GNU/Linux
>>      CWE Classification: CWE-379: Creation of Temporary File in Directory
>>                          with Incorrect Permissions
>>      Impact: Data Leakage
>>      Attack vector: Local

> Release notes say:
>> Change the temporary directory search algorithm
>> <http://www.sqlite.org/tempfiles.html#tempdir> on Unix to allow
>> directories with write and execute permission, but without read
>> permission, to serve as temporary directories. Apply this same
>> standard to the "." fallback directory. 

> The covering commits seem to be:
> 
> http://www.sqlite.org/cgi/src/info/67985761aa93fb61
> Change the temporary directory search algorithm on unix so that
> directories with only -wx permission are allowed. And do not allow "."
> to be returned if it lacks -wx permission.

Use CVE-2016-6153.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=InVu
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.