Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20090402165401.3334f8ff@redhat.com>
Date: Thu, 2 Apr 2009 16:54:01 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...us.mitre.org
Subject: Re: CVE request -- zsh, XFree86-xfs/xorg-x11-xfs,
 screen

On Tue, 31 Mar 2009 21:12:25 -0400 (EDT) "Steven M. Christey"
<coley@...us.mitre.org> wrote:

> > 3, screen: Unsafe usage of temporary file
> >    References:
> >    https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
> >    http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
> >    https://bugzilla.redhat.com/show_bug.cgi?id=492104

Based on the additional comments in the upstream bug:
  https://savannah.gnu.org/bugs/index.php?25296

> CVE-2009-1214 - world-readable permissions

This should be expected and intended behavior.

> CVE-2009-1215 - symlink following

There should be no real symlink issue for /tmp/screen-exchange in the
upstream version.  Debian screen version seems to have a patch, that
introduces a symlink flaw, but it does not depend on any race
condition.  Description for this one may need to be updated.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.