Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20111028142213.52f499e8@laverne>
Date: Fri, 28 Oct 2011 14:22:13 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Cc: rcvalle@...hat.com
Subject: Re: Request for CVE Identifier: bzexe insecure
 temporary file

Am Fri, 28 Oct 2011 07:48:16 -0400 (EDT)
schrieb Ramon de C Valle <rcvalle@...hat.com>:

> This is a security issue reported by vladz in bzexe. This is a low
> impact security issue, since bzexe is rarely used and the race
> condition window is very narrow, but still exploitable.

Have you checked if this also affects gzexe? It is pretty much the same
as bzexe, just using gzip instead of bzip2. (afaik, no xzexe exists)

-- 
Hanno Böck		mail/jabber: hanno@...eck.de
GPG: BBB51E42		http://www.hboeck.de/

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.