|
Message-ID: <CACYkhxi_uwOLB-MDP4iE8LN-O5Yrc0PcV3w4c6b3gj_mqQVfzw@mail.gmail.com> Date: Sun, 23 Feb 2014 08:12:21 +1100 From: Michael Samuel <mik@...net.net> To: oss-security@...ts.openwall.com Subject: Re: Fwd: temporary file creation vulnerability in Redis Hi, On 23 February 2014 07:35, Matthew Hall <mhall@...omputing.net> wrote: > 641 snprintf(tmpfile,256,"temp-%d.rdb", (int) getpid()); > 642 fp =3D fopen(tmpfile,"w"); > ... > 699 if (rename(tmpfile,filename) =3D=3D -1) { > > This looks like the standard pattern for atomic file writing. The temp file would probably be in the same directory as the data file, since cross-device rename() doesn't work. This class of vulnerability relies on the fact that other users have write access to the directory that the tempfile is written to. Regards, Michael
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.