Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20141120065824.D49DA6DC008@smtpvmsrv1.mitre.org>
Date: Thu, 20 Nov 2014 01:58:24 -0500 (EST)
From: cve-assign@...re.org
To: pierre@...ctos.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request for check_diskio nagios/icinga plugin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> The check_diskio plugin for nagios/icinga from Matteo Corti
> (https://svn.id.ethz.ch/nagios_plugins/check_diskio/) is subject to a
> /tmp symlink race attack in its latest version (and versions before as
> well).
> 
> This plugin is used to monitor the I/Os on device on Linux systems. To
> be able to make a diff between two calls, it keeps the latest readings
> into a fixed pattern file name: /tmp/check_diskio_status-$user-$device
> 
> It does not check for the file being a symlink

Use CVE-2014-8994.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUbY8NAAoJEKllVAevmvmszgQH/imVOlij54rUVoIVU/0Pkly0
S05eWBaL9eiiPkbUbngSeuLSNITWeEn7sPExLdfEe8XiNzY5TCU4/IaUSc4cpJps
aXCMqNqliBTfvLlT3L9CZbmknL4rOaDyUIyQcXNuFN1EdfiJDLSGEMc2KlmEegNU
a/VFLK6c386fJ3yz/o0kKem4OA3SRcDnblccg5b8z0cnfgnWvz7jXaKZgzR+L8/3
irJN2VZKcZwdkSVL2mKCx4aKW5y57x9MyDzs0kJ5B35TuiAbfY6dQEFEpFicvNuK
zRocsKcC6mnIFEU4vEDLbVZn7l4WoD4+nvgLs7FoIdGLz6S2VtuSrURueqPGKao=
=ohA9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.