Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <547C2A3D.1060904@reactos.org>
Date: Mon, 01 Dec 2014 09:43:41 +0100
From: Pierre Schweitzer <pierre@...ctos.org>
To: cve-assign@...re.org
CC: oss-security@...ts.openwall.com
Subject: Re: CVE request for check_diskio nagios/icinga plugin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Thanks.

The author reported the vulnerability got fixed and a new version,
3.2.7, including the fix has been released.

Cheers,
Pierre

On 11/20/2014 07:58 AM, cve-assign@...re.org wrote:
>> The check_diskio plugin for nagios/icinga from Matteo Corti 
>> (https://svn.id.ethz.ch/nagios_plugins/check_diskio/) is subject
>> to a /tmp symlink race attack in its latest version (and versions
>> before as well).
> 
>> This plugin is used to monitor the I/Os on device on Linux
>> systems. To be able to make a diff between two calls, it keeps
>> the latest readings into a fixed pattern file name:
>> /tmp/check_diskio_status-$user-$device
> 
>> It does not check for the file being a symlink
> 
> Use CVE-2014-8994.
> 
> 

- -- 
Pierre Schweitzer <pierre@...ctos.org>
System & Network Administrator
Senior Kernel Developer
ReactOS Deutschland e.V.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0fWY
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.