[feynmf] Insecure temporary file creation

Bug #172265 reported by disabled.user
256
Affects Status Importance Assigned to Milestone
feynmf (Gentoo Linux)
Fix Released
Low
feynmf (Ubuntu)
Fix Released
Undecided
Unassigned
Dapper
Fix Released
Undecided
Unassigned
Edgy
Fix Released
Undecided
Unassigned
Feisty
Fix Released
Undecided
Unassigned
Gutsy
Fix Released
Undecided
Unassigned
Hardy
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: feynmf

References:
http://www.gentoo.org/security/en/glsa/glsa-200711-32.xml

Quoting:
"Kevin B. McCarty discovered that the feynmf.pl script creates a temporary "properly list" file at the location "$TMPDIR/feynmf$PID.pl", where $PID is the process ID.
[...]
A local attacker could create symbolic links in the directory where the temporary files are written, pointing to a valid file somewhere on the filesystem that is writable by the user running Feynmf. When Feynmf writes the temporary file, the target valid file would then be overwritten with the contents of the Feynmf temporary file."

CVE References

Revision history for this message
William Grant (wgrant) wrote :

As it turns out, this is fixed in a different manner (calling /bin/tempfile) in all releases.

Changed in feynmf:
status: New → Fix Released
status: New → Fix Released
status: New → Fix Released
status: New → Fix Released
status: New → Fix Released
Changed in feynmf:
status: Unknown → Fix Released
Changed in feynmf (Gentoo Linux):
importance: Unknown → Low
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.