Branches for Intrepid

Name Status Last Modified Last Commit
lp:ubuntu/intrepid/dist 2 Mature 2009-08-21 13:56:46 UTC
6. * If a script uses a temp file which ...

Author: Manoj
Revision Date: 2008-08-29 22:28:31 UTC

* If a script uses a temp file which is created in /tmp, then an
  attacker can create symlink with the same name in this directory in
  order to destroy or rewrite some system or user files. Symlink attack
  may also lead not only to the data desctruction but to denial of
  service as well. Creating files with rand or pid to randomize the file
  names is not adequate to protect the system. We now use File::Temp to
  safely create the temporary files as needed. This closes a grave bug.
  There are no code changes in this version, apart from the bug fix.
                                                      Closes: #496412
* Updated the Standards version. (No changes)

11 of 1 result