Control: retitle -1 cronic: CVE-2016-3992: uses very predictable temporary files
Hi, On Thu, Apr 07, 2016 at 04:37:00PM +0300, Dmitry Nezhevenko wrote: > Package: cronic > Version: 2-1 > Severity: grave > Tags: security > Justification: user security hole > > Hi, > > It looks like cronic uses very predictable temporary files (like > /tmp/cronic.out.$$) that depends only on PID: > > -- > OUT=/tmp/cronic.out.$$ > ERR=/tmp/cronic.err.$$ > TRACE=/tmp/cronic.trace.$$ > > set +e > "$@" >$OUT 2>$TRACE > RESULT=$? > set -e > -- > > Once used in root cron job, it opens a way to write garbage to any file by > creating symlinks '/tmp/cronic.out.PID -> /etc/fstab' CVE-2016-3992 has been assigned for this issue. Can you forward this to upstream and as well include the CVE id reference in debian/changelog when fixing this issue? Regards, Salvatore