Control: retitle -1 cronic: CVE-2016-3992: uses very predictable temporary files

Hi,

On Thu, Apr 07, 2016 at 04:37:00PM +0300, Dmitry Nezhevenko wrote:
> Package: cronic
> Version: 2-1
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Hi,
> 
> It looks like cronic uses very predictable temporary files (like
> /tmp/cronic.out.$$) that depends only on PID:
> 
> --
>       OUT=/tmp/cronic.out.$$
>       ERR=/tmp/cronic.err.$$
>       TRACE=/tmp/cronic.trace.$$
> 
>       set +e
>       "$@" >$OUT 2>$TRACE
>       RESULT=$?
>       set -e
> --
> 
> Once used in root cron job, it opens a way to write garbage to any file by
> creating symlinks '/tmp/cronic.out.PID -> /etc/fstab'

CVE-2016-3992 has been assigned for this issue. Can you forward this
to upstream and as well include the CVE id reference in
debian/changelog when fixing this issue?

Regards,
Salvatore

Reply via email to