Package: polygen
Version: 1.0.6-7
Severity: critical
Tags: security
Justification: root security hole

/var/lib/dpkg/info/polygen-data.postinst invokes /usr/bin/polygen on
all its /usr/share/polygen/*/*.grm data files to create corresponding
.grm.o files.  Unfortunately polygen ignores the umask and creates
all these output files with a mode of 0666.

On Sat, Aug 13, Enrico Zini wrote:
> Oh!  That's a bad bug, security-related, critical severity.  Could you
> please report it?

Sorry about the delay.  I can't see quite how the exploit would
work, even as a "grave" user-versus-user attack, but it smells
vaguely of buffer-overflow risk as well as being a violation of
policy 10.9 and generally bad behaviour.

-- System Information:
Debian Release: 3.1
Architecture: i386 (i586)
Kernel: Linux 2.6.11.hurakan
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages polygen depends on:
ii  ocaml-base-nox [ocaml-base-no 3.08.3-3   Runtime system for ocaml bytecode

-- no debconf information
-- 
JBR
Ankh kak! (Ancient Egyptian blessing)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to