I just read a Debian advisory about CAN-2005-0077, claiming Javier
Fernández-Sanguino Peña from the Debian Security Audit Project
discovered that the DBI library, the Perl5 database interface, creates
a tmporary PID file in an insecure manner. This can be exploited by a
malicious user
At 09:26 1/28/2005, you wrote:
I just read a Debian advisory about CAN-2005-0077,
A link would have been nice...
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077 says under review
http://archives.neohapsis.com/archives/linux/debian/2005-q1/0178.html says
there's a fix released
On Fri, Jan 28, 2005 at 04:26:52PM +0100, Peter J. Holzer wrote:
I just read a Debian advisory about CAN-2005-0077, claiming Javier
Fernández-Sanguino Peña from the Debian Security Audit Project
discovered that the DBI library, the Perl5 database interface, creates
a tmporary PID file
Quoting Thomas L Shinnick [EMAIL PROTECTED]:
At 09:26 1/28/2005, Peter J. Holzer wrote:
I just read a Debian advisory about CAN-2005-0077,
A link would have been nice...
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077 says under
review
http://archives.neohapsis.com/archives
On 2005-01-28 17:35:50 +, Tim Bunce wrote:
On Fri, Jan 28, 2005 at 04:26:52PM +0100, Peter J. Holzer wrote:
I just read a Debian advisory about CAN-2005-0077, claiming Javier
Fernández-Sanguino Peña from the Debian Security Audit Project
discovered that the DBI library, the Perl5