Hello,
Sorry for the long delay.
Pavel Raiskup writes:
> Ensure that nobody can cross privilege boundaries by pre-creating
> symlink on '$tmpdir' path.
>
> Just testing 'mkdir -p' by creating '/tmp/ins$RANDOM-$$/d' is not
> safe because '/tmp' directory is usually world-writeable and
> '/tmp/in
Hello thomas,
Thomas Deutschmann writes:
> Pavel Raiskup submitted a patch to avoid a (low risk) race
> in /tmp in April 2015 [1] which still isn't merged.
>
> Was there a reason or was it just forgotten? Maybe we can
> add it now?
Yes it has just been forgotten, if the patch is safe then yes w
Hi,
Pavel Raiskup submitted a patch to avoid a (low risk) race
in /tmp in April 2015 [1] which still isn't merged.
Was there a reason or was it just forgotten? Maybe we can
add it now?
It is currently present in Red Hat, Debian and Gentoo
(haven't checked more distributions).
See also:
==
Ensure that nobody can cross privilege boundaries by pre-creating
symlink on '$tmpdir' path.
Just testing 'mkdir -p' by creating '/tmp/ins$RANDOM-$$/d' is not
safe because '/tmp' directory is usually world-writeable and
'/tmp/ins$RANDOM-$$' content could be pretty easily guessed by
attacker (at le