Michael Gilbert wrote:
Ok, I see now. Then the root cause is that tempfile will listen to
the TMPDIR setting. So, to fix that core problem, shouldn't we disable
it? Note functionality shouldn't be lost since there is still the
--directory option; although some scripts may need to be fixed.
On 2011-09-06 14:05:59 +0200, Chung-chieh Shan wrote:
No, we should not assume that TMPDIR is set by a malicious agent; that
is possible but it is also possible that TMPDIR is set by a friendly
agent whose goal is to increase the security of the system by putting
temporary files in a secure
On Tue, 6 Sep 2011 16:08:29 +0200 Vincent Lefevre wrote:
On 2011-09-06 14:05:59 +0200, Chung-chieh Shan wrote:
No, we should not assume that TMPDIR is set by a malicious agent; that
is possible but it is also possible that TMPDIR is set by a friendly
agent whose goal is to increase the
Jonathan Nieder wrote:
Hi,
Vincent Lefevre wrote:
--- /usr/bin/xpdf 2011-07-28 06:29:44.0 +0200
+++ xpdf2011-07-29 16:36:38.0 +0200
@@ -78,7 +78,7 @@
elif [ $cat = cat ]; then
$cmd -title $title $file $pages
else
-tmp=$(tempfile -p $(basename
Michael Gilbert wrote:
If the attacker
has control of /tmp and all can generate any file name permutation in
time to get his malicious version in place of the intended one, then
the real issue is that tmpfile's file name generation is weak, and the
problem would need to fixed there.
Not
Jonathan Nieder wrote:
Michael Gilbert wrote:
If the attacker
has control of /tmp and all can generate any file name permutation in
time to get his malicious version in place of the intended one, then
the real issue is that tmpfile's file name generation is weak, and the
problem
Hi,
Vincent Lefevre wrote:
--- /usr/bin/xpdf 2011-07-28 06:29:44.0 +0200
+++ xpdf 2011-07-29 16:36:38.0 +0200
@@ -78,7 +78,7 @@
elif [ $cat = cat ]; then
$cmd -title $title $file $pages
else
-tmp=$(tempfile -p $(basename $file) -s .pdf)
+
On 2011-08-28T20:08:27-0500, Jonathan Nieder wrote:
Wasn't the original intent closer to
trap rm -f -- \\$tmp\ EXIT HUP INT QUIT TERM
which prevents the variable from being interpolated in advance at all?
Yes, that's the (a) right fix.
signature.asc
Description: Digital signature
tags 635849 help
thanks
Hi,
I think this is the risk of creating a feature without peer review.
Thank for doing it for us. We now know that risks are real.
Uses of shell glob have this kind of problem unless proper option are
used.
Can any of you who seems to know bettwer on this subject
tags 635849 patch
thanks
On 2011-07-29 23:22:24 +0900, Osamu Aoki wrote:
Can any of you who seems to know bettwer on this subject propse good
solution while keeping major part of this feature. Other wise we get
bug report for breaking backward comparibility without good reason.
I think
On 2011-07-29 16:39:57 +0200, Vincent Lefevre wrote:
I think there is a very easy solution concerning this bug (there
may be other bugs, though): do not use the -p tempfile option.
AFAIK, this option is useless (it might be used to retrieve the
temporary file more easily, but this isn't
Vincent Lefevre wrote:
tags 635849 patch
thanks
On 2011-07-29 23:22:24 +0900, Osamu Aoki wrote:
Can any of you who seems to know bettwer on this subject propse good
solution while keeping major part of this feature. Other wise we get
bug report for breaking backward comparibility
12 matches
Mail list logo