[vde-users] [ vde-Bugs-3603897 ] unsafe use of /tmp files

2013-03-07 Thread SourceForge . net
Bugs item #3603897, was opened at 2013-02-08 18:25
Message generated for change (Comment added) made by danielel
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=611248&aid=3603897&group_id=95403

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
>Status: Closed
>Resolution: Fixed
Priority: 7
Private: Yes
Submitted By: https://www.google.com/accounts ()
Assigned to: Daniele Lacamera (danielel)
Summary: unsafe use of /tmp files

Initial Comment:
Hello, while performing an audit of vde2 
(https://bugs.launchpad.net/ubuntu/+source/vde2/+bug/776818) I found a bug; it 
may even be a security bug. If you decide this is a security issue, please 
contact the linux-distros security list to coordinate a release and request a 
CVE number. (See http://oss-security.openwall.org/wiki/mailing-lists/distros 
for details on using the linux-distros list. Note especially that [vs] is 
required in the Subject: header.)

There is an unsafe use of /tmp files in cryptcab:

if ((od = creat ("/tmp/.blowfish.key",0600)) == -1){

Note that creat(2) cannot protect against symlink attacks because it does not 
include the open(2) O_EXCL flag.

It also seems odd to hard code a filename here rather than use mkstemp(3) to 
generate a random filename and properly create the file (using O_EXCL to 
open(2)).

--

>Comment By: Daniele Lacamera (danielel)
Date: 2013-03-07 12:19

Message:
closed in r556

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=611248&aid=3603897&group_id=95403

--
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev
___
vde-users mailing list
vde-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vde-users


[vde-users] [ vde-Bugs-3603897 ] unsafe use of /tmp files

2013-03-07 Thread SourceForge . net
Bugs item #3603897, was opened at 2013-02-08 18:25
Message generated for change (Settings changed) made by danielel
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=611248&aid=3603897&group_id=95403

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
>Priority: 7
Private: Yes
Submitted By: https://www.google.com/accounts ()
>Assigned to: Daniele Lacamera (danielel)
Summary: unsafe use of /tmp files

Initial Comment:
Hello, while performing an audit of vde2 
(https://bugs.launchpad.net/ubuntu/+source/vde2/+bug/776818) I found a bug; it 
may even be a security bug. If you decide this is a security issue, please 
contact the linux-distros security list to coordinate a release and request a 
CVE number. (See http://oss-security.openwall.org/wiki/mailing-lists/distros 
for details on using the linux-distros list. Note especially that [vs] is 
required in the Subject: header.)

There is an unsafe use of /tmp files in cryptcab:

if ((od = creat ("/tmp/.blowfish.key",0600)) == -1){

Note that creat(2) cannot protect against symlink attacks because it does not 
include the open(2) O_EXCL flag.

It also seems odd to hard code a filename here rather than use mkstemp(3) to 
generate a random filename and properly create the file (using O_EXCL to 
open(2)).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=611248&aid=3603897&group_id=95403

--
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester  
Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the  
endpoint security space. For insight on selecting the right partner to 
tackle endpoint security challenges, access the full report. 
http://p.sf.net/sfu/symantec-dev2dev
___
vde-users mailing list
vde-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vde-users


[vde-users] [ vde-Bugs-3603897 ] unsafe use of /tmp files

2013-02-08 Thread SourceForge . net
Bugs item #3603897, was opened at 2013-02-08 18:25
Message generated for change (Tracker Item Submitted) made by 
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=611248&aid=3603897&group_id=95403

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Private: Yes
Submitted By: https://www.google.com/accounts ()
Assigned to: Nobody/Anonymous (nobody)
Summary: unsafe use of /tmp files

Initial Comment:
Hello, while performing an audit of vde2 
(https://bugs.launchpad.net/ubuntu/+source/vde2/+bug/776818) I found a bug; it 
may even be a security bug. If you decide this is a security issue, please 
contact the linux-distros security list to coordinate a release and request a 
CVE number. (See http://oss-security.openwall.org/wiki/mailing-lists/distros 
for details on using the linux-distros list. Note especially that [vs] is 
required in the Subject: header.)

There is an unsafe use of /tmp files in cryptcab:

if ((od = creat ("/tmp/.blowfish.key",0600)) == -1){

Note that creat(2) cannot protect against symlink attacks because it does not 
include the open(2) O_EXCL flag.

It also seems odd to hard code a filename here rather than use mkstemp(3) to 
generate a random filename and properly create the file (using O_EXCL to 
open(2)).

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=611248&aid=3603897&group_id=95403

--
Free Next-Gen Firewall Hardware Offer
Buy your Sophos next-gen firewall before the end March 2013 
and get the hardware for free! Learn more.
http://p.sf.net/sfu/sophos-d2d-feb
___
vde-users mailing list
vde-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vde-users