Bug 1312958

Summary: wine: Insecure use of temp files with predictable names
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: andreas.bierfert, besser82, jre.winesim, mike, stefan
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:49:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1312959, 1312960    
Bug Blocks:    

Description Adam Mariš 2016-02-29 16:00:33 UTC
It was reported that wine uses /tmp/.wine-$UID as a directory for sockets and lock files. Malicious local user could create /tmp/.wine-$UID for another user's uid, preventing the other user from using wine. Moreover, the server_connect() function doesn't check if /tmp/.wine-$UID or its subdirectories are symlinks, so in some circumstances it might be possible to trick wine to connect to an unrelated socket.

Debian bug report:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816034

Comment 1 Adam Mariš 2016-02-29 16:01:10 UTC
Created wine tracking bugs for this issue:

Affects: fedora-all [bug 1312959]
Affects: epel-all [bug 1312960]

Comment 2 Product Security DevOps Team 2019-06-08 02:49:10 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.