Bug 159000 - CAN-2005-1751 shtool insecure temporary file creation
CAN-2005-1751 shtool insecure temporary file creation
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: php (Show other bugs)
All Linux
medium Severity low
: ---
: ---
Assigned To: Joe Orton
David Lawrence
: Security
: 158997 (view as bug list)
Depends On:
  Show dependency treegraph
Reported: 2005-05-27 11:32 EDT by Josh Bressers
Modified: 2007-11-30 17:07 EST (History)
0 users

See Also:
Fixed In Version: RHSA-2005-564
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2005-07-07 16:03:02 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2005-05-27 11:32:03 EDT
Race condition in shtool 2.0.1 and earlier allows local users to
create or modify arbitrary files via a symlink attack on the
.shtool.$$ temporary file.

openldap contains shtool in its source.
Comment 1 Joe Orton 2005-05-27 11:43:58 EDT
Note that this issue can only be triggered when:

a) rebuilding the PHP source RPM
b) building a third-party PHP module

Proposing for inclusion in U2.
Comment 2 Joe Orton 2005-05-27 11:48:32 EDT
*** Bug 158997 has been marked as a duplicate of this bug. ***
Comment 3 Josh Bressers 2005-05-27 12:58:47 EDT
Yes, we'll just include this in either U2 or our next security update.  No need
to roll new packages just for this.
Comment 6 Red Hat Bugzilla 2005-07-07 16:03:02 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.