Bug 18785 - /tmp symlink vulnerability in gnorpm < 0.95 (bugtraq id 1761)
/tmp symlink vulnerability in gnorpm < 0.95 (bugtraq id 1761)
Status: CLOSED ERRATA
Product: Red Hat Linux
Classification: Retired
Component: gnorpm (Show other bugs)
6.2
All Linux
high Severity medium
: ---
: ---
Assigned To: Matt Wilson
Dale Lovelace
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2000-10-10 04:36 EDT by p.jenner
Modified: 2007-03-26 23:36 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-10-10 04:36:36 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description p.jenner 2000-10-10 04:36:32 EDT
There is a /tmp symlink vulnerability in gnorpm 0.9 shipped in Red Hat
6.2.  From bugtraq id 1761:

<quote>
A vulnerabiity exists in versions prior to v0.95 of GnoRPM, the Gnome
graphical RPM manager, involving the way gnomerpm handles tmp files.
GnomeRPM creates temporary files in the world-writeable /tmp directory with
preditable filenames. It is possible for a malicious user to create
symbolic links in /tmp with guessed/predicted filenames, knowing in advance
that GnomeRPM will be run by root. When this happens, the files pointed to
by the correctly guessed symbolic links will be overwritten by GnomeRPM (as
root).
<unquote>

This vulnerability is fixed in gnorpm 0.95.1 and Red Hat should upgrade to
this version to fix the vulnerability.

I hope this helps,

Paul
Comment 1 p.jenner 2000-10-13 03:40:04 EDT
This has been closed by Red Hat errata RHSA-2000:072-05.

Note You need to log in before you can comment on or make changes to this bug.