Bug 24298 - startkde: vulnerable to symlink attack
startkde: vulnerable to symlink attack
Product: Red Hat Linux
Classification: Retired
Component: kdebase (Show other bugs)
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Bernhard Rosenkraenzer
Aaron Brown
Florence Beta-3
: Security
Depends On:
  Show dependency treegraph
Reported: 2001-01-18 12:33 EST by Gerald Teschl
Modified: 2007-04-18 12:30 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2001-01-18 18:55:39 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Gerald Teschl 2001-01-18 12:33:20 EST
The following code can be easily exploited to destroy arbitrary files
owned by the user who starts kde!
if ! echo TEST_TEXT >/tmp/$testfile 2>/dev/null ; then
    echo "Have no write permissions for /tmp"
    exit 1
rm -f /tmp/$testfile
Comment 1 Glen Foster 2001-01-18 16:26:52 EST
This defect is considered MUST-FIX for Florence Beta-3
Comment 2 Bernhard Rosenkraenzer 2001-01-18 18:55:36 EST
Fixed in 2.0.20010119-1

Note You need to log in before you can comment on or make changes to this bug.