On 2015-03-20 14:09, Markus Wanner wrote:
Control: tags -1 - moreinfo

On 03/18/2015 11:12 PM, Rebecca N. Palmer wrote:
Is untrusted scripts being able to write (not read) /tmp/*.xml a
security or other RC bug (which would require a new upload of flightgear _and_ flightgear-data with the obvious fixes), or just not a good idea?

AFAIUI at the very worst, an untrusted nasal script could override an
existing *.xml file in /tmp, which already has its execute permissions
set, right? I'm not sure whether "write" here means overriding a file is
okay or if it restricts to creating new files, though.

The latter's potentially a fairly important point. One of the reasons that insecure tempfile handling is an issue is that if you write to or truncate a file in /tmp and that file is a symlink to another file the result can be that the destination file is modified.

I'm assuming that there's no good reason for anyone ever to be running flightgear in a privileged context so you'd still be restricted to writing to files that the user has direct access to, albeit potentially escaping the directory sandboxxing. (If symlinks are followed then the same is true of all of the directories involved but I'm also assuming that /tmp is the only one where it's likely that other users would be able to create such symlinks.)

Regards,

Adam


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to