FYI, the reporter was mistaken, the upstream bug was NOT public. He could see it because he reported it. It might as well be now. (I just removed the security flag from it, so it is indeed public now).

The patch he supplied (while a good start) was stated to be untested, and we also determined that it did not, in fact, solve the problem (because it re-opened the file from scratch after creating the secure temp file, rather than using the handle passed back from File::Temp).

We have an upstream patch ready to go, which was awaiting the 2.16.11 release expected in the next couple weeks. No point in waiting now.

--
Dave Miller                                   http://www.justdave.net/
System Administrator, Mozilla Corporation      http://www.mozilla.com/
Project Leader, Bugzilla Bug Tracking System  http://www.bugzilla.org/


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to