Package: guilt Version: 0.27-1 Severity: critical Tags: security guilt makes extensive use of the '$$' shell variable for temporary files in /tmp. This is a serious security vulnerability; on multi-user systems it allows an attacker to clobber files with something like the following:
for i in `seq 1 32768`; do ln -sf /etc/passwd /tmp/guilt.log.$i; done (In this example, if root does e.g. 'guilt push', /etc/passwd will get clobbered.) Please use mktemp(1) to create temporary files. For reference: guilt-0.27$ grep '$$' * guilt: $reject "$p" > /dev/null 2> /tmp/guilt.log.$$ guilt: rm -f /tmp/guilt.log.$$ /tmp/guilt.msg.\ $$ guilt: do_get_header "$p" > /tmp/guilt.msg.$$ guilt: [ ! -s /tmp/guilt.msg.$$ ] && echo "patch $pname" > /tmp/guilt.\ msg.$$ guilt: rm -f /tmp/guilt.msg.$$ /tmp/guilt.log.$$ guilt: do_get_full_header "$p" > /tmp/guilt.diff.$$ guilt: ) >> /tmp/guilt.diff.$$ guilt: git-diff $diffopts "$2" >> /tmp/guilt.diff.$$ guilt-header: do_get_full_header "$GUILT_DIR/$branch/$patch" > /tmp/guilt.msg\ .$$ guilt-header: do_get_patch "$GUILT_DIR/$branch/$patch" > /tmp/guilt.diff.$$ guilt-header: cat /tmp/guilt.msg.$$ guilt-header: cat /tmp/guilt.diff.$$ guilt-0.27$ Thanks, -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.22-2-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages guilt depends on: ii git-core 1:1.5.3.3-1 fast, scalable, distributed revisi guilt recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]