Package: jumpnbump
Version: 1.50-6
Severity: grave
Tags: security
Justification: user security hole

Hi,

jumpnbump uses files in the /tmp directory in an unsafe manner:

 * jumpnbump-menu calls `convert' on files in /tmp, this allows
   another user to overwrite arbitrary files via symlinks.
   The patch for #500340 should solve this.

 * jumpnbump-menu calls `jumpnbump-unpack' in /tmp, same problem
   (this only affects the version in Etch, the version in Lenny is
   broken)
   The patch above addresses this as well.

 * in sdl/sound.c:509, the file "/tmp/jnb.tmpmusic.mod" is opened
   for writing

 * jumpnbump-unpack should not follow symlinks when overwriting files
   (makes it at least more safe if called in /tmp)

I think the last point is not as critical as the others, as the user
will have to start jumpnbump-unpack in a directory writable by others.

Regards,
Ansgar



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to