Disabling /tmp watch in RawHide
Stan Bubrouski
stan at ccs.neu.edu
Mon Nov 3 23:33:07 UTC 2003
On Mon, 2003-11-03 at 18:02, Paul Jakma wrote:
> On Mon, 3 Nov 2003, Stan Bubrouski wrote:
>
> > more insecure /tmp usage, even if by only the broken usages (i.e.
> > leaving the files behind). Any thoughts?
>
> Leaving the files behind does not automatically indicate the app
> created/used tmp files insecurely.
>
Yes I'm well aware there are files and directories which by tradition
and convenience exist in /tmp
> what are the apps, and what is the insecure behavior in them?
>
This is not the appropriate forum to discuss unannounced bugs, however
take for example a program that blindly creates a file in /tmp with a
predictable or even static name and follows symlinks allowing files to
be overwritten. With tmpwatch on, this bad behavior is masked because
the files it might leave behind are deleted and may go for several
releases before being caught, if ever. Like I said, I think this is
definitely something to consider, because we can get a more secure
system as a result.
Take for example this:
http://www.securityfocus.com/archive/1/343038/2003-10-31/2003-11-06/0
-sb
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20031103/6e43e88b/attachment.sig>
More information about the fedora-devel-list
mailing list