b5870e3006
- fix insecure file creation in /tmp, patch from silc cvs the impact of this issue is very low. it allows an attacker to overwrite arbitrary files owned by the user running silcd ("silcd", in pkgsrc) IFF the owner of the process or root send SIGUSR1 signal to the process to dump stats. the only file owned by the "silcd" user is typically the log file which resides in a directory inaccessible by anyone except the user itself and root so the potential attacker would need to guess its name. http://www.zataz.net/adviso/silc-server-toolkit-06152005.txt please note that the advisory also incorrectly states that silc-toolkit is vulnerable too. the code in question is never compiled in the toolkit so it's not affected. Bump PKGREVISION.
8 lines
430 B
Text
8 lines
430 B
Text
$NetBSD: distinfo,v 1.29 2005/09/13 22:02:24 salo Exp $
|
|
|
|
SHA1 (silc-server-1.0.tar.bz2) = bcf440c89b3266f47e64a8f175ffba117f071899
|
|
RMD160 (silc-server-1.0.tar.bz2) = 0316e72d48ca8b4d092db8765807d97ab659b317
|
|
Size (silc-server-1.0.tar.bz2) = 969309 bytes
|
|
SHA1 (patch-aa) = 3b189047000593b36305f23301987982706355dc
|
|
SHA1 (patch-ab) = 55b3f00076c5b8a443465753ae07b9e812236f18
|
|
SHA1 (patch-ac) = f167cadd94656cac0ad5edba577b2035cfe9b216
|