blob: e896c99fad8998f589ffa19f6eda8a3dc525a534 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200611-23">
<title>Mono: Insecure temporary file creation</title>
Mono is vulnerable to linking attacks, potentially allowing a local user to
overwrite arbitrary files.
<product type="ebuild">mono</product>
<announced>November 28, 2006</announced>
<revised>November 28, 2006: 01</revised>
<package name="dev-lang/mono" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
Mono provides the necessary software to develop and run .NET client and
server applications.
Sebastian Krahmer of the SuSE Security Team discovered that the
System.CodeDom.Compiler classes of Mono create temporary files with
insecure permissions.
<impact type="normal">
A local attacker could create links in the temporary file directory,
pointing to a valid file somewhere on the filesystem. When an affected
class is called, this could result in the file being overwritten with
the rights of the user running the script.
There is no known workaround at this time.
All Mono users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-;</code>
<uri link="">CVE-2006-5072</uri>
<metadata tag="requester" timestamp="Fri, 24 Nov 2006 09:48:51 +0000">
<metadata tag="submitter" timestamp="Mon, 27 Nov 2006 17:16:01 +0000">
<metadata tag="bugReady" timestamp="Tue, 28 Nov 2006 12:13:57 +0000">