registry team mailing list archive
-
registry team
-
Mailing list archive
-
Message #01080
[Bug 538471] Re: autokey: insecure use of temporary files (Data Corruption, Local Denial of Service)
This bug was fixed in the package autokey - 0.54.5-1ubuntu0.3
---------------
autokey (0.54.5-1ubuntu0.3) karmic-security; urgency=low
* SECURITY UPDATE: arbitrary file overwriting via symlinks (LP: #538471)
- Store files for the EvDev daamon in FHS-specified locations
- debian/autokey.init: Set pidfile path to '/var/run/autokey-daemon.pid'
- src/lib/interface.py: Set DOMAIN_SOCKET_PATH to "/var/run/autokey-daemon"
- CVE-2010-0398
-- Luke Faraone <luke@xxxxxxxxxx> Sat, 13 Mar 2010 17:14:24 -0500
** Changed in: autokey (Ubuntu Karmic)
Status: Fix Committed => Fix Released
--
autokey: insecure use of temporary files (Data Corruption, Local Denial of Service)
https://bugs.launchpad.net/bugs/538471
You received this bug notification because you are a member of Registry
Administrators, which is the registrant for Debian.