Rogier Wolff writes:
> Martin Schulze wrote:

>> This was not intentional by the author, he tried to use tempfile(1) to
>> create the temporary filename.  However, due to a thinko, the name was
>> hardcoded into the script.
> [...]
>> +#NNTPactive=\`tempfile -p active\`   #"/tmp/active.\$\$"
>
> So now you're using tempfile? This usually yields an easily
> predictable filename, for which the same exploits hold.  Just keep
> an eye out for the last PID issued, and OK, this time you might need
> to flip a link (provided that tempfile indeed refuses to return a
> file that is currently symlinked.)

tempfile opens the chosen filename using O_CREAT|O_EXCL.  If there is
a link there, this means it will get EEXIST.  (What tempfile then does
is to pick another name and try again.)

So, I believe the proposed fix is safe.

ttfn/rjk

Reply via email to