From mboxrd@z Thu Jan 1 00:00:00 1970 Path: news.gmane.org!not-for-mail From: Glenn Morris Newsgroups: gmane.emacs.bugs Subject: bug#17416: insecure temp files in ob-screen.el Date: Tue, 06 May 2014 00:14:36 -0400 Message-ID: <61ljbl1v.fsf@fencepost.gnu.org> NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: ger.gmane.org 1399413882 27580 80.91.229.3 (6 May 2014 22:04:42 GMT) X-Complaints-To: usenet@ger.gmane.org NNTP-Posting-Date: Tue, 6 May 2014 22:04:42 +0000 (UTC) To: 17416@debbugs.gnu.org Original-X-From: bug-gnu-emacs-bounces+geb-bug-gnu-emacs=m.gmane.org@gnu.org Wed May 07 00:04:37 2014 Return-path: Envelope-to: geb-bug-gnu-emacs@m.gmane.org Original-Received: from lists.gnu.org ([208.118.235.17]) by plane.gmane.org with esmtp (Exim 4.69) (envelope-from ) id 1WhnR3-0002FQ-JS for geb-bug-gnu-emacs@m.gmane.org; Wed, 07 May 2014 00:02:01 +0200 Original-Received: from localhost ([::1]:32789 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WhWma-0001QC-G7 for geb-bug-gnu-emacs@m.gmane.org; Tue, 06 May 2014 00:15:08 -0400 Original-Received: from eggs.gnu.org ([2001:4830:134:3::10]:45319) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WhWmX-0001Mi-4V for bug-gnu-emacs@gnu.org; Tue, 06 May 2014 00:15:05 -0400 Original-Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1WhWmW-0003st-HE for bug-gnu-emacs@gnu.org; Tue, 06 May 2014 00:15:05 -0400 Original-Received: from debbugs.gnu.org ([140.186.70.43]:34879) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WhWmU-0003pW-K2; Tue, 06 May 2014 00:15:02 -0400 Original-Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.80) (envelope-from ) id 1WhWmU-0005eJ-4V; Tue, 06 May 2014 00:15:02 -0400 X-Loop: help-debbugs@gnu.org Resent-From: Glenn Morris Original-Sender: "Debbugs-submit" Resent-CC: bug-gnu-emacs@gnu.org, emacs-orgmode@gnu.org Resent-Date: Tue, 06 May 2014 04:15:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 17416 X-GNU-PR-Package: emacs,org-mode X-GNU-PR-Keywords: security X-Debbugs-Original-To: submit@debbugs.gnu.org Original-Received: via spool by submit@debbugs.gnu.org id=B.139934968121660 (code B ref -1); Tue, 06 May 2014 04:15:01 +0000 Original-Received: (at submit) by debbugs.gnu.org; 6 May 2014 04:14:41 +0000 Original-Received: from localhost ([127.0.0.1]:52230 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.80) (envelope-from ) id 1WhWm8-0005dI-Kn for submit@debbugs.gnu.org; Tue, 06 May 2014 00:14:41 -0400 Original-Received: from fencepost.gnu.org ([208.118.235.10]:43345 ident=Debian-exim) by debbugs.gnu.org with esmtp (Exim 4.80) (envelope-from ) id 1WhWm5-0005dA-Ij for submit@debbugs.gnu.org; Tue, 06 May 2014 00:14:38 -0400 Original-Received: from rgm by fencepost.gnu.org with local (Exim 4.71) (envelope-from ) id 1WhWm4-0004aO-Tu; Tue, 06 May 2014 00:14:36 -0400 X-Spook: Maple PLO Uzbekistan Osama Plame InfoSec benelux Telex X-Ran: %;;A(2V5itFX$]-Fv[UN<".jf6!q/3.+Wn_j|o#$;v'@:P.MAqZ}JcJ7~"v X-Hue: cyan X-Attribution: GM User-Agent: Gnus (www.gnus.org), GNU Emacs (www.gnu.org/software/emacs/) X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.15 Precedence: list X-detected-operating-system: by eggs.gnu.org: GNU/Linux 3.x X-Received-From: 140.186.70.43 X-BeenThere: bug-gnu-emacs@gnu.org List-Id: "Bug reports for GNU Emacs, the Swiss army knife of text editors" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-gnu-emacs-bounces+geb-bug-gnu-emacs=m.gmane.org@gnu.org Original-Sender: bug-gnu-emacs-bounces+geb-bug-gnu-emacs=m.gmane.org@gnu.org Xref: news.gmane.org gmane.emacs.bugs:88668 Archived-At: Package: emacs,org-mode Version: 24.3.90 Severity: important Tags: security org-babel-screen-session-write-temp-file and org-babel-screen-test seem to use predictable temp-file names, which is a security issue. Using `make-temp-file', or if the file names really need to be predictable, something equivalent to `doc-view-make-safe-dir' (there should really be a general utility function for this IMO) to first create a /tmp subdirectory would avoid this.