| To: | pcp@xxxxxxxxxxx |
|---|---|
| Subject: | [Bug 1062] mmv pmda sensitive to malevolent data |
| From: | bugzilla-daemon@xxxxxxxxxxx |
| Date: | Thu, 30 Jun 2016 16:16:35 +0000 |
| Auto-submitted: | auto-generated |
| Delivered-to: | pcp@xxxxxxxxxxx |
| In-reply-to: | <bug-1062-835@xxxxxxxxxxxxxxxx/bugzilla/> |
| References: | <bug-1062-835@xxxxxxxxxxxxxxxx/bugzilla/> |
|
Comment # 4
on bug 1062
from Frank Ch. Eigler
(In reply to comment #3) > Targetted fuzzing of mmv input data is left as an interesting future QA > extension. [...] it is less of an issue with use > of the group-based mmv stats dir access of course. The group-based mmv stats dir is only a documentation artefact. Current code pcp/mmv retains the less-secure-by-default 1777 permissions for brand-new pcp installations. You are receiving this mail because:
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: [pcp] pmrep: improve command line parsing, Marko Myllynen |
|---|---|
| Next by Date: | pcp2influxdb - a clone of pcp2graphite, Alec Ten Harmsel |
| Previous by Thread: | [Bug 1062] mmv pmda sensitive to malevolent data, bugzilla-daemon |
| Next by Thread: | [Bug 1061] mmv pmda sensitive to TOCTOU for shmem metadata extraction, bugzilla-daemon |
| Indexes: | [Date] [Thread] [Top] [All Lists] |