First published: Fri Jun 30 2006(Updated: )
spread uses a temporary file with a static filename based on the port number, which allows local users to cause a denial of service by creating the file during a race condition between unlink and bind function calls. NOTE: spread deletes this temporary file before use, which could cause conflicts with other programs that use the same filename, but this is not a distinct issue.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Spread |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.