Gangstuck and Psirac have reported some vulnerabilities in openMosixview, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
The vulnerabilities are caused due to various temporary files being created insecurely with predictable filenames. This can be exploited via symlink attacks to create or overwrite arbitrary files on the system with the privileges of the user running openmosixview or the openmosixcollector daemon.
The vulnerabilities have been reported in versions 1.5 and prior.
Grant only trusted users access to affected systems
See discussion about this bug at:
Patches are at:
tantive/cluster: please review patches and bump with them if you think they are ok.
xmerlin (cluster herd) said he would have a look.
fixed in cvs
Reopening to handle stable/glsa steps
xmerlin: could you bump the revision ?
Security please vote on GLSA need
Do openmosixview or the openmosixcollector daemon typically run as root ? If yes, I would issue a GLSA about it, if not, I wouldn't.
xmerlin/cluster herd, could you give us your opinion ?
I think it can be run by root quite usually, so I vote YES.
It needs to be run as root as I can remember
I vote yes as well.