A vulnerability has been reported for the adb2mhc utility included with mhc-utils. adb2mhc may create temporary files in an insecure manner. It is likely that this vulnerability may be related to creating temporary files with predictable names. By anticipating the names used to create temporary files used by adb2mhc, it may be possible for a local attacker to corrupt or modify data as another user.
A vulnerability has been reported for the adb2mhc utility included with mhc-utils. adb2mhc may create temporary files in an insecure manner. It is likely that this vulnerability may be related to creating temporary files with predictable names. By anticipating the names used to create temporary files used by adb2mhc, it may be possible for a local attacker to corrupt or modify data as another user.