Comment #0 by edelkind+puremagic — 2011-06-17T10:17:34Z
rdmd will create temporary files in /tmp/.rdmd . A malicious user could pre-create such a directory and link target files elsewhere.
A more appropriate location for temporary files would be under the user's home directory (e.g. $HOME/.rdmd). If the user's home directory is unwritable, then /tmp/.rdmd.[random] may be used.
Comment #1 by gslopsema+dbugzilla — 2011-07-22T13:38:58Z
Comment #3 by edelkind+puremagic — 2012-04-28T05:37:04Z
Given that I reported this issue nearly a year ago, this isn't the sort of response time that I was hoping for with either a security report or a "critical" bug report.
For future reference, is there another avenue that I should use to report such issues for a more timely acknowledgement, or is this the sort of response time I should expect?
Comment #4 by andrei — 2012-04-28T08:26:45Z
If an issue stops from getting work done, it's always a good idea to substantiate the reason in the bug report. Also, starting a discussion on the topic at http://forum.dlang.org is helpful.
On the face of it this doesn't look like a showstopper. If the matter is absolutely essential, there are many possible workarounds, starting with changing rdmd.d and ending with simply using dmd instead of rdmd for critical work.