Debian Security Advisory

ghostscript -- symlink attack

Date Reported:
23 Nov 2000
Affected Packages:
gs
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2000-1162, CVE-2000-1163.
More information:
ghostscript uses temporary files, however the method used to create those files wasn't secure: mktemp was used to create a name for a temporary file, but the file was not opened safely. Another problem is that during build, the LD_RUN_PATH environment variable was set to the empty string, which causes the dynamic linker to look in the current directory for shared libraries.

Both of these problems have been fixed in version 5.10-10.1.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/gs_5.10-10.1.dsc
http://security.debian.org/dists/stable/updates/main/source/gs_5.10-10.1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/gs_5.10.orig.tar.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/gs_5.10-10.1_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/gs_5.10-10.1_arm.deb
Intel IA32:
http://security.debian.org/dists/stable/updates/main/binary-i386/gs_5.10-10.1_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/gs_5.10-10.1_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/gs_5.10-10.1_powerpc.deb
Sun SPARC:
http://security.debian.org/dists/stable/updates/main/binary-sparc/gs_5.10-10.1_sparc.deb