Debian Security Advisory
ghostscript -- symlink attack
- Date Reported:
- 23 Nov 2000
- Affected Packages:
- gs
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2000-1162, CVE-2000-1163.
- More information:
-
ghostscript uses temporary files, however the method used to create those
files wasn't secure: mktemp was used to create a name for a temporary file,
but the file was not opened safely. Another problem is that during build,
the LD_RUN_PATH environment variable was set to the empty string, which
causes the dynamic linker to look in the current directory for shared
libraries.
Both of these problems have been fixed in version 5.10-10.1.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
-
http://security.debian.org/dists/stable/updates/main/source/gs_5.10-10.1.dsc
-
http://security.debian.org/dists/stable/updates/main/source/gs_5.10-10.1.diff.gz
-
http://security.debian.org/dists/stable/updates/main/source/gs_5.10.orig.tar.gz
- Alpha:
-
http://security.debian.org/dists/stable/updates/main/binary-alpha/gs_5.10-10.1_alpha.deb
- ARM:
-
http://security.debian.org/dists/stable/updates/main/binary-arm/gs_5.10-10.1_arm.deb
- Intel IA32:
-
http://security.debian.org/dists/stable/updates/main/binary-i386/gs_5.10-10.1_i386.deb
- Motorola 680x0:
-
http://security.debian.org/dists/stable/updates/main/binary-m68k/gs_5.10-10.1_m68k.deb
- PowerPC:
-
http://security.debian.org/dists/stable/updates/main/binary-powerpc/gs_5.10-10.1_powerpc.deb
- Sun SPARC:
-
http://security.debian.org/dists/stable/updates/main/binary-sparc/gs_5.10-10.1_sparc.deb