On 02/03/2014 05:12 PM, Murray McAllister wrote:
Hello,
Jakub Wilk found that a2ps, a tool to convert text and other types of
files to PostScript, insecurely used a temporary file in spy_user(). A
local attacker could use this flaw to perform a symbolic link attack to
modify an arbitrary file accessible to the user running a2ps:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385
The original report notes there are calls to tempname_ensure(). If any
of those are found to be vulnerable, would they use the same CVE number,
or require a different one?
References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385
https://bugzilla.redhat.com/show_bug.cgi?id=1060630
Thanks,
--
Murray McAllister / Red Hat Security Response Team
Tim Waugh pointed out this was fixed in 2001:
https://bugzilla.redhat.com/show_bug.cgi?id=1060630#c5
And notes
http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch
is the patch.
Cheers,
--
Murray McAllister / Red Hat Security Response Team
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org