forwarded 598296
thanks

> Vulnerable code follows:
>
> /usr/bin/vips-7.22 line 108:
>       export LD_LIBRARY_PATH=$VIPSHOME/lib:$LD_LIBRARY_PATH
>
> When there's an empty item on the colon-separated list of
> LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
> If the given script is executed from a directory where a potential,
> local, attacker can write files to, there's a chance to exploit this
> bug.

I've forwarded the bug report to the upstream author and have suggested
the fix of replacing

  export LD_LIBRARY_PATH=$VIPSHOME/lib:$LD_LIBRARY_PATH

with

  export LD_LIBRARY_PATH=$VIPSHOME/lib${LD_LIBRARY_PATH+:$LD_LIBRARY_PATH}

which is the usual way that I deal with appending to colon-separated
variables.  I haven't indicated where the bug has been forwarded to
since I just sent it personally to the author.  They don't have a bug
tracking system, and I didn't mail it to the list....

-- 
Jay Berkenbilt <q...@debian.org>



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to