forwarded 598296 thanks > Vulnerable code follows: > > /usr/bin/vips-7.22 line 108: > export LD_LIBRARY_PATH=$VIPSHOME/lib:$LD_LIBRARY_PATH > > When there's an empty item on the colon-separated list of > LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.) > If the given script is executed from a directory where a potential, > local, attacker can write files to, there's a chance to exploit this > bug.
I've forwarded the bug report to the upstream author and have suggested the fix of replacing export LD_LIBRARY_PATH=$VIPSHOME/lib:$LD_LIBRARY_PATH with export LD_LIBRARY_PATH=$VIPSHOME/lib${LD_LIBRARY_PATH+:$LD_LIBRARY_PATH} which is the usual way that I deal with appending to colon-separated variables. I haven't indicated where the bug has been forwarded to since I just sent it personally to the author. They don't have a bug tracking system, and I didn't mail it to the list.... -- Jay Berkenbilt <q...@debian.org> -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org