Bug#737385: CVE request: a2ps insecure temporary file use

2014-02-05 Thread cve-assign
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 >> https://bugzilla.redhat.com/show_bug.cgi?id=1060630#c5 >> * Mon Feb 12 2001 Tim Waugh >> - Fix tmpfile security patch so that it actually _works_ (bug #27155). >> And notes >> http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.

Bug#737385: CVE request: a2ps insecure temporary file use

2014-02-04 Thread cve-assign
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > https://bugzilla.redhat.com/show_bug.cgi?id=1060630#c5 > > * Fri Jan 05 2001 Preston Brown > - security patch for tmpfile creation from Olaf Kirch > > followed the next month by a fix to that patch: > > * Mon Feb 12 2001 Tim Waugh > - Fix tmpfi

Bug#737385: CVE request: a2ps insecure temporary file use

2014-02-02 Thread Murray McAllister
Hello, Jakub Wilk found that a2ps, a tool to convert text and other types of files to PostScript, insecurely used a temporary file in spy_user(). A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running a2ps: http://bugs.deb