blob: d59b7642aad91184780e51322fcb2d6707420e4e [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200410-19">
<title>glibc: Insecure tempfile handling in catchsegv script</title>
The catchsegv script in the glibc package is vulnerable to symlink attacks,
potentially allowing a local user to overwrite arbitrary files with the
rights of the user running the script.
<product type="ebuild">glibc</product>
<announced>October 21, 2004</announced>
<revised>October 21, 2004: 01</revised>
<package name="sys-libs/glibc" auto="yes" arch="*">
<unaffected range="rge">2.2.5-r9</unaffected>
<unaffected range="rge">2.3.2-r12</unaffected>
<unaffected range="rge"></unaffected>
<unaffected range="rge"></unaffected>
<unaffected range="ge"></unaffected>
<vulnerable range="le"></vulnerable>
glibc is a package that contains the GNU C library.
The catchsegv script creates temporary files in world-writeable directories
with predictable names.
<impact type="normal">
A local attacker could create symbolic links in the temporary files
directory, pointing to a valid file somewhere on the filesystem. When
catchsegv script is called, this would result in the file being overwritten
with the rights of the user running the utility, which could be the root
There is no known workaround at this time.
All glibc users should upgrade to the latest version:
# emerge sync
# emerge -pv sys-libs/glibc
# emerge sys-libs/glibc</code>
<uri link="">CAN-2004-0968</uri>
<metadata tag="requester" timestamp="Wed, 20 Oct 2004 14:29:16 +0000">
<metadata tag="bugReady" timestamp="Wed, 20 Oct 2004 14:29:39 +0000">
<metadata tag="submitter" timestamp="Wed, 20 Oct 2004 16:11:58 +0000">