First published: Fri Feb 27 2015(Updated: )
A flaw was found in the pre-install script of texlive-base package derived from texlive package. This flaw allows unprivileged user to remove arbitrary files on the system. ~ rpm -qa texlive-base --scripts preinstall scriptlet (using /bin/sh): rm -rf /usr/share/texlive/texmf-var rm -rf /var/lib/texmf/* # Following script in the preinstall scriplet allows attacker to remove arbitrary files on the systems for i in `find /home/*/.texlive* -type d -prune`; do find $i -name *.fmt -type f | xargs rm -f > /dev/null 2>&1 done ... Attacker can create a malicious file in his $HOME directory that would trigger file removal and wait for the texlive-base package to be updated by administrator, as when package will be updated it would run preinstall scriplet which would then run malicious file in attacker $HOME directory as privileged user. Reproducer and more information: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1099238">https://bugzilla.redhat.com/show_bug.cgi?id=1099238</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tug Texlive | =6.20131226_r32488.fc20 | |
Fedoraproject Fedora | =20 | |
Tug Texlive | =3.1.20140525_r34255.fc21 | |
Fedoraproject Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.