First published: Mon Mar 17 2014(Updated: )
Steve Kemp discovered the _rl_tropen() function in readline, a set of libraries to handle command lines, insecurely handled a temporary file. This could allow a local attacker to perform symbolic link attacks. As noted in the CVE request, _rl_tropen() is typically only called during debugging. CVE request: <a href="http://seclists.org/oss-sec/2014/q1/579">http://seclists.org/oss-sec/2014/q1/579</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Readline 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1077023 is considered high due to the potential for local attackers to exploit symbolic link vulnerabilities.
To fix REDHAT-BUG-1077023, you should update your GNU Readline library to the latest version that addresses this vulnerability.
The potential impacts of REDHAT-BUG-1077023 include unauthorized access and manipulation of files by local attackers due to insecure temporary file handling.
Users of GNU Readline, particularly in environments where debugging features are enabled, are affected by REDHAT-BUG-1077023.
REDHAT-BUG-1077023 was discovered by Steve Kemp, indicating it was identified around early 2014.