First published: Tue Dec 08 2009(Updated: )
The "distcheck" Makefile rule in coreutils 5.2.1 through to 8.1 did use unsafe (predictable) temporary directory location for performing own tasks. This might allow local attacker to conduct symlink attacks under certain circumstances. Upstream patch: --------------- <a href="http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5">http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5</a> Credit: ------- Jim Meyering CVE Request: ------------ <a href="http://www.openwall.com/lists/oss-security/2009/12/08/4">http://www.openwall.com/lists/oss-security/2009/12/08/4</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Coreutils | >=5.2.1<8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-545439 has been classified as a moderate risk due to its potential for local symlink attacks.
To fix REDHAT-BUG-545439, upgrade GNU coreutils to a version later than 8.1.
GNU coreutils versions from 5.2.1 to 8.1 are affected by REDHAT-BUG-545439.
REDHAT-BUG-545439 allows local attackers to conduct symlink attacks under certain conditions.
Users and systems running vulnerable versions of GNU coreutils are at risk due to REDHAT-BUG-545439.