First published: Wed Oct 27 2004(Updated: )
Recently, Trustix Secure Linux discovered some vulnerabilities in the gs-common package. The utilities "pv.sh" and "ps2epsi" created temporary files in an insecure way, which allowed a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gs-common | < | |
Ubuntu gir1.2-packagekitglib-1.0 | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The USN-3-1 vulnerability is considered to have a moderate severity due to the potential for local privilege escalation.
To fix the USN-3-1 vulnerability, update the gs-common package to a patched version provided by your Linux distribution.
USN-3-1 affects Ubuntu version 4.10 utilizing the gs-common package.
USN-3-1 exposes systems to symlink attacks that can lead to arbitrary file creation or overwriting.
The USN-3-1 vulnerability was discovered by Trustix Secure Linux.