First published: Thu Oct 28 2004(Updated: )
Recently, Trustix Secure Linux discovered some vulnerabilities in the libc6 package. The utilities "catchsegv" and "glibcbug" created temporary files in an insecure way, which allowed a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libc6 | < | |
Ubuntu OpenSSH Client | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4-1 is high due to the potential for arbitrary file creation or overwriting via a symlink attack.
To fix USN-4-1, update the libc6 package to the latest version available in your Ubuntu repository.
USN-4-1 affects Ubuntu Linux version 4.10 that uses the vulnerable libc6 package.
USN-4-1 describes a symlink attack resulting from insecure temporary file handling.
Mitigation for USN-4-1 primarily involves keeping the system and packages up to date to prevent exploitation.