First published: Wed Oct 27 2004(Updated: )
Recently, Trustix Secure Linux discovered some vulnerabilities in the gettext package. The programs "autopoint" and "gettextize" created temporary files in an insecure way, which allowed a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gettext | < | |
Ubuntu | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-5-1 is considered a moderate severity vulnerability due to its potential for a symlink attack.
To fix USN-5-1, you should update the gettext package to the latest version provided by your Linux distribution.
USN-5-1 primarily affects Ubuntu Linux version 4.10.
USN-5-1 can be exploited through symlink attacks allowing unauthorized file creation or overwriting with user privileges.
Using package management tools like APT can help identify if the vulnerable version of gettext is installed on the system.