~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2013-1444

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2013-09-25
2
 
Candidate: CVE-2013-1444
3
 
PublicDate: 2013-09-30
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1444
6
 
 https://usn.ubuntu.com/usn/usn-1979-1
7
 
Description:
8
 
 A certain Debian patch for txt2man 1.5.5, as used in txt2man 1.5.5-2,
9
 
 1.5.5-4, and others, allows local users to overwrite arbitrary files via a
10
 
 symlink attack on /tmp/2222.
11
 
Ubuntu-Description:
12
 
Notes:
13
 
 sarnold> "echo $post > /tmp/2222" -- looks like unsafe quoting, too.
14
 
Bugs:
15
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724614
16
 
Priority: medium
17
 
Discovered-by: Patrick J Cherry
18
 
Assigned-to: mdeslaur
19
 
 
20
 
Tags_txt2man: symlink-restriction hardlink-restriction
21
 
Patches_txt2man:
22
 
upstream_txt2man: needed
23
 
lucid_txt2man: ignored (reached end-of-life)
24
 
precise_txt2man: released (1.5.5-4ubuntu0.12.04.1)
25
 
quantal_txt2man: released (1.5.5-4ubuntu0.12.10.1)
26
 
raring_txt2man: released (1.5.5-4ubuntu0.13.04.1)
27
 
devel_txt2man: released (1.5.5-4ubuntu1)