Debian Security Advisory

DSA-636-1 glibc -- insecure temporary files

Date Reported:
12 Jan 2005
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 279680, Bug 278278, Bug 205600.
In the Bugtraq database (at SecurityFocus): BugTraq ID 11286.
In Mitre's CVE dictionary: CVE-2004-0968, CVE-2004-1382.
More information:

Several insecure uses of temporary files have been discovered in support scripts in the libc6 package which provides the c library for a GNU/Linux system. Trustix developers found that the catchsegv script uses temporary files insecurely. Openwall developers discovered insecure temporary files in the glibcbug script. These scripts are vulnerable to a symlink attack.

For the stable distribution (woody) these problems have been fixed in version 2.2.5-11.8.

For the unstable distribution (sid) these problems have been fixed in version 2.3.2.ds1-20.

We recommend that you upgrade your libc6 package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.