Debian Security Advisory

DSA-636-1 glibc -- insecure temporary files

Date Reported:
12 Jan 2005
Affected Packages:
glibc
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 279680, Bug 278278, Bug 205600.
In the Bugtraq database (at SecurityFocus): BugTraq ID 11286.
In Mitre's CVE dictionary: CVE-2004-0968, CVE-2004-1382.
More information:

Several insecure uses of temporary files have been discovered in support scripts in the libc6 package which provides the c library for a GNU/Linux system. Trustix developers found that the catchsegv script uses temporary files insecurely. Openwall developers discovered insecure temporary files in the glibcbug script. These scripts are vulnerable to a symlink attack.

For the stable distribution (woody) these problems have been fixed in version 2.2.5-11.8.

For the unstable distribution (sid) these problems have been fixed in version 2.3.2.ds1-20.

We recommend that you upgrade your libc6 package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/g/glibc/glibc_2.2.5-11.8.dsc
http://security.debian.org/pool/updates/main/g/glibc/glibc_2.2.5-11.8.diff.gz
http://security.debian.org/pool/updates/main/g/glibc/glibc_2.2.5.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/g/glibc/glibc-doc_2.2.5-11.8_all.deb
http://security.debian.org/pool/updates/main/g/glibc/locales_2.2.5-11.8_all.deb
Alpha:
http://security.debian.org/pool/updates/main/g/glibc/libc6.1_2.2.5-11.8_alpha.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dbg_2.2.5-11.8_alpha.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dev_2.2.5-11.8_alpha.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-pic_2.2.5-11.8_alpha.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-prof_2.2.5-11.8_alpha.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_arm.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_arm.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_arm.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_arm.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_arm.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_i386.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_i386.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_i386.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_i386.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_i386.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/glibc/libc6.1_2.2.5-11.8_ia64.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dbg_2.2.5-11.8_ia64.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-dev_2.2.5-11.8_ia64.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-pic_2.2.5-11.8_ia64.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6.1-prof_2.2.5-11.8_ia64.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_hppa.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_hppa.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_hppa.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_hppa.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_hppa.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_m68k.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_m68k.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_m68k.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_m68k.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_m68k.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_mips.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_mips.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_mips.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_mips.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_mips.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_mipsel.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_mipsel.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_mipsel.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_mipsel.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_mipsel.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_powerpc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_powerpc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_powerpc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_powerpc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_powerpc.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_s390.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_s390.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_s390.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_s390.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_s390.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/glibc/libc6_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dbg_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-dev-sparc64_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-pic_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-prof_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/libc6-sparc64_2.2.5-11.8_sparc.deb
http://security.debian.org/pool/updates/main/g/glibc/nscd_2.2.5-11.8_sparc.deb

MD5 checksums of the listed files are available in the original advisory.