Debian Security Advisory
DSA-811-2 common-lisp-controller -- design error
- Date Reported:
- 14 Sep 2005
- Affected Packages:
- common-lisp-controller
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2005-2657.
- More information:
-
The bugfix for the problem mentioned below contained an error that caused third party programs to fail. The problem is corrected by this update. For completeness we're including the original advisory text:
François-René Rideau discovered a bug in common-lisp-controller, a Common Lisp source and compiler manager, that allows a local user to compile malicious code into a cache directory which is executed by another user if that user has not used Common Lisp before.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in version 4.15sarge3.
For the unstable distribution (sid) this problem has been fixed in version 4.18.
We recommend that you upgrade your common-lisp-controller package.
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge3.dsc
- http://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge3.tar.gz
- http://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge3.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge3_all.deb
MD5 checksums of the listed files are available in the original advisory.
MD5 checksums of the listed files are available in the revised advisory.