diff options
author | Alex Legler <alex@a3li.li> | 2015-03-08 22:02:38 +0100 |
---|---|---|
committer | Alex Legler <alex@a3li.li> | 2015-03-08 22:02:38 +0100 |
commit | a24567fbc43f221b14e805f9bc0b7c6d16911c46 (patch) | |
tree | 910a04fe6ee560ac0eebac55f3cd2781c3519760 /glsa-200404-08.xml | |
download | glsa-a24567fbc43f221b14e805f9bc0b7c6d16911c46.tar.gz glsa-a24567fbc43f221b14e805f9bc0b7c6d16911c46.tar.bz2 glsa-a24567fbc43f221b14e805f9bc0b7c6d16911c46.zip |
Import existing advisories
Diffstat (limited to 'glsa-200404-08.xml')
-rw-r--r-- | glsa-200404-08.xml | 68 |
1 files changed, 68 insertions, 0 deletions
diff --git a/glsa-200404-08.xml b/glsa-200404-08.xml new file mode 100644 index 00000000..8e4bc840 --- /dev/null +++ b/glsa-200404-08.xml @@ -0,0 +1,68 @@ +<?xml version="1.0" encoding="utf-8"?> +<?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?> +<?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> + +<glsa id="200404-08"> + <title>GNU Automake symbolic link vulnerability</title> + <synopsis> + Automake may be vulnerable to a symbolic link attack which may allow an + attacker to modify data or elevate their privileges. + </synopsis> + <product type="ebuild">automake</product> + <announced>April 08, 2004</announced> + <revised>January 31, 2005: 05</revised> + <bug>45646</bug> + <access>local</access> + <affected> + <package name="sys-devel/automake" auto="yes" arch="*"> + <unaffected range="ge">1.8.5-r3</unaffected> + <unaffected range="rge">1.7.9-r1</unaffected> + <unaffected range="lt">1.7</unaffected> + <vulnerable range="le">1.8.5-r2</vulnerable> + </package> + </affected> + <background> + <p> + Automake is a tool for automatically generating `Makefile.in' files + which is often used in conjuction with Autoconf and other GNU Autotools + to ease portability among applications. It also provides a standardized + and light way of writing complex Makefiles through the use of many + built-in macros. + </p> + </background> + <description> + <p> + Automake may be vulnerable to a symbolic link attack which may allow an + attacker to modify data or escalate their privileges. This is due to + the insecure way Automake creates directories during compilation. An + attacker may be able to create symbolic links in the place of files + contained in the affected directories, which may potentially lead to + elevated privileges due to modification of data. + </p> + </description> + <impact type="normal"> + <p> + An attacker may be able to use this vulnerability to modify data in an + unauthorized fashion or elevate their privileges. + </p> + </impact> + <workaround> + <p> + A workaround is not currently known for this issue. All users are + advised to upgrade to the latest version of the affected package. + </p> + </workaround> + <resolution> + <p> + Automake users should upgrade to the latest versions: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose sys-devel/automake</code> + </resolution> + <references/> + <metadata tag="submitter"> + klieber + </metadata> +</glsa> |