Debian Security Advisory
DSA-362-1 mindi -- insecure temporary file
- Date Reported:
- 02 Aug 2003
- Affected Packages:
- mindi
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 8332.
In Mitre's CVE dictionary: CVE-2003-0617. - More information:
-
mindi, a program for creating boot/root disks, does not take appropriate security precautions when creating temporary files. This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running mindi.
For the stable distribution (woody) this problem has been fixed in version 0.58.r5-1woody1.
For the unstable distribution (sid) this problem will be fixed soon. Refer to Debian bug #203825.
We recommend that you update your mindi package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/m/mindi/mindi_0.58.r5-1woody1.dsc
- http://security.debian.org/pool/updates/main/m/mindi/mindi_0.58.r5-1woody1.diff.gz
- http://security.debian.org/pool/updates/main/m/mindi/mindi_0.58.r5.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/mindi/mindi_0.58.r5-1woody1.diff.gz
- Intel IA-32:
- http://security.debian.org/pool/updates/main/m/mindi/mindi_0.58.r5-1woody1_i386.deb
MD5 checksums of the listed files are available in the original advisory.