USN-1979-1: txt2man vulnerability

Publication date

30 September 2013

Overview

txt2man could be made to overwrite files.


Packages

  • txt2man - Converts flat ASCII text to man page format

Details

Patrick J Cherry discovered that txt2man contained leftover debugging code
that incorrectly created a temporary file. A local attacker could possibly
use this issue to overwrite arbitrary files. In the default Ubuntu
installation, this should be prevented by the Yama link restrictions.

Patrick J Cherry discovered that txt2man contained leftover debugging code
that incorrectly created a temporary file. A local attacker could possibly
use this issue to overwrite arbitrary files. In the default Ubuntu
installation, this should be prevented by the Yama link restrictions.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
13.04 raring txt2man –  1.5.5-4ubuntu0.13.04.1
12.10 quantal txt2man –  1.5.5-4ubuntu0.12.10.1
12.04 precise txt2man –  1.5.5-4ubuntu0.12.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›