Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01cGpqLTdtNHAtd2ZoMs4AAalo
ocrodjvu is vulnerable to Arbitrary File Modification via symlink attack
ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine.
Permalink: https://github.com/advisories/GHSA-5pjj-7m4p-wfh2JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01cGpqLTdtNHAtd2ZoMs4AAalo
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 3 months ago
Identifiers: GHSA-5pjj-7m4p-wfh2, CVE-2010-4338
References:
- https://nvd.nist.gov/vuln/detail/CVE-2010-4338
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64892
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598134
- https://web.archive.org/web/20200229160520/http://www.securityfocus.com/bid/45234
- https://github.com/advisories/GHSA-5pjj-7m4p-wfh2
Affected Packages
pypi:ocrodjvu
Dependent packages: 0Dependent repositories: 3
Downloads: 64 last month
Affected Version Ranges: = 0.4.6-1
Fixed in: 0.4.6-2
All affected versions:
All unaffected versions: 0.13.1