UBUNTU-CVE-2001-1593

Source
https://ubuntu.com/security/CVE-2001-1593
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2001/UBUNTU-CVE-2001-1593.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2001-1593
Upstream
Withdrawn
2025-07-18T16:42:37Z
Published
2014-04-05T21:55:00Z
Modified
2025-07-16T07:30:37.082655Z
Severity
  • Ubuntu - low
Summary
[none]
Details

Jakub Wilk found that a2ps, a tool to convert text and other types of files to PostScript, insecurely used a temporary file in spy_user(). A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running a2ps.

References

Affected packages

Ubuntu:14.04:LTS / a2ps

Package

Name
a2ps
Purl
pkg:deb/ubuntu/a2ps@1:4.14-1.2?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.14-1.2

Affected versions

1:4.*
1:4.14-1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "a2ps",
            "binary_version": "1:4.14-1.2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2001/UBUNTU-CVE-2001-1593.json"