Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 195996 - media-gfx/hugin < 0.6.1-r1 Insecure temporary file creation (CVE-2007-5200)
Summary: media-gfx/hugin < 0.6.1-r1 Insecure temporary file creation (CVE-2007-5200)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/27623/
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-10-15 23:14 UTC by Robert Buchholz (RETIRED)
Modified: 2007-12-05 22:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
hugin-0.6.1-optim_file.patch (hugin-0.6.1-optim_file.patch,1.00 KB, patch)
2007-10-15 23:19 UTC, Robert Buchholz (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2007-10-15 23:14:37 UTC
CVE-2007-5200 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5200):
  hugin in SUSE openSUSE 10.2 and 10.3 allows local users to overwrite
  arbitrary files via a symlink attack on a temporary file.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2007-10-15 23:18:48 UTC
This does not only affect SuSe, but seems to be an upstream problem. Attching patch applied by suse. It removes debug logging functionality, though.

Graphics, please advise and contact upstream about it. They do not have any fix in their repository yet.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2007-10-15 23:19:18 UTC
Created attachment 133580 [details, diff]
hugin-0.6.1-optim_file.patch
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2007-10-25 17:50:58 UTC
nion from Debian security created a proper patch that was included in the upstream repository:
http://people.debian.org/~nion/nmu-diff/hugin-0.6.1-1_0.6.1-1.1.patch
Comment 4 Robert Buchholz (RETIRED) gentoo-dev 2007-10-25 23:12:09 UTC
Upstream is not going to release an update to their stable 0.6 branch and the new release is not within days. Graphics, please provide an updated ebuild with the patch applied.
Comment 5 Luca Barbato gentoo-dev 2007-10-25 23:41:45 UTC
ebuild prepared
Comment 6 Robert Buchholz (RETIRED) gentoo-dev 2007-10-25 23:55:29 UTC
Faster than lightning! Thanks.

Arches, please test and mark stable media-gfx/hugin-0.6.1-r1.
Target keywords : "amd64 ppc x86"
Comment 7 Luca Barbato gentoo-dev 2007-10-26 01:01:18 UTC
ppc stable
Comment 8 Markus Meier gentoo-dev 2007-10-26 10:16:52 UTC
x86 stable, luca did you forget to commit? readding ppc
Comment 9 Luca Barbato gentoo-dev 2007-10-26 16:58:08 UTC
done eventually
Comment 10 Peter Weller (RETIRED) gentoo-dev 2007-11-14 07:03:44 UTC
amd64 done, closing
Comment 11 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-11-14 09:04:04 UTC
?? please let security team close security bugs.
glsa vote open. I tend to vote YES.
Comment 12 Robert Buchholz (RETIRED) gentoo-dev 2007-11-14 17:51:29 UTC
Voting YES.
Comment 13 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-11-17 23:48:11 UTC
glsa filed.
Comment 14 Robert Buchholz (RETIRED) gentoo-dev 2007-11-18 16:22:41 UTC
As it seems, our unstable 0.7_beta4 is still vulnerable to this. Can it be removed or updated with a more current SVN snapshot?
Comment 15 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-11-29 22:02:53 UTC
(In reply to comment #14)
> As it seems, our unstable 0.7_beta4 is still vulnerable to this. Can it be
> removed or updated with a more current SVN snapshot?
> 

*ping*
Comment 16 Markus Meier gentoo-dev 2007-12-03 16:41:30 UTC
(In reply to comment #14)
> As it seems, our unstable 0.7_beta4 is still vulnerable to this. Can it be
> removed or updated with a more current SVN snapshot?

I ported the fix from 0.6 to 0.7 series (just a different line#).
Comment 17 Robert Buchholz (RETIRED) gentoo-dev 2007-12-03 16:47:25 UTC
Please do not close security bugs.
Comment 18 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-12-05 22:29:11 UTC
GLSa 200712-01, sorry for the delay.