Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 504898 (CVE-2014-2524) - <sys-libs/readline-6.3_p3 : insecure temporary file use in _rl_tropen() (CVE-2014-2524)
Summary: <sys-libs/readline-6.3_p3 : insecure temporary file use in _rl_tropen() (CVE-...
Status: RESOLVED FIXED
Alias: CVE-2014-2524
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://git.savannah.gnu.org/cgit/read...
Whiteboard: A4 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-17 16:57 UTC by Agostino Sarubbo
Modified: 2017-07-15 23:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
readline-6.3-CVE-2014-2524.patch (readline-6.3-CVE-2014-2524.patch,796 bytes, patch)
2014-07-29 06:41 UTC, Andrey Ovcharov
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-03-17 16:57:01 UTC
From ${URL} :

Steve Kemp discovered the _rl_tropen() function in readline, a set of libraries to handle command lines, 
insecurely handled a temporary file. This could allow a local attacker to perform symbolic link attacks. 
As noted in the CVE request, _rl_tropen() is typically only called during debugging.

CVE request: http://seclists.org/oss-sec/2014/q1/579


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Andrey Ovcharov 2014-07-29 06:41:48 UTC
Created attachment 381760 [details, diff]
readline-6.3-CVE-2014-2524.patch
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2014-12-28 23:41:05 UTC
CVE-2014-2524 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2524):
  The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows
  local users to create or overwrite arbitrary files via a symlink attack on a
  /var/tmp/rltrace.[PID] file.
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2015-01-15 21:22:22 UTC
As per RedHat Bugzilla this is fixed in 6.3 Patch 3. We have 6.3_p8-r1 in tree but not stable. 

Maintainers please advise if you want to stabilize or call for stabilization yourself.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2015-02-21 19:14:02 UTC
January 15 - 6.3_p8-r2 has been uploaded. If that fixes this bug please advise if ready for stabilization.
Comment 5 Aaron Bauman (RETIRED) gentoo-dev 2016-07-19 02:33:57 UTC
@base-system, please cleanup all vulnerable versions in the tree.
Comment 6 Aaron Bauman (RETIRED) gentoo-dev 2016-10-15 05:36:00 UTC
(In reply to Aaron Bauman from comment #5)
> @base-system, please cleanup all vulnerable versions in the tree.

@maintainer(s), can this be cleaned?
Comment 7 Yury German Gentoo Infrastructure gentoo-dev 2017-04-17 01:06:11 UTC
Vote for GLSA = No

Thank you all for your work. Maintainers please clean up vulnerable versions.
Comment 8 Yury German Gentoo Infrastructure gentoo-dev 2017-05-25 05:35:57 UTC
Maintainer(s), please drop the vulnerable version(s).
Comment 9 Aaron Bauman (RETIRED) gentoo-dev 2017-07-15 23:23:05 UTC
Tree is clean.