Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 918895 - <sci-physics/root-{6.28.10,6.30.02}: security vulnerability in current root version, version bump required
Summary: <sci-physics/root-{6.28.10,6.30.02}: security vulnerability in current root v...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal critical (vote)
Assignee: Gentoo Security
URL: https://root-forum.cern.ch/t/root-web...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-30 11:19 UTC by Rafal Lalik
Modified: 2023-12-01 08:09 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Rafal Lalik 2023-11-30 11:19:55 UTC
The security issue was found in current versions, allowing access to local files over the browser.

It is recommended to bump versions to 6.28.10 and 6.30.02

Reproducible: Always
Comment 1 Larry the Git Cow gentoo-dev 2023-11-30 12:35:39 UTC
The bug has been closed via the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e4230d64773dc7194cced43acf852012680b7f3b

commit e4230d64773dc7194cced43acf852012680b7f3b
Author:     Guilherme Amadio <amadio@gentoo.org>
AuthorDate: 2023-11-30 10:39:50 +0000
Commit:     Guilherme Amadio <amadio@gentoo.org>
CommitDate: 2023-11-30 12:35:02 +0000

    sci-physics/root: add 6.30.02, drop 6.30.00
    
    Closes: https://bugs.gentoo.org/918895
    See also: https://root.cern/about/security
    
    Signed-off-by: Guilherme Amadio <amadio@gentoo.org>

 sci-physics/root/Manifest                                     | 2 +-
 sci-physics/root/{root-6.30.00.ebuild => root-6.30.02.ebuild} | 0
 2 files changed, 1 insertion(+), 1 deletion(-)

Additionally, it has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=89fdadffee2a558d6bfd1778ba03d231e8ef6644

commit 89fdadffee2a558d6bfd1778ba03d231e8ef6644
Author:     Guilherme Amadio <amadio@gentoo.org>
AuthorDate: 2023-11-30 10:42:02 +0000
Commit:     Guilherme Amadio <amadio@gentoo.org>
CommitDate: 2023-11-30 12:35:02 +0000

    sci-physics/root: add 6.28.10, drop 6.28.08
    
    Bug: https://bugs.gentoo.org/918895
    
    Signed-off-by: Guilherme Amadio <amadio@gentoo.org>

 sci-physics/root/Manifest                                     | 2 +-
 sci-physics/root/{root-6.28.08.ebuild => root-6.28.10.ebuild} | 0
 2 files changed, 1 insertion(+), 1 deletion(-)
Comment 2 Guilherme Amadio gentoo-dev 2023-11-30 13:07:08 UTC
Just for the record, please note that merely having the software installed does not create any problems. The security problem happens when starting a web-based TBrowser (see https://root.cern/about/security for a succinct explanation),  which opens a port that allows unauthenticated connections with access to the ROOT prompt.

I unfortunately added a tag when bumping, which closed the bug, but feel free to reopen if you think that's appropriate.
Comment 3 Rafal Lalik 2023-12-01 00:47:55 UTC
Hi, yes, I understand nature of the problem and risks and conditions.
I think all what could be done was already done. Perhaps the comment you did in the previous entry, that perhaps should be displayed to the user in the post install message?
Comment 4 Hans de Graaff gentoo-dev Security 2023-12-01 06:51:06 UTC
(In reply to Guilherme Amadio from comment #2)
> Just for the record, please note that merely having the software installed
> does not create any problems. The security problem happens when starting a
> web-based TBrowser (see https://root.cern/about/security for a succinct
> explanation),  which opens a port that allows unauthenticated connections
> with access to the ROOT prompt.

Hence my initial C4 severity. It should be ~4 actually, given that there are no stable versions.

> I unfortunately added a tag when bumping, which closed the bug, but feel
> free to reopen if you think that's appropriate.

No need to reopen, with vulnerable versions gone and no GLSA to issue we are all done.
Comment 5 Guilherme Amadio gentoo-dev 2023-12-01 08:09:07 UTC
(In reply to Rafal Lalik from comment #3)
> Hi, yes, I understand nature of the problem and risks and conditions.
> I think all what could be done was already done. Perhaps the comment you did
> in the previous entry, that perhaps should be displayed to the user in the
> post install message?

Sure, I will add a message of warning. Users should be aware.