Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 659360 (CVE-2018-12713)

Summary: media-gfx/gimp: privilege escalation in gimp_write_and_read_file function in app/tests/test-xcf.c (CVE-2018-12713)
Product: Gentoo Security Reporter: Florian Schuhmacher <mynt1aa>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED CANTFIX    
Severity: normal CC: sping
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f
Whiteboard:
Package list:
Runtime testing required: ---

Description Florian Schuhmacher 2018-06-27 14:51:30 UTC
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private.

Gentoo Security Scout
Florian Schuhmacher
Comment 1 Yury German Gentoo Infrastructure gentoo-dev 2019-04-26 23:54:08 UTC
Base on information available here:
https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f

Indeed this is just a unit test run when a dev/packager/other runs make check on the source code. This is not part of GIMP at all and nothing is installed with this code.
I added a comment there to clarify: https://gitlab.gnome.org/GNOME/gimp/issues/1689#note_254032

and reading through the thread. This is not an issue of Gimp. 

Closing Bug.