Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 499872 (CVE-2014-1838) - <dev-python/logilab-common-0.61.0 : Two Insecure Temporary File Creation Security Issues (CVE-2014-{1838,1839})
Summary: <dev-python/logilab-common-0.61.0 : Two Insecure Temporary File Creation Secu...
Status: RESOLVED FIXED
Alias: CVE-2014-1838
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/56720/
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-31 08:54 UTC by Agostino Sarubbo
Modified: 2014-06-17 10:58 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-01-31 08:54:34 UTC
From ${URL} :

Description

Two security issues have been reported in the logilab-common module for Python, which can be exploited by 
malicious, local users to manipulate certain data.

The security issues are caused due to the module creating certain files within the /tmp directory in an 
insecure manner. This can be exploited to e.g. overwrite contents of arbitrary user-accessible files via 
symlink attacks.

The security issues are reported in version 0.60.1. Other versions may also be affected.


Solution:
No official solution is currently available.

Provided and/or discovered by:
Jakub Wilk with a Debian bug report.

Original Advisory:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 yegle 2014-02-03 16:36:15 UTC
Upstream have responded to the Debian issue and we may grab those two patches as is.
Comment 2 Dirkjan Ochtman (RETIRED) gentoo-dev 2014-02-04 08:00:59 UTC
Thank you for looking into it. Would you be able to link to the patches or relevant upstream bug? That would be great.
Comment 3 Ian Delaney (RETIRED) gentoo-dev 2014-03-26 06:11:07 UTC
(In reply to yegle from comment #1)
> Upstream have responded to the Debian issue and we may grab those two
> patches as is.

(In reply to Dirkjan Ochtman from comment #2)
> Thank you for looking into it. Would you be able to link to the patches or
> relevant upstream bug? That would be great.

Is this them?
http://www.logilab.org/revision/207574
http://www.logilab.org/revision/210454
Comment 4 Dirkjan Ochtman (RETIRED) gentoo-dev 2014-03-26 08:18:28 UTC
Yeah, that looks right, thanks!
Comment 5 Ian Delaney (RETIRED) gentoo-dev 2014-03-27 13:01:52 UTC
*logilab-common-0.60.1-r1 (27 Mar 2014)

  27 Mar 2014; Ian Delaney <idella4@gentoo.org>
  +files/logilab-common-sec-CVE-2014-1838-9.patch,
  +logilab-common-0.60.1-r1.ebuild, -logilab-common-0.59.1.ebuild,
  -logilab-common-0.60.0.ebuild, -logilab-common-0.60.1.ebuild,
  logilab-common-0.61.0.ebuild:
  revbump; sec fix wrt sec Bug #499872, rm old unstable versions

So;
1. Unstable old affected versions removed.
2. Only stable == logilab-common-0.58.1.ebuild
3. The logilab-common-0.61.0.ebuild has already had the changes applied.

Either 0.60.1-r1 or 0.61.0 can be made stable.  Selecting 0.61.0 will make these fresh additions un-needed.  Either can do, however I'd favour 0.61.0 since it has py3 support.
Comment 6 Dirkjan Ochtman (RETIRED) gentoo-dev 2014-03-27 13:59:23 UTC
Let's stabilize 0.61.0, please.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2014-03-27 20:14:40 UTC
CVE-2014-1839 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1839):
  The Execute class in shellutils in logilab-commons before 0.61.0 uses
  tempfile.mktemp, which allows local users to have an unspecified impact by
  pre-creating the temporary file.

CVE-2014-1838 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1838):
  The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in
  logilab-commons before 0.61.0 allows local users to overwrite arbitrary
  files and possibly have other unspecified impact via a symlink attack on
  /tmp/toto.fdf.
Comment 8 Agostino Sarubbo gentoo-dev 2014-04-05 22:43:02 UTC
amd64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2014-04-05 22:43:12 UTC
x86 stable
Comment 10 Agostino Sarubbo gentoo-dev 2014-04-05 22:43:24 UTC
ppc stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 11 Ian Delaney (RETIRED) gentoo-dev 2014-04-07 08:11:47 UTC
  07 Apr 2014; Ian Delaney <idella4@gentoo.org>
  -files/logilab-common-0.59.0-syntax.patch,
  -files/logilab-common-0.59.0-utf8-test.patch,
  -files/logilab-common-sec-CVE-2014-1838-9.patch,
  -logilab-common-0.58.1.ebuild, -logilab-common-0.60.1-r1.ebuild:
  rm old ebuilds & patches wrt sec bug #499872

done
Comment 12 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-04-07 08:52:12 UTC
GLSA vote: no.
Comment 13 Sergey Popov gentoo-dev 2014-06-17 10:58:05 UTC
GLSA vote: no

Closing as noglsa