summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200710-22.xml
blob: f396e1de1c7c625a79f98a049df4852854c889f0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200710-22">
  <title>TRAMP: Insecure temporary file creation</title>
  <synopsis>
    The TRAMP package for GNU Emacs insecurely creates temporary files.
  </synopsis>
  <product type="ebuild">tramp</product>
  <announced>2007-10-20</announced>
  <revised count="02">2007-12-30</revised>
  <bug>194713</bug>
  <access>local</access>
  <affected>
    <package name="app-emacs/tramp" auto="yes" arch="*">
      <unaffected range="ge">2.1.10-r2</unaffected>
      <unaffected range="lt">2.1</unaffected>
      <vulnerable range="lt">2.1.10-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    TRAMP is a remote file editing package for GNU Emacs, a highly
    extensible and customizable text editor.
    </p>
  </background>
  <description>
    <p>
    Stefan Monnier discovered that the tramp-make-tramp-temp-file()
    function creates temporary files in an insecure manner.
    </p>
  </description>
  <impact type="normal">
    <p>
    A local attacker could create symbolic links in the directory where the
    temporary files are written, pointing to a valid file somewhere on the
    filesystem that is writable by the user running TRAMP. When TRAMP
    writes the temporary file, the target valid file would then be
    overwritten with the contents of the TRAMP temporary file.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All TRAMP users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=app-emacs/tramp-2.1.10-r2"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5377">CVE-2007-5377</uri>
  </references>
  <metadata tag="requester" timestamp="2007-10-11T21:37:14Z">
    p-y
  </metadata>
  <metadata tag="submitter" timestamp="2007-10-18T20:15:33Z">
    rbu
  </metadata>
  <metadata tag="bugReady" timestamp="2007-10-18T20:17:00Z">
    rbu
  </metadata>
</glsa>