Upstream information

CVE-2014-1838 at MITRE

Description

The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.4
Vector AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 861822 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Software Development Kit 11 SP3
  • python-logilab-common >= 0.56.2-1.9.1
Patchnames:
sdksp3-python-logilab-common
SUSE Linux Enterprise Software Development Kit 11 SP4
  • python-logilab-common >= 0.56.2-1.9.1
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA python-logilab-common
SUSE Linux Enterprise Software Development Kit 11 SP3
  • python-logilab-common >= 0.56.2-1.9.1
Builds
SAT Patch Nr: 8909
openSUSE 12.3
  • python-logilab-common >= 0.58.0-4.4.1
  • python3-logilab-common >= 0.58.0-4.4.1
Patchnames:
openSUSE-2014-175
openSUSE 13.1
  • python-logilab-common >= 0.58.0-7.4.1
  • python3-logilab-common >= 0.58.0-4.4.1
Patchnames:
openSUSE-2014-175
openSUSE Tumbleweed
  • python-logilab-common >= 1.0.2-1.4
  • python3-logilab-common >= 1.2.2-1.2
Patchnames:
openSUSE Tumbleweed GA python-logilab-common


Status of this issue by product and package

Product(s) Source package State
SUSE Linux Enterprise SDK 11 SP2 python-logilab-common Affected
SUSE Linux Enterprise SDK 11 SP3 python-logilab-common Affected
SUSE Linux Enterprise SDK 11 SP4 python-logilab-common Affected