Upstream information

CVE-2014-1839 at MITRE

Description

The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.4
Vector AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
No SUSE Bugzilla entries cross referenced.

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Software Development Kit 11 SP3
  • python-logilab-common >= 0.56.2-1.9.1
Patchnames:
sdksp3-python-logilab-common
SUSE Linux Enterprise Software Development Kit 11 SP4
  • python-logilab-common >= 0.56.2-1.9.1
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA python-logilab-common
SUSE Linux Enterprise Software Development Kit 11 SP3
  • python-logilab-common >= 0.56.2-1.9.1
Builds
SAT Patch Nr: 8909
openSUSE 12.3
  • python-logilab-common >= 0.58.0-4.4.1
  • python3-logilab-common >= 0.58.0-4.4.1
Patchnames:
openSUSE-2014-175
openSUSE 13.1
  • python-logilab-common >= 0.58.0-7.4.1
  • python3-logilab-common >= 0.58.0-4.4.1
Patchnames:
openSUSE-2014-175
openSUSE Tumbleweed
  • python-logilab-common >= 1.0.2-1.4
  • python3-logilab-common >= 1.2.2-1.2
Patchnames:
openSUSE Tumbleweed GA python-logilab-common


Status of this issue by product and package

Product(s) Source package State
SUSE Linux Enterprise SDK 11 SP2 python-logilab-common Affected
SUSE Linux Enterprise SDK 11 SP3 python-logilab-common Affected
SUSE Linux Enterprise SDK 11 SP4 python-logilab-common Affected