Upstream information

CVE-2015-7758 at MITRE

Description

Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 949682 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 13.1
  • gummi >= 0.6.5-2.4.1
  • gummi-debuginfo >= 0.6.5-2.4.1
  • gummi-debugsource >= 0.6.5-2.4.1
Patchnames:
openSUSE-2015-956
openSUSE Leap 42.1
  • gummi >= 0.7.1-8.1
  • gummi-debuginfo >= 0.7.1-8.1
  • gummi-debugsource >= 0.7.1-8.1
  • gummi-lang >= 0.7.1-8.1
Patchnames:
openSUSE-2015-956
openSUSE-2016-266
openSUSE Tumbleweed
  • gummi >= 0.7.4.3-2.6
  • gummi-lang >= 0.7.4.3-2.6
Patchnames:
openSUSE Tumbleweed GA gummi