Upstream information

CVE-2015-7758 at MITRE

Description

Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
CVSS detail National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
CVSS detail National Vulnerability Database
Base Score 3.3
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact Low
Availability Impact None
CVSSv3 Version 3
SUSE Bugzilla entry: 949682 [RESOLVED / FIXED]

SUSE Security Advisories:

    openSUSE-SU-2015:2369-1 openSUSE-SU-2016:0574-1

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • gummi >= 0.7.4.3-2.6
  • gummi-lang >= 0.7.4.3-2.6
Patchnames:
openSUSE-Tumbleweed-2024-10107


SUSE Timeline for this CVE

CVE page created: Thu Oct 8 22:22:26 2015
CVE page last modified: Fri May 8 14:28:17 2026