Bug 368611 (CVE-2007-5936)

Summary: CVE-2007-5936 dviljk uses insecure temporary file
Product: [Other] Security Response Reporter: Red Hat Product Security <security-response-team>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jlieskov, mjc
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://bugs.gentoo.org/show_bug.cgi?id=198238
Whiteboard:
Fixed In Version: 3.0-40.3.fc7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-05-07 08:22:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 379831, 379841, 379851, 379861, 577309, 577322, 577323, 577328, 577329    
Bug Blocks:    
Attachments:
Description Flags
Fix for dviljk buffer overflows and /tmp race
none
A patch without the whitespace-wipe hunks, from Gentoo none

Description Lubomir Kundrak 2007-11-06 17:54:41 UTC
Description of problem:

Dvips uses insecure tmpnam() function to create files for temporary data while
converting a DVI file to laser jet printer format. A local attacker could
conduct a time-dependent attack by creating the files before dviljk uses them
which could possibly lead into information leak and would permit the attacker to
modify the processed data.

Additional info:

See URL filed for Gentoo report.
The attached file fixes this problem by using a secure temporary directory
together with other issues.

Comment 1 Lubomir Kundrak 2007-11-06 18:00:07 UTC
Created attachment 249481 [details]
Fix for dviljk buffer overflows and /tmp race

Comment 2 Lubomir Kundrak 2007-11-06 18:08:06 UTC
The CVE identifier for this issue was requested.

Comment 3 Lubomir Kundrak 2007-11-07 15:38:01 UTC
Created attachment 250261 [details]
A patch without the whitespace-wipe hunks, from Gentoo

Comment 4 Lubomir Kundrak 2007-11-13 13:22:18 UTC
Pinged Mitre about the need for CVE.

Comment 5 Jindrich Novy 2007-11-13 14:28:40 UTC
Fixed in rawhide. F8, F7, FC-6 pending.

Comment 6 Fedora Update System 2007-11-15 03:32:28 UTC
tetex-3.0-44.2.fc8 has been pushed to the Fedora 8 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update tetex'

Comment 7 Fedora Update System 2007-11-15 03:46:23 UTC
tetex-3.0-40.3.fc7 has been pushed to the Fedora 7 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update tetex'

Comment 8 Fedora Update System 2007-11-20 18:00:51 UTC
tetex-3.0-40.3.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2007-11-20 18:04:58 UTC
tetex-3.0-44.3.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Lubomir Kundrak 2007-12-05 19:32:04 UTC
The Red Hat Security Response Team has rated this issue as having low security
impact, a future update may address this flaw.

Comment 12 Red Hat Bugzilla 2009-10-23 19:04:40 UTC
Reporter changed to security-response-team by request of Jay Turner.

Comment 16 Tomas Hoger 2010-05-07 08:22:38 UTC
Statement:

Not vulnerable. This issue did not affect the versions of tetex packages as shipped with Red Hat Enterprise Linux 3, 4, or 5, as they do not provide the dviljk binary.