Bug 12814 - python-numpy new security issues CVE-2014-1858 and CVE-2014-1859
Summary: python-numpy new security issues CVE-2014-1858 and CVE-2014-1859
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/586791/
Whiteboard: MGA3TOO has_procedure mga3-32-ok mga3...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-02-18 19:47 CET by David Walser
Modified: 2014-02-21 19:28 CET (History)
4 users (show)

See Also:
Source RPM: python-numpy-1.6.2-2.mga3.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-02-18 19:47:55 CET
Fedora has issued an advisory on February 11:
https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html

For numpy 1.8.0 (in Mageia 4 and Cauldron) they added a patch in this commit:
http://pkgs.fedoraproject.org/cgit/numpy.git/commit/?id=937cb5d47c61701e11d4a2daa9eaa5ba28c93fa1

The RedHat bug has a backport to 1.7 (which may help backport to 1.6 in Mageia 3):
https://bugzilla.redhat.com/show_bug.cgi?id=1062009#c14

Reproducible: 

Steps to Reproduce:
David Walser 2014-02-18 19:48:03 CET

Whiteboard: (none) => MGA4TOO, MGA3TOO

Comment 1 Philippe Makowski 2014-02-19 23:09:14 CET
Advisory:
========================

Updated python-numpy and python3-numpy packages fix security vulnerabilities:

f2py insecurely used a temporary file. A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running f2py.

The original report in the Debian bug tracking system.

Fix CVE-2014-1858, CVE-2014-1859.

References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778
https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1859

Updated packages in core/updates_testing:
========================
python-numpy-1.6.2-2.1.mga3
python-numpy-devel-1.6.2-2.1.mga3
python-numpy-debuginfo-1.6.2-2.1.mga3

From:
python-numpy-1.6.2-2.1.mga3.src

python-numpy-1.8.0-1.1.mga4
python-numpy-devel-1.8.0-1.1.mga4
python3-numpy-1.8.0-1.1.mga4
python3-numpy-devel-1.8.0-1.1.mga4
python-numpy-debuginfo-1.8.0-1.1.mga4

From:
python-numpy-1.8.0-1.1.mga4.src

Assignee: makowski.mageia => qa-bugs

Comment 2 David Walser 2014-02-19 23:14:26 CET
Thanks Philippe!

Just some minor adjustments to the advisory.

Advisory:
========================

Updated python-numpy packages fix security vulnerabilities:

f2py insecurely used a temporary file. A local attacker could use this flaw
to perform a symbolic link attack to modify an arbitrary file accessible to
the user running f2py (CVE-2014-1858, CVE-2014-1859).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1859
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778
https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html

CC: (none) => makowski.mageia
Version: Cauldron => 4
Whiteboard: MGA4TOO, MGA3TOO => MGA3TOO

Comment 3 claire robinson 2014-02-21 15:57:55 CET
No PoC. Various example scripts can be found in the tutorial at numpy.org
http://wiki.scipy.org/Tentative_NumPy_Tutorial

Also one in attachment 798 [details] which requires python-matplotlib aswell

Whiteboard: MGA3TOO => MGA3TOO has_procedure

Comment 4 claire robinson 2014-02-21 16:02:47 CET
Testing complete mga3 32 & 64 using the example in attachment 798 [details].

Whiteboard: MGA3TOO has_procedure => MGA3TOO has_procedure mga3-32-ok mga3-64-ok

Comment 5 Rémi Verschelde 2014-02-21 17:24:59 CET
Testing complete on Mageia 4 i586 using the example in comment 3, with both the python2.7 and python3 versions. The python3 version fails with the update candidate, but so does it with the core/release package. The failure is due to a matplotlib compatibility issue, so it is not relevant to this update.

CC: (none) => remi
Whiteboard: MGA3TOO has_procedure mga3-32-ok mga3-64-ok => MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok

Comment 6 Rémi Verschelde 2014-02-21 18:15:13 CET
Testing complete on Mageia 4 x86_64.

--

Validating update, advisory uploaded. Please push to 3 & 4 core/updates.

Keywords: (none) => validated_update
Whiteboard: MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok => MGA3TOO has_procedure mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok advisory
CC: (none) => sysadmin-bugs

Comment 7 Thomas Backlund 2014-02-21 19:28:06 CET
Update pushed:
http://advisories.mageia.org/MGASA-2014-0089.html

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.