OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Thomas Lotterer
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-src openpkg-web Date: 10-Jul-2003 16:22:35
Branch: OPENPKG_1_1_SOLID HEAD Handle: 2003071015223202
Added files: (Branch: OPENPKG_1_1_SOLID)
openpkg-src/imagemagick imagemagick.patch
Modified files:
openpkg-web news.txt
Modified files: (Branch: OPENPKG_1_1_SOLID)
openpkg-src/imagemagick imagemagick.spec
Log:
SA-2003.034-imagemagick; CAN-2003-0455
Summary:
Revision Changes Path
1.1.4.1 +48 -0 openpkg-src/imagemagick/imagemagick.patch
1.54.2.2 +3 -1 openpkg-src/imagemagick/imagemagick.spec
1.5509 +1 -0 openpkg-web/news.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-src/imagemagick/imagemagick.patch
============================================================================
$ cvs diff -u -r0 -r1.1.4.1 imagemagick.patch
--- /dev/null 2003-07-10 16:22:34.000000000 +0200
+++ imagemagick.patch 2003-07-10 16:22:35.000000000 +0200
@@ -0,0 +1,48 @@
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0455
+ The imagemagick libmagick library 5.5 and earlier creates temporary
+ files insecurely, which allows local users to create or overwrite
+ arbitrary files.
+
+this patch based on Daniel Kobras code to fix insecure temporary
+file creation which is mentioned in http://www.debian.org/security/2003/dsa-331
+
+--- magick/utility.c.orig Sun Aug 18 17:42:45 2002
++++ magick/utility.c Thu Jul 10 15:19:27 2003
+@@ -3181,7 +3181,37 @@
+ % file name is returned in this array.
+ %
+ */
++
++/* Attention: this creates an additional
++ * intermediate directory for security reasons,
++ * but unfortunately it is never deleted.
++ */
++static void TemporaryFilenameHelper(char *);
+ MagickExport void TemporaryFilename(char *filename)
++{
++ static char *mSafeTmpdir = NULL;
++ char *name;
++
++ filename[0] = '\0';
++ if (mSafeTmpdir == NULL) {
++ do {
++ TemporaryFilenameHelper(filename);
++ if (mkdir(filename, S_IRWXU) == 0) {
++ mSafeTmpdir = strdup(filename);
++ break;
++ }
++ } while (errno == EEXIST);
++ }
++ if (mSafeTmpdir == NULL)
++ return;
++ if ((name = tempnam(mSafeTmpdir, (char *)NULL)) == NULL)
++ return;
++ (void)strncpy(filename, name, MaxTextExtent-1);
++ free(name);
++ return;
++}
++
++static void TemporaryFilenameHelper(char *filename)
+ {
+ assert(filename != (char *) NULL);
+ (void) strcpy(filename,"magic");
@@ .
patch -p0 <<'@@ .'
Index: openpkg-src/imagemagick/imagemagick.spec
============================================================================
$ cvs diff -u -r1.54.2.1 -r1.54.2.2 imagemagick.spec
--- openpkg-src/imagemagick/imagemagick.spec 26 Aug 2002 19:53:53 -0000
1.54.2.1
+++ openpkg-src/imagemagick/imagemagick.spec 10 Jul 2003 14:22:34 -0000
1.54.2.2
@@ -42,10 +42,11 @@
Group: Graphics
License: GPL
Version: %{V_major}.%{V_minor}
-Release: 1.1.0
+Release: 1.1.1
# list of sources
Source0: ftp://ftp.imagemagick.org/pub/ImageMagick/ImageMagick-%{V_dist}.tar.gz
+Patch0: imagemagick.patch
# build information
Prefix: %{l_prefix}
@@ -71,6 +72,7 @@
%{l_shtool} subst \
-e 's/\([ ]*tagnames=.*echo.*tagnames,[FC][7X][7X].*\)/ if [ ".$tagnames" =
. ]; then \1; fi/' \
configure
+ %patch -p0
%build
CC="%{l_cc}" \
@@ .
patch -p0 <<'@@ .'
Index: openpkg-web/news.txt
============================================================================
$ cvs diff -u -r1.5508 -r1.5509 news.txt
--- openpkg-web/news.txt 10 Jul 2003 14:21:12 -0000 1.5508
+++ openpkg-web/news.txt 10 Jul 2003 14:22:32 -0000 1.5509
@@ -1,3 +1,4 @@
+10-Jul-2003: Upgraded package: P<imagemagick-5.4.8.2-1.1.1>
10-Jul-2003: Upgraded package: P<imagemagick-5.5.3.2-1.2.1>
10-Jul-2003: Upgraded package: P<nessus-libs-2.0.7-20030710>
10-Jul-2003: Upgraded package: P<gnutls-0.8.9-20030710>
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]