Package: hugin
Version: 0.6.1-1
Severity: important
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for hugin.

CVE-2007-5200[0]:
| hugin in SUSE openSUSE 10.2 and 10.3 allows local users to overwrite
| arbitrary files via a symlink attack on a temporary file.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

What SuSE did is just to delete the debug output to the tmp 
file:

--- src/Panorama/PTOptimise.cpp
+++ src/Panorama/PTOptimise.cpp
@@ -36,9 +36,6 @@
 #include <boost/property_map.hpp>
 #include <boost/graph/graph_utility.hpp>
 
-#define DEBUG_WRITE_OPTIM_OUTPUT
-#define DEBUG_WRITE_OPTIM_OUTPUT_FILE "hugin_debug_optim_results.txt"
-
 using namespace std;
 using namespace PT;
 using namespace PTools;
@@ -132,13 +129,6 @@
                        RunLMOptimizer( &opt );
                        ainf.data               = opt.message;
             // get results from align info.
-#ifdef DEBUG_WRITE_OPTIM_OUTPUT
-            fullPath path;
-            StringtoFullPath(&path, DEBUG_WRITE_OPTIM_OUTPUT_FILE );
-
-                   ainf.data           = opt.message;
-            WriteResults( script, &path, &ainf, distSquared, 0);
-#endif
             pano.updateVariables(GetAlignInfoVariables(ainf) );
             pano.updateCtrlPointErrors( GetAlignInfoCtrlPoints(ainf) );
                }


For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpRRrqmHD1RC.pgp
Description: PGP signature

Reply via email to