| Summary: | cabextract new directory traversal issue (CVE-2015-2060) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | mageia, olchal, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/634992/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK MGA4-64-OK | ||
| Source RPM: | cabextract-1.5-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-02-18 17:53:46 CET
David Walser
2015-02-18 17:53:53 CET
Whiteboard:
(none) =>
MGA4TOO
Sander Lepik
2015-02-21 18:48:05 CET
CC:
(none) =>
mageia This should be fixed in Cauldron with cabextract-1.5-3.mga5 , but when trying to build in Mageia 4 for updates_testing, I am getting: D: [iurt_root_command] chroot examining synthesis file [/var/lib/urpmi/core_release/synthesis.hdlist.cz] examining synthesis file [/var/lib/urpmi/core_updates/synthesis.hdlist.cz] examining synthesis file [/var/lib/urpmi/core_updates_testing/synthesis.hdlist.cz] A requested package cannot be installed: cabextract-1.5-1.1.mga4.src (due to unsatisfied pkgconfig(libmspack)) While some packages may have been installed, there were failures. A requested package cannot be installed: cabextract-1.5-1.1.mga4.src (due to unsatisfied pkgconfig(libmspack)) I: [iurt_root_command] ERROR: chroot Should we package libmspack for Mageia 4? Version:
Cauldron =>
4 No, we shouldn't be backporting the change to use the system libmspack to Mageia 4. Fixed in SVN. (In reply to David Walser from comment #3) > Fixed in SVN. Thanks! I submitted the package. Here is the suggested update advisory: Suggested advisory: ======================== Updated cabextract packages fix security vulnerabilities: This update fixes a bug found with directory traversal in cabextract. References: http://openwall.com/lists/oss-security/2015/02/18/3 ======================== Updated packages in core/updates_testing: ======================== cabextract-1.5-1.1.mga4 Source RPMs: cabextract-1.5-1.1.mga5.src.rpm PoC here: http://openwall.com/lists/oss-security/2015/02/18/3 You need to install lcab and cabextract to run it. For the cabextract command, don't prefix it with "./" Before the update, it will create /tmp/abs when you use cabextract to extract test.cab. After the update, it will create tmp/abs in your current working directory. Testing complete Mageia 4 i586. Whiteboard:
(none) =>
has_procedure MGA4-32-OK CVE-2015-2060 was assigned: http://openwall.com/lists/oss-security/2015/02/23/24 Summary:
cabextract new directory traversal issue =>
cabextract new directory traversal issue (CVE-2015-2060) Testing on Mageia 4x64 real hardware following procedure mentioned in comment 6 From current package : -------------------- cabextract-1.5-1.mga4 (using lcab-1.0-0.b12.4.mga4 to run the PoC) Could reproduce the directory traversal vulnerability (creation of a /tmp/abs) Updated to testing package : -------------------------- cabextract-1.5-1.1.mga4 Followed same procedure. The tmp/abs directory is created in user's current directory, not at the root anymore. OK CC:
(none) =>
olchal Want to add to the advisory David? A directory traversal issue in cabextract allows writing to locations outside of the current working directory, when extracting a crafted cab file that encodes the filenames in a certain manner (CVE-2015-2060). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2060 http://openwall.com/lists/oss-security/2015/02/18/3 http://openwall.com/lists/oss-security/2015/02/23/24 Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0086.html Status:
NEW =>
RESOLVED
David Walser
2015-02-26 19:58:17 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/634992/ |