Bug 22523 - p7zip new security issue CVE-2017-17969
Summary: p7zip new security issue CVE-2017-17969
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: https://www.debian.org/security/2018/...
Whiteboard: MGA6-64-OK
Keywords: advisory, validated_update
: 23007 (view as bug list)
Depends on:
Blocks:
 
Reported: 2018-02-05 11:53 CET by Zombie Ryushu
Modified: 2018-05-09 11:55 CEST (History)
5 users (show)

See Also:
Source RPM: p7zip
CVE: CVE-2017-1796
Status comment:


Attachments

Description Zombie Ryushu 2018-02-05 11:53:58 CET
'landave' discovered a heap-based buffer overflow vulnerability in the NCompress::NShrink::CDecoder::CodeReal method in p7zip, a 7zr file archiver with high compression ratio. A remote attacker can take advantage of this flaw to cause a denial-of-service or, potentially the execution of arbitrary code with the privileges of the user running p7zip, if a specially crafted shrinked ZIP archive is processed.

https://www.debian.org/security/2018/dsa-4104
Zombie Ryushu 2018-02-05 11:54:10 CET

CVE: (none) => CVE-2017-1796

David Walser 2018-02-05 14:16:33 CET

Whiteboard: (none) => MGA6TOO
Summary: p7zip -- security update CVE-2017-17969 => p7zip new security issue CVE-2017-17969

Comment 1 David GEIGER 2018-02-05 17:13:11 CET
Done for Cauldron and also for mga6!

CC: (none) => geiger.david68210

Comment 2 David Walser 2018-02-06 03:35:11 CET
Thanks!

Advisory:
========================

Updated p7zip package fixes security vulnerability:

Heap-based buffer overflow vulnerability in the
NCompress::NShrink::CDecoder::CodeReal method in p7zip. A remote attacker can
take advantage of this flaw to cause a denial-of-service or, potentially the
execution of arbitrary code with the privileges of the user running p7zip, if a
specially crafted shrinked ZIP archive is processed (CVE-2017-17969).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17969
https://www.debian.org/security/2018/dsa-4104
========================

Updated packages in core/updates_testing:
========================
p7zip-16.02-2.1.mga6

from p7zip-16.02-2.1.mga6.src.rpm

Whiteboard: MGA6TOO => (none)
Assignee: bugsquad => qa-bugs
Version: Cauldron => 6

Comment 3 Herman Viaene 2018-02-06 13:44:06 CET
MGA6-64 on Lenovo B50 Plasma
No installation issues
At CLI:
$ 7z a test *

7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=nl_BE.UTF-8,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i5-5200U CPU @ 2.20GHz (306D4),ASM,AES-NI)

Scanning the drive:
9 files, 7233132 bytes (7064 KiB)

Creating archive: test.7z

Items to compress: 9

                    
Files read from disk: 9
Archive size: 1020803 bytes (997 KiB)
Everything is Ok
Checked with ark that all files were present in test.7z and of correct size.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA6-64-OK

Comment 4 Dave Hodgins 2018-02-08 11:46:24 CET
Advisory committed to svn. Validating the update.

Keywords: (none) => advisory, validated_update
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 5 Mageia Robot 2018-02-08 12:32:07 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2018-0123.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED

Comment 6 David Walser 2018-05-09 11:55:36 CEST
*** Bug 23007 has been marked as a duplicate of this bug. ***

CC: (none) => j.biernacki


Note You need to log in before you can comment on or make changes to this bug.