Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in Unsupported. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#44019 - [elfutils] CVE-2014-9447: directory traversal

Attached to Project: Arch Linux
Opened by Levente Polyak (anthraxx) - Monday, 02 March 2015, 16:58 GMT
Last edited by Laurent Carlier (lordheavy) - Monday, 02 March 2015, 21:06 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To Laurent Carlier (lordheavy)
Architecture All
Severity Medium
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:
It has been reported [0] that elfutils <= 0.161 is vulnerable to directory traversal tracked as CVE-2014-9447 [1].

Impact:
This allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.


Mitigation:
A patch has been applied upstream [2], as no new release seems to be planned in the very near future I recommend to apply this patch onto 0.161.
I have attached a PKGBUILD patch for convenience.


[0] https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html
[1] https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9447
[2] https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e
This task depends upon

Closed by  Laurent Carlier (lordheavy)
Monday, 02 March 2015, 21:06 GMT
Reason for closing:  Fixed
Additional comments about closing:  elfutils-0.161-3

Loading...