Community Packages

Please read this before reporting a bug:
http://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in Unsupported. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#46612 - [miniupnpc] Remote code execution fixed in newer upstream release

Attached to Project: Community Packages
Opened by a b (leper) - Thursday, 08 October 2015, 23:30 GMT
Last edited by Evangelos Foutras (foutrelis) - Friday, 16 October 2015, 16:25 GMT
Task Type Bug Report
Category Upstream Bugs
Status Closed
Assigned To Timothy Redaelli (tredaelli)
Architecture All
Severity Critical
Priority High
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 1
Private No

Details

Description:

miniupnpc versions prior to 1.9.20151008[2,3] are vulnerable to a buffer overflow which can lead to remote code execution[1].

Upgrading to 1.9.20151008 fixes the issue[4].

[1] http://talosintel.com/reports/TALOS-2015-0035/
[2] http://miniupnp.free.fr/files/download.php?file=miniupnpc-1.9.20151008.tar.gz
[3] http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-1.9.20151008.tar.gz
[4] https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78
This task depends upon

Closed by  Evangelos Foutras (foutrelis)
Friday, 16 October 2015, 16:25 GMT
Reason for closing:  Fixed
Additional comments about closing:  miniupnpc 1.9.20151008-1
Comment by a b (leper) - Thursday, 15 October 2015, 23:04 GMT
Note that this was assigned CVE-2015-6031, which is still marked as reserved.
Comment by Levente Polyak (anthraxx) - Thursday, 15 October 2015, 23:08 GMT
thanks for the update. the package (and all its rebuilds that were needed) are currently in [community-testing] and soon be moved

Loading...