FS#46612 - [miniupnpc] Remote code execution fixed in newer upstream release
Attached to Project:
Community Packages
Opened by a b (leper) - Thursday, 08 October 2015, 23:30 GMT
Last edited by Evangelos Foutras (foutrelis) - Friday, 16 October 2015, 16:25 GMT
Opened by a b (leper) - Thursday, 08 October 2015, 23:30 GMT
Last edited by Evangelos Foutras (foutrelis) - Friday, 16 October 2015, 16:25 GMT
|
Details
Description:
miniupnpc versions prior to 1.9.20151008[2,3] are vulnerable to a buffer overflow which can lead to remote code execution[1]. Upgrading to 1.9.20151008 fixes the issue[4]. [1] http://talosintel.com/reports/TALOS-2015-0035/ [2] http://miniupnp.free.fr/files/download.php?file=miniupnpc-1.9.20151008.tar.gz [3] http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-1.9.20151008.tar.gz [4] https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78 |
This task depends upon
Closed by Evangelos Foutras (foutrelis)
Friday, 16 October 2015, 16:25 GMT
Reason for closing: Fixed
Additional comments about closing: miniupnpc 1.9.20151008-1
Friday, 16 October 2015, 16:25 GMT
Reason for closing: Fixed
Additional comments about closing: miniupnpc 1.9.20151008-1
Comment by a b (leper) - Thursday,
15 October 2015, 23:04 GMT
Comment by
Levente Polyak (anthraxx) -
Thursday, 15 October 2015, 23:08 GMT
Note that this was assigned CVE-2015-6031, which is still marked
as reserved.
thanks for the update. the package (and all its rebuilds that were
needed) are currently in [community-testing] and soon be moved