Bug 1286011 (CVE-2015-0860) - CVE-2015-0860 dpkg: stack overflows and out of bounds read
Summary: CVE-2015-0860 dpkg: stack overflows and out of bounds read
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2015-0860
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1286012 1286013
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-11-27 08:57 UTC by Martin Prpič
Modified: 2019-09-29 13:40 UTC (History)
5 users (show)

Fixed In Version: dpkg 1.17.27, dpkg 1.16.18
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-12-13 04:25:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Martin Prpič 2015-11-27 08:57:25 UTC
Debian fixed the following flaw in dpkg:

Hanno Boeck discovered a stack-based buffer overflow in the dpkg-deb component of dpkg, the Debian package management system. This flaw could potentially lead to arbitrary code execution if a user or an automated system were tricked into processing a specially crafted Debian binary package (.deb) in the old style Debian binary package format.

Additional information:

https://lists.debian.org/debian-security-announce/2015/msg00312.html
http://seclists.org/oss-sec/2015/q4/389

Comment 1 Martin Prpič 2015-11-27 08:57:56 UTC
Created dpkg tracking bugs for this issue:

Affects: fedora-all [bug 1286012]
Affects: epel-all [bug 1286013]

Comment 2 Sergio Basto 2015-11-27 16:41:18 UTC
where is the patch ?  what version are affected ? or in what version this is fixed ? 

Thanks

Comment 3 Martin Prpič 2015-11-27 17:11:16 UTC
(In reply to Sergio Monteiro Basto from comment #2)
> where is the patch ?  what version are affected ? or in what version this is
> fixed ? 
> 
> Thanks

These look like the correct patches:

https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/?h=wheezy&id=f1aac7d933819569bf6f347c3c0d5a64a90bbce0
https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/?h=wheezy&id=80913664ab1ab876128ede7e0967346cf7c48dce
https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/?h=wheezy&id=efc9e395b91ecce0b4eb99fde975be6a0c8b1cb1

Though, strictly speaking, only the first patch is related to CVE-2015-0860. The other two are mentioned in the oss-sec mail I linked to but don't have CVEs; I'm assuming they don't have any security implications and are classed as regular bugs.


Note You need to log in before you can comment on or make changes to this bug.