Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 201206-26 ] RPM: Multiple vulnerabilities
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Veteran
Veteran


Joined: 12 May 2004
Posts: 1471

PostPosted: Sun Jun 24, 2012 11:26 pm    Post subject: [ GLSA 201206-26 ] RPM: Multiple vulnerabilities Reply with quote

Gentoo Linux Security Advisory

Title: RPM: Multiple vulnerabilities (GLSA 201206-26)
Severity: high
Exploitable: local, remote
Date: June 24, 2012
Bug(s): #335880, #384967, #410949
ID: 201206-26

Synopsis

Multiple vulnerabilities have been found in RPM, possibly allowing
local attackers to gain elevated privileges or remote attackers to execute
arbitrary code.


Background

The Red Hat Package Manager (RPM) is a command line driven package
management system capable of installing, uninstalling, verifying,
querying, and updating computer software packages.


Affected Packages

Package: app-arch/rpm
Vulnerable: < 4.9.1.3
Unaffected: >= 4.9.1.3
Architectures: All supported architectures


Description

Multiple vulnerabilities have been found in RPM:
  • fsm.c fails to properly strip setuid and setgid bits from executable
    files during a package upgrade (CVE-2010-2059).
  • RPM does not properly parse spec files (CVE-2010-2197).
  • fsm.c fails to properly strip POSIX file capabilities from executable
    files during a package upgrade or removal (CVE-2010-2198).
  • fsm.c fails to properly strip POSIX ACLs from executable files during
    a package upgrade or removal (CVE-2010-2199).
  • header.c does not properly parse region offsets in package files
    (CVE-2011-3378).
  • RPM does not properly sanitize region tags in package headers
    (CVE-2012-0060).
  • RPM does not properly sanitize region sizes in package headers
    (CVE-2012-0061).
  • RPM does not properly sanitize region offsets in package
    headers(CVE-2012-0815).


Impact

A local attacker may be able to gain elevated privileges. Furthermore, a
remote attacker could entice a user to open a specially crafted RPM
package, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.


Workaround

There is no known workaround at this time.

Resolution

All RPM users should upgrade to the latest version:
Code:
# emerge --sync
      # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.9.1.3"
   


References

CVE-2010-2059
CVE-2010-2197
CVE-2010-2198
CVE-2010-2199
CVE-2011-3378
CVE-2012-0060
CVE-2012-0061
CVE-2012-0815


Last edited by GLSA on Tue Mar 11, 2014 4:32 am; edited 2 times in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum