Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 509018 (CVE-2014-0471) - <app-arch/dpkg-1.17.9: dpkg-source: directory traversal during unpack (CVE-2014-0471)
Summary: <app-arch/dpkg-1.17.9: dpkg-source: directory traversal during unpack (CVE-20...
Status: RESOLVED FIXED
Alias: CVE-2014-0471
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://security-tracker.debian.org/t...
Whiteboard: C3 [noglsa]
Keywords:
Depends on:
Blocks: 506100
  Show dependency tree
 
Reported: 2014-04-28 21:37 UTC by Jeroen Roovers (RETIRED)
Modified: 2014-06-21 19:19 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jeroen Roovers (RETIRED) gentoo-dev 2014-04-28 21:37:46 UTC
"Correctly parse C-style diff filenames in Dpkg::Source::Patch, to avoid
     directory traversal attempts from hostile source packages when unpacking
     them. Reported by Jakub Wilk <jwilk@debian.org>. Fixes CVE-2014-0471."
Comment 1 Jeroen Roovers (RETIRED) gentoo-dev 2014-04-28 21:41:31 UTC
Arch teams, please test and mark stable:
=app-arch/dpkg-1.17.8
Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Comment 2 Jeroen Roovers (RETIRED) gentoo-dev 2014-04-29 03:16:36 UTC
Stable for HPPA.
Comment 3 Agostino Sarubbo gentoo-dev 2014-04-30 13:59:51 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2014-04-30 14:21:25 UTC
x86 stable
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2014-04-30 14:43:20 UTC
There was an upstream glitch in the Matrix.

Arch teams, please test and mark stable:
=app-arch/dpkg-1.17.9
Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Comment 6 Jeroen Roovers (RETIRED) gentoo-dev 2014-04-30 15:00:25 UTC
Stable for HPPA.
Comment 7 Markus Meier gentoo-dev 2014-05-03 14:17:26 UTC
arm stable
Comment 8 Agostino Sarubbo gentoo-dev 2014-05-04 08:20:46 UTC
amd64 stable
Comment 9 Jeroen Roovers (RETIRED) gentoo-dev 2014-05-04 22:56:49 UTC
??
Comment 10 Agostino Sarubbo gentoo-dev 2014-05-10 14:02:31 UTC
ppc stable
Comment 11 Agostino Sarubbo gentoo-dev 2014-05-11 08:05:49 UTC
ppc64 stable
Comment 12 Agostino Sarubbo gentoo-dev 2014-05-13 15:17:46 UTC
ia64 stable
Comment 13 Agostino Sarubbo gentoo-dev 2014-05-14 16:07:53 UTC
sparc stable
Comment 14 Agostino Sarubbo gentoo-dev 2014-05-17 13:50:57 UTC
alpha stable
Comment 15 Agostino Sarubbo gentoo-dev 2014-05-18 10:16:26 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 16 Yury German Gentoo Infrastructure gentoo-dev 2014-05-19 23:48:50 UTC
Looks like Arm was missed during stabilization, setting back to stable.
Comment 17 Markus Meier gentoo-dev 2014-05-25 18:50:08 UTC
arm stable, all arches done.
Comment 18 GLSAMaker/CVETool Bot gentoo-dev 2014-05-25 19:57:20 UTC
CVE-2014-0471 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0471):
  Directory traversal vulnerability in the unpacking functionality in dpkg
  before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote
  attackers to write arbitrary files via a crafted source package, related to
  "C-style filename quoting."
Comment 19 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-05-27 10:39:53 UTC
GLSA vote: no.
Comment 20 Sean Amoss (RETIRED) gentoo-dev Security 2014-06-01 13:26:35 UTC
We have 3 other bugs in GLSA status that can be bundled with this, so YES.
Comment 21 Sean Amoss (RETIRED) gentoo-dev Security 2014-06-21 19:19:03 UTC
No GLSA being issued for dpkg.