Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 499876 (CVE-2014-1693) - <dev-lang/erlang-17.3: command injection flaw in FTP module (CVE-2014-1693)
Summary: <dev-lang/erlang-17.3: command injection flaw in FTP module (CVE-2014-1693)
Status: RESOLVED FIXED
Alias: CVE-2014-1693
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 576398
Blocks:
  Show dependency tree
 
Reported: 2014-01-31 09:10 UTC by Agostino Sarubbo
Modified: 2016-11-19 05:11 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-01-31 09:10:01 UTC
From ${URL} :

An FTP command injection flaw was found [1] in Erlang's FTP module. Several functions in the FTP module do 
not properly sanitize the input before passing it into a control socket. A local attacker can use this 
flaw to execute arbitrary FTP commands on a system that uses this module.

This issue has been reported upstream [2], but has not yet been fixed.

[1] http://seclists.org/oss-sec/2014/q1/163
[2] http://erlang.org/pipermail/erlang-bugs/2014-January/003998.html


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Dirkjan Ochtman (RETIRED) gentoo-dev 2014-12-22 18:00:40 UTC
We can stabilize erlang-17.3 for this, which has the fix.
Comment 2 Agostino Sarubbo gentoo-dev 2014-12-23 09:03:06 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2014-12-23 09:04:20 UTC
x86 stable
Comment 4 Agostino Sarubbo gentoo-dev 2014-12-24 14:37:15 UTC
ppc stable
Comment 5 Agostino Sarubbo gentoo-dev 2014-12-24 14:47:21 UTC
ppc64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-12-26 09:18:54 UTC
sparc stable
Comment 7 Tobias Klausmann (RETIRED) gentoo-dev 2015-01-09 14:18:02 UTC
Stable on alpha.
Comment 8 Dirkjan Ochtman (RETIRED) gentoo-dev 2016-04-13 16:55:38 UTC
Security team, ping? I think this can be closed, we've long since stabilized 17.5.
Comment 9 Aaron Bauman (RETIRED) gentoo-dev 2016-07-02 05:06:15 UTC
Looking at the CVE and mailing lists I cannot confirm the versioning.  Hopefully you can provide expertise on the R15B03 reference to which this was tested?  Basically, is 15.2.3.1 vulnerable?
Comment 10 Dirkjan Ochtman (RETIRED) gentoo-dev 2016-07-03 10:47:02 UTC
I'm all for removing it. Amadeusz, how are we doing on ejabberd stuff?
Comment 11 Dirkjan Ochtman (RETIRED) gentoo-dev 2016-07-03 10:48:39 UTC
That is, I agree that 15.2.3.1 is probably vulnerable, although I can't find any definitive information on it, either.
Comment 12 Amadeusz Żołnowski (RETIRED) gentoo-dev 2016-07-03 15:34:02 UTC
(In reply to Dirkjan Ochtman from comment #10)
> I'm all for removing it. Amadeusz, how are we doing on ejabberd stuff?

I'm about to request stabilization for amd64, arm, ppc, x86, but I've just got keywords for ~ia64 and soon I may have it for ~sparc which means we will have to wait a bit for stabilization, unless... there's a way around this.
Comment 13 Dirkjan Ochtman (RETIRED) gentoo-dev 2016-08-21 07:08:14 UTC
Removed the final vulnerable version from the tree.
Comment 14 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-18 19:45:52 UTC
@ Security: Please vote.
Comment 15 Aaron Bauman (RETIRED) gentoo-dev 2016-11-19 05:11:32 UTC
GLSA Vote: No