|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0150 (arj)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0150: Updated arj packages fix security vulnerabilities
Date:  Wed, 15 Apr 2015 11:01:58 +0200
Message-ID:  <20150415090158.5AD934894B@valstar.mageia.org>

MGASA-2015-0150 - Updated arj packages fix security vulnerabilities Publication date: 15 Apr 2015 URL: http://advisories.mageia.org/MGASA-2015-0150.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-0556, CVE-2015-0557, CVE-2015-2782 Description: Updated arj package fixes security vulnerabilities: ARJ follows symlinks when unpacking stuff, even the symlinks that were created during the same unpack process, making it vulnerable to a directory traversal (CVE-2015-0556). To protect from directory traversals, ARJ strips leading slash from the path when unpacking, but this protection can be easily bypassed by adding more than one leading slash to the path (CVE-2015-0557). ARJ is vulnerable to a buffer overflow when processing a specially crafted arj file (CVE-2015-2782). References: - https://bugs.mageia.org/show_bug.cgi?id=15586 - https://www.debian.org/security/2015/dsa-3213 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0556 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0557 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2782 SRPMS: - 4/core/arj-3.10.22-9.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds