Mageia alert MGASA-2015-0150 (arj)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2015-0150: Updated arj packages fix security vulnerabilities | |
Date: | Wed, 15 Apr 2015 11:01:58 +0200 | |
Message-ID: | <20150415090158.5AD934894B@valstar.mageia.org> |
MGASA-2015-0150 - Updated arj packages fix security vulnerabilities Publication date: 15 Apr 2015 URL: http://advisories.mageia.org/MGASA-2015-0150.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-0556, CVE-2015-0557, CVE-2015-2782 Description: Updated arj package fixes security vulnerabilities: ARJ follows symlinks when unpacking stuff, even the symlinks that were created during the same unpack process, making it vulnerable to a directory traversal (CVE-2015-0556). To protect from directory traversals, ARJ strips leading slash from the path when unpacking, but this protection can be easily bypassed by adding more than one leading slash to the path (CVE-2015-0557). ARJ is vulnerable to a buffer overflow when processing a specially crafted arj file (CVE-2015-2782). References: - https://bugs.mageia.org/show_bug.cgi?id=15586 - https://www.debian.org/security/2015/dsa-3213 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0556 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0557 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2782 SRPMS: - 4/core/arj-3.10.22-9.mga4