[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Update information for CVE-2017-7516
Salvatore Bonaccorso
carnil at debian.org
Sun Feb 18 21:47:44 UTC 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f9b14124 by Salvatore Bonaccorso at 2018-02-18T22:46:52+01:00
Update information for CVE-2017-7516
This is likely to be the very same issue as CVE-2015-1197. The attack
vector is the same as the result. Different approaches on how to fix
(one as used in Debian and SuSE) and one on the cpio mailinglist.
Asked MITRE if we should consider CVE-2017-7516 a duplicate of
CVE-2015-1197.
For the time beeing the patch applied in 2.11+dfsg-4.1 adresses the
bypass of cpio --no-absolute-filenames as outlined in
http://lists.gnu.org/archive/html/bug-cpio/2017-06/msg00001.html
Broght the issue as well to the Red Hat bugzilla, since the
CVE-2017-7516 is Red Hat assigned:
https://bugzilla.redhat.com/show_bug.cgi?id=1539685#c6
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -48174,12 +48174,11 @@ CVE-2017-7517
RESERVED
NOT-FOR-US: OpenShift
CVE-2017-7516 (It was found that the cpio --no-absolute-filenames option since ...)
- - cpio <unfixed> (low)
- [stretch] - cpio <no-dsa> (Minor issue)
- [jessie] - cpio <no-dsa> (Minor issue)
+ - cpio 2.11+dfsg-4.1 (low)
[wheezy] - cpio <ignored> (Minor issue, same motivation as CVE-2015-1197)
NOTE: https://lists.gnu.org/archive/html/bug-cpio/2017-06/msg00001.html
NOTE: and followups: https://lists.gnu.org/archive/html/bug-cpio/2017-06/msg00005.html
+ NOTE: Same issue as CVE-2015-1197: https://bugzilla.redhat.com/show_bug.cgi?id=1539685#c6
CVE-2017-7515 (poppler through version 0.55.0 is vulnerable to an uncontrolled ...)
- poppler 0.57.0-2 (unimportant)
NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=101208
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f9b14124498de00318680963c312469d7f60f08f
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f9b14124498de00318680963c312469d7f60f08f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180218/6dd9308d/attachment.html>
More information about the Secure-testing-commits
mailing list