[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Update information for CVE-2017-7516

Salvatore Bonaccorso carnil at debian.org
Sun Feb 18 21:47:44 UTC 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f9b14124 by Salvatore Bonaccorso at 2018-02-18T22:46:52+01:00
Update information for CVE-2017-7516

This is likely to be the very same issue as CVE-2015-1197. The attack
vector is the same as the result. Different approaches on how to fix
(one as used in Debian and SuSE) and one on the cpio mailinglist.

Asked MITRE if we should consider CVE-2017-7516 a duplicate of
CVE-2015-1197.

For the time beeing the patch applied in 2.11+dfsg-4.1 adresses the
bypass of cpio --no-absolute-filenames as outlined in
http://lists.gnu.org/archive/html/bug-cpio/2017-06/msg00001.html

Broght the issue as well to the Red Hat bugzilla, since the
CVE-2017-7516 is Red Hat assigned:

https://bugzilla.redhat.com/show_bug.cgi?id=1539685#c6

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -48174,12 +48174,11 @@ CVE-2017-7517
 	RESERVED
 	NOT-FOR-US: OpenShift
 CVE-2017-7516 (It was found that the cpio --no-absolute-filenames option since ...)
-	- cpio <unfixed> (low)
-	[stretch] - cpio <no-dsa> (Minor issue)
-	[jessie] - cpio <no-dsa> (Minor issue)
+	- cpio 2.11+dfsg-4.1 (low)
 	[wheezy] - cpio <ignored> (Minor issue, same motivation as CVE-2015-1197)
 	NOTE: https://lists.gnu.org/archive/html/bug-cpio/2017-06/msg00001.html
 	NOTE: and followups: https://lists.gnu.org/archive/html/bug-cpio/2017-06/msg00005.html
+	NOTE: Same issue as CVE-2015-1197: https://bugzilla.redhat.com/show_bug.cgi?id=1539685#c6
 CVE-2017-7515 (poppler through version 0.55.0 is vulnerable to an uncontrolled ...)
 	- poppler 0.57.0-2 (unimportant)
 	NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=101208



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f9b14124498de00318680963c312469d7f60f08f

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f9b14124498de00318680963c312469d7f60f08f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180218/6dd9308d/attachment.html>


More information about the Secure-testing-commits mailing list