[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request: directory traversal in DSA-2915-1-patched dpkg in Debian squeeze
From:       Raphael Geissert <geissert () debian ! org>
Date:       2014-04-29 14:59:38
Message-ID: CAA7hUgG74XTz6M6Vh2uMPDqPnLCHmZ+M1MQTXyLvUQoU7z3JRg () mail ! gmail ! com
[Download RAW message or body]

Hi,

The recent update[1] of dpkg for CVE-2014-0471 in Debian squeeze (and
possibly Ubuntu lucid[2]) actually introduces a vulnerability in that
release[3], while it was not affected by the original vulnerability.
The newly introduced vulnerability is dependent on the version of
patch(1) that is installed on the system, so that:

updated dpkg in squeeze + patch(1) from squeeze = vulnerable
updated dpkg in squeeze + patch(1) from wheezy = not vulnerable
updated dpkg in wheezy + patch(1) from squeeze = vulnerable (but not confirmed)
updated dpkg in wheezy + patch(1) from wheezy = not vulnerable

In other words, if the updated dpkg package is not installed in a
squeeze system, this new vulnerability would only be exposed if a
system is partially upgraded to wheezy.

Given that at least one PoC demonstrates that squeeze's updated
package is vulnerable, while the previous dpkg in wheezy isn't (it
refuses to unpack the package), I think this is a new vulnerability
and should therefore receive its own CVE.

If you agree, could you please assign one?

Thanks in advance.

[1]https://www.debian.org/security/2014/dsa-2915
[2]http://www.ubuntu.com/usn/usn-2183-1/
[3]https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic