|
Message-ID: <CAA7hUgG74XTz6M6Vh2uMPDqPnLCHmZ+M1MQTXyLvUQoU7z3JRg@mail.gmail.com> Date: Tue, 29 Apr 2014 16:59:38 +0200 From: Raphael Geissert <geissert@...ian.org> To: Open Source Security <oss-security@...ts.openwall.com> Subject: CVE request: directory traversal in DSA-2915-1-patched dpkg in Debian squeeze Hi, The recent update[1] of dpkg for CVE-2014-0471 in Debian squeeze (and possibly Ubuntu lucid[2]) actually introduces a vulnerability in that release[3], while it was not affected by the original vulnerability. The newly introduced vulnerability is dependent on the version of patch(1) that is installed on the system, so that: updated dpkg in squeeze + patch(1) from squeeze = vulnerable updated dpkg in squeeze + patch(1) from wheezy = not vulnerable updated dpkg in wheezy + patch(1) from squeeze = vulnerable (but not confirmed) updated dpkg in wheezy + patch(1) from wheezy = not vulnerable In other words, if the updated dpkg package is not installed in a squeeze system, this new vulnerability would only be exposed if a system is partially upgraded to wheezy. Given that at least one PoC demonstrates that squeeze's updated package is vulnerable, while the previous dpkg in wheezy isn't (it refuses to unpack the package), I think this is a new vulnerability and should therefore receive its own CVE. If you agree, could you please assign one? Thanks in advance. [1]https://www.debian.org/security/2014/dsa-2915 [2]http://www.ubuntu.com/usn/usn-2183-1/ [3]https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306 Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.