Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 29 Apr 2014 16:59:38 +0200
From: Raphael Geissert <geissert@...ian.org>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: CVE request: directory traversal in DSA-2915-1-patched dpkg in Debian squeeze

Hi,

The recent update[1] of dpkg for CVE-2014-0471 in Debian squeeze (and
possibly Ubuntu lucid[2]) actually introduces a vulnerability in that
release[3], while it was not affected by the original vulnerability.
The newly introduced vulnerability is dependent on the version of
patch(1) that is installed on the system, so that:

updated dpkg in squeeze + patch(1) from squeeze = vulnerable
updated dpkg in squeeze + patch(1) from wheezy = not vulnerable
updated dpkg in wheezy + patch(1) from squeeze = vulnerable (but not confirmed)
updated dpkg in wheezy + patch(1) from wheezy = not vulnerable

In other words, if the updated dpkg package is not installed in a
squeeze system, this new vulnerability would only be exposed if a
system is partially upgraded to wheezy.

Given that at least one PoC demonstrates that squeeze's updated
package is vulnerable, while the previous dpkg in wheezy isn't (it
refuses to unpack the package), I think this is a new vulnerability
and should therefore receive its own CVE.

If you agree, could you please assign one?

Thanks in advance.

[1]https://www.debian.org/security/2014/dsa-2915
[2]http://www.ubuntu.com/usn/usn-2183-1/
[3]https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.