Bug 911662 (CVE-2014-9447) - VUL-0: CVE-2014-9447: elfutils: Directory traversal vulnerability in the read_long_names function inlibelf/elf_begin.c in elfutils ...
Summary: VUL-0: CVE-2014-9447: elfutils: Directory traversal vulnerability in the read...
Status: RESOLVED FIXED
Alias: CVE-2014-9447
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P2 - High : Major
Target Milestone: ---
Deadline: 2015-03-04
Assignee: Tony Jones
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/111961/
Whiteboard: maint:released:sle11-sp1:60710 maint:...
Keywords: DSLA_REQUIRED, DSLA_SOLUTION_PROVIDED
Depends on:
Blocks: 912408
  Show dependency treegraph
 
Reported: 2015-01-05 10:28 UTC by Victor Pereira
Modified: 2021-11-03 15:39 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-01-05 10:28:41 UTC
CVE-2014-9447

Directory traversal vulnerability in the read_long_names function in
libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write
to arbitrary files to the root directory via a / (slash) in a crafted archive,
as demonstrated using the ar program.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9447
http://www.openwall.com/lists/oss-security/2014/12/29/2
https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html
https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e
http://www.securityfocus.com/bid/71804
http://secunia.com/advisories/61934
Comment 1 Swamp Workflow Management 2015-01-05 23:00:24 UTC
bugbot adjusting priority
Comment 2 Tony Jones 2015-01-07 21:47:24 UTC
Checked in for factory (0.161).  Looks like pretty much all versions are impacted.
Comment 3 Tony Jones 2015-01-07 22:15:12 UTC
Also, for elfutils this impacts eu-ar.      It appears the system ar (binutils) is also vulnerable.  Is this being handled independently?


# printf '!<arch>\n%-48s%-10s`\n//file/\n%-48s%-10s`\n' // 8 /1 0 > test.a
# /usr/bin/ar tv test.a 
--------- 0/0      0 Dec 31 16:00 1969 /file 
# ls /file
ls: cannot access /file: No such file or directory
# /usr/bin/ar xv test.a 
x - /file
# ls -l /file
---------- 1 root root 0 Jan  7 14:10 /file


# touch /file
# /usr/bin/ar q test2.a /file
/usr/bin/ar: creating test2.a
# /usr/bin/ar tv test2.a 
--------- 0/0      0 Jan  7 14:08 2015 file
# rm /file
# ls /file
ls: cannot access /file: No such file or directory
# /usr/bin/ar xv test2.a 
x - file
# ls /file
# ls ./file
./file
Comment 4 Tony Jones 2015-01-08 01:28:27 UTC
Submitted for opensuse 13.1 and opensuse 13.2 (mr# 280246)
Comment 5 Bernhard Wiedemann 2015-01-08 02:00:07 UTC
This is an autogenerated message for OBS integration:
This bug (911662) was mentioned in
https://build.opensuse.org/request/show/280246 13.2+13.1 / elfutils
Comment 6 Tony Jones 2015-01-09 17:38:58 UTC
(In reply to Tony Jones from comment #4)
> Submitted for opensuse 13.1 and opensuse 13.2 (mr# 280246)

resubmitted for opensuse 13.1/13.2 as mr 280635
Comment 7 Swamp Workflow Management 2015-01-23 10:09:03 UTC
openSUSE-SU-2015:0123-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 911662
CVE References: CVE-2014-9447
Sources used:
openSUSE 13.2 (src):    elfutils-0.158-4.5.1
openSUSE 13.1 (src):    elfutils-0.155-6.8.1
Comment 8 Tony Jones 2015-01-26 20:34:43 UTC
SUSE:SLE-12:Update - sr 49262
Comment 13 Swamp Workflow Management 2015-02-16 17:05:08 UTC
SUSE-SU-2015:0292-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 911662
CVE References: CVE-2014-9447
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    elfutils-0.158-6.1
SUSE Linux Enterprise Server 12 (src):    elfutils-0.158-6.1
SUSE Linux Enterprise Desktop 12 (src):    elfutils-0.158-6.1
Comment 15 Tony Jones 2015-02-17 23:19:30 UTC
osc sr SUSE:SLE-11-SP1:Update:Test
created request id 51758
Comment 16 Swamp Workflow Management 2015-02-18 12:01:34 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-03-04.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60709
Comment 17 Marcus Meissner 2015-03-05 09:20:49 UTC
released
Comment 18 Swamp Workflow Management 2015-03-05 18:05:07 UTC
SUSE-SU-2015:0434-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 911662
CVE References: CVE-2014-9447
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    elfutils-0.152-4.9.17
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    elfutils-0.152-4.9.17
SUSE Linux Enterprise Server 11 SP3 (src):    elfutils-0.152-4.9.17
SUSE Linux Enterprise Desktop 11 SP3 (src):    elfutils-0.152-4.9.17
Comment 23 Swamp Workflow Management 2019-02-18 09:02:38 UTC
This is an autogenerated message for OBS integration:
This bug (911662) was mentioned in
https://build.opensuse.org/request/show/676940 Factory / elfutils