Bugzilla – Bug 955194
VUL-1: CVE-2015-8107: a2ps(gnu) v4.14 format string vulnerability
Last modified: 2019-04-12 14:42:43 UTC
Very minor issue IMHO. Not sure a2ps is using unsafe mode anyway and attackers who can provide prolog files may be executing arbitrary code anyways? Fixing in next release. oss-sec: "I am writing this to report a format string vulnerability in a2ps. (4.14, which is the latest version) Also I already have been assigned a CVE identifier from MITRE "CVE-2015-8107", so I want to make public this vulnerability. - Target Platform Linux - Target Version 4.14 (Latest Version) " CVE-2015-8107 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8107 http://seclists.org/oss-sec/2015/q4/284
To find the "exploit.pro" from http://seclists.org/oss-sec/2015/q4/284 this expolit has to installed in the appropiate system path! After mkdir /suse/werner/.a2ps and mv exploit.pro /suse/werner/.a2ps/ I see a2ps/a2ps-4.14> a2ps --prologue=exploit /etc/hosts -o /dev/null *** %n in writable segment detected *** Abort that is our glibc is catching this.
Created attachment 656067 [details] exploit.pro
You may report this upstream at the oss-sec
I have a fixed package for fatcory. Is it possible to submit as AFAICS the bug is public.
Yes, its a public bug. No more submits than Factory needed due to low severity.
bugbot adjusting priority
(In reply to Sebastian Krahmer from comment #7) OK