Gentoo Logo

RPM: Buffer overflow

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200611-08 / rpm
Release Date November 13, 2006
Latest Revision November 13, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-arch/rpm < 4.4.6-r3 >= 4.4.6-r3 All supported architectures

Related bugreports: #154218

Synopsis

RPM is vulnerable to a buffer overflow and possibly the execution of arbitrary code when opening specially crafted packages.

2.  Impact Information

Background

The Red Hat Package Manager (RPM) is a command line driven package management system capable of installing, uninstalling, verifying, querying, and updating computer software packages.

Description

Vladimir Mosgalin has reported that when processing certain packages, RPM incorrectly allocates memory for the packages, possibly causing a heap-based buffer overflow.

Impact

An attacker could entice a user to open a specially crafted RPM package and execute code with the privileges of that user if certain locales are set.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All RPM users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/rpm-4.4.6-r3"

4.  References



Print

Page updated November 13, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.