MGASA-2014-0529

Source
https://advisories.mageia.org/MGASA-2014-0529.html
Import Source
https://advisories.mageia.org/MGASA-2014-0529.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0529
Related
Published
2014-12-14T14:10:39Z
Modified
2014-12-14T14:03:39Z
Summary
Updated rpm packages fix security vulnerabilities
Details

It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation (CVE-2013-6435).

It was found that RPM could encounter an integer overflow, leading to a stack-based buffer overflow, while parsing a crafted CPIO header in the payload section of an RPM file. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation (CVE-2014-8118).

References
Credits

Affected packages

Mageia:4 / rpm

Package

Name
rpm
Purl
pkg:rpm/mageia/rpm?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.11.1-9.mga4

Ecosystem specific

{
    "section": "core"
}