Gentoo Archives: gentoo-announce

From: Chris Reffett <creffett@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201312-10 ] libsmi: Arbitrary code execution
Date: Sat, 14 Dec 2013 22:56:51
Message-Id: 52ACE0FD.6080202@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201312-10
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: libsmi: Arbitrary code execution
9 Date: December 14, 2013
10 Bugs: #342127
11 ID: 201312-10
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A buffer overflow in libsmi might allow a context-dependent attacker to
19 execute arbitrary code.
20
21 Background
22 ==========
23
24 libsmi is a library that allows management applications to access SMI
25 MIB module definitions.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-libs/libsmi < 0.4.8-r1 >= 0.4.8-r1
34
35 Description
36 ===========
37
38 libsmi contains a buffer overflow vulnerability in the smiGetNode()
39 function in lib/smi.c.
40
41 Impact
42 ======
43
44 A context-dependent attacker could possibly execute arbitrary code by
45 way of a specially crafted Object Identifier (OID).
46
47 Workaround
48 ==========
49
50 There is no known workaround at this time.
51
52 Resolution
53 ==========
54
55 All libsmi users should upgrade to the latest version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=net-libs/libsmi-0.4.8-r1"
59
60 Packages which depend on this library may need to be recompiled. Tools
61 such as revdep-rebuild may assist in identifying these packages.
62
63 NOTE: This is a legacy GLSA. Updates for all affected architectures are
64 available since October 30, 2010. It is likely that your system is
65 already no longer affected by this issue.
66
67 References
68 ==========
69
70 [ 1 ] CVE-2010-2891
71 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2891
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-201312-10.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users' machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 https://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2013 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature