Gentoo Archives: gentoo-announce

From: Sam James <sam@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202008-02 ] GNU GLOBAL: Arbitrary code execution
Date: Sat, 08 Aug 2020 04:25:25
Message-Id: B6EEBB99-6F6F-47A3-B3FA-06E22705C3DE@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202008-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: GNU GLOBAL: Arbitrary code execution
9 Date: August 08, 2020
10 Bugs: #646348
11 ID: 202008-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in GNU GLOBAL was discovered, possibly allowing remote
19 attackers to execute arbitrary code.
20
21 Background
22 ==========
23
24 GNU GLOBAL is a source code tagging system that works the same way
25 across diverse environments, such as Emacs editor, Vi editor, Less
26 viewer, Bash shell, various web browsers, etc.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-util/global < 6.6.4 >= 6.6.4
35
36 Description
37 ===========
38
39 A vulnerability was found in an undocumented function of gozilla.
40
41 Impact
42 ======
43
44 A remote attacker could entice a user to open a specially crafted URL
45 using GNU GLOBAL, possibly resulting in execution of arbitrary code
46 with the privileges of the process or a Denial of Service condition.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All GNU GLOBAL users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=dev-util/global-6.6.4"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2017-17531
65 https://nvd.nist.gov/vuln/detail/CVE-2017-17531
66
67 Availability
68 ============
69
70 This GLSA and any updates to it are available for viewing at
71 the Gentoo Security Website:
72
73 https://security.gentoo.org/glsa/202008-02
74
75 Concerns?
76 =========
77
78 Security is a primary focus of Gentoo Linux and ensuring the
79 confidentiality and security of our users' machines is of utmost
80 importance to us. Any security concerns should be addressed to
81 security@g.o or alternatively, you may file a bug at
82 https://bugs.gentoo.org.
83
84 License
85 =======
86
87 Copyright 2020 Gentoo Foundation, Inc; referenced text
88 belongs to its owner(s).
89
90 The contents of this document are licensed under the
91 Creative Commons - Attribution / Share Alike license.
92
93 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature