[USN-2479-1] RPM vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Mon Jan 19 15:47:22 UTC 2015

Ubuntu Security Notice USN-2479-1
January 19, 2015

rpm vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS


Several security issues were fixed in RPM.

Software Description:
- rpm: package manager for RPM


Florian Weimer discovered that RPM incorrectly handled temporary files. A
local attacker could use this issue to execute arbitrary code.

Florian Weimer discovered that RPM incorrectly handled certain CPIO
headers. If a user or automated system were tricked into installing a
malicious package file, a remote attacker could use this issue to cause RPM
to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2014-8118)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
  rpm                             4.11.2-3ubuntu0.1

Ubuntu 14.04 LTS:
  rpm                             4.11.1-3ubuntu0.1

Ubuntu 12.04 LTS:

In general, a standard system update will make all the necessary changes.

  CVE-2013-6435, CVE-2014-8118

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20150119/5bbac957/attachment.sig>

More information about the ubuntu-security-announce mailing list