Gentoo: GLSA-202211-07: sysstat: Arbitrary Code Execution | LinuxSe...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 202211-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
    Title: sysstat: Arbitrary Code Execution
     Date: November 22, 2022
     Bugs: #880543
       ID: 202211-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

An integer overflow vulnerability has been found in sysstat which could
result in arbitrary code execution.

Background
==========

sysstat is a package containing a number of performance monitoring
utilities for Linux, including sar, mpstat, iostat and sa tools.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  app-admin/sysstat          < 12.7.1                    >= 12.7.1

Description
===========

On 32 bit systems, an integer overflow can be triggered when displaying
activity data files.

Impact
======

Arbitrary code execution can be achieved via sufficiently crafted
malicious input.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All sysstat users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-admin/sysstat-12.7.1"

References
==========

[ 1 ] CVE-2022-39377
      https://nvd.nist.gov/vuln/detail/CVE-2022-39377

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/202211-07

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Gentoo: GLSA-202211-07: sysstat: Arbitrary Code Execution

Summary

On 32 bit systems, an integer overflow can be triggered when displaying activity data files.

Resolution

All sysstat users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/sysstat-12.7.1"

References

[ 1 ] CVE-2022-39377 https://nvd.nist.gov/vuln/detail/CVE-2022-39377

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202211-07

Concerns

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to [email protected] or alternatively, you may file a bug at https://bugs.gentoo.org.

Severity
Severity: Normal
Title: sysstat: Arbitrary Code Execution
Date: November 22, 2022
Bugs: #880543
ID: 202211-07

Synopsis

An integer overflow vulnerability has been found in sysstat which could result in arbitrary code execution.

Background

sysstat is a package containing a number of performance monitoring utilities for Linux, including sar, mpstat, iostat and sa tools.

Affected Packages

------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-admin/sysstat < 12.7.1 >= 12.7.1

Impact

Arbitrary code execution can be achieved via sufficiently crafted malicious input.

Workaround

There is no known workaround at this time.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.