• [gentoo-announce] [ GLSA 202412-01 ] R: Arbitrary Code Execution

    From glsamaker@gentoo.org@21:1/5 to All on Sat Dec 7 10:00:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202412-01
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: R: Arbitrary Code Execution
    Date: December 07, 2024
    Bugs: #930936
    ID: 202412-01

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been discovered in R, which can lead to arbitrary
    code execution.

    Background
    ==========

    R is a language and environment for statistical computing and graphics.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ---------- ------------ ------------
    dev-lang/R < 4.4.1 >= 4.4.1

    Description
    ===========

    Deserialization of untrusted data can occur in the R statistical
    programming language, enabling a maliciously crafted RDS (R Data
    Serialization) formatted file or R package to run arbitrary code on an
    end user’s system when interacted with.

    Impact
    ======

    Arbitrary code may be run when deserializing untrusted data.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All R users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-lang/R-4.4.1"

    References
    ==========

    [ 1 ] CVE-2024-27322
    https://nvd.nist.gov/vuln/detail/CVE-2024-27322

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202412-01

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmdUDUoACgkQFMQkOaVy +9nFvRAAphuFHmFFTYzewG4wsii+AjyqVKRlJiTlpi2rS1lkW2wulqdeBEFM8AYL vE7ilgrgNVhSBmRc5ErQwX1qHKtCMTK8LO70DV5xrcqdMH/BGNKov5uKu5vHOfUW S9e+FPjc/h8LYb/NhqkMKsnTFa9p7VkluL8SzK05GIXUbT5eNbaM9dQ1ap2RdD1G kfRhQ1SceWD3nOvtDiKTEZL/+1BWOzASPmzZzi2DLfvuGDf/lOPbmIqHqNQXUNtq VgfCMLN6IpS1cyUTe8H0C+gtnFyaLYwXeLqshe9dLZNI7OHCX5F53ugV1GX/KBls dW7mixz+qV2+nQlqIBdMpLwQpGzd1PtCVUxAf6EHI/9YJoQmCERlXnrxK2M/0h2Q 7GGzG0OhvTCjrJWdn16dFILPjNmOTPKTGfzbW6B8uyBVKnWWCucqhw5mRVZk03Mr 2PlBYKFn+Gpvi+B9V13cEOzs5YFYLrA6bDdUXBnzxcOdkRsn+D9yVUlsvwPDSjfY 5XuIjquw2oEtAfTb6dL8jS4rruVxKkEDUpniL6cmCj20wt7NIS7PtB4XGLmTIqtJ oQCwwwWq26ViHZUuwvhczdGoA2rA15lgTvMoY9BxlMWSEb+r/N1oYP9NueXHb6jy nM0zZ92fprI9Uy2wDVXwBJliqxSiOmBCWHt1+jiWcnlXF4JF1d0=
    =vq0g
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)