- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202412-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: R: Arbitrary Code Execution
Date: December 07, 2024
Bugs: #930936
ID: 202412-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability has been discovered in R, which can lead to arbitrary
code execution.
Background
==========
R is a language and environment for statistical computing and graphics.
Affected packages
=================
Package Vulnerable Unaffected
---------- ------------ ------------
dev-lang/R < 4.4.1 >= 4.4.1
Description
===========
Deserialization of untrusted data can occur in the R statistical
programming language, enabling a maliciously crafted RDS (R Data
Serialization) formatted file or R package to run arbitrary code on an
end user’s system when interacted with.
Impact
======
Arbitrary code may be run when deserializing untrusted data.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All R users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/R-4.4.1"
References
==========
[ 1 ] CVE-2024-27322
https://nvd.nist.gov/vuln/detail/CVE-2024-27322
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202412-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmdUDUoACgkQFMQkOaVy +9nFvRAAphuFHmFFTYzewG4wsii+AjyqVKRlJiTlpi2rS1lkW2wulqdeBEFM8AYL vE7ilgrgNVhSBmRc5ErQwX1qHKtCMTK8LO70DV5xrcqdMH/BGNKov5uKu5vHOfUW S9e+FPjc/h8LYb/NhqkMKsnTFa9p7VkluL8SzK05GIXUbT5eNbaM9dQ1ap2RdD1G kfRhQ1SceWD3nOvtDiKTEZL/+1BWOzASPmzZzi2DLfvuGDf/lOPbmIqHqNQXUNtq VgfCMLN6IpS1cyUTe8H0C+gtnFyaLYwXeLqshe9dLZNI7OHCX5F53ugV1GX/KBls dW7mixz+qV2+nQlqIBdMpLwQpGzd1PtCVUxAf6EHI/9YJoQmCERlXnrxK2M/0h2Q 7GGzG0OhvTCjrJWdn16dFILPjNmOTPKTGfzbW6B8uyBVKnWWCucqhw5mRVZk03Mr 2PlBYKFn+Gpvi+B9V13cEOzs5YFYLrA6bDdUXBnzxcOdkRsn+D9yVUlsvwPDSjfY 5XuIjquw2oEtAfTb6dL8jS4rruVxKkEDUpniL6cmCj20wt7NIS7PtB4XGLmTIqtJ oQCwwwWq26ViHZUuwvhczdGoA2rA15lgTvMoY9BxlMWSEb+r/N1oYP9NueXHb6jy nM0zZ92fprI9Uy2wDVXwBJliqxSiOmBCWHt1+jiWcnlXF4JF1d0=
=vq0g
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)