[Bug 240397] New: CVE-2007-2721: jasper DoS, heap corruption
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240397
Summary: CVE-2007-2721: jasper DoS, heap corruption
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: jasper
AssignedTo: rdieter(a)math.unl.edu
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list(a)redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2721
"The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000
library (libjasper) before 1.900 allows remote user-assisted attackers to cause
a denial of service (crash) and possibly corrupt the heap via malformed image
files, as originally demonstrated using imagemagick convert."
Appears to affect 1.900.1 too.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
14 years, 9 months
[Bug 307471] New: CVE-2007-13{20-23}, CVE-2007-1366: qemu multiple vulnerabilities
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/show_bug.cgi?id=307471
Summary: CVE-2007-13{20-23}, CVE-2007-1366: qemu multiple
vulnerabilities
Product: Fedora
Version: fc6
Platform: All
URL: http://www.vuxml.org/freebsd/0ac89b39-f829-11db-b55c-
000e0c6d38a9.html
OS/Version: Linux
Status: NEW
Severity: medium
Priority: medium
Component: qemu
AssignedTo: dwmw2(a)infradead.org
ReportedBy: clalance(a)redhat.com
QAContact: extras-qa(a)fedoraproject.org
CC: fedora-security-list@redhat.com,j.w.r.degoede(a)hhs.nl
+++ This bug was initially created as a clone of Bug #238723 +++
Not sure if these affect any qemu versions in Fedora, but here goes:
http://www.vuxml.org/freebsd/0ac89b39-f829-11db-b55c-000e0c6d38a9.html
"Several vulnerabilities have been discovered in the QEMU processor emulator,
which may lead to the execution of arbitrary code or denial of service. The
Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-1320
Tavis Ormandy discovered that a memory management routine of the Cirrus video
driver performs insufficient bounds checking, which might allow the execution of
arbitrary code through a heap overflow.
CVE-2007-1321
Tavis Ormandy discovered that the NE2000 network driver and the socket code
perform insufficient input validation, which might allow the execution of
arbitrary code through a heap overflow.
CVE-2007-1322
Tavis Ormandy discovered that the "icebp" instruction can be abused to terminate
the emulation, resulting in denial of service.
CVE-2007-1323
Tavis Ormandy discovered that the NE2000 network driver and the socket code
perform insufficient input validation, which might allow the execution of
arbitrary code through a heap overflow.
CVE-2007-1366
Tavis Ormandy discovered that the "aam" instruction can be abused to crash qemu
through a division by zero, resulting in denial of service."
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
15 years
[Bug 187353] CVE-2006-1390 nethack: Local privilege escalation via crafted score file
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: CVE-2006-1390 nethack: Local privilege escalation via crafted score file
Alias: CVE-2006-1390
https://bugzilla.redhat.com/show_bug.cgi?id=187353
------- Additional Comments From metcalfegreg(a)qwest.net 2008-04-04 13:44 EST -------
My group count is already up to 60, with one user. IMHO, adding another for some
random game is not optimal. It only life makes life harder for people writing system
profiling/hardening/management tools, and systems administrators that would like to
use them to manage groups of machines.
A best practice for *writing* SUID/SGID programs is to use those privileges as early as
possible, then revoke them. If nethack isn't doing that, I have to wonder what other
problems it might have, and whether I should allow it on the system at all.
I just installed it, and got this error, as I have no /etc/X11/fontpath.d/:
ln: creating symbolic link `/etc/X11/fontpath.d/nethack': No such file or directory
error: %post(nethack-3.4.3-16.fc7.i386) scriptlet failed, exit status 1
Installed: nethack.i386 0:3.4.3-16.fc7
Complete!
So, another problem.
I started it, and find the following files in var/games/nethack:
-rw-rw-r-- 1 root games 0 2008-01-23 12:48 logfile
-rw-rw-r-- 1 root games 0 2008-01-23 12:48 perm
-rw-rw-r-- 1 root games 0 2008-01-23 12:48 record
drwxrwxr-x 2 root games 4096 2008-01-23 12:48 save
I quit, and logfile contains:
3.4.3 0 0 1 1 14 14 0 20080404 20080404 500 Pri Hum Fem Cha gregm,quit
So it does have to write into /var/log, as current designed. Some other characteristics of
the executable:
$ eu-readelf -l /usr/games/nethack-3.4.3/nethack | fgrep STACK | awk '{ print $7 }'
RW
eu-readelf -d /usr/games/nethack-3.4.3/nethack | fgrep -q TEXTREL exits with 1, so the
program contains no text relocations. So at least those bits are OK.
But I wonder if this program couldn't have been better written, to use /tmp, then call a
logger before exit. I just don't like the idea of adding yet another group for some random
game.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
15 years, 2 months
[Bug 187353] CVE-2006-1390 nethack: Local privilege escalation via crafted score file
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: CVE-2006-1390 nethack: Local privilege escalation via crafted score file
Alias: CVE-2006-1390
https://bugzilla.redhat.com/show_bug.cgi?id=187353
------- Additional Comments From j.w.r.degoede(a)hhs.nl 2008-04-04 10:19 EST -------
(In reply to comment #10)
> (In reply to comment #8)
> > From me (repeating myself from comment #3):
> >
> > Although users are not in the games group on Fedora this is still a problem,
> > this hole allows the following scenario:
> > - find a sgid game which is exploitable to get games gid rights
> > - use the games gid rights to drop a crafted file which will
> > exploit nethack when opened by nethack.
> > - once another users runs nethack and opens the crafted file
> > unwanted things get done with the rights of the other user.
> >
> > So although low priority this needs fixing never the less.
>
> So, do you think we should try and get the patch from upstream, or do the same
> thing that you did with vultures eye and create a separate 'nethack' group ?
I vote for creating a seperate group, because AFAIK nethack needs several files
under /var/games and opens / close these several times during one run of the
game, making early sgid dropping, as we do with other games impossible (or
atleast quite hard todo), so putting it in its own group probably is best.
For more on the early sgid dropping we do, see:
http://fedoraproject.org/wiki/SIGs/Games/Packaging#head-193b9a502a42098e6...
The idea here is that if even if one manages to subvert a sgid games game, one
does still not have access to gid games rights, as those have been dropt, so the
damaged for a subverted game is limited to write access to that games highscore
file.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
15 years, 2 months
[Bug 187353] CVE-2006-1390 nethack: Local privilege escalation via crafted score file
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: CVE-2006-1390 nethack: Local privilege escalation via crafted score file
Alias: CVE-2006-1390
https://bugzilla.redhat.com/show_bug.cgi?id=187353
lmacken(a)redhat.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |lmacken(a)redhat.com
------- Additional Comments From lmacken(a)redhat.com 2008-04-04 09:44 EST -------
(In reply to comment #8)
> From me (repeating myself from comment #3):
>
> Although users are not in the games group on Fedora this is still a problem,
> this hole allows the following scenario:
> - find a sgid game which is exploitable to get games gid rights
> - use the games gid rights to drop a crafted file which will
> exploit nethack when opened by nethack.
> - once another users runs nethack and opens the crafted file
> unwanted things get done with the rights of the other user.
>
> So although low priority this needs fixing never the less.
So, do you think we should try and get the patch from upstream, or do the same
thing that you did with vultures eye and create a separate 'nethack' group ?
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
15 years, 2 months