Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 372983 (CVE-2010-4254) - <dev-lang/mono-2.10.2-r1: multiple vulnerabilities (CVE-2010-4254,CVE-2011-{0989,0990,0991,0992})
Summary: <dev-lang/mono-2.10.2-r1: multiple vulnerabilities (CVE-2010-4254,CVE-2011-{0...
Status: RESOLVED FIXED
Alias: CVE-2010-4254
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B1 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-06-25 12:57 UTC by GLSAMaker/CVETool Bot
Modified: 2012-06-21 20:53 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2011-06-25 12:57:07 UTC
CVE-2011-0992 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0992):
  Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x
  before 3.99.3 is used, allows remote attackers to cause a denial of service
  (plugin crash) or obtain sensitive information via vectors related to member
  data in a resurrected MonoThread instance.

CVE-2011-0991 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0991):
  Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x
  before 3.99.3 is used, allows remote attackers to cause a denial of service
  or possibly have unspecified other impact via vectors related to finalizing
  and then resurrecting a DynamicMethod instance.

CVE-2011-0990 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0990):
  Race condition in the FastCopy optimization in the Array.Copy method in
  metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before
  3.99.3 is used, allows remote attackers to trigger a buffer overflow and
  modify internal data structures, and cause a denial of service (plugin
  crash) or corrupt the internal state of the security manager, via a crafted
  media file in which a thread makes a change after a type check but before a
  copy action.

CVE-2011-0989 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0989):
  The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when
  Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly
  restrict data types, which allows remote attackers to modify internal
  read-only data structures, and cause a denial of service (plugin crash) or
  corrupt the internal state of the security manager, via a crafted media
  file, as demonstrated by modifying a C# struct.

CVE-2010-4254 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4254):
  Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does
  not properly validate arguments to generic methods, which allows remote
  attackers to bypass generic constraints, and possibly execute arbitrary
  code, via a crafted method call.
Comment 1 Pacho Ramos gentoo-dev 2011-06-25 14:53:25 UTC
www-plugins/moonlight is hardmasked
Comment 2 Pacho Ramos gentoo-dev 2011-06-25 14:54:46 UTC
Is mono-2.10.2 affected also?
Comment 4 Pacho Ramos gentoo-dev 2011-07-04 11:27:32 UTC
Yes, last one is the needed:


+*mono-2.10.2-r1 (04 Jul 2011)
+
+  04 Jul 2011; Pacho Ramos <pacho@gentoo.org> -files/mono-2.2-libdir126.patch,
+  -files/mono-2.2-ppc-threading.patch, -files/mono-2.2-uselibdir.patch,
+  -files/mono-2.6.4-require-glib.patch, -mono-2.6.7.ebuild,
+  -files/mono-2.8.1-radegast-crash.patch, -mono-2.8.2-r1.ebuild,
+  -files/mono-2.8-libdir.patch, -mono-2.10.1-r1.ebuild,
+  -files/mono-2.10.1-libdir.patch, +mono-2.10.2-r1.ebuild,
+  +files/mono-2.10.2-threads-access.patch:
+  Fix security problem, bug #372983 by Tim Sammut. Remove old.
+

Feel free to add arches when you prefer, it looks to work ok for me
Comment 5 Tim Sammut (RETIRED) gentoo-dev 2011-07-04 16:13:02 UTC
Arches, please test and mark stable:
=dev-lang/mono-2.10.2-r1
Target keywords : "amd64 ppc x86"
Comment 6 Agostino Sarubbo gentoo-dev 2011-07-04 19:37:13 UTC
amd64 ok
Comment 7 Thomas Kahle (RETIRED) gentoo-dev 2011-07-05 15:29:34 UTC
x86 stable. Thanks
Comment 8 Ian Delaney (RETIRED) gentoo-dev 2011-07-06 10:21:57 UTC
amd64 all ok
Comment 9 Markos Chandras (RETIRED) gentoo-dev 2011-07-06 17:47:37 UTC
amd64 done. Thanks Agostino and Ian
Comment 10 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2011-07-14 08:29:30 UTC
ppc stable, last arch done
Comment 11 Tim Sammut (RETIRED) gentoo-dev 2011-08-18 04:23:50 UTC
Thanks, everyone. GLSA request filed.
Comment 12 GLSAMaker/CVETool Bot gentoo-dev 2012-06-21 20:53:49 UTC
This issue was resolved and addressed in
 GLSA 201206-13 at http://security.gentoo.org/glsa/glsa-201206-13.xml
by GLSA coordinator Tobias Heinlein (keytoaster).