Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 552484 (CVE-2015-4645, CVE-2015-4646) - <sys-fs/squashfs-tools-4.3-r1: Multiple stack overflows (CVE-2015-{4645,4646})
Summary: <sys-fs/squashfs-tools-4.3-r1: Multiple stack overflows (CVE-2015-{4645,4646})
Status: RESOLVED FIXED
Alias: CVE-2015-4645, CVE-2015-4646
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: http://seclists.org/oss-sec/2015/q2/746
Whiteboard: B2 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-18 18:15 UTC by Bernd Wernerus
Modified: 2019-03-24 20:38 UTC (History)
5 users (show)

See Also:
Package list:
=sys-fs/squashfs-tools-4.3-r2
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Bernd Wernerus 2015-06-18 18:15:56 UTC
Cited from $URL:
The vulnerability can be exploited by using the unsquashfs command to unpack a malicious squashfs image that causes a stack overflow in an unchecked variable length array.
Thereafter, a function that copies data from the squashfs image to the overflown array is executed.

I’m requesting a CVE number for this vulnerability,  per project.

Title: Stack overflows in squash-fs
Products: squash-fs
Affects: All versions
Type: Stack overflow
First CVE ID Request: Yes

Title: Stack overflows in sasquatch
Products: sasquatch
Affects: All versions
Type: Stack overflow
First CVE ID Request: Yes

Fore information about the stack overflow, please visit:
https://github.com/devttys0/sasquatch/pull/5


Reproducible: Always
Comment 1 SpanKY gentoo-dev 2016-06-17 15:06:29 UTC
looks like i fixed this in 4.3-r1 when i pulled in the debian patchset
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-29 23:38:34 UTC
Let's stabilize =sys-fs/squashfs-tools-4.3-r2 but we wait for bug 600934 first.
Comment 3 SpanKY gentoo-dev 2016-11-30 06:23:27 UTC
pretty sure bug 600934 isn't a regression which means it doesn't block stabilization
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2016-12-04 00:03:20 UTC
You are the maintainer, you decide. So ok, let's start the stabilization:


@ Arches,

please test and mark stable: =sys-fs/squashfs-tools-4.3-r2
Comment 5 Tobias Klausmann (RETIRED) gentoo-dev 2016-12-05 15:49:02 UTC
Stable on alpha.
Comment 6 Agostino Sarubbo gentoo-dev 2016-12-06 11:51:05 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2016-12-06 11:53:55 UTC
x86 stable
Comment 8 Markus Meier gentoo-dev 2016-12-17 15:23:13 UTC
arm stable
Comment 9 Agostino Sarubbo gentoo-dev 2017-01-11 10:38:16 UTC
sparc stable
Comment 10 Jeroen Roovers (RETIRED) gentoo-dev 2017-01-14 11:44:52 UTC
Stable for HPPA.
Comment 11 Agostino Sarubbo gentoo-dev 2017-01-15 15:51:45 UTC
ppc stable
Comment 12 Agostino Sarubbo gentoo-dev 2017-01-17 14:26:31 UTC
ia64 stable
Comment 13 Agostino Sarubbo gentoo-dev 2017-01-18 10:04:14 UTC
ppc64 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 14 Aaron Bauman (RETIRED) gentoo-dev 2017-01-19 10:42:50 UTC
GLSA request filed.
Comment 15 GLSAMaker/CVETool Bot gentoo-dev 2017-01-29 17:02:41 UTC
This issue was resolved and addressed in
 GLSA 201701-73 at https://security.gentoo.org/glsa/201701-73
by GLSA coordinator Thomas Deutschmann (whissi).
Comment 16 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-29 17:06:37 UTC
Re-opening for cleanup.

@ Maintainer(s): Please cleanup and drop <sys-fs/squashfs-tools-4.3-r1!
Comment 17 Jeroen Roovers (RETIRED) gentoo-dev 2017-02-03 22:13:36 UTC
Why wasn't livecd@ CC'd to begin with?

(In reply to Thomas Deutschmann from comment #16)
> @ Maintainer(s): Please cleanup and drop <sys-fs/squashfs-tools-4.3-r1!

I have no idea if the 3.0 and 3.1 SLOTs are vulnerable.
Comment 18 Thomas Deutschmann (RETIRED) gentoo-dev 2017-02-04 16:38:25 UTC
> > @ Maintainer(s): Please cleanup and drop <sys-fs/squashfs-tools-4.3-r1!
> 
> I have no idea if the 3.0 and 3.1 SLOTs are vulnerable.

Can we just cleanup or do you want to keep 3.0 or 3.1 for some reasons? If you want to keep we would have to investigate but I am not sure if it is worth to do...
Comment 19 Jeroen Roovers (RETIRED) gentoo-dev 2017-02-05 22:24:18 UTC
(In reply to Thomas Deutschmann from comment #18)
> do you want to keep 3.0 or 3.1 for some reasons?

Well, obviously, or I wouldn't bring it up.
Comment 20 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-08-06 14:09:28 UTC
Ping:

No update on the report since 02/17. 

Security Team Padawan
ChrisADR
Comment 21 Aaron Bauman (RETIRED) gentoo-dev 2017-08-09 01:49:15 UTC
(In reply to Jeroen Roovers from comment #19)
> (In reply to Thomas Deutschmann from comment #18)
> > do you want to keep 3.0 or 3.1 for some reasons?
> 
> Well, obviously, or I wouldn't bring it up.

Jer, are these still needed?
Comment 22 Jeroen Roovers (RETIRED) gentoo-dev 2017-08-10 06:57:51 UTC
(In reply to Aaron Bauman from comment #21)
> (In reply to Jeroen Roovers from comment #19)
> > (In reply to Thomas Deutschmann from comment #18)
> > > do you want to keep 3.0 or 3.1 for some reasons?
> > 
> > Well, obviously, or I wouldn't bring it up.
> 
> Jer, are these still needed?

That's not my name.

Yes. Do not that only the latest stable ebuild installs /usr/bin/unsquashfs. The other SLOTted ebuilds append their major.minor version to the filename.
Comment 23 Jeroen Roovers (RETIRED) gentoo-dev 2017-08-10 06:58:32 UTC
(In reply to Jeroen Roovers from comment #22)
> Yes. Do not
* note
Comment 24 Aaron Bauman (RETIRED) gentoo-dev 2017-08-11 00:50:36 UTC
(In reply to Jeroen Roovers from comment #22)
> (In reply to Aaron Bauman from comment #21)
> > (In reply to Jeroen Roovers from comment #19)
> > > (In reply to Thomas Deutschmann from comment #18)
> > > > do you want to keep 3.0 or 3.1 for some reasons?
> > > 
> > > Well, obviously, or I wouldn't bring it up.
> > 
> > Jer, are these still needed?
> 
> That's not my name.
> 
> Yes. Do not that only the latest stable ebuild installs /usr/bin/unsquashfs.
> The other SLOTted ebuilds append their major.minor version to the filename.

That is your nick though, right?  Not sure what your point is here.  Thanks for the information.
Comment 25 Jeroen Roovers (RETIRED) gentoo-dev 2017-11-20 09:21:22 UTC
(In reply to Aaron Bauman from comment #24)
> > > Jer, are these still needed?
> > That's not my name.
> That is your nick though, right?  Not sure what your point is here.

The point is that "jer" is my nick and not "Jer".
Comment 26 Aaron Bauman (RETIRED) gentoo-dev 2017-11-20 12:28:10 UTC
(In reply to Jeroen Roovers from comment #25)
> (In reply to Aaron Bauman from comment #24)
> > > > Jer, are these still needed?
> > > That's not my name.
> > That is your nick though, right?  Not sure what your point is here.
> 
> The point is that "jer" is my nick and not "Jer".

English capitalization rules. Maybe you can redefine the whole language to suite your desires?
Comment 27 Jeroen Roovers (RETIRED) gentoo-dev 2017-11-20 15:22:15 UTC
(In reply to Aaron Bauman from comment #26)
> English capitalization rules. Maybe you can redefine the whole language to
> suite your desires?

I am very case sensitive. Why does that need explaining? And then why don't you simply accept the explanation you were given instead of throwing your "suite" (or "suit") of capitalisation rules at me?
Comment 28 Yury German Gentoo Infrastructure gentoo-dev 2019-03-11 00:26:38 UTC
Can the following be dropped, or are they secure?
3.4 : 3.1 / 3.2_p2 : 3.0
Comment 29 Aaron Bauman (RETIRED) gentoo-dev 2019-03-11 02:40:12 UTC
tree is clean.
Comment 30 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-03-22 15:20:53 UTC
FYI:

commit ca69e5aeffc594a0c34edf2de59d75fc719ce8f2
Author:     Jeroen Roovers <jer@gentoo.org>
AuthorDate: Thu Mar 14 15:46:59 2019
Commit:     Jeroen Roovers <jer@gentoo.org>
CommitDate: Thu Mar 14 15:47:30 2019

    Revert "sys-fs/squashfs-tools: drop vulnerable wrt bug #552484"
    
    This reverts commit 9f732c236cf298e463539a60e94060d5903209f9.
    
    Signed-off-by: Jeroen Roovers <jer@gentoo.org>
Comment 31 Jeroen Roovers (RETIRED) gentoo-dev 2019-03-22 17:02:44 UTC
(In reply to Michał Górny from comment #30)
> FYI:

Looks like you have been misinformed.
Comment 32 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-03-22 17:12:37 UTC
Jeroen.  I would like to request an official explanation:

1. Why did you revert the removal made by Aaron?

2. What effort did you do in order to communicate this to Aaron and/or the Security team?

3. Why is there no information on this neither in the commit message, nor on this particular bug?
Comment 33 Jeroen Roovers (RETIRED) gentoo-dev 2019-03-22 17:12:50 UTC
See for instance these:

https://bugs.gentoo.org/285709
https://bugs.gentoo.org/395201

mksquashfs and unsquashfs in the lower SLOTs are suffixed with -${PV} and should therefore never be called directly, unless you go out of your way to call them. Since over time various people have expressed an interest in keeping the older versions around, it certainly isn't up to bman to decide when or where they should go.

Also, what is qa@ suddenly doing here? I would think security@ issues are no concern for qa@, and we can discuss this entirely without qa@ involvement.
Comment 34 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-03-22 17:15:47 UTC
QA is involved since you apparently knowingly introduced security issues.  Please answer my questions.
Comment 35 Andrew Savchenko gentoo-dev 2019-03-23 10:46:21 UTC
Security team, do we have any *proof* that slots 3.0 and 3.1 are vulnerable?
Comment 36 Pacho Ramos gentoo-dev 2019-03-23 12:20:46 UTC
if they are vulnerable, maybe one option could be to keep the old slots hardmasked :/
Comment 37 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2019-03-23 12:28:08 UTC
(In reply to Jeroen Roovers from comment #33)
[snip]

>Since over time various people have expressed an interest in
> keeping the older versions around, it certainly isn't up to bman to decide
> when or where they should go.

These slots either have to be removed or hardmasked, there is no other way.
Comment 38 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-03-24 16:06:20 UTC
Jeroen,

Given no satisfactory explanation, I'm going to reapply Aaron's commit with my QA hat on.

If you believe this should be reverted, please follow the proper procedure.  Include full explanation why you believe this should be reverted in the commit message, and especially clearly indicate whether those versions are affected by the vulnerability or not.  Furthermore, if they are affected, then you are responsible for either applying appropriate patches or keeping the ebuilds masked as to prevent users from installing them unknowingly.  And no, renaming executables does not change the fact that user can run them not expecting vulnerabilities.

FTR, Security team has full authority to remove vulnerable (or even potentially vulnerable) ebuilds in order to fulfill their task of keeping Gentoo secure.  While it is preferable to work with maintainer on this, if maintainer neglects his job for over 2 years, I don't see anything wrong with Security stepping up to do it, and doing it the way involving least work for them.

If the maintainer disagrees with the decision of Security team, it is *his* responsibility to provide proper justification and/or solve the issue another way.  However, the key point is that the issue needs to be solved (and if there is no issue, this needs to be documented), and not merely deferred forever.  In lack of any solid evidence either way, the safe way is to assume all versions that are not fixed are vulnerable.

If you disagree with that, feel free to appeal the action to Security team in general.  However, until the Security issues a decision, the (potentially) vulnerable ebuilds must remain removed or masked.  For completeness, I also point out that you are free to appeal Security team's decision further, up to the Council and then General Resolution.
Comment 39 Larry the Git Cow gentoo-dev 2019-03-24 16:06:38 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d4600db3d6bf1b83fe97517caec6c8f57d150db7

commit d4600db3d6bf1b83fe97517caec6c8f57d150db7
Author:     Aaron Bauman <bman@gentoo.org>
AuthorDate: 2019-03-11 02:38:08 +0000
Commit:     Michał Górny <mgorny@gentoo.org>
CommitDate: 2019-03-24 15:56:37 +0000

    sys-fs/squashfs-tools: [QA] drop vulnerable wrt bug #552484
    
    Signed-off-by: Aaron Bauman <bman@gentoo.org>
    Bug: https://bugs.gentoo.org/552484
    Signed-off-by: Michał Górny <mgorny@gentoo.org>

 sys-fs/squashfs-tools/Manifest                     |  2 --
 sys-fs/squashfs-tools/squashfs-tools-3.2_p2.ebuild | 39 ----------------------
 sys-fs/squashfs-tools/squashfs-tools-3.4.ebuild    | 39 ----------------------
 3 files changed, 80 deletions(-)
Comment 40 Andrew Savchenko gentoo-dev 2019-03-24 20:31:09 UTC
Hi!

(In reply to Michał Górny from comment #38)
> FTR, Security team has full authority to remove vulnerable (or even
> potentially vulnerable) ebuilds in order to fulfill their task of keeping
> Gentoo secure.

Could you please explain on what premises this statement is made. I found no GLEP giving such power to the Security project, neither an established security policy mandating such actions [1].

Furthermore most software is potentially vulnerable, but removing it without the evidence of a vulnerability present will result into havoc. Good examples are recent openssl-1.1.1 and kernel-5.0.x versions. Judging from prior history of such projects these versions likely contain vulnerabilities which will be announced later. Based on "even potentially vulnerable" logic they must be purged from the Gentoo tree immediately. But of course that would be absurd.

[1] https://wiki.gentoo.org/wiki/Project:Security
Comment 41 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-03-24 20:38:48 UTC
(In reply to Andrew Savchenko from comment #40)
> Hi!
> 
> (In reply to Michał Górny from comment #38)
> > FTR, Security team has full authority to remove vulnerable (or even
> > potentially vulnerable) ebuilds in order to fulfill their task of keeping
> > Gentoo secure.
> 
> Could you please explain on what premises this statement is made. I found no
> GLEP giving such power to the Security project, neither an established
> security policy mandating such actions [1].

It is made on premises of sanity.  If you prevent a project from doing its job, there's no point in having the project in the first place.  Last I checked, we're not some insane bureaucracy where you can't fart without written permission stamped by the Council.

> Furthermore most software is potentially vulnerable, but removing it without
> the evidence of a vulnerability present will result into havoc. Good
> examples are recent openssl-1.1.1 and kernel-5.0.x versions. Judging from
> prior history of such projects these versions likely contain vulnerabilities
> which will be announced later. Based on "even potentially vulnerable" logic
> they must be purged from the Gentoo tree immediately. But of course that
> would be absurd.

Yes, what you're saying is absurd.  However, that's not what I'm saying, so I would be appreciate if you didn't put words in my mouth to prove your point.

There is a fair difference between killing software because 'all software is buggy', and presuming that a vulnerability discovered in the current version of software may be present in older versions as well.  Otherwise, we'd end up doing such insane things as removing the newest version of software and telling people to downgrade because nobody convinced you that the old version has the same bug yet!