Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 679392 (CVE-2019-9211) - <sci-mathematics/pspp-1.2.0-r1: reachable assertion abort in function write_long_string_missing_values() in data/sys-file-writer.c lead to denial of service
Summary: <sci-mathematics/pspp-1.2.0-r1: reachable assertion abort in function write_l...
Status: RESOLVED FIXED
Alias: CVE-2019-9211
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-03-04 08:22 UTC by Agostino Sarubbo
Modified: 2021-01-26 00:49 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2019-03-04 08:22:31 UTC
From ${URL} :

There is a reachable assertion abort in the function write_long_string_missing_values() in data/sys-file-writer.c in libdata.a in GNU PSPP 
1.2.0 that will lead to denial of service.

Reference:
https://bugzilla.redhat.com/show_bug.cgi?id=1683499



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-15 22:21:30 UTC
Patch:
https://git.savannah.gnu.org/cgit/pspp.git/commit/?id=0b842a84353790534a401e09a8d3bdd3d25bc3a6

@Maintainer(s), please let us know if you can apply this patch, or create a new ebuild.
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-16 02:01:22 UTC
We've got another one patched in 2.3.0.

2) CVE-2018-20230
Description:
"An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact."

@Maintainers: please advise if it's possible make a new ebuild to 2.3.0.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2020-07-20 21:45:36 UTC
(In reply to Sam James from comment #2)
> We've got another one patched in 2.3.0.
> 
> 2) CVE-2018-20230
> Description:
> "An issue was discovered in PSPP 1.2.0. There is a heap-based buffer
> overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c,
> which allows attackers to cause a denial of service (application crash) or
> possibly have unspecified other impact."


Patch: https://git.savannah.gnu.org/cgit/pspp.git/commit/?id=abd1f816ca3b4f382bddf4564ad092aa934f0ccc
Comment 4 Larry the Git Cow gentoo-dev 2020-10-04 16:39:00 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2e42197fcabcd1372267affa74297e1e9c19c092

commit 2e42197fcabcd1372267affa74297e1e9c19c092
Author:     John Helmert III <jchelmert3@posteo.net>
AuthorDate: 2020-10-04 16:38:32 +0000
Commit:     David Seifert <soap@gentoo.org>
CommitDate: 2020-10-04 16:38:32 +0000

    sci-mathematics/pspp: Add security patches
    
    This fixes several QA issues, adds a missing dependency, fixes
    compiling with GCC 10, fixes tests, and adds patches for security.
    
    Bug: https://bugs.gentoo.org/679392
    Closes: https://bugs.gentoo.org/674362
    Closes: https://bugs.gentoo.org/677282
    Closes: https://bugs.gentoo.org/682342
    Closes: https://bugs.gentoo.org/708548
    Package-Manager: Portage-3.0.0, Repoman-2.3.23
    Signed-off-by: John Helmert III <jchelmert3@posteo.net>
    Closes: https://github.com/gentoo/gentoo/pull/16785
    Signed-off-by: David Seifert <soap@gentoo.org>

 .../pspp/files/pspp-1.2.0-CVE-2018-20230.patch     | 134 +++++++++++++++++++++
 .../pspp/files/pspp-1.2.0-CVE-2019-9211.patch      |  74 ++++++++++++
 .../pspp/files/pspp-1.2.0-fix-gcc10.patch          |  30 +++++
 .../pspp/files/pspp-1.2.0-fix-overflow.patch       |  32 +++++
 .../pspp/files/pspp-1.2.0-fix-segfaults.patch      |  45 +++++++
 .../pspp/files/pspp-1.2.0-fix-tests.patch          |  61 ++++++++++
 sci-mathematics/pspp/files/pspp-1.2.0-py3.patch    |  38 ++++++
 sci-mathematics/pspp/pspp-1.2.0-r1.ebuild          | 112 +++++++++++++++++
 8 files changed, 526 insertions(+)
Comment 5 Thomas Deutschmann (RETIRED) gentoo-dev 2020-10-18 15:12:24 UTC
x86 stable
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-11-01 15:50:03 UTC
amd64 done

all arches done
Comment 7 NATTkA bot gentoo-dev 2020-11-01 23:13:13 UTC
Resetting sanity check; package list is empty or all packages are done.
Comment 8 Larry the Git Cow gentoo-dev 2020-11-26 19:41:35 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=65b93994396ad5d40389327728e3457b24c29d61

commit 65b93994396ad5d40389327728e3457b24c29d61
Author:     John Helmert III <jchelmert3@posteo.net>
AuthorDate: 2020-11-26 19:19:45 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-11-26 19:41:31 +0000

    sci-mathematics/pspp: security cleanup (<1.2.0-r1)
    
    Bug: https://bugs.gentoo.org/679392
    Package-Manager: Portage-3.0.10, Repoman-3.0.2
    Signed-off-by: John Helmert III <jchelmert3@posteo.net>
    Closes: https://github.com/gentoo/gentoo/pull/18416
    Signed-off-by: Sam James <sam@gentoo.org>

 sci-mathematics/pspp/pspp-1.2.0.ebuild | 79 ----------------------------------
 1 file changed, 79 deletions(-)