Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 846395 (CVE-2022-22784, CVE-2022-22785, CVE-2022-22787) - <net-im/zoom-5.10.4.2845: multiple vulnerabilities
Summary: <net-im/zoom-5.10.4.2845: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2022-22784, CVE-2022-22785, CVE-2022-22787
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://explore.zoom.us/en/trust/secu...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-19 05:57 UTC by John Helmert III
Modified: 2022-06-26 06:15 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-19 05:57:34 UTC
CVE-2022-22784:

The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly parse XML stanzas in XMPP messages. This can allow a malicious user to break out of the current XMPP message context and create a new message context to have the receiving users client perform a variety of actions.This issue could be used in a more sophisticated attack to forge XMPP messages from the server.

CVE-2022-22785:

The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.

CVE-2022-22787:

The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.10.0 fails to properly validate the hostname during a server switch request. This issue could be used in a more sophisticated attack to trick an unsuspecting users client to connect to a malicious server when attempting to use Zoom services.

So, we seem to need to unmask 5.10 but not sure if that's really feasible yet.
Comment 1 Ulrich Müller gentoo-dev 2022-05-19 06:33:50 UTC
*shrug* The advantage of 5.9 is that it's actually usable, because it doesn't crash with newest glibc.

So I fear no action here (short of last-rites) until upstream fixes bug 835930.
Comment 2 Ulrich Müller gentoo-dev 2022-05-25 08:35:55 UTC
Allegedly, the clone3 problem is fixed in zoom-5.10.6.3192, so I've unmasked that version.

I'll remove zoom-5.9.6.2225-r2 in two weeks from now, unless we'll see further reports that 5.10 crashes.
Comment 3 Sebastian Pipping gentoo-dev 2022-05-25 13:03:36 UTC
- Should we mask 5.9.6.2225-r2 as well while we still have it around?

- FYI unless it's a typo
  https://bugs.chromium.org/p/project-zero/issues/detail?id=2254#c4
  says that up to <5.10.4 is affected, not <5.10.0.
Comment 4 Ulrich Müller gentoo-dev 2022-05-25 13:32:57 UTC
(In reply to Sebastian Pipping from comment #3)
> - Should we mask 5.9.6.2225-r2 as well while we still have it around?

I'd rather not. There was a lot of confusion around the package lately, with masking and unmasking >=5.10 twice, and removing and later restoring 5.9.6.
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-28 04:49:10 UTC
(In reply to Sebastian Pipping from comment #3)
> - Should we mask 5.9.6.2225-r2 as well while we still have it around?
> 
> - FYI unless it's a typo
>   https://bugs.chromium.org/p/project-zero/issues/detail?id=2254#c4
>   says that up to <5.10.4 is affected, not <5.10.0.

Thanks!
Comment 6 Larry the Git Cow gentoo-dev 2022-06-07 06:49:23 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1eec0ff3721f5c97addadb79b36a34b1d8c5806c

commit 1eec0ff3721f5c97addadb79b36a34b1d8c5806c
Author:     Ulrich Müller <ulm@gentoo.org>
AuthorDate: 2022-06-07 06:48:02 +0000
Commit:     Ulrich Müller <ulm@gentoo.org>
CommitDate: 2022-06-07 06:49:05 +0000

    net-im/zoom: drop 5.9.6.2225-r2
    
    Bug: https://bugs.gentoo.org/846395
    Signed-off-by: Ulrich Müller <ulm@gentoo.org>

 net-im/zoom/Manifest                  |   1 -
 net-im/zoom/zoom-5.9.6.2225-r2.ebuild | 171 ----------------------------------
 2 files changed, 172 deletions(-)
Comment 7 Ulrich Müller gentoo-dev 2022-06-22 18:48:39 UTC
Can this bug be closed?
Comment 8 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-06-26 06:15:05 UTC
(In reply to Ulrich Müller from comment #7)
> Can this bug be closed?

Now that there aren't any vulnerable versions left in tree, yes! Sorry I didn't handle sooner, not sure how I missed the cleanup.