Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 134839

Summary: <=media-gfx/zgv-5.8 - arbitrary command execution via suitably-constructed images
Product: Gentoo Security Reporter: Jakub Moc (RETIRED) <jakub>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: maintainer-needed
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B2 [glsaerrata] DerCorny
Package list:
Runtime testing required: ---

Description Jakub Moc (RETIRED) gentoo-dev 2006-05-29 15:46:34 UTC
http://www.svgalib.org/rus/zgv/

<snip>
WARNING: There is a known vulnerability in zgv 5.8 (and all previous versions) such that suitably-constructed images can be made to run arbitrary commands when viewed with zgv - not as root, but as the user running zgv. This still has the potential to cause serious trouble, so I strongly recommend that existing users upgrade to the current version.
</snip>

Can someone verify this, please?
Comment 1 Wolf Giesen (RETIRED) gentoo-dev 2006-05-29 21:46:39 UTC
Well, seems valid sure enough. Nothing in the Changelog suggests any off-the-trunk fixes, so IMHO we should get the machine rolling.

I'd change this to C2 [ebuild] / minor (but there's no maintainer), but, uhm, I can't.
Comment 2 Stefan Cornelius (RETIRED) gentoo-dev 2006-05-30 03:03:13 UTC
no herd, no maintainer.
Joy, gonna send a mail to -dev or something like that soon.
Comment 3 Wolf Giesen (RETIRED) gentoo-dev 2006-05-30 03:04:54 UTC
Also see #127008 as there seems to be a 5.9 patch there.
Comment 4 Stefan Cornelius (RETIRED) gentoo-dev 2006-05-30 05:57:52 UTC
bumped this to 5.9 with the patch frilled mentioned, altough the 5.8 version should be fine.
x86 please test (really test, since I commited this mess - and this was my first ebuild commit) and stable, thanks.
Comment 5 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-05-30 15:48:22 UTC
I think this bug may be the same than CVE-2006-1060 (GLSA-200604-10):

"Heap-based buffer overflow in zgv before 5.8 and xzgv before 0.8 might allow user-complicit attackers to execute arbitrary code via a JPEG image with more than 3 output components, such as a CMYK or YCCK color space, which causes less memory to be allocated than required."

Since:
- there is really no liable description of the vulnerability (and no other source)
- the Changelog for zgv 5.8 does not mention any security issue

Other viewpoint ?
Comment 6 Mark Loeser (RETIRED) gentoo-dev 2006-05-31 18:02:31 UTC
x86 done
Comment 7 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-06-07 14:30:22 UTC
Hi,

> I think this bug may be the same than CVE-2006-1060 (GLSA-200604-10):

any news on this ?
Comment 8 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-10 00:04:52 UTC
According to the changelog 5.9 was released on 2005-01-28. So unless the changelog is wrong this is probably not something new.

I'd say post maintainer mail to -core and punt the package if noone steps up as upstream appears a bit slow.
Comment 9 Stefan Cornelius (RETIRED) gentoo-dev 2006-06-10 00:34:23 UTC
I had no in depth look, but I assume that we were safe before (last GLSA, so I'm not entirely sure if we need a new GLSA for this at all).

At least, we should be safe now, since 5.9 was bumped with a patch included and is stabled.
Comment 10 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-10 05:54:33 UTC
Taviso any comments on this one?

It seems questionable wether this really fixes any security issues, therefor I tend to vote for NO GLSA.
Comment 11 Tim Yamin (RETIRED) gentoo-dev 2006-06-10 08:11:30 UTC
(In reply to comment #7)
> Hi,
> 
> > I think this bug may be the same than CVE-2006-1060 (GLSA-200604-10):

Yes, this is the same. However, 200604-10 is wrong. It has >= 5.8 as unaffected while in reality the issue is fixed in 5.9+thisPatch (we never got a 5.8-r1 into the tree). So we need a new GLSA or an errata.
Comment 12 Tim Yamin (RETIRED) gentoo-dev 2006-06-10 08:18:17 UTC
(In reply to comment #0)
> <snip>
> WARNING: There is a known vulnerability in zgv 5.8 (and all previous versions)
> such that suitably-constructed images can be made to run arbitrary commands
> when viewed with zgv - not as root, but as the user running zgv. This still has
> the potential to cause serious trouble, so I strongly recommend that existing
> users upgrade to the current version.
> </snip>
> 
> Can someone verify this, please?

This actually refers to bug #69150 which we fixed a looooong time ago... but the problem with the jpeg mess remains; thanks for uh, getting one of us to notice it :)
Comment 13 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-10 08:36:58 UTC
Thx Tim for clearing this up.

I'll issue an errata (and someone ought to find a maintainer for this one).
Comment 14 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-11 12:33:28 UTC
Errata issued to GLSA 200604-10. Hopefully this mess is solved. Thx everyone.