Summary: | [auditing] dev-util/desktop-file-utils: desktop-file-validate: heap-based buffer overflow in validate.c | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Auditing | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | k_f, zx2c4 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=586576 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 586576 | ||
Bug Blocks: | |||
Attachments: | ASan output |
Could you tell me situations in which this might be used to manage untrusted files? (In reply to Jason A. Donenfeld from comment #1) > Could you tell me situations in which this might be used to manage untrusted > files? Well, strictly speaking .desktop files can come from many sources, including the Gentoo tree or third party overlays. I do not expect such files to be security relevant so I don't always fully audit it myself (mea culpa). So if it can be exploitable there could be some attack vectors applicable from such a file in general. (In reply to Jason A. Donenfeld from comment #1) > Could you tell me situations in which this might be used to manage untrusted > files? is Kristian's response enough? No. Could you please tell me a vector that makes this a security vulnerability? this can be public now, (In reply to Agostino Sarubbo from comment #5) > this can be public now, OK |
Created attachment 425652 [details] ASan output I discovered that a crafted .desktop file is able to cause an heap-based buffer overflow I'm waiting for a feedback.