Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue,  5 Jul 2016 18:41:22 -0400 (EDT)
From: cve-assign@...re.org
To: gustavo.grieco@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Browsing and attaching images considered harmful in Linux

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> I would like to bring the attention of the oss-security list to the
> existence of many security issues in the gdk-pixbuf library and its
> dependencies causing a that attaching a corrupted image file in Linux
> has become a risky business. For instance, there is a read
> out-of-bounds in librsvg2 (a dependency of gdk-pixbuf used to render
> svg images), which can be easily triggered if you try to attach a svg
> in Firefox.

> librsvg2 (2.40.2-1 with debug symbols)

> 1. Download and unpack boom.tar.gz somewhere.
> 2. gdb --args /usr/lib/firefox/firefox
> 3. Execute "run" and try to attach (ctrl+o) the svg file inside boom
> directory in Firefox.
> 
> Result:
> 
> Program received signal SIGSEGV, Segmentation fault.

> 0x00007fffbb7a4c0d in rsvg_pattern_fix_fallback
> (pattern=pattern@...ry=0x7ffffffea110) at rsvg-paint-server.c:645

> It is interesting to note that rcx looks controllable:
> 
> (gdb) x/i $rip
> => 0x7fffbb7a4c0d <rsvg_pattern_fix_fallback+333>:        testb  $0x4,0xe4(%rcx)
> (gdb) info registers
> ...
> rcx            0xe5e5e5e5e5e5e5e5        -1880844493789993499
> ...
> 
> Fortunately, this issue is already solved in the last revision of
> librsvg2 (AFAIK, this issue has no CVE, so please MITRE assign one if
> suitable). Nevertheless, I reported such vulnerability to Mozilla more
> than a month ago hoping that they will disable the svg support in the
> open/attach widget. After some discussion, it was marked as WONTFIX.
> While i understand why, i still feel it can be productive to discuss
> this here.
> 
> (the same trick can be used to crash Chrome/Chromium, since the code
> to open/attach an image is almost the same, so this is not a Firefox
> specific issue)

Use CVE-2016-6163 for this specific "read out-of-bounds in librsvg2 (a
dependency of gdk-pixbuf used to render svg images)."

(We cannot assign CVE IDs for the more general topic of "many security
issues in the gdk-pixbuf library and its dependencies" without
additional information.)

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXfDX+AAoJEHb/MwWLVhi2UEAP/1iLYtrHAOrC5eEye9BjJJS3
8aZCZiBarS2FJIUWDs/W7H/8KkKNluhZJuKTQcWFcbMKzhNVNXoi2jLqD9p7O1NO
c4/SDM8eSPLzSPHpk6m1ZU2N9WO/qA4xI4JW8Aq6AkeCSQMjsSbSraU/xXwhRHj0
Ho4JCtlBi7YgDfzt1fOApf4lW9/0A0bVk877JdkOozXIq1nn5qHsiplqkHhw6QpN
1Yo32YH6QMHP5ZLMrhtUorZ9BaGbFIHrrowOD9TGS35sEjO9rXmo4H+auuHQRbup
kkPBiU8EoEy23+lxIN8twdRMpICDAAqSFr4ZmVjCywZ7I2cGAh0wzO4rwPA268aj
9esSjut6wxZmpejy1YvJgrgkj0SYWn5jH5Obc8QYZoEBlT3l5DtDYRjN4JUsWm9n
ben8vr+7d10F4ROkauebqop7TCexuAs50FTvrkhxDqHLeCI4yuXTRZCMBnaqf6eG
1pqj7h0E0Wf7Zhp53J5zMGCRgn0UhG3onEauT/Ge95FisuAkAZFwz5jQBJT3iFzD
bLraASJNVVS28xrgyLfXL/1TrIs2fkMYF0bo/RVGQlqz1vMm0VFgjU3vVgSVlgZ8
hLdH4FFDsj6Rx2v30CHRWkdt7ILB0aVSaIUUwt+VhmBagchg1bWCjoGw/YKNpvOx
Bcb0TMBIqWVr/5eNilJr
=iGCG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ