Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 6 Jul 2016 09:20:59 +0200
From: Gustavo Grieco <>
Subject: Re: Browsing and attaching images considered harmful in Linux

2016-07-06 0:41 GMT+02:00  <>:
> Hash: SHA256
>> I would like to bring the attention of the oss-security list to the
>> existence of many security issues in the gdk-pixbuf library and its
>> dependencies causing a that attaching a corrupted image file in Linux
>> has become a risky business. For instance, there is a read
>> out-of-bounds in librsvg2 (a dependency of gdk-pixbuf used to render
>> svg images), which can be easily triggered if you try to attach a svg
>> in Firefox.
>> librsvg2 (2.40.2-1 with debug symbols)
>> 1. Download and unpack boom.tar.gz somewhere.
>> 2. gdb --args /usr/lib/firefox/firefox
>> 3. Execute "run" and try to attach (ctrl+o) the svg file inside boom
>> directory in Firefox.
>> Result:
>> Program received signal SIGSEGV, Segmentation fault.
>> 0x00007fffbb7a4c0d in rsvg_pattern_fix_fallback
>> (pattern=pattern@...ry=0x7ffffffea110) at rsvg-paint-server.c:645
>> It is interesting to note that rcx looks controllable:
>> (gdb) x/i $rip
>> => 0x7fffbb7a4c0d <rsvg_pattern_fix_fallback+333>:        testb  $0x4,0xe4(%rcx)
>> (gdb) info registers
>> ...
>> rcx            0xe5e5e5e5e5e5e5e5        -1880844493789993499
>> ...
>> Fortunately, this issue is already solved in the last revision of
>> librsvg2 (AFAIK, this issue has no CVE, so please MITRE assign one if
>> suitable). Nevertheless, I reported such vulnerability to Mozilla more
>> than a month ago hoping that they will disable the svg support in the
>> open/attach widget. After some discussion, it was marked as WONTFIX.
>> While i understand why, i still feel it can be productive to discuss
>> this here.
>> (the same trick can be used to crash Chrome/Chromium, since the code
>> to open/attach an image is almost the same, so this is not a Firefox
>> specific issue)
> Use CVE-2016-6163 for this specific "read out-of-bounds in librsvg2 (a
> dependency of gdk-pixbuf used to render svg images)."


> (We cannot assign CVE IDs for the more general topic of "many security
> issues in the gdk-pixbuf library and its dependencies" without
> additional information.)

I only hope to encourage package maintainers to keep gdk-pixbuf and
its dependencies always in the last version.

> - --
> CVE Assignment Team
> M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
> [ A PGP key is available for encrypted communications at
> ]
> Version: GnuPG v1
> c4/SDM8eSPLzSPHpk6m1ZU2N9WO/qA4xI4JW8Aq6AkeCSQMjsSbSraU/xXwhRHj0
> Ho4JCtlBi7YgDfzt1fOApf4lW9/0A0bVk877JdkOozXIq1nn5qHsiplqkHhw6QpN
> 1Yo32YH6QMHP5ZLMrhtUorZ9BaGbFIHrrowOD9TGS35sEjO9rXmo4H+auuHQRbup
> kkPBiU8EoEy23+lxIN8twdRMpICDAAqSFr4ZmVjCywZ7I2cGAh0wzO4rwPA268aj
> 9esSjut6wxZmpejy1YvJgrgkj0SYWn5jH5Obc8QYZoEBlT3l5DtDYRjN4JUsWm9n
> ben8vr+7d10F4ROkauebqop7TCexuAs50FTvrkhxDqHLeCI4yuXTRZCMBnaqf6eG
> 1pqj7h0E0Wf7Zhp53J5zMGCRgn0UhG3onEauT/Ge95FisuAkAZFwz5jQBJT3iFzD
> bLraASJNVVS28xrgyLfXL/1TrIs2fkMYF0bo/RVGQlqz1vMm0VFgjU3vVgSVlgZ8
> hLdH4FFDsj6Rx2v30CHRWkdt7ILB0aVSaIUUwt+VhmBagchg1bWCjoGw/YKNpvOx
> Bcb0TMBIqWVr/5eNilJr
> =iGCG

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ