Date: Wed, 6 Jul 2016 09:20:59 +0200 From: Gustavo Grieco <gustavo.grieco@...il.com> Cc: oss-security@...ts.openwall.com Subject: Re: Browsing and attaching images considered harmful in Linux 2016-07-06 0:41 GMT+02:00 <cve-assign@...re.org>: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > >> I would like to bring the attention of the oss-security list to the >> existence of many security issues in the gdk-pixbuf library and its >> dependencies causing a that attaching a corrupted image file in Linux >> has become a risky business. For instance, there is a read >> out-of-bounds in librsvg2 (a dependency of gdk-pixbuf used to render >> svg images), which can be easily triggered if you try to attach a svg >> in Firefox. > >> librsvg2 (2.40.2-1 with debug symbols) > >> 1. Download and unpack boom.tar.gz somewhere. >> 2. gdb --args /usr/lib/firefox/firefox >> 3. Execute "run" and try to attach (ctrl+o) the svg file inside boom >> directory in Firefox. >> >> Result: >> >> Program received signal SIGSEGV, Segmentation fault. > >> 0x00007fffbb7a4c0d in rsvg_pattern_fix_fallback >> (pattern=pattern@...ry=0x7ffffffea110) at rsvg-paint-server.c:645 > >> It is interesting to note that rcx looks controllable: >> >> (gdb) x/i $rip >> => 0x7fffbb7a4c0d <rsvg_pattern_fix_fallback+333>: testb $0x4,0xe4(%rcx) >> (gdb) info registers >> ... >> rcx 0xe5e5e5e5e5e5e5e5 -1880844493789993499 >> ... >> >> Fortunately, this issue is already solved in the last revision of >> librsvg2 (AFAIK, this issue has no CVE, so please MITRE assign one if >> suitable). Nevertheless, I reported such vulnerability to Mozilla more >> than a month ago hoping that they will disable the svg support in the >> open/attach widget. After some discussion, it was marked as WONTFIX. >> While i understand why, i still feel it can be productive to discuss >> this here. >> >> (the same trick can be used to crash Chrome/Chromium, since the code >> to open/attach an image is almost the same, so this is not a Firefox >> specific issue) > > Use CVE-2016-6163 for this specific "read out-of-bounds in librsvg2 (a > dependency of gdk-pixbuf used to render svg images)." Thanks! > > (We cannot assign CVE IDs for the more general topic of "many security > issues in the gdk-pixbuf library and its dependencies" without > additional information.) I only hope to encourage package maintainers to keep gdk-pixbuf and its dependencies always in the last version. > > - -- > CVE Assignment Team > M/S M300, 202 Burlington Road, Bedford, MA 01730 USA > [ A PGP key is available for encrypted communications at > http://cve.mitre.org/cve/request_id.html ] > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBCAAGBQJXfDX+AAoJEHb/MwWLVhi2UEAP/1iLYtrHAOrC5eEye9BjJJS3 > 8aZCZiBarS2FJIUWDs/W7H/8KkKNluhZJuKTQcWFcbMKzhNVNXoi2jLqD9p7O1NO > c4/SDM8eSPLzSPHpk6m1ZU2N9WO/qA4xI4JW8Aq6AkeCSQMjsSbSraU/xXwhRHj0 > Ho4JCtlBi7YgDfzt1fOApf4lW9/0A0bVk877JdkOozXIq1nn5qHsiplqkHhw6QpN > 1Yo32YH6QMHP5ZLMrhtUorZ9BaGbFIHrrowOD9TGS35sEjO9rXmo4H+auuHQRbup > kkPBiU8EoEy23+lxIN8twdRMpICDAAqSFr4ZmVjCywZ7I2cGAh0wzO4rwPA268aj > 9esSjut6wxZmpejy1YvJgrgkj0SYWn5jH5Obc8QYZoEBlT3l5DtDYRjN4JUsWm9n > ben8vr+7d10F4ROkauebqop7TCexuAs50FTvrkhxDqHLeCI4yuXTRZCMBnaqf6eG > 1pqj7h0E0Wf7Zhp53J5zMGCRgn0UhG3onEauT/Ge95FisuAkAZFwz5jQBJT3iFzD > bLraASJNVVS28xrgyLfXL/1TrIs2fkMYF0bo/RVGQlqz1vMm0VFgjU3vVgSVlgZ8 > hLdH4FFDsj6Rx2v30CHRWkdt7ILB0aVSaIUUwt+VhmBagchg1bWCjoGw/YKNpvOx > Bcb0TMBIqWVr/5eNilJr > =iGCG > -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ