|
|
Message-ID: <20200206140418.GA26959@openwall.com>
Date: Thu, 6 Feb 2020 15:04:18 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: Amadeusz Slawinski <amade@...blr.net>
Subject: GNU screen "out of bounds access when setting w_xtermosc after OSC 49"
Hi,
GNU screen 4.8.0 was released yesterday with a documented security fix
in it:
https://lists.gnu.org/archive/html/screen-devel/2020-02/msg00007.html
---
From: Amadeusz Slawinski
Subject: [screen-devel] GNU Screen v.4.8.0
Date: Wed, 5 Feb 2020 21:45:35 +0100
Hello everyone,
I'm announcing availability of GNU Screen v.4.8.0
Screen is a full-screen window manager that multiplexes a physical
terminal between several processes, typically interactive shells.
This release
* Improves startup time by only polling for already open files to
close
* Fixes:
- Fix for segfault if termcap doesn't have Km entry
- Make screen exit code be 0 when checking --version
- Fix potential memory corruption when using OSC 49
As last fix, fixes potential memory overwrite of quite big size (~768
bytes), and even though I'm not sure about potential exploitability of
that issue, I highly recommend everyone to upgrade as soon as possible.
This issue is present at least since v.4.2.0 (haven't checked earlier).
Thanks to pippin who brought this to my attention.
For full list of changes see
https://git.savannah.gnu.org/cgit/screen.git/log/?h=v.4.8.0
For more information about GNU screen visit:
https://savannah.gnu.org/projects/screen/
Release is available for download at:
https://ftp.gnu.org/gnu/screen/
or your closest mirror (may have some delay)
https://ftpmirror.gnu.org/screen/
Please report any bugs or regressions.
Cheers!
Amadeusz on behalf of GNU Screen Team
---
The fix commit is:
---
commit 68386dfb1fa33471372a8cd2e74686758a2f527b
Author: Amadeusz Slawinski <amade@...blr.net>
Date: Thu Jan 30 17:56:27 2020 +0100
Fix out of bounds access when setting w_xtermosc after OSC 49
echo -e "\e]49\e; \n\ec"
crashes screen.
This happens because 49 is divided by 10 and used as table index
resulting in access to w_xtermosc[4], which is out of bounds with table
itself being size 4. Increase size of table by 1 to 5, which is enough
for all current uses.
As this overwrites memory based on user input it is potential security
issue.
Reported-by: pippin@...p.org
Signed-off-by: Amadeusz Slawinski <amade@...blr.net>
---
This is followed by another related commit:
---
commit 0dd53533e20d2948351a99ec5336fbc9b82b226a
Author: Amadeusz Slawinski <amade@...blr.net>
Date: Wed Feb 5 21:05:28 2020 +0100
Increase permitted length of OSC
hyperlink feature used by some terminals requires lots of characters
https://gist.github.com/egmontkob/eb114294efbcd5adb1944c9f3cb5feda#length-limits
mentions around 2083 characters, set it to a bit more.
Bug: 57718
Signed-off-by: Amadeusz Slawinski <amade@...blr.net>
---
Combined, these two commits change:
char w_xtermosc[4][MAXSTR]; /* special xterm/rxvt escapes */
(where MAXSTR is 768) to:
char w_xtermosc[5][2560]; /* special xterm/rxvt escapes */
These are as seen on the screen-v4 branch. On that branch, and thus in
all screen releases so far, the bug appears to be exposed only when
building with the "--enable-rxvt_osc" option. Builds and packages made
without that option appear to be safe. Amadeusz, can you confirm this?
On master branch, the functionality is always enabled (and the option is
dropped), thus (not too ancient) builds from that branch are vulnerable
(until the above fixes, which were also made to that branch).
Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.