Bug#1032670: allegro4.4: CVE-2021-36489

2024-03-25 Thread Andreas Rönnquist
On Sun, 24 Mar 2024 21:46:40 +0100 Moritz Muehlenhoff 
wrote:
- 8< -
> 
> I never tried to reproduce these, but reproducability of a given PoC
> made against a current version not working with an older version
> doesn't mean the old version isn't affected. From a quick glance the
> equivalent of the checks added in 5 are also needed in 4.4, e.g.
> rle_tga_read8() lacks a check for w overstepping c.
> 
> Given that all these image files are typically read from a trusted
> location/source shipped by a given game it's not a big deal, but I'd
> suggest to keep the bug open until 4.4 has been fully phased out or
> the fixes backported.
> 

Yeah, I believe that upstream isn't interested either in 4.4, but focus
pretty much fully on 5.x now - and my interest is basically on 5.x.
Previously my interest in 4.4 was because of alex4, but since that
package has turned out to be non-free and moved there, my interest in
it has waned, and consequently, in allegro4.4 too.

I believe a big part of Tobias Hansens interest in Allegro 4 was due to
Aseprite, which have turned to a license that cannot be packaged in
Debian (but I don't want to claim that I 100% know Tobias reasoning).

If anyone really wants to have allegro 4.4 still in Debian, my
suggestion would be to step up and help out with the package (but since
I believe upstream has no interest in it, I don't know how doable it
is).

I am considering removing myself from the allegro 4.4 package, but
still keep working on the 5.x one. There I soon have a upload coming, I
am just waiting for [1] to get solved (Fixing multiarch stuff for cmake
package config).

Of course, removing 4.4 would mean removal of quite some small nice
little games, but sometimes you just have to endure the negative.

/Andreas Rönnquist
gus...@debian.org

1: https://github.com/liballeg/allegro5/pull/1543



Bug#1032670: allegro4.4: CVE-2021-36489

2024-03-24 Thread Moritz Muehlenhoff
On Thu, Mar 21, 2024 at 09:33:51PM +0100, Andreas Rönnquist wrote:
> On Fri, 10 Mar 2023 18:04:23 +0100 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?= 
>  wrote:
> > Source: allegro4.4
> > X-Debbugs-CC: t...@security.debian.org
> > Severity: important
> > Tags: security
> > 
> > Hi,
> > 
> > The following vulnerability was published for allegro4.4.
> > 
> > CVE-2021-36489[0]:
> > | Buffer Overflow vulnerability in Allegro through 5.2.6 allows
> > | attackers to cause a denial of service via crafted PCX/TGA/BMP files
> > | to allegro_image addon.
> > 
> > https://github.com/liballeg/allegro5/issues/1251
> > https://github.com/liballeg/allegro5/pull/1253
> > 
> > These fixes landed in Allegro 5.2.8.0:
> > https://github.com/liballeg/allegro5/commit/3f2dbd494241774d33aaf83910fd05b2a590604a
> >  (5.2.8.0)
> > https://github.com/liballeg/allegro5/commit/cca179bc16827f358153060cd10ac73d394e758c
> >  (5.2.8.0)
> > https://github.com/liballeg/allegro5/commit/a2c93939f6997a96ecac1865dbb4fa3f66b5e1b7
> >  (5.2.8.0)
> > https://github.com/liballeg/allegro5/commit/0294e28e6135292eab4b2916a7d2223b1bb6843e
> >  (5.2.8.0)
> > 
> > In allegro 4.4, code is in src/[pcx|tga].c instead
> > 
> 
> Hey
> 
> I just tried to reproduce this now on the version of Allegro 4.4 in
> Debian, and using the crash file as mentioned in
> https://github.com/liballeg/allegro5/issues/1251
> 
> I cannot reproduce the crash on 4.4.
> 
> Can you still reproduce the crash on allegro4.4 from the debian package?
> 
> For me when running './ex_bitmap crash' I get a dialog "Error reading
> bitmap file 'crash'", but no crash of the program

I never tried to reproduce these, but reproducability of a given PoC made 
against
a current version not working with an older version doesn't mean the old version
isn't affected. From a quick glance the equivalent of the checks added in 5 are
also needed in 4.4, e.g. rle_tga_read8() lacks a check for w overstepping c.

Given that all these image files are typically read from a trusted 
location/source
shipped by a given game it's not a big deal, but I'd suggest to keep the bug
open until 4.4 has been fully phased out or the fixes backported.

Cheers,
Moritz



Bug#1032670: allegro4.4: CVE-2021-36489

2024-03-21 Thread Andreas Rönnquist
On Fri, 10 Mar 2023 18:04:23 +0100 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?= 
 wrote:
> Source: allegro4.4
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for allegro4.4.
> 
> CVE-2021-36489[0]:
> | Buffer Overflow vulnerability in Allegro through 5.2.6 allows
> | attackers to cause a denial of service via crafted PCX/TGA/BMP files
> | to allegro_image addon.
> 
> https://github.com/liballeg/allegro5/issues/1251
> https://github.com/liballeg/allegro5/pull/1253
> 
> These fixes landed in Allegro 5.2.8.0:
> https://github.com/liballeg/allegro5/commit/3f2dbd494241774d33aaf83910fd05b2a590604a
>  (5.2.8.0)
> https://github.com/liballeg/allegro5/commit/cca179bc16827f358153060cd10ac73d394e758c
>  (5.2.8.0)
> https://github.com/liballeg/allegro5/commit/a2c93939f6997a96ecac1865dbb4fa3f66b5e1b7
>  (5.2.8.0)
> https://github.com/liballeg/allegro5/commit/0294e28e6135292eab4b2916a7d2223b1bb6843e
>  (5.2.8.0)
> 
> In allegro 4.4, code is in src/[pcx|tga].c instead
> 

Hey

I just tried to reproduce this now on the version of Allegro 4.4 in
Debian, and using the crash file as mentioned in
https://github.com/liballeg/allegro5/issues/1251

I cannot reproduce the crash on 4.4.

Can you still reproduce the crash on allegro4.4 from the debian package?

For me when running './ex_bitmap crash' I get a dialog "Error reading
bitmap file 'crash'", but no crash of the program

best
/Andreas
gus...@debian.org



Bug#1032670: allegro4.4: CVE-2021-36489

2023-03-10 Thread Moritz Mühlenhoff
Source: allegro4.4
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for allegro4.4.

CVE-2021-36489[0]:
| Buffer Overflow vulnerability in Allegro through 5.2.6 allows
| attackers to cause a denial of service via crafted PCX/TGA/BMP files
| to allegro_image addon.

https://github.com/liballeg/allegro5/issues/1251
https://github.com/liballeg/allegro5/pull/1253

These fixes landed in Allegro 5.2.8.0:
https://github.com/liballeg/allegro5/commit/3f2dbd494241774d33aaf83910fd05b2a590604a
 (5.2.8.0)
https://github.com/liballeg/allegro5/commit/cca179bc16827f358153060cd10ac73d394e758c
 (5.2.8.0)
https://github.com/liballeg/allegro5/commit/a2c93939f6997a96ecac1865dbb4fa3f66b5e1b7
 (5.2.8.0)
https://github.com/liballeg/allegro5/commit/0294e28e6135292eab4b2916a7d2223b1bb6843e
 (5.2.8.0)

In allegro 4.4, code is in src/[pcx|tga].c instead


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-36489
https://www.cve.org/CVERecord?id=CVE-2021-36489

Please adjust the affected versions in the BTS as needed.