[Touch-packages] [Bug 1810241] Re: NULL dereference when decompressing specially crafted archives

2022-09-26 Thread Jeffrey Hawkins
Update to my comment, issue is applicable to versions prior to 1.32 of
TAR.  Be that as it may, Jammy is not affected.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tar in Ubuntu.
https://bugs.launchpad.net/bugs/1810241

Title:
  NULL dereference when decompressing specially crafted archives

Status in tar package in Ubuntu:
  Triaged

Bug description:
  Hi,

  Fuzzing tar with checksums disabled reveals a NULL pointer dereference
  when parsing certain archives that have malformed extended headers.
  This affects tar from (at least) Trusty, Bionic and Cosmic. I haven't
  tested Xenial's version.

  A test case with fixed checksums is attached. To avoid breaking
  anything that looks inside tar archives, I have converted it to text
  with xxd. To reproduce:

  $ xxd -r gnutar-crash.tar.txt gnutar-crash.tar
  $ tar Oxf gnutar-crash.tar 
  tar: Ignoring unknown extended header keyword 'GNU.sparse.minTr'
  tar: Malformed extended header: missing length
  Segmentation fault (core dumped)

  I have also attached a patch against the latest upstream git and
  against 1.30 (in Cosmic). This fixes the issue by detecting the null
  result before it is dereferenced.

  Regards,
  Daniel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1810241] Re: NULL dereference when decompressing specially crafted archives

2022-09-26 Thread Jeffrey Hawkins
This issue is shown as Open on Jammy.  The CVE is applicable to 1.32 and
prior versions of TAR.  Jammy uses 1.34, so this status should be not
affected or closed.  This was fixed in Focal in
1.30+dfsg-7ubuntu0.20.04.1.  Please update the CVE status on Jammy.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tar in Ubuntu.
https://bugs.launchpad.net/bugs/1810241

Title:
  NULL dereference when decompressing specially crafted archives

Status in tar package in Ubuntu:
  Triaged

Bug description:
  Hi,

  Fuzzing tar with checksums disabled reveals a NULL pointer dereference
  when parsing certain archives that have malformed extended headers.
  This affects tar from (at least) Trusty, Bionic and Cosmic. I haven't
  tested Xenial's version.

  A test case with fixed checksums is attached. To avoid breaking
  anything that looks inside tar archives, I have converted it to text
  with xxd. To reproduce:

  $ xxd -r gnutar-crash.tar.txt gnutar-crash.tar
  $ tar Oxf gnutar-crash.tar 
  tar: Ignoring unknown extended header keyword 'GNU.sparse.minTr'
  tar: Malformed extended header: missing length
  Segmentation fault (core dumped)

  I have also attached a patch against the latest upstream git and
  against 1.30 (in Cosmic). This fixes the issue by detecting the null
  result before it is dereferenced.

  Regards,
  Daniel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

2022-09-23 Thread Jeffrey Hawkins
typo in my comment, recommendation is to build tiff with libjbig
disabled... sorry..

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001

Title:
  Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

Status in tiff package in Ubuntu:
  In Progress

Bug description:
  The versions in Trusty, Xenial, Bionic, Focal and Jammy may be
  vulnerable to all CVEs below.

  Debian released an advisory on March 24.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

2022-09-23 Thread Jeffrey Hawkins
Can Ubuntu address CVE-2022-1210 similar to other Linux Distros (RHEL,
SUSE, YOCTO,...) with not building tiff with JBIG disabled since the bug
is really in libjbig (build with --disable-jbig) .   See Fedora Bug
Tracker https://bugzilla.redhat.com/show_bug.cgi?id=2072615

** Bug watch added: Red Hat Bugzilla #2072615
   https://bugzilla.redhat.com/show_bug.cgi?id=2072615

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001

Title:
  Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

Status in tiff package in Ubuntu:
  In Progress

Bug description:
  The versions in Trusty, Xenial, Bionic, Focal and Jammy may be
  vulnerable to all CVEs below.

  Debian released an advisory on March 24.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1925348] Re: stack-overflow on GNU libiberty/rust-demangle.c:664 demangle_path

2022-07-26 Thread Jeffrey Hawkins
What is the status of this CVE with Ubuntu Jammy?  This was fixed in the
upstream in January/February 2022,
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99935#c11

** Bug watch added: GCC Bugzilla #99935
   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99935

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1925348

Title:
  stack-overflow on GNU libiberty/rust-demangle.c:664 demangle_path

Status in binutils package in Ubuntu:
  Confirmed

Bug description:
  stack-overflowon GNU libiberty/rust-demangle.c:664 demangle_path when
  we run ./cxxfilt ./crashs/poc

  ./crash/poc:�@}@�^_RB_RB999IRB�RBRB

  ==34504==ERROR: AddressSanitizer: stack-overflow on address 0x7ffee6038f48 
(pc 0x006a3331 bp 0x7ffee6039060 sp 0x7ffee6038f20 T0)
  #0 0x6a3330 in demangle_path rust-demangle.c:664
  #1 0x6a3bd1 in demangle_path rust-demangle.c:774
  #2 0x6a3bd1 in demangle_path rust-demangle.c:774
  #3 0x6a3bd1 in demangle_path rust-demangle.c:774
  #4 0x6a3bd1 in demangle_path rust-demangle.c:774
  #5 0x6a3bd1 in demangle_path rust-demangle.c:774
  #6 0x6a3bd1 in demangle_path rust-demangle.c:774
  #7 0x6a3bd1 in demangle_path rust-demangle.c:774
  #8 0x6a3bd1 in demangle_path rust-demangle.c:774
  #9 0x6a3bd1 in demangle_path rust-demangle.c:774
  #10 0x6a3bd1 in demangle_path rust-demangle.c:774
  #11 0x6a3bd1 in demangle_path rust-demangle.c:774
  #12 0x6a3bd1 in demangle_path rust-demangle.c:774
  #13 0x6a3bd1 in demangle_path rust-demangle.c:774
  #14 0x6a3bd1 in demangle_path rust-demangle.c:774
  #15 0x6a3bd1 in demangle_path rust-demangle.c:774
  #16 0x6a3bd1 in demangle_path rust-demangle.c:774
  #17 0x6a3bd1 in demangle_path rust-demangle.c:774
  #18 0x6a3bd1 in demangle_path rust-demangle.c:774
  #19 0x6a3bd1 in demangle_path rust-demangle.c:774
  #20 0x6a3bd1 in demangle_path rust-demangle.c:774
  #21 0x6a3bd1 in demangle_path rust-demangle.c:774
  #22 0x6a3bd1 in demangle_path rust-demangle.c:774
  #23 0x6a3bd1 in demangle_path rust-demangle.c:774
  #24 0x6a3bd1 in demangle_path rust-demangle.c:774
  #25 0x6a3bd1 in demangle_path rust-demangle.c:774
  #26 0x6a3bd1 in demangle_path rust-demangle.c:774
  #27 0x6a3bd1 in demangle_path rust-demangle.c:774
  #28 0x6a3bd1 in demangle_path rust-demangle.c:774
  #29 0x6a3bd1 in demangle_path rust-demangle.c:774
  #30 0x6a3bd1 in demangle_path rust-demangle.c:774
  #31 0x6a3bd1 in demangle_path rust-demangle.c:774
  #32 0x6a3bd1 in demangle_path rust-demangle.c:774
  #33 0x6a3bd1 in demangle_path rust-demangle.c:774
  #34 0x6a3bd1 in demangle_path rust-demangle.c:774
  #35 0x6a3bd1 in demangle_path rust-demangle.c:774
  #36 0x6a3bd1 in demangle_path rust-demangle.c:774
  #37 0x6a3bd1 in demangle_path rust-demangle.c:774
  #38 0x6a3bd1 in demangle_path rust-demangle.c:774
  #39 0x6a3bd1 in demangle_path rust-demangle.c:774
  #40 0x6a3bd1 in demangle_path rust-demangle.c:774
  #41 0x6a3bd1 in demangle_path rust-demangle.c:774
  #42 0x6a3bd1 in demangle_path rust-demangle.c:774
  #43 0x6a3bd1 in demangle_path rust-demangle.c:774
  #44 0x6a3bd1 in demangle_path rust-demangle.c:774
  #45 0x6a3bd1 in demangle_path rust-demangle.c:774
  #46 0x6a3bd1 in demangle_path rust-demangle.c:774
  #47 0x6a3bd1 in demangle_path rust-demangle.c:774
  #48 0x6a3bd1 in demangle_path rust-demangle.c:774
  #49 0x6a3bd1 in demangle_path rust-demangle.c:774
  #50 0x6a3bd1 in demangle_path rust-demangle.c:774
  #51 0x6a3bd1 in demangle_path rust-demangle.c:774
  #52 0x6a3bd1 in demangle_path rust-demangle.c:774
  #53 0x6a3bd1 in demangle_path rust-demangle.c:774
  #54 0x6a3bd1 in demangle_path rust-demangle.c:774
  #55 0x6a3bd1 in demangle_path rust-demangle.c:774
  #56 0x6a3bd1 in demangle_path rust-demangle.c:774
  #57 0x6a3bd1 in demangle_path rust-demangle.c:774
  #58 0x6a3bd1 in demangle_path rust-demangle.c:774
  #59 0x6a3bd1 in demangle_path rust-demangle.c:774
  #60 0x6a3bd1 in demangle_path rust-demangle.c:774
  #61 0x6a3bd1 in demangle_path rust-demangle.c:774
  #62 0x6a3bd1 in demangle_path rust-demangle.c:774
  #63 0x6a3bd1 in demangle_path rust-demangle.c:774
  #64 0x6a3bd1 in demangle_path rust-demangle.c:774
  #65 0x6a3bd1 in demangle_path rust-demangle.c:774
  #66 0x6a3bd1 in demangle_path rust-demangle.c:774
  #67 0x6a3bd1 in demangle_path rust-demangle.c:774
  #68 0x6a3bd1 in demangle_path rust-demangle.c:774
  #69 0x6a3bd1 in demangle_path rust-demangle.c:774
  #70 0x6a3bd1 in demangle_path rust-demangle.c:774
  #71 0x6a3bd1 in demangle_path rust-demangle.c:774
  #72 0x6a3bd1 in demangle_path rust-demangle.c:774
  #73 0x6a3bd1 in demangle_path