| Summary: | advancecomp new security issue CVE-2019-9210 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | RPM Packages | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | dan, davidwhodgins, marja11, sysadmin-bugs, tarazed25 |
| Version: | 6 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | has_procedure MGA6-64-OK | ||
| Source RPM: | advancecomp-2.1-2.mga7.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2019-03-19 22:26:37 CET
Assigning to our registered advancecomp maintainer. Assignee:
bugsquad =>
dan Fixed in Cauldron in advancecomp-2.1-4 Fixed in mga6 in advancecomp-1.20-3.3.mga6 Here is a simple regression test (this doesn't check for the bug fix but just ensures the code still works with the patch): cp /usr/lib/libDrakX/icons/tradi.png /tmp && advpng -z /tmp/tradi.png && advpng -l /tmp/tradi.png && echo Looks ok There should be no error messages and the last displayed line should be "Looks ok". Advisory: ======================== advancecomp has been updated to fix a security issue that could be triggered when pressented with a malformed PNG file. advancecomp contained an integer overflow upon encountering an invalid PNG size, which could result in a buffer overflow (CVE-2019-9210), as well as a heap-based buffer over-read. Updated packages: ======================== advancecomp-1.20-3.3.mga6.i586.rpm advancecomp-1.20-3.3.mga6.x86_64.rpm QA Contact:
(none) =>
security
Dan Fandrich
2019-03-23 14:19:05 CET
CC:
(none) =>
dan mga6, x86_64
$ cp /usr/lib/libDrakX/icons/tradi.png /tmp && advpng -z /tmp/tradi.png && advpng -l /tmp/tradi.png && echo
33212 21115 63% /tmp/tradi.png
33212 21115 63%
IHDR 13 width:264 height:198 depth:8 color_type:2 compression:0 filter:0 interlace:0
IDAT 21058
IEND 0
After update:
$ cp /usr/lib/libDrakX/icons/tradi.png /tmp && advpng -z /tmp/tradi.png && advpng -l /tmp/tradi.png && echo Looks ok
cp: overwrite '/tmp/tradi.png'? y
33212 21115 63% /tmp/tradi.png
33212 21115 63%
IHDR 13 width:264 height:198 depth:8 color_type:2 compression:0 filter:0 interlace:0
IDAT 21058
IEND 0
Looks ok
It still looks like a screendump - "Mandrake", lots of green OKs.
Thanks Dan for providing that neat test.
Official site: http://www.advancemame.it/
Utilities are advzip, advpng, advmng, advdef.
Use -h for options.
Tried this from /tmp:
$ advzip -x tradi.png
Failed read end of central directory
Probably some misunderstanding on my part.
No regression according to your test so this gets a 64-bit OK.Whiteboard:
has_procedure =>
has_procedure
Len Lawrence
2019-03-28 10:47:36 CET
Whiteboard:
has_procedure =>
has_procedure MGA6-64-OK
Len Lawrence
2019-04-01 00:47:12 CEST
Keywords:
(none) =>
validated_update
Dave Hodgins
2019-04-04 15:45:05 CEST
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0128.html Resolution:
(none) =>
FIXED |