Bug 13391 - directfb new security issues CVE-2014-2977 and CVE-2014-2978
Summary: directfb new security issues CVE-2014-2977 and CVE-2014-2978
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/642649/
Whiteboard: has_procedure advisory mga4-64-ok
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-05-16 16:51 CEST by David Walser
Modified: 2015-05-03 02:20 CEST (History)
2 users (show)

See Also:
Source RPM: directfb-1.7.4-1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-05-16 16:51:25 CEST
Two potential security issues in DirectFB have been issued CVEs:
http://openwall.com/lists/oss-security/2014/05/15/9
http://openwall.com/lists/oss-security/2014/05/15/10

No fixes are available yet.

Mageia 3 and Mageia 4 are also affected.

Reproducible: 

Steps to Reproduce:
David Walser 2014-05-16 16:51:31 CEST

Whiteboard: (none) => MGA4TOO, MGA3TOO

Comment 1 Rémi Verschelde 2014-09-30 23:14:57 CEST
Fedora bug: https://bugzilla.redhat.com/show_bug.cgi?id=1098528

No progress on this upstream AFAICT.

CC: (none) => remi

Comment 2 Rémi Verschelde 2014-12-14 16:52:10 CET
Still no reaction from upstream.

Whiteboard: MGA4TOO, MGA3TOO => MGA4TOO

Comment 3 David Walser 2015-04-30 19:22:38 CEST
OpenSuSE has issued an advisory for this today (April 30):
http://lists.opensuse.org/opensuse-updates/2015-04/msg00060.html

Patches checked into Mageia 4 and Cauldron SVN.  Freeze push requested.

URL: (none) => http://lwn.net/Vulnerabilities/642649/

Comment 4 David Walser 2015-04-30 23:44:51 CEST
Patched packages uploaded for Mageia 4 and Cauldron.

Advisory:
========================

Updated directfb packages fix security vulnerabilities:

Multiple integer signedness errors in the Dispatch_Write function in
proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allow remote
attackers to cause a denial of service (crash) and possibly execute arbitrary
code via the Voodoo interface, which triggers a stack-based buffer overflow
(CVE-2014-2977).

The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c
in DirectFB allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via the Voodoo interface, which triggers an
out-of-bounds write (CVE-2014-2978).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2977
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2978
http://lists.opensuse.org/opensuse-updates/2015-04/msg00060.html
========================

Updated packages in core/updates_testing:
========================
libdirectfb1.7_0-1.7.0-2.1.mga4
libdirectfb-devel-1.7.0-2.1.mga4
directfb-doc-1.7.0-2.1.mga4

from directfb-1.7.0-2.1.mga4.src.rpm

Version: Cauldron => 4
Assignee: bugsquad => qa-bugs
Whiteboard: MGA4TOO => (none)
Severity: normal => critical

Comment 5 claire robinson 2015-05-02 20:06:10 CEST
No PoC.

From the website..

"DirectFB is a thin library that provides hardware graphics acceleration, input device handling and abstraction, integrated windowing system with support for translucent windows and multiple display layers, not only on top of the Linux Framebuffer Device. It is a complete hardware abstraction layer with software fallbacks for every graphics operation that is not supported by the underlying hardware. DirectFB adds graphical power to embedded systems and sets a new standard for graphics under Linux."

Test with any of these..

$ urpmq --whatrequires lib64directfb1.7_0 | uniq
gpac
gstreamer0.10-directfb
gstreamer1.0-directfb
lib64SDL1.2_0
lib64cairo-devel
lib64dfb++1.2_0
lib64directfb-devel
lib64directfb1.7_0
lib64xine2
links-graphic
links-hacked
linkx
mplayer
vlc-plugin-common
claire robinson 2015-05-02 20:06:21 CEST

Whiteboard: (none) => has_procedure

Comment 6 claire robinson 2015-05-02 20:09:59 CEST
Testing complete mga4 64

Using vlc under strace..

$ strace -o strace.txt vlc

$ grep directfb strace.txt 
stat("/usr/lib64/vlc/plugins/video_output/libdirectfb_plugin.so", {st_mode=S_IFREG|0755, st_size=11192, ...}) = 0
open("/usr/lib64/vlc/plugins/video_output/libdirectfb_plugin.so", O_RDONLY|O_CLOEXEC) = 5
open("/lib64/libdirectfb-1.7.so.0", O_RDONLY|O_CLOEXEC) = 5
open("/usr/lib64/libdirectfb-1.7.so.0.0.0", O_RDONLY) = 6

Whiteboard: has_procedure => has_procedure mga4-64-ok

Comment 7 claire robinson 2015-05-02 20:24:42 CEST
Confirmed patches applied.

Validating. Advisory uploaded.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure mga4-64-ok => has_procedure advisory mga4-64-ok
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2015-05-03 02:20:08 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0176.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.