Bug 6884 - rocksndiamonds new security issue CVE-2011-4606
Summary: rocksndiamonds new security issue CVE-2011-4606
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 2
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL: http://lwn.net/Vulnerabilities/482810/
Whiteboard: MGA1TOO has_procedure MGA1-32-OK MGA1...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2012-07-27 20:30 CEST by David Walser
Modified: 2012-08-02 22:44 CEST (History)
4 users (show)

See Also:
Source RPM: rocksndiamonds-3.3.0.1-2.mga1.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2012-07-27 20:30:54 CEST
Fedora has issued an advisory on February 11:
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/073481.html

OpenSuSE has also issued an advisory for this today (July 27):
http://lists.opensuse.org/opensuse-updates/2012-07/msg00051.html

Mageia 1 and Mageia 2 are also affected.
David Walser 2012-07-27 20:31:22 CEST

Assignee: bugsquad => oliver.bgr

Comment 1 David Walser 2012-07-30 23:25:27 CEST
Patched packaged uploaded for Mageia 1, Mageia 2, and Cauldron.

Advisory:
========================

Updated rocksndiamonds package fixes security vulnerability:

Artsoft Entertainment Rocks'n'Diamonds (aka rocksndiamonds) 3.3.0.1
allows local users to overwrite arbitrary files via a symlink attack on
.rocksndiamonds/cache/artworkinfo.cache under a user's home directory
(CVE-2011-4606).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4606
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/073481.html
========================

Updated packages in core/updates_testing:
========================
rocksndiamonds-3.3.0.1-2.1.mga1
rocksndiamonds-3.3.0.1-2.1.mga2

from SRPMS:
rocksndiamonds-3.3.0.1-2.1.mga1.src.rpm
rocksndiamonds-3.3.0.1-2.1.mga2.src.rpm

CC: (none) => oliver.bgr
Version: Cauldron => 2
Assignee: oliver.bgr => qa-bugs
Summary: rocksanddiamonds new security issue CVE-2011-4606 => rocksndiamonds new security issue CVE-2011-4606
Whiteboard: (none) => MGA1TOO

Comment 2 Samuel Verschelde 2012-07-31 12:41:44 CEST
Given the type of package, testing the security issue seems overkill to me for this one, so I'm just testing that the game works.

Testing Mageia 1 32 complete.

Testing procedure:
- install rocksndiamonds from Core Release
- install the update from Core Updates Testing
- play it for 5 minutes
- stop playing, the game can be addictive

CC: (none) => stormi
Whiteboard: MGA1TOO => MGA1TOO has_procedure MGA1-32-OK

Comment 3 Samuel Verschelde 2012-07-31 14:12:16 CEST
Testing Mageia 1 64 complete.

Whiteboard: MGA1TOO has_procedure MGA1-32-OK => MGA1TOO has_procedure MGA1-32-OK MGA1-64-OK

Comment 4 David Walser 2012-07-31 14:49:57 CEST
Actually it would be good if you could verify that it's no longer creating ~/.rocksndiamonds as world writable.
Comment 5 Samuel Verschelde 2012-07-31 14:59:38 CEST
Indeed I can confirm that, although it doesn't fix the rights for an already existing directory so people have to fix it manually.

Updated testing procedure:
- install rocksndiamonds from Core Release
- play it
- check that ~/.rocksndiamonds is world writable
- remove ~/.rocksndiamonds
- install the update from Core Updates Testing
- play it for 5 minutes
- check that ~/.rocksndiamonds is not world writable
- stop playing, the game can be addictive
Comment 6 David Walser 2012-07-31 15:05:37 CEST
OK.

Advisory:
========================

Updated rocksndiamonds package fixes security vulnerability:

Artsoft Entertainment Rocks'n'Diamonds (aka rocksndiamonds) 3.3.0.1
allows local users to overwrite arbitrary files via a symlink attack on
.rocksndiamonds/cache/artworkinfo.cache under a user's home directory
(CVE-2011-4606).

Note: if you have previously played rocksndiamonds, you'll need to
manually fix the permmissions (e.g. chmod 755 ~/.rocksndiamonds).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4606
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/073481.html
========================

Updated packages in core/updates_testing:
========================
rocksndiamonds-3.3.0.1-2.1.mga1
rocksndiamonds-3.3.0.1-2.1.mga2

from SRPMS:
rocksndiamonds-3.3.0.1-2.1.mga1.src.rpm
rocksndiamonds-3.3.0.1-2.1.mga2.src.rpm
Comment 7 David Walser 2012-07-31 15:06:05 CEST
Trying again, this time without the typo!

Advisory:
========================

Updated rocksndiamonds package fixes security vulnerability:

Artsoft Entertainment Rocks'n'Diamonds (aka rocksndiamonds) 3.3.0.1
allows local users to overwrite arbitrary files via a symlink attack on
.rocksndiamonds/cache/artworkinfo.cache under a user's home directory
(CVE-2011-4606).

Note: if you have previously played rocksndiamonds, you'll need to
manually fix the permissions (e.g. chmod 755 ~/.rocksndiamonds).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4606
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/073481.html
========================

Updated packages in core/updates_testing:
========================
rocksndiamonds-3.3.0.1-2.1.mga1
rocksndiamonds-3.3.0.1-2.1.mga2

from SRPMS:
rocksndiamonds-3.3.0.1-2.1.mga1.src.rpm
rocksndiamonds-3.3.0.1-2.1.mga2.src.rpm
Comment 8 claire robinson 2012-07-31 15:09:13 CEST
Testing complete mga2 64

Before
------
$ rocksndiamonds
$ ls -la | grep .rocks
drwxrwxrwx   6 claire claire       4096 Jul 31 14:02 .rocksndiamonds/


After
-----
$ rocksndiamonds
$ ls -la | grep .rocks
drwx------   6 claire claire       4096 Jul 31 14:07 .rocksndiamonds/

Hardware: i586 => All
Whiteboard: MGA1TOO has_procedure MGA1-32-OK MGA1-64-OK => MGA1TOO has_procedure MGA1-32-OK MGA1-64-OK mga2-64-OK

Comment 9 David Walser 2012-07-31 15:22:17 CEST
Thanks Claire.  Fixing the advisory one more time to match those details.

Advisory:
========================

Updated rocksndiamonds package fixes security vulnerability:

Artsoft Entertainment Rocks'n'Diamonds (aka rocksndiamonds) 3.3.0.1
allows local users to overwrite arbitrary files via a symlink attack on
.rocksndiamonds/cache/artworkinfo.cache under a user's home directory
(CVE-2011-4606).

Note: if you have previously played rocksndiamonds, you'll need to
manually fix the permissions (e.g. chmod 700 ~/.rocksndiamonds).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4606
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/073481.html
========================

Updated packages in core/updates_testing:
========================
rocksndiamonds-3.3.0.1-2.1.mga1
rocksndiamonds-3.3.0.1-2.1.mga2

from SRPMS:
rocksndiamonds-3.3.0.1-2.1.mga1.src.rpm
rocksndiamonds-3.3.0.1-2.1.mga2.src.rpm
Comment 10 Samuel Verschelde 2012-07-31 16:57:56 CEST
Testing complete on Mageia 2 32 in a VM.

Update validated. Se comment #9 for advisory and packages.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs
Whiteboard: MGA1TOO has_procedure MGA1-32-OK MGA1-64-OK mga2-64-OK => MGA1TOO has_procedure MGA1-32-OK MGA1-64-OK mga2-64-OK MGA2-32-OK

Comment 11 Thomas Backlund 2012-08-02 22:44:07 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0195

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.