[Debian-astro-maintainers] Bug#1087911: Bug#1087911:
Thorsten Alteholz
debian at alteholz.de
Fri Nov 22 00:06:09 GMT 2024
Hi,
On Fri, 22 Nov 2024, Ajin Deepak wrote:
> To address your first question, in the context of *dcraw*, a denial of
> service (DoS) vulnerability refers to the software's inability to handle
> malformed files appropriately. A specially crafted file can cause the
> application to crash, disrupting its functionality for users relying on it
> for image processing. While it is not a networked "service," this still
> constitutes a DoS as it prevents the intended use of the tool.
this sounds like the definition of a mere bug. I have never seen this
being called a DoS. Whatever, if you like to call it this way ...
> Additionally, the issue highlighted here involves a memory leak. This leak
> exposes memory addresses that could assist in exploiting other
> vulnerabilities, such as buffer overflows.
So what? Even if you are able to execute some code, you can only get
information from one user of the system. Back to the beginning of this
discussion: this looks like just an unimportant or minor issue and is far
away from the overhyped critical issue that you wanted to create in your
first mail.
Anybody who processes files from unknown sources of the internet has a
share of the blame in case bad things happen.
> Apologies for the confusion earlier regarding multi-user systems—I was
> referring to scenarios involving privilege escalation. Tools installed by
> the root user often have elevated privileges or capabilities, especially if
> they run with *setuid* permissions or interact with privileged system
> components. If such a tool has vulnerabilities and is executed by a
> non-privileged user, exploiting it could escalate the attacker's privileges
> to root or other users, as in the scenarios you mentioned.
Sure but this isn't related to dcraw, is it?
> webpage .However, even if such cases are not immediately exploitable,
> patching these issues is essential. Left unaddressed, they could
> potentially aid exploitation when combined with other vulnerabilities in a
> chain.
No it is by far not essential. Applying a patch always involves the danger
of introducing a regression. It is by far worse to not be able to process
an image with dcraw at all than to have no fix for a fictional security
issue.
> And yes I did apply for CVE after your reply.
Great, please share the number.
Thorsten
More information about the Debian-astro-maintainers
mailing list