Bug#933860: pango1.0: CVE-2019-1010238
Salvatore Bonaccorso
carnil at debian.org
Fri Aug 9 16:29:58 BST 2019
Hi Simon,
On Sun, Aug 04, 2019 at 07:05:42PM +0100, Simon McVittie wrote:
> https://gitlab.gnome.org/GNOME/pango/issues/342 has now been unembargoed.
>
> On Sun, 04 Aug 2019 at 19:21:29 +0200, Salvatore Bonaccorso wrote:
> > Is there some indication which upstream code change introduced
> > hte issue so we can try to narrow this down?
>
> Not as far as I can see, but I am not a Pango expert. Perhaps someone
> else in the GNOME team has some insight here?
>
> > Re the no-dsa/dsa question, the added severity does not necessarly
> > imply that, actually to be on safe side I should have choosen grave
> > (which then can be lowered if not appropriate). The problem was simply
> > I cannot determine good enough the impact and exploiting/attack
> > scenarios.
> >
> > Does the upstream bug give more details which can help on that?
>
> The upstream bug reporter writes:
>
> [The segfault] happens because g_utf8_strlen("\xf8")
> is zero, so n_chars will be zero at this point:
> https://gitlab.gnome.org/GNOME/pango/blob/eb2c647ff693bf3218fd1772f11a008bfbc975e7/pango/pango-bidi-type.c#L173
>
> But because length = 1, the loop at
> https://gitlab.gnome.org/GNOME/pango/blob/eb2c647ff693bf3218fd1772f11a008bfbc975e7/pango/pango-bidi-type.c#L181
> still executes at least one time, leading to a NULL pointer
> dereference (g_new(.., 0) = NULL)).
>
> In general, this issue leads to an out-of-bounds heap write and can
> be triggered via pango_itemize if the bytes passed to pango_itemize
> are user-controlled.
>
> I hope that's helpful.
>
> Sorry, I don't know enough about Pango to know whether it's reasonable
> to pass malformed UTF-8 to pango_itemize(), or whether this can happen in
> practice in (for example) web browsers.
I tried to get an idea, as well consulting codesearch. It's not fully
clear to me. But given there stuff like qtwebkit and qt4-x11 in the
list I guess we are safer off if we release a DSA and say something
along the lines of "denial of service and potentially the execution of
arbitrary code".
Do you have free cycles to prepare the update for buster-security?
I think we can simply go with a 1.42.4-7~deb10u1 as "rebuild for
buster-security".
Thank you for your time so far!
Regards,
Salvatore
More information about the pkg-gnome-maintainers
mailing list