Debian Bug report logs -
#778403
vnc4: CVE-2015-2305: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability
Reported by: Luciano Bello <luciano@debian.org>
Date: Sat, 14 Feb 2015 14:57:01 UTC
Severity: normal
Tags: patch, security
Done: Ola Lundqvist <ola@inguza.com>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Ola Lundqvist <opal@debian.org>:
Bug#778403; Package vnc4.
(Sat, 14 Feb 2015 14:57:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Luciano Bello <luciano@debian.org>:
New Bug report received and forwarded. Copy sent to Ola Lundqvist <opal@debian.org>.
(Sat, 14 Feb 2015 14:57:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: vnc4
Severity: important
Tags: security patch
The security team received a report from the CERT Coordination Center that the
Henry Spencer regular expressions (regex) library contains a heap overflow
vulnerability. It looks like this package includes the affected code at that's
the reason of this bug report.
The patch is available here:
http://gitweb.dragonflybsd.org/dragonfly.git/blobdiff/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c
Please, can you confirm if the binary packages are affected? Are stable and
testing affected?
More information, here:
http://www.kb.cert.org/vuls/id/695940
https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/
A CVE id has been requested already and the report will be updated with it
eventually.
Cheers, luciano
Information forwarded
to debian-bugs-dist@lists.debian.org, Ola Lundqvist <opal@debian.org>:
Bug#778403; Package vnc4.
(Tue, 24 Feb 2015 22:27:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Ola Lundqvist <ola@inguza.com>:
Extra info received and forwarded to list. Copy sent to Ola Lundqvist <opal@debian.org>.
(Tue, 24 Feb 2015 22:27:05 GMT) (full text, mbox, link).
Message #10 received at 778403@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi Luciano
Thanks for reporting and sorry for not answering until today.
It does not look like it is a real issue for vnc after some analysis.
From what I can see in the source code (used grep to find all occurrences)
it looks like regcomp is only used when parsing the x server configuration
file to see what modules to load.
This means that the person having the power to edit the configuration file
can potentially inject code that gives permission of the person starting
the x server (vnc server in this case).
The reason why this is not seen as an issue is that the configuration file
is typically owned by root or the person executing the x/vnc server program.
Root can typically do anything anyway, and the person starting the x/vnc
server already have the permissions for its own user.
There could be really rare cases when some unprivileged user create a
configuration file and then someone else use that configuration file to
start the vnc server, but in that case the configuration file have to be
pointed out explicitly and I see that as a really long shot.
Based on this I'll close this bug. Thanks. If you object, please let me
know.
// Ola
On Sat, Feb 14, 2015 at 3:36 PM, Luciano Bello <luciano@debian.org> wrote:
> Package: vnc4
> Severity: important
> Tags: security patch
>
> The security team received a report from the CERT Coordination Center that
> the
> Henry Spencer regular expressions (regex) library contains a heap overflow
> vulnerability. It looks like this package includes the affected code at
> that's
> the reason of this bug report.
>
> The patch is available here:
>
> http://gitweb.dragonflybsd.org/dragonfly.git/blobdiff/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c
>
> Please, can you confirm if the binary packages are affected? Are stable and
> testing affected?
>
> More information, here:
> http://www.kb.cert.org/vuls/id/695940
>
> https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/
>
> A CVE id has been requested already and the report will be updated with it
> eventually.
>
> Cheers, luciano
>
--
--- Inguza Technology AB --- MSc in Information Technology ----
/ ola@inguza.com Annebergsslingan 37 \
| opal@debian.org 654 65 KARLSTAD |
| http://inguza.com/ Mobile: +46 (0)70-332 1551 |
\ gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9 /
---------------------------------------------------------------
[Message part 2 (text/html, inline)]
Reply sent
to Ola Lundqvist <ola@inguza.com>:
You have taken responsibility.
(Tue, 24 Feb 2015 22:27:09 GMT) (full text, mbox, link).
Notification sent
to Luciano Bello <luciano@debian.org>:
Bug acknowledged by developer.
(Tue, 24 Feb 2015 22:27:09 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Ola Lundqvist <opal@debian.org>:
Bug#778403; Package vnc4.
(Wed, 25 Feb 2015 12:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Luciano Bello <luciano@debian.org>:
Extra info received and forwarded to list. Copy sent to Ola Lundqvist <opal@debian.org>.
(Wed, 25 Feb 2015 12:27:04 GMT) (full text, mbox, link).
Message #20 received at 778403@bugs.debian.org (full text, mbox, reply):
On Tuesday 24 February 2015 23.24.25 Ola Lundqvist wrote:
> There could be really rare cases when some unprivileged user create a
> configuration file and then someone else use that configuration file to
> start the vnc server, but in that case the configuration file have to be
> pointed out explicitly and I see that as a really long shot.
>
> Based on this I'll close this bug. Thanks. If you object, please let me
> know.
Thanks for analizing it.
I agree it is a minor bug, but it is still a bug. What about reopen it, reduce
the severity, and notify upstream? The patch is quite straight forward to
implement. You can rename it to reflect better the effect.
Cheers, luciano
Information forwarded
to debian-bugs-dist@lists.debian.org, Ola Lundqvist <opal@debian.org>:
Bug#778403; Package vnc4.
(Wed, 25 Feb 2015 18:21:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Ola Lundqvist <ola@inguza.com>:
Extra info received and forwarded to list. Copy sent to Ola Lundqvist <opal@debian.org>.
(Wed, 25 Feb 2015 18:21:04 GMT) (full text, mbox, link).
Message #25 received at 778403@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi
Yes you can reopen the bug with lower severity (normal or minor) if you
like.
Upstream has been inactive since 2004 or so.
/ Ola
Inguza Technology AB
Sent from a phone
Den 25 feb 2015 13:23 skrev "Luciano Bello" <luciano@debian.org>:
> On Tuesday 24 February 2015 23.24.25 Ola Lundqvist wrote:
> > There could be really rare cases when some unprivileged user create a
> > configuration file and then someone else use that configuration file to
> > start the vnc server, but in that case the configuration file have to be
> > pointed out explicitly and I see that as a really long shot.
> >
> > Based on this I'll close this bug. Thanks. If you object, please let me
> > know.
>
> Thanks for analizing it.
>
> I agree it is a minor bug, but it is still a bug. What about reopen it,
> reduce
> the severity, and notify upstream? The patch is quite straight forward to
> implement. You can rename it to reflect better the effect.
>
> Cheers, luciano
>
[Message part 2 (text/html, inline)]
Bug reopened
Request was from Luciano Bello <luciano@debian.org>
to control@bugs.debian.org.
(Thu, 26 Feb 2015 21:33:12 GMT) (full text, mbox, link).
Severity set to 'normal' from 'important'
Request was from Luciano Bello <luciano@debian.org>
to control@bugs.debian.org.
(Thu, 26 Feb 2015 21:33:13 GMT) (full text, mbox, link).
Changed Bug title to 'vnc4: CVE-2015-2305: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability' from 'Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability'
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org.
(Mon, 16 Mar 2015 11:57:14 GMT) (full text, mbox, link).
Reply sent
to Ola Lundqvist <ola@inguza.com>:
You have taken responsibility.
(Sat, 28 Dec 2019 13:42:11 GMT) (full text, mbox, link).
Notification sent
to Luciano Bello <luciano@debian.org>:
Bug acknowledged by developer.
(Sat, 28 Dec 2019 13:42:11 GMT) (full text, mbox, link).
Message #36 received at 778403-done@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi
The vnc4 source package has been a transitional package for two releases
now. Therefore I'm closing the bugs on this package, except the ones
related to the package removal.
The package has been requested for removal.
Best regards
// Ola
--
--- Inguza Technology AB --- MSc in Information Technology ----
| ola@inguza.com opal@debian.org |
| http://inguza.com/ Mobile: +46 (0)70-332 1551 |
---------------------------------------------------------------
[Message part 2 (text/html, inline)]
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 26 Jan 2020 07:24:43 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jul 2 03:45:43 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.