|
Message-Id: <20150618162009.E54B1132E58E@smtpvbsrv1.mitre.org> Date: Thu, 18 Jun 2015 12:20:09 -0400 (EDT) From: cve-assign@...re.org To: gcanalesb@...com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Possible CVE Request: Multiple stack overflows in squashfs-tools and sasquatch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Sasquatch is an experimental fork of squashfs-tools. > I'm requesting a CVE number for this vulnerability, per project. CVE assignments typically cannot be done that way. > https://github.com/devttys0/sasquatch/pull/5 As far as we can tell, there are two independent types of problems: - "int bytes" is incorrect because the return value of SQUASHFS_FRAGMENT_BYTES can be larger than the maximum value of a signed int - pull/5 says "If we fix this by making the variable size_t, we run into an unrelated problem in which the stack VLA allocation of fragment_table_index[] can easily exceed RLIMIT_STACK" but actually RLIMIT_STACK can be exceeded regardless of the data type of the bytes variable We understand that the pull request is only intended to be an example code change, not a comprehensive code change to all affected functions. This type of fork situation can have up to six CVEs: 1 - all "int where size_t is correct" issues that occur only in squashfs-tools 2 - all "int where size_t is correct" issues that occur only in sasquatch 3 - all "int where size_t is correct" issues that occur in both squashfs-tools and sasquatch 4 - all "exceeding RLIMIT_STACK" issues that occur only in squashfs-tools 5 - all "exceeding RLIMIT_STACK" issues that occur only in sasquatch 6 - all "exceeding RLIMIT_STACK" issues that occur in both squashfs-tools and sasquatch We would guess that the most likely case is that only 3 and 6 are applicable, i.e., the code problems are found only in unsquash-1.c/unsquash-2.c/unsquash-3.c/unsquash-4.c and all of these files exist in both squashfs-tools and sasquatch. Is this correct? - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVgu8IAAoJEKllVAevmvms4iAH/2jSsPzoTZ4CPOCHDte6TuWr 1S02rSBvhaQ0HngavjC66y7EAdUK98SZpDeLwN9XP2o/jyhm8YMjcqgaJ/Kerf6s W1QhG8Bq3h4bLiGLOWNteqCt3YinB8KNAppqXI8/zpFWH9SSHaAu0EYp5bS6Pqvz ldan3rWvLCojwH/cfLWCPjUCi4dYPVN60x631WpH5Fg9ysLrlPLcFNpnBH17t+ul k9tHS1YSox3AfdMjN1snzPalwpXqc2Qz3AlmrmeB/4YGaW7D1+fAOIr2jKEbbTUN fk/7Nk86Keo2vp4nHavIwtuaYYB9g6AjP/nVsdzQAoITzz9yvwFp9xklHoUbtnM= =YsiJ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.