Bug ID | 1202548 |
---|---|
Summary | VUL-0: CVE-2022-6083: freeciv: Modpack Installer buffer overflow |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.4 |
Hardware | Other |
URL | https://smash.suse.de/issue/340192/ |
OS | Other |
Status | NEW |
Severity | Minor |
Priority | P5 - None |
Component | Security |
Assignee | dmueller@suse.com |
Reporter | cathy.hu@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
rh#2116410 Just released freeciv-2.6.7 & freeciv-3.0.3 fix buffer overflow in Modpack Installer utility's handling of the modpack URL. Specially crafted URLs, without any '/' -characters would result in an underflowing length (unsigned)(-1) string copy, i.e., all of the NULL-terminated string given as "URL" would get written beyond the buffer reserved for it. Freeciv source tarballs are available from https://www.freeciv.org/download.html for current 3.0, and from https://www.freeciv.org/wiki/Old_downloads for 2.6. In case you can't make full version update at the moment, bug tracker ticket has also a patch for this single issue attached: https://osdn.net/projects/freeciv/ticket/45299 - ML References: https://bugzilla.redhat.com/show_bug.cgi?id=2116410 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-6083