[Bug 1202548] New: VUL-0: CVE-2022-6083: freeciv: Modpack Installer buffer overflow
https://bugzilla.suse.com/show_bug.cgi?id=1202548 Bug ID: 1202548 Summary: VUL-0: CVE-2022-6083: freeciv: Modpack Installer buffer overflow Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: Other URL: https://smash.suse.de/issue/340192/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: dmueller@suse.com Reporter: cathy.hu@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#2116410 Just released freeciv-2.6.7 & freeciv-3.0.3 fix buffer overflow in Modpack Installer utility's handling of the modpack URL. Specially crafted URLs, without any '/' -characters would result in an underflowing length (unsigned)(-1) string copy, i.e., all of the NULL-terminated string given as "URL" would get written beyond the buffer reserved for it. Freeciv source tarballs are available from https://www.freeciv.org/download.html for current 3.0, and from https://www.freeciv.org/wiki/Old_downloads for 2.6. In case you can't make full version update at the moment, bug tracker ticket has also a patch for this single issue attached: https://osdn.net/projects/freeciv/ticket/45299 - ML References: https://bugzilla.redhat.com/show_bug.cgi?id=2116410 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-6083 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 https://bugzilla.suse.com/show_bug.cgi?id=1202548#c1 --- Comment #1 from Hu <cathy.hu@suse.com> --- Affected: - openSUSE:Backports:SLE-15-SP3/freeciv 2.6.2 - openSUSE:Backports:SLE-15-SP4/freeciv 2.6.5 - openSUSE:Factory/freeciv 3.0.2 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 https://bugzilla.suse.com/show_bug.cgi?id=1202548#c2 Dirk Mueller <dmueller@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|dmueller@suse.com |security-team@suse.de --- Comment #2 from Dirk Mueller <dmueller@suse.com> --- submitted -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 https://bugzilla.suse.com/show_bug.cgi?id=1202548#c4 --- Comment #4 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2022:10096-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1202548 CVE References: CVE-2022-6083 JIRA References: Sources used: openSUSE Backports SLE-15-SP3 (src): freeciv-3.0.3-bp153.2.3.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 https://bugzilla.suse.com/show_bug.cgi?id=1202548#c5 --- Comment #5 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2022:10102-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1202548 CVE References: CVE-2022-6083 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): freeciv-3.0.3-bp154.2.3.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 https://bugzilla.suse.com/show_bug.cgi?id=1202548#c6 Salvatore Bonaccorso <carnil@debian.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |carnil@debian.org --- Comment #6 from Salvatore Bonaccorso <carnil@debian.org> --- Please note the CVE used here is not correct and was caused probably by a mentioning in the Debian bug for freeciv, which later on got corrected. The CVE assigned by MITRE for this freeciv issue is CVE-2022-39047. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 Salvatore Bonaccorso <carnil@debian.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |security-team@suse.de Flags| |needinfo?(security-team@sus | |e.de) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1202548 https://bugzilla.suse.com/show_bug.cgi?id=1202548#c7 Thomas Leroy <thomas.leroy@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |thomas.leroy@suse.com Resolution|--- |DUPLICATE Flags|needinfo?(security-team@sus | |e.de) | --- Comment #7 from Thomas Leroy <thomas.leroy@suse.com> --- (In reply to Salvatore Bonaccorso from comment #6)
Please note the CVE used here is not correct and was caused probably by a mentioning in the Debian bug for freeciv, which later on got corrected. The CVE assigned by MITRE for this freeciv issue is CVE-2022-39047.
Thanks Salvatore for pointing this *** This bug has been marked as a duplicate of bug 1202985 *** -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com