Adélie Linux issues
https://git.adelielinux.org/groups/adelie/-/issues
2022-02-02T16:56:02Z
https://git.adelielinux.org/adelie/packages/-/issues/193
user/nsd: CVE-2019-13207: stack-based buffer overflow due to malformed config...
2022-02-02T16:56:02Z
Emily
user/nsd: CVE-2019-13207: stack-based buffer overflow due to malformed configuration
| | |
| --- | --- |
| Bugzilla ID | 193 |
| Alias(es) | CVE-2019-13207 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-09-09 16:14:18 -0500 |
| Modified | 2019-09-30 11:54:35 -0500 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 193 |
| Alias(es) | CVE-2019-13207 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-09-09 16:14:18 -0500 |
| Modified | 2019-09-30 11:54:35 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA4 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-13207 |
## Description
> nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer
> Overflow in the dname_concatenate() function in dname.c.
Fixed in >= 4.2.2 https://github.com/NLnetLabs/nsd/commit/91102da24d5949ccfec8fdab5bae2d01c4cabab5
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/192
system/expat: CVE-2019-15903: heap-based buffer over read
2022-02-02T16:56:10Z
Emily
system/expat: CVE-2019-15903: heap-based buffer over read
| | |
| --- | --- |
| Bugzilla ID | 192 |
| Alias(es) | CVE-2019-15903 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-09-09 16:09:50 -0500 |
| Modified | 2019-09-28 13:36:31 -0500 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 192 |
| Alias(es) | CVE-2019-15903 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-09-09 16:09:50 -0500 |
| Modified | 2019-09-28 13:36:31 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-15903 |
## Description
> In libexpat before 2.2.8, crafted XML input could fool the parser into
> changing from DTD parsing to document parsing too early; a consecutive
> call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then
> resulted in a heap-based buffer over-read.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/190
system/gcc: CVE-2019-15847: POWER9 "DARN" RNG intrinsic produces repeated output
2022-05-02T04:32:37Z
Emily
system/gcc: CVE-2019-15847: POWER9 "DARN" RNG intrinsic produces repeated output
| | |
| --- | --- |
| Bugzilla ID | 190 |
| Alias(es) | CVE-2019-15847 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-09-05 01:01:51 -0500 |
| Modified | 2020-06-22 06:13:06 -0500 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 190 |
| Alias(es) | CVE-2019-15847 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-09-05 01:01:51 -0500 |
| Modified | 2020-06-22 06:13:06 -0500 |
| Status | CONFIRMED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| Package(s) | system/gcc |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-15847 |
| See also | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 |
## Description
> The POWER9 backend in GNU Compiler Collection (GCC) before version 10
> could optimize multiple calls of the __builtin_darn intrinsic into a
> single call, thus reducing the entropy of the random number generator.
> This occurred because a volatile operation was not specified. For
> example, within a single execution of a program, the output of every
> __builtin_darn() call may be the same.
Backported to 8 branch:
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=275181
8 branch test case:
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=275182
https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=275244
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/187
user/qt5*: multiple vulnerabilities
2020-02-25T06:01:03Z
Emily
user/qt5*: multiple vulnerabilities
| | |
| --- | --- |
| Bugzilla ID | 187 |
| Alias(es) | CVE-2018-15518, CVE-2018-19869, CVE-2018-19870, CVE-2018-19871, CVE-2018-19873 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-27 15:4...
| | |
| --- | --- |
| Bugzilla ID | 187 |
| Alias(es) | CVE-2018-15518, CVE-2018-19869, CVE-2018-19870, CVE-2018-19871, CVE-2018-19873 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-27 15:40:07 -0500 |
| Modified | 2020-02-25 00:01:03 -0600 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
## Description
CVE-2018-15518: https://nvd.nist.gov/vuln/detail/CVE-2018-15518
> QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption
> during parsing of a specially crafted illegal XML document.
Fixed in >= 5.9.8: https://codereview.qt-project.org/c/qt/qtbase/+/236745
CVE-2018-19873: https://nvd.nist.gov/vuln/detail/CVE-2018-19873
> An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer
> overflow via BMP data.
Fixed in >= 5.9.8: https://codereview.qt-project.org/c/qt/qtbase/+/240268
CVE-2018-19870: https://nvd.nist.gov/vuln/detail/CVE-2018-19870
> An issue was discovered in Qt before 5.11.3. A malformed GIF image
> causes a NULL pointer dereference in QGifHandler resulting in a
> segmentation fault.
Fixed in >= 5.9.8: https://codereview.qt-project.org/c/qt/qtbase/+/236168
CVE-2018-19871: https://nvd.nist.gov/vuln/detail/CVE-2018-19871
> An issue was discovered in Qt before 5.11.3. There is QTgaFile
> Uncontrolled Resource Consumption.
Fixed in >= 5.9.8: https://codereview.qt-project.org/c/qt/qtimageformats/+/238487
CVE-2018-19869: https://nvd.nist.gov/vuln/detail/CVE-2018-19869
> An issue was discovered in Qt before 5.11.3. A malformed SVG image
> causes a segmentation fault in qsvghandler.cpp.
Fixed in >= 5.9.8: https://codereview.qt-project.org/c/qt/qtsvg/+/236169
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/186
user/tiff: multiple vulnerabilities
2020-02-25T05:51:14Z
Emily
user/tiff: multiple vulnerabilities
| | |
| --- | --- |
| Bugzilla ID | 186 |
| Alias(es) | CVE-2019-14973, CVE-2019-17546 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-23 09:29:17 -0500 |
| Modified | 2020-02-24 23:51:14 -0...
| | |
| --- | --- |
| Bugzilla ID | 186 |
| Alias(es) | CVE-2019-14973, CVE-2019-17546 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-23 09:29:17 -0500 |
| Modified | 2020-02-24 23:51:14 -0600 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-14973 |
## Description
> _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through
> 4.0.10 mishandle Integer Overflow checks because they rely on compiler
> behavior that is undefined by the applicable C standards. This can,
> for example, lead to an application crash.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/185
user/djvulibre: multiple vulnerabilities
2019-09-28T18:37:52Z
Emily
user/djvulibre: multiple vulnerabilities
| | |
| --- | --- |
| Bugzilla ID | 185 |
| Alias(es) | CVE-2019-15142, CVE-2019-15143, CVE-2019-15144, CVE-2019-15145 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-21 15:18:59 -0500 |
| M...
| | |
| --- | --- |
| Bugzilla ID | 185 |
| Alias(es) | CVE-2019-15142, CVE-2019-15143, CVE-2019-15144, CVE-2019-15145 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-21 15:18:59 -0500 |
| Modified | 2019-09-28 13:37:52 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
## Description
CVE-2019-15142: https://nvd.nist.gov/vuln/detail/CVE-2019-15142
> In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows
> attackers to cause a denial-of-service (application crash in
> GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based
> buffer over-read) by crafting a DJVU file.
CVE-2019-15143: https://nvd.nist.gov/vuln/detail/CVE-2019-15143
> In DjVuLibre 3.5.27, the bitmap reader component allows attackers to
> cause a denial-of-service error (resource exhaustion caused by a
> GBitmap::read_rle_raw infinite loop) by crafting a corrupted image
> file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.
CVE-2019-15144: https://nvd.nist.gov/vuln/detail/CVE-2019-15144
> In DjVuLibre 3.5.27, the sorting functionality (aka
> GArrayTemplate<TYPE>::sort) allows attackers to cause a denial-of-
> service (application crash due to an Uncontrolled Recursion) by
> crafting a PBM image file that is mishandled in libdjvu/GContainer.h.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/184
user/libvncserver (< 0.9.12-r0), user/libfm (< 1.3.1-r1): should be purged fr...
2022-02-02T16:56:56Z
Emily
user/libvncserver (< 0.9.12-r0), user/libfm (< 1.3.1-r1): should be purged from mirrors
| | |
| --- | --- |
| Bugzilla ID | 184 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-19 03:45:01 -0500 |
| Modified | 2019-08-23 09:50:45 -0500 |
| Status | RESOLVED FIXED |
| Version | 1...
| | |
| --- | --- |
| Bugzilla ID | 184 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-19 03:45:01 -0500 |
| Modified | 2019-08-23 09:50:45 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
## Description
apk skips upgrading libvncserver because the sover of its shared libraries decreased during the bump from 0.9.11 to 0.9.12:
$ apk info -P libvncserver
libvncserver-0.9.12-r0 provides:
so:libvncclient.so.1=0.9.12
so:libvncserver.so.1=0.9.12
libvncserver-0.9.11-r1 provides:
so:libvncclient.so.1=1.0.0
so:libvncserver.so.1=1.0.0
According to upstream[1], this is intentional. Therefore libvncserver{,-dev}-0.9.11-r1.apk needs to be purged from the mirrors.
[1] https://github.com/LibVNC/libvncserver/issues/122#issuecomment-271849456
----
apk skips upgrading libfm because so:libfm-extra.so.4 was moved to a separate libfm-extra package in libfm 1.3.1-r1:
$ apk info -P libfm
libfm-1.3.1-r0 provides:
so:libfm-extra.so.4=4.1.2
so:libfm-gtk.so.4=4.1.2
so:libfm.so.4=4.1.2
cmd:libfm-pref-apps
cmd:lxshortcut
libfm-1.3.1-r1 provides:
so:libfm-gtk.so.4=4.1.2
so:libfm.so.4=4.1.2
cmd:libfm-pref-apps
cmd:lxshortcut
$ apk info -P libfm-extra
libfm-extra-1.3.0.2-r0 provides:
so:libfm-extra.so.4=4.1.1
libfm-extra-1.3.1-r0 provides:
so:libfm-extra.so.4=4.1.2
It does not seem smart enough to select libfm-extra on its own without either 1. manually adding libfm=1.3.1-r1 or 2. removing libfm{,-dev,-doc,-lang}-1.3.1-r0 from the mirrors. Note that libfm-extra would match a libfm*-1.3.1-r0 glob.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/182
user/vlc: multiple vulnerabilities
2019-09-28T18:35:01Z
Emily
user/vlc: multiple vulnerabilities
| | |
| --- | --- |
| Bugzilla ID | 182 |
| Alias(es) | CVE-2019-13602, CVE-2019-13615, CVE-2019-13962, CVE-2019-14437, CVE-2019-14438, CVE-2019-14498, CVE-2019-14533, CVE-2019-14534, CVE-2019-14535, CVE-2019-14776, CVE-2019-14777, CVE...
| | |
| --- | --- |
| Bugzilla ID | 182 |
| Alias(es) | CVE-2019-13602, CVE-2019-13615, CVE-2019-13962, CVE-2019-14437, CVE-2019-14438, CVE-2019-14498, CVE-2019-14533, CVE-2019-14534, CVE-2019-14535, CVE-2019-14776, CVE-2019-14777, CVE-2019-14778, CVE-2019-14970 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-16 19:39:57 -0500 |
| Modified | 2019-09-28 13:35:01 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
## Description
CVE-2019-13602: https://nvd.nist.gov/vuln/detail/CVE-2019-13602
> An Integer Underflow in MP4_EIA608_Convert() in
> modules/demux/mp4/mp4.c in VideoLAN VLC media player through 3.0.7.1
> allows remote attackers to cause a denial of service (heap-based
> buffer overflow and crash) or possibly have unspecified other impact
> via a crafted .mp4 file.
CVE-2019-13962: https://nvd.nist.gov/vuln/detail/CVE-2019-13962
> lavc_CopyPicture in modules/codec/avcodec/video.c in VideoLAN VLC
> media player through 3.0.7 has a heap-based buffer over-read because
> it does not properly validate the width and height.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/181
user/audacious crashes sometimes under heavy load when alt+tabbing in Plasma
2021-11-03T23:54:23Z
Emily
user/audacious crashes sometimes under heavy load when alt+tabbing in Plasma
| | |
| --- | --- |
| Bugzilla ID | 181 |
| Reporter | A. Wilcox (awilfox) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-15 10:19:51 -0500 |
| Modified | 2020-06-22 06:25:49 -0500 |
| Status | CONFIRMED |
| Version | 1.0-B...
| | |
| --- | --- |
| Bugzilla ID | 181 |
| Reporter | A. Wilcox (awilfox) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-15 10:19:51 -0500 |
| Modified | 2020-06-22 06:25:49 -0500 |
| Status | CONFIRMED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / PowerPC (64-bit) |
| Importance | --- / major |
| Package(s) | user/audacious |
## Description
Assertion 're->data || re->memblock' failed at pulsecore/pstream.c:862, function do_read(). Aborting.
Thread 432 "audacious" received signal SIGABRT, Aborted.
[Switching to LWP 42918]
0x00003ffff7f858d8 in __syscall4 (d=8, c=0, b=70368408579784, a=2, n=174) at ./arch/powerpc64/syscall_arch.h:54
54 ./arch/powerpc64/syscall_arch.h: No such file or directory.
(gdb) bt
#0 0x00003ffff7f858d8 in __syscall4 (d=8, c=0, b=70368408579784, a=2, n=174) at ./arch/powerpc64/syscall_arch.h:54
#1 __restore_sigs (set=0x3fffebff2ec8) at src/signal/block.c:43
#2 0x00003ffff7f85c28 in raise (sig=<optimized out>) at src/signal/raise.c:11
#3 0x00003ffff7f3dc48 in abort () at src/exit/abort.c:13
#4 0x00003ffff4bdfc48 in ?? () from /usr/lib/pulseaudio/libpulsecommon-12.2.so
#5 0x00003ffff4be351c in ?? () from /usr/lib/pulseaudio/libpulsecommon-12.2.so
#6 0x00003ffff4be39d8 in ?? () from /usr/lib/pulseaudio/libpulsecommon-12.2.so
#7 0x00003ffff4be45c0 in ?? () from /usr/lib/pulseaudio/libpulsecommon-12.2.so
#8 0x00003ffff4c6b1d8 in pa_mainloop_dispatch () from /usr/lib/libpulse.so.0
#9 0x00003ffff4cbf9b0 in poll_events (lock=...) at pulse_audio.cc:108
#10 0x00003ffff4cc1014 in PulseOutput::period_wait (this=<optimized out>) at pulse_audio.cc:294
#11 0x00003ffff7ebe820 in write_output (data=...) at output.cc:365
#12 0x00003ffff7ec0060 in process_audio (stop_time=-1, size=<optimized out>, data=0x10085eb00) at output.cc:405
#13 output_write_audio (data=0x10085eb00, size=<optimized out>, stop_time=<optimized out>) at output.cc:499
#14 0x00003ffff7ec230c in InputPlugin::write_audio (data=0x10085eb00, length=<optimized out>) at playback.cc:554
#15 0x00003fffee8e13f0 in FFaudio::play (this=<optimized out>, filename=<optimized out>, file=...) at /usr/include/libaudcore/index.h:115
#16 0x00003ffff7ec30d0 in run_playback () at ../libaudcore/objects.h:179
#17 playback_thread () at playback.cc:405
#18 0x00003ffff7fa0ee4 in start (p=0x3fffebff3848) at src/thread/pthread_create.c:195
#19 0x00003ffff7fb41ec in __clone () at src/thread/powerpc64/clone.s:44
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/180
system/easy-kernel*: multiple vulnerabilities
2019-10-17T01:34:30Z
Emily
system/easy-kernel*: multiple vulnerabilities
| | |
| --- | --- |
| Bugzilla ID | 180 |
| Alias(es) | CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835, CVE-2019-15117, CVE-2019-15118, CVE-2019-15239, CVE-2019-15505, CVE-2019-15538, CVE-2019-16746, CVE...
| | |
| --- | --- |
| Bugzilla ID | 180 |
| Alias(es) | CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835, CVE-2019-15117, CVE-2019-15118, CVE-2019-15239, CVE-2019-15505, CVE-2019-15538, CVE-2019-16746, CVE-2019-17054, CVE-2019-17055, CVE-2019-17056 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-14 11:19:01 -0500 |
| Modified | 2019-10-16 20:34:30 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| See also | https://bts.adelielinux.org/show_bug.cgi?id=130<br>https://bts.adelielinux.org/show_bug.cgi?id=195<br>https://bts.adelielinux.org/show_bug.cgi?id=217 |
## Description
CVE-2019-5489: https://nvd.nist.gov/vuln/detail/CVE-2019-5489
> The mincore() implementation in mm/mincore.c in the Linux kernel
> through 4.19.13 allowed local attackers to observe page cache access
> patterns of other processes on the same system, potentially allowing
> sniffing of secret information. (Fixing this affects the output of the
> fincore program.) Limited remote exploitation may be possible, as
> demonstrated by latency differences in accessing public files from an
> Apache HTTP Server.
No fix in 4.14 yet.
https://www.linuxkernelcves.com/cves/CVE-2019-5489
CVE-2019-12614: https://nvd.nist.gov/vuln/detail/CVE-2019-12614
> An issue was discovered in dlpar_parse_cc_property in
> arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through
> 5.1.6. There is an unchecked kstrdup of prop->name, which might
> allow an attacker to cause a denial of service (NULL pointer
> dereference and system crash).
No fix in 4.14 yet.
https://www.linuxkernelcves.com/cves/CVE-2019-12614
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/178
user/atril: buffer overflow in tiff_document_render and tiff_document_get_thu...
2019-09-13T08:43:33Z
Emily
user/atril: buffer overflow in tiff_document_render and tiff_document_get_thumbnail
| | |
| --- | --- |
| Bugzilla ID | 178 |
| Alias(es) | CVE-2019-1010006 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-13 16:55:28 -0500 |
| Modified | 2019-09-13 03:43:33 -0500 |
| Status...
| | |
| --- | --- |
| Bugzilla ID | 178 |
| Alias(es) | CVE-2019-1010006 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-13 16:55:28 -0500 |
| Modified | 2019-09-13 03:43:33 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-1010006 |
| See also | https://bts.adelielinux.org/show_bug.cgi?id=148 |
## Description
CVE-2019-1010006: https://nvd.nist.gov/vuln/detail/CVE-2019-1010006
> Evince 3.26.0 is affected by buffer overflow. The impact is: DOS /
> Possible code execution. The component is:
> backend/tiff/tiff-document.c. The attack vector is: Victim must open a
> crafted PDF file. The issue occurs because of an incorrect integer
> overflow protection mechanism in tiff_document_render and
> tiff_document_get_thumbnail.
Unreleased fix: https://github.com/mate-desktop/atril/issues/386
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/177
system/easy-kernel: driver for RTL8723BE wifi card not included
2022-02-02T16:57:16Z
Emily
system/easy-kernel: driver for RTL8723BE wifi card not included
| | |
| --- | --- |
| Bugzilla ID | 177 |
| Reporter | Molly Miller |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-12 17:50:06 -0500 |
| Modified | 2019-08-13 13:24:13 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA...
| | |
| --- | --- |
| Bugzilla ID | 177 |
| Reporter | Molly Miller |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-12 17:50:06 -0500 |
| Modified | 2019-08-13 13:24:13 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
## Description
I have a laptop with a Realtek RTL8723BE wifi card, however easy-kernel 4.14.127-mc14 does not ship with a driver for this card, which means that the kernel never recognises its presence. I have used this hardware successfully with Debian in the past, and inspecting Adélie and Debian's kernel configurations, it seems that Debian sets CONFIG_RTL8723BE=m, while Adélie does not set this Kconfig knob, which results in the driver not being built.
(Additionally, there are a number of Kconfig handles matching /CONFIG_RTL8\d{3}../ corresponding to other Realtek wifi cards which Debian builds as modules but Adélie does not build at all.)
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/176
user/kconfig: CVE-2019-14744: malicious .desktop files (and others) would exe...
2022-02-02T16:57:24Z
Emily
user/kconfig: CVE-2019-14744: malicious .desktop files (and others) would execute code
| | |
| --- | --- |
| Bugzilla ID | 176 |
| Alias(es) | CVE-2019-14744 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-08 14:14:36 -0500 |
| Modified | 2020-03-03 08:22:58 -0600 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 176 |
| Alias(es) | CVE-2019-14744 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-08 14:14:36 -0500 |
| Modified | 2020-03-03 08:22:58 -0600 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-14744 |
## Description
> In KDE Frameworks KConfig before 5.61.0, malicious desktop files and
> configuration files lead to code execution with minimal user
> interaction. This relates to libKF5ConfigCore.so, and the mishandling
> of .desktop and .directory files, as demonstrated by a shell command
> on an Icon line in a .desktop file.
More information:
https://mail.kde.org/pipermail/kde-announce/2019-August/000047.html
Patch:
https://cgit.kde.org/kconfig.git/commit/?id=5d3e71b1d2ecd2cb2f910036e614ffdfc895aa22
This isn't so much a vulnerability as KDE has decided to remove
intentional functionality that could pose a risk.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/175
user/rtmpdump: multiple vulnerabilities
2019-09-30T17:11:16Z
Emily
user/rtmpdump: multiple vulnerabilities
| | |
| --- | --- |
| Bugzilla ID | 175 |
| Alias(es) | CVE-2015-8270, CVE-2015-8271, CVE-2015-8272 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-06 12:54:58 -0500 |
| Modified | 2019-09-3...
| | |
| --- | --- |
| Bugzilla ID | 175 |
| Alias(es) | CVE-2015-8270, CVE-2015-8271, CVE-2015-8272 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-06 12:54:58 -0500 |
| Modified | 2019-09-30 12:11:16 -0500 |
| Status | RESOLVED INVALID |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
## Description
CVE-2015-8270: https://nvd.nist.gov/vuln/detail/CVE-2015-8270
> The AMF3ReadString function in amf.c in RTMPDump 2.4 allows remote
> RTMP Media servers to cause a denial of service (invalid pointer
> dereference and process crash).
CVE-2015-8271: https://nvd.nist.gov/vuln/detail/CVE-2015-8271
> The AMF3CD_AddProp function in amf.c in RTMPDump 2.4 allows remote
> RTMP Media servers to execute arbitrary code.
CVE-2015-8272: https://nvd.nist.gov/vuln/detail/CVE-2015-8272
> RTMPDump 2.4 allows remote attackers to trigger a denial of service
> (NULL pointer dereference and process crash).
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/174
system/binutils: CVE-2019-14444: readelf integer overflow
2022-02-02T16:57:31Z
Emily
system/binutils: CVE-2019-14444: readelf integer overflow
| | |
| --- | --- |
| Bugzilla ID | 174 |
| Alias(es) | CVE-2019-14444 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-05 13:42:40 -0500 |
| Modified | 2019-09-30 15:01:56 -0500 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 174 |
| Alias(es) | CVE-2019-14444 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-05 13:42:40 -0500 |
| Modified | 2019-09-30 15:01:56 -0500 |
| Status | RESOLVED FIXED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-14444 |
## Description
> apply_relocations in readelf.c in GNU Binutils 2.32 contains an
> integer overflow that allows attackers to trigger a write access
> violation (in byte_put_little_endian function in elfcomm.c) via an ELF
> file, as demonstrated by readelf.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/173
user/nextcloud-client (2.5.3): multiple test failures
2022-02-02T16:57:39Z
Emily
user/nextcloud-client (2.5.3): multiple test failures
| | |
| --- | --- |
| Bugzilla ID | 173 |
| Reporter | A. Wilcox (awilfox) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-05 03:29:47 -0500 |
| Modified | 2020-06-22 06:26:18 -0500 |
| Status | CONFIRMED |
| Version | 1.0-B...
| | |
| --- | --- |
| Bugzilla ID | 173 |
| Reporter | A. Wilcox (awilfox) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-05 03:29:47 -0500 |
| Modified | 2020-06-22 06:26:18 -0500 |
| Status | CONFIRMED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| Package(s) | user/nextcloud-client |
## Description
Observed on ppc and ppc64.
Running tests...
Test project /usr/src/packages/user/nextcloud-client/src/desktop-2.5.3
Start 1: OwncloudPropagatorTest
1/24 Test #1: OwncloudPropagatorTest ........... Passed 0.06 sec
Start 2: UpdaterTest
2/24 Test #2: UpdaterTest ...................... Passed 0.04 sec
Start 3: NetrcParserTest
3/24 Test #3: NetrcParserTest .................. Passed 0.01 sec
Start 4: OwnSqlTest
4/24 Test #4: OwnSqlTest ....................... Passed 0.03 sec
Start 5: SyncJournalDBTest
5/24 Test #5: SyncJournalDBTest ................ Passed 0.05 sec
Start 6: SyncFileItemTest
6/24 Test #6: SyncFileItemTest ................. Passed 0.01 sec
Start 7: ConcatUrlTest
7/24 Test #7: ConcatUrlTest .................... Passed 0.01 sec
Start 8: XmlParseTest
8/24 Test #8: XmlParseTest ..................... Passed 0.04 sec
Start 9: ChecksumValidatorTest
9/24 Test #9: ChecksumValidatorTest ............ Passed 0.17 sec
Start 10: ExcludedFilesTest
10/24 Test #10: ExcludedFilesTest ................ Passed 0.01 sec
Start 11: FileSystemTest
11/24 Test #11: FileSystemTest ................... Passed 0.02 sec
Start 12: UtilityTest
12/24 Test #12: UtilityTest ......................***Failed 0.05 sec
Start 13: SyncEngineTest
13/24 Test #13: SyncEngineTest ................... Passed 2.11 sec
Start 14: SyncMoveTest
14/24 Test #14: SyncMoveTest ..................... Passed 1.10 sec
Start 15: SyncConflictTest
15/24 Test #15: SyncConflictTest ................. Passed 0.76 sec
Start 16: SyncFileStatusTrackerTest
16/24 Test #16: SyncFileStatusTrackerTest ........ Passed 0.72 sec
Start 17: ChunkingNgTest
17/24 Test #17: ChunkingNgTest ................... Passed 147.44 sec
Start 18: UploadResetTest
18/24 Test #18: UploadResetTest .................. Passed 3.80 sec
Start 19: AllFilesDeletedTest
19/24 Test #19: AllFilesDeletedTest .............. Passed 0.64 sec
Start 20: BlacklistTest
20/24 Test #20: BlacklistTest .................... Passed 0.35 sec
Start 21: FolderWatcherTest
21/24 Test #21: FolderWatcherTest ................***Failed 41.54 sec
Start 22: InotifyWatcherTest
22/24 Test #22: InotifyWatcherTest ............... Passed 0.04 sec
Start 23: FolderManTest
23/24 Test #23: FolderManTest .................... Passed 0.10 sec
Start 24: OAuthTest
24/24 Test #24: OAuthTest ........................ Passed 0.42 sec
92% tests passed, 2 tests failed out of 24
Total Test time (real) = 199.59 sec
The following tests FAILED:
12 - UtilityTest (Failed)
21 - FolderWatcherTest (Failed)
Errors while running CTest
make: *** [Makefile:141: test] Error 8
Running tests...
Test project /usr/src/packages/user/nextcloud-client/src/desktop-2.5.3
Start 12: UtilityTest
1/2 Test #12: UtilityTest ......................***Failed 0.05 sec
********* Start testing of TestUtility *********
Config: Using QtTest library 5.9.7, Qt 5.9.7 (power-big_endian-ilp32 shared (dynamic) debug build; by GCC 8.3.0)
PASS : TestUtility::initTestCase()
PASS : TestUtility::testFormatFingerprint()
PASS : TestUtility::testOctetsToString()
PASS : TestUtility::testLaunchOnStartup()
PASS : TestUtility::testDurationToDescriptiveString()
QDEBUG : TestUtility::testVersionOfInstalledBinary() Version of installed Nextcloud: ""
FAIL! : TestUtility::testVersionOfInstalledBinary() '!ver.isEmpty()' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testutility.cpp(121)]
PASS : TestUtility::testTimeAgo()
PASS : TestUtility::testFsCasePreserving()
PASS : TestUtility::testFileNamesEqual()
PASS : TestUtility::testSanitizeForFileName()
PASS : TestUtility::testSanitizeForFileName()
PASS : TestUtility::testSanitizeForFileName()
PASS : TestUtility::cleanupTestCase()
Totals: 12 passed, 1 failed, 0 skipped, 0 blacklisted, 43ms
********* Finished testing of TestUtility *********
Start 21: FolderWatcherTest
2/2 Test #21: FolderWatcherTest ................***Failed 41.57 sec
creating test directory tree in "/tmp/FolderWatcherTest-BGPOHL"
nextcloud.gui.folderwatcher: notify_init() failed: No file descriptors available
********* Start testing of TestFolderWatcher *********
Config: Using QtTest library 5.9.7, Qt 5.9.7 (power-big_endian-ilp32 shared (dynamic) debug build; by GCC 8.3.0)
PASS : TestFolderWatcher::initTestCase()
QDEBUG : TestFolderWatcher::testACreate() Command: "echo \"xyz\" > /tmp/FolderWatcherTest-BGPOHL/foo.txt"
FAIL! : TestFolderWatcher::testACreate() 'waitForPathChanged(file)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(134)]
QDEBUG : TestFolderWatcher::testATouch() Command: "touch /tmp/FolderWatcherTest-BGPOHL/a1/random.bin"
FAIL! : TestFolderWatcher::testATouch() 'waitForPathChanged(file)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(140)]
QDEBUG : TestFolderWatcher::testMove3LevelDirWithFile() Command: "mkdir /tmp/FolderWatcherTest-BGPOHL/a0"
QDEBUG : TestFolderWatcher::testMove3LevelDirWithFile() Command: "mkdir /tmp/FolderWatcherTest-BGPOHL/a0/b"
QDEBUG : TestFolderWatcher::testMove3LevelDirWithFile() Command: "mkdir /tmp/FolderWatcherTest-BGPOHL/a0/b/c"
QDEBUG : TestFolderWatcher::testMove3LevelDirWithFile() Command: "touch /tmp/FolderWatcherTest-BGPOHL/a0/b/c/empty.txt"
QDEBUG : TestFolderWatcher::testMove3LevelDirWithFile() Command: "mv /tmp/FolderWatcherTest-BGPOHL/a0 /tmp/FolderWatcherTest-BGPOHL/a"
FAIL! : TestFolderWatcher::testMove3LevelDirWithFile() 'waitForPathChanged(_rootPath + "/a/b/c/empty.txt")' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(150)]
QDEBUG : TestFolderWatcher::testCreateADir() Command: "mkdir /tmp/FolderWatcherTest-BGPOHL/a1/b1/new_dir"
FAIL! : TestFolderWatcher::testCreateADir() 'waitForPathChanged(file)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(157)]
QDEBUG : TestFolderWatcher::testRemoveADir() Command: "rmdir /tmp/FolderWatcherTest-BGPOHL/a1/b3/c3"
FAIL! : TestFolderWatcher::testRemoveADir() 'waitForPathChanged(file)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(163)]
QDEBUG : TestFolderWatcher::testRemoveAFile() Command: "rm /tmp/FolderWatcherTest-BGPOHL/a1/b2/todelete.bin"
FAIL! : TestFolderWatcher::testRemoveAFile() 'waitForPathChanged(file)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(172)]
QDEBUG : TestFolderWatcher::testRenameAFile() Command: "mv /tmp/FolderWatcherTest-BGPOHL/a2/renamefile /tmp/FolderWatcherTest-BGPOHL/a2/renamefile.renamed"
FAIL! : TestFolderWatcher::testRenameAFile() 'waitForPathChanged(file1)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(182)]
QDEBUG : TestFolderWatcher::testMoveAFile() Command: "mv /tmp/FolderWatcherTest-BGPOHL/a1/movefile /tmp/FolderWatcherTest-BGPOHL/a2/movefile.renamed"
FAIL! : TestFolderWatcher::testMoveAFile() 'waitForPathChanged(old_file)' returned FALSE. ()
Loc: [/usr/src/packages/user/nextcloud-client/src/desktop-2.5.3/test/testfolderwatcher.cpp(193)]
PASS : TestFolderWatcher::cleanupTestCase()
Totals: 2 passed, 8 failed, 0 skipped, 0 blacklisted, 41538ms
********* Finished testing of TestFolderWatcher *********
0% tests passed, 2 tests failed out of 2
Total Test time (real) = 41.62 sec
The following tests FAILED:
12 - UtilityTest (Failed)
21 - FolderWatcherTest (Failed)
Errors while running CTest
make: *** [Makefile:141: test] Error 8
>>> ERROR: nextcloud-client: check failed
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/172
user/libjpeg-turbo: CVE-2019-13960: excessive memory usage on image with inco...
2022-02-02T16:57:47Z
Emily
user/libjpeg-turbo: CVE-2019-13960: excessive memory usage on image with incorrect width/height
| | |
| --- | --- |
| Bugzilla ID | 172 |
| Alias(es) | CVE-2019-13960 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-03 00:54:49 -0500 |
| Modified | 2019-08-03 00:57:19 -0500 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 172 |
| Alias(es) | CVE-2019-13960 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-03 00:54:49 -0500 |
| Modified | 2019-08-03 00:57:19 -0500 |
| Status | RESOLVED INVALID |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-13960 |
## Description
> ** DISPUTED ** In libjpeg-turbo 2.0.2, a large amount of memory can be
> used during processing of an invalid progressive JPEG image containing
> incorrect width and height values in the image header. NOTE: the
> vendor's expectation, for use cases in which this memory usage would
> be a denial of service, is that the application should interpret
> libjpeg warnings as fatal errors (aborting decompression) and/or set
> limits on resource consumption or image sizes.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/171
user/plib: CVE-2012-4552: buffer overflow via crafted file
2022-11-11T21:58:51Z
Emily
user/plib: CVE-2012-4552: buffer overflow via crafted file
| | |
| --- | --- |
| Bugzilla ID | 171 |
| Alias(es) | CVE-2012-4552 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-03 00:38:46 -0500 |
| Modified | 2020-06-22 06:23:52 -0500 |
| Status | ...
| | |
| --- | --- |
| Bugzilla ID | 171 |
| Alias(es) | CVE-2012-4552 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-03 00:38:46 -0500 |
| Modified | 2020-06-22 06:23:52 -0500 |
| Status | CONFIRMED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| Package(s) | user/plib |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2012-4552 |
## Description
> Stack-based buffer overflow in the error function in ssg/ssgParser.cxx
> in PLIB 1.8.5 allows remote attackers to execute arbitrary code via a
> crafted 3d model file that triggers a long error message, as
> demonstrated by a .ase file.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/170
system/binutils: 2.32: FAIL: No PLT (static 1d)
2023-10-05T17:31:57Z
Emily
system/binutils: 2.32: FAIL: No PLT (static 1d)
| | |
| --- | --- |
| Bugzilla ID | 170 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-02 23:09:38 -0500 |
| Modified | 2020-06-22 05:58:33 -0500 |
| Status | CONFIRMED |
| Version | 1.0-B...
| | |
| --- | --- |
| Bugzilla ID | 170 |
| Reporter | Max Rees (sroracle) |
| Assignee | A. Wilcox (awilfox) |
| Reported | 2019-08-02 23:09:38 -0500 |
| Modified | 2020-06-22 05:58:33 -0500 |
| Status | CONFIRMED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / Intel x86 (64-bit) |
| Importance | --- / normal |
| Package(s) | system/binutils |
| Blocks | https://bts.adelielinux.org/show_bug.cgi?id=87 |
| See also | https://bts.adelielinux.org/show_bug.cgi?id=196 |
## Description
on x86_64:
> gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -I/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64 -O2 -g0 -march=nocona -mtune=core2 -fno
> -omit-frame-pointer -mfpmath=sse -g -c -O2 -g0 -march=nocona -mtune=core2 -fno-omit-frame-pointer -mfpmath=sse -g -Wa,-mx86-used-note=yes -c /git/system/binutils
> /src/binutils-2.32/ld/testsuite/ld-x86-64/dummy.s -o tmpdir/dummy.o
> Executing on host: sh -c {gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -I/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64 -O2 -g0 -marc
> h=nocona -mtune=core2 -fno-omit-frame-pointer -mfpmath=sse -g -c -O2 -g0 -march=nocona -mtune=core2 -fno-omit-frame-pointer -mfpmath=sse -g -Wa,-mx86-used-note=y
> es -c /git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64/dummy.s -o tmpdir/dummy.o 2>&1} /dev/null ld.tmp (timeout = 300)
> spawn [open ...]
> gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -L=/usr/x86_64-foxkit-linux-musl/lib64 -L=/usr/local/lib64 -L=/lib64 -L=/usr/lib64 -L=/usr/x86_64-foxk
> it-linux-musl/lib -L=/usr/local/lib -L=/lib -L=/usr/lib -o tmpdir/no-plt-1d -L/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64 -static tmpdir/no-plt
> -check1.o tmpdir/no-plt-main1.o tmpdir/no-plt-func1.o tmpdir/no-plt-extern1.o tmpdir/dummy.o
> Executing on host: sh -c {gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -L=/usr/x86_64-foxkit-linux-musl/lib64 -L=/usr/local/lib64 -L=/lib64 -L=/usr
> /lib64 -L=/usr/x86_64-foxkit-linux-musl/lib -L=/usr/local/lib -L=/lib -L=/usr/lib -o tmpdir/no-plt-1d -L/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x8
> 6-64 -static tmpdir/no-plt-check1.o tmpdir/no-plt-main1.o tmpdir/no-plt-func1.o tmpdir/no-plt-extern1.o tmpdir/dummy.o 2>&1} /dev/null ld.tmp (timeout = 300)
> spawn [open ...]
> /git/system/binutils/src/binutils-2.32/ld/../binutils/readelf -Wr tmpdir/no-plt-1d > dump.out
> fail if no difference
> extra regexps in /git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64/no-plt-1d.rd starting with "^[0-9a-f ]+R_X86_64_GLOB_DAT +.*$"
> EOF from dump.out
> /git/system/binutils/src/binutils-2.32/ld/../binutils/objdump -dwrj.text tmpdir/no-plt-1d > dump.out
> regexp_diff match failure
> regexp "^ +[a-f0-9]+: 48 81 f8 ([0-9a-f]{2} ){4}[ ]+cmp \$0x[0-9a-f]+,%rax$"
> line " 6aa: 48 3b 05 3f 19 20 00 cmp 0x20193f(%rip),%rax # 201ff0 <_GLOBAL_OFFSET_TABLE_+0x30>"
> regexp_diff match failure
> regexp "^ +[a-f0-9]+: 4(0|8) c7 c0 ([0-9a-f]{2} ){4}[ ]+(rex |)mov +\$0x[0-9a-f]+,%(e|r)ax$"
> line " 700: 48 8d 05 e9 ff ff ff lea -0x17(%rip),%rax # 6f0 <func>"
> FAIL: No PLT (static 1d)
> gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -I/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64 -O2 -g0 -march=nocona -mtune=core2 -fno
> -omit-frame-pointer -mfpmath=sse -g -c -O2 -g0 -march=nocona -mtune=core2 -fno-omit-frame-pointer -mfpmath=sse -g -Wa,-mx86-used-note=yes -c /git/system/binutils
> /src/binutils-2.32/ld/testsuite/ld-x86-64/dummy.s -o tmpdir/dummy.o
> Executing on host: sh -c {gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -I/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64 -O2 -g0 -marc
> h=nocona -mtune=core2 -fno-omit-frame-pointer -mfpmath=sse -g -c -O2 -g0 -march=nocona -mtune=core2 -fno-omit-frame-pointer -mfpmath=sse -g -Wa,-mx86-used-note=y
> es -c /git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64/dummy.s -o tmpdir/dummy.o 2>&1} /dev/null ld.tmp (timeout = 300)
> spawn [open ...]
> gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -L=/usr/x86_64-foxkit-linux-musl/lib64 -L=/usr/local/lib64 -L=/lib64 -L=/usr/lib64 -L=/usr/x86_64-foxk
> it-linux-musl/lib -L=/usr/local/lib -L=/lib -L=/usr/lib -o tmpdir/no-plt-1d -L/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64 -static tmpdir/no-plt
> -check1.o tmpdir/no-plt-main1.o tmpdir/no-plt-func1.o tmpdir/no-plt-extern1.o tmpdir/dummy.o
> Executing on host: sh -c {gcc -B/git/system/binutils/src/binutils-2.32/ld/tmpdir/ld/ -L=/usr/x86_64-foxkit-linux-musl/lib64 -L=/usr/local/lib64 -L=/lib64 -L=/usr
> /lib64 -L=/usr/x86_64-foxkit-linux-musl/lib -L=/usr/local/lib -L=/lib -L=/usr/lib -o tmpdir/no-plt-1d -L/git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x8
> 6-64 -static tmpdir/no-plt-check1.o tmpdir/no-plt-main1.o tmpdir/no-plt-func1.o tmpdir/no-plt-extern1.o tmpdir/dummy.o 2>&1} /dev/null ld.tmp (timeout = 300)
> spawn [open ...]
> /git/system/binutils/src/binutils-2.32/ld/../binutils/readelf -Wr tmpdir/no-plt-1d > dump.out
> fail if no difference
> extra regexps in /git/system/binutils/src/binutils-2.32/ld/testsuite/ld-x86-64/no-plt-1d.rd starting with "^[0-9a-f ]+R_X86_64_GLOB_DAT +.*$"
> EOF from dump.out
> /git/system/binutils/src/binutils-2.32/ld/../binutils/objdump -dwrj.text tmpdir/no-plt-1d > dump.out
> regexp_diff match failure
> regexp "^ +[a-f0-9]+: 48 81 f8 ([0-9a-f]{2} ){4}[ ]+cmp \$0x[0-9a-f]+,%rax$"
> line " 6aa: 48 3b 05 3f 19 20 00 cmp 0x20193f(%rip),%rax # 201ff0 <_GLOBAL_OFFSET_TABLE_+0x30>"
> regexp_diff match failure
> regexp "^ +[a-f0-9]+: 4(0|8) c7 c0 ([0-9a-f]{2} ){4}[ ]+(rex |)mov +\$0x[0-9a-f]+,%(e|r)ax$"
> line " 700: 48 8d 05 e9 ff ff ff lea -0x17(%rip),%rax # 6f0 <func>"
> FAIL: No PLT (static 1d)
Likely fail on pmmx as well.
1.0-BETA3
https://git.adelielinux.org/adelie/packages/-/issues/169
user/mcpp: CVE-2019-14274: heap-based buffer overflow
2022-11-13T06:54:43Z
Emily
user/mcpp: CVE-2019-14274: heap-based buffer overflow
| | |
| --- | --- |
| Bugzilla ID | 169 |
| Alias(es) | CVE-2019-14274 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-02 18:06:37 -0500 |
| Modified | 2020-06-22 06:12:43 -0500 |
| Status |...
| | |
| --- | --- |
| Bugzilla ID | 169 |
| Alias(es) | CVE-2019-14274 |
| Reporter | Max Rees (sroracle) |
| Assignee | Max Rees (sroracle) |
| Reported | 2019-08-02 18:06:37 -0500 |
| Modified | 2020-06-22 06:12:43 -0500 |
| Status | CONFIRMED |
| Version | 1.0-BETA3 |
| Hardware | Adélie Linux / All |
| Importance | --- / normal |
| Package(s) | user/mcpp |
| URL | https://nvd.nist.gov/vuln/detail/CVE-2019-14274 |
## Description
> MCPP 2.7.2 has a heap-based buffer overflow in the do_msg() function
> in support.c.
1.0-BETA3