Bug 222637 (CVE-2007-0235)

Summary: CVE-2007-0235 Stack overflow libgtop when pathname of mmap()-ed file is too long
Product: [Other] Security Response Reporter: Lubomir Kundrak <lkundrak>
Component: vulnerabilityAssignee: Søren Sandmann Pedersen <sandmann>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: kem
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: https://launchpad.net/ubuntu/+source/libgtop2/+bug/79206
Whiteboard:
Fixed In Version: 2.14.9-1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-08-08 14:39:26 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 222638    
Attachments:
Description Flags
Patch for Gnome bug #396477 libgtop buffer overflow none

Description Lubomir Kundrak 2007-01-15 13:30:19 UTC
Description of problem:

Stack based buffer overflow occurs, when gnome-system monitor is launched
while process that has a file with too long filename mapped in its address
space (visible via /proc/$PID/maps), and could potentially lead to arbitrary
code execution (mitigated by SSP).

Version-Release number of selected component (if applicable):

At least FC6 and RHEL5 libgtop2.

How reproducible:

Always.

Steps to Reproduce:

# Create a file with too long pathname. Some filesystems limit filenames
# to 255 characters, so use a deep directory hierarchy instead
export dir=$(perl -e " print 's/'x1000;")
mkdir -p $dir

# Copy a binary image thata will get mapped upon execution there and run it.
# Sleep will harmlessly run for some time...
cp /bin/sleep $dir
$dir/sleep 100 &

# Run system monitor while the program is running
gnome-system-monitor

Actual results:

*** stack smashing detected ***: gnome-system-monitor terminated

Expected results:

Gnome-system-monitor should help us on our way to salvation,
eternal and everlasting love and peace.

Additional info:

Patch from upstream is available, see the upstream BTS:
http://bugzilla.gnome.org/show_bug.cgi?id=396477
http://bugzilla.gnome.org/attachment.cgi?id=80254&action=view

Comment 1 Lubomir Kundrak 2007-01-15 13:30:19 UTC
Created attachment 145571 [details]
Patch for Gnome bug #396477 libgtop buffer overflow

Comment 2 Josh Bressers 2007-01-25 19:19:29 UTC
This flaw also affects FC5

Comment 3 Lubomir Kundrak 2007-08-02 12:14:30 UTC
Sandmann: Please push the updated package into FC6.