Bug 2166544 - shadow-utils: uncontrolled process operation may result in a null pointer dereference
Summary: shadow-utils: uncontrolled process operation may result in a null pointer der...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2166545 2166546 2166547 2166548 2166549 2166550
Blocks: 2166312
TreeView+ depends on / blocked
 
Reported: 2023-02-02 06:02 UTC by Sandipan Roy
Modified: 2023-02-20 14:52 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An uncontrolled process operation was found in the newgrp command provided by the shadow-utils package. This issue could cause the execution of arbitrary code provided by a user when running the newgrp command.
Clone Of:
Environment:
Last Closed: 2023-02-08 07:28:46 UTC
Embargoed:


Attachments (Terms of Use)

Description Sandipan Roy 2023-02-02 06:02:12 UTC
In variadic functions we still do the cast. In POSIX, it's not necessary, since NULL is required to be of type 'void *', and 'void *' is guaranteed to have the same alignment and representation as 'char *'. However, since ISO C still doesn't mandate that, and moreover they're doing dubious stuff by adding nullptr, let's be on the cautious side. Also, C++ requires that NULL is not 'void *', but either plain 0 or some magic stuff.

Reference:

https://github.com/shadow-maint/shadow/pull/642
https://codeql.github.com/codeql-query-help/cpp/cpp-uncontrolled-process-operation/

Comment 1 Sandipan Roy 2023-02-02 06:09:17 UTC
Created shadow-utils tracking bugs for this issue:

Affects: fedora-36 [bug 2166547]
Affects: fedora-37 [bug 2166548]

Comment 3 Marian Rehak 2023-02-20 14:52:52 UTC
CVE-2023-0634 rejected now removing from flaw


Note You need to log in before you can comment on or make changes to this bug.