libconfuse: CVE-2022-40320

Related Vulnerabilities: CVE-2022-40320  

Debian Bug report logs - #1019596
libconfuse: CVE-2022-40320

version graph

Reported by: Moritz Mühlenhoff <jmm@inutil.org>

Date: Mon, 12 Sep 2022 20:39:04 UTC

Severity: important

Tags: security, upstream

Found in version libconfuse/3.3-2

Fixed in version libconfuse/3.3-3

Done: Aurelien Jarno <aurel32@debian.org>

Forwarded to https://github.com/libconfuse/libconfuse/issues/163

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Aurelien Jarno <aurel32@debian.org>:
Bug#1019596; Package src:libconfuse. (Mon, 12 Sep 2022 20:39:06 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Mühlenhoff <jmm@inutil.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Aurelien Jarno <aurel32@debian.org>. (Mon, 12 Sep 2022 20:39:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Mühlenhoff <jmm@inutil.org>
To: submit@bugs.debian.org
Subject: libconfuse: CVE-2022-40320
Date: Mon, 12 Sep 2022 22:34:34 +0200
Source: libconfuse
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for libconfuse.

CVE-2022-40320[0]:
| cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based
| buffer over-read.

https://github.com/libconfuse/libconfuse/issues/163
Fixed by: https://github.com/libconfuse/libconfuse/commit/d73777c2c3566fb2647727bb56d9a2295b81669b

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-40320
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40320

Please adjust the affected versions in the BTS as needed.



Reply sent to Aurelien Jarno <aurel32@debian.org>:
You have taken responsibility. (Mon, 12 Sep 2022 21:27:03 GMT) (full text, mbox, link).


Notification sent to Moritz Mühlenhoff <jmm@inutil.org>:
Bug acknowledged by developer. (Mon, 12 Sep 2022 21:27:03 GMT) (full text, mbox, link).


Message #10 received at 1019596-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1019596-close@bugs.debian.org
Subject: Bug#1019596: fixed in libconfuse 3.3-3
Date: Mon, 12 Sep 2022 21:25:21 +0000
Source: libconfuse
Source-Version: 3.3-3
Done: Aurelien Jarno <aurel32@debian.org>

We believe that the bug you reported is fixed in the latest version of
libconfuse, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1019596@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <aurel32@debian.org> (supplier of updated libconfuse package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 12 Sep 2022 23:08:48 +0200
Source: libconfuse
Architecture: source
Version: 3.3-3
Distribution: unstable
Urgency: high
Maintainer: Aurelien Jarno <aurel32@debian.org>
Changed-By: Aurelien Jarno <aurel32@debian.org>
Closes: 993178 1019596
Changes:
 libconfuse (3.3-3) unstable; urgency=high
 .
   * Urgency set to high due to the security issue.
   * Add debian/patches/CVE-2022-40320.patch from upstream to fix a heap-based
     buffer over-read in cfg_tilde_expand (CVE-2022-40320).  Closes: #1019596.
   * Enable hardening flags.  Closes: #993178.
   * Bumped Standards-Version to 4.6.1 (no changes).
Checksums-Sha1:
 67b0915e6086a3291b48dfb3ef766304c9b4126c 2061 libconfuse_3.3-3.dsc
 956a70abccb77b2beb6a08437e241c18bdf4635d 7644 libconfuse_3.3-3.debian.tar.xz
 55bc511eea8a2d931636b755ddb3c2df620bd8cd 5849 libconfuse_3.3-3_source.buildinfo
Checksums-Sha256:
 6b711e4cedfd3f032c921b96ee854fdbbcd7df2160f9d2ffde3a728baee63f7f 2061 libconfuse_3.3-3.dsc
 eee86195d579e2ee121c2404d0014391b9bb3192c1963a8ea2559f921d99eb3b 7644 libconfuse_3.3-3.debian.tar.xz
 ac175a6a19050ac02822b281833f800d21ea8ea4cd512831f7b389965ae34af1 5849 libconfuse_3.3-3_source.buildinfo
Files:
 befc5fb7d2c69d9c4423a16403f135e1 2061 libs optional libconfuse_3.3-3.dsc
 46f4f2e86b1a1f4b721464a2e4e85a46 7644 libs optional libconfuse_3.3-3.debian.tar.xz
 3d1f5f20741b533f808cd0f7c66fda9d 5849 libs optional libconfuse_3.3-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=QQtN
-----END PGP SIGNATURE-----




Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 13 Sep 2022 04:24:06 GMT) (full text, mbox, link).


Marked as found in versions libconfuse/3.3-2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 13 Sep 2022 04:24:07 GMT) (full text, mbox, link).


Set Bug forwarded-to-address to 'https://github.com/libconfuse/libconfuse/issues/163'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 13 Sep 2022 04:24:07 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Tue Sep 13 13:20:29 2022; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.