Bug 911832 (CVE-2014-9471) - VUL-0: CVE-2014-9471: coreutils: memory corruption flaw in parse_datetime()
Summary: VUL-0: CVE-2014-9471: coreutils: memory corruption flaw in parse_datetime()
Status: RESOLVED FIXED
Alias: CVE-2014-9471
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-02-27
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/112055/
Whiteboard: maint:released:sle11-sp3:61492
Keywords:
Depends on:
Blocks:
 
Reported: 2015-01-06 13:00 UTC by Victor Pereira
Modified: 2015-05-19 13:43 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-01-06 13:00:04 UTC
CVE-2014-9471

A memory corruption flaw was reported in parse_datetime(). If an application using parse_datetime(), such as touch or date, accepted untrusted input, it could cause the application to crash or, potentially, execute arbitrary code.


References:

http://debbugs.gnu.org/cgi/bugreport.cgi?msg=11;filename=date-tz-crash.patch;att=1;bug=16872 (proposed patch)
http://seclists.org/oss-sec/2014/q4/782
https://bugzilla.redhat.com/show_bug.cgi?id=1167548
Comment 1 Swamp Workflow Management 2015-01-06 23:00:43 UTC
bugbot adjusting priority
Comment 2 Philipp Thomas 2015-01-07 09:33:58 UTC
debbugs.gnu.org doesn't respond, so I'll have to wait to get the proposed patch, unless someone does have that patch.
Comment 4 Philipp Thomas 2015-01-15 12:27:01 UTC
I already have the patch. It was just a hickup in our network.
Comment 5 Victor Pereira 2015-02-03 12:33:16 UTC
reproducers:


$ touch '--date=TZ="123"345" @1'
$ date '--date=TZ="123"345" @1'
Comment 6 Victor Pereira 2015-02-03 12:34:22 UTC
SLE-11-SP3 is vulnerable as I could test with the reproducers:

vpereira@bragg:~> date '--date=TZ="123"345" @1'
Segmentation fault
Comment 7 Swamp Workflow Management 2015-02-13 09:00:52 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-02-27.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/60668
Comment 14 Philipp Thomas 2015-04-16 05:44:43 UTC
Packages submitted.
Comment 15 Andreas Stieger 2015-04-16 07:23:26 UTC
(In reply to Philipp Thomas from comment #14)
> Packages submitted.

Thank you for the submission. Assigning back to security team.
Comment 17 Swamp Workflow Management 2015-04-28 17:05:42 UTC
SUSE-SU-2015:0792-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 911832,919809
CVE References: CVE-2014-9471
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    coreutils-8.12-6.25.32.33.1
SUSE Linux Enterprise Server 11 SP3 (src):    coreutils-8.12-6.25.32.33.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    coreutils-8.12-6.25.32.33.1