Bug 1171685 (CVE-2020-12825) - VUL-0: CVE-2020-12825: libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c
Summary: VUL-0: CVE-2020-12825: libcroco: Stack overflow in function cr_parser_parse_a...
Status: RESOLVED FIXED
Alias: CVE-2020-12825
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/259526/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-12825:7.1:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-05-14 15:00 UTC by Alexandros Toptsoglou
Modified: 2024-05-07 11:30 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
poc (29.90 KB, text/plain)
2020-05-14 15:09 UTC, Alexandros Toptsoglou
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2020-05-14 15:00:37 UTC
CVE-2020-12825

libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.

Upstream issue:

https://gitlab.gnome.org/GNOME/libcroco/-/issues/8

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1835377
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12825
Comment 1 Alexandros Toptsoglou 2020-05-14 15:06:04 UTC
tracked as affected all codestreams. That are: 

SLE10-SP3
SLE11
SLE12
SLE12-SP2
SLE15 
Factory 

The issue is only reproducible with ASAN. To reproduce:

checkout the coresponding codestream
tar xf $tarball
cd in the libcroco directory
CFLAGS="-O2 -fsanitize=address" ./configure
make 
export LD_LIBRARY_PATH="./src/.libs"
./csslint/.libs/csslint-0.6 path to POC

OUTPUT similar to: 

==13359==ERROR: AddressSanitizer: stack-overflow on address 0x7fff14586ff8 (pc 0x7f457465bdc4 bp 0x7fff145870a0 sp 0x7fff14587000 T0)
    #0 0x7f457465bdc3  (/usr/lib64/libasan.so.4+0xeadc3)
    #1 0x7f457459b440  (/usr/lib64/libasan.so.4+0x2a440)
    #2 0x7f457464d4db in malloc (/usr/lib64/libasan.so.4+0xdc4db)
    #3 0x7f4573ffb88f in g_try_malloc (/usr/lib64/libglib-2.0.so.0+0x5388f)
    #4 0x7f45742f203a in cr_token_new (src/.libs/libcroco-0.6.so.3+0x3303a)
    #5 0x7f45742f6aa6 in cr_tknzr_get_next_token (src/.libs/libcroco-0.6.so.3+0x37aa6)
    #6 0x7f4574304432 in cr_parser_parse_any_core (src/.libs/libcroco-0.6.so.3+0x45432)
    #7 0x7f45743048c9 in cr_parser_parse_any_core (src/.libs/libcroco-0.6.so.3+0x458c9)
    #8 0x7f45743048c9 in cr_parser_parse_any_core (src/.libs/libcroco-0.6.so.3+0x458c9)
    #9 0x7f45743048c9 in cr_parser_parse_any_core (src/.libs/libcroco-0.6.so.3+0x458c9)
Comment 2 Alexandros Toptsoglou 2020-05-14 15:09:04 UTC
Created attachment 837796 [details]
poc
Comment 3 Michael Gorse 2021-08-16 20:53:30 UTC
I've added the patch for factory, but the relevant sources are now part of gnome-shell, and the original package is no longer maintained, so it should probably go away in the future. Rawhide already has it deleted.
Comment 6 Swamp Workflow Management 2021-09-16 22:17:38 UTC
# maintenance_jira_update_notice
openSUSE-SU-2021:3123-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1171685
CVE References: CVE-2020-12825
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    libcroco-0.6.13-3.3.1
Comment 7 Swamp Workflow Management 2021-09-16 22:19:01 UTC
# maintenance_jira_update_notice
SUSE-SU-2021:3123-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1171685
CVE References: CVE-2020-12825
JIRA References: 
Sources used:
SUSE MicroOS 5.0 (src):    libcroco-0.6.13-3.3.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    libcroco-0.6.13-3.3.1
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    libcroco-0.6.13-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2021-09-16 22:21:58 UTC
# maintenance_jira_update_notice
SUSE-SU-2021:14800-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1171685
CVE References: CVE-2020-12825
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    libcroco-0.6.1-122.9.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    libcroco-0.6.1-122.9.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    libcroco-0.6.1-122.9.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    libcroco-0.6.1-122.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2021-09-21 20:54:37 UTC
# maintenance_jira_update_notice
openSUSE-SU-2021:1294-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1171685
CVE References: CVE-2020-12825
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    libcroco-0.6.13-lp152.2.3.1
Comment 10 Swamp Workflow Management 2022-08-26 13:22:13 UTC
SUSE-SU-2022:2909-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1171685
CVE References: CVE-2020-12825
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    libcroco-0.6.11-12.6.45
SUSE OpenStack Cloud 9 (src):    libcroco-0.6.11-12.6.45
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    libcroco-0.6.11-12.6.45
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    libcroco-0.6.11-12.6.45
SUSE Linux Enterprise Server 12-SP5 (src):    libcroco-0.6.11-12.6.45
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    libcroco-0.6.11-12.6.45
SUSE Linux Enterprise Server 12-SP3-BCL (src):    libcroco-0.6.11-12.6.45
SUSE Linux Enterprise Server 12-SP2-BCL (src):    libcroco-0.6.11-12.6.45

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2022-10-04 13:23:40 UTC
SUSE-SU-2022:3493-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1171685
CVE References: CVE-2020-12825
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise Server for SAP 15 (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise Server 15-SP1-BCL (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise Server 15-LTSS (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    libcroco-0.6.12-150000.4.6.2
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    libcroco-0.6.12-150000.4.6.2
SUSE Enterprise Storage 6 (src):    libcroco-0.6.12-150000.4.6.2
SUSE CaaS Platform 4.0 (src):    libcroco-0.6.12-150000.4.6.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.