[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
gEDA-bug: [Bug 700194] Re: gsch2pcb `gnetlist-arg' in project file can lead to arbitrary code execution.
This bug was fixed in the package geda-gaf - 1:1.6.2-1
---------------
geda-gaf (1:1.6.2-1) experimental; urgency=low
* New upstream release.
* Upload to experimental to avoid poisoning freeze exception for 1.6.1-5
* debian/watch: Updated watch file.
* Removed sch2eaglepos_bashism.diff and fix_string_exceptions.diff patches,
as they got applied upstream.
* debian/libgeda38.symbols: Added new symbols
* debian/control:
+ Bumped Standards-Version to 3.9.1
+ Use Breaks instead of Conflicts for geda-symbols (<< 1:1.2.0) and
geda (<= 19990516-1)
* debian/copyright: Updated copyright years
geda-gaf (1:1.6.1-5) unstable; urgency=low
* Added disable_gnetlist-arg.diff patch, to fix arbitrary code execution.
(LP: #700194)
-- ALEFHAHMEEMDAL ALEFLAMMEEMHAHMEEMWAWDALYEH (Ahmed El-Mahmoudy) <aelmahmoudy@xxxxxxxxxx> Wed, 26 Jan 2011 07:51:03 +0200
** Changed in: geda-gaf (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of gEDA Bug
Team, which is a direct subscriber.
https://bugs.launchpad.net/bugs/700194
Title:
gsch2pcb `gnetlist-arg' in project file can lead to arbitrary code
execution.
Status in GPL Electronic Design Automation tools:
Fix Released
Status in âgeda-gafâ package in Ubuntu:
Fix Released
Bug description:
affects geda
tag gsch2pcb
security yes
done
The `--gnetlist-arg' option to gsch2pcb is used to pass arbitrary
arguments to gnetlist. This option can also be provided in a project
file.
This option can allow arbitrary code execution via a maliciously crafted
project file and/or schematics, by several possible vectors.
The most blatant is direct Scheme code execution:
gnetlist-arg "-c (display 'EVIL) (newline)"
Of middling deviousness is execution of Scheme programs disguised as
schematics:
gnetlist-arg -minnocuous.sch
gnetlist-arg -lharmless.sch
Most subtle is manipulation of the Scheme load path via the -L option:
gnetlist-arg -L.
If a file called `gnetlist' is placed in the same directory as
`evil.project' (easily confused with `gnetlistrc' by the hapless user),
it will be loaded in preference to `gnetlist.scm' installed with gEDA
and always loaded during gnetlist initialisation.
These attacks can all be easily reproduced.
Because gsch2pcb project files are usually considered in the minds of
users to be datafiles, this option (which would be fine if present in a
Makefile or some other file normally considered as an executed file) is
a security risk.
Recommended fix: `--gnetlist-arg' option should be disallowed in
gsch2pcb project files. The only "legitimate" gnetlist command-line
option it enables is `-O' (for passing backend options), and none of the
backends used by gsch2pcb currently take any options.
_______________________________________________
geda-bug mailing list
geda-bug@xxxxxxxxxxxxxx
http://www.seul.org/cgi-bin/mailman/listinfo/geda-bug