Bug 13902

Summary: [CVE 21] mujs 1.3.3 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: blocker    
Priority: Highest CC: a.proklov, e.kosachev, pastordidi, s.matveev, v.potapov, y.tumanov
Version: AllFlags: v.potapov: qa_verified+
y.tumanov: secteam_verified+
a.proklov: published+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2016-10141, CVE-2016-9294, CVE-2017-5627, CVE-2017-5628,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:
Attachments: mu1.png

Description Yury 2023-10-18 20:28:51 MSK
Please patch CVEs for package mujs version 1.3.3
  
INFO (CVEs are): mujs 1.3.3
 cves found
CVE-2016-10141
Desc: An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.
Link: https://nvd.nist.gov/vuln/detail/CVE-2016-10141
Severity: CRITICAL
CVE-2016-9294
Desc: Artifex Software, Inc. MuJS before 5008105780c0b0182ea6eda83ad5598f225be3ee allows context-dependent attackers to conduct "denial of service (application crash)" attacks by using the "malformed labeled break/continue in JavaScript" approach, related to a "NULL pointer dereference" issue affecting the jscompile.c component.
Link: https://nvd.nist.gov/vuln/detail/CVE-2016-9294
Severity: HIGH
CVE-2017-5627
Desc: An issue was discovered in Artifex Software, Inc. MuJS before 4006739a28367c708dea19aeb19b8a1a9326ce08. The jsR_setproperty function in jsrun.c lacks a check for a negative array length. This leads to an integer overflow in the js_pushstring function in jsrun.c when parsing a specially crafted JS file.
Link: https://nvd.nist.gov/vuln/detail/CVE-2017-5627
Severity: HIGH
CVE-2017-5628
Desc: An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10a0af68e56d5c00720523ebcba13c2e6a. The MakeDay function in jsdate.c does not validate the month, leading to an integer overflow when parsing a specially crafted JS file.
Link: https://nvd.nist.gov/vuln/detail/CVE-2017-5628
Severity: HIGH
Comment 1 Vladimir Potapov 2023-10-20 17:57:45 MSK
*** Bug 13770 has been marked as a duplicate of this bug. ***
Comment 2 Aleksandr Proklov 2023-10-24 11:45:40 MSK
CVE-2016-10141 закрыто в версии 1.3.3
CVE-2016-9294 закрыто в версии 1.3.3
CVE-2017-5627 закрыто в версии 1.3.3
CVE-2017-5628 закрыто в версии 1.3.3

Добавил в спек инфу что эти уязвимости закрыты.

mujs	1.3.3-2

https://abf.io/build_lists/4760903
https://abf.io/build_lists/4760904
https://abf.io/build_lists/4760905
https://abf.io/build_lists/4760906
https://abf.io/build_lists/4760907
Comment 3 Yury 2023-10-24 16:50:39 MSK
secteam_verified
Comment 4 Dmitry Postnikov 2023-10-25 14:42:39 MSK
Created attachment 5970 [details]
mu1.png

Чего-то он не работает. Пытаюсь скомпилить с примером с сайта mujs, и никак. Куча ошибок и выход с кодом 1.
Comment 5 Aleksandr Proklov 2023-10-26 05:42:15 MSK
регрессии нет :) в репах эта же версия наверное. до 1.3.3 обновлял Стефанов, было ли оно проведено в репы или просто только в гите обновлено - я не знаю.
Comment 6 Aleksandr Proklov 2023-10-26 05:48:28 MSK
$ mujs -i

будет консоль, в ней чота работает, на вид нормально.
Comment 7 Dmitry Postnikov 2023-10-26 11:41:16 MSK
Да, регрессий нет. В консоли пашет.

*****************************
Обновление отослано в Тестинг
Comment 8 Vladimir Potapov 2023-11-01 17:36:39 MSK
mujs-1.3.3-2
https://abf.io/build_lists/4760903
https://abf.io/build_lists/4760904
https://abf.io/build_lists/4760905
https://abf.io/build_lists/4760906
https://abf.io/build_lists/4760907
****************************** Advisory **************************
Add to spec fixed CVEs info 
******************************************************************
QA Verified