GNU bug report logs -
#28350
CVE-2017-14482: enriched.el code execution
Previous Next
Reported by: charles <at> aurox.ch (Charles A. Roelli)
Date: Mon, 4 Sep 2017 19:26:01 UTC
Severity: important
Tags: security
Found in versions 25.1, 23.1, 21.4, 23.2, 21.2, 22.3, 24.3, 21.1, 21.3, 24.1, 24.5, 25.2, 24.2, 23.4, 22.1, 23.3, 24.4, 22.2
Fixed in version 25.3
Done: Eli Zaretskii <eliz <at> gnu.org>
Bug is archived. No further changes may be made.
Full log
View this message in rfc822 format
[Message part 1 (text/plain, inline)]
> Date: Sat, 09 Sep 2017 19:55:37 +0300
> From: Eli Zaretskii <eliz <at> gnu.org>
> CC: 28350 <at> debbugs.gnu.org
>
> > > > +See Info node `(elisp)Display Property' for the use of these
> > > > +display specifications."
> > > > + (ignore-errors
> > > > + (or (stringp prop)
> > > ^^^^^^^^^^^^
> > > What about an image spec (including a slice spec)?
> >
> > Okay, I see that image specs can be safe. But are they all safe?
>
> I think they are. Does anyone know different?
I read over the documentation some more and they do look alright.
> > And I don't understand how a slice spec is used together with an image
> > spec. Is the slice spec used inside of IMAGE-PROPS, i.e. as you might
> > gather from the manual:
> >
> > ‘(image . IMAGE-PROPS)’
> > This kind of display specification is an image descriptor (*note
> > Images). When used as a display specification, it means to
> > display the image instead of the text that has the display
> > specification.
> >
> > ‘(slice X Y WIDTH HEIGHT)’
> > This specification together with ‘image’ specifies a “slice” (a
> > partial area) of the image to display.
> >
> > ?
>
> AFAIU, like this:
>
> ((slice X Y WIDTH HEIGHT) (image . IMAGE-PROPS))
>
> You can see examples of this in image.el and image-mode.el.
Thanks. I forgot that the display property can be set to a list or
vector of display specifications. I've updated the patch to reflect
this:
+ (and (seqp prop) (seq-every-p 'enriched-display-prop-safe-p prop)))))
and I've added slice/image specifications.
> > At this point it seems that unsafe display specs are more the
> > exception than the rule, so it might make sense to define the
> > `enriched-display-prop-safe-p' function by excluding the unsafe
> > specifications instead of including the safe ones. What do you
> > think?
>
> I'm not sure. The display spec can be complex, so to make sure none
> of these exceptions sneak through, you will have to recursively unpack
> the spec data structure and examine each of the elements, which smells
> too similar to emulating 'eval'. No?
Thank you. I've kept the current approach. Please see again the
attached patch.
Also, should the left-fringe/right-fringe display specifications be
considered safe? They seem innocuous.
[0001-Prevent-code-execution-by-text-enriched-files-Bug-28.patch (text/x-patch, attachment)]
This bug report was last modified 7 years and 245 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.