Bugzilla – Bug 1214771
VUL-0: CVE-2023-40890: zbar: stack-based buffer overflow vulnerability exists in the lookup_sequence function
Last modified: 2024-05-29 12:19:45 UTC
CVE-2023-40890 A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. https://hackmd.io/@cspl/H1PxPAUnn References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40890 https://bugzilla.redhat.com/show_bug.cgi?id=2235858 https://www.cve.org/CVERecord?id=CVE-2023-40890 https://hackmd.io/@cspl/H1PxPAUnn
There is no upstream commit reference. Waiting for information here: https://github.com/mchehab/zbar/issues/263
No change in upstream bug.
No news in upstream bug.
Created attachment 871377 [details] POC I asked the CVE reporters to send me the POC or publish it, since it was private up to know. I attached it to the bug and they updated their blogpost to include it as well.
SUSE-SU-2023:4948-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1214770, 1214771 CVE References: CVE-2023-40889, CVE-2023-40890 Sources used: openSUSE Leap 15.3 (src): zbar-0.23.1-150300.3.3.1 openSUSE Leap 15.4 (src): zbar-0.23.1-150300.3.3.1 openSUSE Leap 15.5 (src): zbar-0.23.1-150300.3.3.1 Desktop Applications Module 15-SP5 (src): zbar-0.23.1-150300.3.3.1 SUSE Package Hub 15 15-SP5 (src): zbar-0.23.1-150300.3.3.1 SUSE Linux Enterprise Real Time 15 SP4 (src): zbar-0.23.1-150300.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done, closing