Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 03 Oct 2012 13:53:17 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Jason A. Donenfeld" <Jason@...c4.com>, cgit@...mli.net,
        meyering@...hat.com
Subject: Re: cgit: heap buffer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/30/2012 01:21 PM, Jason A. Donenfeld wrote:
> Hey oss-sec,
> 
> The original author and maintainer of cgit, Lars Hjemli, has been
> MIA for the last several months, and nobody I've talked to seems to
> know what's happened. Because I've previously been involved with
> some cgit things, I'm maintaining a tree of my own to which folks
> on the cgit mailing list are now sending patches. It'd be a bit
> presumptuous to call myself the new maintainer, but I am trying to
> keep the project alive and healthy until Lars returns from wherever
> he is.
> 
> Jim Meyering from Redhat has written to the cgit mailing list with
> a detailed analysis and a two line commit fixing a heap buffer
> overflow. At the minimum, it's a denial of service, and in the
> worst case, it might lead to to a remote shell. If anyone has any
> tricks on how to exploit it successfully, I'd be interested to hear
> them.
> 
> You can read his analysis and look at the commit here [1] and a
> Redhat bug report here [2].
> 
> If this oss-sec finds it concerning enough, I can tag a 
> non-Lars-approved release and post links to new tarballs for
> folks. But there's a chance that exploitation isn't feasible, as
> Jim has written in his report, in which case I'd like to hold off
> on making any non-Lars-approved releases for a bit.
> 
> Thanks, Jason
> 
> [1]
> http://git.zx2c4.com/cgit/commit/?id=7757d1b046ecb67b830151d20715c658867df1ec
>
> 
[2] https://bugzilla.redhat.com/show_bug.cgi?id=820733
> 

Please use CVE-2012-4465 for this issue. At a minimum it can lead to a
DoS.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=D+f7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ