oss-sec mailing list archives

Re: cgit: heap buffer overflow


From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 03 Oct 2012 13:53:17 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/30/2012 01:21 PM, Jason A. Donenfeld wrote:
Hey oss-sec,

The original author and maintainer of cgit, Lars Hjemli, has been
MIA for the last several months, and nobody I've talked to seems to
know what's happened. Because I've previously been involved with
some cgit things, I'm maintaining a tree of my own to which folks
on the cgit mailing list are now sending patches. It'd be a bit
presumptuous to call myself the new maintainer, but I am trying to
keep the project alive and healthy until Lars returns from wherever
he is.

Jim Meyering from Redhat has written to the cgit mailing list with
a detailed analysis and a two line commit fixing a heap buffer
overflow. At the minimum, it's a denial of service, and in the
worst case, it might lead to to a remote shell. If anyone has any
tricks on how to exploit it successfully, I'd be interested to hear
them.

You can read his analysis and look at the commit here [1] and a
Redhat bug report here [2].

If this oss-sec finds it concerning enough, I can tag a 
non-Lars-approved release and post links to new tarballs for
folks. But there's a chance that exploitation isn't feasible, as
Jim has written in his report, in which case I'd like to hold off
on making any non-Lars-approved releases for a bit.

Thanks, Jason

[1]
http://git.zx2c4.com/cgit/commit/?id=7757d1b046ecb67b830151d20715c658867df1ec


[2] https://bugzilla.redhat.com/show_bug.cgi?id=820733


Please use CVE-2012-4465 for this issue. At a minimum it can lead to a
DoS.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iQIcBAEBAgAGBQJQbJetAAoJEBYNRVNeJnmTWr4QANV6yzu71fCtmPOzZVNDaO+I
S8vN1e94W2I24nKsECghzNIrY0wOI9PDkGsjoDf2FBNwAejLs1LdUp76nuGOEEzd
JfDSqTzXkaAIM+Vv/aFXNyyVWXiVW+PrQM4tH2Jis75Mu6b/BB/BqVBwjneyJKlJ
7P9+3Ffmot5ObSHgHJuJm9Q5aKtv20QihrQ1pXYW7PTcCbU688LNVaaRnwudZakv
B/PMaLAer4skwiSdkOV+pWKIHkhn9oer1l9eY8r9a/woBOTNg81HYgvdVkaqSNyo
KnJDR9xvs4Aao2294rzsrjpbQiWztpdUtSJuxRrJ0yP4YfcxYRiktIAboJ2c1JL1
4mE0Iw4kbnQQpEoWOU4Ay6Qlm0a3nl1ecoTkhwKFLP0iZy20EjMyG+CiD+oQaJjp
7HzSDkNxpYR4uJQ7xP73RERvTP9K1E9UBkWCaDCYxzmt3YLFcMSbZN2SRLAqSCDd
X52Tq8iivTjO38FMSM0ag/2TRrAf1zmE/aOEe6i4OgvvFxnjr2RsNJHLu/OMBuq3
B+ZY1LqiVuTXTsoSU+4UKHzy7fxYO83rYs+OT/5MCZPJayqSbf51913r9M/SnrHi
usaE2s4alytXHAZ9sTp8pI/I2ODP9zk2MphRFPZ57ByfByeAJEkaALs9SRg0ly7L
EZgH4fTDZAZRHyUFgXMR
=D+f7
-----END PGP SIGNATURE-----


Current thread: