Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <506C97AD.50707@redhat.com>
Date: Wed, 03 Oct 2012 13:53:17 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Jason A. Donenfeld" <Jason@...c4.com>, cgit@...mli.net,
        meyering@...hat.com
Subject: Re: cgit: heap buffer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/30/2012 01:21 PM, Jason A. Donenfeld wrote:
> Hey oss-sec,
> 
> The original author and maintainer of cgit, Lars Hjemli, has been
> MIA for the last several months, and nobody I've talked to seems to
> know what's happened. Because I've previously been involved with
> some cgit things, I'm maintaining a tree of my own to which folks
> on the cgit mailing list are now sending patches. It'd be a bit
> presumptuous to call myself the new maintainer, but I am trying to
> keep the project alive and healthy until Lars returns from wherever
> he is.
> 
> Jim Meyering from Redhat has written to the cgit mailing list with
> a detailed analysis and a two line commit fixing a heap buffer
> overflow. At the minimum, it's a denial of service, and in the
> worst case, it might lead to to a remote shell. If anyone has any
> tricks on how to exploit it successfully, I'd be interested to hear
> them.
> 
> You can read his analysis and look at the commit here [1] and a
> Redhat bug report here [2].
> 
> If this oss-sec finds it concerning enough, I can tag a 
> non-Lars-approved release and post links to new tarballs for
> folks. But there's a chance that exploitation isn't feasible, as
> Jim has written in his report, in which case I'd like to hold off
> on making any non-Lars-approved releases for a bit.
> 
> Thanks, Jason
> 
> [1]
> http://git.zx2c4.com/cgit/commit/?id=7757d1b046ecb67b830151d20715c658867df1ec
>
> 
[2] https://bugzilla.redhat.com/show_bug.cgi?id=820733
> 

Please use CVE-2012-4465 for this issue. At a minimum it can lead to a
DoS.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=D+f7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.