|
Message-ID: <1828157696.494253.1360590449549.JavaMail.root@redhat.com> Date: Mon, 11 Feb 2013 08:47:29 -0500 (EST) From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security@...ts.openwall.com Cc: Josselin Mouette <joss@...ian.org> Subject: Re: CVE request: Transmission can be made to crash remotely Hello Yves-Alexis, to follow up on this one. The source of the issue seems to be underlying libutp code: [1] https://trac.transmissionbt.com/ticket/5002#comment:22 more specifically the way how libutp (previously) handled selective acknowledgements, which resulted in following two (libutp) patches: [2] https://github.com/bittorrent/libutp/issues/38 [3] https://github.com/bittorrent/libutp/issues/37 Transmission upstream corrected this issue in v2.74: [4] https://trac.transmissionbt.com/query?milestone=2.74&group=component&order=severity with the following patch: [5] https://trac.transmissionbt.com/changeset/13646 Ad assigning CVE ids - I think one CVE id is enough. The problem is in libutp code, and Transmission upstream seems to commit their own change only due to libutp (un)responsiveness: [6] https://trac.transmissionbt.com/ticket/5002#comment:32 Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team P.S.: All the links from above at one place are at: [7] https://bugzilla.redhat.com/show_bug.cgi?id=909934 ----- Original Message ----- On dim., 2013-02-10 at 11:50 +0100, Josselin Mouette wrote: > Package: transmission-daemon > Version: 2.52-3 > Severity: grave > Tags: security patch upstream > Justification: user security hole > > The transmission-daemon package in wheezy crashes regularly. According > to upstream this is a remote security hole (at least a remote DoS, but > most probably there is a way to take control of the process). > > https://trac.transmissionbt.com/ticket/5044 > https://trac.transmissionbt.com/ticket/5002 > > Apparently there is no CVE assigned. The bug is fixed upstream and I’m > attaching the patch. I’m currently testing a patched package, and will > report whether the fix is sufficient. > > Could a CVE be assigned for this? > > Thanks in advance, > -- > Yves-Alexis
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.