Issue metadata
Sign in to add a comment
|
CrOS: Vulnerability reported in net-misc/wget |
||||||||||||||||||||||
Issue descriptionAutomated analysis has detected that the following third party packages have had vulnerabilities publicly reported. NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package. Package Name: net-misc/wget Package Version: [cpe:/a:gnu:wget:1.17.1 cpe:/a:gnu:wget:1.19.1] Advisory: CVE-2017-13089 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-13089 CVSS severity score: 9.3/10.0 Confidence: high Description: The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. Advisory: CVE-2017-13090 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-13090 CVSS severity score: 9.3/10.0 Confidence: high Description: The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.
,
Nov 21 2017
Mike, upstream has 1.19.2 still masked as unstable: https://packages.gentoo.org/packages/net-misc/wget How do we usually handle that situation?
,
Nov 21 2017
we don't care about upstream keyword status. we take whatever works for us. this should be fixed via: https://chromium-review.googlesource.com/780780
,
Nov 22 2017
,
Dec 15 2017
,
Dec 15 2017
This bug requires manual review: M64 has already been promoted to the beta branch, so this requires manual review Please contact the milestone owner if you have questions. Owners: cmasso@(Android), cmasso@(iOS), kbleicher@(ChromeOS), abdulsyed@(Desktop) For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Jan 17 2018
,
Jan 30 2018
This has already been merged in M64.
,
Feb 28 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Mar 27 2018
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by kerrnel@chromium.org
, Nov 21 2017Components: OS>Packages
Labels: M-64 Security_Severity-High Security_Impact-Stable
Status: Available (was: Untriaged)