New issue
Advanced search Search tips

Issue 831537 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
Closed: Apr 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug-Security



Sign in to add a comment

CrOS: Vulnerability reported in net-misc/curl

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Apr 11 2018

Issue description

Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported. 

NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.

Package Name: net-misc/curl
Package Version: [cpe:/a:curl:curl:7.51.0 cpe:/a:curl:libcurl:7.51.0 cpe:/a:haxx:curl:7.51.0 cpe:/a:haxx:libcurl:7.51.0]

Advisory: CVE-2016-9952
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-9952
  CVSS severity score: 6.8/10.0
  Confidence: high
  Description:

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."
Advisory: CVE-2016-9953
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-9953
  CVSS severity score: 7.5/10.0
  Confidence: high
  Description:

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.


 

Comment 1 by xzhou@chromium.org, Apr 11 2018

Components: OS>Kernel
Currently, CrOS is using 7.58 which is not affected by those bugs.

Comment 2 by xzhou@chromium.org, Apr 11 2018

Labels: Security_Impact-None Security_Severity-Low
Assigned to severity low because CrOS should not be affected. 

Comment 3 by groeck@chromium.org, Apr 11 2018

Why is this tagged as kernel bug ? Please explain.


Comment 4 by grundler@google.com, Apr 11 2018

Cc: briannorris@chromium.org manojgupta@chromium.org mnissler@chromium.org
Components: -OS>Kernel OS>Packages
Guenter - No good deed goes unpunished. :)

My guess is it's directed to OS>Kernel mostly because our group handles most of the user space packages as well (update engine, metrics, recovery, etc).

I've redirected to OS > Packages and cc'd the last three people to touch curl package. It seems to be as simple as bumping the curl version to a newer one.
Labels: M-65 M-66
Owner: briannorris@chromium.org
Status: Fixed (was: Untriaged)
More importantly: why is a CVE from years ago just being reported against a version of curl that we are no longer shipping? I upgraded in  bug 811049 .

Comment 6 by groeck@chromium.org, Apr 11 2018

#5: Vomit re-evaluates CVEs if/when they are updated, and the CVEs were updated yesterday. Also, Vomit doesn't know anything about package versions used internally.
Project Member

Comment 7 by sheriffbot@chromium.org, Apr 12 2018

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 8 by sheriffbot@chromium.org, Jul 19

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment