Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 456822 (CVE-2012-6129) - <net-p2p/transmission-2.77: Stack-based buffer overflow (DoS) when processing acknowledgements (CVE-2012-6129)
Summary: <net-p2p/transmission-2.77: Stack-based buffer overflow (DoS) when processing...
Status: RESOLVED FIXED
Alias: CVE-2012-6129
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
: 459140 (view as bug list)
Depends on:
Blocks:
 
Reported: 2013-02-11 18:10 UTC by Agostino Sarubbo
Modified: 2013-08-22 10:48 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-02-11 18:10:17 UTC
From ${URL} :

A stack-based buffer overflow flaw was found in the way Transmission, a free, lightweight 
BitTorrent client, performed connection acknowledgements processing. A remote attacker could issue 
a specially-crafted request that, when processed would lead to transmission-daemon crash.

Upstream ticket:
[1] https://trac.transmissionbt.com/ticket/5002

Source of the problem:
[2] https://trac.transmissionbt.com/ticket/5002#comment:22

Libutp patches:
[3] https://github.com/bittorrent/libutp/issues/38
[4] https://github.com/bittorrent/libutp/issues/37

Relevant transmission upstream patch:
[5] https://trac.transmissionbt.com/changeset/13646

Other references:
[6] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700234
[7] http://www.openwall.com/lists/oss-security/2013/02/10/2
Comment 1 Jeroen Roovers (RETIRED) gentoo-dev 2013-02-25 16:33:51 UTC
*** Bug 459140 has been marked as a duplicate of this bug. ***
Comment 2 Samuli Suominen (RETIRED) gentoo-dev 2013-02-26 06:52:42 UTC
jer@ What made you put <2.74 to $summary? It's version 2.77 which should fix this, not the 2.76 which is already in Portage.
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2013-02-26 14:35:47 UTC
Because https://trac.transmissionbt.com/ticket/5002 (comments 32-4) says it was noticed in 2.61 and fixed in 2.74. Please correct me if I'm wrong.
Comment 4 jospezial 2013-02-26 16:20:12 UTC
In https://bugs.gentoo.org/show_bug.cgi?id=459140 I wrote 2.77 is released.
Why don't you let it in the tree then you can throw the buggy versions away and all is fine.
Perhaps 2.77 should get the stable flag.
Comment 5 Samuli Suominen (RETIRED) gentoo-dev 2013-02-26 17:44:40 UTC
@jer okay, thanks for clarifying

since current stable is .73 we can use this bug to stablize .77 which is now in portage

please test and stabilize:

=net-p2p/transmission-2.77
Comment 6 Sergey Popov gentoo-dev 2013-02-27 01:33:56 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2013-02-27 18:53:49 UTC
x86 stable
Comment 8 Jeroen Roovers (RETIRED) gentoo-dev 2013-02-27 21:34:34 UTC
...
Comment 9 Agostino Sarubbo gentoo-dev 2013-02-27 22:34:58 UTC
(In reply to comment #8)
> ...

I don't know what your three points mean. The rule is:

"<" "$package" "-" "$version" where $version is the first unaffected version in the main tree. Where do you see the 2.74 in the tree?

Keywords for net-p2p/transmission:
        |                           | u   |  
        | a a             p     s   | n   |  
        | l m   h i m m   p s   p   | u s | r
        | p d a p a 6 i p c 3   a x | s l | e
        | h 6 r p 6 8 p p 6 9 s r 8 | e o | p
        | a 4 m a 4 k s c 4 0 h c 6 | d t | o
--------+---------------------------+-----+-------
   2.73 | o + ~ o o o o + + o o o + | o 0 | gentoo
   2.76 | o ~ ~ o o o o ~ ~ o o o ~ | #   | gentoo
[I]2.77 | o + ~ o o o o ~ ~ o o o + | o   | gentoo

If you don't know please don't touch.
Comment 10 Jeroen Roovers (RETIRED) gentoo-dev 2013-02-28 02:50:04 UTC
OK, I'll apply your rule then...
Comment 11 Samuli Suominen (RETIRED) gentoo-dev 2013-02-28 07:54:02 UTC
Agostino, Jeroen: If you look at history of bug 457792 where 0.100.1 is still in tree but not meant to be stabilized and 0.100.2 is the stabilization target. Both are fixed for the security bug. It seems you guys, at least Agostino, are conflicting the very same policies referred here
Anyway, this is offtopic in this bug, but please fix the policy
Comment 12 Agostino Sarubbo gentoo-dev 2013-02-28 09:13:35 UTC
(In reply to comment #10)
> OK, I'll apply your rule then...

I guess it was obvious that is the first stable unaffected.
Comment 13 Agostino Sarubbo gentoo-dev 2013-02-28 10:09:58 UTC
ppc stable
Comment 14 Agostino Sarubbo gentoo-dev 2013-02-28 10:13:58 UTC
ppc64 stable
Comment 15 Sean Amoss (RETIRED) gentoo-dev Security 2013-02-28 10:50:32 UTC
Thank you all for adding 6 extra useless emails to my inbox. Now, please stop modifying this bug unless you are in the "Assigned to" field above. 

GLSA vote: no.
Comment 16 GLSAMaker/CVETool Bot gentoo-dev 2013-04-11 17:02:13 UTC
CVE-2012-6129 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6129):
  Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission
  before 2.74 and possibly other products, allows remote attackers to cause a
  denial of service (crash) and possibly execute arbitrary code via crafted
  "micro transport protocol packets."
Comment 17 Sergey Popov gentoo-dev 2013-08-22 10:48:23 UTC
GLSA vote: no

Closing as noglsa