Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 476622 - <net-libs/libssh-0.5.5 - possible double free corruption
Summary: <net-libs/libssh-0.5.5 - possible double free corruption
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks: 463328
  Show dependency tree
 
Reported: 2013-07-12 09:38 UTC by Alexander Vershilov (RETIRED)
Modified: 2013-09-18 14:03 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments
Check-for-NULL-pointers-in-channel.c.patch (Check-for-NULL-pointers-in-channel.c.patch,3.13 KB, patch)
2013-07-12 10:39 UTC, Sergey Popov
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Vershilov (RETIRED) gentoo-dev 2013-07-12 09:38:35 UTC
Null pointer doesn't checked in channel.c this may prevent to a null reference deallocation:

https://bugzilla.redhat.com/show_bug.cgi?id=982685#c0


Fixed in:

http://git.libssh.org/projects/libssh.git/commit/?id=11e54e82216e1a07d90f7e4db9572ea96d036350
Comment 1 Sergey Popov gentoo-dev 2013-07-12 10:39:03 UTC
Created attachment 353144 [details, diff]
Check-for-NULL-pointers-in-channel.c.patch

Patch from upstream git
Comment 2 Michael Palimaka (kensington) gentoo-dev 2013-09-12 09:04:26 UTC
Please CC all package maintainers. I will action this shortly.
Comment 3 Michael Palimaka (kensington) gentoo-dev 2013-09-12 09:30:44 UTC
Added 0.5.5 in CVS which contains the fix.
Comment 4 Sergey Popov gentoo-dev 2013-09-12 10:16:48 UTC
(In reply to Michael Palimaka (kensington) from comment #3)
> Added 0.5.5 in CVS which contains the fix.

Good. Is it ready for stabilization? If yes, please CC arches and begin to stabilize it.
Comment 5 Michael Palimaka (kensington) gentoo-dev 2013-09-12 10:52:20 UTC
Arch teams, please test and stabilise net-libs/libssh-0.5.5.

Target KEYWORDS="amd64 ppc ppc64 x86".
Comment 6 Agostino Sarubbo gentoo-dev 2013-09-12 17:38:58 UTC
ppc stable
Comment 7 Agostino Sarubbo gentoo-dev 2013-09-14 08:14:03 UTC
amd64 stable
Comment 8 Agostino Sarubbo gentoo-dev 2013-09-14 10:14:01 UTC
x86 stable
Comment 9 Agostino Sarubbo gentoo-dev 2013-09-14 10:37:15 UTC
ppc64 stable
Comment 10 Sergey Popov gentoo-dev 2013-09-18 05:02:06 UTC
Thanks for your work.

GLSA vote: no
Comment 11 Johannes Huber (RETIRED) gentoo-dev 2013-09-18 05:57:07 UTC
Thanks all. Removing maintainer, nothing to do anymore.

+
+  18 Sep 2013; Johannes Huber <johu@gentoo.org> -libssh-0.5.4.ebuild:
+  Remove vulnerable version wrt bug #476622.
+
Comment 12 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-18 14:03:05 UTC
GLSA vote: no. Closing noglsa.