Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 109040 - net-libs/libwww DoS issue (CAN-2005-3183)
Summary: net-libs/libwww DoS issue (CAN-2005-3183)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/bugzilla/...
Whiteboard: A3 [noglsa]
Keywords:
Depends on: 110746
Blocks:
  Show dependency tree
 
Reported: 2005-10-12 12:01 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2006-11-11 19:22 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
Slightly modified htbound patch (libwww-5.4.0-htbound.patch,13.35 KB, patch)
2005-10-27 18:39 UTC, Goyo Roth
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-10-12 12:01:17 UTC
DoS issue in HTBound.c. See RH bug for details.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-10-13 01:19:34 UTC
New HTBound.c was posted on the RH bug.
text-markup herd: please bump with new file or advise.
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-10-21 23:51:42 UTC
solar/vapier/taviso/tigger any chance you could apply this. I guess we don't 
want to mask this one. 
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2005-10-26 07:28:02 UTC
leonardop should have a look soon.
Comment 4 Leonardo Boshell (RETIRED) gentoo-dev 2005-10-26 12:43:17 UTC
I have no problem committing a new patch including the new HTBound.c file.

However, I would like to receive some confirmation that this new file has been
audited and seems to be fine. From what I've seen, it hasn't made it to any RPM
distributed by Fedora/RedHat and the RH bug report doesn't contain details about
the code being inspected/approved, so I don't want to blindly commit a patch for
a security bug.

Maybe one of our security guys can check it out?
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=118820
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-10-26 13:22:35 UTC
vapier/solar/tigger/taviso please check. 
Comment 6 rob holland (RETIRED) gentoo-dev 2005-10-27 05:14:18 UTC
scanned quickly, looks reasonable.
Comment 7 Thierry Carrez (RETIRED) gentoo-dev 2005-10-27 05:17:22 UTC
And the patch was checked and included in Debian security fix too, so it's
probably safe to use here too.

leonardop, please go ahead.
Comment 8 Leonardo Boshell (RETIRED) gentoo-dev 2005-10-27 16:32:56 UTC
OK, thanks for the help. The patch has been committed with libwww-5.4.0-r4.ebuild.
Comment 9 Goyo Roth 2005-10-27 18:39:37 UTC
Created attachment 71595 [details, diff]
Slightly modified htbound patch

The previous patch, likely when commited into CVS, had the $Id line from the
original HTBound.c that was to be patched replaced with the appropriate $Id
line for your patch. So when trying to patch the HTBound.c from the tarball
downloadable at w3.org, it looks for the line:

	@(#) $Id: libwww-5.4.0-htbound.patch,v 1.1 2005/10/27 23:31:46
leonardop Exp $

but finds this line instead:

**	@(#) $Id: HTBound.c,v 2.14 1999/02/22 22:10:10 frystyk Exp $

 This causes the patching phase to fail and portage to exit. I've attached the
slightly altered diff, but if this patch is to be stored in CVS, the same
problem will likely occur again. Perhaps the change to the $Id line should be
ommitted entirely as it doesn't really accomplish anything except complicate
things.
Comment 10 Gregg Casillo 2005-10-27 18:46:23 UTC
It appears the patch for HTBound.c isn't working. Details in bug report 
#110662. 
Comment 11 Leonardo Boshell (RETIRED) gentoo-dev 2005-10-28 00:16:54 UTC
My bad; I didn't realise the inherent problem of including patches with CVS
expansion strings on them. It should be fixed now.
Comment 12 Thierry Carrez (RETIRED) gentoo-dev 2005-10-28 00:58:10 UTC
Archs plz test and mark 5.4.0-r4 stable :
Target KEYWORDS="alpha amd64 arm hppa ia64 mips ppc ppc64 ppc-macos s390 sh
sparc x86"
Comment 13 Fabian Groffen gentoo-dev 2005-10-28 05:42:21 UTC
stable on ppc-macos
Comment 14 Gustavo Zacarias (RETIRED) gentoo-dev 2005-10-28 06:26:47 UTC
sparc stable.
Comment 15 Brent Baude (RETIRED) gentoo-dev 2005-10-28 07:28:22 UTC
Folks,

I got the following while testing:

checking for correct ltmain.sh version... no

*** Gentoo sanity check failed! ***
*** libtool.m4 and ltmain.sh have a version mismatch! ***
*** (libtool.m4 = 1.5.18, ltmain.sh = 1.4.2a) ***

Please run:

  libtoolize --copy --force

if appropriate, please contact the maintainer of this
package (or your distribution) for help.


Would someone be willing to put this fix into the ebuild itself?
Comment 16 Leonardo Boshell (RETIRED) gentoo-dev 2005-10-28 07:57:48 UTC
Fabian,
'elibtoolize' is not the same as 'libtoolize -c -f'. Please revert that change
in the ebuild and adjust the logic for ppc-macos accordingly.
Comment 17 Fabian Groffen gentoo-dev 2005-10-28 08:25:29 UTC
reverted elibtoolize change.

b.t.w.:
I tried compiling on ppc-macos without it at all, and that seemed to work out
fine too.
Comment 18 Simon Stelling (RETIRED) gentoo-dev 2005-10-28 09:37:46 UTC
amd64 stable
Comment 19 Fernando J. Pereda (RETIRED) gentoo-dev 2005-10-28 13:14:42 UTC
alpha done

Cheers,
Ferdy
Comment 20 Mark Loeser (RETIRED) gentoo-dev 2005-10-28 22:04:32 UTC
x86 done
Comment 21 Michael Hanselmann (hansmi) (RETIRED) gentoo-dev 2005-10-29 08:42:40 UTC
Stable on ppc and hppa.
Comment 22 Bryan Østergaard (RETIRED) gentoo-dev 2005-10-30 15:12:53 UTC
Stable on ia64.
Comment 23 Brent Baude (RETIRED) gentoo-dev 2005-10-31 06:08:45 UTC
Marked ppc64 stable.  Thanks
Comment 24 Brent Baude (RETIRED) gentoo-dev 2005-10-31 06:09:22 UTC
forgot to remove ppc64; sorry about the spam.
Comment 25 Thierry Carrez (RETIRED) gentoo-dev 2005-10-31 13:47:10 UTC
In fact I'm not sure this is worth a GLSA...
It's a client crash trying to access to a malicious server... Denial of
malicious service. We don't do browser crashes, and it sure looks like one.
Comment 26 Tavis Ormandy (RETIRED) gentoo-dev 2005-10-31 13:49:17 UTC
I agree with Koon, this is not a security issue.
Comment 27 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-11-01 00:24:06 UTC
I agree about the no GLSA part. 
Comment 28 Hardave Riar (RETIRED) gentoo-dev 2005-11-20 05:22:15 UTC
Stable on mips.