Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 210159 - Glsa-check tries to emerge media-libs/musicbrainz-2.1.4 over and over again (GLSA 200610-09)
Summary: Glsa-check tries to emerge media-libs/musicbrainz-2.1.4 over and over again (...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: GLSA Errors (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-02-14 17:13 UTC by Jukka Alasalmi
Modified: 2008-02-14 21:19 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jukka Alasalmi 2008-02-14 17:13:06 UTC
For a reason or another, glsa-check tries to emerge media-libs/musicbrainz-2.1.4 every time I run it, even though I have a version of it installed that should not be vulnerable by the GLSA that the glsa-check mentions.

I have just synchronized the portage database (today) and I have the newest stable version of gentoolkit (0.2.3-r1)

Reproducible: Always

Steps to Reproduce:
1. Synhronize portage (emerge --sync)
2. Install media-libs/musicbrains-2.1.4
3. Run "glsa-check -f $(glsa-check -t all)", as suggested in Gentoo Security Handbook
4. Repeat step 3
Actual Results:  
GLSA says that there is a vulnerability in the musicbrainz, and it wants to install it again:

----
This system is affected by the following GLSAs:
fixing 200610-09
>>> merging media-libs/musicbrainz-2.1.4
...
----

Expected Results:  
Glsa-check should not claim the package to be vulnerable. On page http://www.gentoo.org/security/en/glsa/glsa-200610-09.xml it is said that versions >= 2.1.4 are unaffected by the said vulnerability. Same says also the file in  /usr/portage/metadata/glsa/glsa-200610-09.xml (pasted as a whole below), relevant part here:
  <affected>
    <package name="media-libs/musicbrainz" auto="yes" arch="*">
      <unaffected range="ge">2.1.4</unaffected>
      <vulnerable range="lt">2.1.4</vulnerable>
    </package>
   </affected>


Below are the output of emerge --info, and also the glsa file itself.

---=[ emerge -info ]=---

Portage 2.1.4.4 (default-linux/x86/2006.1/desktop, gcc-4.1.2, glibc-2.5-r4, 2.6.23-tuxonice-r6 i686)
=================================================================
System uname: 2.6.23-tuxonice-r6 i686 Intel(R) Pentium(R) III Mobile CPU       933MHz
Timestamp of tree: Thu, 14 Feb 2008 11:00:02 +0000
app-shells/bash:     3.2_p17
dev-java/java-config: 1.3.7, 2.0.33-r1
dev-lang/python:     2.4.4-r4, 2.5.1-r5
dev-python/pycrypto: 2.0.1-r6
sys-apps/baselayout: 1.12.9-r2
sys-apps/sandbox:    1.2.18.1-r2
sys-devel/autoconf:  2.13, 2.61-r1
sys-devel/automake:  1.4_p6, 1.5, 1.6.3, 1.7.9-r1, 1.8.5-r3, 1.9.6-r2, 1.10
sys-devel/binutils:  2.17
sys-devel/gcc-config: 1.3.16
sys-devel/libtool:   1.5.24
virtual/os-headers:  2.6.17-r2
ACCEPT_KEYWORDS="x86"
CBUILD="i686-pc-linux-gnu"
CFLAGS="-O2 -march=pentium3m -pipe"
CHOST="i686-pc-linux-gnu"
CONFIG_PROTECT="/etc /usr/kde/3.5/env /usr/kde/3.5/share/config /usr/kde/3.5/shutdown /usr/share/X11/xkb /usr/share/config"
CONFIG_PROTECT_MASK="/etc/env.d /etc/env.d/java/ /etc/fonts/fonts.conf /etc/gconf /etc/revdep-rebuild /etc/splash /etc/terminfo"
CXXFLAGS="-O2 -march=pentium3m -pipe"
DISTDIR="/usr/portage/distfiles"
FEATURES="distlocks metadata-transfer sandbox sfperms strict unmerge-orphans userfetch"
GENTOO_MIRRORS="http://trumpetti.atm.tut.fi/gentoo/ ftp://trumpetti.atm.tut.fi/gentoo/"
LANG="fi_FI.UTF8"
LC_ALL="fi_FI"
LINGUAS="fi"
MAKEOPTS="-j1"
PKGDIR="/usr/portage/packages"
PORTAGE_RSYNC_OPTS="--recursive --links --safe-links --perms --times --compress --force --whole-file --delete --stats --timeout=180 --exclude=/distfiles --exclude=/local --exclude=/packages"
PORTAGE_TMPDIR="/var/tmp"
PORTDIR="/usr/portage"
SYNC="rsync://rsync.gentoo.org/gentoo-portage"
USE="X acpi alsa arts berkdb bitmap-fonts cairo cdr cli cracklib crypt cups dbus dri dvd dvdr emboss encode esd fam firefox fortran gdbm gif glitz gnome gpm gstreamer gtk hal iconv ipv6 isdnlog jack jpeg kde kdeenablefinal kdehiddenvisibility ldap mad midi mikmod mmx mmx2 mp3 mpeg mudflap ncurses nls nptl nptlonly nsplugin ogg omnibook opengl openmp oss pam pcmcia pcre pdf perl png ppds pppd python qt3 qt4 quicktime readline reflection sdl session spell spl sse ssl svg tcpd truetype truetype-fonts type1-fonts unicode vorbis win32codecs wireless x86 xcb xinerama xml xorg xv zlib" ALSA_CARDS="maestro3 usb-audio" ALSA_PCM_PLUGINS="adpcm alaw asym copy dmix dshare dsnoop empty extplug file hooks iec958 ioplug ladspa lfloat linear meter mulaw multi null plug rate route share shm softvol" APACHE2_MODULES="access auth auth_dbm auth_anon auth_digest alias file-cache echo charset-lite cache disk-cache mem-cache ext-filter case_filter case-filter-in deflate mime-magic cern-meta expires headers usertrack unique-id proxy proxy-connect proxy-ftp proxy-http info include cgi cgid dav dav-fs vhost-alias speling rewrite log_config logio env setenvif mime status autoindex asis negotiation dir imap actions userdir so filter unique_id authz_host" ELIBC="glibc" INPUT_DEVICES="evdev keyboard mouse wacom synaptics" KERNEL="linux" LCD_DEVICES="bayrad cfontz cfontz633 glk hd44780 lb216 lcdm001 mtxorb ncurses text" LINGUAS="fi" USERLAND="GNU" VIDEO_CARDS="i810 vesa vga"
Unset:  CPPFLAGS, CTARGET, EMERGE_DEFAULT_OPTS, INSTALL_MASK, LDFLAGS, PORTAGE_COMPRESS, PORTAGE_COMPRESS_FLAGS, PORTAGE_RSYNC_EXTRA_OPTS, PORTDIR_OVERLAY


---=[ /usr/portage/metadata/glsa/glsa-200610-09.xml ]=---

<?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
<?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">

<glsa id="200610-09">
  <title>libmusicbrainz: Multiple buffer overflows</title>
  <synopsis>
    Multiple buffer overflows have been found in libmusicbrainz, which could
    lead to a Denial of Service or possibly the execution of arbitrary code.
  </synopsis>
  <product type="ebuild">libmusicbrainz</product>
  <announced>October 22, 2006</announced>
  <revised>October 22, 2006: 01</revised>
  <bug>144089</bug>
  <access>remote</access>
  <affected>
    <package name="media-libs/musicbrainz" auto="yes" arch="*">
      <unaffected range="ge">2.1.4</unaffected>
      <vulnerable range="lt">2.1.4</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    libmusicbrainz is a client library used to access MusicBrainz music
    meta data.
    </p>
  </background>
  <description>
    <p>
    Luigi Auriemma reported a possible buffer overflow in the
    MBHttp::Download function of lib/http.cpp as well as several possible
    buffer overflows in lib/rdfparse.c.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could be able to execute arbitrary code or cause
    Denial of Service by making use of an overly long "Location" header in
    an HTTP redirect message from a malicious server or a long URL in
    malicious RDF feeds.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All libmusicbrainz users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/musicbrainz-2.1.4&quot;</code>
  </resolution>
  <references>
    <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197">CVE-2006-4197</uri>
  </references>
  <metadata tag="requester" timestamp="Wed, 18 Oct 2006 12:31:28 +0000">
    falco
  </metadata>
  <metadata tag="submitter" timestamp="Thu, 19 Oct 2006 20:02:01 +0000">
    vorlon078
  </metadata>
  <metadata tag="bugReady" timestamp="Fri, 20 Oct 2006 14:53:09 +0000">
    DerCorny
  </metadata>
</glsa>
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2008-02-14 19:05:13 UTC
Do you have other musicbrainz versions installed? (emerge -Cpv media-libs/musicbrainz)
Comment 2 Jukka Alasalmi 2008-02-14 20:59:42 UTC
That's a good point, I indeed do. I didn't realize that musicbrainz was slotted, too.

I guess the solution is to remove the old version, and do a revdep-rebuild in case there are some programs that are linked against the old version?

Still, shouldn't glsa-check notice this, and at least notify about this, if it's unable to fix the vulnerability? If I hadn't been forced to run the glsa-check again because of a failed package, I would not have noticed that the system is still vulnerable.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2008-02-14 21:19:13 UTC
Yes that is the solution to your situation.

You would probably have noticed it the next time you run glsa-check.

I'll close this one as invalid for now. If you want to post a feature request for glsa-check to support slots please file another bug.