Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 544322 - <games-server/monopd-0.9.8: off-by-one error in network code (CVE-2015-0841)
Summary: <games-server/monopd-0.9.8: off-by-one error in network code (CVE-2015-0841)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-24 13:14 UTC by Agostino Sarubbo
Modified: 2016-12-02 08:25 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-03-24 13:14:37 UTC
From ${URL} :

| There's an off-by-one error in libcapsinetwork network handling code,
| which was merged into monopd in version 0.9.4.
| 
| From src/listener.cpp, Listener::checkActivity():
| 
|   #define MAXLINE 1024
| [...]
|   char *readBuf = new char[MAXLINE];
|   int n = read((*it)->fd(), readBuf, MAXLINE);
|   if (n <= 0) // socket was closed
|   {
|           (*it)->setStatus(Socket::Closed);
|           delete[] readBuf;
|           return; // notification is (still) in earlier iteration
|   }
|   readBuf[n] = 0;
| 
| With an input line longer than 1023, this will write zero at readBuf[1024]
| which is out of bounds.

<https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781043>
<https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781044>



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2016-12-01 20:57:15 UTC
Upstream patched the issue via https://cgit.tuxfamily.org/gtkatlantic/atlanticd.git/commit/src/listener.cpp?id=0153128170c07ebf2e05346d0f2229e3abb7aeda

$ git tag --contains 0153128170c07ebf2e05346d0f2229e3abb7aeda | sort
monopd-0.10.0
monopd-0.10.1
monopd-0.10.2
monopd-0.9.8

v0.9.8 was in Gentoo repository https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/games-server/monopd/monopd-0.9.8.ebuild?view=log

Current stable version in Gentoo repository is =games-server/monopd-0.10.2 and no vulnerable version left. So nothing left to do for us.



@ Security: I am suggesting to drop rating to C and maybe apply minor rating based on the comment https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781043#5 quoting Florian Weimer.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-12-02 08:25:17 UTC
No PoC to consider this as a severity of 2 (RCE).  As such, re-designating.

GLSA Vote: No