Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 577994 - net-misc/vtun: high CPU usage after SIGHUP
Summary: net-misc/vtun: high CPU usage after SIGHUP
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-03-22 14:20 UTC by Agostino Sarubbo
Modified: 2018-05-12 20:08 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-03-22 14:20:44 UTC
From ${URL} :

A vulnerability was found in the vtun package. When you send a SIGHUP to a vtun client process and it cannot connect to the remote server, vtun tries to reconnect without sleep between each attempt.
In result, the vtun process uses a lot of CPU, and writes to syslog without limit.

References (with proposed patch):

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818489


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Sergey Popov gentoo-dev 2017-03-27 15:23:42 UTC
CVE was not assigned to this vulnerability as per discussion in [1], upstream agrees that this can be a bug, but not a security issue[2]

Debian guys patches it, though. Not sure how we should proceed, upcoming 3.0.4(release long time ago, not in portage yet) does not contain fix for this(upstream mentioned it directly)

[1] -  http://seclists.org/oss-sec/2016/q2/173
[2] -  https://sourceforge.net/p/vtun/bugs/58/
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2017-03-28 03:20:53 UTC
Should we remove this bug from security and make it just a regular bug? Since upstream does not think this is a vulnerability?
Comment 3 Michael Boyle 2018-05-12 20:08:27 UTC
Upstream believe it is not a bug. Concure with upstream and redhat assessment.

Michael Boyle
Gentoo Security Padawan