Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 723258 (CVE-2018-10756) - <net-p2p/transmission-3.00: Use-after-free allowing possible remote code execution (CVE-2018-10756)
Summary: <net-p2p/transmission-3.00: Use-after-free allowing possible remote code exec...
Status: RESOLVED FIXED
Alias: CVE-2018-10756
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://github.com/transmission/trans...
Whiteboard: B2 [glsa+ cve]
Keywords:
: 718328 (view as bug list)
Depends on: 724786
Blocks:
  Show dependency tree
 
Reported: 2020-05-15 16:57 UTC by Sam James
Modified: 2020-07-26 23:43 UTC (History)
2 users (show)

See Also:
Package list:
net-p2p/transmission-3.00-r1 amd64 ppc ppc64 x86
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-05-15 16:57:54 UTC
Description:
"Use-after-free in libtransmission/variant.c in Transmission before 3.00 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted torrent file."

Patch: https://github.com/transmission/transmission/commit/2123adf8e5e1c2b48791f9d22fc8c747e974180e
Disclosure: https://tomrichards.net/2020/05/cve-2018-10756-transmission/
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-05-15 16:58:33 UTC
@maintainer(s), please bump to 3.00.
Comment 2 Mike Gilbert gentoo-dev 2020-05-15 17:42:24 UTC
*** Bug 718328 has been marked as a duplicate of this bug. ***
Comment 3 Mike Gilbert gentoo-dev 2020-05-15 17:45:19 UTC
Version 3.00 was tagged by a relatively new developer in the upstream community.

I am waiting for upstream to provide an official release tarball, and to update their website.
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-05-23 06:56:17 UTC
(In reply to Mike Gilbert from comment #3)
> Version 3.00 was tagged by a relatively new developer in the upstream
> community.
> 
> I am waiting for upstream to provide an official release tarball, and to
> update their website.

3.00 looks out now. You may want to look at bug 607336 while at it, if it still applies.
Comment 5 Larry the Git Cow gentoo-dev 2020-05-23 14:15:35 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=01a4e92dc9136172e3ef15378790bb12cd617cb1

commit 01a4e92dc9136172e3ef15378790bb12cd617cb1
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2020-05-23 14:09:29 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2020-05-23 14:14:50 +0000

    net-p2p/transmission: bump to 3.00
    
    Closes: https://bugs.gentoo.org/607336
    Bug: https://bugs.gentoo.org/723258
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 net-p2p/transmission/Manifest                 |   1 +
 net-p2p/transmission/transmission-3.00.ebuild | 142 ++++++++++++++++++++++++++
 net-p2p/transmission/transmission-9999.ebuild |  10 +-
 3 files changed, 144 insertions(+), 9 deletions(-)
Comment 6 Mike Gilbert gentoo-dev 2020-05-23 14:36:47 UTC
Let's give this version a week in ~arch before stabilizing.
Comment 7 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-05-23 15:06:38 UTC
(In reply to Mike Gilbert from comment #6)
> Let's give this version a week in ~arch before stabilizing.

I was going to suggest the same thing. Quite a churn. Cheers!
Comment 8 NATTkA bot gentoo-dev 2020-05-26 15:52:41 UTC
Unable to check for sanity:

> no match for package: net-p2p/transmission-3.00
Comment 9 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-06-02 18:13:21 UTC
(In reply to Mike Gilbert from comment #6)
> Let's give this version a week in ~arch before stabilizing.

How're we looking?
Comment 10 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-06-04 17:31:35 UTC
Acked on IRC.
Comment 11 Agostino Sarubbo gentoo-dev 2020-06-06 17:33:20 UTC
ppc stable
Comment 12 Agostino Sarubbo gentoo-dev 2020-06-06 17:35:10 UTC
ppc64 stable
Comment 13 Agostino Sarubbo gentoo-dev 2020-06-06 20:15:11 UTC
x86 stable
Comment 14 Agostino Sarubbo gentoo-dev 2020-06-07 08:44:42 UTC
amd64 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 15 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-06-20 02:12:05 UTC
ping, please cleanup
Comment 16 Andreas Sturmlechner gentoo-dev 2020-07-15 12:09:10 UTC
ping, please cleanup
Comment 17 GLSAMaker/CVETool Bot gentoo-dev 2020-07-26 23:31:22 UTC
This issue was resolved and addressed in
 GLSA 202007-07 at https://security.gentoo.org/glsa/202007-07
by GLSA coordinator Sam James (sam_c).
Comment 18 GLSAMaker/CVETool Bot gentoo-dev 2020-07-26 23:32:03 UTC
This issue was resolved and addressed in
 GLSA 202007-07 at https://security.gentoo.org/glsa/202007-07
by GLSA coordinator Sam James (sam_c).