Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 625638 (CVE-2017-9765)

Summary: <net-libs/gsoap-2.8.50: Stack-based buffer overflow when receieving XML message with size larger than 2GB
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: patrick, polynomial-c
Priority: Normal Flags: stable-bot: sanity-check+
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1472807
Whiteboard: B3 [noglsa cve]
Package list:
=net-libs/gsoap-2.8.51
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2017-07-19 13:26:00 UTC
From ${URL} :

A buffer overflow can cause an open unsecured server to crash after 2GB (greater than 2147483711 bytes to trigger the software bug)) XML message is received. Fortunately, the overflowing data after 2GB 
is cleaned up in the buffer which means that the chances of exploiting this flaw (by injecting code) is significantly reduced in gSOAP versions affected.

References:

https://www.genivia.com/advisory.html


@maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
Comment 1 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2017-08-21 08:04:21 UTC
Arches please test and mark stable =net-libs/gsoap-2.8.51 with target KEYWORDS:

amd64 x86
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2017-09-02 17:20:04 UTC
amd64/x86 stable

@maintainer(s), please cleanup the vulnerable versions.
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2017-09-24 21:08:48 UTC
@maintainer, please clean.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2017-09-24 23:18:18 UTC
GLSA Vote: No
Maintainer(s), please drop the vulnerable version(s).
Comment 5 Aaron Bauman (RETIRED) gentoo-dev 2018-01-20 16:33:12 UTC
Tree is clean.