Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 585940 (CVE-2016-5434) - <sys-apps/pacman-5.0.2-r1: denial of service flaw in libalpm (CVE-2016-5434)
Summary: <sys-apps/pacman-5.0.2-r1: denial of service flaw in libalpm (CVE-2016-5434)
Status: RESOLVED FIXED
Alias: CVE-2016-5434
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-06-14 15:31 UTC by Agostino Sarubbo
Modified: 2017-10-27 16:00 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-06-14 15:31:54 UTC
From ${URL} :

An out-of-bounds read flaw resulting in an infinite loop was found in pacman's (the Arch package 
manager) signature parser.

References:

http://seclists.org/oss-sec/2016/q2/526
https://lists.archlinux.org/pipermail/pacman-dev/2016-June/021148.html


@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-07-20 12:48:23 UTC
update:

this bug only causes DoS on x86, but since Arch Linux is no longer maintaining x86, and the patch was never applied ( at least till current source ), and there must be very specific conditions for this bug to create a vector attack.

+ Maintainer is no longer active and there is no recent ebuild (the last one uses EAPI 4)

Maybe is time to considerate to last rite this package
Comment 2 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2017-07-20 15:58:06 UTC
Indeed. The current Gentoo version is from 2012, and upstream has moved forward a lot since then.
Comment 3 Nils Freydank 2017-08-07 18:29:24 UTC
Fixed in tree with commit aa655378e457e47abd9c358df124e2bc754231f7:

Author: Nils Freydank <holgersson@posteo.de>
Date:   Mon Aug 7 17:42:53 2017 +0200

    sys-apps/pacman-4.x: Security cleanup wrt Gentoo bug #585940.

    Package-Manager: Portage-2.3.6, Repoman-2.3.3
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2017-08-07 21:35:03 UTC
Package got a proxy-maintainer (https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=12e57d184a39138ac3ee87cf3d47b683b6530873), removing treecleaners.

@ Nils: But this package still looks vulnerable. I found https://lists.archlinux.org/pipermail/pacman-dev/2016-June/021148.html but I don't see this applied (https://git.archlinux.org/pacman.git/log/lib/libalpm/signing.c).

I guess we need to contact upstream for clarification.