Hi,

On Sat, Feb 03, 2024 at 04:29:17PM +0100, Salvatore Bonaccorso wrote:
> Hi,
> 
> On Wed, Jan 31, 2024 at 10:05:04AM +0100, Robert Luberda wrote:
> > clone 1021738 -1
> > retitle 1021738 man2html: CVE-2021-40647
> > tags 1021738 +pending
> > retitle -1 man2html: CVE-2021-40648
> > tags -1 +moreinfo
> > thanks
> > 
> > Moritz Mühlenhoff pisze:
> > 
> > Hi
> > 
> > First of all I'm sorry for not taking care about it earlier, I didn't have
> > time for Debian work in the previous year.
> > 
> > > 
> > > The following vulnerabilities were published for man2html.
> > > 
> > > CVE-2021-40647[0]:
> > Ok, this is quite easy to fix, I will upload fixed version soon.
> > 
> > > CVE-2021-40648[1]:
> > > | In man2html 1.6g, a filename can be created to overwrite the previous
> > > | size parameter of the next chunk and the fd, bk, fd_nextsize,
> > 
> > According to instructions given at
> > https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933 I tried to
> > reproduce this with the following commands:
> >   file=$(perl -e 'print "A" x 132')
> >   touch $file
> >   man2html $file
> > I used man2html built with AddressSanitizer and it found only a few small
> > memory leaks coming from global variables.
> > 
> > So I have no idea what really is wrong in this CVE. The source code
> > references given at the above link actually refer to calls to
> > fopen()/fclose() functions rather then to directly malloc() and free()
> > directly.
> 
> I tried to get an idea from the report, but I failed tbh. I asked
> though
> https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933?permalink_comment_id=4872855#gistcomment-4872855
> . 
> 
> But maybe, as this won't crash the program, we could mark it as
> unimportant and having a negligible security impact.

This should have actually gone to #1062069.

Regards,
Salvatore

Reply via email to