clone 1021738 -1
retitle 1021738 man2html: CVE-2021-40647
tags 1021738 +pending
retitle -1 man2html: CVE-2021-40648
tags -1 +moreinfo
thanks
Moritz Mühlenhoff pisze:
Hi
First of all I'm sorry for not taking care about it earlier, I didn't
have time for Debian work in the previous year.
The following vulnerabilities were published for man2html.
CVE-2021-40647[0]:
Ok, this is quite easy to fix, I will upload fixed version soon.
CVE-2021-40648[1]:
| In man2html 1.6g, a filename can be created to overwrite the previous
| size parameter of the next chunk and the fd, bk, fd_nextsize,
According to instructions given at
https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933 I tried
to reproduce this with the following commands:
file=$(perl -e 'print "A" x 132')
touch $file
man2html $file
I used man2html built with AddressSanitizer and it found only a few
small memory leaks coming from global variables.
So I have no idea what really is wrong in this CVE. The source code
references given at the above link actually refer to calls to
fopen()/fclose() functions rather then to directly malloc() and free()
directly.
Regards,
robert