On Sat, Feb 03, 2024 at 04:30:58PM +0100, Salvatore Bonaccorso wrote: > Hi, > > On Sat, Feb 03, 2024 at 04:29:17PM +0100, Salvatore Bonaccorso wrote: > > Hi, > > > > On Wed, Jan 31, 2024 at 10:05:04AM +0100, Robert Luberda wrote: > > > clone 1021738 -1 > > > retitle 1021738 man2html: CVE-2021-40647 > > > tags 1021738 +pending > > > retitle -1 man2html: CVE-2021-40648 > > > tags -1 +moreinfo > > > thanks > > > > > > Moritz Mühlenhoff pisze: > > > > > > Hi > > > > > > First of all I'm sorry for not taking care about it earlier, I didn't have > > > time for Debian work in the previous year. > > > > > > > > > > > The following vulnerabilities were published for man2html. > > > > > > > > CVE-2021-40647[0]: > > > Ok, this is quite easy to fix, I will upload fixed version soon. > > > > > > > CVE-2021-40648[1]: > > > > | In man2html 1.6g, a filename can be created to overwrite the previous > > > > | size parameter of the next chunk and the fd, bk, fd_nextsize, > > > > > > According to instructions given at > > > https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933 I tried > > > to > > > reproduce this with the following commands: > > > file=$(perl -e 'print "A" x 132') > > > touch $file > > > man2html $file > > > I used man2html built with AddressSanitizer and it found only a few small > > > memory leaks coming from global variables. > > > > > > So I have no idea what really is wrong in this CVE. The source code > > > references given at the above link actually refer to calls to > > > fopen()/fclose() functions rather then to directly malloc() and free() > > > directly. > > > > I tried to get an idea from the report, but I failed tbh. I asked > > though > > https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933?permalink_comment_id=4872855#gistcomment-4872855 > > . > > > > But maybe, as this won't crash the program, we could mark it as > > unimportant and having a negligible security impact. > > This should have actually gone to #1062069.
There was a followup as https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933?permalink_comment_id=5226339#gistcomment-5226339 . I'm marking the CVE as unimportant now in the tracker. Regards, Salvatore