From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/7397 Path: news.gmane.org!not-for-mail From: Matt Johnston Newsgroups: gmane.linux.lib.musl.general Subject: Re: Security advisory for musl libc - stack-based buffer overflow in ipv6 literal parsing [CVE-2015-1817] Date: Fri, 17 Apr 2015 21:10:08 +0800 Message-ID: <20150417131008.GE17615@ucc.gu.uwa.edu.au> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: ger.gmane.org 1429288575 10648 80.91.229.3 (17 Apr 2015 16:36:15 GMT) X-Complaints-To: usenet@ger.gmane.org NNTP-Posting-Date: Fri, 17 Apr 2015 16:36:15 +0000 (UTC) To: musl@lists.openwall.com Original-X-From: musl-return-7410-gllmg-musl=m.gmane.org@lists.openwall.com Fri Apr 17 18:36:14 2015 Return-path: Envelope-to: gllmg-musl@m.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1Yj9FS-00069N-7a for gllmg-musl@m.gmane.org; Fri, 17 Apr 2015 18:36:10 +0200 Original-Received: (qmail 23639 invoked by uid 550); 17 Apr 2015 16:36:07 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 32309 invoked from network); 17 Apr 2015 13:10:23 -0000 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A2CkBADCBTFV/8+AX4Jdg15cxiKBT4gTEgEBAQEBAQF9hGFaIRoaBRiIbg2jRKUGDAEbBIspgTuDXoMBgRYFizaJaIYhgR6DOpAzIoIQI4FJYgGCQgEBAQ X-IPAS-Result: A2CkBADCBTFV/8+AX4Jdg15cxiKBT4gTEgEBAQEBAQF9hGFaIRoaBRiIbg2jRKUGDAEbBIspgTuDXoMBgRYFizaJaIYhgR6DOpAzIoIQI4FJYgGCQgEBAQ X-IronPort-AV: E=Sophos;i="5.11,594,1422892800"; d="scan'208";a="135760837" Content-Disposition: inline X-snowman: =?utf-8?B?4piD?= User-Agent: Mutt/1.5.21 (2010-09-15) Xref: news.gmane.org gmane.linux.lib.musl.general:7397 Archived-At: Hi, I think Dropbear probably is vulnerable to CVE-2015-1817 post-authentication. TCP forwarding requests will call getaddrinfo() https://secure.ucc.asn.au/hg/dropbear/file/cbd674d63cd4/dbutil.c#l415 (moved to netio.c in head, and PF_UNSPEC has been fixed to AF_UNSPEC). Pre-authentication should be OK, only getnameinfo() is called (if that's enabled). musl's network-facing DNS code seems a bit precarious with pointer arithmetic? Please CC replies, I'm not subscribed. Cheers, Matt