Bug#780139: squeeze update of checkpw?

2015-03-30 Thread Markus Koschany
On 16.03.2015 11:20, Raphael Hertzog wrote:
 Hello Gerrit,
 
 the Debian LTS team would like to fix the security issues which are
 currently open in the Squeeze version of checkpw:
 https://security-tracker.debian.org/tracker/CVE-2015-0885

Hi,

I have prepared and tested a fix for squeeze.
Salvatore Bonaccorso's fix for Wheezy can also be applied to the version
in Squeeze. I have tested the fix by following the steps outlined in [1]
and can confirm that it solves the issue.

Please find attached a debdiff for review to this e-mail.

Regards,

Markus


[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780139#16
diff -u checkpw-1.02/debian/changelog checkpw-1.02/debian/changelog
--- checkpw-1.02/debian/changelog
+++ checkpw-1.02/debian/changelog
@@ -1,3 +1,10 @@
+checkpw (1.02-1+deb6u1) squeeze; urgency=medium
+
+  * Non-maintainer upload.
+  * CVE-2015-0885: Fix denial of service via -- in usernames (Closes: #780139)
+
+ -- Markus Koschany a...@gambaru.de  Mon, 30 Mar 2015 14:02:06 +0200
+
 checkpw (1.02-1) unstable; urgency=low
 
   * new upstream point release.
only in patch2:
unchanged:
--- checkpw-1.02.orig/debian/diff/CVE-2015-0885.diff
+++ checkpw-1.02/debian/diff/CVE-2015-0885.diff
@@ -0,0 +1,24 @@
+--- checkpw-1.02.orig/checkapoppw.c
 checkpw-1.02/checkapoppw.c
+@@ -85,7 +85,7 @@
+ pw = getpwnam(login);
+ if (pw) break;
+ if (errno == error_txtbsy) die(111);
+-for (; ext != login  *ext != '-'; --ext);
++do {--ext;} while (ext != login  *ext != '-');
+ if (ext == login) die(1);
+ if (i) login[i] = '-';
+ i = ext - login;
+only in patch2:
+unchanged:
+--- checkpw-1.02.orig/checkpw.c
 checkpw-1.02/checkpw.c
+@@ -71,7 +71,7 @@
+ pw = getpwnam(login);
+ if (pw) break;
+ if (errno == error_txtbsy) die(111);
+-for (; ext != login  *ext != '-'; --ext);
++do {--ext;} while (ext != login  *ext != '-');
+ if (ext == login) die(1);
+ if (i) login[i] = '-';
+ i = ext - login;


signature.asc
Description: OpenPGP digital signature


Bug#780139: squeeze update of checkpw?

2015-03-16 Thread Raphael Hertzog
Hello Gerrit,

the Debian LTS team would like to fix the security issues which are
currently open in the Squeeze version of checkpw:
https://security-tracker.debian.org/tracker/CVE-2015-0885

Would you like to take care of this yourself? We are still understaffed so
any help is always highly appreciated.

If yes, please follow the workflow we have defined here:
http://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-...@lists.debian.org
(via a debdiff, or with an URL pointing to the the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

Thank you very much.

Raphaël Hertzog,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup
-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org