Information disclosure Vulnerability

Bug #1088355 reported by Christian Kuersteiner
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
dtach (Ubuntu)
Fix Released
Undecided
Unassigned
Lucid
Fix Released
Undecided
Unassigned
Oneiric
Fix Released
Undecided
Unassigned
Precise
Fix Released
Undecided
Unassigned
Quantal
Fix Released
Undecided
Unassigned
Raring
Fix Released
Undecided
Unassigned

Bug Description

There is a information disclosure vulnerability in dtach.

There is a upstream fix available (http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812).

The versions in raring and quantal are not vulnerable since they are on the latest version (0.8-2.1) including the patch for this vulnerability.

Tags: patch
information type: Private Security → Public Security
Revision history for this message
Christian Kuersteiner (ckuerste) wrote :

Please check the attached precise patch. Since the package doesn't have a patch system. So let me know if I have to change anything.
Tested: Upgrading, retested that bug is corrected (unclean disconnect)

Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

The attachment "lp1088355-precise.debdiff" of this bug report has been identified as being a patch in the form of a debdiff. The ubuntu-sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. In the event that this is in fact not a patch you can resolve this situation by removing the tag 'patch' from the bug report and editing the attachment so that it is not flagged as a patch. Additionally, if you are member of the ubuntu-sponsors team please also unsubscribe the team from this bug report.

[This is an automated message performed by a Launchpad user owned by Brian Murray. Please contact him regarding any issues with the action taken in this bug report.]

tags: added: patch
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for the debdiff, however, I have a few comments:

- Since the package doesn't have a patch system, you can't just add a patch to the debian/patches directory. In this case, you must directly modify the attach.c file.
- Lucid, Oneiric, and Precise all have the same version (0.8-2). The new versioning needs to reflect that. Please use 0.8-2ubuntu0.12.04.1 for precise. (See https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Update_the_packaging)
- Since there won't be a patch in the new debdiff, please add the link to the upstream fix in the debian/changes file.

Thanks!

Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Unsubscribing ubuntu-security-sponsors for now, please re-subscribe ubuntu-security-sponsors when an updated debdiff is available.

Changed in dtach (Ubuntu):
status: New → Triaged
Revision history for this message
Christian Kuersteiner (ckuerste) wrote :

Thanks for the infos. I will prepare another patch which should reflect your input.

One question about your last comment. Did you mean add the link to the upstream fix to the debian/changelog file or create a new debian/changes file since there is no such file yet?

Revision history for this message
Christian Kuersteiner (ckuerste) wrote :

Second try for the precise debdiff. Let me know if everything is correct now. Specially with the link to the upstream fix from my comment before.

Thanks.

Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Your debdiff looks good, thanks!
I'll use the same one for lucid, oneiric, and precise, since they are all based on the same version.

I'll upload these today.

Changed in dtach (Ubuntu Quantal):
status: New → Fix Released
Changed in dtach (Ubuntu Raring):
status: Triaged → Fix Released
Changed in dtach (Ubuntu Lucid):
status: New → Confirmed
Changed in dtach (Ubuntu Oneiric):
status: New → Confirmed
Changed in dtach (Ubuntu Precise):
status: New → Confirmed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package dtach - 0.8-2ubuntu0.10.04.1

---------------
dtach (0.8-2ubuntu0.10.04.1) lucid-security; urgency=low

  * SECURITY-UPDATE: information disclosure on unclean disconnect
    (LP: #1088355)
    - attach.c(attach_main): Clean check of read operation. Based on upstream
      patch
      (http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812)
    - CVE-2012-3368
 -- Christian Kuersteiner <email address hidden> Sat, 15 Dec 2012 22:43:09 +0700

Changed in dtach (Ubuntu Lucid):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package dtach - 0.8-2ubuntu0.12.04.1

---------------
dtach (0.8-2ubuntu0.12.04.1) precise-security; urgency=low

  * SECURITY-UPDATE: information disclosure on unclean disconnect
    (LP: #1088355)
    - attach.c(attach_main): Clean check of read operation. Based on upstream
      patch
      (http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812)
    - CVE-2012-3368
 -- Christian Kuersteiner <email address hidden> Sat, 15 Dec 2012 22:43:09 +0700

Changed in dtach (Ubuntu Precise):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package dtach - 0.8-2ubuntu0.11.10.1

---------------
dtach (0.8-2ubuntu0.11.10.1) oneiric-security; urgency=low

  * SECURITY-UPDATE: information disclosure on unclean disconnect
    (LP: #1088355)
    - attach.c(attach_main): Clean check of read operation. Based on upstream
      patch
      (http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812)
    - CVE-2012-3368
 -- Christian Kuersteiner <email address hidden> Sat, 15 Dec 2012 22:43:09 +0700

Changed in dtach (Ubuntu Oneiric):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.