[CVE-2008-1628] buffer overflow in lib/audit_logging.c

Bug #216117 reported by William Grant
258
Affects Status Importance Assigned to Milestone
audit (Debian)
Fix Released
Unknown
audit (Ubuntu)
Fix Released
High
Emanuele Gentili
Gutsy
Fix Released
High
Emanuele Gentili
Hardy
Fix Released
High
Emanuele Gentili

Bug Description

Both Gutsy and Hardy are affected by CVE-2008-1628:

"Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information."

William Grant (wgrant)
Changed in audit:
importance: Undecided → High
status: New → Confirmed
importance: Undecided → High
status: New → Confirmed
Revision history for this message
Emanuele Gentili (emgent) wrote :
Changed in audit:
assignee: nobody → emgent
status: Confirmed → In Progress
Revision history for this message
Emanuele Gentili (emgent) wrote :
Changed in audit:
assignee: nobody → emgent
status: Confirmed → In Progress
Revision history for this message
Emanuele Gentili (emgent) wrote :

ubuntu-universe-sponsor subscribed for hardy.

Revision history for this message
Scott Kitterman (kitterman) wrote :

motu-release ack (please get this before uploading when we're in final freeze next time).

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package audit - 1.6.5-0ubuntu3

---------------
audit (1.6.5-0ubuntu3) hardy; urgency=low

  * SECURITY UPDATE: (LP: #216117)
   + debian/patches/CVE-2008-1628.patch
    - Stack-based buffer overflow in the audit_log_user_command function in
      lib/audit_logging.c in Linux Audit before 1.7 might allow remote
      attackers to execute arbitrary code via a long command argument.
  * References
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-1628
   + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475227

 -- Emanuele Gentili <email address hidden> Sun, 13 Apr 2008 00:03:01 +0200

Changed in audit:
status: In Progress → Fix Released
Changed in audit:
status: Unknown → Fix Released
Changed in audit:
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package audit - 1.5.4-0ubuntu1.1

---------------
audit (1.5.4-0ubuntu1.1) gutsy-security; urgency=low

  * SECURITY UPDATE: (LP: #216117)
   + debian/patches/CVE-2008-1628.patch
    - Stack-based buffer overflow in the audit_log_user_command function in
      lib/audit_logging.c in Linux Audit before 1.7 might allow remote
      attackers to execute arbitrary code via a long command argument.
  * References
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-1628
   + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475227

 -- Emanuele Gentili <email address hidden> Sat, 12 Apr 2008 23:52:13 +0200

Changed in audit:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.