Merge lp:~jtaylor/ubuntu/lucid/dropbear/2012-0920 into lp:ubuntu/lucid/dropbear

Proposed by Julian Taylor
Status: Rejected
Rejected by: Martin Pitt
Proposed branch: lp:~jtaylor/ubuntu/lucid/dropbear/2012-0920
Merge into: lp:ubuntu/lucid/dropbear
Diff against target: 71 lines (+47/-1)
3 files modified
debian/changelog (+10/-0)
debian/control (+2/-1)
debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff (+35/-0)
To merge this branch: bzr merge lp:~jtaylor/ubuntu/lucid/dropbear/2012-0920
Reviewer Review Type Date Requested Status
Jamie Strandboge Approve
Review via email: mp+103384@code.launchpad.net

Description of the change

same patch from squeeze applies

To post a comment you must log in.
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Based on https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Packaging, the lucid update should use 0.52-4ubuntu0.10.04.1 as the version.

review: Approve

Unmerged revisions

14. By Julian Taylor

* SECURITY UPDATE: remote execution via use after free (LP: #976360)
  - debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff
    backported from https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749
    Thanks to Gerrit Pape
  - CVE-2012-0920

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
=== modified file 'debian/changelog'
--- debian/changelog 2009-10-06 01:51:42 +0000
+++ debian/changelog 2012-04-24 22:02:23 +0000
@@ -1,3 +1,13 @@
1dropbear (0.52-4ubuntu1) lucid-security; urgency=low
2
3 * SECURITY UPDATE: remote execution via use after free (LP: #976360)
4 - debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff
5 backported from https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749
6 Thanks to Gerrit Pape
7 - CVE-2012-0920
8
9 -- Julian Taylor <jtaylor@ubuntu.com> Tue, 24 Apr 2012 22:54:41 +0200
10
1dropbear (0.52-4) unstable; urgency=low11dropbear (0.52-4) unstable; urgency=low
212
3 * debian/initramfs/dropbear-hook: allow more than one public key in13 * debian/initramfs/dropbear-hook: allow more than one public key in
414
=== modified file 'debian/control'
--- debian/control 2009-09-24 14:37:17 +0000
+++ debian/control 2012-04-24 22:02:23 +0000
@@ -1,7 +1,8 @@
1Source: dropbear1Source: dropbear
2Section: net2Section: net
3Priority: optional3Priority: optional
4Maintainer: Gerrit Pape <pape@smarden.org>4Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
5XSBC-Original-Maintainer: Gerrit Pape <pape@smarden.org>
5Build-Depends: libz-dev6Build-Depends: libz-dev
6Standards-Version: 3.8.2.07Standards-Version: 3.8.2.0
78
89
=== added file 'debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff'
--- debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff 1970-01-01 00:00:00 +0000
+++ debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff 2012-04-24 22:02:23 +0000
@@ -0,0 +1,35 @@
1From d46b781361cae7fdbdc50ad5752d47f786f30a2b Mon Sep 17 00:00:00 2001
2From: Gerrit Pape <pape@smarden.org>
3Date: Mon, 27 Feb 2012 16:33:55 +0000
4Subject: [PATCH 3/3] Fix use-after-free bug (CVE-2012-0920)
5
6Fix use-after-free bug that could be triggered if command="..."
7authorized_keys restrictions are used.
8
9This is a backport of the upstream fix in version 2012.55 to version
100.52
11 https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749
12---
13 svr-authpubkeyoptions.c | 6 ++++--
14 1 files changed, 4 insertions(+), 2 deletions(-)
15
16diff --git a/svr-authpubkeyoptions.c b/svr-authpubkeyoptions.c
17index 13a179d..324eb47 100644
18--- a/svr-authpubkeyoptions.c
19+++ b/svr-authpubkeyoptions.c
20@@ -90,8 +90,10 @@ int svr_pubkey_allows_pty() {
21
22 /* Set chansession command to the one forced by 'command' public key option */
23 void svr_pubkey_set_forced_command(struct ChanSess *chansess) {
24- if (ses.authstate.pubkey_options)
25- chansess->cmd = ses.authstate.pubkey_options->forced_command;
26+ if (ses.authstate.pubkey_options) {
27+ m_free(chansess->cmd);
28+ chansess->cmd = m_strdup(ses.authstate.pubkey_options->forced_command);
29+ }
30 }
31
32 /* Free potential public key options */
33--
341.7.9.1
35

Subscribers

People subscribed via source and target branches

to all changes: