Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Usertags: pu

Moritz asked me to upload dbus-glib to squeeze for #700638 (CVE-2013-0292).
I've already uploaded it, with permission from adsb, since the 6.0.7 point
release is imminent. Debdiff below.

Regards,
    S

diffstat for dbus-glib_0.88-2.1 dbus-glib_0.88-2.1+squeeze1

 dbus-glib-0.88/debian/changelog                                                
|    8 +
 debian/patches/0001-CVE-2013-0292-dbus-gproxy-Verify-sender-of-NameOwner.patch 
|   52 ++++++++++
 2 files changed, 60 insertions(+)

diff -u dbus-glib-0.88/debian/changelog dbus-glib-0.88/debian/changelog
--- dbus-glib-0.88/debian/changelog
+++ dbus-glib-0.88/debian/changelog
@@ -1,3 +1,11 @@
+dbus-glib (0.88-2.1+squeeze1) stable; urgency=low
+
+  * Apply patch from upstream 0.100.1 to fix insufficient checking
+    leading to authentication bypass in pam_fprintd (CVE-2013-0292)
+    (Closes: #700638)
+
+ -- Simon McVittie <s...@debian.org>  Fri, 15 Feb 2013 17:58:34 +0000
+
 dbus-glib (0.88-2.1) unstable; urgency=high
 
   * Non-maintainer upload.
only in patch2:
unchanged:
--- 
dbus-glib-0.88.orig/debian/patches/0001-CVE-2013-0292-dbus-gproxy-Verify-sender-of-NameOwner.patch
+++ 
dbus-glib-0.88/debian/patches/0001-CVE-2013-0292-dbus-gproxy-Verify-sender-of-NameOwner.patch
@@ -0,0 +1,52 @@
+From 166978a09cf5edff4028e670b6074215a4c75eca Mon Sep 17 00:00:00 2001
+From: Colin Walters <walt...@verbum.org>
+Date: Thu, 14 Feb 2013 10:19:34 -0500
+Subject: [PATCH] CVE-2013-0292: dbus-gproxy: Verify sender of
+ NameOwnerChanged signals to be o.f.DBus
+
+Anyone can hop on the bus and emit a signal whose interface is
+o.f.DBus; it's expected at the moments that clients (and notably DBus
+libraries) check the sender.
+
+This could previously be used to trick a system service using dbus-glib
+into thinking a malicious signal came from a privileged source, by
+claiming that ownership of the privileged source's well-known name had
+changed from the privileged source's real unique name to the attacker's
+unique name.
+
+[altered to be NULL-safe so it won't crash on peer connections -smcv]
+Signed-off-by: Simon McVittie <simon.mcvit...@collabora.co.uk>
+Reviewed-by: Simon McVittie <simon.mcvit...@collabora.co.uk>
+---
+ dbus/dbus-gproxy.c |    7 ++++---
+ 1 file changed, 4 insertions(+), 3 deletions(-)
+
+diff --git a/dbus/dbus-gproxy.c b/dbus/dbus-gproxy.c
+index 2fc52f9..c3ae9ec 100644
+--- a/dbus/dbus-gproxy.c
++++ b/dbus/dbus-gproxy.c
+@@ -1250,8 +1250,11 @@ dbus_g_proxy_manager_filter (DBusConnection    
*connection,
+       GSList *tmp;
+       const char *sender;
+ 
++      sender = dbus_message_get_sender (message);
++
+       /* First we handle NameOwnerChanged internally */
+-      if (dbus_message_is_signal (message,
++      if (g_strcmp0 (sender, DBUS_SERVICE_DBUS) == 0 &&
++        dbus_message_is_signal (message,
+                                 DBUS_INTERFACE_DBUS,
+                                 "NameOwnerChanged"))
+       {
+@@ -1280,8 +1283,6 @@ dbus_g_proxy_manager_filter (DBusConnection    
*connection,
+           }
+       }
+ 
+-      sender = dbus_message_get_sender (message);
+-
+       /* dbus spec requires these, libdbus validates */
+       g_assert (dbus_message_get_path (message) != NULL);
+       g_assert (dbus_message_get_interface (message) != NULL);
+-- 
+1.7.10.4
+


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to