Package: auditd
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for auditd.


CVE-2008-1628[0]:
| Stack-based buffer overflow in the audit_log_user_command function in
| lib/audit_logging.c in Linux Audit before 1.7 might allow remote
| attackers to execute arbitrary code via a long command argument.
| NOTE: some of these details are obtained from third party information.

In the audit_log_user_command function the command line 
passed to the kernel for example if the command is used via 
sudo is copied via strcpy into a buffer without any bounds 
checking and leads to stack corruption.

Patch:
--- audit_logging.c     2007-04-09 23:50:01.000000000 +0200
+++ audit_logging.c.new 2008-04-09 19:35:21.000000000 +0200
@@ -607,7 +607,11 @@
        }
 
        p = cmd;
-       strcpy(commname, cmd);
+       if (len >= PATH_MAX) {
+               cmd[PATH_MAX] = 0;
+               len = PATH_MAX-1;
+       }
+
        while (*p) {
                if (*p == '"' || *p < 0x21 || (unsigned)*p > 0x7f) {
                        _audit_c2x(commname, cmd, len);



If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1628
    http://security-tracker.debian.net/tracker/CVE-2008-1628

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpodb6qcXnxa.pgp
Description: PGP signature

Reply via email to