Hi, the attached patch fixes this issue. It will be also archived on: http://people.debian.org/~nion/nmu-diff/audit-1.5.3-2_1.5.3-2.1.patch
Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
diff -u audit-1.5.3/debian/patches/series audit-1.5.3/debian/patches/series --- audit-1.5.3/debian/patches/series +++ audit-1.5.3/debian/patches/series @@ -1,0 +2 @@ +CVE-2008-1628.patch diff -u audit-1.5.3/debian/changelog audit-1.5.3/debian/changelog --- audit-1.5.3/debian/changelog +++ audit-1.5.3/debian/changelog @@ -1,3 +1,13 @@ +audit (1.5.3-2.1) unstable; urgency=high + + * Non-maintainer upload by the Security Team. + * Added CVE-2008-1628.patch to fix a stack-based buffer overflow + in the audit_log_user_command function which can be triggered via + a command argument that is passed to that function and might lead + to execution of arbitrary code (Closes: #475227). + + -- Nico Golde <[EMAIL PROTECTED]> Thu, 10 Apr 2008 15:06:25 +0200 + audit (1.5.3-2) unstable; urgency=low * debian/auditd.init: Fix inverted AUDITD_CLEAN_STOP (Closes: #428066) only in patch2: unchanged: --- audit-1.5.3.orig/debian/patches/CVE-2008-1628.patch +++ audit-1.5.3/debian/patches/CVE-2008-1628.patch @@ -0,0 +1,15 @@ +diff -Nurad audit-1.5.3.orig/lib/audit_logging.c audit-1.5.3/lib/audit_logging.c +--- audit-1.5.3.orig/lib/audit_logging.c 2008-04-10 15:08:07.000000000 +0200 ++++ audit-1.5.3/lib/audit_logging.c 2008-04-10 15:09:00.000000000 +0200 +@@ -607,7 +607,10 @@ + } + + p = cmd; +- strcpy(commname, cmd); ++ if (len >= PATH_MAX) { ++ cmd[PATH_MAX] = 0; ++ len = PATH_MAX-1; ++ } + while (*p) { + if (*p == '"' || *p < 0x21 || (unsigned)*p > 0x7f) { + _audit_c2x(commname, cmd, len);
pgpfGAawjZb4e.pgp
Description: PGP signature