Hi,
the attached patch fixes this issue.
It will be also archived on:
http://people.debian.org/~nion/nmu-diff/audit-1.5.3-2_1.5.3-2.1.patch

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u audit-1.5.3/debian/patches/series audit-1.5.3/debian/patches/series
--- audit-1.5.3/debian/patches/series
+++ audit-1.5.3/debian/patches/series
@@ -1,0 +2 @@
+CVE-2008-1628.patch
diff -u audit-1.5.3/debian/changelog audit-1.5.3/debian/changelog
--- audit-1.5.3/debian/changelog
+++ audit-1.5.3/debian/changelog
@@ -1,3 +1,13 @@
+audit (1.5.3-2.1) unstable; urgency=high
+
+  * Non-maintainer upload by the Security Team.
+  * Added CVE-2008-1628.patch to fix a stack-based buffer overflow
+    in the audit_log_user_command function which can be triggered via
+    a command argument that is passed to that function and might lead
+    to execution of arbitrary code (Closes: #475227).
+
+ -- Nico Golde <[EMAIL PROTECTED]>  Thu, 10 Apr 2008 15:06:25 +0200
+
 audit (1.5.3-2) unstable; urgency=low
 
   * debian/auditd.init: Fix inverted AUDITD_CLEAN_STOP (Closes: #428066)
only in patch2:
unchanged:
--- audit-1.5.3.orig/debian/patches/CVE-2008-1628.patch
+++ audit-1.5.3/debian/patches/CVE-2008-1628.patch
@@ -0,0 +1,15 @@
+diff -Nurad audit-1.5.3.orig/lib/audit_logging.c audit-1.5.3/lib/audit_logging.c
+--- audit-1.5.3.orig/lib/audit_logging.c	2008-04-10 15:08:07.000000000 +0200
++++ audit-1.5.3/lib/audit_logging.c	2008-04-10 15:09:00.000000000 +0200
+@@ -607,7 +607,10 @@
+ 	}
+ 
+ 	p = cmd;
+-	strcpy(commname, cmd);
++	if (len >= PATH_MAX) {
++		cmd[PATH_MAX] = 0;
++		len = PATH_MAX-1;
++	}
+ 	while (*p) {
+ 		if (*p == '"' || *p < 0x21 || (unsigned)*p > 0x7f) {
+ 			_audit_c2x(commname, cmd, len);

Attachment: pgpfGAawjZb4e.pgp
Description: PGP signature

Reply via email to