On 12/06/2016 01:25 PM, Marco Innocenti wrote:
> Package: monit
> Version: 1:5.4-2+deb7u1
> Severity: grave
> Justification: renders package unusable
> 
> Dear Maintainer,
>     after upgrading monit to version 1:5.4-2+deb7u1 monit stopped
> working in all the servers we maintain. Reverting back to 1:5.4-2
> solved our problem.
> We see a segfault after a stop or a start command. Status is working as
> usual.
> 
> root@didanet19:~# monit status | tail 
> 
> System 'system_didanet19.private.cineca.it'
>   status                            Running
>   monitoring status                 Monitored
>   load average                      [0.04] [0.13] [0.10]
>   cpu                               4.0%us 0.3%sy 0.0%wa
>   memory usage                      3918168 kB [23.7%]
>   swap usage                        0 kB [0.0%]
>   data collected                    Tue, 06 Dec 2016 13:20:36
> 
> root@didanet19:~# monit stop system_didanet19.private.cineca.it
> Segmentation fault
> root@didanet19:~# monit start system_didanet19.private.cineca.it
> Segmentation fault
> 
> 
> root@didanet19:~# grep monit /var/log/messages
> Dec  6 13:10:12 didanet19 kernel: [4764451.817749] monit[26940]: segfault at
> e ip 00007f0b74faba6a sp 00007fff5da8ce80 error 4 in
> libc-2.13.so[7f0b74f66000+184000]
> Dec  6 13:10:20 didanet19 kernel: [4764459.757404] monit[26941]: segfault at
> c ip 00007fe2afe78a6a sp 00007ffc400517f0 error 4 in
> libc-2.13.so[7fe2afe33000+184000]
> Dec  6 13:10:24 didanet19 kernel: [4764463.479828] monit[26942]: segfault at
> b ip 00007fd7e1acda6a sp 00007fff322b8f60 error 4 in
> libc-2.13.so[7fd7e1a88000+184000]
> Dec  6 13:20:55 didanet19 kernel: [4765093.487700] monit[28100]: segfault at
> b ip 00007f99d7141a6a sp 00007ffdb8bef4d0 error 4 in
> libc-2.13.so[7f99d70fc000+184000]
> Dec  6 13:21:00 didanet19 kernel: [4765099.141708] monit[28101]: segfault at
> c ip 00007effe0eaba6a sp 00007fffdce03b50 error 4 in
> libc-2.13.so[7effe0e66000+184000]
> 


Yes, I just notice the security update is broken.

I have prepared the fix for this and I was planing to contact the
security team about this.

Thanks for reporting,
Victor Seva


From ee30a7dff71a579d32c6744c38834a5808b10c3f Mon Sep 17 00:00:00 2001
From: Victor Seva <linuxman...@torreviejawireless.org>
Date: Tue, 6 Dec 2016 10:40:19 +0100
Subject: [PATCH] fix 09_CVE-2016-7067.patch producing Segmentation fault on
 action

---
 debian/changelog                         |  8 ++++++++
 debian/patches/10_fixCVE-2016-7067.patch | 17 +++++++++++++++++
 debian/patches/series                    |  1 +
 3 files changed, 26 insertions(+)
 create mode 100644 debian/patches/10_fixCVE-2016-7067.patch

diff --git a/debian/changelog b/debian/changelog
index 36b8e78..41ff485 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+monit (1:5.4-2+deb7u2) wheezy-security; urgency=medium
+
+  * Non-maintainer upload.
+  * fix 09_CVE-2016-7067.patch producing Segmentation fault
+    on action
+
+ -- Victor Seva <vs...@debian.org>  Tue, 06 Dec 2016 10:29:16 +0100
+
 monit (1:5.4-2+deb7u1) wheezy-security; urgency=high
 
   * Non-maintainer upload by the LTS Team.
diff --git a/debian/patches/10_fixCVE-2016-7067.patch b/debian/patches/10_fixCVE-2016-7067.patch
new file mode 100644
index 0000000..32ff6af
--- /dev/null
+++ b/debian/patches/10_fixCVE-2016-7067.patch
@@ -0,0 +1,17 @@
+--- a/src/control.c
++++ b/src/control.c
+@@ -125,12 +125,13 @@ int control_service_daemon(const char *S
+                 "Content-Length: %d\r\n"
+                 "%s"
+                 "\r\n"
+-                "action=%s",
+                 "securitytoken=%s&action=%s",
+                 S,
+                 token,
++                strlen("securitytoken=") + strlen(token) + 1 +
+                 strlen("action=") + strlen(action),
+                 auth ? auth : "",
++                token,
+                 action) < 0)
+         {
+                 LogError("%s: Cannot send the command '%s' to the monit daemon -- %s", prog, action ? action : "null", STRERROR);
diff --git a/debian/patches/series b/debian/patches/series
index 6116d00..c5ea434 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -3,3 +3,4 @@
 07_spelling.patch
 08_hide_low_priority_info_from_stderr.patch
 09_CVE-2016-7067.patch
+10_fixCVE-2016-7067.patch
-- 
2.10.2

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to