Dear maintainer,

I've prepared an NMU for rpcbind (versioned as 0.2.3-0.6). The diff
is attached to this message.

Regards,
Salvatore
diff -Nru rpcbind-0.2.3/debian/changelog rpcbind-0.2.3/debian/changelog
--- rpcbind-0.2.3/debian/changelog	2016-06-17 17:54:27.000000000 +0200
+++ rpcbind-0.2.3/debian/changelog	2017-05-05 19:46:00.000000000 +0200
@@ -1,3 +1,14 @@
+rpcbind (0.2.3-0.6) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * CVE-2017-8779: Memory leak when failing to parse XDR strings or bytearrays
+    (Closes: #861835)
+  * Bump runtime dependency on libtirpc1.
+    Bump Depends on libtirpc1 (>= 0.2.5-1.2~) to pull the fixes on libtirpc1
+    for CVE-2017-8779.
+
+ -- Salvatore Bonaccorso <car...@debian.org>  Fri, 05 May 2017 19:46:00 +0200
+
 rpcbind (0.2.3-0.5) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru rpcbind-0.2.3/debian/control rpcbind-0.2.3/debian/control
--- rpcbind-0.2.3/debian/control	2016-05-30 17:59:16.000000000 +0200
+++ rpcbind-0.2.3/debian/control	2017-05-05 19:46:00.000000000 +0200
@@ -8,7 +8,7 @@
 
 Package: rpcbind
 Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, lsb-base (>= 4.1+Debian3), libtirpc1 (>= 0.2.4-2~)
+Depends: ${shlibs:Depends}, ${misc:Depends}, lsb-base (>= 4.1+Debian3), libtirpc1 (>= 0.2.5-1.2~)
 Conflicts: portmap
 Provides: portmap
 Breaks: libc-bin (<< 2.16)
diff -Nru rpcbind-0.2.3/debian/patches/08-CVE-2017-8779.patch rpcbind-0.2.3/debian/patches/08-CVE-2017-8779.patch
--- rpcbind-0.2.3/debian/patches/08-CVE-2017-8779.patch	1970-01-01 01:00:00.000000000 +0100
+++ rpcbind-0.2.3/debian/patches/08-CVE-2017-8779.patch	2017-05-05 19:46:00.000000000 +0200
@@ -0,0 +1,29 @@
+Description: CVE-2017-8779: Memory leak when failing to parse XDR strings or bytearrays
+Origin: vendor
+Bug: https://bugs.debian.org/861835
+Forwarded: not-needed
+Author: Guido Vranken <guidovran...@gmail.com>
+Reviewed-by: Salvatore Bonaccorso <car...@debian.org>
+Last-Update: 2017-05-05
+
+diff --git a/src/rpcb_svc_com.c b/src/rpcb_svc_com.c
+index 5862c26..e11f61b 100644
+--- a/src/rpcb_svc_com.c
++++ b/src/rpcb_svc_com.c
+@@ -48,6 +48,7 @@
+ #include <rpc/rpc.h>
+ #include <rpc/rpcb_prot.h>
+ #include <rpc/svc_dg.h>
++#include <rpc/rpc_com.h>
+ #include <netconfig.h>
+ #include <errno.h>
+ #include <syslog.h>
+@@ -432,7 +433,7 @@ rpcbproc_taddr2uaddr_com(void *arg, struct svc_req *rqstp /*__unused*/,
+ static bool_t
+ xdr_encap_parms(XDR *xdrs, struct encap_parms *epp)
+ {
+-	return (xdr_bytes(xdrs, &(epp->args), (u_int *) &(epp->arglen), ~0));
++	return (xdr_bytes(xdrs, &(epp->args), (u_int *) &(epp->arglen), RPC_MAXDATASIZE));
+ }
+ 
+ /*
diff -Nru rpcbind-0.2.3/debian/patches/series rpcbind-0.2.3/debian/patches/series
--- rpcbind-0.2.3/debian/patches/series	2015-11-10 13:01:01.000000000 +0100
+++ rpcbind-0.2.3/debian/patches/series	2017-05-05 19:46:00.000000000 +0200
@@ -4,3 +4,4 @@
 run-migration
 CVE-2015-7236.patch
 07-Delete-the-unix-socket-only-if-we-have-created-it.patch
+08-CVE-2017-8779.patch

Reply via email to