[Debian-ha-maintainers] Bug#598549: Bug#598549: cluster-agents: NMU diff for 1:1.0.3-3.1 (Intent to NMU)

Simon Horman horms at verge.net.au
Sun Oct 17 21:49:34 UTC 2010


On Sat, Oct 16, 2010 at 08:40:30PM +0300, jari.aalto at cante.net wrote:
> 
> Dear maintainer,
> 
> Here is the NMU diff according to DevRef 5.11.1[1][2] for bug: #598549.
> See the debian/patches directory for the important fixes.
> 
> Let me know if it's okay to proceed with the NMU.
> 
> Thank you for maintaining the package,

Hi Jari,

Its unclear to me that this patch covers all cases.

e.g

$ DIR_EXECUTABLE=/abc
$ LD_LIBRARY_PATH="::"
$ /bin/echo "$DIR_EXECUTABLE${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
/abc:::

Am I missing something?

> Jari Aalto
> 
> [1] http://www.debian.org/doc/developers-reference/pkgs.html#nmu
> [2] http://dep.debian.net/deps/dep1.html
> 
> lsdiff(1) of changes:
> 
>     cluster-agents-1.0.3/debian/changelog
>     cluster-agents-1.0.3/debian/patches/CVE-2010-3389--bug598549.patch
>     cluster-agents-1.0.3/debian/patches/series
> 

> diffstat for cluster-agents-1.0.3 cluster-agents-1.0.3
> 
>  changelog                              |    8 ++++
>  patches/CVE-2010-3389--bug598549.patch |   53 +++++++++++++++++++++++++++++++++
>  patches/series                         |    1 
>  3 files changed, 62 insertions(+)
> 
> diff -Nru cluster-agents-1.0.3/debian/changelog cluster-agents-1.0.3/debian/changelog
> --- cluster-agents-1.0.3/debian/changelog	2010-05-04 16:04:18.000000000 +0300
> +++ cluster-agents-1.0.3/debian/changelog	2010-10-16 20:28:40.000000000 +0300
> @@ -1,3 +1,11 @@
> +cluster-agents (1:1.0.3-3.1) unstable; urgency=low
> +
> +  * debian/patches
> +    - (CVE-2010-3389--bug598549): New. Correct LD_LIBRARY_PATH handling.
> +      (important, security; Closes: #598549).
> +
> + -- Jari Aalto <jari.aalto at cante.net>  Sat, 16 Oct 2010 20:28:40 +0300
> +
>  cluster-agents (1:1.0.3-3) unstable; urgency=low
>  
>    * Add build dependency on docbook-xml. (Closes: #579623)
> diff -Nru cluster-agents-1.0.3/debian/patches/CVE-2010-3389--bug598549.patch cluster-agents-1.0.3/debian/patches/CVE-2010-3389--bug598549.patch
> --- cluster-agents-1.0.3/debian/patches/CVE-2010-3389--bug598549.patch	1970-01-01 02:00:00.000000000 +0200
> +++ cluster-agents-1.0.3/debian/patches/CVE-2010-3389--bug598549.patch	2010-10-16 20:26:28.000000000 +0300
> @@ -0,0 +1,53 @@
> +From a4afa69fda9a375d7763e335c556231eaefe516d Mon Sep 17 00:00:00 2001
> +From: Jari Aalto <jari.aalto at cante.net>
> +Date: Sat, 16 Oct 2010 20:26:25 +0300
> +Subject: [PATCH] CVE-2010-3389: insecure library loading
> +Organization: Private
> +Content-Type: text/plain; charset="utf-8"
> +Content-Transfer-Encoding: 8bit
> +
> +Signed-off-by: Jari Aalto <jari.aalto at cante.net>
> +---
> + heartbeat/SAPDatabase |    7 +++++--
> + heartbeat/SAPInstance |    7 +++++--
> + 2 files changed, 10 insertions(+), 4 deletions(-)
> +
> +diff --git a/heartbeat/SAPDatabase b/heartbeat/SAPDatabase
> +index 5e07046..e9574ea 100755
> +--- a/heartbeat/SAPDatabase
> ++++ b/heartbeat/SAPDatabase
> +@@ -966,8 +966,11 @@ else
> + fi
> + 
> + # as root user we need the library path to the SAP kernel to be able to call executables
> +-if [ `echo $LD_LIBRARY_PATH | grep -c "^$DIR_EXECUTABLE\>"` -eq 0 ]; then
> +-  LD_LIBRARY_PATH=$DIR_EXECUTABLE:$LD_LIBRARY_PATH; export LD_LIBRARY_PATH
> ++if [ "$DIR_EXECUTABLE" ]; then
> ++  if [ `echo $LD_LIBRARY_PATH | grep -c "^$DIR_EXECUTABLE\>"` -eq 0 ]; then
> ++      LD_LIBRARY_PATH="$DIR_EXECUTABLE${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
> ++      export LD_LIBRARY_PATH
> ++  fi
> + fi
> + sidadm="`echo $SID | tr [:upper:] [:lower:]`adm"
> + 
> +diff --git a/heartbeat/SAPInstance b/heartbeat/SAPInstance
> +index 08f47f8..d7dea78 100755
> +--- a/heartbeat/SAPInstance
> ++++ b/heartbeat/SAPInstance
> +@@ -296,8 +296,11 @@ sapinstance_init() {
> +   fi
> + 
> +   # as root user we need the library path to the SAP kernel to be able to call sapcontrol
> +-  if [ `echo $LD_LIBRARY_PATH | grep -c "^$DIR_EXECUTABLE\>"` -eq 0 ]; then
> +-    LD_LIBRARY_PATH=$DIR_EXECUTABLE:$LD_LIBRARY_PATH; export LD_LIBRARY_PATH
> ++  if [ "$DIR_EXECUTABLE" ]; then
> ++    if [ `echo $LD_LIBRARY_PATH | grep -c "^$DIR_EXECUTABLE\>"` -eq 0 ]; then
> ++	LD_LIBRARY_PATH="$DIR_EXECUTABLE${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
> ++	export LD_LIBRARY_PATH
> ++    fi
> +   fi
> + 
> +   sidadm="`echo $SID | tr [:upper:] [:lower:]`adm"
> +-- 
> +1.7.1
> +
> diff -Nru cluster-agents-1.0.3/debian/patches/series cluster-agents-1.0.3/debian/patches/series
> --- cluster-agents-1.0.3/debian/patches/series	2010-05-03 20:31:33.000000000 +0300
> +++ cluster-agents-1.0.3/debian/patches/series	2010-10-16 20:26:49.000000000 +0300
> @@ -1 +1,2 @@
> +CVE-2010-3389--bug598549.patch
>  spelling-fixes.patch

> _______________________________________________
> Debian-ha-maintainers mailing list
> Debian-ha-maintainers at lists.alioth.debian.org
> http://lists.alioth.debian.org/mailman/listinfo/debian-ha-maintainers






More information about the Debian-ha-maintainers mailing list