[Pkg-nagios-changes] [pkg-nagios] r896 - in nagios2/trunk/debian: . patches

Sean Finney seanius at costa.debian.org
Fri May 12 11:22:49 UTC 2006


Author: seanius
Date: 2006-05-12 11:22:49 +0000 (Fri, 12 May 2006)
New Revision: 896

Added:
   nagios2/trunk/debian/patches/
   nagios2/trunk/debian/patches/00list
   nagios2/trunk/debian/patches/10_CVE-2006-2162_content-length.dpatch
Modified:
   nagios2/trunk/debian/changelog
Log:
should be the "real fix" for CVE-2006-2162


Modified: nagios2/trunk/debian/changelog
===================================================================
--- nagios2/trunk/debian/changelog	2006-05-12 10:54:24 UTC (rev 895)
+++ nagios2/trunk/debian/changelog	2006-05-12 11:22:49 UTC (rev 896)
@@ -1,6 +1,5 @@
 nagios2 (2.3-0.0) UNRELEASED; urgency=low
 
-  * NOT RELEASED YET
   * new upstream version
   * Fix nagios2 restart in init script.
     Thanks to Jim Jensen. (mh) Closes: #360778
@@ -11,8 +10,16 @@
   * Honor locally set file/dir permissions in postinst, fixing policy
     10.9.1 compliance. Thanks to Heiko Schlittermann. (mh) Closes: #361956
 
- -- Marc Haber <mh+debian-packages at zugschlus.de>  Tue,  9 May 2006 12:59:50 +0000
+  [sean finney]
+  * This upstream version addresses a security issue raised in CVE-2006-2162,
+    wrt malcious use of Content-Length headers on cgi scripts.  This debian
+    release includes further refinement of this fix 
+    (10_CVE-2006-2162_content-length.dpatch)
+    as we believe it's still theoretically possible to exploit the issue
+    via integer overflow. Closes: #366683.
 
+ -- sean finney <seanius at debian.org>  Fri, 12 May 2006 13:21:28 +0200
+
 nagios2 (2.2-1) unstable; urgency=low
 
   * new upstream version

Added: nagios2/trunk/debian/patches/00list
===================================================================
--- nagios2/trunk/debian/patches/00list	2006-05-12 10:54:24 UTC (rev 895)
+++ nagios2/trunk/debian/patches/00list	2006-05-12 11:22:49 UTC (rev 896)
@@ -0,0 +1 @@
+10_CVE-2006-2162_content-length.dpatch

Added: nagios2/trunk/debian/patches/10_CVE-2006-2162_content-length.dpatch
===================================================================
--- nagios2/trunk/debian/patches/10_CVE-2006-2162_content-length.dpatch	2006-05-12 10:54:24 UTC (rev 895)
+++ nagios2/trunk/debian/patches/10_CVE-2006-2162_content-length.dpatch	2006-05-12 11:22:49 UTC (rev 896)
@@ -0,0 +1,31 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 10_CVE-2006-2162_content-length.dpatch by  <seanius at debian.org>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: No description.
+
+ at DPATCH@
+diff -urNad nagios2-2.3~/cgi/getcgi.c nagios2-2.3/cgi/getcgi.c
+--- nagios2-2.3~/cgi/getcgi.c	2006-04-12 21:17:23.000000000 +0200
++++ nagios2-2.3/cgi/getcgi.c	2006-05-12 13:18:04.000000000 +0200
+@@ -10,6 +10,7 @@
+ #include "../include/getcgi.h"
+ #include <stdio.h>
+ #include <stdlib.h>
++#include <limits.h>
+ 
+ 
+ #undef PARANOID_CGI_INPUT
+@@ -169,8 +170,10 @@
+ 			printf("getcgivars(): No Content-Length was sent with the POST request.\n") ;
+ 			exit(1);
+ 		        }
+-		if(content_length<0)
+-			content_length=0;
++		if((content_length<0) || (content_length >= INT_MAX-1)){
++			printf("getcgivars(): Suspicious Content-Length was sent with the POST request.\n");
++			exit(1);
++			}
+ 		if(!(cgiinput=(char *)malloc(content_length+1))){
+ 			printf("getcgivars(): Could not allocate memory for CGI input.\n");
+ 			exit(1);


Property changes on: nagios2/trunk/debian/patches/10_CVE-2006-2162_content-length.dpatch
___________________________________________________________________
Name: svn:executable
   + *




More information about the Pkg-nagios-changes mailing list