Your message dated Tue, 12 Feb 2013 16:27:40 +0000 with message-id <9a7b14ae53d6ce049253724f8f196e53@hogwarts.powdarrmonkey.net> and subject line Re: Bug#700316: tpu: curl/7.26.0-1+wheezy1 has caused the Debian Bug report #700316, regarding tpu: curl/7.26.0-1+wheezy1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 700316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700316 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: tpu: curl/7.26.0-1+wheezy1
- From: Alessandro Ghedini <ghedo@debian.org>
- Date: Mon, 11 Feb 2013 15:53:59 +0100
- Message-id: <20130211145359.GA28260@kronk>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: unblock Hi, I have prepared a tpu upload for curl to fix #700002 (aka CVE-2013-0249) which is already fixed in sid by curl/7.29.0-1. See attached debdiff. Cheers -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (990, 'unstable'), (600, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.7-trunk-amd64 (SMP w/4 CPU cores) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dashdiff -Nru curl-7.26.0/debian/changelog curl-7.26.0/debian/changelog --- curl-7.26.0/debian/changelog 2012-05-25 15:20:44.000000000 +0200 +++ curl-7.26.0/debian/changelog 2013-02-10 19:15:35.000000000 +0100 @@ -1,3 +1,12 @@ +curl (7.26.0-1+wheezy1) testing-proposed-updates; urgency=high + + * Fix buffer overflow when negotiating SMTP DIGEST-MD5 authentication + as per CVE-2013-0249 (Closes: #700002) + http://curl.haxx.se/docs/adv_20130206.html + * Set urgency=high accordingly + + -- Alessandro Ghedini <ghedo@debian.org> Sun, 10 Feb 2013 19:14:47 +0100 + curl (7.26.0-1) unstable; urgency=low * New upstream release diff -Nru curl-7.26.0/debian/patches/05_curl-sasl-CVE-2013-0249.patch curl-7.26.0/debian/patches/05_curl-sasl-CVE-2013-0249.patch --- curl-7.26.0/debian/patches/05_curl-sasl-CVE-2013-0249.patch 1970-01-01 01:00:00.000000000 +0100 +++ curl-7.26.0/debian/patches/05_curl-sasl-CVE-2013-0249.patch 2013-02-10 19:17:22.000000000 +0100 @@ -0,0 +1,60 @@ +Description: Fix buffer overflow in SMTP DIGEST-MD5 negotiation + When negotiating SMTP DIGEST-MD5 authentication, the function + smtp_state_authdigest_resp() uses the data provided from the + server without doing the proper length checks and that data is then + appended to a local fixed-size buffer on the stack. +Origin: vendor, adapted from http://curl.haxx.se/curl-sasl.patch +Bug: http://curl.haxx.se/docs/adv_20130206.html +Bug-Debian: http://bugs.debian.org/700002 +Forwarded: not-needed +Author: Alessandro Ghedini <ghedo@debian.org> +Last-Update: 2013-02-10 + +--- a/lib/smtp.c ++++ b/lib/smtp.c +@@ -879,7 +879,7 @@ + char cnonce[] = "12345678"; /* will be changed */ + char method[] = "AUTHENTICATE"; + char qop[] = "auth"; +- char uri[128] = "smtp/"; ++ char uri[128]; + char response[512]; + + (void)instate; /* no use for this yet */ +@@ -963,8 +963,8 @@ + for(i = 0; i < MD5_DIGEST_LEN; i++) + snprintf(&HA1_hex[2 * i], 3, "%02x", digest[i]); + +- /* Orepare URL string, append realm to the protocol */ +- strcat(uri, realm); ++ /* Prepare the URL string */ ++ snprintf(uri, sizeof(uri), "smtp/%s", realm); + + /* Calculate H(A2) */ + ctxt = Curl_MD5_init(Curl_DIGEST_MD5); +@@ -1008,20 +1008,11 @@ + for(i = 0; i < MD5_DIGEST_LEN; i++) + snprintf(&resp_hash_hex[2 * i], 3, "%02x", digest[i]); + +- strcpy(response, "username=\""); +- strcat(response, conn->user); +- strcat(response, "\",realm=\""); +- strcat(response, realm); +- strcat(response, "\",nonce=\""); +- strcat(response, nonce); +- strcat(response, "\",cnonce=\""); +- strcat(response, cnonce); +- strcat(response, "\",nc="); +- strcat(response, nonceCount); +- strcat(response, ",digest-uri=\""); +- strcat(response, uri); +- strcat(response, "\",response="); +- strcat(response, resp_hash_hex); ++ snprintf(response, sizeof(response), ++ "username=\"%s\",realm=\"%s\",nonce=\"%s\"," ++ "cnonce=\"%s\",nc=\"%s\",digest-uri=\"%s\",response=%s", ++ conn->user, realm, nonce, ++ cnonce, nonceCount, uri, resp_hash_hex); + + /* Encode it to base64 and send it */ + result = Curl_base64_encode(data, response, 0, &rplyb64, &len); diff -Nru curl-7.26.0/debian/patches/series curl-7.26.0/debian/patches/series --- curl-7.26.0/debian/patches/series 2012-05-25 15:20:44.000000000 +0200 +++ curl-7.26.0/debian/patches/series 2013-02-10 19:14:42.000000000 +0100 @@ -2,6 +2,7 @@ 02_art_http_scripting.patch 03_keep_symbols_compat.patch 04_workaround_as_needed_bug.patch +05_curl-sasl-CVE-2013-0249.patch 90_gnutls.patch 99_nss.patchAttachment: signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
- To: Alessandro Ghedini <ghedo@debian.org>, <700316-done@bugs.debian.org>
- Subject: Re: Bug#700316: tpu: curl/7.26.0-1+wheezy1
- From: Jonathan Wiltshire <jmw@debian.org>
- Date: Tue, 12 Feb 2013 16:27:40 +0000
- Message-id: <9a7b14ae53d6ce049253724f8f196e53@hogwarts.powdarrmonkey.net>
- In-reply-to: <20130212112508.GA21791@kronk>
- References: <20130211145359.GA28260@kronk> <20130211195601.GD5321@ernie.home.powdarrmonkey.net> <20130212112508.GA21791@kronk>
On 2013-02-12 11:25, Alessandro Ghedini wrote:On Mon, Feb 11, 2013 at 07:56:01PM +0000, Jonathan Wiltshire wrote:Control: tag -1 + confirmed On Mon, Feb 11, 2013 at 03:53:59PM +0100, Alessandro Ghedini wrote: > Hi, >> I have prepared a tpu upload for curl to fix #700002 (aka CVE-2013-0249) which> is already fixed in sid by curl/7.29.0-1. Please go ahead.Uploaded. CheersThanks, approved. -- Jonathan Wiltshire jmw@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 <directhex> i have six years of solaris sysadmin experience, from 8->10. i am well qualified to say it is made from bonghits layered on top of bonghits
--- End Message ---