[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1004580: marked as done (bullseye-pu: package logrotate/3.18.0-2)



Your message dated Sat, 09 Jul 2022 11:47:43 +0100
with message-id <2280fe8c78e64b02a6c1d04c6dde5a32e342ba81.camel@adam-barratt.org.uk>
and subject line Closing requests for updates included in 11.4
has caused the Debian Bug report #1004580,
regarding bullseye-pu: package logrotate/3.18.0-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1004580: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004580
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: pu
Tags: bullseye
X-Debbugs-Cc: cgzones@googlemail.com
Severity: normal

[ Reason ]
Logrotate does not reject invalid files as configuration files and
tries to parse at least parts of them.
Those files for example might be crafted coredumps, placed in
/etc/logrotate.d/ via an unsafe core dump handler.
Be more strict while parsing configuration files. See
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002022
  https://github.com/logrotate/logrotate/pull/427
  https://www.openwall.com/lists/oss-security/2021/10/20/2

Also include two other fixes, one using the correct stat information
when verifying an olddir configuration after creating the olddir, the
other advancing pointer in full_write on incomplete write to avoid
data corruption.

[ Impact ]
With an unsafe coredump handler logrotate can be used in an exploit
chain to execute arbitrary code.
Since logrotate is not the main culprit, there might still be alternatives.

[ Tests ]
The changes are all part of the recent logrotate release 3.19.0.

[ Risks ]
Since the configuration parser gets much stricter previously accepted,
but unsharp, files may become invalid, leading to logrotate not
rotating the files related to that section.
A failure of logrotate is handled by systemd by setting the service
state to "failed" and the system status to "degraded". Cron might send
an email with the command output.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable (everything is
included in 3.19.0-1)

Attachment: logrotate-3.18.0-2+deb11u1.debdiff
Description: Binary data


--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 11.4

(re-sending with fixed bug numbers)

Hi,

The updates discussed in these bugs were included in today's bullseye
point release.

Regards,

Adam

--- End Message ---

Reply to: