Package: release.debian.org Severity: normal User: release.debian....@packages.debian.org Usertags: pu
Moritz Muehlenhoff asked me to take care of a minor security issue (a potential post-authentication DoS in some configurations; https://security-tracker.debian.org/tracker/CVE-2011-5000). I don't think this is a big deal for a DSA, but it'd be good to fix it in stable. I can upload the following patch once I have the OK to do so. diff -Nru openssh-5.5p1/debian/changelog openssh-5.5p1/debian/changelog --- openssh-5.5p1/debian/changelog 2013-02-08 21:39:18.000000000 +0000 +++ openssh-5.5p1/debian/changelog 2013-03-03 14:14:05.000000000 +0000 @@ -1,3 +1,10 @@ +openssh (1:5.5p1-6+squeeze4) stable; urgency=low + + * CVE-2011-5000: Fix potential int overflow when using gssapi-with-mac + authentation. + + -- Colin Watson <cjwat...@debian.org> Sun, 03 Mar 2013 14:14:03 +0000 + openssh (1:5.5p1-6+squeeze3) stable; urgency=low * CVE-2010-5107: Improve DoS resistance by changing default of MaxStartups diff -Nru openssh-5.5p1/debian/patches/gss-serv-int-overflow.patch openssh-5.5p1/debian/patches/gss-serv-int-overflow.patch --- openssh-5.5p1/debian/patches/gss-serv-int-overflow.patch 1970-01-01 01:00:00.000000000 +0100 +++ openssh-5.5p1/debian/patches/gss-serv-int-overflow.patch 2013-03-03 13:55:52.000000000 +0000 @@ -0,0 +1,19 @@ +Description: Fix potential int overflow when using gssapi-with-mac auth +Author: Markus Friedl +Origin: http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/gss-serv.c?r1=1.23#rev1.23 +Forwarded: not-needed +Last-Update: 2013-02-03 + +Index: b/gss-serv.c +=================================================================== +--- a/gss-serv.c ++++ b/gss-serv.c +@@ -266,6 +266,8 @@ + name->length = get_u32(tok+offset); + offset += 4; + ++ if (UINT_MAX - offset < name->length) ++ return GSS_S_FAILURE; + if (ename->length < offset+name->length) + return GSS_S_FAILURE; + diff -Nru openssh-5.5p1/debian/patches/series openssh-5.5p1/debian/patches/series --- openssh-5.5p1/debian/patches/series 2013-02-08 21:36:03.000000000 +0000 +++ openssh-5.5p1/debian/patches/series 2013-03-03 13:56:16.000000000 +0000 @@ -30,6 +30,7 @@ # Security fixes forced-command-debug-security.patch max-startups-default.patch +gss-serv-int-overflow.patch # Versioning package-versioning.patch Thanks, -- Colin Watson [cjwat...@debian.org] -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20130303143805.ga8...@riva.dynamic.greenend.org.uk