Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Usertags: unblock

Hi Release Team,

Please unblock package dhcpcd5, which fixed as denial-of-service vulnerability
(CVE-2014-6060). Relevant bug in the BTS is #770043.  Additionally to the patch
I have updated the maintainer field to Debian QA group as previous maintainer
orphaned the package. Full changelog is as follows:

dhcpcd5 (6.0.5-2) unstable; urgency=medium

  * QA upload.

  [ Pierre Schweitzer ]
  * Fix denial of service (CVE-2014-6060) in dhcpcd5. (Closes: #770043).

  [ Salvatore Bonaccorso ]
  * Refresh CVE-2014-6060.patch (offset)
  * Update patch headers for CVE-2014-6060.patch.
    Wrap long lines in fields and use Description field.
    Add Applied-Upstream value.
  * Set Maintainer to Debian QA Group (cf. #770082)

 -- Salvatore Bonaccorso <car...@debian.org>  Wed, 19 Nov 2014 17:08:30 +0100

Attached is also the full debdiff.

Could you thus

unblock dhcpcd5/6.0.5-2

Many thanks in advance!

Regards,
Salvatore
diff -Nru dhcpcd5-6.0.5/debian/changelog dhcpcd5-6.0.5/debian/changelog
--- dhcpcd5-6.0.5/debian/changelog	2013-12-04 14:49:45.000000000 +0100
+++ dhcpcd5-6.0.5/debian/changelog	2014-11-19 19:50:28.000000000 +0100
@@ -1,3 +1,19 @@
+dhcpcd5 (6.0.5-2) unstable; urgency=medium
+
+  * QA upload.
+
+  [ Pierre Schweitzer ]
+  * Fix denial of service (CVE-2014-6060) in dhcpcd5. (Closes: #770043).
+
+  [ Salvatore Bonaccorso ]
+  * Refresh CVE-2014-6060.patch (offset)
+  * Update patch headers for CVE-2014-6060.patch.
+    Wrap long lines in fields and use Description field.
+    Add Applied-Upstream value.
+  * Set Maintainer to Debian QA Group (cf. #770082)
+
+ -- Salvatore Bonaccorso <car...@debian.org>  Wed, 19 Nov 2014 17:08:30 +0100
+
 dhcpcd5 (6.0.5-1.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -Nru dhcpcd5-6.0.5/debian/control dhcpcd5-6.0.5/debian/control
--- dhcpcd5-6.0.5/debian/control	2013-06-25 15:47:59.000000000 +0200
+++ dhcpcd5-6.0.5/debian/control	2014-11-19 19:50:28.000000000 +0100
@@ -1,7 +1,7 @@
 Source: dhcpcd5
 Section: net
 Priority: optional
-Maintainer: Roy Marples <r...@marples.name>
+Maintainer: Debian QA Group <packa...@qa.debian.org>
 Build-Depends: debhelper (>= 9)
 Standards-Version: 3.9.4.0
 Homepage: http://roy.marples.name/projects/dhcpcd
diff -Nru dhcpcd5-6.0.5/debian/patches/CVE-2014-6060.patch dhcpcd5-6.0.5/debian/patches/CVE-2014-6060.patch
--- dhcpcd5-6.0.5/debian/patches/CVE-2014-6060.patch	1970-01-01 01:00:00.000000000 +0100
+++ dhcpcd5-6.0.5/debian/patches/CVE-2014-6060.patch	2014-11-19 19:50:28.000000000 +0100
@@ -0,0 +1,27 @@
+Description: Fix CVE-2014-6060
+ Only bits 1 and 2 are used in the DHCP overload option, so when we
+ encounter the option set the last bit as well to ensure servername and
+ bootfile are only checked once as their check unsets bits 1 and 2.
+ Thanks to Tobias Stoeckmann.
+Origin: upstream, http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0
+Bug-Debian: https://bugs.debian.org/770043
+From: Roy Marples <r...@marples.name>
+Applied-Upstream: 6.4.3
+
+--- a/dhcp.c
++++ b/dhcp.c
+@@ -343,9 +343,12 @@ get_option(const struct dhcp_message *dh
+ 				goto exit;
+ 			break;
+ 		case DHO_OPTIONSOVERLOADED:
+-			/* Ensure we only get this option once */
++			/* Ensure we only get this option once by setting
++			 * the last bit as well as the value.
++			 * This is valid because only the first two bits
++			 * actually mean anything in RFC2132 Section 9.3 */
+ 			if (!overl)
+-				overl = p[1];
++				overl = 0x80 | p[1];
+ 			break;
+ 		}
+ 		l = *p++;
diff -Nru dhcpcd5-6.0.5/debian/patches/series dhcpcd5-6.0.5/debian/patches/series
--- dhcpcd5-6.0.5/debian/patches/series	2013-12-04 14:52:31.000000000 +0100
+++ dhcpcd5-6.0.5/debian/patches/series	2014-11-19 19:50:28.000000000 +0100
@@ -1 +1,2 @@
 kfreebsd.diff
+CVE-2014-6060.patch

Reply via email to