diff options
Diffstat (limited to 'debian')
-rw-r--r-- | debian/changelog | 9 | ||||
-rw-r--r-- | debian/patches/CVE-2013-6075.patch | 27 | ||||
-rw-r--r-- | debian/patches/series | 1 |
3 files changed, 37 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 77bf2a952..20837542b 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,12 @@ +strongswan (5.1.0-3) UNRELEASED; urgency=high + + * urgency=high for the security fix. + * debian/patches + - CVE-2013-6075 added, fix remote denial of service and authorization + bypass. + + -- Yves-Alexis Perez <corsac@debian.org> Thu, 24 Oct 2013 23:22:58 +0200 + strongswan (5.1.0-2) unstable; urgency=medium * urgency=medium since we already spent 16 days in unstable and the fix is diff --git a/debian/patches/CVE-2013-6075.patch b/debian/patches/CVE-2013-6075.patch new file mode 100644 index 000000000..d50616a60 --- /dev/null +++ b/debian/patches/CVE-2013-6075.patch @@ -0,0 +1,27 @@ +From aa277adfc204b6bda2c3792710138f9a8723a8f1 Mon Sep 17 00:00:00 2001 +From: Martin Willi <martin@revosec.ch> +Date: Mon, 7 Oct 2013 14:21:57 +0200 +Subject: [PATCH] identification: Properly check length before comparing for + binary DN equality + +Fixes CVE-2013-6075. +--- + src/libstrongswan/utils/identification.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/libstrongswan/utils/identification.c b/src/libstrongswan/utils/identification.c +index 5df3e5f..9c43ad5 100644 +--- a/src/libstrongswan/utils/identification.c ++++ b/src/libstrongswan/utils/identification.c +@@ -602,7 +602,7 @@ static bool compare_dn(chunk_t t_dn, chunk_t o_dn, int *wc) + } + } + /* try a binary compare */ +- if (memeq(t_dn.ptr, o_dn.ptr, t_dn.len)) ++ if (chunk_equals(t_dn, o_dn)) + { + return TRUE; + } +-- +1.8.1.2 + diff --git a/debian/patches/series b/debian/patches/series index 2cf256b6c..3db0e29a8 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 01_fix-manpages.patch +CVE-2013-6075.patch |