Hi Roland,

Attached would be the debdiff for the unstable upload (Note: I have
*not* uploaded it to archive, nor yet to a delayed queue). Do you plan
to do the upload yourself? (In case needed I can do the NMU too).

Regards,
Salvatore
diff -Nru polarssl-1.3.9/debian/changelog polarssl-1.3.9/debian/changelog
--- polarssl-1.3.9/debian/changelog     2014-11-07 10:31:12.000000000 +0100
+++ polarssl-1.3.9/debian/changelog     2015-01-21 22:19:13.000000000 +0100
@@ -1,3 +1,12 @@
+polarssl (1.3.9-2.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * Add CVE-2015-1182.patch patch.
+    CVE-2015-1182: Denial of service and possible remote code execution
+    using crafted certificates. (Closes: #775776)
+
+ -- Salvatore Bonaccorso <car...@debian.org>  Wed, 21 Jan 2015 22:09:05 +0100
+
 polarssl (1.3.9-2) unstable; urgency=medium
 
   * Disabled POLARSSL_SSL_PROTO_SSL3 at compile time to prevent potential
diff -Nru polarssl-1.3.9/debian/patches/CVE-2015-1182.patch 
polarssl-1.3.9/debian/patches/CVE-2015-1182.patch
--- polarssl-1.3.9/debian/patches/CVE-2015-1182.patch   1970-01-01 
01:00:00.000000000 +0100
+++ polarssl-1.3.9/debian/patches/CVE-2015-1182.patch   2015-01-21 
22:19:13.000000000 +0100
@@ -0,0 +1,33 @@
+Description: Remote attack using crafted certificates
+ During the parsing of a ASN.1 sequence, a pointer in the linked list of
+ asn1_sequence is not initialized by asn1_get_sequence_of(). In case an
+ error occurs during parsing of the list, a situation is created where
+ the uninitialized pointer is passed to polarssl_free().
+ .
+ This sequence can be triggered when a PolarSSL entity is parsing a
+ certificate. So practically this means clients when receiving a
+ certificate from the server or servers in case they are actively asking
+ for a client certificate.
+ .
+ Depending on the attackers knowledge of the system under attack, this
+ results at the lowest into a denial of service, and at the most a
+ possible remote code execution.
+ .
+ CVE-2015-1182
+Origin: upstream, 
https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04
+Bug-Debian: https://bugs.debian.org/775776
+Forwarded: not-needed
+Author: Salvatore Bonaccorso <car...@debian.org>
+Last-Update: 2015-01-21
+
+--- a/library/asn1parse.c
++++ b/library/asn1parse.c
+@@ -278,6 +278,8 @@ int asn1_get_sequence_of( unsigned char
+             if( cur->next == NULL )
+                 return( POLARSSL_ERR_ASN1_MALLOC_FAILED );
+ 
++            memset( cur->next, 0, sizeof( asn1_sequence ) );
++
+             cur = cur->next;
+         }
+     }
diff -Nru polarssl-1.3.9/debian/patches/series 
polarssl-1.3.9/debian/patches/series
--- polarssl-1.3.9/debian/patches/series        2014-08-31 14:20:13.000000000 
+0200
+++ polarssl-1.3.9/debian/patches/series        2015-01-21 22:19:13.000000000 
+0100
@@ -1,2 +1,3 @@
 01-config.patch
 02-makefile-destdir-fix.patch
+CVE-2015-1182.patch

Attachment: signature.asc
Description: Digital signature

Reply via email to