CVE-2012-2337: IP addresses in sudoers with netmask may match additional hosts

Related Vulnerabilities: CVE-2012-2337   CVE-2012-0809  

Debian Bug report logs - #673766
CVE-2012-2337: IP addresses in sudoers with netmask may match additional hosts

version graph

Package: sudo; Maintainer for sudo is Bdale Garbee <bdale@gag.com>; Source for sudo is src:sudo (PTS, buildd, popcon).

Reported by: Moritz Muehlenhoff <muehlenhoff@univention.de>

Date: Mon, 21 May 2012 10:09:01 UTC

Severity: grave

Tags: patch, security

Fixed in version sudo/1.8.3p2-1.1

Done: Dmitrijs Ledkovs <xnox@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Bdale Garbee <bdale@gag.com>:
Bug#673766; Package sudo. (Mon, 21 May 2012 10:09:04 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <muehlenhoff@univention.de>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Bdale Garbee <bdale@gag.com>. (Mon, 21 May 2012 10:09:08 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <muehlenhoff@univention.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2012-2337: IP addresses in sudoers with netmask may match additional hosts
Date: Mon, 21 May 2012 12:06:56 +0200
Package: sudo
Severity: grave
Tags: security

Please see http://www.sudo.ws/sudo/alerts/netmask.html

Cheers,
        Moritz




Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>:
Bug#673766; Package sudo. (Tue, 22 May 2012 11:45:59 GMT) (full text, mbox, link).


Acknowledgement sent to Dmitrijs Ledkovs <dmitrijs.ledkovs@canonical.com>:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>. (Tue, 22 May 2012 11:46:03 GMT) (full text, mbox, link).


Message #10 received at 673766@bugs.debian.org (full text, mbox, reply):

From: Dmitrijs Ledkovs <dmitrijs.ledkovs@canonical.com>
To: 673766@bugs.debian.org
Subject: sudo: CVE-2012-2337: diff for NMU version 1.8.3p2-1.1
Date: Tue, 22 May 2012 12:40:34 +0100
tags 673766 + patch
tags 673766 + pending
user ubuntu-devel@lists.ubuntu.com
usertag 673766 + ubuntu-patch
thanks

Dear maintainer,

I've prepared an NMU for sudo (versioned as 1.8.3p2-1.1).
Please consider uploading this Security fix.


Regards.
diff -Nru sudo-1.8.3p2/debian/changelog sudo-1.8.3p2/debian/changelog
--- sudo-1.8.3p2/debian/changelog	2012-01-30 16:11:54.000000000 +0000
+++ sudo-1.8.3p2/debian/changelog	2012-05-22 12:26:47.000000000 +0100
@@ -1,3 +1,14 @@
+sudo (1.8.3p2-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * SECURITY UPDATE: Properly handle netmasks in sudoers Host and Host_List
+    values (LP: #1000276, Closes: #673766)
+    - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
+      addresses. Based on upstream patch.
+    - CVE-2012-2337
+
+ -- Dmitrijs Ledkovs <dmitrijs.ledkovs@canonical.com>  Tue, 22 May 2012 12:23:00 +0100
+
 sudo (1.8.3p2-1) unstable; urgency=high
 
   * new upstream version, closes: #657985 (CVE-2012-0809)
diff -Nru sudo-1.8.3p2/debian/patches/CVE-2012-2337.patch sudo-1.8.3p2/debian/patches/CVE-2012-2337.patch
--- sudo-1.8.3p2/debian/patches/CVE-2012-2337.patch	1970-01-01 01:00:00.000000000 +0100
+++ sudo-1.8.3p2/debian/patches/CVE-2012-2337.patch	2012-05-22 12:21:08.000000000 +0100
@@ -0,0 +1,47 @@
+Description: Prevent IPv6 netmask-based address matching logic from incorrectly
+ being applied to IPv4 addresses.
+Author: Todd C. Miller <Todd.Miller@courtesan.com>
+Origin: upstream, http://www.sudo.ws/repos/sudo/rev/672a4793931a
+
+Index: sudo-1.8.3p1/plugins/sudoers/match_addr.c
+===================================================================
+--- sudo-1.8.3p1.orig/plugins/sudoers/match_addr.c	2011-10-21 08:01:25.000000000 -0500
++++ sudo-1.8.3p1/plugins/sudoers/match_addr.c	2012-05-16 09:45:03.289738323 -0500
+@@ -73,7 +73,7 @@
+     for (ifp = interfaces; ifp != NULL; ifp = ifp->next) {
+ 	if (ifp->family != family)
+ 	    continue;
+-	switch(family) {
++	switch (family) {
+ 	    case AF_INET:
+ 		if (ifp->addr.ip4.s_addr == addr.ip4.s_addr ||
+ 		    (ifp->addr.ip4.s_addr & ifp->netmask.ip4.s_addr)
+@@ -91,6 +91,7 @@
+ 		}
+ 		if (j == sizeof(addr.ip6.s6_addr))
+ 		    return TRUE;
++		break;
+ #endif
+ 	}
+     }
+@@ -154,10 +155,11 @@
+     for (ifp = interfaces; ifp != NULL; ifp = ifp->next) {
+ 	if (ifp->family != family)
+ 	    continue;
+-	switch(family) {
++	switch (family) {
+ 	    case AF_INET:
+ 		if ((ifp->addr.ip4.s_addr & mask.ip4.s_addr) == addr.ip4.s_addr)
+ 		    return TRUE;
++		break;
+ #ifdef HAVE_IN6_ADDR
+ 	    case AF_INET6:
+ 		for (j = 0; j < sizeof(addr.ip6.s6_addr); j++) {
+@@ -166,6 +168,7 @@
+ 		}
+ 		if (j == sizeof(addr.ip6.s6_addr))
+ 		    return TRUE;
++		break;
+ #endif /* HAVE_IN6_ADDR */
+ 	}
+     }
diff -Nru sudo-1.8.3p2/debian/patches/series sudo-1.8.3p2/debian/patches/series
--- sudo-1.8.3p2/debian/patches/series	2011-10-23 00:49:16.000000000 +0100
+++ sudo-1.8.3p2/debian/patches/series	2012-05-22 12:22:07.000000000 +0100
@@ -1,2 +1,3 @@
 typo-in-classic-insults.diff
 paths-in-samples.diff
+CVE-2012-2337.patch




Added tag(s) patch. Request was from Dmitrijs Ledkovs <dmitrijs.ledkovs@canonical.com> to control@bugs.debian.org. (Tue, 22 May 2012 11:46:53 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from Dmitrijs Ledkovs <dmitrijs.ledkovs@canonical.com> to control@bugs.debian.org. (Tue, 22 May 2012 11:46:55 GMT) (full text, mbox, link).


Reply sent to Dmitrijs Ledkovs <xnox@debian.org>:
You have taken responsibility. (Thu, 24 May 2012 21:21:49 GMT) (full text, mbox, link).


Notification sent to Moritz Muehlenhoff <muehlenhoff@univention.de>:
Bug acknowledged by developer. (Thu, 24 May 2012 21:21:49 GMT) (full text, mbox, link).


Message #19 received at 673766-close@bugs.debian.org (full text, mbox, reply):

From: Dmitrijs Ledkovs <xnox@debian.org>
To: 673766-close@bugs.debian.org
Subject: Bug#673766: fixed in sudo 1.8.3p2-1.1
Date: Thu, 24 May 2012 21:09:40 +0000
Source: sudo
Source-Version: 1.8.3p2-1.1

We believe that the bug you reported is fixed in the latest version of
sudo, which is due to be installed in the Debian FTP archive:

sudo-ldap_1.8.3p2-1.1_amd64.deb
  to main/s/sudo/sudo-ldap_1.8.3p2-1.1_amd64.deb
sudo_1.8.3p2-1.1.debian.tar.gz
  to main/s/sudo/sudo_1.8.3p2-1.1.debian.tar.gz
sudo_1.8.3p2-1.1.dsc
  to main/s/sudo/sudo_1.8.3p2-1.1.dsc
sudo_1.8.3p2-1.1_amd64.deb
  to main/s/sudo/sudo_1.8.3p2-1.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 673766@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dmitrijs Ledkovs <xnox@debian.org> (supplier of updated sudo package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 22 May 2012 12:23:00 +0100
Source: sudo
Binary: sudo sudo-ldap
Architecture: source amd64
Version: 1.8.3p2-1.1
Distribution: unstable
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Dmitrijs Ledkovs <xnox@debian.org>
Description: 
 sudo       - Provide limited super user privileges to specific users
 sudo-ldap  - Provide limited super user privileges to specific users
Closes: 673766
Changes: 
 sudo (1.8.3p2-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * SECURITY UPDATE: Properly handle netmasks in sudoers Host and Host_List
     values (LP: #1000276, Closes: #673766, CVE-2012-2337)
     - debian/patches/CVE-2012-2337.patch: Don't perform IPv6 checks on IPv4
       addresses. Based on upstream patch.
Checksums-Sha1: 
 d64a4d0d9600401479ff991f043ef7ea6c9aa170 1873 sudo_1.8.3p2-1.1.dsc
 3009fb7249cdc71330518370ace2d2747226a62a 22640 sudo_1.8.3p2-1.1.debian.tar.gz
 e53578ce82d0c0ac42ecfaca09899df72b4606d4 681172 sudo_1.8.3p2-1.1_amd64.deb
 18c11dddfb813dd521e02a13c3f253363dbfdef5 707290 sudo-ldap_1.8.3p2-1.1_amd64.deb
Checksums-Sha256: 
 47d4a2e1096fbd4316d0c6dd55f0c3a8694cab38606566ae305ec2d1bc8a5ced 1873 sudo_1.8.3p2-1.1.dsc
 3987b471b0b93ca3bf9c75221a8a1dea88de570bf4c357fd23b89843458f0fa2 22640 sudo_1.8.3p2-1.1.debian.tar.gz
 5eb1c80261f67bd4dfa93b0455b9104c73f1efa8b410ec740e3431b0a1296d55 681172 sudo_1.8.3p2-1.1_amd64.deb
 5d25914386d3a4778972a393f613e146f244ecd90de64d7e9b283d2b933122ca 707290 sudo-ldap_1.8.3p2-1.1_amd64.deb
Files: 
 73c50a9c9c05f3586ec2fea48db7fe92 1873 admin optional sudo_1.8.3p2-1.1.dsc
 11bd4c9f1f275fe05a240964aff6bb91 22640 admin optional sudo_1.8.3p2-1.1.debian.tar.gz
 03f6b2045610e3c46f98f535fb9ea4e5 681172 admin optional sudo_1.8.3p2-1.1_amd64.deb
 9d7f365e762ec2f353ff846a89b2bbac 707290 admin optional sudo-ldap_1.8.3p2-1.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=ykBa
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 24 Jun 2012 07:43:04 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:59:12 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.