[sorry for the delay, my internet connection is sketchy these days] * Moritz Muehlenhoff [2006-01-26 10:57:53+0100] > Florian, thanks a lot for sorting this out! > I'll prepare the DSA; Recai, what cosmetic fixes do you intent > to do? A security upload's changes you be strictly limited to the > security issues.
Only changes in debian/changelog (adopt my changelog style).
> Can you send me the debdiff between the Sarge version and your proposed
> upload to the security queue or the proposed update itself?
Debdiff is attached. You can reach the proposed update at the following
uri:
http://people.debian.org/~roktas/packages/elog_2.5.7+r1558-4+sarge1.diff.gz
http://people.debian.org/~roktas/packages/elog_2.5.7+r1558-4+sarge1.dsc
http://people.debian.org/~roktas/packages/elog_2.5.7+r1558-4+sarge1_i386.deb
And here is the relevant changelog entry for your inspection:
elog (2.5.7+r1558-4+sarge1) stable-security; urgency=high
* Major security update (big thanks to Florian Weimer)
+ Backport r1333 from upstream's Subversion repository:
"Fixed crashes with very long (revisions) attributes"
+ Backport r1335 from upstream's Subversion repository:
"Applied patch from Emiliano to fix possible buffer overflow"
+ Backport r1472 from upstream's Subversion repository:
"Do not distinguish between invalid user name and invalid password
for security reasons"
+ Backport r1487 from upstream's Subversion repository:
"Fixed infinite redirection with ?fail=1"
+ Backport r1529 from upstream's Subversion repository:
"Fixed bug with fprintf and buffer containing "%""
[Our patch just eliminates the format string vulnerability.]
+ Backport r1620 from upstream's Subversion repository:
"Prohibit '..' in URLs" [CVE-2006-0347]
+ Backport r1635 from upstream's Subversion repository:
"Fixed potential buffer overflows" [CVE-2005-4439]
+ Backport r1636 from upstream's Subversion repository:
"Added IP address to log file"
* Florian Weimer [2006-01-26 13:41:53+0100]
> So far, the patch for CVE-2006-0347 was missing. A tentative backport
> of the upstream fix is included below. I dropped the hunk which dealt
> with "scripts" support because this functionality is not present in
> the sarge version.
>
> The changelog entry should look like this:
>
> Backport revision 1620 from upstream Subversion repository:
> "Prohibit '..' in URLs" [CVE-2006-0347]
Hmm, I should have checked the CVE database for other issues. Thanks for
doing it on behalf of me. I have applied the above patch and tested it for
a failure case explained in Elog forums:
http://midas.psi.ch/elogs/Forum/1615
It seems fine here (Elog returns an "Invalid URL" message).
Regards,
--
roktas
elog_2.5.7+r1558-3_2.5.7+r1558-4+sarge1.debdiff.gz
Description: Binary data
signature.asc
Description: Digital signature

