Package: release.debian.org Severity: normal User: release.debian....@packages.debian.org Usertags: pu
Dear release team, I have prepared an update for Swift 1.4.8-2 in Wheezy. The package is available here: http://archive.gplhost.com/pub/security/swift/ Julien Cristau commited the fix for Wheezy on our Git on Alioth, which I have just uploaded (after tests on our CI). The debdiff for the package is attached. Note that this new version also updates the debian/gbp.conf, as this helps the maintainers to better track updates in Wheezy, and having to fix the gbp.conf on each rebuild is annoying: please also allow this to reach Wheezy as well. Let me know if I have the green light for the upload, Cheers, Thomas Goirand (zigo)
diff -Nru swift-1.4.8/debian/changelog swift-1.4.8/debian/changelog --- swift-1.4.8/debian/changelog 2012-09-06 08:45:21.000000000 +0000 +++ swift-1.4.8/debian/changelog 2013-07-12 06:08:41.000000000 +0000 @@ -1,3 +1,11 @@ +swift (1.4.8-2+deb70u1) wheezy-proposed-updates; urgency=low + + * CVE-2013-2161: Applied fix for unchecked user input in Swift XML responses + (Closes: #712202). + * Updated debian/gbp.conf to track Wheezy fixes. + + -- Thomas Goirand <z...@debian.org> Fri, 12 Jul 2013 13:54:33 +0800 + swift (1.4.8-2) unstable; urgency=high * CVE-2012-4406: Do not use pickle for serialization in memcache, but JSON diff -Nru swift-1.4.8/debian/gbp.conf swift-1.4.8/debian/gbp.conf --- swift-1.4.8/debian/gbp.conf 2012-09-06 08:45:21.000000000 +0000 +++ swift-1.4.8/debian/gbp.conf 2013-07-12 06:08:41.000000000 +0000 @@ -1,6 +1,7 @@ [DEFAULT] upstream-branch = master -debian-branch = debian/unstable +debian-branch = debian/wheezy +upstream-tag = %(version)s [git-buildpackage] export-dir = ../build-area/ diff -Nru swift-1.4.8/debian/patches/CVE-2013-2161.patch swift-1.4.8/debian/patches/CVE-2013-2161.patch --- swift-1.4.8/debian/patches/CVE-2013-2161.patch 1970-01-01 00:00:00.000000000 +0000 +++ swift-1.4.8/debian/patches/CVE-2013-2161.patch 2013-07-12 06:08:41.000000000 +0000 @@ -0,0 +1,27 @@ +From 6659382c4fa348e1ebbce2424968dd7267ea1db1 Mon Sep 17 00:00:00 2001 +From: Alex Gaynor <alex.gay...@gmail.com> +Date: Mon, 27 May 2013 02:07:39 +0000 +Subject: [PATCH] Check user input in XML responses. + +Fixes bug 1183884. + +* swift/account/server.py: Escape account name in XML listings. + +Change-Id: I7ba54631ed1349516132c00a53fae74f0b84ac37 +--- + swift/account/server.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +Index: swift/swift/account/server.py +=================================================================== +--- swift.orig/swift/account/server.py 2013-07-12 13:51:47.000000000 +0800 ++++ swift/swift/account/server.py 2013-07-12 13:56:46.000000000 +0800 +@@ -238,7 +238,7 @@ + account_list = '[' + ','.join(json_out) + ']' + elif out_content_type.endswith('/xml'): + output_list = ['<?xml version="1.0" encoding="UTF-8"?>', +- '<account name="%s">' % account] ++ '<account name="%s">' % saxutils.escape(account)] + for (name, object_count, bytes_used, is_subdir) in account_list: + name = saxutils.escape(name) + if is_subdir: diff -Nru swift-1.4.8/debian/patches/series swift-1.4.8/debian/patches/series --- swift-1.4.8/debian/patches/series 2012-09-06 08:45:21.000000000 +0000 +++ swift-1.4.8/debian/patches/series 2013-07-12 06:08:41.000000000 +0000 @@ -1 +1,2 @@ CVE-2012-4406_Do-not-use-pickle-for-serialization-in-memcache-but-JSON.patch +CVE-2013-2161.patch