On Tue, 2013-10-08 at 12:13 +1000, Dmitry Smirnov wrote:
> I'd like to deliver several security fixes to Zabbix in Squeeze.
> 
> (Security team advised to proceed through OPU "since the oldstable
> point update happens very soon anyway and we have many other open
> issues with higher priority").

"Yay".

> Below is a new changelog section, full diff is attached.

For the record, that all comes to "8 files changed, 6906 insertions(+),
5 deletions(-)", which is considerably more than I was expecting, given
how close we are to the update window closing.

A lot of it appears to be a (possibly over-cautious) belt and braces
approach to

>   * CVE-2013-5743: fixed SQL injection vulnerability.

escaping basically every use of a string anywhere near an SQL statement.
I do hope that someone's actually checked that none of those additions
of zbx_dbstr() introduces any bugs; I certainly don't know what any of
the variables might contain in order to judge. :-(

There's also

>   * CVE-2011-3263: prevent zabbix_agentd DoS attack with vfs.file.cksum.

 patches/ZBX-3794+ZBX-3830.patch      |  540 +++

There's quite a lot of noise in that patch, of the general form

++      int             ret = SYSINFO_RET_FAIL;
[...]
+-      if (num_param(param) > 1)
+-              return SYSINFO_RET_FAIL;
++      if (1 < num_param(param))
++              goto err;
[...]
+-      return SYSINFO_RET_OK;
++      ret = SYSINFO_RET_OK;
++err:
++      return ret;

afaics, the net affect of that change is nothing. I realise (having let
git-svn chew through the branch) that the noise is in upstream's
original patch, but it really doesn't make it easy to review.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to