Hi Daniel,

On Wed, Sep 03, 2014 at 02:05:53PM +0200, Daniel Pocock wrote:
> Salvatore, I'd prefer to update the package closer to the freeze and
> roll up any other changes in a single release.

Personal opinion: having a fix sooner in testing would be preferable.
Thiw way the whole package would recieve more testing already before
the freeze.

> People should not be making LogAnalyzer available to the world,
> especially without additional access controls (HTTP authentication) so
> that provides some protection against flaws that do exist in this product.
> 
> How would the security team feel if this package was classified in a
> similar way to the ganglia-web package, e.g. security alerts are not RC
> bugs and users advised to protect the URL with the webserver?

It is hard to prevent a syslog analysis tool from processing data from
untrusted sources. Releasing the package mentioning such a restriction
to security support does somehow not make sense, considering the
intended use of the package.

In the concrete instance of
http://seclists.org/fulldisclosure/2014/Sep/17, a malicious syslog
client, by setting an appropriate hostname could perform a XSS
injection, even if the loganalyzer instance would be secured with
additional access controls. Is this correct and do you agree?

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to