Hi Yaroslav,

On Saturday 29 December 2007 21:23, Thijs Kinkhorst wrote:
> I'm sorry for the delay in taking this issue on. Here's my response to your
> patch. In short, I think most issues are more relevant to a stable update
> than to a security update.

As you've seen Moritz has commented aswell. I've shortly talked with him and 
he has a good point: some issues may not be worthwhile of a DSA in itself but 
could be included if we are sending a DSA anyway. Still we need to strike a 
balance between the security-relatedness and the "chance of breakage" that 
every change introduces.

> +  * NOT RELEASED YET
> +  * Propagated fix for asctime pattern from 0.7.8 release (closes:
> #421848)
>
> As you say yourself in that bugreport - it's not really a security issue
> and only for a specific filter of Apache. This may be a candidate for a
> stable update (check with SRM) but please leave it out of the security
> update.

Ok, let's include this one.

> +  * Propagated fix for not closed log files from 0.7.8-1
> +    (closes: #439962,434368)
> +  * Propagated fix for "reload" bug which is as sever as #439962 and just
> +    never was hit by any Debian user yet
>
> As you said in your other mail, these issues are related to fail2ban
> stalling upon reload. That is a serious bug but not a security issue. Of
> course fail2ban not functioning in itself can be considered as a security
> issue because it's specifically designed to prevent other attacks. However,
> there's no concrete attack possible because of fail2ban failing to ban.

How long have these changes been in unstable/testing? Were there any problems 
with it? I'm willing to include them if they are reasonably well tested.

> +  * Added patch 00_numeric_iptables-L to avoid possible DoS attacks
> +    (introduced upstream in 0.7.6)
>
> If I understand this correctly, this makes iptables not do DNS lookups.
> While that's obviously a useful fix, I think it's not a serious security
> issue. There's lots of services doing one or more DNS lookup when something
> external connects to them, and skipping that where possible is good, but
> not something I would add to a security update, I'm sorry. Again, maybe the
> SRM's are willing to include this.

Ok, this fix is as I said not very security-related but on the other hand 
trivial. So let's include it.

> +  * Propagated "Fixed removal of host in hosts.deny" from 0.7.6, to
> prevent +    possible DoS
>
> This fix seems appropriate to a security update.
>
> +  * Rigid call to python2.4 instead of via /usr/bin/env to prevent
> +    in-the-middle attack via environment poisoning
>
> I think this is out of scope for a security update, or even a stable update
> if you ask me. Please do not include it in the security update at least,
> and discuss with the stable release team if you want it included in etch
> still.

I still think this is not appropriate, sorry.

> Concluding: please prepare a package for stable with the two mentioned
> issues fixed (please include relevant CVE  id and bug numbers in the
> changelog) and send us the debdiff for a last review.

Please do so with this revised information :-)


Thijs

Attachment: pgpiqNU6QeDkq.pgp
Description: PGP signature

Reply via email to