Hi,
uploading a 0-day NMU to fix this as this fix is fairly 
important and the package is currently on RFA status.
debdiff attached and backuped online:
http://people.debian.org/~nion/nmu-diff/egroupware-1.4.002.dfsg-2_1.4.002.dfsg-2.1.patch

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u egroupware-1.4.002.dfsg/debian/changelog egroupware-1.4.002.dfsg/debian/changelog
--- egroupware-1.4.002.dfsg/debian/changelog
+++ egroupware-1.4.002.dfsg/debian/changelog
@@ -1,3 +1,11 @@
+egroupware (1.4.002.dfsg-2.1) unstable; urgency=high
+
+  * Non-maintainer upload by the Security Team.
+  * Fix multiple security issues in kses _bad_protocol_once function. Details
+    are under embargo for now (01-kses-security.dpatch; Closes: #471839).
+
+ -- Nico Golde <[EMAIL PROTECTED]>  Sat, 22 Mar 2008 16:26:39 +0100
+
 egroupware (1.4.002.dfsg-2) unstable; urgency=low
 
   * Upload to unstable
diff -u egroupware-1.4.002.dfsg/debian/patches/00list egroupware-1.4.002.dfsg/debian/patches/00list
--- egroupware-1.4.002.dfsg/debian/patches/00list
+++ egroupware-1.4.002.dfsg/debian/patches/00list
@@ -1,2 +1,3 @@
+01-kses-security
 06-egw-header-template
 08-egw-checkinstall-symlink
only in patch2:
unchanged:
--- egroupware-1.4.002.dfsg.orig/debian/patches/01-kses-security.dpatch
+++ egroupware-1.4.002.dfsg/debian/patches/01-kses-security.dpatch
@@ -0,0 +1,37 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 01-kses-security.dpatch by Nico Golde <[EMAIL PROTECTED]>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: No description.
+
[EMAIL PROTECTED]@
+diff -urNad egroupware-1.4.002.dfsg~/phpgwapi/inc/class.kses.inc.php egroupware-1.4.002.dfsg/phpgwapi/inc/class.kses.inc.php
+--- egroupware-1.4.002.dfsg~/phpgwapi/inc/class.kses.inc.php	2007-09-25 13:52:07.000000000 +0200
++++ egroupware-1.4.002.dfsg/phpgwapi/inc/class.kses.inc.php	2008-03-22 16:23:19.000000000 +0100
+@@ -513,13 +513,12 @@
+ 		###############################################################################
+ 		function _bad_protocol_once($string)
+ 		{
+-			return preg_replace(
+-				'/^((&[^;]*;|[\sA-Za-z0-9])*)'.
+-				'(:|&#58;|&#[Xx]3[Aa];)\s*/e',
+-				'\$this->_bad_protocol_once2("\\1")',
+-				$string
+-			);
+-			return $string;
++			$string2 = preg_split('/:|&#58;|&#x3a;/i', $string, 2);
++			if(isset($string2[1]) && !preg_match('%/\?%',$string2[0]))
++			{
++				return $this->_bad_protocol_once2($string2[0]).trim($string2[1]);
++			}
++			return '';
+ 		} # function _bad_protocol_once
+ 
+ 
+@@ -677,4 +676,4 @@
+ 			return '0.0.2 (OOP fork of kses 0.2.1)';
+ 		} # function _version
+ 	}
+-?>
+\ No newline at end of file
++?>

Attachment: pgpBwwme71ps5.pgp
Description: PGP signature

Reply via email to