Your message dated Sat, 09 Dec 2017 10:47:53 +0000
with message-id <1512816473.1994.32.ca...@adam-barratt.org.uk>
and subject line Closing bugs for updates included in jessie point release
has caused the Debian Bug report #882961,
regarding jessie-pu: package pdns/3.4.1-4+deb8u8
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
882961: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882961
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian....@packages.debian.org
Usertags: pu
Security update for CVE-2017-15091. DSA has marked this
no-DSA but suggested this goes through (old)-stable-updates.
debdiff attached.
Thanks,
Chris
diff -Nru pdns-3.4.1/debian/changelog pdns-3.4.1/debian/changelog
--- pdns-3.4.1/debian/changelog 2017-01-07 00:45:53.000000000 +0000
+++ pdns-3.4.1/debian/changelog 2017-11-27 21:19:19.000000000 +0000
@@ -1,3 +1,10 @@
+pdns (3.4.1-4+deb8u8) jessie; urgency=medium
+
+ * Add patch fixing security issue:
+ * Missing check on API operations: CVE-2017-15091
+
+ -- Christian Hofstaedtler <z...@debian.org> Mon, 27 Nov 2017 21:19:19 +0000
+
pdns (3.4.1-4+deb8u7) jessie-security; urgency=high
* Security upload.
diff -Nru pdns-3.4.1/debian/patches/CVE-2017-15091.patch
pdns-3.4.1/debian/patches/CVE-2017-15091.patch
--- pdns-3.4.1/debian/patches/CVE-2017-15091.patch 1970-01-01
00:00:00.000000000 +0000
+++ pdns-3.4.1/debian/patches/CVE-2017-15091.patch 2017-11-27
21:19:19.000000000 +0000
@@ -0,0 +1,16 @@
+Index: pdns/pdns/ws-auth.cc
+===================================================================
+--- pdns.orig/pdns/ws-auth.cc
++++ pdns/pdns/ws-auth.cc
+@@ -1144,6 +1144,11 @@ void AuthWebServer::jsonstat(HttpRequest
+ {
+ string command;
+
++ if (::arg().mustDo("experimental-api-readonly")) {
++ resp->body = returnJsonError("Unavailable when API is readonly");
++ resp->status = 405;
++ }
++
+ if(req->getvars.count("command")) {
+ command = req->getvars["command"];
+ req->getvars.erase("command");
diff -Nru pdns-3.4.1/debian/patches/series pdns-3.4.1/debian/patches/series
--- pdns-3.4.1/debian/patches/series 2017-01-07 00:45:53.000000000 +0000
+++ pdns-3.4.1/debian/patches/series 2017-11-27 21:19:19.000000000 +0000
@@ -9,3 +9,4 @@
CVE-2016-7072.patch
CVE-2016-7068.patch
CVE-2016-2120.patch
+CVE-2017-15091.patch
--- End Message ---
--- Begin Message ---
Version: 8.10
Hi,
Each of the updates referenced in these bugs was included in this
morning's jessie point release. Thanks!
Regards,
Adam
--- End Message ---