[Pkg-mailman-hackers] Pkg-mailman commit - rev 768 - in trunk/debian: . patches

Thijs Kinkhorst thijs at moszumanska.debian.org
Mon Apr 6 15:50:10 UTC 2015


Author: thijs
Date: 2015-04-06 15:50:09 +0000 (Mon, 06 Apr 2015)
New Revision: 768

Added:
   trunk/debian/patches/92_CVE-2015-2775.patch
Modified:
   trunk/debian/changelog
   trunk/debian/patches/series
Log:
Patch CVE-2015-2775 path traversal attack.


Modified: trunk/debian/changelog
===================================================================
--- trunk/debian/changelog	2014-10-07 19:21:08 UTC (rev 767)
+++ trunk/debian/changelog	2015-04-06 15:50:09 UTC (rev 768)
@@ -1,3 +1,13 @@
+mailman (1:2.1.18-2) unstable; urgency=high
+
+  * Fix security issue: path traversal through local_part.
+    Affects installations which use an Exim or Postfix transport
+    instead of fixed aliases; attacker needs to be able to place
+    files on the local filesystem.
+    (CVE-2015-2775, Closes: 781626)
+
+ -- Thijs Kinkhorst <thijs at debian.org>  Mon, 06 Apr 2015 15:36:15 +0000
+
 mailman (1:2.1.18-1) unstable; urgency=medium
 
   * New upstream release.

Added: trunk/debian/patches/92_CVE-2015-2775.patch
===================================================================
--- trunk/debian/patches/92_CVE-2015-2775.patch	                        (rev 0)
+++ trunk/debian/patches/92_CVE-2015-2775.patch	2015-04-06 15:50:09 UTC (rev 768)
@@ -0,0 +1,34 @@
+From: Mark Sapiro <mark at msapiro.net>
+Subject: Fix path traversal through local_part (CVE-2015-2775)
+Origin: upstream, https://launchpadlibrarian.net/201407944/p
+Bug: https://bugs.launchpad.net/mailman/+bug/1437145
+Bug-Debian: http://bugs.debian.org/781626
+
+diff -ur mailman-2.1.18.orig/Mailman/Defaults.py.in mailman-2.1.18/Mailman/Defaults.py.in
+--- mailman-2.1.18.orig/Mailman/Defaults.py.in	2014-05-03 17:37:22.000000000 +0000
++++ mailman-2.1.18/Mailman/Defaults.py.in	2015-04-06 15:43:20.000000000 +0000
+@@ -138,7 +138,7 @@
+ 
+ # A Python regular expression character class which defines the characters
+ # allowed in list names.  Lists cannot be created with names containing any
+-# character that doesn't match this class.
++# character that doesn't match this class.  Do not include '/' in this list.
+ ACCEPTABLE_LISTNAME_CHARACTERS = '[-+_.=a-z0-9]'
+ 
+ 
+diff -ur mailman-2.1.18.orig/Mailman/Utils.py mailman-2.1.18/Mailman/Utils.py
+--- mailman-2.1.18.orig/Mailman/Utils.py	2014-05-03 17:37:22.000000000 +0000
++++ mailman-2.1.18/Mailman/Utils.py	2015-04-06 15:43:20.000000000 +0000
+@@ -99,6 +99,12 @@
+     #
+     # The former two are for 2.1alpha3 and beyond, while the latter two are
+     # for all earlier versions.
++    #
++    # But first ensure the list name doesn't contain a path traversal
++    # attack.
++    if len(re.sub(mm_cfg.ACCEPTABLE_LISTNAME_CHARACTERS, '', listname)) > 0:
++        syslog('mischief', 'Hostile listname: %s', listname)
++        return False
+     basepath = Site.get_listpath(listname)
+     for ext in ('.pck', '.pck.last', '.db', '.db.last'):
+         dbfile = os.path.join(basepath, 'config' + ext)

Modified: trunk/debian/patches/series
===================================================================
--- trunk/debian/patches/series	2014-10-07 19:21:08 UTC (rev 767)
+++ trunk/debian/patches/series	2015-04-06 15:50:09 UTC (rev 768)
@@ -10,3 +10,4 @@
 79_archiver_slash.patch
 90_gettext_errors.patch
 91_utf8.patch
+92_CVE-2015-2775.patch




More information about the Pkg-mailman-hackers mailing list