[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: rails update



On 24/09/2020 23:14, Sylvain Beucler wrote:
> Hi Security Team,
> 
> On 15/07/2020 10:53, Moritz Muehlenhoff wrote:
>> On Wed, Jul 15, 2020 at 09:03:01AM +0200, Sylvain Beucler wrote:
>>> On 14/07/2020 22:29, Moritz Mühlenhoff wrote:
>>>> On Fri, Jul 10, 2020 at 11:55:37AM +0200, Sylvain Beucler wrote:
>>>>> On 10/07/2020 10:28, Moritz Mühlenhoff wrote:
>>>>>> On Wed, Jul 08, 2020 at 12:45:08PM +0200, Sylvain Beucler wrote:
>>>>>>> - buster update
>>>>>>>
>>>>>>> I now "up-ported" my stretch work at:
>>>>>>> https://www.beuc.net/tmp/debian-lts/rails-buster/
>>>>>>> + added the redis side of CVE-2020-8165
>>>>>>
>>>>>> What do you mean with up-ported? Applying a patch made for an older release
>>>>>> to a more recent release will miss all code which wasn't present in
>>>>>> the older suite.
>>>>>
>>>>> To phrase it more precisely, I went back to the upstream patches for
>>>>> 5.2, applied them and unit-tested them.
>>>>>
>>>>> (debdiff.txt from the above URL attached for reference.)
>>>>
>>>> Thanks, please upload! (Target distro needs to be buster-security instead of
>>>> UNRELEASED ofc)
>>>
>>> I can upload, though as I mentioned at [1] I prepared this as a basis
>>> for the rails maintainers. It doesn't fix CVE-2020-8162/66/67 and didn't
>>> go through the same level of testing than the jessie/stretch updates.
>>>
>>> [1] https://lists.debian.org/debian-lts/2020/07/msg00065.html
>>
>> Ah, I forgot about the missing CVEs, I'll add them myself on top of your patch
>> (will test them with a Puppet setup, which makes plenty of use of Rails)
>>
>> So, no need to uploading :-)
> 
> I see that today's buster security update includes none of what I had
> prepared.
> 
> To improve future collaboration, what there something you wanted to see
> done differently?

Ping?

Cheers!
Sylvain


Reply to: