aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--debian/changelog17
-rw-r--r--doc/security.mdwn5
2 files changed, 12 insertions, 10 deletions
diff --git a/debian/changelog b/debian/changelog
index c7d193825..bc0480912 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -4,14 +4,15 @@ ikiwiki (3.20161220) UNRELEASED; urgency=medium
necessary, avoiding unintended function argument injection
analogous to CVE-2014-1572. In ikiwiki this could be used to
forge commit metadata, but thankfully nothing more serious.
- (OVE-20161226-0001)
- * Security: try revert operations before approving them. Previously,
- automatic rename detection could result in a revert writing outside
- the wiki srcdir or altering a file that the reverting user should not be
- able to alter, an authorization bypass. The incomplete fix released in
- 3.20161219 was not effective for git versions prior to 2.8.0rc0.
- (CVE-2016-10026 represents the original vulnerability)
- (OVE-20161226-0002 represents the incomplete fix released in 3.20161219)
+ (CVE-2016-9646)
+ * Security: try revert operations in a temporary working tree before
+ approving them. Previously, automatic rename detection could result in
+ a revert writing outside the wiki srcdir or altering a file that the
+ reverting user should not be able to alter, an authorization bypass.
+ (CVE-2016-10026 represents the original vulnerability.)
+ The incomplete fix released in 3.20161219 was not effective for git
+ versions prior to 2.8.0rc0.
+ (CVE-2016-9645 represents that incomplete solution.)
* Add CVE references for CVE-2016-10026
* Add automated test for using the CGI with git, including
CVE-2016-10026
diff --git a/doc/security.mdwn b/doc/security.mdwn
index c08d658c8..317a534ca 100644
--- a/doc/security.mdwn
+++ b/doc/security.mdwn
@@ -566,7 +566,8 @@ This bug was reported on 2016-12-17. A partially fixed version
version was not effective with git versions older than 2.8.0.
([[!cve CVE-2016-10026]] represents the original vulnerability.
-OVE-20161226-0002 represents the incomplete fix in 3.20161219.)
+[[!cve CVE-2016-9645]]/OVE-20161226-0002 represents the vulnerability
+in 3.20161219 caused by the incomplete fix.)
## Commit metadata forgery via CGI::FormBuilder context-dependent APIs
@@ -588,4 +589,4 @@ of them relatively minor:
could potentially forge commit authorship (attribute their edit to
someone else) by crafting multiple values for the rcsinfo field
-(OVE-20161226-0001)
+([[!cve CVE-2016-9646]]/OVE-20161226-0001)