From mkanat at bugzilla.org Mon Feb 1 02:59:08 2010 From: mkanat at bugzilla.org (Max Kanat-Alexander) Date: Sun, 31 Jan 2010 18:59:08 -0800 Subject: [ANN] Release of Bugzilla 3.0.10, 3.2.6, 3.4.5, and 3.5.3 Message-ID: <4B66437C.9010505@bugzilla.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Today we have four new releases: Bugzilla 3.4.5 is our latest stable release. It contains various useful bug fixes and security improvements. Bugzilla 3.2.6 is a security update for the 3.2 branch, and Bugzilla 3.0.11 is a security update for the 3.0 branch. Bugzilla 3.5.3 is our latest unstable development release. We are now feature-frozen for 3.6, so though there will be a few functional changes between now and the final release, this is mostly what 3.6 will look like when it comes out. As usual with development releases, this release has not received QA testing from the Bugzilla Project, and should not be used in production environments. Development releases exist as previews of the features that the next major release of Bugzilla will contain. They also exist for testing purposes, to collect bug reports and feedback, so if you find a bug in this development release (or you don't like how some feature works) please tell us. Download - -------- Bugzilla is available at: http://www.bugzilla.org/download/ Release Notes & Changes - ----------------------- Before installing or upgrading, you should read the Release Notes for this version of Bugzilla: 3.4.5: http://www.bugzilla.org/releases/3.4.5/release-notes.html 3.2.6: http://www.bugzilla.org/releases/3.2.6/release-notes.html 3.0.11: http://www.bugzilla.org/releases/3.0.11/release-notes.html It is particularly important to read the Release Notes if you are upgrading from one major version to another (like 3.2.x to 3.4). To see a list of all changes between your version of Bugzilla and the current version of Bugzilla, you can use the chart at: http://www.bugzilla.org/status/changes.html The Bugzilla Update - ------------------- You can see the latest updates from the Bugzilla Project and information about the latest development release on the latest Bugzilla Update: http://bugzillaupdate.wordpress.com/2010/02/01/release-3-4-5/ Report Bugs - ----------- If you find a bug in Bugzilla, please report it! Instructions are at this URL: http://www.bugzilla.org/developers/reporting_bugs.html Support - ------- You can ask questions for free on the mailing lists (or in IRC) about Bugzilla, or you can hire a paid consultant to help you out: Free Support: http://www.bugzilla.org/support/ Paid Support: http://www.bugzilla.org/support/consulting.html About Bugzilla - -------------- Bugzilla is a "Defect Tracking System" or "Bug-Tracking System." Defect Tracking Systems allow individuals or groups of developers to keep track of outstanding bugs in their product effectively. Most commercial defect-tracking software vendors charge enormous licensing fees. Despite being "free", Bugzilla has many features its expensive counterparts lack. Consequently, Bugzilla has quickly become a favorite of thousands of organizations across the globe, and is widely regarded as one of the top defect-tracking systems available. See http://www.bugzilla.org/about/ for more details. -Max Kanat-Alexander Release Manager, Bugzilla Project -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAktmQ3wACgkQaL2D/aEJPK7lmgCdECjuSKeaQr5XntSfJyI8iEZ8 j2IAoJKS6dtePFU0cpIK5uAjeHbYT/8A =FXer -----END PGP SIGNATURE----- From mkanat at bugzilla.org Mon Feb 1 03:02:45 2010 From: mkanat at bugzilla.org (Max Kanat-Alexander) Date: Sun, 31 Jan 2010 19:02:45 -0800 Subject: [ANN] Security Advisory for Bugzilla 3.0.10, 3.2.5, 3.4.4, and 3.5.2 Message-ID: <4B664455.9030905@bugzilla.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary ======= Bugzilla is a Web-based bug-tracking system, used by a large number of software projects. This advisory covers two security issues that have recently been fixed in the Bugzilla code: + Some files stored on the web server are not correctly protected against external access and can be viewed from a web browser. + Restricting a bug to a group while moving the bug to another product has no effect if the group is not used by both products. The bug may become public if no other group restriction applies. All affected installations are encouraged to upgrade as soon as possible. Vulnerability Details ===================== Issue 1 - ------- Class: Information leak Versions: all versions before 3.0.11, 3.2.6, 3.4.5, and 3.5.3 Description: Bugzilla allows web browsers to serve the contents of files in the CVS/, contrib/, docs/en/xml/, and t/ directories, as well as the old-params.txt file. These files do not contain sensitive data by default, but custom installations may have added scripts or files into these directories which contain e.g. passwords or some other sensitive information. We now forbird access to these directories from a web browser as a preventive measure. References: https://bugzilla.mozilla.org/show_bug.cgi?id=314871 https://bugzilla.mozilla.org/show_bug.cgi?id=434801 CVE Number: CVE-2009-3989 Issue 2 - ------- Class: Information leak Versions: 3.3.1 to 3.4.4, 3.5.1, 3.5.2 Description: When moving a bug from one product to another, an intermediate page is displayed letting you select the groups the bug should be restricted to in the new product. However, a regression in the 3.4.x series made it ignore all groups which are not available in both products. As a workaround, you had to move the bug to the new product first and then restrict it to the desired groups, in two distinct steps, which could make the bug temporarily public. Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=532493 CVE Number: CVE-2009-3387 Vulnerability Solutions ======================= The fixes for all of the security bugs mentioned in this advisory are included in the 3.0.11, 3.2.6, 3.4.5, and 3.5.3 releases. Upgrading to these releases will protect installations from possible exploits of these issues. Full release downloads, patches to upgrade Bugzilla from previous versions, and CVS upgrade instructions are available at: http://www.bugzilla.org/download/ Specific patches for each of the individual issues can be found on the corresponding bug reports for each issue, at the URL given in the reference for that issue in the list above. Credits ======= The Bugzilla team wish to thank the following people for their assistance in locating, advising us of, and assisting us to fix these situations: Max Kanat-Alexander Fr?d?ric Buclin Reed Loden Joel Peshkin General information about the Bugzilla bug-tracking system can be found at: http://www.bugzilla.org/ Comments and follow-ups can be directed to the mozilla.support.bugzilla newsgroup or the support-bugzilla mailing list. http://www.bugzilla.org/support/ has directions for accessing these forums. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAktmRFUACgkQaL2D/aEJPK7ByQCg/jThUFu4knqk7l3A04m0I9cv XYkAnj9P1hgOcWSUtSJ6ESmb6Jhk5CWj =Dih1 -----END PGP SIGNATURE-----