+ use MASTER_SITE_PACKETSTORM
+ respect CC/CFLAGS
+ add NO_REGRESS
+ clean up formatting
+ add $OpenBSD$ to patch
+ take over maintainership; no response in many, many weeks
SECURITY ADVISORY 20th March 2002
----------------------------------------------------------------------
Program: analog
Versions: all versions prior to 5.22
Operating systems: all
----------------------------------------------------------------------
Yuji Takahashi discovered a bug in analog which allows a cross-site
scripting type attack.
It is easy for an attacker to insert arbitrary strings into any web
server logfile. If these strings are then analysed by analog, they can
appear in the report. By this means an attacker can introduce
arbitrary Javascript code, for example, into an analog report produced
by someone else and read by a third person. Analog already attempted
to encode unsafe characters to avoid this type of attack, but the
conversion was incomplete.
Although it is not known that this bug has been exploited, it is easy
to exploit, and all users are advised to upgrade to version 5.22 of
analog immediately. The URL for analog is http://www.analog.cx/
I apologise for the inconvenience.
Thank you to Yuji Takahashi, Motonobu Takahashi and Takayuki Matsuki
for their help with this bug.
Stephen Turner
analog-author@lists.isite.net
Castle-Combat is a clone of the arcade classic, Rampart. This version
currently supports 2 to 4 players on local or remote servers. Players
build castle walls, place cannons inside these walls, and shoot at the
walls of their enemy(s). If a player can't build a complete wall around
one of his castles, he loses. The last surviving player wins.
incrementing the fns elisp file needed for Eshell and bumping
Emacs version to 21.1.2 rather then the expected 21.1.1.
Needs more investigation. ok espie@