Thanks for the debdiffs! In general, they are fine, but a couple of nitpicks 
for future updates:
 * for consistency, the format of the changelog should use 'SECURITY UPDATE', 
not 'Security update' and follow the changelog format as described in 
https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Packaging
 * it isn't required, but normally you will use a '-' rather than a '*' for 
subentries in the changelog (eg you would use "-  Patch to fix a buffer 
overflow vulnerability (CVE-2013-2070)"
 * you should use simply 'LP: #1182586', not 'closes LP: #1182586'
 * I encourage people to give more detail in the changelog

Eg, if I were writing this I would might write:

nginx (1.1.19-1ubuntu0.2) precise-security; urgency=low                        
                                                                               
  * SECURITY UPDATE: fix a buffer overflow via proxy_pass
     - debian/patches/cve-2013-2070.patch: verify ctx->size and ctx->length in
        src/http/modules/ngx_http_proxy_module.c
     - LP: #1182586

Builds fine with no new compiler errors/warnings. ACK

** Changed in: nginx (Ubuntu Precise)
       Status: Confirmed => Fix Committed

** Changed in: nginx (Ubuntu Quantal)
       Status: Confirmed => Fix Committed

** Changed in: nginx (Ubuntu Raring)
       Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1182586

Title:
  CVE-2013-2070:  nginx proxy_pass buffer overflow vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1182586/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to