Hi Antoine, [Adding CC to [email protected]]
Apologies for the delay, we had other issues which needed more attention first. On Tue, Sep 09, 2025 at 01:58:33PM -0400, Antoine Beaupré wrote: > On 2025-09-08 10:00:13, Antoine Beaupré wrote: > > On 2025-09-07 20:29:19, Salvatore Bonaccorso wrote: > >> Source: python-internetarchive > >> Version: 5.4.0-1 > >> Severity: important > >> Tags: security upstream > >> X-Debbugs-Cc: [email protected], Debian Security Team > >> <[email protected]> > >> > >> Hi, > >> > >> The following vulnerability was published for python-internetarchive. > >> > >> CVE-2025-58438[0]: > >> | internetarchive is a Python and Command-Line Interface to > >> | Archive.org In versions 5.5.0 and below, there is a directory > >> | traversal (path traversal) vulnerability in the File.download() > >> | method of the internetarchive library. The file.download() method > >> | does not properly sanitize user-supplied filenames or validate the > >> | final download path. A maliciously crafted filename could contain > >> | path traversal sequences (e.g., > >> | ../../../../windows/system32/file.txt) or illegal characters that, > >> | when processed, would cause the file to be written outside of the > >> | intended target directory. An attacker could potentially overwrite > >> | critical system files or application configuration files, leading to > >> | a denial of service, privilege escalation, or remote code execution, > >> | depending on the context in which the library is used. The > >> | vulnerability is particularly critical for users on Windows systems, > >> | but all operating systems are affected. This issue is fixed in > >> | version 5.5.1. > >> > >> > >> If you fix the vulnerability please also make sure to include the > >> CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > > > I have a upload ready for unstable already, changelog looks like this: > > > > python-internetarchive (5.5.1-1) unstable; urgency=high > > > > * new upstream release (Closes: #1114635, CVE-2025-58438) > > > > -- Antoine Beaupré <[email protected]> Mon, 08 Sep 2025 09:50:19 -0400 > > > > does that look sane? can i upload to unstable as is? > > So i've uploaded that to unstable already... > > > [...] > > > Is it really worth just doing that backport? We'd be avoiding: > > [...] > > > ... feels like mostly small features and bugfixes to me... > > Not having had any feedback on this, i've prepared a debdiff for a > simpler backport of the patch (as opposed to the whole upstream), see > the attachment. > > I am waiting on input from the security team before performing this > upload, as directed by: > > https://www.debian.org/doc/manuals/developers-reference/pkgs.html#security-uploads > > i have not checked whether bookworm also needs a kick, i assume it > does, but the version there is far older and the backport will be much > more challenging. > > i would recommend dropping security support for that version. We had brief discussions about python-internetarchive in the team and think the issue might warrant a DSA. Could you prepare debdiffs for both trixie-security and bookworm-security (at least we should attempt, bookworm is still security-supported for another year by regular security support before moving to LTS)? https://www.debian.org/doc/manuals/developers-reference/pkgs.html#bug-security contains some additional hints (linked from your reference). I have added python-internetarchive to our dsa-needed list, so once we have debdiffs for review and ack, we can proceed. Regards, Salvatore

