Your message dated Sat, 31 Aug 2024 12:13:59 +0000
with message-id <e1skmzp-00gqon...@coccia.debian.org>
and subject line Close 1025518
has caused the Debian Bug report #1025518,
regarding bullseye-pu: package capnproto/0.7.1-1+deb11u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1025518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025518
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian....@packages.debian.org
Usertags: pu
X-Debbugs-Cc: capnpr...@packages.debian.org
Control: affects -1 + src:capnproto

Dear Release Team,

This is a bit of an odd one...  I have contacted the Security Team and
they have recommended that this go through stable-proposed-updates.

CVE-2022-46149 [1] is a recently announced vulnerability in the
capnproto [2] package that impacts the versions available in oldstable
and stable (0.7.0) and the upcoming bookworm release.

As the upstream author notes in [3], the issue is present in inlined
code, thus applications built against capnproto must be rebuilt against
the patched version.

The issue for unstable and bookworm is being addressed via an
upload to experimental [4] and a subsequent transition [5].  Easy
enough...

For stable (and old-stable), we need to introduce 0.7.1, a new upstream
version that generates a (new) libcapnp-0.7.1 binary package to address
the vulnerability.  Once those are present in the archive, we can
trigger rebuilds of the reverse dependencies.  At this time I am asking
for bullseye.

[ Reason ]
This is to address CVE-2022-46149 [1].

[ Impact ]
Packages built with capnproto in bullseye will remain potentially
vulnerable to the CVE.

[ Tests ]
I have built the package in a clean bullseye chroot and then used ratt to
rebuilt the (8) bullseye r-deps:

- clickhouse_18.16.1+ds-7.2
- harvest-tools_1.3-6
- laminar_1.0-3
- librime_1.6.1+dfsg1-1
- mash_2.2.2+dfsg-2
- mir_1.8.0+dfsg1-18
- rr_5.4.0-2
- sonic-visualiser_4.2-1

[ Risks ]
The upstream author has stated that there are no known vulnerable
applications, yet advises that all capnproto users rebuild their
applications using patched versions of capnproto.

The patch is simple enough, but obviously the transition process is not.  

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in stable
  [x] the issue is verified as fixed in unstable

[ Changes ] 
The upstream patch for this issue is small [6], but upstream used a
slightly newer version of autoconf when packaging 0.7.1 than was used in
0.7.0, and so the debdiff between the source versions ends up with a lot
of boilerplate autoconf diff.

The only change to the Debian packaging is the requisite SONAME bump to
generate the 0.7.1 library package for transition of the r-deps.

[ Other info ]
My email exchange with the Security Team included Salvatore Bonaccorso
and Moritz Muehlenhoff.  If this works and is amenable, old-stable would
be next.

If this is not amenable to stable-proposed-updates, would you recommend
backports?

Thank you for considering this request!
tony

[1] https://nvd.nist.gov/vuln/detail/CVE-2022-46149
[2] https://tracker.debian.org/pkg/capnproto
[3] 
https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx
[4] 
https://tracker.debian.org/news/1393214/accepted-capnproto-092-1-source-amd64-into-experimental/
[5] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025449
[6] 
https://github.com/capnproto/capnproto/commit/14adbb11e98db714f09c30b8c40415325a55157a

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
We regret that your request could not be completed in time for the final point 
release of bullseye (11.11).

--- End Message ---

Reply via email to