Re: Wheezy update of twisted?

2016-08-05 Thread Brian May
This security vulnerability is described here:

https://bugzilla.redhat.com/show_bug.cgi?id=1357345

as:

"sets environmental variable based on user supplied Proxy request
header"

In particular it is talking about HTTP_PROXY, and it only a problem if
the server makes an outgoing HTTP request using this value.

Looking at this, I am inclined to say this isn't a security issue in
twisted itself, rather some unspecified applications that use twisted.

Just trying to double check this. I can't find any references
(case-insensitive) of "HTTP_PROXY" in the twisted source however.

This appears to be confirmed by the first sentence in the redhat bug
report:

"Many software projects and vendors have implemented support for the
“Proxy” request header in their respective CGI implementations and
languages by creating the “HTTP_PROXY” environmental variable based on
the header value."

There are a number of projects in Debian that use twisted, should we
check each one?

Sure would be good if I had an example application that was confirmed
vulnerable.
-- 
Brian May 



Re: Wheezy update of twisted?

2016-08-05 Thread Free Ekanayaka
Hi,

I had a quick look at the code too (both in wheezy and jessie), but I
couldn't find the offending bits. Perhaps it'd be good to put together a
small web server and see what happens when you pass the 'Proxy' header.

Free

On 5 August 2016 at 10:26, Brian May  wrote:

> This security vulnerability is described here:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1357345
>
> as:
>
> "sets environmental variable based on user supplied Proxy request
> header"
>
> In particular it is talking about HTTP_PROXY, and it only a problem if
> the server makes an outgoing HTTP request using this value.
>
> Looking at this, I am inclined to say this isn't a security issue in
> twisted itself, rather some unspecified applications that use twisted.
>
> Just trying to double check this. I can't find any references
> (case-insensitive) of "HTTP_PROXY" in the twisted source however.
>
> This appears to be confirmed by the first sentence in the redhat bug
> report:
>
> "Many software projects and vendors have implemented support for the
> “Proxy” request header in their respective CGI implementations and
> languages by creating the “HTTP_PROXY” environmental variable based on
> the header value."
>
> There are a number of projects in Debian that use twisted, should we
> check each one?
>
> Sure would be good if I had an example application that was confirmed
> vulnerable.
> --
> Brian May 
>


Re: Wheezy update of libreoffice #2 (CVE-2016-1513)

2016-08-05 Thread Bálint Réczey
Hi Rene,

2016-08-04 19:34 GMT+02:00 Rene Engelhard :
> Hi,
>
> On Thu, Aug 04, 2016 at 09:12:04AM +0200, Rene Engelhard wrote:
>> I noticed Balint did some additional changes to deb7u7 (build-depends
>> on fixed graphite2 - thanks for that), so this needs
>> either be merged into my deb7u8 or I can redo it this evening...
>
> now done.

Thanks!

Would you like to build and upload it yourself or would you prefer
us to do the rest (build, test, upload, DLA) like before?

Cheers,
Balint



Security update of nettle

2016-08-05 Thread Ola Lundqvist
Hi Magnus and LTS team

Magnus, Niels and I have been discussing the nettle update due to
https://security-tracker.debian.org/tracker/CVE-2016-6489

Magnus has started to prepare a wheezy update but had a few
questions. Here are some information that you should know about.
https://wiki.debian.org/LTS/Development

One question from Magnus was what should be mentioned in the changelog.
I suggest something like this:
"Protect against potential timing attacks against exponentiation operations
as described in CVE-2016-6489 RSA code is vulnerable to cache sharing
related attacks."

Magnus, please let me know if you want to upload the correction too and
whether you want to issue the DLA or whether you want me to do that. We
want to time the DLA and the upload so they are close to each other in time.

Magnus, if you decide to build the package for upload, please make sure to
use the -sa option as wheezy-security need to know about the orig tar file.
If not the package upload will be rejected.

Best regards

// Ola

-- 
 --- Inguza Technology AB --- MSc in Information Technology 
/  o...@inguza.comFolkebogatan 26\
|  o...@debian.org   654 68 KARLSTAD|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---


Re: Security update of nettle

2016-08-05 Thread Ola Lundqvist
Hi Magnus

You are of course welcome to improve the language in the changelog. :-)
I should probably have put quite marks to clarify the language, that the
text after the CVE number is a part of the CVE name.

Like this:
Protect against potential timing attacks against exponentiation operations
as described in "CVE-2016-6489 RSA code is vulnerable to cache sharing
related attacks."

Regarding the upload. I'm not involved with the stable security team. Let
me know when you have a build that I can check and upload. A debdiff and a
statement what kind of tests you have performed are very good to have too,
so we all have a possibility to check the change.

Thanks in advance

// Ola

On Fri, Aug 5, 2016 at 11:28 PM, Magnus Holmgren 
wrote:

> fredagen den 5 augusti 2016 22.16.29 skrev  Ola Lundqvist:
> > Hi Magnus and LTS team
> >
> > Magnus, Niels and I have been discussing the nettle update due to
> > https://security-tracker.debian.org/tracker/CVE-2016-6489
> >
> > Magnus has started to prepare a wheezy update but had a few
> > questions. Here are some information that you should know about.
> > https://wiki.debian.org/LTS/Development
> >
> > One question from Magnus was what should be mentioned in the changelog.
> > I suggest something like this:
> > "Protect against potential timing attacks against exponentiation
> operations
> > as described in CVE-2016-6489 RSA code is vulnerable to cache sharing
> > related attacks."
>
> Hmm, that sounds like two sentences in one...
>
> > Magnus, please let me know if you want to upload the correction too and
> > whether you want to issue the DLA or whether you want me to do that. We
> > want to time the DLA and the upload so they are close to each other in
> time.
>
> I think you can do that. But I should coordinate with the stable security
> team
> too. I suppose you're not involved with that?
>
> > Magnus, if you decide to build the package for upload, please make sure
> to
> > use the -sa option as wheezy-security need to know about the orig tar
> file.
> > If not the package upload will be rejected.
>
> OK, thanks.
>
> --
> Magnus Holmgrenholmg...@debian.org
> Debian Developer




-- 
 --- Inguza Technology AB --- MSc in Information Technology 
/  o...@inguza.comFolkebogatan 26\
|  o...@debian.org   654 68 KARLSTAD|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---


Re: Icedtea plugin

2016-08-05 Thread Emilio Pozuelo Monfort
On 02/08/16 19:48, Emilio Pozuelo Monfort wrote:
> On 01/08/16 23:26, Markus Koschany wrote:
>> On 01.08.2016 23:01, Emilio Pozuelo Monfort wrote:
>>> On 31/07/16 19:41, Roberto C. Sánchez wrote:
 On Sun, Jul 31, 2016 at 07:34:28PM +0200, Emilio Pozuelo Monfort wrote:
> Hi,
>
> Currently, icedtea-plugin depends on icedtea-6-plugin, i.e. Java6. Given
> openjdk-6 is unsupported, we should change it to depend on 
> icedtea-7-plugin
> instead. See the attached source debdiff (the control file is 
> autogenerated).
>
> Thoughts?
>
> If no-one objects, I will upload that soon.
>

 It looks good to me.
>>>
>>> Markus said on IRC that another option was to mark icedtea-plugin and
>>> icedtea-6-plugin as unsupported. However, I think we should only do that for
>>> icedtea-6-plugin, and update the metapackage to depend on Java7.
>>
>> Yes, it wouldn't hurt to update the dependency package icedtea-plugin.
>> As far as I know it has no important reverse-dependencies though, for
>> instance OpenJDk 6 only suggests it. So we could also just mark it as
>> unsupported but I leave the decision up to you.
> 
> I think icedtea-plugin should be kept updated and point to the supported
> version, so that people can keep it installed and automatically get the next
> supported version when/if it is changed again, whether in Wheezy or in future
> releases.
> 
> Since the change is simple, I'll look at uploading it soon.

Uploaded.

I'm not sure whether this deserves a DLA. Probably not, as openjdk-6 is already
marked as unsupported, and there already was [1]. Though I could send something
similar to that, without a DLA number, if that was deemed convenient. Thoughts,
anyone?

Cheers,
Emilio

[1] https://lists.debian.org/debian-lts-announce/2016/05/msg7.html



Re: Security update of firefox-esr for Wheezy

2016-08-05 Thread Emilio Pozuelo Monfort
On 04/08/16 23:02, Mike Hommey wrote:
> On Thu, Aug 04, 2016 at 07:50:28PM +0200, Guido Günther wrote:
>> Hi,
>> On Thu, Aug 04, 2016 at 06:32:14PM +0900, Mike Hommey wrote:
>>> On Thu, Aug 04, 2016 at 11:04:47AM +0200, Markus Koschany wrote:
 Hello Mike,

 Thank you for preparing the security update of firefox-esr. I have just
 sent a security announcement for your update in Wheezy to the
 debian-lts-announce mailing list. If you want to take care of this next
 time, please follow our guidelines which we have outlined at [1]. If
 this is a burden for you, no problem, we will do our best and take care
 of the rest. In this case we would like to ask you to send a short
 reminder to debian-lts, so that we can prepare the announcement in a
 timely manner.
>>>
>>> Heh, I hadn't realized that wasn't handled by standard DSAs, sorry about
>>> that. That these updates go through the same security-master doesn't
>>> help making it obvious they are different.
>>>
>>> Anyways, I'd rather not have more work to do, so if can send
>>> announcements, that works for me. Or you can deal with the backport
>>> from back to back.
>>>
>>> Please note that the next ESR bump (52) will require GCC 4.8, which is
>>> not in wheezy, so I won't be building ESR45 for wheezy past 45.8,
>>> presumably some time in April next year.
>>
>> The same is true for icedove. Since this is way before the end of Wheezy
>> LTS (31st May 2018) I wonder if we should EOL Firefox/Icedove then or
>> try to support this for longer?
>>
>> I have no idea what features of gcc-4.8 would be required, Mike do you
>> know?
> 
> Some C++11 features it supports that GCC 4.7 doesn't.

We may want / need to backport GCC 4.8 to Wheezy then. Chromium is already
unsupported, so it's either that, or leave Wheezy with no supported browsers. We
probably want the former.

Cheers,
Emilio



Re: Security update of nettle

2016-08-05 Thread Magnus Holmgren
fredagen den 5 augusti 2016 22.16.29 skrev  Ola Lundqvist:
> Hi Magnus and LTS team
> 
> Magnus, Niels and I have been discussing the nettle update due to
> https://security-tracker.debian.org/tracker/CVE-2016-6489
> 
> Magnus has started to prepare a wheezy update but had a few
> questions. Here are some information that you should know about.
> https://wiki.debian.org/LTS/Development
> 
> One question from Magnus was what should be mentioned in the changelog.
> I suggest something like this:
> "Protect against potential timing attacks against exponentiation operations
> as described in CVE-2016-6489 RSA code is vulnerable to cache sharing
> related attacks."

Hmm, that sounds like two sentences in one...

> Magnus, please let me know if you want to upload the correction too and
> whether you want to issue the DLA or whether you want me to do that. We
> want to time the DLA and the upload so they are close to each other in time.

I think you can do that. But I should coordinate with the stable security team 
too. I suppose you're not involved with that?

> Magnus, if you decide to build the package for upload, please make sure to
> use the -sa option as wheezy-security need to know about the orig tar file.
> If not the package upload will be rejected.

OK, thanks.

-- 
Magnus Holmgrenholmg...@debian.org
Debian Developer 

signature.asc
Description: This is a digitally signed message part.


Re: [SECURITY] [DLA 579-1] openjdk-7 security update

2016-08-05 Thread Edson J. Bueno
 

Em Sexta-feira, 5 de Agosto de 2016 17:15, Emilio Pozuelo Monfort 
 escreveu:
 

 -BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Package        : openjdk-7
Version        : 7u111-2.6.7-1~deb7u1
CVE ID        : CVE-2016-3458 CVE-2016-3500 CVE-2016-3508 CVE-2016-3550
                CVE-2016-3606

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in breakouts of
the Java sandbox, denial of service or information disclosure.

For Debian 7 "Wheezy", these problems have been fixed in version
7u111-2.6.7-1~deb7u1.

We recommend that you upgrade your openjdk-7 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=pkVs
-END PGP SIGNATURE-