Re: privoxy stretch package 3.0.26-3+deb9u2 prepared

2021-03-09 Thread Roland Rosenfeld
Hi Abhijith!

On Di, 09 Mär 2021, Abhijith PA wrote:

> Roland, thanks again for the patch. I can see that last LTS update
> (3.0.26-3+deb9u1) done by you. Hope you can upload this time as
> well. If not, let me know. I am happy to help. Once uploaded to
> archive I will take care of DLA and announcements.

Thanks for your support.

I just uploaded privoxy_3.0.26-3+deb9u2_source.changes to
security-master.

Once it is installed, it would be great if you could do DLA etc.

Greetings
Roland


signature.asc
Description: PGP signature


Re: CVE-2021-3121 stretch patch review request and request for test help

2021-03-09 Thread Sylvain Beucler

Hi,

I'll let the Go packagers answer authoritatively but as I'm currently 
working on golang fixes I'd like to share a few points:


On 08/03/2021 22:48, Ola Lundqvist wrote:

I have prepared a patch for CVE-2021-3121 described in:
https://security-tracker.debian.org/tracker/CVE-2021-3121 


You can find the patch here:
http://apt.inguza.net/stretch-lts/golang-gogoprotobuf/CVE-2021-3121-1.patch 


The patch is based on the following commit:
https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc 

My conclusion is that the field function in stretch is unaffected. The 
reason is that there is no skippy check there at all in the stretch version.
For the generate function the iNdEx check was not in place so I added 
it, similar to the patch.


I do have a problem, and that is to check whether the code introduce 
some regression issue. Also since the CVE lack a description of the 
effect of this problem I have little knowledge on what the result of 
this may be.


Therefore I would highly appreciate a description of what this problem 
is and how to regression test the package.


This appears to be a tricky issue to fix.

First, due to static linking in Go, dependencies need to be rebuilt too, 
but even then, the vulnerability lies in generated code.

(see below for a list of deps)

Then, the vulnerability appears to be a serialization issue but even the 
netapp report is vague.


To test the fix, the package comes with a testsuite, though the original 
patch includes dozens of testsuite changes (mostly regenerated files). 
Then all the dependencies (that need a rebuild) do provide another way 
to check if something broke.


It should be noted that golang* packages are supported in stretch but 
come with limited support, not to due to code generation but due to Go 
static linking in the first place:

https://salsa.debian.org/debian/debian-security-support/-/blob/stretch/security-support-limited


If you do decide to support this package, I recently documented how to 
find direct reverse build dependencies at:

https://wiki.debian.org/LTS/TestSuites/golang

$ dose-ceve --deb-native-arch=amd64 -r golang-github-gogo-protobuf-dev 
-T debsrc 
debsrc:///var/lib/apt/lists/ftp.fr.debian.org_debian_dists_stretch_main_source_Sources 

deb:///var/lib/apt/lists/ftp.fr.debian.org_debian_dists_stretch_main_binary-amd64_Packages 
  | grep-dctrl -n -s Package '' | sort -u

gobgp
golang-github-appc-goaci
golang-github-appc-spec
golang-github-mesos-mesos-go
influxdb
syncthing
(Note: this is not recursive.)


In addition, apt-file does provide a list of generated .pb.go files, 
though it also includes those from "plain" protobuf (of which 
gogoprotobuf if a fork) so not all are affected (the affected ones 
should contain "skippy" somewhere):

# apt-file search .pb.go | cut -d: -f1 | sort -u
golang-github-appc-spec-dev
golang-github-gogo-protobuf-dev
golang-github-golang-groupcache-dev
golang-github-influxdb-influxdb-dev
golang-github-mesos-mesos-go-dev
golang-github-opencontainers-runc-dev
golang-github-osrg-gobgp-dev
golang-github-prometheus-alertmanager-dev
golang-github-prometheus-client-model-dev
golang-github-syncthing-syncthing-dev
golang-gomega-dev
golang-google-appengine-dev
golang-google-genproto-dev
golang-google-grpc-dev
golang-gopkg-dancannon-gorethink.v1-dev
golang-gopkg-dancannon-gorethink.v2-dev
golang-goprotobuf-dev


Cheers!
Sylvain



Re: privoxy stretch package 3.0.26-3+deb9u2 prepared

2021-03-09 Thread Abhijith PA
On 09/03/21 10:47 AM, Roland Rosenfeld wrote:
> Hi Abhijith!
> 
> On Di, 09 Mär 2021, Abhijith PA wrote:
> 
> > Roland, thanks again for the patch. I can see that last LTS update
> > (3.0.26-3+deb9u1) done by you. Hope you can upload this time as
> > well. If not, let me know. I am happy to help. Once uploaded to
> > archive I will take care of DLA and announcements.
> 
> Thanks for your support.
> 
> I just uploaded privoxy_3.0.26-3+deb9u2_source.changes to
> security-master.
> 
> Once it is installed, it would be great if you could do DLA etc.

DLA 2587-1. This is done. Thanks

--abhijith



Re: CVE-2020-36193 php-pear vs drupal7

2021-03-09 Thread Ola Lundqvist
Hi Gunnar, all

See below.

On Tue, 9 Mar 2021 at 05:11, Gunnar Wolf  wrote:

> Hello Ola, Salvatore, Chris et. al.!
>
> Ola Lundqvist dijo [Mon, Mar 08, 2021 at 11:51:35PM +0100]:
> > Hi Salvatore, Gunnar, all
> >
> > When looking further into this issue I do not think drupal7 is completely
> > fixed.
> > The durpal 7 package include the following fix:
> > +if (strpos(realpath(dirname($v_header['link'])),
> > realpath($p_path)) !== 0) {
> >
> > But it is missing the depth check
> >
> https://github.com/pear/Archive_Tar/commit/b6da5c32254162fa0752616479fb3d3c5297c1cf
> >
> > Or is it something that makes that depth check unnecessary?
> >
> > I'm asking since I'm looking into the php-pear fix and it should be very
> > similar to the drupal 7 fix.
>
> Umh... Did you consider the following patch?
>
>
> https://salsa.debian.org/debian/drupal7/-/blob/stretch/debian/patches/SA-CORE-2021-001
>
>
Yes, that is the "if (strpos(..." fix I was referring to below.
This is needed, but for php-pear there is also the fix to check for
multiple ../.. as protection mentioned as part of this CVE. This is not
included in the Drupal fix you mention and then obviously not in the
uploaded package either.

To me it looks like we have one more flaw to fix in Drupal. The question is
whether it should be handled as part of this CVE, or if we should consider
requesting a new CVE for it.


> I understand, but will admit that I didn't dig deep at all, that the
> Drupal7 team considers this as fixed WRT CVE-2020-36193. But, of
> course, my handling of this issue was basically only backporting the
> (very simple) diff in question from their 7.78 to our 7.52.
>

I see.

Best regards

// Ola


> Greetings,
>


-- 
 --- Inguza Technology AB --- MSc in Information Technology 
|  o...@inguza.como...@debian.org|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
 ---