Re: Bug#1098775: bullseye-pu: package proftpd-dfsg/1.3.7a+dfsg-12+deb11u4

2025-02-23 Thread Adam D. Barratt
On Sun, 2025-02-23 at 23:45 +0100, Hilmar Preusse wrote:
> The patch solves an annoying issue:
> 
> Proftpd does use the same server port for multiple passive FTP
> connections.
> Even when executing multiple simultaneous FTP sessions from different
> clients. This does break simultaneous passive FTP connections, file
> listings and transfers.

bullseye is no longer maintained by the Release Team, but by the LTS
Team (CCed).

Please co-ordinate with them regarding any possible update in bullseye.

Regards,

Adam



unsubsrcibe

2025-02-23 Thread Valentin Staubmann

— 
Valentin Staubmann
https://staubmann.eu
+43 660 8707699

I prefer using signed emails.
My public PGP key fingerprint is 430F 0145 F479 CB44 C3EC 55D5 4EBB FCCB 5305 
D0B2

> Am 24.02.2025 um 00:22 schrieb Daniel Leidert :
> 
> -
> Debian LTS Advisory DLA-4066-1debian-lts@lists.debian.org
> https://www.debian.org/lts/security/   Daniel Leidert
> February 24, 2025 https://wiki.debian.org/LTS
> -
> 
> Package: fort-validator
> Version: 1.5.3-1~deb11u2
> CVE ID : CVE-2024-45234 CVE-2024-45235 CVE-2024-45236 CVE-2024-45237 
> CVE-2024-45238 CVE-2024-45239 CVE-2024-48943
> 
> Multiple vulnerabilities have been discovered in fort-validator, a RPKI
> validator and RTR server.
> 
> CVE-2024-45234
> 
>   A malicious RPKI repository that descends from a (trusted) Trust
>   Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing
>   a signedAttrs encoded in non-canonical form. This bypasses Fort's
>   BER decoder, reaching a point in the code that panics when faced
>   with data not encoded in DER. Because Fort is an RPKI Relying Party,
>   a panic can lead to Route Origin Validation unavailability, which
>   can lead to compromised routing.
> 
> 
> CVE-2024-45235
> 
>   A malicious RPKI repository that descends from a (trusted) Trust
>   Anchor can serve (via rsync or RRDP) a resource certificate
>   containing an Authority Key Identifier extension that lacks the
>   keyIdentifier field. Fort references this pointer without sanitizing
>   it first. Because Fort is an RPKI Relying Party, a crash can lead to
>   Route Origin Validation unavailability, which can lead to
>   compromised routing.
> 
> CVE-2024-45236
> 
>   A malicious RPKI repository that descends from a (trusted) Trust
>   Anchor can serve (via rsync or RRDP) a signed object containing an
>   empty signedAttributes field. Fort accesses the set's elements
>   without sanitizing it first. Because Fort is an RPKI Relying Party,
>   a crash can lead to Route Origin Validation unavailability, which
>   can lead to compromised routing.
> 
> CVE-2024-45237
> 
>   A malicious RPKI repository that descends from a (trusted) Trust
>   Anchor can serve (via rsync or RRDP) a resource certificate
>   containing a Key Usage extension composed of more than two bytes of
>   data. Fort writes this string into a 2-byte buffer without properly
>   sanitizing its length, leading to a buffer overflow.
> 
> CVE-2024-45238
> 
>   A malicious RPKI repository that descends from a (trusted) Trust
>   Anchor can serve (via rsync or RRDP) a resource certificate
>   containing a bit string that doesn't properly decode into a Subject
>   Public Key. OpenSSL does not report this problem during parsing, and
>   when compiled with OpenSSL libcrypto versions below 3, Fort
>   recklessly dereferences the pointer. Because Fort is an RPKI Relying
>   Party, a crash can lead to Route Origin Validation unavailability,
>   which can lead to compromised routing.
> 
> CVE-2024-45239
> 
>   A malicious RPKI repository that descends from a (trusted) Trust
>   Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing
>   a null eContent field. Fort dereferences the pointer without
>   sanitizing it first. Because Fort is an RPKI Relying Party, a crash
>   can lead to Route Origin Validation unavailability, which can lead
>   to compromised routing.
> 
> CVE-2024-48943
> 
>   A malicious RPKI rsync repository can prevent Fort from finishing
>   its validation run by drip-feeding its content. The delayed
>   validation can lead to stale or unavailable Route Origin Validation.
> 
> For Debian 11 bullseye, these problems have been fixed in version
> 1.5.3-1~deb11u2.
> 
> We recommend that you upgrade your fort-validator packages.
> 
> For the detailed security status of fort-validator please refer to
> its security tracker page at:
> https://security-tracker.debian.org/tracker/fort-validator
> 
> Further information about Debian LTS security advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://wiki.debian.org/LTS
> 



signature.asc
Description: Message signed with OpenPGP


Regression in DLA 4053-1 - freerdp2

2025-02-23 Thread Tobias Frost
I've got report that there is a regression introduced by
2.3.0+dfsg1-2+deb11u2.

The issue is related to drive sharing and is reported to not working
anymore. 

The reporter analysed the issue as:

> Drive sharing does not work for us any longer using version 
> 2.3.0+dfsg1-2+deb11u2, but it works using 2.3.0+dfsg1-2+deb11u1 or 
> 2.10.0+dfsg1-1~bpo11+1
> 
> In debian/patches/0057-CVE-2022-41877.patch the following define is included, 
> which is not found in upstream (as in newer versions a real function is 
> defined).
> +#define Stream_CheckAndLogRequiredLength(tag, s, len)
>  \
> +   Stream_CheckAndLogRequiredLengthWLogEx(WLog_Get(tag), WLOG_WARN, s, 
> len, "%s(%s:%" PRIuz ")", __FUNCTION__, \
> +  __FILE__, __LINE__)
>
> The function Stream_CheckAndLogRequiredLengthWLogEx is defined in 
> winpr/libwinpr/utils/stream.c:
> BOOL Stream_CheckAndLogRequiredLengthWLogEx(wLog* log, DWORD level, wStream* 
> s, size_t nmemb,
>size_t size, const char* fmt, ...)
>
> I think the define missed passing on the parameter for 'size', which I guess 
> should be 1, from reading upstream sources.
> This leads to error messages like
>   [drive_process_irp_query_directory] invalid length, got 0, require at 
> least 6 [element size=140103248640086]

I will look into the issue ASAP.

--
tobi


signature.asc
Description: PGP signature