Your message dated Sat, 13 Jul 2019 12:20:04 +0000
with message-id <[email protected]>
and subject line Bug#926551: fixed in yubico-piv-tool 1.7.0-1
has caused the Debian Bug report #926551,
regarding libykpiv1: Security issues in versions prior to 1.7.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
926551: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926551
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libykpiv1
Version: 1.6.2-1
Severity: serious
Tags: security buster sid upstream fixed-upstream pending
Justification: Security issue

Hi,

Yubico released a new version of libykpiv, mentionning “security fixes” in
the NEWS file, but without publishing a new security advisory.

I believe this refers to the following issues (quoting changelog entries):

* Memory unsafety:
        * lib/internal.h, lib/ykpiv.c: lib: tlv length buffer checks
        * lib/internal.h, lib/util.c: lib: correct overflow checks in 
_write_certificate
        * lib/util.c, lib/ykpiv.c: lib: resolves potential reads of
        uninitialized data

* Correctly erasing secrets from memory after use:
  * lib/util.c: lib: clear secrets in set_protected_mgm
        * lib/ykpiv.c: lib: clear secrets in ykpiv_import_private_key
        * lib/ykpiv.c: lib: clear secrets in auth api
        * lib/internal.c, lib/ykpiv.c: lib: clear buffers containing key
          material
        * lib/internal.h, lib/util.c: lib: use secure zero memory platform
        functions

* lib/ykpiv.c: lib: check internal authentication crypt errors


Given the absence of an advisory, I assume those issues are not known to be
exploitable.  However, I believe it would be worth fixing them before the
release of Buster.

Please let me know if a fix should be backported to stretch.


Best,

  nicoo


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-2-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set 
to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libykpiv1 depends on:
ii  libc6         2.28-8
ii  libpcsclite1  1.8.24-1
ii  libssl1.1     1.1.1b-1

Versions of packages libykpiv1 recommends:
ii  pcscd  1.8.24-1

libykpiv1 suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: yubico-piv-tool
Source-Version: 1.7.0-1

We believe that the bug you reported is fixed in the latest version of
yubico-piv-tool, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nicolas Braud-Santoni <[email protected]> (supplier of updated yubico-piv-tool 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 06 Apr 2019 22:35:22 +0200
Source: yubico-piv-tool
Architecture: source
Version: 1.7.0-1
Distribution: unstable
Urgency: high
Maintainer: Debian Authentication Maintainers 
<[email protected]>
Changed-By: Nicolas Braud-Santoni <[email protected]>
Closes: 926551
Changes:
 yubico-piv-tool (1.7.0-1) unstable; urgency=high (security fixes)
 .
   [ Nicolas Braud-Santoni ]
   * New upstream version 1.7.0
     + Security fixes. (Closes: #926551)
     + ykcs11: Fix ECDSA signatures.
     + Documentation fixes.
     + libykpiv1: Update symbols file, add Build-Depends-Package metadata
 .
   * debian/upstream: Update keyring and its generation script
 .
   * debian/control
     + Update Uploader's email address
     + Bump Standards-Version to 4.3.0
       No change required.
 .
   * Switch to debhelper 12
   * debian/rules
     + Avoid unnecessary override_dh_install
     + Don't set rpath at build-time, rather than overriding
     + Replace `dh_install --fail-missing` with `dh_missing`
 .
   * ykcs11: Add Lintian overrides for PKCS#11 quirks
   * libykpiv-dev: Do not ship pkgconfig metadata for ykcs11
     + YKCS11 is a PKCS#11 provider
     + This would be the wrong package for it anyhow.
 .
   [ Simon Josefsson ]
   * Drop myself from Uploaders.
Checksums-Sha1:
 561e0887199cab9ed7a0ec562f42393ef51b2e75 2344 yubico-piv-tool_1.7.0-1.dsc
 a53f336b8a14d6e7a6b0f96d69957bf1eeac3286 588206 
yubico-piv-tool_1.7.0.orig.tar.gz
 c1e23971e704e7b2b605022cca691e7aa44c57fc 49152 
yubico-piv-tool_1.7.0-1.debian.tar.xz
 5dd929e078f2e69bff6cc0265f9dda93665a63e0 7461 
yubico-piv-tool_1.7.0-1_amd64.buildinfo
Checksums-Sha256:
 2115fbd1b4d18ec65392d9927f64a8d72bb6bffc8ff0d07263d535544bbe8b97 2344 
yubico-piv-tool_1.7.0-1.dsc
 b428527e4031453a637128077983e782e9fea25df98e95e0fc27819b2e82fd7f 588206 
yubico-piv-tool_1.7.0.orig.tar.gz
 43a3c1c0c5340ead1f6797162817fd5aa4daea1d45e644ce3af2ef19c0686d57 49152 
yubico-piv-tool_1.7.0-1.debian.tar.xz
 152d3ef9aa0b4e4f821946d115119876a1aa169bc21bc8812db76237597b2399 7461 
yubico-piv-tool_1.7.0-1_amd64.buildinfo
Files:
 96225c0c0cf1fc6fd726edcdb87b7c60 2344 utils optional 
yubico-piv-tool_1.7.0-1.dsc
 e0f0fd0e1933e663c6c0efedf348cdd1 588206 utils optional 
yubico-piv-tool_1.7.0.orig.tar.gz
 a259a45d5c5efd42f40cff1e37824693 49152 utils optional 
yubico-piv-tool_1.7.0-1.debian.tar.xz
 085e54773f84ec852064db7397646c43 7461 utils optional 
yubico-piv-tool_1.7.0-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=qnwR
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to