Your message dated Fri, 29 Nov 2024 16:29:18 +0100
with message-id <[email protected]>
and subject line Re: Bug#1074429: xml-security-c: CVE-2024-34580
has caused the Debian Bug report #1074429,
regarding xml-security-c: CVE-2024-34580
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1074429: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074429
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: xml-security-c
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for xml-security-c.

CVE-2024-34580[0]:
| Apache XML Security for C++ through 2.0.4 implements the XML
| Signature Syntax and Processing (XMLDsig) specification without
| protection against an SSRF payload in a KeyInfo element. NOTE: the
| supplier disputes this CVE Record on the grounds that they are
| implementing the specification "correctly" and are not "at fault."

https://cloud.google.com/blog/topics/threat-intelligence/apache-library-allows-server-side-request-forgery
https://www.sonatype.com/blog/the-exploited-ivanti-connect-ssrf-vulnerability-stems-from-xmltooling-oss-library
https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2024-21893.md

Not sure what to make out of this? It seems the use of xml-security-sec
within Shibboleth continues to be supported, but otherwise the library
is deemed deprecated, so maybe this should at least be made explicit
in the package description?
`
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-34580
    https://www.cve.org/CVERecord?id=CVE-2024-34580

Please adjust the affected versions in the BTS as needed.

--- End Message ---
--- Begin Message ---
Am Fri, Jun 28, 2024 at 08:27:34PM +0000 schrieb Cantor, Scott:
> TL;DR,
> 
> This is not a vulnerability, it's a default that people don't like that 
> required a minor update to change, and that wasn't going to happen. The code 
> has been formally retired at Apache and forked for the Shibboleth Project's 
> use, and there will be some form of official indication of that at some point 
> later this summer.

Thanks for the explanation and sorry for the late reply, catching
up with some older mail. I've marked this a non issue in the
Debian Security Tracker and will also close this bug.

Cheers,
        Moritz

--- End Message ---

Reply via email to