Le 24/10/2022 à 18:26, Clément Hermann a écrit :
Hi,

Le 23/10/2022 à 18:27, Clément Hermann a écrit :
Hi,

Le 22/10/2022 à 15:01, Salvatore Bonaccorso a écrit :
To be on safe side, explicitly confirming by upstream would be great.

Agreed. And asked upstream: https://github.com/onionshare/onionshare/issues/1633.

Upstream replied quickly (yay!) and confirms the known issues are fixed in 2.5.

Also, the detail of the vulnerable/patched versions has been updated. Quoting from the upstream issue:

Only affected >= 2.3 - < 2.5: CVE-2021-41867 <https://github.com/advisories/GHSA-6rvj-pw9w-jcvc>, CVE-2022-21691 <https://github.com/advisories/GHSA-w9m4-7w72-r766>, CVE-2022-21695 <https://github.com/advisories/GHSA-99p8-9p2c-49j4>, CVE-2022-21696 <https://github.com/advisories/GHSA-68vr-8f46-vc9f> Only affected >= 2.2 - < 2.5: CVE-2022-21694 <https://github.com/advisories/GHSA-h29c-wcm8-883h> Only affected >=2.0 - < 2.5: CVE-2022-21689 <https://github.com/advisories/GHSA-jh82-c5jw-pxpc> Only affected >=2.0 - < 2.4: CVE-2021-41868 <https://github.com/advisories/GHSA-7g47-xxff-9p85> (Receive mode bug, fixed by changing the authentication from HTTP auth to using Client Auth in Tor itself) All versions < 2.5: CVE-2022-21690 <https://github.com/advisories/GHSA-ch22-x2v3-v6vq>, and possibly depending on the Qt version, CVE-2022-21688 <https://github.com/advisories/GHSA-x7wr-283h-5h2v>

GHSA-jgm9-xpfj-4fq6 <https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6> is a complicated one, as a fix <https://github.com/onionshare/onionshare/pull/1474> we reduced the scope of access for Flatpak but you could argue that on 'native' Debian the whole file system, or at least the parts accessible to the user running OnionShare, is available not even in read-only mode. I'm not sure there's really a 'fix' for the deb package.

The advisories on https://github.com/onionshare/onionshare/security/advisories have been updated to reflect this.

I did more homework.

So, to summarize:
- CVE-2021-41867 <https://github.com/advisories/GHSA-6rvj-pw9w-jcvc>, CVE-2022-21691 <https://github.com/advisories/GHSA-w9m4-7w72-r766>, CVE-2022-21695 <https://github.com/advisories/GHSA-99p8-9p2c-49j4>, CVE-2022-21696 <https://github.com/advisories/GHSA-68vr-8f46-vc9f> aren't affecting Debian (stable has 2.2, unstable has 2.5). Which is good because the

- CVE-2022-21694 <https://github.com/advisories/GHSA-h29c-wcm8-883h> affects Bullseye, but that might be an acceptable risk ? The issue is that CSP can only be turned on or off, not configured to allow js etc, so it is only useful for static websites. I believe that's the most common usage of a website with onionshare, and it's arguably a missing feature more than a vulnerability /per se/.

- CVE-2022-21689 <https://github.com/advisories/GHSA-jh82-c5jw-pxpc> fix should be easy to backport, at a glance: https://github.com/onionshare/onionshare/commit/096178a9e6133fd6ca9d95a00a67bba75ccab377

- CVE-2021-41868 <https://github.com/advisories/GHSA-7g47-xxff-9p85> doesn't affect 2.2 I think, it must have been a mistake from mig5. I just asked for confirmation. I do hope so since it's a bad one.

- CVE-2022-21690 <https://github.com/advisories/GHSA-ch22-x2v3-v6vq> seems like a one-line patch: https://github.com/onionshare/onionshare/commit/8f1e7ac224e54f57e43321bba2c2f9fdb5143bb0

- CVE-2022-21688 <https://github.com/advisories/GHSA-x7wr-283h-5h2v> seems like it should be worked around with the CVE-2022-21690 <https://github.com/advisories/GHSA-ch22-x2v3-v6vq> fix (OTF-001)?

I'd welcome input on those.

Cheers,

--
nodens

Reply via email to