Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2024-07-08 Thread Nicolas Mora
Hello,

Thanks for the update, I will upload it next week if that's ok

/Nicolas

7 juill. 2024 14 h 55 min 41 s Jonathan Wiltshire :

> Control: tag -1 confirmed
> 
> Hi,
> 
> Sorry about the long delay; if this is still of interest, please go ahead.
> The next point release of bullseye will be the final.
> 
> Thanks,
> 
> -- 
> Jonathan Wiltshire  j...@debian.org
> Debian Developer http://people.debian.org/~jmw
> 
> 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
> ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1



Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2024-04-22 Thread Nicolas Mora

Le 2024-04-22 à 13 h 08, Jonathan Wiltshire a écrit :


Please go ahead.


Thanks, it's uploaded



Bug#1056936: bookworm-pu: package glewlwyd/2.7.5-3

2024-04-07 Thread Nicolas Mora

Le 2024-04-06 à 18 h 38, Jonathan Wiltshire a écrit :


Sorry for the delay; please go ahead.


Thanks, it's uploaded!

/Nicolas



Bug#1056936: bookworm-pu: package glewlwyd/2.7.5-3

2024-02-14 Thread Nicolas Mora

Hello,

I've updated the debdiff to add a fix for CVE-2024-25715

/Nicolasdiff -Nru glewlwyd-2.7.5/debian/changelog glewlwyd-2.7.5/debian/changelog
--- glewlwyd-2.7.5/debian/changelog	2023-05-04 07:21:27.0 -0400
+++ glewlwyd-2.7.5/debian/changelog	2023-11-23 17:12:13.0 -0500
@@ -1,3 +1,12 @@
+glewlwyd (2.7.5-3+deb12u1) bookworm; urgency=medium
+
+  * d/patches: Fix CVE-2023-49208
+possible buffer overflow during FIDO2 credentials validation
+  * d/patches: Fix CVE-2024-25715
+open redirection via redirect_uri
+
+ -- Nicolas Mora   Thu, 23 Nov 2023 17:12:13 -0500
+
 glewlwyd (2.7.5-3) unstable; urgency=medium
 
   * Install config.json as config-2.7.json (Closes: #1035503)
diff -Nru glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch
--- glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch	1969-12-31 19:00:00.0 -0500
+++ glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch	2023-11-23 17:12:13.0 -0500
@@ -0,0 +1,21 @@
+Description: Fix CVE-2023-49208 for bookworm
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/scheme/webauthn.c
 b/src/scheme/webauthn.c
+@@ -2260,13 +2260,13 @@
+ for (i=0; i
+Forwarded: not-needed
+--- a/src/plugin/protocol_oauth2.c
 b/src/plugin/protocol_oauth2.c
+@@ -696,7 +696,7 @@
+ 
+ static json_t * check_client_valid(struct _oauth2_config * config, const char * client_id, const char * client_header_login, const char * client_header_password, const char * redirect_uri, unsigned short authorization_type, int implicit_flow, const char * ip_source) {
+   json_t * j_client, * j_element = NULL, * j_return;
+-  int uri_found, authorization_type_enabled;
++  int uri_found = 0, authorization_type_enabled;
+   size_t index = 0;
+   
+   if (client_id == NULL) {
+@@ -707,20 +707,17 @@
+ return json_pack("{si}", "result", G_ERROR_PARAM);
+   }
+   j_client = config->glewlwyd_config->glewlwyd_callback_check_client_valid(config->glewlwyd_config, client_id, client_header_password);
+-  if (check_result_value(j_client, G_OK)) {
++  if (check_result_value(j_client, G_OK) && json_object_get(json_object_get(j_client, "client"), "enabled") == json_true()) {
+ if (!implicit_flow && client_header_password == NULL && json_object_get(json_object_get(j_client, "client"), "confidential") == json_true()) {
+   y_log_message(Y_LOG_LEVEL_DEBUG, "check_client_valid - oauth2 - Error, confidential client must be authentified with its password, origin: %s", ip_source);
+   j_return = json_pack("{si}", "result", G_ERROR_UNAUTHORIZED);
+ } else {
+   if (redirect_uri != NULL) {
+-uri_found = 0;
+ json_array_foreach(json_object_get(json_object_get(j_client, "client"), "redirect_uri"), index, j_element) {
+   if (0 == o_strcmp(json_string_value(j_element), redirect_uri)) {
+ uri_found = 1;
+   }
+ }
+-  } else {
+-uri_found = 1;
+   }
+   
+   authorization_type_enabled = 0;
+@@ -2444,8 +2441,8 @@
+   // Check if client is allowed to perform this request
+   if (check_result_value(j_client, G_OK)) {
+ // Client is allowed to use auth_code grant with this redirection_uri
+-if (u_map_has_key(request->map_url, "g_continue")) {
+-  if (!o_strnullempty(u_map_get(request->map_url, "scope"))) {
++if (!o_strnullempty(u_map_get(request->map_url, "scope"))) {
++  if (u_map_has_key(request->map_url, "g_continue")) {
+ j_session = validate_session_client_scope(config, request, u_map_get(request->map_url, "client_id"), u_map_get(request->map_url, "scope"));
+ if (check_result_value(j_session, G_OK)) {
+   if (json_object_get(json_object_get(j_session, "session"), "authorization_required") == json_false()) {
+@@ -2526,26 +2523,20 @@
+ }
+ json_decref(j_session);
+   } else {
+-// Scope is not allowed for this user
+-y_log_message(Y_LOG_LEVEL_DEBUG, "check_auth_type_auth_code_grant - oauth2 - scope list is missing or empty, origin: %s", ip_source);
+-response->status = 302;
+-redirect_url = msprintf("%s%serror=invalid_scope%s", u_map_get(request->map_url, "redirect_uri"), (o_strchr(u_map_get(request->map_url, "redirect_uri"), '?')!=NULL?"&":"?"), state_param);
++// Redirect to login page
++redirect_url = get_login_url(config, request, "auth", u_map_get(request->map_url, "client_id"), u_map_get(request->map_url, "scope"), NULL);
+ ulfius_add_header_to_response(response, "Location", redirect_url);
+ o_free(redirect_url);
++respons

Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2024-02-06 Thread Nicolas Mora

Control: tag +1 moreinfo

Thanks,



Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2024-02-06 Thread Nicolas Mora

Control: tag -1 moreinfo

Thanks,



Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2024-02-06 Thread Nicolas Mora

Control: tag - moreinfo

Thanks,

Sorry, it seems that I'm not very well aware of the BTS process, 
according to [1] this is how I should untag the bug.


[1] https://www.debian.org/Bugs/server-control



Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2023-12-19 Thread Nicolas Mora

Hello,

Thank you for the feedback, the new attached debdiff should fix these.

Thanks!diff -Nru libssh2-1.9.0/debian/changelog libssh2-1.9.0/debian/changelog
--- libssh2-1.9.0/debian/changelog  2020-12-14 10:02:16.0 -0500
+++ libssh2-1.9.0/debian/changelog  2023-11-29 07:00:07.0 -0500
@@ -1,3 +1,10 @@
+libssh2 (1.9.0-2+deb11u1) bullseye; urgency=medium
+
+  * Fix CVE-2020-22218: missing check in _libssh2_packet_add() allows
+attackers to access out of bounds memory.
+
+ -- Nicolas Mora   Wed, 29 Nov 2023 07:00:07 -0500
+
 libssh2 (1.9.0-2) unstable; urgency=medium
 
   * d/control: Fix VCS URIs
diff -Nru libssh2-1.9.0/debian/patches/CVE-2020-22218.patch 
libssh2-1.9.0/debian/patches/CVE-2020-22218.patch
--- libssh2-1.9.0/debian/patches/CVE-2020-22218.patch   1969-12-31 
19:00:00.0 -0500
+++ libssh2-1.9.0/debian/patches/CVE-2020-22218.patch   2023-11-29 
07:00:07.0 -0500
@@ -0,0 +1,14 @@
+Description: Fix CVE-2020-22218
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/transport.c
 b/src/transport.c
+@@ -472,7 +472,7 @@
+ /* Get a packet handle put data into. We get one to
+hold all data, including padding and MAC. */
+ p->payload = LIBSSH2_ALLOC(session, total_num);
+-if(!p->payload) {
++if(total_num == 0 || !p->payload) {
+ return LIBSSH2_ERROR_ALLOC;
+ }
+ p->total_num = total_num;
diff -Nru libssh2-1.9.0/debian/patches/series 
libssh2-1.9.0/debian/patches/series
--- libssh2-1.9.0/debian/patches/series 2020-12-14 10:02:16.0 -0500
+++ libssh2-1.9.0/debian/patches/series 2023-11-29 07:00:07.0 -0500
@@ -1,3 +1,4 @@
+CVE-2020-22218.patch
 manpage.patch
 0001-Add-lgpg-error-to-.pc-to-facilitate-static-linking.patch
 0001-Do-not-expose-private-libraries-nor-link-flags-to-us.patch


Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2023-11-29 Thread Nicolas Mora

See the debdiff attacheddiff -Nru libssh2-1.9.0/debian/changelog libssh2-1.9.0/debian/changelog
--- libssh2-1.9.0/debian/changelog  2020-12-14 10:02:16.0 -0500
+++ libssh2-1.9.0/debian/changelog  2023-11-29 07:00:07.0 -0500
@@ -1,3 +1,9 @@
+libssh2 (1.9.0-2+debu11u1) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2020-22218
+
+ -- Nicolas Mora   Wed, 29 Nov 2023 07:00:07 -0500
+
 libssh2 (1.9.0-2) unstable; urgency=medium
 
   * d/control: Fix VCS URIs
diff -Nru libssh2-1.9.0/debian/patches/CVE-2020-22218.patch 
libssh2-1.9.0/debian/patches/CVE-2020-22218.patch
--- libssh2-1.9.0/debian/patches/CVE-2020-22218.patch   1969-12-31 
19:00:00.0 -0500
+++ libssh2-1.9.0/debian/patches/CVE-2020-22218.patch   2023-11-29 
07:00:07.0 -0500
@@ -0,0 +1,14 @@
+Description: Fix CVE-2020-22218
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/transport.c
 b/src/transport.c
+@@ -472,7 +472,7 @@
+ /* Get a packet handle put data into. We get one to
+hold all data, including padding and MAC. */
+ p->payload = LIBSSH2_ALLOC(session, total_num);
+-if(!p->payload) {
++if(total_num == 0 || !p->payload) {
+ return LIBSSH2_ERROR_ALLOC;
+ }
+ p->total_num = total_num;
diff -Nru libssh2-1.9.0/debian/patches/series 
libssh2-1.9.0/debian/patches/series
--- libssh2-1.9.0/debian/patches/series 2020-12-14 10:02:16.0 -0500
+++ libssh2-1.9.0/debian/patches/series 2023-11-29 07:00:07.0 -0500
@@ -1,3 +1,4 @@
+CVE-2020-22218.patch
 manpage.patch
 0001-Add-lgpg-error-to-.pc-to-facilitate-static-linking.patch
 0001-Do-not-expose-private-libraries-nor-link-flags-to-us.patch


Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2023-11-29 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: libs...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:libssh2

[ Reason ]
Fix CVE-2020-22218
https://security-tracker.debian.org/tracker/CVE-2020-22218

[ Impact ]
allows attackers to access out of bounds memory

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
This is a backport of the PR 476



Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2023-11-27 Thread Nicolas Mora

Hello Salvatore,

Le 2023-11-27 à 13 h 01, Salvatore Bonaccorso a écrit :


Small remark, the version ideally is set to 2.5.2-2+deb11u3.


My very bad, must be a wrong dch command, here is a new debdiff.

Thanks for noticing

/Nicolasdiff -Nru glewlwyd-2.5.2/debian/changelog glewlwyd-2.5.2/debian/changelog
--- glewlwyd-2.5.2/debian/changelog 2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/changelog 2023-11-24 08:14:30.0 -0500
@@ -1,3 +1,18 @@
+glewlwyd (2.5.2-2+deb11u3) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2022-27240
+  possible buffer overflow during webauthn signature assertion
+  * d/patches: Fix CVE-2022-29967
+  static_compressed_inmemory_website_callback.c in Glewlwyd
+  through 2.6.2 allows directory traversal
+  * d/glewlwyd-common.install: copy bootstrap, jquery, fork-awesome
+instead of linking it
+  * d/patches: Fix CVE-2023-49208:
+  possible buffer overflow during FIDO2 signature validation
+  in webauthn registration
+
+ -- Nicolas Mora   Fri, 24 Nov 2023 08:15:30 -0500
+
 glewlwyd (2.5.2-2+deb11u2) bullseye; urgency=medium
 
   * d/patches: Fix possible privilege escalation (Closes: #1001849)
diff -Nru glewlwyd-2.5.2/debian/control glewlwyd-2.5.2/debian/control
--- glewlwyd-2.5.2/debian/control   2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/control   2023-11-24 08:13:12.0 -0500
@@ -35,6 +35,10 @@
  , node-i18next-http-backend
  , node-qrcode-generator
  , webpack
+ , fonts-fork-awesome
+ , libjs-jquery
+ , libjs-bootstrap4
+ , libjs-popper.js
 Standards-Version: 4.5.1
 Homepage: https://github.com/babelouest/glewlwyd
 Vcs-Browser: https://salsa.debian.org/debian-iot-team/oauth2/glewlwyd.git
diff -Nru glewlwyd-2.5.2/debian/glewlwyd-common.install 
glewlwyd-2.5.2/debian/glewlwyd-common.install
--- glewlwyd-2.5.2/debian/glewlwyd-common.install   2021-12-17 
07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/glewlwyd-common.install   2023-11-24 
08:13:12.0 -0500
@@ -1,5 +1,6 @@
-webapp-src/css/glewlwyd*.css usr/share/glewlwyd/webapp/css/
-webapp-src/css/*-custom.css usr/share/glewlwyd/webapp/css/
+webapp-src/css/* usr/share/glewlwyd/webapp/css/
+webapp-src/js/* usr/share/glewlwyd/webapp/js/
+webapp-src/fonts/* usr/share/glewlwyd/webapp/fonts/
 webapp-src/locales/ usr/share/glewlwyd/webapp/
 webapp-src/img/ usr/share/glewlwyd/webapp/
 webapp-src/output/*.js usr/share/glewlwyd/webapp/
@@ -7,3 +8,4 @@
 webapp-src/favicon.ico usr/share/glewlwyd/webapp/
 
 debian/config.json usr/share/glewlwyd/templates/
+debian/config.json usr/share/glewlwyd/webapp/
diff -Nru glewlwyd-2.5.2/debian/glewlwyd-common.links 
glewlwyd-2.5.2/debian/glewlwyd-common.links
--- glewlwyd-2.5.2/debian/glewlwyd-common.links 2021-12-17 07:51:46.0 
-0500
+++ glewlwyd-2.5.2/debian/glewlwyd-common.links 1969-12-31 19:00:00.0 
-0500
@@ -1,19 +0,0 @@
-usr/share/javascript/jquery/jquery.min.js 
usr/share/glewlwyd/webapp/js/jquery.min.js
-usr/share/javascript/jquery/jquery.min.js 
usr/share/glewlwyd/webapp/js/jquery.min.js
-usr/share/javascript/popper.js/umd/popper.min.js 
usr/share/glewlwyd/webapp/js/popper.min.js
-usr/share/javascript/popper.js/umd/popper-utils.min.js 
usr/share/glewlwyd/webapp/js/popper-utils.min.js
-
-usr/share/nodejs/bootstrap/dist/js/bootstrap.min.js 
usr/share/glewlwyd/webapp/js/bootstrap.min.js
-usr/share/nodejs/bootstrap/dist/js/bootstrap.min.js.map 
usr/share/glewlwyd/webapp/js/bootstrap.min.js.map
-usr/share/nodejs/bootstrap/dist/css/bootstrap.min.css 
usr/share/glewlwyd/webapp/css/bootstrap.min.css
-usr/share/nodejs/bootstrap/dist/css/bootstrap.min.css.map 
usr/share/glewlwyd/webapp/css/bootstrap.min.css.map
-
-usr/share/fonts-fork-awesome/css/fork-awesome.css 
usr/share/glewlwyd/webapp/css/fork-awesome.min.css
-usr/share/fonts-fork-awesome/css/v5-compat.css 
usr/share/glewlwyd/webapp/css/v5-compat.min.css
-usr/share/fonts/eot/fork-awesome/forkawesome-webfont.eot 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.eot
-usr/share/fonts/svg/fork-awesome/forkawesome-webfont.svg 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.svg
-usr/share/fonts/truetype/fork-awesome/forkawesome-webfont.ttf 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.ttf
-usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff
-usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff2 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff2
-
-etc/glewlwyd/config.json usr/share/glewlwyd/webapp/config.json
diff -Nru glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch 
glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch
--- glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch  1969-12-31 
19:00:00.0 -0500
+++ glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch  2023-11-24 
08:13:12.0 -0500
@@ -0,0 +1,263 @@
+--- a/src

Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2023-11-27 Thread Nicolas Mora

Hello,

Here is a new debdiff for the glewlwyd/2.5.2-2+deb11u2 package, which 
now also includes the fix for CVE-2023-49208.diff -Nru glewlwyd-2.5.2/debian/changelog glewlwyd-2.5.2/debian/changelog
--- glewlwyd-2.5.2/debian/changelog 2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/changelog 2023-11-24 08:14:30.0 -0500
@@ -1,3 +1,18 @@
+glewlwyd (2.5.2-2+deb11u2.1) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2022-27240
+  possible buffer overflow during webauthn signature assertion
+  * d/patches: Fix CVE-2022-29967
+  static_compressed_inmemory_website_callback.c in Glewlwyd
+  through 2.6.2 allows directory traversal
+  * d/glewlwyd-common.install: copy bootstrap, jquery, fork-awesome
+instead of linking it
+  * d/patches: Fix CVE-2023-49208:
+  possible buffer overflow during FIDO2 signature validation
+  in webauthn registration
+
+ -- Nicolas Mora   Fri, 24 Nov 2023 08:15:30 -0500
+
 glewlwyd (2.5.2-2+deb11u2) bullseye; urgency=medium
 
   * d/patches: Fix possible privilege escalation (Closes: #1001849)
diff -Nru glewlwyd-2.5.2/debian/control glewlwyd-2.5.2/debian/control
--- glewlwyd-2.5.2/debian/control   2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/control   2023-11-24 08:13:12.0 -0500
@@ -35,6 +35,10 @@
  , node-i18next-http-backend
  , node-qrcode-generator
  , webpack
+ , fonts-fork-awesome
+ , libjs-jquery
+ , libjs-bootstrap4
+ , libjs-popper.js
 Standards-Version: 4.5.1
 Homepage: https://github.com/babelouest/glewlwyd
 Vcs-Browser: https://salsa.debian.org/debian-iot-team/oauth2/glewlwyd.git
diff -Nru glewlwyd-2.5.2/debian/glewlwyd-common.install 
glewlwyd-2.5.2/debian/glewlwyd-common.install
--- glewlwyd-2.5.2/debian/glewlwyd-common.install   2021-12-17 
07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/glewlwyd-common.install   2023-11-24 
08:13:12.0 -0500
@@ -1,5 +1,6 @@
-webapp-src/css/glewlwyd*.css usr/share/glewlwyd/webapp/css/
-webapp-src/css/*-custom.css usr/share/glewlwyd/webapp/css/
+webapp-src/css/* usr/share/glewlwyd/webapp/css/
+webapp-src/js/* usr/share/glewlwyd/webapp/js/
+webapp-src/fonts/* usr/share/glewlwyd/webapp/fonts/
 webapp-src/locales/ usr/share/glewlwyd/webapp/
 webapp-src/img/ usr/share/glewlwyd/webapp/
 webapp-src/output/*.js usr/share/glewlwyd/webapp/
@@ -7,3 +8,4 @@
 webapp-src/favicon.ico usr/share/glewlwyd/webapp/
 
 debian/config.json usr/share/glewlwyd/templates/
+debian/config.json usr/share/glewlwyd/webapp/
diff -Nru glewlwyd-2.5.2/debian/glewlwyd-common.links 
glewlwyd-2.5.2/debian/glewlwyd-common.links
--- glewlwyd-2.5.2/debian/glewlwyd-common.links 2021-12-17 07:51:46.0 
-0500
+++ glewlwyd-2.5.2/debian/glewlwyd-common.links 1969-12-31 19:00:00.0 
-0500
@@ -1,19 +0,0 @@
-usr/share/javascript/jquery/jquery.min.js 
usr/share/glewlwyd/webapp/js/jquery.min.js
-usr/share/javascript/jquery/jquery.min.js 
usr/share/glewlwyd/webapp/js/jquery.min.js
-usr/share/javascript/popper.js/umd/popper.min.js 
usr/share/glewlwyd/webapp/js/popper.min.js
-usr/share/javascript/popper.js/umd/popper-utils.min.js 
usr/share/glewlwyd/webapp/js/popper-utils.min.js
-
-usr/share/nodejs/bootstrap/dist/js/bootstrap.min.js 
usr/share/glewlwyd/webapp/js/bootstrap.min.js
-usr/share/nodejs/bootstrap/dist/js/bootstrap.min.js.map 
usr/share/glewlwyd/webapp/js/bootstrap.min.js.map
-usr/share/nodejs/bootstrap/dist/css/bootstrap.min.css 
usr/share/glewlwyd/webapp/css/bootstrap.min.css
-usr/share/nodejs/bootstrap/dist/css/bootstrap.min.css.map 
usr/share/glewlwyd/webapp/css/bootstrap.min.css.map
-
-usr/share/fonts-fork-awesome/css/fork-awesome.css 
usr/share/glewlwyd/webapp/css/fork-awesome.min.css
-usr/share/fonts-fork-awesome/css/v5-compat.css 
usr/share/glewlwyd/webapp/css/v5-compat.min.css
-usr/share/fonts/eot/fork-awesome/forkawesome-webfont.eot 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.eot
-usr/share/fonts/svg/fork-awesome/forkawesome-webfont.svg 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.svg
-usr/share/fonts/truetype/fork-awesome/forkawesome-webfont.ttf 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.ttf
-usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff
-usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff2 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff2
-
-etc/glewlwyd/config.json usr/share/glewlwyd/webapp/config.json
diff -Nru glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch 
glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch
--- glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch  1969-12-31 
19:00:00.0 -0500
+++ glewlwyd-2.5.2/debian/patches/CVE-2022-29967.patch  2023-11-24 
08:13:12.0 -0500
@@ -0,0 +1,263 @@
+--- a/src/static_compressed_inmemory_website_callback.c
 b/src/static_compressed_inmemory_website_callback.c
+@@ -158,7 +158,7 @@
+ static

Bug#1056936: bookworm-pu: package glewlwyd/2.7.5-3

2023-11-26 Thread Nicolas Mora

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: glewl...@packages.debian.org
Control: affects -1 + src:glewlwyd

(Please provide enough information to help the release team
to judge the request efficiently. E.g. by filling in the
sections below.)

[ Reason ]
Fix possible buffer overflow in webauthn attestation (CVE-2023-49208)

[ Risks ]
If a crafted webauthn assertion is executed, could
result in denial of service or the execution of arbitrary code

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
The change checks the length of a parameter before copying it into a
fixed size array.diff -Nru glewlwyd-2.7.5/debian/changelog glewlwyd-2.7.5/debian/changelog
--- glewlwyd-2.7.5/debian/changelog	2023-05-04 07:21:27.0 -0400
+++ glewlwyd-2.7.5/debian/changelog	2023-11-23 17:12:13.0 -0500
@@ -1,3 +1,9 @@
+glewlwyd (2.7.5-3+deb12u1) bookworm; urgency=medium
+
+  * d/patches: Fix CVE-2023-49208
+
+ -- Nicolas Mora   Thu, 23 Nov 2023 17:12:13 -0500
+
 glewlwyd (2.7.5-3) unstable; urgency=medium
 
   * Install config.json as config-2.7.json (Closes: #1035503)
diff -Nru glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch
--- glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch	1969-12-31 19:00:00.0 -0500
+++ glewlwyd-2.7.5/debian/patches/CVE-2023-49208.patch	2023-11-23 17:12:13.0 -0500
@@ -0,0 +1,21 @@
+Description: Fix CVE-2023-49208 for bookworm
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/scheme/webauthn.c
 b/src/scheme/webauthn.c
+@@ -2260,13 +2260,13 @@
+ for (i=0; i

Re: FTBFS: tests fail in clean environment

2023-11-23 Thread Nicolas Mora

Hello,

On Tue, 21 Nov 2023 13:30:31 + Steve McIntyre  wrote:

Source: libssh2
Version: 1.9.0-2
Severity: serious
Tags: ftbfs patch

Hi!

Building libssh2 using debuild in a clean local chroot, I get test
failures and even a core dump!


Thanks for reporting the bug, although I have concerns on its scope.

The package you have found the issue is the bullseye one, and the 
package updates for oldstable are allowed mostly for security patches.


Your bug is related to the test suite, and the patch won't change the 
binary files in the package, so I assume the patch isn't going to be 
allowed for proposed-updates.


I've added the release team to ask for their opinion.

Friends from the release team, do you have a feedback on this?

/Nicolas



Bug#1036029: unblock: glewlwyd/2.7.5-3

2023-05-13 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-iot-maintain...@lists.alioth.debian.org

Please unblock package glewlwyd 2.7.5-3

[ Reason ]
This new version in unstable fixes #1035503 : glewlwyd-common: prompting due to
modified conffiles which were not modified by the user:
/etc/glewlwyd/config.json

It also updates the default glewlwyd.conf file provided in the package which
prevents a startup error due to missing empty directory
/usr/lib/glewlwyd/user-middleware

[ Impact ]
The package glewlwyd will not be available in Debian Bookwork due to #1035503

[ Risks ]
The change doesn't affect the program nor the build, only the upgrade procedure

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock glewlwyd/2.7.5-3
diff -Nru glewlwyd-2.7.5/debian/changelog glewlwyd-2.7.5/debian/changelog
--- glewlwyd-2.7.5/debian/changelog 2023-01-17 07:24:23.0 -0500
+++ glewlwyd-2.7.5/debian/changelog 2023-05-04 07:21:27.0 -0400
@@ -1,3 +1,10 @@
+glewlwyd (2.7.5-3) unstable; urgency=medium
+
+  * Install config.json as config-2.7.json (Closes: #1035503)
+  * d/glewlwyd-debian.conf.properties: disable user_middleware_module_path
+
+ -- Nicolas Mora   Thu, 04 May 2023 07:21:27 -0400
+
 glewlwyd (2.7.5-2) unstable; urgency=medium
 
   * d/control: add adduser as glewlwyd package dependency, fix piuparts issue
diff -Nru glewlwyd-2.7.5/debian/glewlwyd-common.install 
glewlwyd-2.7.5/debian/glewlwyd-common.install
--- glewlwyd-2.7.5/debian/glewlwyd-common.install   2023-01-17 
07:24:23.0 -0500
+++ glewlwyd-2.7.5/debian/glewlwyd-common.install   2023-05-04 
07:21:27.0 -0400
@@ -7,5 +7,5 @@
 webapp-src/favicon.ico usr/share/glewlwyd/webapp/
 
 debian/config.json usr/share/glewlwyd/templates/
-debian/config.json etc/glewlwyd/
+debian/config.json etc/glewlwyd/config-2.7.json
 debian/glewlwyd-apache.conf etc/glewlwyd/
diff -Nru glewlwyd-2.7.5/debian/glewlwyd-common.links 
glewlwyd-2.7.5/debian/glewlwyd-common.links
--- glewlwyd-2.7.5/debian/glewlwyd-common.links 2023-01-17 07:24:23.0 
-0500
+++ glewlwyd-2.7.5/debian/glewlwyd-common.links 2023-05-04 07:21:27.0 
-0400
@@ -15,4 +15,4 @@
 usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff
 usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff2 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff2
 
-etc/glewlwyd/config.json usr/share/glewlwyd/webapp/config.json
+etc/glewlwyd/config-2.7.json usr/share/glewlwyd/webapp/config.json
diff -Nru glewlwyd-2.7.5/debian/glewlwyd-debian.conf.properties 
glewlwyd-2.7.5/debian/glewlwyd-debian.conf.properties
--- glewlwyd-2.7.5/debian/glewlwyd-debian.conf.properties   2023-01-17 
07:24:23.0 -0500
+++ glewlwyd-2.7.5/debian/glewlwyd-debian.conf.properties   2023-05-04 
07:21:27.0 -0400
@@ -94,7 +94,7 @@
 user_module_path="/usr/lib/glewlwyd/user"
 
 # user_middleware_module path
-user_middleware_module_path="/usr/lib/glewlwyd/user_middleware"
+#user_middleware_module_path="/usr/lib/glewlwyd/user_middleware"
 
 # client_module path
 client_module_path="/usr/lib/glewlwyd/client"
diff -Nru glewlwyd-2.7.5/debian/NEWS glewlwyd-2.7.5/debian/NEWS
--- glewlwyd-2.7.5/debian/NEWS  2023-01-17 07:24:23.0 -0500
+++ glewlwyd-2.7.5/debian/NEWS  2023-05-04 07:21:27.00000 -0400
@@ -9,13 +9,19 @@
 
  -- Nicolas Mora   Mon, 15 Mar 2021 18:18:01 -0400
 
-glewlwyd (2.7.5-2) unstable; urgency=medium
+glewlwyd (2.7.5-3) unstable; urgency=medium
 
   Upgrading Glewlwyd package from Debian Bullseye requires to update the
   database. It's also recommended to disable the config property
   'static_files_path', and serve the static files application located
   in /usr/share/glewlwyd/webapp/ using a static file web server (Apache,
   NGINX).
+  The webapp config.json has been updated, the new config.json file is now
+  located in /etc/glewlwyd/config-2.7.json and linked to
+  /usr/share/glewlwyd/webapp/config.json.
+  If you have made changes to your original config.json, you can backport them
+  to the new config-2.7.json file or keep your current config.json file if you
+  don't need the new properties.
   
   See /usr/share/doc/glewlwyd/INSTALL.md for more details.
 


Bug#1033004: unblock: libevent/2.1.12-stable-8

2023-03-15 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libevent

[ Reason ]
libevent in testing has a ftbfs bug with glibc 2.36: #1023284

[ Impact ]
The package libevent 2.1.12-stable-5 recompiled with glibc 2.36 breaks the ABI
by removing the symbol evutil_secure_rng_add_bytes.

[ Tests ]
Tests and autopkgtest passed

[ Risks ]
Low risks, the issue has been discussed upstream
(https://github.com/libevent/libevent/issues/1393) and the patrch, which is
already implemented in other distribs, has been accepted upstream
(https://github.com/libevent/libevent/pull/1427). The patch noops the function
evutil_secure_rng_add_bytes when arc4random is already provided by the system.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

[ Other info ]
The package should have been update sooner (before freeze), the first attempt
was to change the package name to libevent-2.1-7a, as in Ubuntu, the new
package went in NEW queue and was rejected (2.1.12-stable-7), then then
question was asked upstream to find a better solution.

Thanks in advance!

/Nicolas

unblock libevent/2.1.12-stable-8
diff -Nru libevent-2.1.12-stable/debian/changelog 
libevent-2.1.12-stable/debian/changelog
--- libevent-2.1.12-stable/debian/changelog 2022-04-15 11:26:52.0 
-0400
+++ libevent-2.1.12-stable/debian/changelog 2023-01-04 15:28:26.0 
-0500
@@ -1,3 +1,30 @@
+libevent (2.1.12-stable-8) unstable; urgency=medium
+
+  * Upload to unstable
+  * Restore last unstable version
+  * d/patches: Add patch evutil_secure_rng_add_bytes_noop.patch
+to make evutil_secure_rng_add_bytes noop with glibc's
+implemtation of arc4random, thanks z...@debian.org!
+(Closes: #1023284)
+  * d/control: upgrade Standards-Version to 4.6.2
+  * d/copyright: update year to 2023
+
+ -- Nicolas Mora   Wed, 04 Jan 2023 15:28:26 -0500
+
+libevent (2.1.12-stable-7) experimental; urgency=medium
+
+  * d/control: change package name to libevent-2.1-7a to update rdeps
+   (Closes: #1023284)
+
+ -- Nicolas Mora   Mon, 07 Nov 2022 07:14:20 -0500
+
+libevent (2.1.12-stable-6) experimental; urgency=medium
+
+  * d/symbols: remove symbol evutil_secure_rng_add_bytes
+  * d/control: upgrade Standards-Version to 4.6.1
+
+ -- Nicolas Mora   Wed, 02 Nov 2022 13:07:03 -0400
+
 libevent (2.1.12-stable-5) unstable; urgency=medium
 
   * d/control: Update maintainer
diff -Nru libevent-2.1.12-stable/debian/control 
libevent-2.1.12-stable/debian/control
--- libevent-2.1.12-stable/debian/control   2022-04-15 11:26:42.0 
-0400
+++ libevent-2.1.12-stable/debian/control   2023-01-04 15:28:26.0 
-0500
@@ -4,7 +4,7 @@
 Priority: optional
 Build-Depends: debhelper-compat (= 13),
libssl-dev
-Standards-Version: 4.6.0
+Standards-Version: 4.6.2
 Vcs-Git: https://salsa.debian.org/debian/libevent.git -b master
 Vcs-Browser: https://salsa.debian.org/debian/libevent
 Homepage: https://libevent.org/
diff -Nru libevent-2.1.12-stable/debian/copyright 
libevent-2.1.12-stable/debian/copyright
--- libevent-2.1.12-stable/debian/copyright 2022-04-15 09:45:11.0 
-0400
+++ libevent-2.1.12-stable/debian/copyright 2023-01-04 15:28:26.0 
-0500
@@ -13,7 +13,7 @@
2007-2015  Anibal Monsalve Salazar 
2017-2020 Balint Reczey 
2022 Balint Reczey 
-   2022 Nicolas Mora 
+   2022-2023 Nicolas Mora 
 License: BSD-3-clause
 
 Files: WIN32-Code/getopt.c
diff -Nru 
libevent-2.1.12-stable/debian/patches/evutil_secure_rng_add_bytes_noop.patch 
libevent-2.1.12-stable/debian/patches/evutil_secure_rng_add_bytes_noop.patch
--- 
libevent-2.1.12-stable/debian/patches/evutil_secure_rng_add_bytes_noop.patch
1969-12-31 19:00:00.0 -0500
+++ 
libevent-2.1.12-stable/debian/patches/evutil_secure_rng_add_bytes_noop.patch
2023-01-04 15:28:26.0 -0500
@@ -0,0 +1,40 @@
+Description: Make evutil_secure_rng_add_bytes noop with glibc's implemtation 
of arc4random
+Author: Shengjing Zhu 
+Forwarded: not-needed
+--- a/evutil_rand.c
 b/evutil_rand.c
+@@ -190,14 +190,14 @@
+   ev_arc4random_buf(buf, n);
+ }
+ 
+-#if !defined(EVENT__HAVE_ARC4RANDOM) || 
defined(EVENT__HAVE_ARC4RANDOM_ADDRANDOM)
+ void
+ evutil_secure_rng_add_bytes(const char *buf, size_t n)
+ {
++#if defined(EVENT__HAVE_ARC4RANDOM_ADDRANDOM)
+   arc4random_addrandom((unsigned char*)buf,
+   n>(size_t)INT_MAX ? INT_MAX : (int)n);
+-}
+ #endif
++}
+ 
+ void
+ evutil_free_secure_rng_globals_(void)
+--- a/include/event2/util.h
 b/include/event2/util.h
+@@ -862,7 +862,6 @@
+ EVENT2_EXPORT_SYMBOL
+ int evutil_secure_rng_set_urandom_device_file(char *fname);
+ 
+-#if !defined(EVENT__HAVE_ARC4RANDOM) || 
defined(EVENT__HAVE_ARC4RANDOM_ADDRANDOM)
+ /** Seed the random number generator with ex

Migrating libevent 2.1.12-stable-8 to testing status

2023-03-14 Thread Nicolas Mora

Hello team,

I've uploaded the package libevent 2.1.12-stable-8 to unstable to fix 
the RC bug #1023284 (libevent: FTBFS with glibc 2.36) on march 3rd.


Now the package migration status is blocked because it needs an approval 
[1]. According to the freeze policy [2], The package needs to be 
unblocked by the release team because of it's a key package.


Therefore I would like you to unblock the migration to testing, is there 
something I need to do to help you unlock the package?


Thanks in advance!

/Nicolas

[1] https://tracker.debian.org/pkg/libevent
[2] https://release.debian.org/testing/freeze_policy.html



package glewlwyd/2.5.2-2+deb11u3 and bug #1007884 in bullseye

2023-01-15 Thread Nicolas Mora

Hello team,

I've made a bullseye-pu for the package glewlwyd/2.5.2-2+deb11u3 a few 
months ago, but it seems that the bug has been lost somewhere. The bug 
is #1007884.


The new package fixes 2 CVEs.

I think I did something wrong in the bug and it was lost in the pile of 
pu packages, if so could you tell me what did I do wrong?


Can I do something else so the new package would be available in the 
next stable point release?


Thanks in advance and for your help!

/Nicolas



Re: Looking for help on transition workflow with package libevent

2022-11-07 Thread Nicolas Mora

Le 2022-11-07 à 07 h 31, Nicolas Mora a écrit :

I was also told to change the package name, it would also make the 
package cleaner.


So uploading to experimental with the name libevent-2.1-12 instead of 
libevent-2.1-7 would do it? Let's go with it then.



My mistake, renaming the package name to 2.1-12 isn't a clean solution.

I've looked at the ubuntu debdiff [1] and I think they are smarter than 
me, so I suggest a similar change for the package libevent [2]


Do you have feedbacks for this proposed solution?

/Nicolas

[1] 
https://launchpadlibrarian.net/627597893/libevent_2.1.12-stable-5_2.1.12-stable-5ubuntu1.diff.gz

[2] https://salsa.debian.org/debian/libevent



Re: Looking for help on transition workflow with package libevent

2022-11-07 Thread Nicolas Mora

Hello,

Thanks for your help!

Le 2022-11-07 à 05 h 44, Graham Inggs a écrit :


A test rebuild of reverse-dependencies was done in Ubuntu, and the
transition went ahead.

I was also told to change the package name, it would also make the 
package cleaner.


So uploading to experimental with the name libevent-2.1-12 instead of 
libevent-2.1-7 would do it? Let's go with it then.


/Nicolas



Looking for help on transition workflow with package libevent

2022-11-06 Thread Nicolas Mora

Hello release team,

I have a bug tagged serious in the package libevent I maintain [1], I've 
been told the solution is to start a transition workflow.


As mentioned in the transition doc [2], I uploaded the fixed package in 
experimental, but I'm wondering what does "Check the auto-generated 
"auto-"" mean.
Will my package appear on this list automatically or after I request a 
transition slot from the release team?


Thanks in advance for the help, sorry for the noob question, this is my 
first transition...


/Nicolas

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023284
[2] https://wiki.debian.org/Teams/ReleaseTeam/Transitions


OpenPGP_0xFE82139440BD22B9.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1013893: bullseye-pu: package rhonabwy/0.9.13-3+deb11u1

2022-06-26 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

[ Reason ]
Fix possible buffer overflow when decrypting forged jwe with invalid iv or
cypherkey

[ Impact ]
program might crash or execute arbitrary code

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Check iv and cypherkey len before decoding them

[ Other info ]
CVE id pending
diff -Nru rhonabwy-0.9.13/debian/changelog rhonabwy-0.9.13/debian/changelog
--- rhonabwy-0.9.13/debian/changelog2021-09-22 07:29:46.0 -0400
+++ rhonabwy-0.9.13/debian/changelog2022-06-26 17:27:39.0 -0400
@@ -1,3 +1,9 @@
+rhonabwy (0.9.13-3+deb11u2) bullseye; urgency=medium
+
+  * d/patches/aesgcm.patch: Fix aesgcm buffer overflow
+
+ -- Nicolas Mora   Sun, 26 Jun 2022 17:27:39 -0400
+
 rhonabwy (0.9.13-3+deb11u1) bullseye; urgency=medium
 
   * d/patches/bugfixes: apply upstream bugfixes
diff -Nru rhonabwy-0.9.13/debian/patches/aesgcm.patch 
rhonabwy-0.9.13/debian/patches/aesgcm.patch
--- rhonabwy-0.9.13/debian/patches/aesgcm.patch 1969-12-31 19:00:00.0 
-0500
+++ rhonabwy-0.9.13/debian/patches/aesgcm.patch 2022-06-26 17:26:58.0 
-0400
@@ -0,0 +1,32 @@
+Description: Fix aesgcm buffer overflow
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/jwe.c
 b/src/jwe.c
+@@ -226,14 +226,24 @@
+ ret = RHN_ERROR;
+ break;
+   }
++  if (!o_base64url_decode((const unsigned char 
*)r_jwe_get_header_str_value(jwe, "iv"), 
o_strlen(r_jwe_get_header_str_value(jwe, "iv")), NULL, _len) || iv_len > 96) 
{
++y_log_message(Y_LOG_LEVEL_ERROR, "r_jwe_aesgcm_key_unwrap - Invalid 
header iv");
++ret = RHN_ERROR_INVALID;
++break;
++  }
+   if (!o_base64url_decode((const unsigned char 
*)r_jwe_get_header_str_value(jwe, "iv"), 
o_strlen(r_jwe_get_header_str_value(jwe, "iv")), iv, _len)) {
+ y_log_message(Y_LOG_LEVEL_ERROR, "r_jwe_aesgcm_key_unwrap - Error 
o_base64url_decode iv");
+-ret = RHN_ERROR;
++ret = RHN_ERROR_INVALID;
++break;
++  }
++  if (!o_base64url_decode((const unsigned char 
*)jwe->encrypted_key_b64url, o_strlen((const char *)jwe->encrypted_key_b64url), 
NULL, _len) || cipherkey_len > 64) {
++y_log_message(Y_LOG_LEVEL_ERROR, "r_jwe_aesgcm_key_unwrap - Invalid 
cipherkey");
++ret = RHN_ERROR_INVALID;
+ break;
+   }
+   if (!o_base64url_decode((const unsigned char 
*)jwe->encrypted_key_b64url, o_strlen((const char *)jwe->encrypted_key_b64url), 
cipherkey, _len)) {
+ y_log_message(Y_LOG_LEVEL_ERROR, "r_jwe_aesgcm_key_unwrap - Error 
o_base64url_decode cipherkey");
+-ret = RHN_ERROR;
++ret = RHN_ERROR_INVALID;
+ break;
+   }
+   key_g.data = key;
diff -Nru rhonabwy-0.9.13/debian/patches/series 
rhonabwy-0.9.13/debian/patches/series
--- rhonabwy-0.9.13/debian/patches/series   2021-09-22 07:29:46.0 
-0400
+++ rhonabwy-0.9.13/debian/patches/series   2022-06-26 17:25:31.0 
-0400
@@ -1,3 +1,4 @@
 library_info.patch
 disable_test_rhonabwy_generate_key_pair.patch
 bugfixes.patch
+aesgcm.patch


Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2022-06-26 Thread Nicolas Mora

Control: tags -1 - moreinfo

Can you please review the last debdiff?



Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2022-05-07 Thread Nicolas Mora

Hello,

I've updated glewlwyd/2.5.2-2+deb11u2 with the 
glewlwyd_2.5.2-2+deb11u2...2.5.2-2+deb11u3.debdiff file.


Now both CVEs (CVE-2022-27240 and CVE-2022-29967) are fixed in the update.

The fix for CVE-2022-27240 only addresses the buffer overflow, 
o_base64url_decode isn't changed to o_base64_decode anymore.


The CVE-2022-29967 requires more changes though.
The bug fix uses 'realpath' to avoid traversal access.

Although if an accessed file is a soft link, realpath returns the 
realpath of the file which isn't in /usr/share/glewlwyd/webapp, so an 
error 404 is raised. The solution is to copy jquery, popper.js, 
bootstrap and fonts-fork-awesome files from their respective 
installation into /usr/share/glewlwyd/webapp.diff -Nru glewlwyd-2.5.2/debian/changelog glewlwyd-2.5.2/debian/changelog
--- glewlwyd-2.5.2/debian/changelog 2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/changelog 2022-03-17 21:13:09.0 -0400
@@ -1,3 +1,15 @@
+glewlwyd (2.5.2-2+deb11u3) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2022-27240
+  possible buffer overflow during webauthn signature assertion
+  * d/patches: Fix CVE-2022-29967
+  static_compressed_inmemory_website_callback.c in Glewlwyd
+  through 2.6.2 allows directory traversal
+  * d/glewlwyd-common.install: copy bootstrap, jquery, fork-awesome
+instead of linking it
+
+ -- Nicolas Mora   Thu, 17 Mar 2022 21:13:09 -0400
+
 glewlwyd (2.5.2-2+deb11u2) bullseye; urgency=medium
 
   * d/patches: Fix possible privilege escalation (Closes: #1001849)
diff -Nru glewlwyd-2.5.2/debian/control glewlwyd-2.5.2/debian/control
--- glewlwyd-2.5.2/debian/control   2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/control   2022-03-17 21:13:09.0 -0400
@@ -35,6 +35,10 @@
  , node-i18next-http-backend
  , node-qrcode-generator
  , webpack
+ , fonts-fork-awesome
+ , libjs-jquery
+ , libjs-bootstrap4
+ , libjs-popper.js
 Standards-Version: 4.5.1
 Homepage: https://github.com/babelouest/glewlwyd
 Vcs-Browser: https://salsa.debian.org/debian-iot-team/oauth2/glewlwyd.git
diff -Nru glewlwyd-2.5.2/debian/glewlwyd-common.install 
glewlwyd-2.5.2/debian/glewlwyd-common.install
--- glewlwyd-2.5.2/debian/glewlwyd-common.install   2021-12-17 
07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/glewlwyd-common.install   2022-03-17 
21:13:09.0 -0400
@@ -1,5 +1,6 @@
-webapp-src/css/glewlwyd*.css usr/share/glewlwyd/webapp/css/
-webapp-src/css/*-custom.css usr/share/glewlwyd/webapp/css/
+webapp-src/css/* usr/share/glewlwyd/webapp/css/
+webapp-src/js/* usr/share/glewlwyd/webapp/js/
+webapp-src/fonts/* usr/share/glewlwyd/webapp/fonts/
 webapp-src/locales/ usr/share/glewlwyd/webapp/
 webapp-src/img/ usr/share/glewlwyd/webapp/
 webapp-src/output/*.js usr/share/glewlwyd/webapp/
@@ -7,3 +8,4 @@
 webapp-src/favicon.ico usr/share/glewlwyd/webapp/
 
 debian/config.json usr/share/glewlwyd/templates/
+debian/config.json usr/share/glewlwyd/webapp/
diff -Nru glewlwyd-2.5.2/debian/glewlwyd-common.links 
glewlwyd-2.5.2/debian/glewlwyd-common.links
--- glewlwyd-2.5.2/debian/glewlwyd-common.links 2021-12-17 07:51:46.0 
-0500
+++ glewlwyd-2.5.2/debian/glewlwyd-common.links 1969-12-31 19:00:00.0 
-0500
@@ -1,19 +0,0 @@
-usr/share/javascript/jquery/jquery.min.js 
usr/share/glewlwyd/webapp/js/jquery.min.js
-usr/share/javascript/jquery/jquery.min.js 
usr/share/glewlwyd/webapp/js/jquery.min.js
-usr/share/javascript/popper.js/umd/popper.min.js 
usr/share/glewlwyd/webapp/js/popper.min.js
-usr/share/javascript/popper.js/umd/popper-utils.min.js 
usr/share/glewlwyd/webapp/js/popper-utils.min.js
-
-usr/share/nodejs/bootstrap/dist/js/bootstrap.min.js 
usr/share/glewlwyd/webapp/js/bootstrap.min.js
-usr/share/nodejs/bootstrap/dist/js/bootstrap.min.js.map 
usr/share/glewlwyd/webapp/js/bootstrap.min.js.map
-usr/share/nodejs/bootstrap/dist/css/bootstrap.min.css 
usr/share/glewlwyd/webapp/css/bootstrap.min.css
-usr/share/nodejs/bootstrap/dist/css/bootstrap.min.css.map 
usr/share/glewlwyd/webapp/css/bootstrap.min.css.map
-
-usr/share/fonts-fork-awesome/css/fork-awesome.css 
usr/share/glewlwyd/webapp/css/fork-awesome.min.css
-usr/share/fonts-fork-awesome/css/v5-compat.css 
usr/share/glewlwyd/webapp/css/v5-compat.min.css
-usr/share/fonts/eot/fork-awesome/forkawesome-webfont.eot 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.eot
-usr/share/fonts/svg/fork-awesome/forkawesome-webfont.svg 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.svg
-usr/share/fonts/truetype/fork-awesome/forkawesome-webfont.ttf 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.ttf
-usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff
-usr/share/fonts/woff/fork-awesome/forkawesome-webfont.woff2 
usr/share/glewlwyd/webapp/fonts/forkawesome-webfont.woff2
-
-etc/glewlwyd/config.json usr/share/glewlwyd/webapp

Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2022-04-30 Thread Nicolas Mora

Hello,

Is it possible to review the patch, so the package in bullseye can be in 
p-u?


Thanks!



Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2022-03-18 Thread Nicolas Mora

Hello,

Le 2022-03-18 à 11 h 29, Julien Cristau a écrit :


The below is not a debdiff, and doesn't include a changelog entry. :(


Sorry, added the debdiff here


What's the change of o_base64url_decode to o_base64_decode about?

This is why I found the issue in the first place, by refactoring 
o_base64* functions.


o_base64_decode should be used because the data is in base64, not 
base64url, but in this case, a conversion happens before decoding the 
data. So I switched back to o_base64url_decode in the debdiff


/Nicolasdiff -Nru glewlwyd-2.5.2/debian/changelog glewlwyd-2.5.2/debian/changelog
--- glewlwyd-2.5.2/debian/changelog 2021-12-17 07:51:46.0 -0500
+++ glewlwyd-2.5.2/debian/changelog 2022-03-17 21:13:09.0 -0400
@@ -1,3 +1,10 @@
+glewlwyd (2.5.2-2+deb11u3) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2022-27240
+  possible buffer overflow during webauthn signature assertion
+
+ -- Nicolas Mora   Thu, 17 Mar 2022 21:13:09 -0400
+
 glewlwyd (2.5.2-2+deb11u2) bullseye; urgency=medium
 
   * d/patches: Fix possible privilege escalation (Closes: #1001849)
diff -Nru glewlwyd-2.5.2/debian/patches/series 
glewlwyd-2.5.2/debian/patches/series
--- glewlwyd-2.5.2/debian/patches/series2021-12-17 07:51:46.0 
-0500
+++ glewlwyd-2.5.2/debian/patches/series2022-03-17 21:13:09.0 
-0400
@@ -1,3 +1,4 @@
 #webpack.patch
+webauthn-2.patch
 webauthn.patch
 auth.patch
diff -Nru glewlwyd-2.5.2/debian/patches/webauthn-2.patch 
glewlwyd-2.5.2/debian/patches/webauthn-2.patch
--- glewlwyd-2.5.2/debian/patches/webauthn-2.patch  1969-12-31 
19:00:00.0 -0500
+++ glewlwyd-2.5.2/debian/patches/webauthn-2.patch  2022-03-17 
21:13:09.0 -0400
@@ -0,0 +1,32 @@
+Description: Fix buffer overflow
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/scheme/webauthn.c
 b/src/scheme/webauthn.c
+@@ -2336,12 +2336,24 @@
+ break;
+   }
+   
+-  if (!o_base64url_decode((const unsigned char 
*)json_string_value(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), 
json_string_length(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), sig, _len)) {
+-y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Error 
o_base64url_decode signature");
++  if (!o_base64url_decode((const unsigned char 
*)json_string_value(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), 
json_string_length(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), NULL, _len)) {
++y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Invalid signature 
format");
+ ret = G_ERROR_PARAM;
+ break;
+   }
+   
++  if (sig_len > 128) {
++y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Invalid 
signature");
++ret = G_ERROR_PARAM;
++break;
++  }
++
++  if (!o_base64url_decode((const unsigned char 
*)json_string_value(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), 
json_string_length(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), sig, _len)) {
++y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Error 
o_base64url_decode signature");
++ret = G_ERROR;
++break;
++  }
++
+   memcpy(data_signed, auth_data, auth_data_len);
+   memcpy(data_signed+auth_data_len, cdata_hash, cdata_hash_len);
+   


Bug#1007884: Acknowledgement (bullseye-pu: package glewlwyd/2.5.2-2+deb11u2)

2022-03-18 Thread Nicolas Mora

The CVE ID is CVE-2022-27240



Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u2

2022-03-17 Thread Nicolas Mora
Package: release.debian.org
Severity: important
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

(Please provide enough information to help the release team
to judge the request efficiently. E.g. by filling in the
sections below.)

[ Reason ]
Possible buffer overflow on signature verification during webauthn assertion

[ Impact ]
Possibility of denial of service

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
Check the length of the signature before verifying it

[ Other info ]
CVE ID request pending
Description: Fix buffer overflow
Author: Nicolas Mora 
Forwarded: not-needed
--- a/src/scheme/webauthn.c
+++ b/src/scheme/webauthn.c
@@ -2336,12 +2336,24 @@
 break;
   }
   
-  if (!o_base64url_decode((const unsigned char 
*)json_string_value(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), 
json_string_length(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), sig, _len)) {
-y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Error 
o_base64url_decode signature");
+  if (!o_base64_decode((const unsigned char 
*)json_string_value(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), 
json_string_length(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), NULL, _len)) {
+y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Invalid signature 
format");
 ret = G_ERROR_PARAM;
 break;
   }
   
+  if (sig_len > 128) {
+y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Invalid 
signature");
+ret = G_ERROR_PARAM;
+break;
+  }
+
+  if (!o_base64_decode((const unsigned char 
*)json_string_value(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), 
json_string_length(json_object_get(json_object_get(json_object_get(j_scheme_data,
 "credential"), "response"), "signature")), sig, _len)) {
+y_log_message(Y_LOG_LEVEL_DEBUG, "check_assertion - Error 
o_base64_decode signature");
+ret = G_ERROR;
+break;
+  }
+
   memcpy(data_signed, auth_data, auth_data_len);
   memcpy(data_signed+auth_data_len, cdata_hash, cdata_hash_len);
   


Bug#1001849: Acknowledgement (bullseye-pu: package glewlwyd/2.5.2-2+deb11u1)

2021-12-30 Thread Nicolas Mora

Also, the bug is only for 2.x versions.

The package glewlwyd 1.4.9-1 in oldstable isn't vulnerable



Bug#1001849: Acknowledgement (bullseye-pu: package glewlwyd/2.5.2-2+deb11u1)

2021-12-30 Thread Nicolas Mora

Hello,

On Fri, 24 Dec 2021 14:39:14 -0500 Nicolas Mora  
wrote:

Hello Salvatore,

Le 2021-12-24 à 14 h 36, Salvatore Bonaccorso a écrit :
> 
> Any news on the CVE assignment? Did MITRE respond?
> 



The CVE has been attributed for this bug: CVE-2021-45379



Bug#1001849: Acknowledgement (bullseye-pu: package glewlwyd/2.5.2-2+deb11u1)

2021-12-24 Thread Nicolas Mora

Hello Salvatore,

Le 2021-12-24 à 14 h 36, Salvatore Bonaccorso a écrit :


Any news on the CVE assignment? Did MITRE respond?



Not yet, still waiting for the submission to be reviewed according to 
the mitre...


/Nicolas



Bug#1001849: Acknowledgement (bullseye-pu: package glewlwyd/2.5.2-2+deb11u1)

2021-12-17 Thread Nicolas Mora

See attached debdiff
diff -Nru glewlwyd-2.5.2/debian/changelog glewlwyd-2.5.2/debian/changelog
--- glewlwyd-2.5.2/debian/changelog 2021-09-22 08:42:59.0 -0400
+++ glewlwyd-2.5.2/debian/changelog 2021-12-17 07:51:46.0 -0500
@@ -1,3 +1,9 @@
+glewlwyd (2.5.2-2+deb11u2) bullseye; urgency=medium
+
+  * d/patches: Fix possible privilege escalation (Closes: #1001849)
+
+ -- Nicolas Mora   Fri, 17 Dec 2021 07:51:46 -0500
+
 glewlwyd (2.5.2-2+deb11u1) bullseye; urgency=medium
 
   * d/patches: Fix CVE-2021-40818
diff -Nru glewlwyd-2.5.2/debian/patches/auth.patch 
glewlwyd-2.5.2/debian/patches/auth.patch
--- glewlwyd-2.5.2/debian/patches/auth.patch1969-12-31 19:00:00.0 
-0500
+++ glewlwyd-2.5.2/debian/patches/auth.patch2021-12-17 07:51:46.0 
-0500
@@ -0,0 +1,16 @@
+Description: Fix escalation privilege
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/webservice.c
 b/src/webservice.c
+@@ -259,10 +259,6 @@
+ if (check_result_value(j_result, G_ERROR_UNAUTHORIZED)) {
+   y_log_message(Y_LOG_LEVEL_WARNING, "Security - Authorization 
invalid for username %s at IP Address %s", 
json_string_value(json_object_get(j_param, "username")), ip_source);
+ }
+-if ((session_uid = get_session_id(config, request)) != NULL && 
user_session_update(config, session_uid, u_map_get_case(request->map_header, 
"user-agent"), issued_for, json_string_value(json_object_get(j_param, 
"username")), NULL, 1) != G_OK) {
+-  y_log_message(Y_LOG_LEVEL_ERROR, "callback_glewlwyd_user_auth - 
Error user_session_update (2)");
+-}
+-o_free(session_uid);
+ response->status = 401;
+   }
+   json_decref(j_result);
diff -Nru glewlwyd-2.5.2/debian/patches/series 
glewlwyd-2.5.2/debian/patches/series
--- glewlwyd-2.5.2/debian/patches/series2021-09-22 08:42:59.0 
-0400
+++ glewlwyd-2.5.2/debian/patches/series2021-12-17 07:51:46.0 
-0500
@@ -1,2 +1,3 @@
 #webpack.patch
 webauthn.patch
+auth.patch


Bug#1001849: bullseye-pu: package glewlwyd/2.5.2-2+deb11u1

2021-12-17 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

[ Reason ]
A bug has been fixed in Glewlwyd 2.6.1 to avoid possible possible privilege
escalation

[ Impact ]
Users accounts might be compromised

[ Changes ]
Remove a misplaced session update in the source code

CVE request has been filed, await for response



friendly ping for buster and bullseye pu

2021-09-24 Thread Nicolas Mora

Hello team,

Any chance those proposed-updates are allowed to be uploaded before the 
freeze date?


bullseye
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994880
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994881
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994885

buster
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994887

Thanks in advance!



Bug#994887: buster-pu: package ulfius/2.5.2-4

2021-09-22 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

[ Reason ]
Ulfius package contains the bug that is rewferred by CVE-2021-40540

[ Impact ]
Application segfault when a malformed http request is received

[ Risks ]
the patch is trivial, the risk is low

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
add 'memset(con_info, 0, sizeof(struct connection_info_struct));' after
con_info is malloced to initialize the structure and avoid testing an undefined
value.
diff -Nru ulfius-2.5.2/debian/changelog ulfius-2.5.2/debian/changelog
--- ulfius-2.5.2/debian/changelog   2019-01-12 12:41:47.0 -0500
+++ ulfius-2.5.2/debian/changelog   2021-09-20 08:15:27.0 -0400
@@ -1,3 +1,9 @@
+ulfius (2.5.2-4+deb10u1) buster; urgency=medium
+
+  * d/patches: Fix CVE-2021-40540
+
+ -- Nicolas Mora   Mon, 20 Sep 2021 08:15:27 -0400
+
 ulfius (2.5.2-4) unstable; urgency=medium
 
   * debian/rules: remove override_dh_auto_test since now it's executed
diff -Nru ulfius-2.5.2/debian/patches/CVE-2021-40540.patch 
ulfius-2.5.2/debian/patches/CVE-2021-40540.patch
--- ulfius-2.5.2/debian/patches/CVE-2021-40540.patch1969-12-31 
19:00:00.0 -0500
+++ ulfius-2.5.2/debian/patches/CVE-2021-40540.patch2021-09-20 
08:15:27.0 -0400
@@ -0,0 +1,13 @@
+Description: Fix CVE-2021-40540
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/ulfius.c
 b/src/ulfius.c
+@@ -190,6 +190,7 @@
+   UNUSED(cls);
+   
+   if (con_info != NULL) {
++memset(con_info, 0, sizeof(struct connection_info_struct));
+ con_info->callback_first_iteration = 1;
+ con_info->u_instance = NULL;
+ u_map_init(_info->map_url_initial);
diff -Nru ulfius-2.5.2/debian/patches/series ulfius-2.5.2/debian/patches/series
--- ulfius-2.5.2/debian/patches/series  2019-01-12 12:41:47.0 -0500
+++ ulfius-2.5.2/debian/patches/series  2021-09-20 08:15:27.0 -0400
@@ -1,3 +1,4 @@
 examples.patch
 test.patch
 cmake.patch
+CVE-2021-40540.patch


Bug#994885: bullseye-pu: package glewlwyd/2.5.2-2

2021-09-22 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

Fix CVE-2021-40818 in bullseye

[ Reason ]
CVE-2021-40818 allows a malicious user to perform a buffer overflow during a
webauthn registration with FIDO2 protocol.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
The patch changes a 'unsigned char data_signed[200]' to a 'unsigned char *
data_signed = NULL' and allocates the variable with the proper length. The
previous code didn't take credential_id_len in account.
diff -Nru glewlwyd-2.5.2/debian/changelog glewlwyd-2.5.2/debian/changelog
--- glewlwyd-2.5.2/debian/changelog 2021-03-14 19:32:40.0 -0400
+++ glewlwyd-2.5.2/debian/changelog 2021-09-22 08:42:59.0 -0400
@@ -1,3 +1,11 @@
+glewlwyd (2.5.2-2+deb11u1) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2021-40818
+  possible buffer overflow during FIDO2 signature validation
+  in webauthn registration
+
+ -- Nicolas Mora   Wed, 22 Sep 2021 08:42:59 -0400
+
 glewlwyd (2.5.2-2) unstable; urgency=medium
 
   * Fix postgre database initialization (Closes: #985238)
diff -Nru glewlwyd-2.5.2/debian/patches/series 
glewlwyd-2.5.2/debian/patches/series
--- glewlwyd-2.5.2/debian/patches/series2021-03-14 19:32:40.0 
-0400
+++ glewlwyd-2.5.2/debian/patches/series2021-09-22 08:42:59.0 
-0400
@@ -1 +1,2 @@
 #webpack.patch
+webauthn.patch
diff -Nru glewlwyd-2.5.2/debian/patches/webauthn.patch 
glewlwyd-2.5.2/debian/patches/webauthn.patch
--- glewlwyd-2.5.2/debian/patches/webauthn.patch1969-12-31 
19:00:00.0 -0500
+++ glewlwyd-2.5.2/debian/patches/webauthn.patch2021-09-22 
08:42:59.0 -0400
@@ -0,0 +1,35 @@
+Description: Fix buffer overflow
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/scheme/webauthn.c
 b/src/scheme/webauthn.c
+@@ -1530,7 +1530,7 @@
+   gnutls_pubkey_t pubkey = NULL;
+   gnutls_x509_crt_t cert = NULL;
+   gnutls_datum_t cert_dat, data, signature, cert_issued_by;
+-  unsigned char data_signed[200], client_data_hash[32], cert_export[32], 
cert_export_b64[64];
++  unsigned char * data_signed = NULL, client_data_hash[32], cert_export[32], 
cert_export_b64[64];
+   size_t data_signed_offset = 0, client_data_hash_len = 32, cert_export_len = 
32, cert_export_b64_len = 0;
+   
+   if (j_error != NULL) {
+@@ -1619,6 +1619,12 @@
+ break;
+   }
+   
++  if ((data_signed = 
o_malloc(rpid_hash_len+client_data_hash_len+credential_id_len+cert_x_len+cert_y_len+2))
 == NULL) {
++y_log_message(Y_LOG_LEVEL_DEBUG, "check_attestation_fido_u2f - Error 
allocating data_signed");
++json_array_append_new(j_error, json_string("Internal error"));
++break;
++  }
++
+   // Build bytestring to verify signature
+   data_signed[0] = 0x0;
+   data_signed_offset = 1;
+@@ -1653,6 +1659,7 @@
+   }
+   
+ } while (0);
++o_free(data_signed);
+ 
+ if (json_array_size(j_error)) {
+   j_return = json_pack("{sisO}", "result", G_ERROR_PARAM, "error", 
j_error);


Bug#994881: bullseye-pu: package rhonabwy/0.9.13-3

2021-09-22 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

The attached debdiff file fixes 2 bugs:
  jwe cbc tag computation error
  jws alg:none signature verification issue

[ Tests ]
The tests are updated by the debdiff file

[ Risks ]
The jws alg:none signature verification issue might lead to incorrect token
verification, while the jwe cbc tag computation error leads to incorrect token
decryption

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable
diff -Nru rhonabwy-0.9.13/debian/changelog rhonabwy-0.9.13/debian/changelog
--- rhonabwy-0.9.13/debian/changelog2021-02-09 07:33:21.0 -0500
+++ rhonabwy-0.9.13/debian/changelog2021-09-22 07:29:46.0 -0400
@@ -1,3 +1,11 @@
+rhonabwy (0.9.13-3+deb11u1) bullseye; urgency=medium
+
+  * d/patches/bugfixes: apply upstream bugfixes
+  jwe cbc tag computation error
+  jws alg:none signature verification issue
+
+ -- Nicolas Mora   Wed, 22 Sep 2021 07:29:46 -0400
+
 rhonabwy (0.9.13-3) unstable; urgency=medium
 
   * Fix r_library_info_json_t output
diff -Nru rhonabwy-0.9.13/debian/patches/bugfixes.patch 
rhonabwy-0.9.13/debian/patches/bugfixes.patch
--- rhonabwy-0.9.13/debian/patches/bugfixes.patch   1969-12-31 
19:00:00.0 -0500
+++ rhonabwy-0.9.13/debian/patches/bugfixes.patch   2021-09-22 
07:29:46.0 -0400
@@ -0,0 +1,37 @@
+Description: Fix jwe cbc tag computation and jws alg:none signature 
verification
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/jwe.c
 b/src/jwe.c
+@@ -450,7 +450,7 @@
+ memcpy(compute_hmac+hmac_size, al, 8);
+ hmac_size += 8;
+ 
+-if (!(res = gnutls_hmac_fast(mac, jwe->key, 16, compute_hmac, hmac_size, 
tag))) {
++if (!(res = gnutls_hmac_fast(mac, jwe->key, jwe->key_len/2, compute_hmac, 
hmac_size, tag))) {
+   *tag_len = gnutls_hmac_get_len(mac)/2;
+   ret = RHN_OK;
+ } else {
+--- a/src/jws.c
 b/src/jws.c
+@@ -1268,9 +1268,6 @@
+ case R_JWA_ALG_ES256K:
+   ret = RHN_ERROR_UNSUPPORTED;
+   break;
+-case R_JWA_ALG_NONE:
+-  ret = RHN_OK;
+-  break;
+ default:
+   ret = RHN_ERROR_INVALID;
+   break;
+--- a/test/jws_core.c
 b/test/jws_core.c
+@@ -496,7 +496,7 @@
+   ck_assert_ptr_ne((token = r_jws_serialize(jws_sign, NULL, 0)), NULL);
+   
+   ck_assert_int_eq(r_jws_parse(jws_verify, token, 0), RHN_OK);
+-  ck_assert_int_eq(r_jws_verify_signature(jws_verify, NULL, 0), RHN_OK);
++  ck_assert_int_eq(r_jws_verify_signature(jws_verify, NULL, 0), 
RHN_ERROR_INVALID);
+   o_free(token);
+   
+   r_jws_free(jws_sign);
diff -Nru rhonabwy-0.9.13/debian/patches/series 
rhonabwy-0.9.13/debian/patches/series
--- rhonabwy-0.9.13/debian/patches/series   2021-02-09 07:33:21.0 
-0500
+++ rhonabwy-0.9.13/debian/patches/series   2021-09-22 07:29:46.0 
-0400
@@ -1,2 +1,3 @@
 library_info.patch
 disable_test_rhonabwy_generate_key_pair.patch
+bugfixes.patch


Bug#994880: bullseye-pu: package ulfius/2.7.1-1

2021-09-22 Thread Nicolas Mora
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

Fix CVE-2021-40540 in Bullseye

[ Reason ]
Ulfius package contains the bug that is rewferred by CVE-2021-40540

[ Impact ]
Application segfault when a malformed http request is received

[ Tests ]
none

[ Risks ]
the patch is trivial, the risk is low

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
add 'memset(con_info, 0, sizeof(struct connection_info_struct));' after
con_info is malloced to initialize the structure and avoid testing an undefined
value.

[ Other info ]
(Anything else the release team should know.)
diff -Nru ulfius-2.7.1/debian/changelog ulfius-2.7.1/debian/changelog
--- ulfius-2.7.1/debian/changelog   2021-01-03 09:03:05.0 -0500
+++ ulfius-2.7.1/debian/changelog   2021-09-19 15:39:39.0 -0400
@@ -1,3 +1,9 @@
+ulfius (2.7.1-1+deb11u1) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2021-40540 (Closes: #994763)
+
+ -- Nicolas Mora   Sun, 19 Sep 2021 15:39:39 -0400
+
 ulfius (2.7.1-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru ulfius-2.7.1/debian/patches/CVE-2021-40540.patch 
ulfius-2.7.1/debian/patches/CVE-2021-40540.patch
--- ulfius-2.7.1/debian/patches/CVE-2021-40540.patch1969-12-31 
19:00:00.0 -0500
+++ ulfius-2.7.1/debian/patches/CVE-2021-40540.patch2021-09-19 
15:39:20.0 -0400
@@ -0,0 +1,13 @@
+Description: Fix CVE-2021-40540
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/ulfius.c
 b/src/ulfius.c
+@@ -207,6 +207,7 @@
+   UNUSED(cls);
+ 
+   if (con_info != NULL) {
++memset(con_info, 0, sizeof(struct connection_info_struct));
+ con_info->callback_first_iteration = 1;
+ con_info->u_instance = NULL;
+ u_map_init(_info->map_url_initial);
diff -Nru ulfius-2.7.1/debian/patches/series ulfius-2.7.1/debian/patches/series
--- ulfius-2.7.1/debian/patches/series  2021-01-03 09:03:05.0 -0500
+++ ulfius-2.7.1/debian/patches/series  2021-09-19 15:39:39.0 -0400
@@ -1,2 +1,3 @@
 examples.patch
 doc.patch
+CVE-2021-40540.patch


Re: request to send update packages for ulfius, rhonabwy and glewlwyd

2021-09-20 Thread Nicolas Mora

Hello Johnatan,

Thanks for your answer, I have a couple of questions though, to make 
sure I'm in the right track before the pu window closes. It's my first 
pu upload, so I'm a little confused.


Le 2021-09-20 à 17 h 02, Jonathan Wiltshire a écrit :


Please see the guidance in the developer's reference [1] and use reportbug
to submit your request(s). In particular you need to include a source
debdiff of the proposed changes.

I follow the dev reference to make my changes but something's not clear 
for me.


I've opened the bug #994763 "Fix CVE-2021-40540 in bullseye", I've been 
answered to merge this bug with the original one (#993851) because it's 
not needed to fill a separate bug for the suites in

which I want to fix a bug.

So I just have to attach the debdiff files for bullseye and buster in 
the original bug #993851 ?


See diff file attached for the debdiff I intend to post.

After that, I can dput ftp-master the new packages. Am I correct?

Thanks!

/Nicolas
diff -Nru ulfius-2.7.1/debian/changelog ulfius-2.7.1/debian/changelog
--- ulfius-2.7.1/debian/changelog	2021-01-03 09:03:05.0 -0500
+++ ulfius-2.7.1/debian/changelog	2021-09-19 15:39:39.0 -0400
@@ -1,3 +1,9 @@
+ulfius (2.7.1-1+deb11u1) bullseye; urgency=medium
+
+  * d/patches: Fix CVE-2021-40540
+
+ -- Nicolas Mora   Sun, 19 Sep 2021 15:39:39 -0400
+
 ulfius (2.7.1-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru ulfius-2.7.1/debian/patches/CVE-2021-40540.patch ulfius-2.7.1/debian/patches/CVE-2021-40540.patch
--- ulfius-2.7.1/debian/patches/CVE-2021-40540.patch	1969-12-31 19:00:00.0 -0500
+++ ulfius-2.7.1/debian/patches/CVE-2021-40540.patch	2021-09-19 15:39:20.0 -0400
@@ -0,0 +1,13 @@
+Description: Fix CVE-2021-40540
+Author: Nicolas Mora 
+Forwarded: not-needed
+--- a/src/ulfius.c
 b/src/ulfius.c
+@@ -207,6 +207,7 @@
+   UNUSED(cls);
+ 
+   if (con_info != NULL) {
++memset(con_info, 0, sizeof(struct connection_info_struct));
+ con_info->callback_first_iteration = 1;
+ con_info->u_instance = NULL;
+ u_map_init(_info->map_url_initial);
diff -Nru ulfius-2.7.1/debian/patches/series ulfius-2.7.1/debian/patches/series
--- ulfius-2.7.1/debian/patches/series	2021-01-03 09:03:05.0 -0500
+++ ulfius-2.7.1/debian/patches/series	2021-09-19 15:39:39.0 -0400
@@ -1,2 +1,3 @@
 examples.patch
 doc.patch
+CVE-2021-40540.patch


request to send update packages for ulfius, rhonabwy and glewlwyd

2021-09-20 Thread Nicolas Mora

Hello,

I would like to upload new versions for my packages ulfius, rhonabwy and 
glewlwyd in buster-updates for ulfius and bullseye-updates for the 3 of 
them.


The goal is to fix the following bugs:

- ulfius: CVE-2021-40540 (Bug #993851)
- rhonabwy: Bug #993866
- glewlwyd: CVE-2021-40818: webauthn buffer overflow (Bug #993867)

The update packages are ready in my machine, although the glibc 
transition [1] blocks the packages to be fixed in testing for now...


Thanks in advance for your feedback

/Nicolas

[1] https://tracker.debian.org/pkg/glibc



Re: how to patch package rhonabwy before bullseye release?

2021-07-04 Thread Nicolas Mora

Salut Pierre-Elliott, thanks for your help!

Le 2021-07-04 à 06 h 12, Pierre-Elliott Bécue a écrit :



Have a look at [0].

Yes, that's why I'm asking for help. The full freeze is close but the 
bugs fixed are quite important, and since rhonabwy is a crypto library, 
they can lead to security issues.



We are in the hard freeze part. If your package has passing non-trivial
autopkgtest, it'll migrate from unstable to bullseye after 20 days
without an unblock request. It is expected that your changes are non big
and non-disruptive.


The package salsa repo [0] has been updated with the fix.

There's a d/rules minor change which isn't related to the bugs fixed:
d/rules: remove dpkg-shlibdeps from override_dh_auto_install
It's a remaining I forgot to remove before, but I can cancel this change 
since it's not important.


The bugfix itself is a single patch file [2].


BUT, as the full freeze will probably start before the 20 days limit is
reached, I can't say how your package migration will be handled. I guess
it will be blocked. I would therefore recommend you confirm with a release
team member what to do, but I guess an unblock bug with the debdiff opened
right now could be a good idea and would probably allow your changes to be
part of bullseye if the release-team see it fit. :)

  1. Uploading to unstable for now is not a bad idea if the upload is
 what you expect to see in testing
  2. The urgency field is ignored during the currents and future parts
 of the freeze.


Therefore I'm relying on the team wisdom.

Would you accept a new package in unstable, maybe with a high urgency?

I can also wait for bullseye release and push the new package in 
proposed-updates?


Thanks!

/Nicolas

[0] https://salsa.debian.org/debian-iot-team/oauth2/rhonabwy
[2] 
https://salsa.debian.org/debian-iot-team/oauth2/rhonabwy/-/blob/master/debian/patches/bugfixes.patch




how to patch package rhonabwy before bullseye release?

2021-07-03 Thread Nicolas Mora

Hello release team,

I'm maintaining the package rhonaby [1] in the debian IoT tem, as well 
as being the upstream author.


Recently, I've fixed two bugs in the library that I'd like to backport 
to the debian package in the bullseye release, I consider them to be 
important bugfixes.


Do I have to open a RC bug before pushing the package or can I just push 
a new package?

Also, do I have to set the urgency higher than medium?

Thanks in advance, sorry if my questions are dumb.

/Nicolas

[1] https://tracker.debian.org/pkg/rhonabwy


OpenPGP_0xFE82139440BD22B9.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature


Re: Asking advice for libssh2

2021-04-02 Thread Nicolas Mora

Hello team,

Le 2021-04-02 à 16 h 28, Paul Gevers a écrit :


Let's not do that this late in the release. We'll have the full bookworm
release to iron out corner case issues.


I agree, there's no rush

The license issue can be discussed again when bullseye is released, 
meamwhile the package should use libgcrypt as it's used to in bullseye.


So I imagine there's nothing to do here, the unstable package is blocked 
from migration [1] and will stay as is until unfreeze I guess?


/Nicolas

[1] https://tracker.debian.org/pkg/libssh2


OpenPGP_0xFE82139440BD22B9.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature


Asking advice for libssh2

2021-03-28 Thread Nicolas Mora

Hello team,

I'm the maintainer of libssh2 [1]. There was an old bug with this 
package asking to switch from libgcrypt to openssl [2].


The issue was with the license openssl that had consequences with its rdeps.

The ftp-master team came up with a solution for the OpenSSL license [3]. 
This solution allows to use openssl in libssh2.


Therefore I uploaded a new package for libssh2 yesterday, hoping the 
libssh2-with-openssl package will be available for bullseye.


But because of the hard freeze, this has to be manually allowed.

I recently added autopkgtests to the libssh2 package and try to maintain 
as clean as possible, but I'm aware this is a key package so changes may 
be potentially dangerous, especially before a release.


Therefore I'm asking your opinion on whether it would be wise to release 
libssh2-with-openssl in bullseye? The package uses libgcrypt for a long 
time now. And on second thought I wouldn't mind waiting another release 
for what could potentially break other packages.


Thanks in advance for your feedback

/Nicolas

[1] https://tracker.debian.org/pkg/libssh2
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668271
[3] 
http://meetbot.debian.net/debian-ftp/2020/debian-ftp.2020-03-13-20.02.html


OpenPGP_0xFE82139440BD22B9.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature