[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

(E)?LTS report for august



I've worked during August 2023 on the below listed packages, for Freexian
LTS/ELTS [1]

Many thanks to Freexian and our sponsors [2] for providing this opportunity!

LTS:
===

docker.io:
* Santiago is trying to test my release. Testing is especially complicated due to lack of integration test case related
to CVE-2023-28840, CVE-2023-28840, CVE-2023-28842. We have created a first integration test case that demonstrated that
overlay network was not encrypted. We tried also under sid and last upstream version. However after reporting this fact 
and some extending investigation by upstream, it was (hopefuly) a false positive due to lack of documentation of
swarm overlay network. Upstream thanks us for the report and will
improve the documentation. Testing still under the way.

php-dompdf:
* I have released  DLA-3495-2
Ubuntu security team noted after extensive testing that DLA-3495-1 was incomplete as one PoC for CVE-2022-2400 (particularly the chroot escape) was still working on the patched version of the package.
Further analysis of the upstream patch and DLA-3495-1 version helped to identify that the vulnerability was still present due to DLA 3495-1 not including commit 7adf00f9, which added chroot checks to one of the code path.
Special thanks to Camila Camargo de Matos of Ubuntu security team.

 libreoffice
* I have released DLA-3526-1 for CVE-2022-38745 CVE-2023-0950 CVE-2023-2255. Upstream patch lead to compilation error and I have backported some functionality from 6.4 to 6.1

 sox
* I have released DLA-3527-1 for CVE-2023-32627 by forward porting from ELTS

Chef
* I have triaged  CVE-2023-28864  and concluded it was not a concern for us.

ELTS:
====

Bouncycastle:
I have released ELA-913-1 fixing CVE-2023-33201

sox:
* I have triaged CVE-2023-33201, CVE-2023-34432, CVE-2023-34432 and after testing and debugging concluded that previous fixes included in the debian version of sox fixes theses CVE. I have reported
this upstream and to the CNA.
* I have fixed  CVE-2023-32627 by analysing the vulnerability. Test case including in the vulnerability report was inefficient because the vulnerability was masked by previous fixes included in the debian version
(bail out early due to unrelated fuzzing patern).
However this CVE was a new one, and need to be fixed. I have created a patch fixing the vulnerability and tested it. I have reported upstream and to CNA. 
I have released ELA-918-1

runc:
* I am going to backport buster version for fixing the remaining CVE. Backport is especially hard due to the fact go is static linked and I need to upgrade package.
I order to avoid binNMU explosion, I have created a working proof of concept by vendoring a few depends. Vendoring was done by using multiple upstream tarballs
in source package (as done usually for javascript package). dh_golang in ELTS was not vendoring friendly and manual debian/rules were needed.
Work is incomplete due to lack of integration test and need to check reverse depends.
on going discussion is on the way for maybe providing this package in a backport repository.


I have also participated to (E)LTS meeting and improving internal documentation of the team.

[1]  https://www.freexian.com/lts/
[2]  https://www.freexian.com/lts/debian/#sponsors

Cheers,

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: