Re: Addressing Mojolicious CVE-2024-58134 and CVE-2024-58135 in sid
- To: Sean Whitton <spwhitton@spwhitton.name>
- Cc: gregor herrmann <gregoa@debian.org>, Philip Hands <phil@hands.com>, debian-perl@lists.debian.org, debian-lts@lists.debian.org, team@security.debian.org, Stig Palmquist <stig@cpansec.org>
- Subject: Re: Addressing Mojolicious CVE-2024-58134 and CVE-2024-58135 in sid
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Thu, 22 May 2025 14:59:07 +0200
- Message-id: <[🔎] aC8fm7MAvYFExe-V@eldamar.lan>
- Mail-followup-to: Sean Whitton <spwhitton@spwhitton.name>, gregor herrmann <gregoa@debian.org>, Philip Hands <phil@hands.com>, debian-perl@lists.debian.org, debian-lts@lists.debian.org, team@security.debian.org, Stig Palmquist <stig@cpansec.org>
- In-reply-to: <[🔎] 875xhtotyz.fsf@zephyr.silentflame.com>
- References: <[🔎] 875xhtotyz.fsf@zephyr.silentflame.com>
Hi,
On Thu, May 22, 2025 at 10:49:56AM +0100, Sean Whitton wrote:
> Hello recent Mojolicious uploaders,
>
> I'm looking at Mojolicious's two recent CVEs for Freexian's LTS effort.
> There are some open questions and I think that they are relevant to your
> work in sid.
>
> It seems that Mojolicious upstream take the view that application
> authors are responsible for configuring a secure session secret and so
> the fact these the defaults are not cryptographically secure is not
> something to fix upstream.[1] Therefore, we probably can't expect a fix
> for CVE-2024-58134 to arrive upstream.
>
> What do you think should happen in Debian? It seems like we could patch
> in secure key generation without too much difficulty. What do you think
> about doing that?
Do "nothing" (for now) and mark the issue as <no-dsa> or its substate
<ignored> for your older suites. We keep the status as it is for
unstable and once/if things changes upstream align it with those.
The notes (and synced with people from CPAN security) sufficiently
describe the situation in my opinion. In particular for instance for
CVE-2024-58135 is specific to cover the default static/guessable secret
(and this does not change with having CryptX as optional dependency in
v3.39 for instance).
I'm though still Cc'in again Stig Palmquist <stig@cpansec.org> for
which I was in contact with to make his position on how those CVEs
should be treated.
Regards,
Salvatore
Reply to: