Your message dated Sat, 26 Mar 2022 11:59:13 +0000 with message-id <c4d20274f6d76a43fb574d2177f6e3af4235e4be.camel@adam-barratt.org.uk> and subject line Closing p-u requests for updates in 11.3 has caused the Debian Bug report #1006010, regarding bullseye-pu: package php-crypt-gpg/1.6.4-2+deb11u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1006010: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006010 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: bullseye-pu: package php-crypt-gpg/1.6.4-2+deb11u1
- From: Guilhem Moulin <guilhem@debian.org>
- Date: Fri, 18 Feb 2022 22:47:45 +0100
- Message-id: <YhAUAbZiJ4LDxwcJ@debian.org>
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian.org@packages.debian.org Usertags: pu [ Reason ] CVE-2022-24953: Crypt_GPG <1.6.7 does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions. The Security Team decided it didn't warrant a DSA and suggested an upload via -pu instead. [ Impact ] API calls don't validate arguments so a call to e.g. getFingerprint() could be tricked into performing another command, producing erroneous output or possibly yielding information leak. [ Tests ] Units tests, both build-time and autopkgtests, cover all changes. [ Risks ] The fix is trivial and simply prepends user-supplied gpg(1) arguments with ‘--’ to avoid interpreting them as commands or flags/options. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in stable (php-crypt-gpg/1.6.4-2) [x] the issue is verified as fixed in unstable [ Changes ] d/p/Insert-the-end-of-options-marker-before-operation-argumen.patch is merely the upstream fix https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04 d/gbp.conf, d/salsa-ci.yml are also adjusted to target Bullseye. -- Guilhem.diffstat for php-crypt-gpg-1.6.4 php-crypt-gpg-1.6.4 changelog | 9 + gbp.conf | 2 patches/Insert-the-end-of-options-marker-before-operation-argumen.patch | 74 ++++++++++ patches/series | 1 salsa-ci.yml | 1 5 files changed, 86 insertions(+), 1 deletion(-) diff -Nru php-crypt-gpg-1.6.4/debian/changelog php-crypt-gpg-1.6.4/debian/changelog --- php-crypt-gpg-1.6.4/debian/changelog 2021-01-07 16:05:51.000000000 +0100 +++ php-crypt-gpg-1.6.4/debian/changelog 2022-02-18 22:17:29.000000000 +0100 @@ -1,3 +1,12 @@ +php-crypt-gpg (1.6.4-2+deb11u1) bullseye; urgency=high + + * Backport fix for CVE-2022-24953: Crypt_GPG <1.6.7 does not prevent + additional options in GPG calls, which presents a risk for certain + environments and GPG versions. (Closes: #1005921) + * d/gbp.conf, d/salsa-ci.yml: Target Bullseye release. + + -- Guilhem Moulin <guilhem@debian.org> Fri, 18 Feb 2022 22:17:29 +0100 + php-crypt-gpg (1.6.4-2) unstable; urgency=medium * Require phpunit ≥8 in Build-Depends. diff -Nru php-crypt-gpg-1.6.4/debian/gbp.conf php-crypt-gpg-1.6.4/debian/gbp.conf --- php-crypt-gpg-1.6.4/debian/gbp.conf 2021-01-07 16:05:51.000000000 +0100 +++ php-crypt-gpg-1.6.4/debian/gbp.conf 2022-02-18 22:17:29.000000000 +0100 @@ -1,5 +1,5 @@ [DEFAULT] -debian-branch = debian/latest +debian-branch = debian/bullseye pristine-tar = True [import-orig] diff -Nru php-crypt-gpg-1.6.4/debian/patches/Insert-the-end-of-options-marker-before-operation-argumen.patch php-crypt-gpg-1.6.4/debian/patches/Insert-the-end-of-options-marker-before-operation-argumen.patch --- php-crypt-gpg-1.6.4/debian/patches/Insert-the-end-of-options-marker-before-operation-argumen.patch 1970-01-01 01:00:00.000000000 +0100 +++ php-crypt-gpg-1.6.4/debian/patches/Insert-the-end-of-options-marker-before-operation-argumen.patch 2022-02-18 22:17:29.000000000 +0100 @@ -0,0 +1,74 @@ +From: Thomas Chauchefoin <thomas.chauchefoin@sonarsource.com> +Date: Thu, 10 Feb 2022 08:50:44 +0100 +Subject: Insert the end-of-options marker before operation arguments. + +This marker stops the parsing of additional options during external +calls to GPG. This behavior is unintended but its security impact is +dependent on the environment and the GPG version in use. +--- + Crypt_GPG-1.6.4/Crypt/GPG.php | 8 ++++---- + Crypt_GPG-1.6.4/Crypt/GPGAbstract.php | 4 ++-- + 2 files changed, 6 insertions(+), 6 deletions(-) + +diff --git a/Crypt_GPG-1.6.4/Crypt/GPG.php b/Crypt_GPG-1.6.4/Crypt/GPG.php +index 87d2c8e..4c70833 100644 +--- a/Crypt_GPG-1.6.4/Crypt/GPG.php ++++ b/Crypt_GPG-1.6.4/Crypt/GPG.php +@@ -457,7 +457,7 @@ class Crypt_GPG extends Crypt_GPGAbstract + ); + } + +- $operation = '--delete-key ' . escapeshellarg($fingerprint); ++ $operation = '--delete-key -- ' . escapeshellarg($fingerprint); + $arguments = array( + '--batch', + '--yes' +@@ -507,7 +507,7 @@ class Crypt_GPG extends Crypt_GPGAbstract + ); + } + +- $operation = '--delete-secret-key ' . escapeshellarg($fingerprint); ++ $operation = '--delete-secret-key -- ' . escapeshellarg($fingerprint); + $arguments = array( + '--batch', + '--yes' +@@ -585,7 +585,7 @@ class Crypt_GPG extends Crypt_GPGAbstract + public function getFingerprint($keyId, $format = self::FORMAT_NONE) + { + $output = ''; +- $operation = '--list-keys ' . escapeshellarg($keyId); ++ $operation = '--list-keys -- ' . escapeshellarg($keyId); + $arguments = array( + '--with-colons', + '--with-fingerprint' +@@ -1584,7 +1584,7 @@ class Crypt_GPG extends Crypt_GPGAbstract + + $keyData = ''; + $operation = $private ? '--export-secret-keys' : '--export'; +- $operation .= ' ' . escapeshellarg($fingerprint); ++ $operation .= ' -- ' . escapeshellarg($fingerprint); + $arguments = $armor ? array('--armor') : array(); + + $this->engine->reset(); +diff --git a/Crypt_GPG-1.6.4/Crypt/GPGAbstract.php b/Crypt_GPG-1.6.4/Crypt/GPGAbstract.php +index 3dafe12..2c6b4b6 100644 +--- a/Crypt_GPG-1.6.4/Crypt/GPGAbstract.php ++++ b/Crypt_GPG-1.6.4/Crypt/GPGAbstract.php +@@ -360,7 +360,7 @@ abstract class Crypt_GPGAbstract + if ($keyId == '') { + $operation = '--list-secret-keys'; + } else { +- $operation = '--utf8-strings --list-secret-keys ' . escapeshellarg($keyId); ++ $operation = '--utf8-strings --list-secret-keys -- ' . escapeshellarg($keyId); + } + + // According to The file 'doc/DETAILS' in the GnuPG distribution, using +@@ -392,7 +392,7 @@ abstract class Crypt_GPGAbstract + if ($keyId == '') { + $operation = '--list-public-keys'; + } else { +- $operation = '--utf8-strings --list-public-keys ' . escapeshellarg($keyId); ++ $operation = '--utf8-strings --list-public-keys -- ' . escapeshellarg($keyId); + } + + $output = ''; diff -Nru php-crypt-gpg-1.6.4/debian/patches/series php-crypt-gpg-1.6.4/debian/patches/series --- php-crypt-gpg-1.6.4/debian/patches/series 2021-01-07 16:05:51.000000000 +0100 +++ php-crypt-gpg-1.6.4/debian/patches/series 2022-02-18 22:17:29.000000000 +0100 @@ -2,3 +2,4 @@ Fix-FTBFS-with-phpunit-8.5.13-1.patch Fix-FTBFS-with-phpunit-9.5.0-1.patch Preemptively-fix-FTBFS-with-phpunit-10.patch +Insert-the-end-of-options-marker-before-operation-argumen.patch diff -Nru php-crypt-gpg-1.6.4/debian/salsa-ci.yml php-crypt-gpg-1.6.4/debian/salsa-ci.yml --- php-crypt-gpg-1.6.4/debian/salsa-ci.yml 2021-01-07 16:05:51.000000000 +0100 +++ php-crypt-gpg-1.6.4/debian/salsa-ci.yml 2022-02-18 22:17:29.000000000 +0100 @@ -4,6 +4,7 @@ - https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/pipeline-jobs.yml variables: + RELEASE: 'bullseye' # dh_auto_test yields weird errors I cannot reproduce locally in a # clean chroot, so build under nocheck profile for now DEB_BUILD_OPTIONS: nocheckAttachment: signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 1000342-done@bugs.debian.org, 1000645-done@bugs.debian.org, 1001411-done@bugs.debian.org, 1001692-done@bugs.debian.org, 1001740-done@bugs.debian.org, 1001849-done@bugs.debian.org, 1002012-done@bugs.debian.org, 1002051-done@bugs.debian.org, 1002563-done@bugs.debian.org, 1002619-done@bugs.debian.org, 1002620-done@bugs.debian.org, 1002652-done@bugs.debian.org, 1002685-done@bugs.debian.org, 1002703-done@bugs.debian.org, 1003018-done@bugs.debian.org, 1003058-done@bugs.debian.org, 1003133-done@bugs.debian.org, 1003173-done@bugs.debian.org, 1003484-done@bugs.debian.org, 1003526-done@bugs.debian.org, 1003659-done@bugs.debian.org, 1003765-done@bugs.debian.org, 1003948-done@bugs.debian.org, 1004033-done@bugs.debian.org, 1004050-done@bugs.debian.org, 1004192-done@bugs.debian.org, 1004247-done@bugs.debian.org, 1004384-done@bugs.debian.org, 1004452-done@bugs.debian.org, 1004483-done@bugs.debian.org, 1004533-done@bugs.debian.org, 1004575-done@bugs.debian.org, 1004741-done@bugs.debian.org, 1004895-done@bugs.debian.org, 1004966-done@bugs.debian.org, 1004999-done@bugs.debian.org, 1005007-done@bugs.debian.org, 1005010-done@bugs.debian.org, 1005013-done@bugs.debian.org, 1005052-done@bugs.debian.org, 1005148-done@bugs.debian.org, 1005158-done@bugs.debian.org, 1005217-done@bugs.debian.org, 1005232-done@bugs.debian.org, 1005288-done@bugs.debian.org, 1005340-done@bugs.debian.org, 1005351-done@bugs.debian.org, 1005355-done@bugs.debian.org, 1005372-done@bugs.debian.org, 1005694-done@bugs.debian.org, 1005861-done@bugs.debian.org, 1005868-done@bugs.debian.org, 1005949-done@bugs.debian.org, 1006010-done@bugs.debian.org, 1006137-done@bugs.debian.org, 1006138-done@bugs.debian.org, 1006165-done@bugs.debian.org, 1006187-done@bugs.debian.org, 1006192-done@bugs.debian.org, 1006215-done@bugs.debian.org, 1006222-done@bugs.debian.org, 1006342-done@bugs.debian.org, 1006371-done@bugs.debian.org, 1006402-done@bugs.debian.org, 1006493-done@bugs.debian.org, 1006522-done@bugs.debian.org, 1006752-done@bugs.debian.org, 1006768-done@bugs.debian.org, 1006796-done@bugs.debian.org, 1006797-done@bugs.debian.org, 1006883-done@bugs.debian.org, 1006905-done@bugs.debian.org, 1006916-done@bugs.debian.org, 1007001-done@bugs.debian.org, 1007249-done@bugs.debian.org, 1007261-done@bugs.debian.org, 1007262-done@bugs.debian.org, 1007747-done@bugs.debian.org, 1007878-done@bugs.debian.org, 1007909-done@bugs.debian.org, 1007920-done@bugs.debian.org, 1007947-done@bugs.debian.org, 1007963-done@bugs.debian.org, 1008031-done@bugs.debian.org, 1008074-done@bugs.debian.org, 1006446-done@bugs.debian.org
- Subject: Closing p-u requests for updates in 11.3
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 26 Mar 2022 11:59:13 +0000
- Message-id: <c4d20274f6d76a43fb574d2177f6e3af4235e4be.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 11.3 Hi, The updates referenced by these bugs were included in stable as part of this morning's 11.3 point release. Regards, Adam
--- End Message ---