Draft: [Debian 11] d/patches: Backport GVariant denial-of-service fixes from 2.74.x
Closes: #1028475
Merge request reports
Activity
assigned to @smcv
31 d/p/gvariant-Allow-g_variant_byteswap-to-operate-on-tree-form.patch: 32 Fix handling of GVariant normal forms, to avoid non-linear processing 33 time, which can be a denial of service if parsing an untrusted 34 GVariant in its binary form 35 (glib#2121, glib#2540, glib#2794, glib#2797; 36 CVE-2023-32665, CVE-2023-32611, CVE-2023-29499) 37 - d/p/gvariant-serialiser-Convert-endianness-of-offsets.patch: 38 Fix a regression causing a crash on big-endian architectures after 39 the above fixes (glib#2839) 40 - d/p/gvariant-Check-offset-table-doesn-t-fall-outside-variant-.patch: 41 Fix a buffer overflow after the above fixes 42 (glib#2840, CVE-2023-32643, oss-fuzz#54302) 43 - d/p/gvariant-Propagate-trust-when-getting-a-child-of-a-serial.patch: 44 Fix a non-linear processing time (denial of service) for GVariant in 45 its binary form after the above fixes 46 (glib#2841, CVE-2023-32636, oss-fuzz#54314) - Comment on lines +42 to +46
@carnil could confirm, not sure if for a(n old)stable point release matters, but I understand CVE-2023-32643 and CVE-2023-32636 shouldn't be mentioned in d/changelog, since they were not affecting the current version in bullseye.
They're regressions caused by an incorrect initial version of the fixes for CVE-2023-32665, CVE-2023-32611 and/or CVE-2023-29499; so, yes, they never affected bullseye, and never will if we take this update (rather than some other backport).
I thought it was better to mention them in the changelog than not, to be clear that this is not an incomplete backport with only the initial fixes for CVE-2023-32665, CVE-2023-32611 and CVE-2023-29499 (which would have introduced the new vulns CVE-2023-32643 and CVE-2023-32636).
Right, the CVEs do not apply and this is as well how we will track in the security-tracker itself (as no incomplete fix was applied in a released version, cf. as well security-tracker-team/security-tracker@f343708c)
I agree that if we take this update, CVE-2023-32643 and CVE-2023-32636 will never have affected bullseye.
Do you require me to remove references to those CVEs from the changelog, or is it OK to keep it as-is?
I thought that the information "I have made sure to fix CVE-2023-32665, CVE-2023-32611 and CVE-2023-29499 without introducing CVE-2023-32643 and CVE-2023-32636" was a useful thing for the changelog to say, so if the security team is not vetoing the version proposed here, I would prefer to upload it as-is.
@smcv, sorry for the late reply.
I believe we can keep this verbose information in the changelog. I just wanted to clarify how we are tracking it from security-tracker point of view. So no, no requirement on removing that information.