[Git][security-tracker-team/security-tracker][master] 2 commits: dla: claim phpseclib/php-phpseclib
Sylvain Beucler (@beuc)
beuc at debian.org
Fri Nov 4 16:28:58 GMT 2022
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
159ff561 by Sylvain Beucler at 2022-11-04T17:28:34+01:00
dla: claim phpseclib/php-phpseclib
- - - - -
02cd83d1 by Sylvain Beucler at 2022-11-04T17:28:36+01:00
CVE-2021-30130/phpseclib,php-phpseclib: attempt to clarify
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -113150,16 +113150,16 @@ CVE-2021-30131
RESERVED
CVE-2021-30130 (phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1. ...)
- phpseclib 1.0.19-3
- [stretch] - phpseclib <not-affected> (Only affects 3.x branch)
- php-phpseclib 2.0.30-2
- [stretch] - php-phpseclib <not-affected> (Only affects 3.x branch)
- php-phpseclib3 3.0.7-1
NOTE: https://github.com/phpseclib/phpseclib/pull/1635#issuecomment-826994890
NOTE: Introduced by: https://github.com/phpseclib/phpseclib/commit/cc32cd2e95b18a0c0118bbf1928327675c9e64a9 (v3.0 / RSA::SIGNATURE_RELAXED_PKCS1)
- NOTE: According to upstream, 1.x and 2.x are not vulnerable, the fix on these branches only backports more exhaustive PKCS#1 v1.5 support (functional change)
- NOTE: According to upstream, 1.x and 2.x have the problem described as "incompatibility issue in phpseclib v1, v2, v3 (strict mode)'s RSA PKCS#1 v1.5
- NOTE: signature verification suffering from rejecting valid signatures whose encoded message uses implicit hash algorithm's NULL parameter." but
- NOTE: this is not considered as a security problem.
+ NOTE: Fixed by: https://github.com/phpseclib/phpseclib/commit/05550b9c490bf342bce66de75d127d2f75c48bdd (1.0.20, 2.0.31, 3.0.7)
+ NOTE: Fixed by: https://github.com/phpseclib/phpseclib/commit/42fc46e9a92c2ce5b10d2fbfb00b630417d6dfbe (3.0.7)
+ NOTE: According to upstream in #1635, "v2.0 does not have a vulnerability" (only non-security bugs).
+ NOTE: However, a lot of identical fixes were applied to all 1.x/2.x/3.x branches upstream.
+ NOTE: They were also backported in bullseye/testing in 1.x/2.x (claimed as a CVE-2021-30130 fix).
+ NOTE: Given the broad scope of this CVE description, let's assume that those fixes are needed in 1.x/2.x.
CVE-2021-30129 (A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to ...)
NOT-FOR-US: Apache Mina SSHD
CVE-2021-30128 (Apache OFBiz has unsafe deserialization prior to 17.12.07 version ...)
=====================================
data/dla-needed.txt
=====================================
@@ -172,7 +172,7 @@ openexr
NOTE: 20220904: Programming language: C++.
NOTE: 20220904: Should be synced with Stretch. (apo)
--
-php-phpseclib
+php-phpseclib (Sylvain Beucler)
NOTE: 20220909: Programming language: PHP.
NOTE: 20220909: Note the discussion whether 2.0 is in fact affected by the CVE or not. It looks like it is affected by a small part of it that is best to fix..
--
@@ -180,7 +180,7 @@ php7.3
NOTE: 20221031: Programming language: C.
NOTE: 20221031: CVE-2022-37454 is what is of most concern.
--
-phpseclib
+phpseclib (Sylvain Beucler)
NOTE: 20220909: Programming language: PHP.
NOTE: 20220909: Note the discussion whether 2.0 is in fact affected by the CVE or not. It looks like it is affected by a small part of it that is best to fix..
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/52f7600f1f4db8114a8d5f39f112447777df1423...02cd83d1d917dc5964440185226aa11e40058546
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/52f7600f1f4db8114a8d5f39f112447777df1423...02cd83d1d917dc5964440185226aa11e40058546
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221104/8ae02774/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list