Hi Sylvain

I have done some regression testing and it looks fine.

I'll try to reproduce the actual issue too.

// Ola

On Mon, 17 May 2021 at 11:09, Sylvain Beucler <b...@beuc.net> wrote:

> Hi,
>
> I thought you'd rebuild but here you go.
>
> I intend to upload today.
>
> Cheers!
> Sylvain
>
> On 17/05/2021 08:13, Ola Lundqvist wrote:
> > Hi again Sylvain
> >
> > Today I was about to test the packages but I realize that I only have a
> > libcurl-doc deb file to test.
> >
> > Will you upload the rest for testing too?
> >
> > // Ola
> >
> > On Sun, 16 May 2021 at 09:08, Ola Lundqvist <o...@inguza.com
> > <mailto:o...@inguza.com>> wrote:
> >
> >     Hi
> >
> >     I have reviewed the changes and it looks good.
> >     I'll see if I can get some time to perform any relevant tests too.
> >
> >     // Ola
> >
> >     On Sat, 15 May 2021 at 23:34, Sylvain Beucler <b...@beuc.net
> >     <mailto:b...@beuc.net>> wrote:
> >
> >         Hi Ola,
> >
> >         You can check the LTS version at:
> >         https://www.beuc.net/tmp/debian-lts/curl/
> >         <https://www.beuc.net/tmp/debian-lts/curl/>
> >
> >         I followed the method from Ubuntu and SUSE and backported the
> >         URL API
> >         for LTS and ELTS, plus the new test case for the CVE.
> >
> >         I'm currently diffing the test suite results, cf. my notes at:
> >         https://wiki.debian.org/LTS/TestSuites/curl
> >         <https://wiki.debian.org/LTS/TestSuites/curl>
> >
> >         Cheers!
> >         Sylvain
> >
> >         On 15/05/2021 23:22, Ola Lundqvist wrote:
> >          > Hi Sylvain
> >          >
> >          > Great! Let me know if you want help with review, testing or
> >         something else.
> >          >
> >          > // Ola
> >          >
> >          > On Sat, 15 May 2021 at 23:18, Sylvain Beucler <b...@beuc.net
> >         <mailto:b...@beuc.net>
> >          > <mailto:b...@beuc.net <mailto:b...@beuc.net>>> wrote:
> >          >
> >          >     Hi,
> >          >
> >          >     I claimed it yesterday and my work is mostly done.
> >          >
> >          >     Cheers!
> >          >     Sylvain
> >          >
> >          >     On 15/05/2021 23:11, Ola Lundqvist wrote:
> >          >      > Hi Utkarsh
> >          >      >
> >          >      > I have looked into your patch and I think it looks
> >         good. I do not
> >          >     fully
> >          >      > understand why all the changes in url.c were done but
> >         I think it
> >          >     looks
> >          >      > fine anyway.
> >          >      > The risk of regression should be small.
> >          >      >
> >          >      > Do you want me to do the update, or do you want to do
> >         it yourself?
> >          >      > Or do you think we should ignore it?
> >          >      >
> >          >      > Best regards
> >          >      >
> >          >      > // Ola
> >          >      >
> >          >      > On Thu, 8 Apr 2021 at 22:33, Ola Lundqvist
> >         <o...@inguza.com <mailto:o...@inguza.com>
> >          >     <mailto:o...@inguza.com <mailto:o...@inguza.com>>
> >          >      > <mailto:o...@inguza.com <mailto:o...@inguza.com>
> >         <mailto:o...@inguza.com <mailto:o...@inguza.com>>>> wrote:
> >          >      >
> >          >      >     Hi Utkarsh, all
> >          >      >
> >          >      >     I have done some more investigation on this
> >         matter. I have
> >          >     checked
> >          >      >     the statement from upstream that we can re-use
> >         some existing
> >          >     strip
> >          >      >     code to remove the strings this way.
> >          >      >     The thing is that I cannot find any code that do
> >         URL stripping so
> >          >      >     that is not really a viable option. This leaves
> >         only the two
> >          >     options
> >          >      >     you have already stated.
> >          >      >
> >          >      >     Either we ignore, or we port the entire URL API.
> >          >      >
> >          >      >     I think the risk of regression is rather small if
> >         we port it,
> >          >      >     because this is only used in this place. Assuming
> >         there is no
> >          >     name
> >          >      >     clash introduced.
> >          >      >
> >          >      >     So what do you all think? Ignore or fix?
> >          >      >     There are good arguments for both.
> >          >      >
> >          >      >     Ignore is ok because this only happens with a
> specific
> >          >     command line
> >          >      >     option, and even if used the risk of problem is
> >         quite small.
> >          >      >
> >          >      >     On the other hand curl is a very common tool which
> >         means that it
> >          >      >     could be worth fixing even small issues.
> >          >      >
> >          >      >     I think both are ok.
> >          >      >
> >          >      >     Best regards
> >          >      >
> >          >      >     // Ola
> >          >      >
> >          >      >     On Wed, 7 Apr 2021 at 23:07, Ola Lundqvist
> >         <o...@inguza.com <mailto:o...@inguza.com>
> >          >     <mailto:o...@inguza.com <mailto:o...@inguza.com>>
> >          >      >     <mailto:o...@inguza.com <mailto:o...@inguza.com>
> >         <mailto:o...@inguza.com <mailto:o...@inguza.com>>>> wrote:
> >          >      >
> >          >      >         Hi Utkarsh, all
> >          >      >
> >          >      >         After reading the description of this CVE
> >         again I realize
> >          >     that I
> >          >      >         misunderstood the description last time.
> >          >      >
> >          >      >         The problem is that the "referrer" header is
> >         not stripped.
> >          >      >
> >          >      >         This changes my conclusion to some extent.
> >          >      >
> >          >      >         I see no problem with fixing this issue from a
> >         regression
> >          >     point
> >          >      >         of view (apart from what has already been
> >         expressed).
> >          >      >         The amount of services that rely on the
> >         referrer field
> >          >     should be
> >          >      >         small, if any.
> >          >      >
> >          >      >         I still think we can ignore it though with the
> >          >     same reasoing as
> >          >      >         I expressed in the last email. The problem
> >         should be minor.
> >          >      >         There are other worse problem by providing
> >         sensitive data
> >          >     in the
> >          >      >         URL.
> >          >      >         And again if the attacker can make a redirect,
> the
> >          >     attacker can
> >          >      >         most likely get the URL anyway so then nothing
> >         has leaked.
> >          >      >
> >          >      >         Cheers
> >          >      >
> >          >      >         // Ola
> >          >      >
> >          >      >
> >          >      >         // Ola
> >          >      >
> >          >      >         On Wed, 7 Apr 2021 at 13:19, Ola Lundqvist
> >          >     <o...@inguza.com <mailto:o...@inguza.com>
> >         <mailto:o...@inguza.com <mailto:o...@inguza.com>>
> >          >      >         <mailto:o...@inguza.com <mailto:o...@inguza.com>
> >         <mailto:o...@inguza.com <mailto:o...@inguza.com>>>> wrote:
> >          >      >
> >          >      >             Hi Utkarsh, all
> >          >      >
> >          >      >             Is this even a vulnerability?
> >          >      >             The problem is that authentication
> >         information is not
> >          >      >             stripped if the browser is redirected to
> >         another place.
> >          >      >
> >          >      >             If you trust a site enough to provide
> >         authentication
> >          >     data, I
> >          >      >             guess you also trust that if that site
> >         happens to be
> >          >      >             relocated you should also trust the new
> place.
> >          >      >             I mean if the attacker has the power to
> >         redirect I expect
> >          >      >             that it has the power to read the
> >         authentication data
> >          >      >             anyway. There could be cases when this is
> >         not the
> >          >     case, but
> >          >      >             in general it should not be possible for
> >         the attacker to
> >          >      >             redirect without also having more power.
> >          >      >
> >          >      >             We could of course consider to apply this
> >         fix, but it
> >          >      >             certainly will cause a regression since my
> >         expectation is
> >          >      >             that authentication information is
> forwarded.
> >          >      >
> >          >      >             I think it should be ignored. If we fix
> >         it, it should be
> >          >      >             with a configuration option, but I think
> >         that is a
> >          >      >             little too intrusive for (E)LTS.
> >          >      >
> >          >      >             Or have I missed something?
> >          >      >
> >          >      >             Best regards
> >          >      >
> >          >      >             // Ola
> >          >      >
> >          >      >             On Mon, 5 Apr 2021 at 02:20, Utkarsh Gupta
> >          >      >             <utka...@debian.org
> >         <mailto:utka...@debian.org> <mailto:utka...@debian.org
> >         <mailto:utka...@debian.org>>
> >          >     <mailto:utka...@debian.org <mailto:utka...@debian.org>
> >         <mailto:utka...@debian.org <mailto:utka...@debian.org>>>> wrote:
> >          >      >
> >          >      >                 Hello,
> >          >      >
> >          >      >                 [CCing the Security team in case they
> >         have some
> >          >     ideas or
> >          >      >                 suggestions
> >          >      >                 for CVE-2021-22876/curl]
> >          >      >
> >          >      >                 Whilst triaging and looking thoroughly
> >         for this CVE,
> >          >      >                 affecting curl, I
> >          >      >                 noticed that the upstream patch uses
> >         elements
> >          >     like CURLU,
> >          >      >
> >           CURLUPART_{URL,FRAGMENT,USER,PASSWORD}. This
> >          >     comes from
> >          >      >                 the URL API
> >          >      >                 which seems to be missing in both,
> >         stretch and
> >          >     jessie.
> >          >      >
> >          >      >                 There seem to be two plausible options
> >         at this point:
> >          >      >
> >          >      >                 1. Given that this CVE has been
> >         assigned low
> >          >     severity by
> >          >      >                 upstream, we
> >          >      >                 could perhaps mark this as no-dsa or
> >         ignored, with an
> >          >      >                 appropriate
> >          >      >                 comment; or
> >          >      >
> >          >      >                 2. Backport the entire URL API (patch
> >         for that is
> >          >      >                 attached; is
> >          >      >                 intrusive) and then apply the fix for
> >         CVE-2021-22876
> >          >      >                 (patch attached)
> >          >      >                 on top of that. Whilst this option
> >         makes sense, but
> >          >      >                 backporting the
> >          >      >                 entire URL API could have an
> >         unforeseen effect (or
> >          >      >                 chances of
> >          >      >                 potential regressions) and in any
> >         case, looks
> >          >     somewhat
> >          >      >                 intrusive.
> >          >      >
> >          >      >                 So for now, I've added curl to
> >         dla-needed and
> >          >     ela-needed
> >          >      >                 but if we
> >          >      >                 decide to mark this as no-dsa or
> >         ignored, we could
> >          >      >                 simply drop this
> >          >      >                 from there as this is the only CVE
> >         that needs
> >          >     working on.
> >          >      >
> >          >      >                 Let me know what y'all think.
>


-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
|  o...@inguza.com                    o...@debian.org            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
 ---------------------------------------------------------------

Reply via email to