Your message dated Fri, 28 May 2021 20:50:53 +0000
with message-id <[email protected]>
and subject line unblock radsecproxy
has caused the Debian Bug report #989177,
regarding unblock: radsecproxy/1.8.2-4 (CVE-2021-32642)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
989177: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989177
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: [email protected]
Usertags: unblock

Please unblock package radsecproxy

Version 1.8.2-4 fixes a minor CVE in some of the provided example helper
scripts.

There is no change to any other active code in radsecproxy itself. A
full debdiff is attached.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock radsecproxy/1.8.2-4
diff -Nru radsecproxy-1.8.2/debian/changelog radsecproxy-1.8.2/debian/changelog
--- radsecproxy-1.8.2/debian/changelog  2020-11-23 12:09:13.000000000 +0100
+++ radsecproxy-1.8.2/debian/changelog  2021-05-27 07:58:57.000000000 +0200
@@ -1,3 +1,9 @@
+radsecproxy (1.8.2-4) unstable; urgency=high
+
+  * Fix CVE-2021-32642
+
+ -- Sven Hartge <[email protected]>  Thu, 27 May 2021 07:58:57 +0200
+
 radsecproxy (1.8.2-3) unstable; urgency=medium
 
   * Remove override for no longer existing lintian tag.
diff -Nru radsecproxy-1.8.2/debian/gbp.conf radsecproxy-1.8.2/debian/gbp.conf
--- radsecproxy-1.8.2/debian/gbp.conf   1970-01-01 01:00:00.000000000 +0100
+++ radsecproxy-1.8.2/debian/gbp.conf   2021-05-27 07:58:57.000000000 +0200
@@ -0,0 +1,3 @@
+[DEFAULT]
+debian-branch = bullseye
+
diff -Nru radsecproxy-1.8.2/debian/patches/fix-cve-2021-32642 
radsecproxy-1.8.2/debian/patches/fix-cve-2021-32642
--- radsecproxy-1.8.2/debian/patches/fix-cve-2021-32642 1970-01-01 
01:00:00.000000000 +0100
+++ radsecproxy-1.8.2/debian/patches/fix-cve-2021-32642 2021-05-27 
07:58:57.000000000 +0200
@@ -0,0 +1,124 @@
+Author: Fabian Mauchle <[email protected]>
+Last-Update: 2021-05-04
+Description: add result validation to dyndisc example scripts
+
+Original Commit ab7a2ea42a75d5ad3421e4365f63cbdcb08fb7af Mon Sep 17 00:00:00 
2001
+reported by Philipp Jeitner and Haya Shulman, Fraunhofer SIT
+
+---
+ tools/naptr-eduroam.sh | 40 ++++++++++++++++++++++++++--------------
+ tools/radsec-dynsrv.sh | 20 ++++++++++++++++----
+ 2 files changed, 42 insertions(+), 18 deletions(-)
+
+diff --git a/tools/naptr-eduroam.sh b/tools/naptr-eduroam.sh
+index e310812..5402d18 100755
+--- a/tools/naptr-eduroam.sh
++++ b/tools/naptr-eduroam.sh
+@@ -19,41 +19,53 @@ DIGCMD=$(command -v dig)
+ HOSTCMD=$(command -v host)
+ PRINTCMD=$(command -v printf)
+ 
++validate_host() {
++         echo ${@} | tr -d '\n\t\r' | grep -E '^[_0-9a-zA-Z][-._0-9a-zA-Z]*$'
++}
++
++validate_port() {
++         echo ${@} | tr -d '\n\t\r' | grep -E '^[0-9]+$'
++}
++
+ dig_it_srv() {
+     ${DIGCMD} +short srv $SRV_HOST | sort -n -k1 |
+     while read line; do
+-      set $line ; PORT=$3 ; HOST=$4
+-      $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++        set $line ; PORT=$(validate_port $3) ; HOST=$(validate_host $4)
++        if [ -n "${HOST}" ] && [ -n "${PORT}" ]; then
++            $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++        fi
+     done
+ }
+ 
+ dig_it_naptr() {
+     ${DIGCMD} +short naptr ${REALM} | grep x-eduroam:radius.tls | sort -n -k1 
|
+     while read line; do
+-      set $line ; TYPE=$3 ; HOST=$6
+-      if [ "$TYPE" = "\"s\"" -o "$TYPE" = "\"S\"" ]; then
+-          SRV_HOST=${HOST%.}
+-          dig_it_srv
+-      fi
++        set $line ; TYPE=$3 ; HOST=$(validate_host $6)
++        if ( [ "$TYPE" = "\"s\"" ] || [ "$TYPE" = "\"S\"" ] ) && [ -n 
"${HOST}" ]; then
++            SRV_HOST=${HOST%.}
++            dig_it_srv
++        fi
+     done
+ }
+ 
+ host_it_srv() {
+     ${HOSTCMD} -t srv $SRV_HOST | sort -n -k5 |
+     while read line; do
+-      set $line ; PORT=$7 ; HOST=$8 
+-      $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++        set $line ; PORT=$(validate_port $7) ; HOST=$(validate_host $8) 
++        if [ -n "${HOST}" ] && [ -n "${PORT}" ]; then
++            $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++        fi
+     done
+ }
+ 
+ host_it_naptr() {
+     ${HOSTCMD} -t naptr ${REALM} | grep x-eduroam:radius.tls | sort -n -k5 |
+     while read line; do
+-      set $line ; TYPE=$7 ; HOST=${10}
+-      if [ "$TYPE" = "\"s\"" -o "$TYPE" = "\"S\"" ]; then
+-          SRV_HOST=${HOST%.}
+-          host_it_srv
+-      fi
++        set $line ; TYPE=$7 ; HOST=$(validate_host ${10})
++        if ( [ "$TYPE" = "\"s\"" ] || [ "$TYPE" = "\"S\"" ] ) && [ -n 
"${HOST}" ]; then
++            SRV_HOST=${HOST%.}
++            host_it_srv
++        fi
+     done
+ }
+ 
+diff --git a/tools/radsec-dynsrv.sh b/tools/radsec-dynsrv.sh
+index 2eff080..68bb5ba 100755
+--- a/tools/radsec-dynsrv.sh
++++ b/tools/radsec-dynsrv.sh
+@@ -19,19 +19,31 @@ DIGCMD=$(command -v digaaa)
+ HOSTCMD=$(command -v host)
+ PRINTCMD=$(command -v printf)
+ 
++validate_host() {
++         echo ${@} | tr -d '\n\t\r' | grep -E '^[_0-9a-zA-Z][-._0-9a-zA-Z]*$'
++}
++
++validate_port() {
++         echo ${@} | tr -d '\n\t\r' | grep -E '^[0-9]+$'
++}
++
+ dig_it() {
+    ${DIGCMD} +short srv _radsec._tcp.${REALM} | sort -n -k1 |
+    while read line ; do
+-      set $line ; PORT=$3 ; HOST=$4 
+-      $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++      set $line ; PORT=$(validate_port $3) ; HOST=$(validate_host $4)
++      if [ -n "${HOST}" ] && [ -n "${PORT}" ]; then 
++         $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++      fi
+    done
+ }
+ 
+ host_it() {
+    ${HOSTCMD} -t srv _radsec._tcp.${REALM} | sort -n -k5 |
+    while read line ; do
+-      set $line ; PORT=$7 ; HOST=$8 
+-      $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++      set $line ; PORT=$(validate_port $7) ; HOST=$(validate_host $8) 
++      if [ -n "${HOST}" ] && [ -n "${PORT}" ]; then
++         $PRINTCMD "\thost ${HOST%.}:${PORT}\n"
++      fi
+    done
+ }
+ 
diff -Nru radsecproxy-1.8.2/debian/patches/series 
radsecproxy-1.8.2/debian/patches/series
--- radsecproxy-1.8.2/debian/patches/series     2020-11-23 12:09:13.000000000 
+0100
+++ radsecproxy-1.8.2/debian/patches/series     2021-05-27 07:58:57.000000000 
+0200
@@ -1,2 +1,3 @@
 fix-spelling-errors
 move-manpages-to-8
+fix-cve-2021-32642
diff -Nru radsecproxy-1.8.2/debian/salsa-ci.yml 
radsecproxy-1.8.2/debian/salsa-ci.yml
--- radsecproxy-1.8.2/debian/salsa-ci.yml       2020-11-23 12:09:13.000000000 
+0100
+++ radsecproxy-1.8.2/debian/salsa-ci.yml       2021-05-27 07:58:57.000000000 
+0200
@@ -4,5 +4,5 @@
   - 
https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/pipeline-jobs.yml
 
 variables:
-  RELEASE: 'unstable'
+  RELEASE: 'bullseye'
   SALSA_CI_DISABLE_AUTOPKGTEST: 1

--- End Message ---
--- Begin Message ---
Unblocked.

--- End Message ---

Reply via email to