Bug#989573: unblock: pam-u2f/1.1.0-1.1

2021-06-08 Thread nicoo
Hi Salvatore,

Thanks a bunch for the fix.
OK with that NMU from my side.


Best,

  nicoo

On Mon, Jun 07, 2021 at 10:30:35PM +0200, Salvatore Bonaccorso wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: car...@debian.org
> 
> Hi Release Team,
> 
> Please unblock package pam-u2f
> 
> [ Reason / Impact ]
> pam-u2f 1.1.0 upstream and so in Debian bullseye was affected by
> CVE-2021-31924, #987545. which can lead, depending on the pam-u2f
> configuration and the application used, to local PIN bypass.
> 
> [ Tests ]
> None specific, the enabled tests pass.
> (What automated or manual tests cover the affected code?)
> 
> [ Risks ]
> Small, the patch applied comes from upstream for the affected branch
> and is targeted.
> 
> [ Checklist ]
>   [x] all changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in testing
> 
> unblock pam-u2f/1.1.0-1.1
> 
> Regards,
> Salvatore

> diff -Nru pam-u2f-1.1.0/debian/changelog pam-u2f-1.1.0/debian/changelog
> --- pam-u2f-1.1.0/debian/changelog2020-11-02 13:49:23.0 +0100
> +++ pam-u2f-1.1.0/debian/changelog2021-06-05 15:04:24.0 +0200
> @@ -1,3 +1,10 @@
> +pam-u2f (1.1.0-1.1) unstable; urgency=medium
> +
> +  * Non-maintainer upload.
> +  * Handle converse() returning NULL (CVE-2021-31924) (Closes: #987545)
> +
> + -- Salvatore Bonaccorso   Sat, 05 Jun 2021 15:04:24 +0200
> +
>  pam-u2f (1.1.0-1) unstable; urgency=low
>  
>* New upstream version 1.1.0 (2020-09-17)
> diff -Nru pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch 
> pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch
> --- pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch 
> 1970-01-01 01:00:00.0 +0100
> +++ pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch 
> 2021-06-05 15:04:24.0 +0200
> @@ -0,0 +1,37 @@
> +From: pedro martelletto 
> +Date: Wed, 19 May 2021 09:08:44 +0200
> +Subject: Handle converse() returning NULL
> +Origin: 
> https://github.com/Yubico/pam-u2f/commit/6059b057dd9b6d0164fc16f9422c0d728f902bb5
> +Bug: https://github.com/Yubico/pam-u2f/issues/175
> +Bug-Debian: https://bugs.debian.org/987545
> +Bug-Debian-Security: 
> https://security-tracker.debian.org/tracker/CVE-2021-31924
> +
> +If a PIN is required and converse() returns NULL, abort the
> +authentication flow instead of reverting to FIDO2 without PIN.
> +Fixes #175.
> +---
> + util.c | 7 ++-
> + 1 file changed, 6 insertions(+), 1 deletion(-)
> +
> +diff --git a/util.c b/util.c
> +index 3ea1bd2be7e6..fb07dc70d545 100644
> +--- a/util.c
>  b/util.c
> +@@ -1379,8 +1379,13 @@ int do_authentication(const cfg_t *cfg, const 
> device_t *devices,
> +   goto out;
> + }
> + 
> +-if (pin_verification == FIDO_OPT_TRUE)
> ++if (pin_verification == FIDO_OPT_TRUE) {
> +   pin = converse(pamh, PAM_PROMPT_ECHO_OFF, "Please enter the PIN: 
> ");
> ++  if (pin == NULL) {
> ++D(cfg->debug_file, "converse() returned NULL");
> ++goto out;
> ++  }
> ++}
> + if (user_presence == FIDO_OPT_TRUE ||
> + user_verification == FIDO_OPT_TRUE) {
> +   if (cfg->manual == 0 && cfg->cue && !cued) {
> +-- 
> +2.32.0.rc0
> +
> diff -Nru pam-u2f-1.1.0/debian/patches/series 
> pam-u2f-1.1.0/debian/patches/series
> --- pam-u2f-1.1.0/debian/patches/series   1970-01-01 01:00:00.0 
> +0100
> +++ pam-u2f-1.1.0/debian/patches/series   2021-06-05 15:04:24.0 
> +0200
> @@ -0,0 +1 @@
> +Handle-converse-returning-NULL.patch



signature.asc
Description: PGP signature


Bug#989573: unblock: pam-u2f/1.1.0-1.1

2021-06-07 Thread Salvatore Bonaccorso
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: car...@debian.org

Hi Release Team,

Please unblock package pam-u2f

[ Reason / Impact ]
pam-u2f 1.1.0 upstream and so in Debian bullseye was affected by
CVE-2021-31924, #987545. which can lead, depending on the pam-u2f
configuration and the application used, to local PIN bypass.

[ Tests ]
None specific, the enabled tests pass.
(What automated or manual tests cover the affected code?)

[ Risks ]
Small, the patch applied comes from upstream for the affected branch
and is targeted.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock pam-u2f/1.1.0-1.1

Regards,
Salvatore
diff -Nru pam-u2f-1.1.0/debian/changelog pam-u2f-1.1.0/debian/changelog
--- pam-u2f-1.1.0/debian/changelog  2020-11-02 13:49:23.0 +0100
+++ pam-u2f-1.1.0/debian/changelog  2021-06-05 15:04:24.0 +0200
@@ -1,3 +1,10 @@
+pam-u2f (1.1.0-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Handle converse() returning NULL (CVE-2021-31924) (Closes: #987545)
+
+ -- Salvatore Bonaccorso   Sat, 05 Jun 2021 15:04:24 +0200
+
 pam-u2f (1.1.0-1) unstable; urgency=low
 
   * New upstream version 1.1.0 (2020-09-17)
diff -Nru pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch 
pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch
--- pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch   
1970-01-01 01:00:00.0 +0100
+++ pam-u2f-1.1.0/debian/patches/Handle-converse-returning-NULL.patch   
2021-06-05 15:04:24.0 +0200
@@ -0,0 +1,37 @@
+From: pedro martelletto 
+Date: Wed, 19 May 2021 09:08:44 +0200
+Subject: Handle converse() returning NULL
+Origin: 
https://github.com/Yubico/pam-u2f/commit/6059b057dd9b6d0164fc16f9422c0d728f902bb5
+Bug: https://github.com/Yubico/pam-u2f/issues/175
+Bug-Debian: https://bugs.debian.org/987545
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2021-31924
+
+If a PIN is required and converse() returns NULL, abort the
+authentication flow instead of reverting to FIDO2 without PIN.
+Fixes #175.
+---
+ util.c | 7 ++-
+ 1 file changed, 6 insertions(+), 1 deletion(-)
+
+diff --git a/util.c b/util.c
+index 3ea1bd2be7e6..fb07dc70d545 100644
+--- a/util.c
 b/util.c
+@@ -1379,8 +1379,13 @@ int do_authentication(const cfg_t *cfg, const device_t 
*devices,
+   goto out;
+ }
+ 
+-if (pin_verification == FIDO_OPT_TRUE)
++if (pin_verification == FIDO_OPT_TRUE) {
+   pin = converse(pamh, PAM_PROMPT_ECHO_OFF, "Please enter the PIN: ");
++  if (pin == NULL) {
++D(cfg->debug_file, "converse() returned NULL");
++goto out;
++  }
++}
+ if (user_presence == FIDO_OPT_TRUE ||
+ user_verification == FIDO_OPT_TRUE) {
+   if (cfg->manual == 0 && cfg->cue && !cued) {
+-- 
+2.32.0.rc0
+
diff -Nru pam-u2f-1.1.0/debian/patches/series 
pam-u2f-1.1.0/debian/patches/series
--- pam-u2f-1.1.0/debian/patches/series 1970-01-01 01:00:00.0 +0100
+++ pam-u2f-1.1.0/debian/patches/series 2021-06-05 15:04:24.0 +0200
@@ -0,0 +1 @@
+Handle-converse-returning-NULL.patch