Bug#934043: marked as done (segfaults with use-after-free when using KrbServiceName Any)

2019-11-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Nov 2019 20:35:04 +
with message-id 
and subject line Bug#934043: fixed in libapache-mod-auth-kerb 5.4-2.4~deb10u1
has caused the Debian Bug report #934043,
regarding segfaults with use-after-free when using KrbServiceName Any
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
934043: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934043
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libapache2-mod-auth-kerb
Version: 5.4-2.3
Severity: grave
Tags: patch upstream

Hi,

After upgrading to buster, mod_auth_kerb keeps on crashing Apache (thus the
grave severity), after printing

  double free or corruption (out)

This is indeed a use-after-free; verify_krb5_user gets in a keytab as a
parameter, and chooses to deallocate it even though the parent expects to keep
using it. I don't know why this didn't trigger as often in stretch,
although we've certainly seen mod_auth_kerb segfaults there as well
(especially with outdated keytabs).

The patch is trivial and can be found in upstream's bug tracker; just don't
deallocate the keytab in verify_krb5_user():

  https://sourceforge.net/p/modauthkerb/bugs/61/

This is not a leak, since the parent closes it inself, in all paths. I've 
verified
that it applies in Debian (just some changed line numbers) and fixes the issue.

Please consider for a buster point release, in addition to unstable.
It makes mod_auth_kerb borderline unusable.

-- System Information:
Debian Release: 10.0
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'proposed-updates'), (500, 
'stable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.1.11 (SMP w/40 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_NO:en_US:en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libapache2-mod-auth-kerb depends on:
ii  apache2-bin [apache2-api-20120211]  2.4.38-3
ii  krb5-config 2.6
ii  libc6   2.28-10
pn  libcomerr2  
ii  libgssapi-krb5-21.17-3
ii  libk5crypto31.17-3
ii  libkrb5-3   1.17-3

libapache2-mod-auth-kerb recommends no packages.

libapache2-mod-auth-kerb suggests no packages.
--- End Message ---
--- Begin Message ---
Source: libapache-mod-auth-kerb
Source-Version: 5.4-2.4~deb10u1

We believe that the bug you reported is fixed in the latest version of
libapache-mod-auth-kerb, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 934...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Paul Wise  (supplier of updated libapache-mod-auth-kerb 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 27 Oct 2019 13:58:04 +0800
Source: libapache-mod-auth-kerb
Architecture: source
Version: 5.4-2.4~deb10u1
Distribution: buster
Urgency: medium
Maintainer: Ghe Rivero 
Changed-By: Paul Wise 
Closes: 934043
Changes:
 libapache-mod-auth-kerb (5.4-2.4~deb10u1) buster; urgency=medium
 .
   * Rebuild for buster
 .
 libapache-mod-auth-kerb (5.4-2.4) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Apply patch from upstream issue tracker to fix crash (Closes: #934043)
Checksums-Sha1:
 8cf6b1e0ea6c21f5c3e384118bc8b46d5407014f 1881 
libapache-mod-auth-kerb_5.4-2.4~deb10u1.dsc
 0d9f4c45c7d9289380dc5db0f3ec9a33fd36f307 51231 
libapache-mod-auth-kerb_5.4-2.4~deb10u1.diff.gz
 c20360cc9eeff357932c3fa9b89567785c158ebd 7002 
libapache-mod-auth-kerb_5.4-2.4~deb10u1_amd64.buildinfo
Checksums-Sha256:
 bec82352aaa830f19ab4e60e7fd228b1dabb73bc6d06181c5bf498b7157ce856 1881 
libapache-mod-auth-kerb_5.4-2.4~deb10u1.dsc
 277ed7a264c281a5266453c8525a830c1aebdb928c48cd267a679fe5d662b994 51231 
libapache-mod-auth-kerb_5.4-2.4~deb10u1.diff.gz
 9f8fceda02483eae3742b065d4fed4cb6572684362e69217bbc63ce081045575 7002 
libapache-mod-auth-kerb_5.4-2.4~deb10u1_amd64.buildinfo
Files:
 5b4681cd754932cb4730a32913094162 1881 net 

Bug#934043: marked as done (segfaults with use-after-free when using KrbServiceName Any)

2019-10-20 Thread Debian Bug Tracking System
Your message dated Mon, 21 Oct 2019 03:34:18 +
with message-id 
and subject line Bug#934043: fixed in libapache-mod-auth-kerb 5.4-2.4
has caused the Debian Bug report #934043,
regarding segfaults with use-after-free when using KrbServiceName Any
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
934043: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934043
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libapache2-mod-auth-kerb
Version: 5.4-2.3
Severity: grave
Tags: patch upstream

Hi,

After upgrading to buster, mod_auth_kerb keeps on crashing Apache (thus the
grave severity), after printing

  double free or corruption (out)

This is indeed a use-after-free; verify_krb5_user gets in a keytab as a
parameter, and chooses to deallocate it even though the parent expects to keep
using it. I don't know why this didn't trigger as often in stretch,
although we've certainly seen mod_auth_kerb segfaults there as well
(especially with outdated keytabs).

The patch is trivial and can be found in upstream's bug tracker; just don't
deallocate the keytab in verify_krb5_user():

  https://sourceforge.net/p/modauthkerb/bugs/61/

This is not a leak, since the parent closes it inself, in all paths. I've 
verified
that it applies in Debian (just some changed line numbers) and fixes the issue.

Please consider for a buster point release, in addition to unstable.
It makes mod_auth_kerb borderline unusable.

-- System Information:
Debian Release: 10.0
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'proposed-updates'), (500, 
'stable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.1.11 (SMP w/40 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_NO:en_US:en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libapache2-mod-auth-kerb depends on:
ii  apache2-bin [apache2-api-20120211]  2.4.38-3
ii  krb5-config 2.6
ii  libc6   2.28-10
pn  libcomerr2  
ii  libgssapi-krb5-21.17-3
ii  libk5crypto31.17-3
ii  libkrb5-3   1.17-3

libapache2-mod-auth-kerb recommends no packages.

libapache2-mod-auth-kerb suggests no packages.
--- End Message ---
--- Begin Message ---
Source: libapache-mod-auth-kerb
Source-Version: 5.4-2.4

We believe that the bug you reported is fixed in the latest version of
libapache-mod-auth-kerb, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 934...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Paul Wise  (supplier of updated libapache-mod-auth-kerb 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 21 Oct 2019 11:15:20 +0800
Source: libapache-mod-auth-kerb
Architecture: source
Version: 5.4-2.4
Distribution: unstable
Urgency: medium
Maintainer: Ghe Rivero 
Changed-By: Paul Wise 
Closes: 934043
Changes:
 libapache-mod-auth-kerb (5.4-2.4) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Apply patch from upstream issue tracker to fix crash (Closes: #934043)
Checksums-Sha1:
 7b3723f8f82f95dd2e537d2467477df7c961a134 1849 
libapache-mod-auth-kerb_5.4-2.4.dsc
 da1c7affa7dac60fe0c2b73a8828a96b0f6ba828 51186 
libapache-mod-auth-kerb_5.4-2.4.diff.gz
Checksums-Sha256:
 4e523b4c2cfe2f26de5632e5d21c352a05da0cfa5aa595fec6463087ccc30f72 1849 
libapache-mod-auth-kerb_5.4-2.4.dsc
 3ce8109d98d7f8c42bfd1a98ec0ff356c50697f64c454f53bc48002075fb7f0d 51186 
libapache-mod-auth-kerb_5.4-2.4.diff.gz
Files:
 8812316d5029c3e18ba8252c783b0941 1849 net optional 
libapache-mod-auth-kerb_5.4-2.4.dsc
 1f7027a166038100f81ee1465096c663 51186 net optional 
libapache-mod-auth-kerb_5.4-2.4.diff.gz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEYQsotVz8/kXqG1Y7MRa6Xp/6aaMFAl2tI5QACgkQMRa6Xp/6
aaOgFw/7BlSkWFZGxV1hgMbaSz//DdfLaR+wcGgFoG0/Psyx8i1b+1Wp5lWrl6Rw
zLdHdSD96emHsnGRZaycL0GdvRw+Szk50tlpcGZaoepP9W1Wx2ERj3e4xljrSURs