Bug#1124633: bookworm-pu: package sogo/5.8.0-2+deb12u1

2026-01-04 Thread Tobias Frost
On Sun, Jan 04, 2026 at 07:56:06PM +, Adam D. Barratt wrote:
> On Sun, 2026-01-04 at 20:30 +0100, Salvatore Bonaccorso wrote:
> > Hi Tobias,
> > 
> > On Sun, Jan 04, 2026 at 05:51:37PM +0100, Tobias Frost wrote:
> > 
> [...]
> > > This o-s-p-u fixes the following CVES:
> > >  * CVE-2024-48104 - HTML Injection (Closes: #1060925)
> > 
> > This should have been CVE-2023-48104. Adam can you update that for
> > the comments at least, not sure we have enough time to make a reject
> > and new upload correcting that.
> 
> I used the correct ID in the comment, but given the time between
> oldstable point releases I decided to accept the package as-is rather
> than wait for a reject-and-reupload cycle.
> 
> If desired then I'd likely accept a u2 that simply corrected the typo
> in the u1 changelog, so long as it happened quickly.

Uploaded, diff:
(patch had wrong name too, used the opportunity to fix that too.)

diff --git a/debian/changelog b/debian/changelog
index 11098c635..cfd0c43bb 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+sogo (5.8.0-2+deb12u2) bookworm; urgency=medium
+
+  * Fixing wrong CVE number for CVE-2023-48104.
+
+ -- Tobias Frost   Sun, 04 Jan 2026 22:20:06 +0100
+
 sogo (5.8.0-2+deb12u1) bookworm; urgency=high

   [ Tobias Frost ]
@@ -5,7 +11,7 @@ sogo (5.8.0-2+deb12u1) bookworm; urgency=high
   * Cherry-pick patch from salsa repo to fix below mentioned
 WSTG-INPV-02 issue. (The patch was present in the git repo,
 but the never released as part of a package)
-  * CVE-2024-48104 - HTML Injection (Closes: #1060925)
+  * CVE-2023-48104 - HTML Injection (Closes: #1060925)
   * CVE-2024-24510 - CSS Injection
   * CVE-2024-34462 - Cross Site Scripting (XSS) (Closes: #1071163)
   * CVE-2025-63498 - Cross Site Scripting (XSS)
diff --git a/debian/patches/CVE-2024-48104.patch 
b/debian/patches/CVE-2023-48104.patch
similarity index 100%
rename from debian/patches/CVE-2024-48104.patch
rename to debian/patches/CVE-2023-48104.patch
diff --git a/debian/patches/series b/debian/patches/series
index d115549e0..ab26037ed 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -14,4 +14,4 @@ CVE-2025-63499.patch
 CVE-2025-63498.patch
 CVE-2024-34462.patch
 CVE-2024-24510.patch
-CVE-2024-48104.patch
+CVE-2023-48104.patch


> Regards,
> 
> Adam



Bug#1124633: bookworm-pu: package sogo/5.8.0-2+deb12u1

2026-01-04 Thread Tobias Frost
On Sun, Jan 04, 2026 at 07:56:06PM +, Adam D. Barratt wrote:
> On Sun, 2026-01-04 at 20:30 +0100, Salvatore Bonaccorso wrote:
> > Hi Tobias,
> > 
> > On Sun, Jan 04, 2026 at 05:51:37PM +0100, Tobias Frost wrote:
> > 
> [...]
> > > This o-s-p-u fixes the following CVES:
> > >  * CVE-2024-48104 - HTML Injection (Closes: #1060925)
> > 
> > This should have been CVE-2023-48104. Adam can you update that for
> > the comments at least, not sure we have enough time to make a reject
> > and new upload correcting that.
> 
> I used the correct ID in the comment, but given the time between
> oldstable point releases I decided to accept the package as-is rather
> than wait for a reject-and-reupload cycle.
> 
> If desired then I'd likely accept a u2 that simply corrected the typo
> in the u1 changelog, so long as it happened quickly.

Will provide an u2 later tonight.

--
tobi

> Regards,
> 
> Adam



Bug#1124633: bookworm-pu: package sogo/5.8.0-2+deb12u1

2026-01-04 Thread Adam D. Barratt
On Sun, 2026-01-04 at 20:30 +0100, Salvatore Bonaccorso wrote:
> Hi Tobias,
> 
> On Sun, Jan 04, 2026 at 05:51:37PM +0100, Tobias Frost wrote:
> 
[...]
> > This o-s-p-u fixes the following CVES:
> >  * CVE-2024-48104 - HTML Injection (Closes: #1060925)
> 
> This should have been CVE-2023-48104. Adam can you update that for
> the comments at least, not sure we have enough time to make a reject
> and new upload correcting that.

I used the correct ID in the comment, but given the time between
oldstable point releases I decided to accept the package as-is rather
than wait for a reject-and-reupload cycle.

If desired then I'd likely accept a u2 that simply corrected the typo
in the u1 changelog, so long as it happened quickly.

Regards,

Adam



Bug#1124633: bookworm-pu: package sogo/5.8.0-2+deb12u1

2026-01-04 Thread Salvatore Bonaccorso
Hi Tobias,

On Sun, Jan 04, 2026 at 05:51:37PM +0100, Tobias Frost wrote:
> Package: release.debian.org
> Severity: normal
> Tags: bookworm
> X-Debbugs-Cc: [email protected], [email protected], 
> [email protected]
> Control: affects -1 + src:sogo
> User: [email protected]
> Usertags: pu
> 
> This o-s-p-u fixes the following CVES:
>  * CVE-2024-48104 - HTML Injection (Closes: #1060925)

This should have been CVE-2023-48104. Adam can you update that for the
comments at least, not sure we have enough time to make a reject and
new upload correcting that.

Regards,
Salvatore



Bug#1124633: bookworm-pu: package sogo/5.8.0-2+deb12u1

2026-01-04 Thread Tobias Frost
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: [email protected], [email protected], 
[email protected]
Control: affects -1 + src:sogo
User: [email protected]
Usertags: pu

This o-s-p-u fixes the following CVES:
 * CVE-2024-48104 - HTML Injection (Closes: #1060925)
 * CVE-2024-24510 - CSS Injection
 * CVE-2024-34462 - Cross Site Scripting (XSS) (Closes: #1071163)
 * CVE-2025-63498 - Cross Site Scripting (XSS)
 * CVE-2025-63499 - Cross Site Scripting (XSS) (Closes: #1121952)

It additinonally fixes a crash (NSException) that could be triggered
when mailIdentities was invalid 

[ Tests ]

I've verified that the POCs the tracker mentions stops working (they did
trigger before) in a Bookworm VM and additionally manually tested
sogo. 

[ Risks ]
The Patches are cherry-picked from upstream are small and quite straight
forward. See the dep3 headers for pointers to the upstream changes.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
see above

I'll upload the changes after this mail has been sent.

-- 
tobi
diff -Nru sogo-5.8.0/debian/changelog sogo-5.8.0/debian/changelog
--- sogo-5.8.0/debian/changelog 2022-12-01 12:47:54.0 +0100
+++ sogo-5.8.0/debian/changelog 2026-01-04 17:27:30.0 +0100
@@ -1,3 +1,22 @@
+sogo (5.8.0-2+deb12u1) bookworm; urgency=high
+
+  [ Tobias Frost ]
+  * Non-maintainer upload.
+  * Cherry-pick patch from salsa repo to fix below mentioned
+WSTG-INPV-02 issue. (The patch was present in the git repo,
+but the never released as part of a package)
+  * CVE-2024-48104 - HTML Injection (Closes: #1060925)
+  * CVE-2024-24510 - CSS Injection
+  * CVE-2024-34462 - Cross Site Scripting (XSS) (Closes: #1071163)
+  * CVE-2025-63498 - Cross Site Scripting (XSS)
+  * CVE-2025-63499 - Cross Site Scripting (XSS) (Closes: #1121952)
+
+  [ Jordi Mallach ]
+  * Add upstream fix for a WSTG-INPV-02 security issue, crash on
+invalid mailIdentities.
+
+ -- Tobias Frost   Sun, 04 Jan 2026 17:27:30 +0100
+
 sogo (5.8.0-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru sogo-5.8.0/debian/patches/CVE-2024-24510.patch 
sogo-5.8.0/debian/patches/CVE-2024-24510.patch
--- sogo-5.8.0/debian/patches/CVE-2024-24510.patch  1970-01-01 
01:00:00.0 +0100
+++ sogo-5.8.0/debian/patches/CVE-2024-24510.patch  2026-01-04 
17:27:30.0 +0100
@@ -0,0 +1,45 @@
+Description: CVE-2024-24510 - XSS via mail import component
+ Cross Site Scripting vulnerability in Alinto SOGo before 5.10.0 allows a 
remote
+ attacker to execute arbitrary code via the import function to the mail
+ component.
+Origin: 
https://github.com/Alinto/sogo/commit/21468700718ed71774eaf2979ee59330fc569424
+
+ From 21468700718ed71774eaf2979ee59330fc569424 Mon Sep 17 00:00:00
+2001
+From: smizrahi 
+Date: Tue, 23 Jan 2024 15:01:47 +
+Subject: [PATCH] fix(mail): Fix security @import css injection
+
+---
+ SoObjects/SOGo/NSString+Utilities.m | 9 +
+ Tests/Unit/TestNSString+Utilities.m | 1 +
+ 2 files changed, 10 insertions(+)
+
+--- a/SoObjects/SOGo/NSString+Utilities.m
 b/SoObjects/SOGo/NSString+Utilities.m
+@@ -990,6 +990,15 @@
+   options: NSRegularExpressionCaseInsensitive 
error:&error];
+   newResult = [regex stringByReplacingMatchesInString:result options:0 
range:NSMakeRange(0, [result length]) withTemplate:@"onmouseo***="];
+   result = [NSString stringWithString: newResult];
++
++  // Remove @import css (in style tags)
++  regex = [NSRegularExpression 
regularExpressionWithPattern:@"(<[\\s\\u200B	

0]*s[\\s\\u200B	

0]*t[\\s\\u200B	

0]*y[\\s\\u200B	

0]*l[\\s\\u200B	

0]*e.*)([\\s\\u200B	

0]*@[\\s\\u200B	

0]*i[\\s\\u200B	

0]*m[\\s\\u200B	

0]*p[\\s\\u200B	

0]*o[\\s\\u200B	

0]*r[\\s\\u200B	

0]*t)(.*<[\\s\\u200B	

0]*\\/[\\s\\u200B	

0]*s[\\s\\u200B	

0]*t[\\s\\u200B	

0]*y[\\s\\u200B	

0]*l[\\s\\u200B	

0]*e[\\s\\u200B	

0]*>)"
 
++  options: NSRegularExpressionCaseInsensitive 
error:&error];
++  newResult = result;
++  while([regex numberOfMatchesInString:newResult options:0 
range:NSMakeRange(0, [newResult length])] > 0) {
++newResult = [regex stringByReplacingMatchesInString:newResult 
options:0 range:NSMakeRange(0, [newResult length]) withTemplate:@"$1@im$3"];
++  }
++  result = [NSString stringWithString: newResult];
+ }
+   }  
+   NS_HANDLER
+--- a/Tests/Unit/TestNSString+Utilities.m
 b/Tests/Unit/TestNSString+Utilities.m
+@@ -108,6 +108,7 @@
+   testEquals([[NSString stringWithString:@"foobar bar"] stringWithoutHTMLInjection: NO], @"foobar bar");
+   testEquals([[NSString stringWithString:@"foobar @import 
url(
    
    

5 matches