Multiple vulnerabilities in Bionic and Impish

Bug #1971185 reported by Luís Infante da Câmara
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
spip (Ubuntu)
Fix Released
Undecided
Unassigned
Bionic
Fix Released
Undecided
Eduardo Barretto
Impish
Fix Released
Undecided
Eduardo Barretto

Bug Description

(The vulnerabilities in Focal and Jammy, along with other bugs, are being fixed through the Stable Release Update process in bug #1978555)

The version in Bionic is vulnerable to CVE-2020-28984, CVE-2022-26846 and CVE-2022-26847.

The version in Impish is vulnerable to CVE-2021-44118, CVE-2021-44120, CVE-2021-44122, CVE-2021-44123, CVE-2022-26846 and CVE-2022-26847.

Please backport the versions in Debian buster and bullseye.

information type: Private Security → Public Security
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

tags: added: community-security
Revision history for this message
Luís Infante da Câmara (luis220413) wrote (last edit ): Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

SPIP 3.1 is no longer maintained upstream and Debian has not released fixes for CVE-2022-28959, CVE-2022-28960 and CVE-2022-28961 in Stretch. Therefore, I am not patching these CVEs in Bionic.

Changed in spip (Ubuntu):
status: New → In Progress
assignee: nobody → Luís Cunha dos Reis Infante da Câmara (luis220413)
Revision history for this message
Luís Infante da Câmara (luis220413) wrote :
Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

The attachment "spip_bionic.debdiff" seems to be a debdiff. The ubuntu-sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. If the attachment isn't a patch, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are member of the ~ubuntu-sponsors, unsubscribe the team.

[This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issue please contact him.]

tags: added: patch
Changed in spip (Ubuntu):
status: In Progress → Fix Committed
Revision history for this message
Seth Arnold (seth-arnold) wrote :

Hello Luís, 4.5MB feels pretty unlikely for a security fix; the diffstat on that debdiff is all over the place:

$ diffstat spip_focal.debdiff
 /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-audio-ogg.swf |binary
 /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-audio.swf |binary
 /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-video-hls.swf |binary
 /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-video-mdash.swf |binary
 /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-video.swf |binary
 spip-3.2.15/.gitignore | 129
 spip-3.2.15/CHANGELOG.TXT | 318 +
 spip-3.2.15/config/ecran_securite.php | 23
...

Normally security fixes add patches to debian/patches/ directory, modify a debian/patches/series file, modifies the debian/changelog. It's very rare to modify files outside of this hierarchy (except for 'native packages', but those don't typically have version numbers this complex).

Could you double-check that you've prepared the patches that you thought you prepared?

Thanks

Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

My patches (except for Bionic) are an upgrade to new upstream security and maintenance releases, because I also want that users of this package in Ubuntu get non-security bug fixes.

Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Except for a few exceptions, such as ffmpeg, we generally don't accept new upstream maintenance releases into the security sponsoring process.

If you really want to introduce new upstream microreleases, you can perhaps try getting them sponsored as Stable Release Updates:

https://wiki.ubuntu.com/StableReleaseUpdates

Changed in spip (Ubuntu):
status: Fix Committed → In Progress
Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

Please publish the patched package for Bionic.

description: updated
description: updated
description: updated
Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

I have just uploaded a package for Focal to my PPA (https://launchpad.net/~luis220413/+archive/ubuntu/security-updates), with the upstream version number set to 3.2.15.1 to circumvent the Launchpad prohibition on uploading original tarballs with the same version number even after deletion.

Revision history for this message
Luís Infante da Câmara (luis220413) wrote :
Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

Same for Impish.

Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

Same for Jammy, but the modified upstream version is 4.0.7.1.

Revision history for this message
Eduardo Barretto (ebarretto) wrote :

Hi Luís,

I will be taking a deeper look at the debdiffs, but I'm already seeing that you are trying to upgrade versions for focal, impish and jammy. Those we won't be sponsoring as they should be requested through the SRU process on a new bug ticket.

In the meantime, what I can do for impish is similar to what you are trying for bionic, in this case, sync to the debian version 3.2.11-3+deb11u3. That will fix 6 CVEs for impish.

description: updated
summary: - Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
+ Multiple vulnerabilities in Bionic and Impish
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

Please do so for Impish and also publish a patched package for Bionic.

For Focal and Jammy, I have opened bug #1978555.

Revision history for this message
Luís Infante da Câmara (luis220413) wrote :

Eduardo Barretto, what CVEs will be fixed in Impish? This report only lists 5.

Revision history for this message
Eduardo Barretto (ebarretto) wrote :

For impish we have: CVE-2021-44118, CVE-2021-44120, CVE-2021-44122, CVE-2021-44123, CVE-2022-26846 and CVE-2022-26847.

Changed in spip (Ubuntu Bionic):
assignee: nobody → Eduardo Barretto (ebarretto)
Changed in spip (Ubuntu Impish):
assignee: nobody → Eduardo Barretto (ebarretto)
Changed in spip (Ubuntu Bionic):
status: New → In Progress
Changed in spip (Ubuntu Impish):
status: New → In Progress
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package spip - 3.1.4-4~deb9u5build0.18.04.1

---------------
spip (3.1.4-4~deb9u5build0.18.04.1) bionic-security; urgency=medium

  * fake sync from Debian to fix CVE-2020-28984, CVE-2022-26846 and
    CVE-2022-26847 (LP: #1971185).

spip (3.1.4-4~deb9u5) stretch-security; urgency=medium

  * Non-maintainer upload.
  * Switch back to a sane version number.
  * Add missing dependency on php-xml.
  * Recommend php-gd.
  * Fix security issues, backported from buster:
  * XSS:
    - 0049-Verifier-qu-on-a-bien-le-droit-de-modifier-le-login-.patch
    - 0050-appliquer-rawurlencode-aussi-sur-les-tableaux-qu-on-.patch
  * CVE-2022-26846, CVE-2022-26847:
    - 0022-Utilisation-des-fonctions-de-sanitization-sur-galeri.patch
      + prerequisite.
    - 0051-D-pr-cier-et-s-curiser-l-insertion-d-une-galerie-dan.patch
      + Don't use nullable types, not available in PHP 7.0 in stretch.

spip (3.1.4-4~deb9u4+deb9u2) stretch-security; urgency=high

  * Non-maintainer upload by the LTS Security Team.
  * Backport security fixes from 3.2.12
    - SQL injections, remote code execution, XSS
  * Fix Articles and Sections editing screens in admin area, which got broken in
    previous upload.
  * Fix user Preferences screen, which got broken in 3.1.4-4~deb9u4.

spip (3.1.4-4~deb9u4+deb9u1) stretch-security; urgency=medium

  * Non-maintainer upload by the Debian LTS Team.
  * Fix TEMP-0000000-803658

spip (3.1.4-4~deb9u4) stretch-security; urgency=medium

  * Non-maintainer upload by the LTS Security Team.
  * Fix CVE-2020-28984: did not correctly validate he couleur,
    display, display_navigation, display_outils, imessage, and
    spip_ecran parameters.

 -- Luís Infante da Câmara <email address hidden> Tue, 14 Jun 2022 16:41:55 +0200

Changed in spip (Ubuntu Bionic):
status: In Progress → Fix Released
Revision history for this message
Eduardo Barretto (ebarretto) wrote :

Impish SPIP version 3.2.11-3+deb11u3build0.21.10.1 released today

Changed in spip (Ubuntu Impish):
status: In Progress → Fix Released
Changed in spip (Ubuntu):
assignee: Luís Cunha dos Reis Infante da Câmara (luis220413) → nobody
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.