Here is my monthly update covering what I have been doing in the free software world during April 2023 (previous month):
Last month, I put together a set of ICS files for the UK Picturehouse Cinema chain which allows them to be displayed within, for instance, Google Calendar. After the change to daylight savings time, though, I noticed that timezone handling was broken, which required fixing. [...]
Reproducible Builds
The Reproducible Build project's mission is to ensure the security of the 'supply chains' used in open source software — that is, preventing attacks targeting the complex systems that build our shared digital infrastructure. This month, I:
-
Kept isdebianreproducibleyet.com up to date. [...]
-
Submitted a patches to fix a reproducibility issue in the
ruby-regexp-parser
Debian package. -
Categorised a large number of packages and issues in the Reproducible Builds
notes.git
repository. -
Wrote and published our monthly report for March 2023.
-
Updated diffoscope, our in-depth and content-aware diff utility that can locate and diagnose reproducibility issues to add a missing 'raise' statement accidentally dropped in a previous commit. [...]
- Updated the Reproducible Builds website and documentation to make all the "Back to who is involved" links to be displayed consistently in italics [...], attempt to fix literal
{: .lead}
strings appearing in the page (Re: reproducible-builds/reproducible-website#45) [...] and correct the syntax of the_data/sponsors.yml
file. [...].
Debian
-
python-django
(3:4.2-1
) — Upload new upstream stable release. -
redis
(5:7.0.11-1
) — Upload new upstream security release in order to fix CVE-2023-28856. (#1034613)
Debian LTS
This month I have worked 18 hours on Debian Long Term Support (LTS) and 12 hours on its sister Extended LTS project.
-
Investigated and triaged:
asterisk
(CVE-2023-27585),configobj
,connman
jackson-databind
,libelfin
(CVE-2023-24180),libxml2
,openvswitch
,redis
(CVE-2023-28856) andruby-loofah
. -
Frontdesk duties, responding to user/developer questions, reviewing others' packages, participating in mailing list discussions, etc.
-
Issued DLA 3381-1 as it was discovered that there was a potential buffer-overflow vulnerability in Ghostscript, a popular interpreter for the PostScript language used, for example, to generate PDF files.
-
Issued DLA 3383-1 for GruntJS, a multipurpose task runner and build system tool.
file.copy
operations in GruntJS were vulnerable to a TOCTOU ("time-of-check vs. time-of-use") race condition that could have led to arbitrary file writes in GitHub repositories. This could have then led to local privilege escalation if a lower-privileged user had write access to both source and destination directories, as the lower-privileged user could have created a symlink to the GruntJS user's~/.bashrc
configuration file etc. -
Issued DLA 3386-1, also for GruntJS, as it was discovered that there was a potential path-traversal, a multipurpose task runner and build system tool. This could have been exploited via malicious symlinks.
-
Issued DLA 3388-1 and DLA 3389-1 for
lldpd
, an implementation of the IEEE 802.1ab (LLDP), a protocol used to administer and monitor networking devices. There were two issues that could have been used to engineer a denial-of-service (DoS) attack. -
Issued DLA 3396-1 and ELA 838-1 for the Redis key-value data store. Authenticated users could have used the
HINCRBYFLOAT
command to create an invalid hash field that would have crashed the server on access. -
Issued DLA 3397-1 because it was discovered that there was a potential denial of service vulnerability in ConnMan, a command-line network manager designed for use on embedded devices. Network-adjacent attackers operating a specially-crafted DHCP server could have caused a stack-based buffer overflow, resulting in a denial of service through terminating the underlying
connman
process. -
I also filed an 'unblock request' in order to permit the latest version of Redis to transition to the Debian testing distribution in time for the upcoming release. (#1035328)
You can find out more about the Debian LTS project via the following video: