fedmsg: CVE-2017-1000001

Related Vulnerabilities: CVE-2017-1000001  

Debian Bug report logs - #868508
fedmsg: CVE-2017-1000001

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 16 Jul 2017 09:03:01 UTC

Severity: grave

Tags: security, upstream

Found in version fedmsg/0.9.3-1

Fixed in version 0.9.3-2+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Python Modules Team <python-modules-team@lists.alioth.debian.org>:
Bug#868508; Package src:fedmsg. (Sun, 16 Jul 2017 09:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Python Modules Team <python-modules-team@lists.alioth.debian.org>. (Sun, 16 Jul 2017 09:03:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: fedmsg: CVE-2017-1000001
Date: Sun, 16 Jul 2017 10:59:03 +0200
Source: fedmsg
Version: 0.9.3-1
Severity: important
Tags: upstream security

Hi,

the following vulnerability was published for fedmsg.

CVE-2017-1000001[0]:
| FedMsg 0.18.1 and older is vulnerable to a message validation flaw
| resulting in message validation not being enabled if configured to be
| on.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-1000001
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000001
[1] https://github.com/fedora-infra/fedmsg/commit/5c21cf88a

Regards,
Salvatore



Severity set to 'grave' from 'important' Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 19 Jul 2017 04:27:02 GMT) (full text, mbox, link).


Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Wed, 02 Aug 2017 18:09:15 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Wed, 02 Aug 2017 18:09:15 GMT) (full text, mbox, link).


Message #12 received at 868508-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 778419-done@bugs.debian.org,808654-done@bugs.debian.org,842156-done@bugs.debian.org,855924-done@bugs.debian.org,868508-done@bugs.debian.org,
Cc: fedmsg@packages.debian.org, fedmsg@packages.qa.debian.org
Subject: Bug#868818: Removed package(s) from unstable
Date: Wed, 02 Aug 2017 18:07:45 +0000
Version: 0.9.3-2+rm

Dear submitter,

as the package fedmsg has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/868818

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Chris Lamb (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 31 Aug 2017 07:25:39 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:33:13 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.