seafile: CVE-2013-7469

Related Vulnerabilities: CVE-2013-7469  

Debian Bug report logs - #923009
seafile: CVE-2013-7469

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 22 Feb 2019 22:48:01 UTC

Severity: important

Tags: security, upstream

Found in version seafile/6.2.11-1

Forwarded to https://github.com/haiwen/seafile/issues/350

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>:
Bug#923009; Package src:seafile. (Fri, 22 Feb 2019 22:48:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>. (Fri, 22 Feb 2019 22:48:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: seafile: CVE-2013-7469
Date: Fri, 22 Feb 2019 23:46:04 +0100
Source: seafile
Version: 6.2.11-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/haiwen/seafile/issues/350

Hi,

The following vulnerability was published for seafile.

CVE-2013-7469[0]:
| Seafile through 6.2.11 always uses the same Initialization Vector (IV)
| with Cipher Block Chaining (CBC) Mode to encrypt private data, making
| it easier to conduct chosen-plaintext attacks or dictionary attacks.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2013-7469
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7469
[1] https://github.com/haiwen/seafile/issues/350

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>:
Bug#923009; Package src:seafile. (Tue, 05 Mar 2019 11:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to Christoph Martin <martin@uni-mainz.de>:
Extra info received and forwarded to list. Copy sent to Debian Seafile Team <team+seafile@tracker.debian.org>. (Tue, 05 Mar 2019 11:21:03 GMT) (full text, mbox, link).


Message #10 received at 923009@bugs.debian.org (full text, mbox, reply):

From: Christoph Martin <martin@uni-mainz.de>
To: Salvatore Bonaccorso <carnil@debian.org>, <923009@bugs.debian.org>
Subject: Re: Bug#923009: seafile: CVE-2013-7469
Date: Tue, 5 Mar 2019 12:12:31 +0100
[Message part 1 (text/plain, inline)]
Control: tags -1 buster-ignore

Am 22.02.19 um 23:46 schrieb Salvatore Bonaccorso:
> Source: seafile
> Version: 6.2.11-1
> Severity: grave
> Tags: security upstream
> Forwarded: https://github.com/haiwen/seafile/issues/350
> 
> Hi,
> 
> The following vulnerability was published for seafile.
> 
> CVE-2013-7469[0]:
> | Seafile through 6.2.11 always uses the same Initialization Vector (IV)
> | with Cipher Block Chaining (CBC) Mode to encrypt private data, making
> | it easier to conduct chosen-plaintext attacks or dictionary attacks.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2013-7469
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7469
> [1] https://github.com/haiwen/seafile/issues/350

This bug report is pretty late in the release cycle. Also the CVE is
unspecific about the impact of the problem.

As far as I see the problem is only with libraries where the user
enabled encryption for.

Since the transport of the files is secured via a normal webserver with
TLS etc. you encrypted library can only be tried to access locally on
the client or the server.

The cryptographic weekness should at least be documented with the hint
to additionaly use an gpg or zip encrypted file in the library if the
files data is really sensible.

So, I don't consider this bug as a release critical bug for buster. It
can not be fixed the short time which is left for the release.

Christoph

-- 
============================================================================
Christoph Martin, Leiter Unix-Systeme
Zentrum für Datenverarbeitung, Uni-Mainz, Germany
 Anselm Franz von Bentzel-Weg 12, 55128 Mainz
 Telefon: +49(6131)3926337
 Instant-Messaging: Jabber/XMPP: martin@jabber.uni-mainz.de


[signature.asc (application/pgp-signature, attachment)]

Added tag(s) buster-ignore. Request was from Christoph Martin <martin@uni-mainz.de> to 923009-submit@bugs.debian.org. (Tue, 05 Mar 2019 11:21:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>:
Bug#923009; Package src:seafile. (Wed, 06 Mar 2019 22:18:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Seafile Team <team+seafile@tracker.debian.org>. (Wed, 06 Mar 2019 22:18:03 GMT) (full text, mbox, link).


Message #17 received at 923009@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Christoph Martin <martin@uni-mainz.de>
Cc: 923009@bugs.debian.org
Subject: Re: Bug#923009: seafile: CVE-2013-7469
Date: Wed, 6 Mar 2019 23:15:44 +0100
Hi Christoph,

On Tue, Mar 05, 2019 at 12:12:31PM +0100, Christoph Martin wrote:
> Control: tags -1 buster-ignore
> 
> Am 22.02.19 um 23:46 schrieb Salvatore Bonaccorso:
> > Source: seafile
> > Version: 6.2.11-1
> > Severity: grave
> > Tags: security upstream
> > Forwarded: https://github.com/haiwen/seafile/issues/350
> > 
> > Hi,
> > 
> > The following vulnerability was published for seafile.
> > 
> > CVE-2013-7469[0]:
> > | Seafile through 6.2.11 always uses the same Initialization Vector (IV)
> > | with Cipher Block Chaining (CBC) Mode to encrypt private data, making
> > | it easier to conduct chosen-plaintext attacks or dictionary attacks.
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] https://security-tracker.debian.org/tracker/CVE-2013-7469
> >     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7469
> > [1] https://github.com/haiwen/seafile/issues/350
> 
> This bug report is pretty late in the release cycle. Also the CVE is
> unspecific about the impact of the problem.
> 
> As far as I see the problem is only with libraries where the user
> enabled encryption for.
> 
> Since the transport of the files is secured via a normal webserver with
> TLS etc. you encrypted library can only be tried to access locally on
> the client or the server.
> 
> The cryptographic weekness should at least be documented with the hint
> to additionaly use an gpg or zip encrypted file in the library if the
> files data is really sensible.
> 
> So, I don't consider this bug as a release critical bug for buster. It
> can not be fixed the short time which is left for the release.

Yes I think we can agree on that!

Regards,
Salvatore

Quick note on the buster-ignore tag addition, keep in mind that this
is technically only to be used/added by release managers themself, but
maintainers can obviously suggest that to the release managers, cf.
https://www.debian.org/Bugs/Developer#tags



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>:
Bug#923009; Package src:seafile. (Thu, 07 Mar 2019 09:21:04 GMT) (full text, mbox, link).


Acknowledgement sent to Christoph Martin <martin@uni-mainz.de>:
Extra info received and forwarded to list. Copy sent to Debian Seafile Team <team+seafile@tracker.debian.org>. (Thu, 07 Mar 2019 09:21:04 GMT) (full text, mbox, link).


Message #22 received at 923009@bugs.debian.org (full text, mbox, reply):

From: Christoph Martin <martin@uni-mainz.de>
To: Salvatore Bonaccorso <carnil@debian.org>
Cc: <923009@bugs.debian.org>
Subject: Re: Bug#923009: seafile: CVE-2013-7469
Date: Thu, 7 Mar 2019 10:16:46 +0100
[Message part 1 (text/plain, inline)]
Hi Salvatore,

Am 06.03.19 um 23:15 schrieb Salvatore Bonaccorso:
> Hi Christoph,
> 
> On Tue, Mar 05, 2019 at 12:12:31PM +0100, Christoph Martin wrote:
> 
> Yes I think we can agree on that!
> 

So, I'd like to lower the severity to important,

> Quick note on the buster-ignore tag addition, keep in mind that this
> is technically only to be used/added by release managers themself, but
> maintainers can obviously suggest that to the release managers, cf.
> https://www.debian.org/Bugs/Developer#tags

Sorry for that. Is it ok to leave the tag or is a severity change to
important better? The autoremove flag is still active.

Christoph


[signature.asc (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>:
Bug#923009; Package src:seafile. (Thu, 07 Mar 2019 12:39:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Seafile Team <team+seafile@tracker.debian.org>. (Thu, 07 Mar 2019 12:39:06 GMT) (full text, mbox, link).


Message #27 received at 923009@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Christoph Martin <martin@uni-mainz.de>
Cc: 923009@bugs.debian.org
Subject: Re: Bug#923009: seafile: CVE-2013-7469
Date: Thu, 7 Mar 2019 13:36:17 +0100
Control: severity -1 important
Control: tags -1 - buster-ignore

Hi Christoph,

On Thu, Mar 07, 2019 at 10:16:46AM +0100, Christoph Martin wrote:
> Hi Salvatore,
> 
> Am 06.03.19 um 23:15 schrieb Salvatore Bonaccorso:
> > Hi Christoph,
> > 
> > On Tue, Mar 05, 2019 at 12:12:31PM +0100, Christoph Martin wrote:
> > 
> > Yes I think we can agree on that!
> > 
> 
> So, I'd like to lower the severity to important,
> 
> > Quick note on the buster-ignore tag addition, keep in mind that this
> > is technically only to be used/added by release managers themself, but
> > maintainers can obviously suggest that to the release managers, cf.
> > https://www.debian.org/Bugs/Developer#tags
> 
> Sorry for that. Is it ok to leave the tag or is a severity change to
> important better? The autoremove flag is still active.

Yes that sounds good and just doing so now, and as well removing the
tag buster-ignore as raised by Ivo on IRC.

Btw, the autoremove flag should have disaperared otherwise next.

Regards,
Salvatore



Severity set to 'important' from 'grave' Request was from Salvatore Bonaccorso <carnil@debian.org> to 923009-submit@bugs.debian.org. (Thu, 07 Mar 2019 12:39:06 GMT) (full text, mbox, link).


Removed tag(s) buster-ignore. Request was from Salvatore Bonaccorso <carnil@debian.org> to 923009-submit@bugs.debian.org. (Thu, 07 Mar 2019 12:39:07 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Seafile Team <team+seafile@tracker.debian.org>:
Bug#923009; Package src:seafile. (Fri, 08 Mar 2019 10:12:06 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Schlarb <schlarbm@uni-mainz.de>:
Extra info received and forwarded to list. Copy sent to Debian Seafile Team <team+seafile@tracker.debian.org>. (Fri, 08 Mar 2019 10:12:06 GMT) (full text, mbox, link).


Message #36 received at 923009@bugs.debian.org (full text, mbox, reply):

From: Moritz Schlarb <schlarbm@uni-mainz.de>
To: <923009@bugs.debian.org>, Salvatore Bonaccorso <carnil@debian.org>, Christoph Martin <martin@uni-mainz.de>
Subject: Re: Bug#923009: seafile: CVE-2013-7469
Date: Fri, 8 Mar 2019 11:03:04 +0100
[Message part 1 (text/plain, inline)]
Hi there,

we've been in touch with the upstream developers and I want to add the
following to the discussion:

After reading through the code thoroughly, I want to add the
clarification, that the summary of the CVE is not really correct:

Every encrypted library uses the same salt. (That will be fixed by
upstream).

For each encrypted library, PBKDF2 is used to generate the encryption
key and IV from the user-supplied password for that library (and the salt).

That concludes that two libraries only have the same IV, if users used
the same password for them.

I'll try to update the CVE description for more clarity and for an
update on the NVD classification.

Best regards,
-- 
Moritz Schlarb
Unix-Gruppe | Systembetreuung
Zentrum für Datenverarbeitung
Johannes Gutenberg-Universität Mainz
Raum 01-331 - Tel. +49 6131 39-29441
OpenPGP Fingerprint: DF01 2247 BFC6
5501 AFF2 8445 0C24 B841 C7DD BAAF
[schlarbm.vcf (text/x-vcard, attachment)]
[signature.asc (application/pgp-signature, attachment)]

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:37:57 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.