Hi,

On Fri, May 29, 2020 at 11:29:24AM +0100, Simon McVittie wrote:
> On Thu, 28 May 2020 at 22:41:19 +0200, Salvatore Bonaccorso wrote:
> > The following vulnerability was published for glib-networking.
> > 
> > CVE-2020-13645[0]:
> > | In GNOME glib-networking through 2.64.2, the implementation of
> > | GTlsClientConnection skips hostname verification of the server's TLS
> > | certificate if the application fails to specify the expected server
> > | identity. This is in contrast to its intended documented behavior, to
> > | fail the certificate verification. Applications that fail to provide
> > | the server identity, including Balsa before 2.5.11 and 2.6.x before
> > | 2.6.1, accept a TLS certificate if the certificate is valid for any
> > | host.
> 
> Upstream used codesearch.debian.net to look for vulnerable applications,
> and balsa is the only one they found.
> 
> If I'm understanding the upstream issue reports correctly, the fixed
> version of glib-networking "fails closed", which means that updating
> glib-networking will cause serious regressions in balsa (it will fail to
> validate any server certs, even those that are valid).
> 
> I've reported a balsa bug and set it to block this one. I think the best
> resolution is probably to update balsa in each supported suite first,
> and only then follow up by fixing glib-networking.
> 
> Do the security team intend to do DSAs for this? If yes, the DSA should
> probably recommend updated balsa *and* glib-networking packages. If no,
> we should probably get updated balsa packages into stable-proposed-updates
> before updating glib-networking.

I tend here to have it fixed via a point release rather than a DSA, in
conjunction with the needed balsa update together. Thanks for having
checked as well other reverse dependencies and filling as well the
respective balsa bug.

Regards,
Salvatore

Reply via email to