Control: severity -1 serious

On Sat, 17 May 2025 13:38:22 +0300, Niko Tyni wrote:

On Mon, Jun 17, 2019 at 10:44:52PM +0200, Raphael Geissert wrote:
Package: libapache-sessionx-perl
Version: 2.01-5
Severity: important
Tags: security

Hi,

As discussed in oss-security[1], libapache-sessionx-perl uses a poor
source of entropy in Apache::Session::Generate::MD5. The critical part
is moving away from rand (e.g. to using urandom), but it would also be
a good time to update the way the id is generated.

The details are in the oss-sec thread.

[1] https://www.openwall.com/lists/oss-security/2019/06/15/1

AFAICS libapache-sessionx-perl only exists to support libembperl-perl.
As we're not going to ship libembperl-perl in trixie due to #1042845,
I wonder if we should remove libapache-sessionx-perl from testing too?

Agreed.
I'm raising the severity to trigger the auto-removal from testing.

Alternatively, the approach taken for libapache-session-perl #930659
(using Crypt::URandom) seems easy to apply here as well.
 
https://sources.debian.org/src/libapache-session-perl/1.94-2/debian/patches/use-crypt-urandom.patch/

Ack, if someone is interested in the package; otherwise just getting it out of testing seems fine to me.


Cheers,
gregor

--
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
`-

Attachment: signature.asc
Description: Digital Signature

Reply via email to