Your message dated Fri, 19 Mar 2021 19:32:08 +0000
with message-id <e1lnkqu-000iuh...@fasolo.debian.org>
and subject line Bug#983013: fixed in m2crypto 0.31.0-4+deb10u2
has caused the Debian Bug report #983013,
regarding m2crypto: autopkgtest needs update for new version of openssl: 
M2Crypto.RSA.RSAError: sslv3 rollback attack
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
983013: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983013
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: m2crypto
Version: 0.37.1-1
Severity: serious
X-Debbugs-CC: debian...@lists.debian.org, open...@packages.debian.org
Tags: sid bullseye
User: debian...@lists.debian.org
Usertags: needs-update
Control: affects -1 src:openssl

Dear maintainer(s),

With a recent upload of openssl the autopkgtest of m2crypto fails in
testing when that autopkgtest is run with the binary packages of openssl
from unstable. It passes when run with only packages from testing. In
tabular form:

                       pass            fail
openssl                from testing    1.1.1j-1
m2crypto               from testing    0.37.1-1
all others             from testing    from testing

I copied some of the output at the bottom of this report.  I *think*
this may be related to CVE-2020-25657 "bleichenbacher timing attacks in
the RSA decryption API" against m2crypto, hence I file this bug against
m2crypto.

Currently this regression is blocking the migration of openssl to
testing [1]. Of course, openssl shouldn't just break your autopkgtest
(or even worse, your package), but it seems to me that the change in
openssl was intended and your package needs to update to the new situation.

If this is a real problem in your package (and not only in your
autopkgtest), the right binary package(s) from openssl should really add
a versioned Breaks on the unfixed version of (one of your) package(s).
Note: the Breaks is nice even if the issue is only in the autopkgtest as
it helps the migration software to figure out the right versions to
combine in the tests.

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=openssl

https://ci.debian.net/data/autopkgtest/testing/amd64/m/m2crypto/10541025/log.gz

=================================== FAILURES
===================================
_______________________ RSATestCase.test_public_encrypt
________________________

self = <tests.test_rsa.RSATestCase testMethod=test_public_encrypt>

    @unittest.skipIf(m2.OPENSSL_VERSION_NUMBER < 0x1010103f,
                     'Relies on fix which happened only in OpenSSL 1.1.1c')
    def test_public_encrypt(self):
        priv = RSA.load_key(self.privkey)
        # pkcs1_padding, pkcs1_oaep_padding
        for padding in self.e_padding_ok:
            p = getattr(RSA, padding)
            ctxt = priv.public_encrypt(self.data, p)
            ptxt = priv.private_decrypt(ctxt, p)
            self.assertEqual(ptxt, self.data)

        # sslv23_padding
        ctxt = priv.public_encrypt(self.data, RSA.sslv23_padding)
>       res = priv.private_decrypt(ctxt, RSA.sslv23_padding)

tests/test_rsa.py:129:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _

self = <M2Crypto.RSA.RSA object at 0x7f954bddabb0>
data =
b'wf\xdc\xa5\xdf\xca\x95\xc7;\xa4\xdfEWUm/\xa1m\xd8\xa1\x14s&\x1bid\xf4c\\\xbcI\x90[<\x8dE\x89\x1f\xbf\xe9y=\xef\xa9z\...2\xb7\xaaO\x89\x88\xf7P\xee\x9f\xaf\x19B?\x1f\n\xe5\x18Q9\x186\x97gj\x0e)0mg@\xed\xe4~\xf3\xc4\xbe\x1dK#\x9f/\r"N%\x8d'
padding = 2

    def private_decrypt(self, data, padding):
        # type: (bytes, int) -> bytes
        assert self.check_key(), 'key is not initialised'
>       return m2.rsa_private_decrypt(self.rsa, data, padding)
E       M2Crypto.RSA.RSAError: sslv3 rollback attack

/usr/lib/python3/dist-packages/M2Crypto/RSA.py:82: RSAError

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: m2crypto
Source-Version: 0.31.0-4+deb10u2
Done: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>

We believe that the bug you reported is fixed in the latest version of
m2crypto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 983...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <sebast...@breakpoint.cc> (supplier of updated 
m2crypto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 23 Feb 2021 23:41:19 +0100
Source: m2crypto
Architecture: source
Version: 0.31.0-4+deb10u2
Distribution: buster
Urgency: medium
Maintainer: Daniel Stender <sten...@debian.org>
Changed-By: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>
Closes: 979865 983013
Changes:
 m2crypto (0.31.0-4+deb10u2) buster; urgency=medium
 .
   * Non-maintainer upload.
   * debian/patches/MR262.patch
     - fix test failure with recent openssl; Closes: #983013
   * debian/rules
     - skip test_ssl.py during tests, more than 50% of its tests fail on an
       IPv6-only machine; Closes: #979865
Checksums-Sha1:
 d1123c425952c5c1a6042dd7c7f164daad39d4d7 2166 m2crypto_0.31.0-4+deb10u2.dsc
 dc985b3f24d57335df4e2a3c2d104efe7d2d1cd2 60532 
m2crypto_0.31.0-4+deb10u2.debian.tar.xz
Checksums-Sha256:
 d6c1d9943b56c6db0335e4fc12e3bbc00921b9cd7bee671d7f603fff9ae62b1b 2166 
m2crypto_0.31.0-4+deb10u2.dsc
 305a58c431ac553115639ce733ed33ee2c4bac63eb48e00dff4b5135b6ed8dc3 60532 
m2crypto_0.31.0-4+deb10u2.debian.tar.xz
Files:
 c12c0eeda332ff1e48ef9bcc47705b33 2166 python optional 
m2crypto_0.31.0-4+deb10u2.dsc
 f85de78a05983562c6143f90afbeb1fd 60532 python optional 
m2crypto_0.31.0-4+deb10u2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQGzBAEBCgAdFiEEV4kucFIzBRM39v3RBWQfF1cS+lsFAmBNOb4ACgkQBWQfF1cS
+luP3gv+J6EaW47zb4S7IhCKpbyv+6bqeCZu6+HYrt9xye3qXe5DRGT0iXvaUoHd
BzE5PSmf372izvBHKJIUvSANOk1Py/XN6JenWXniNNGt6VOuyVkFQi6bFmE+6nbk
3uVf75oVO6sh/3U7Ns13PxtH/TMcjcjt0a4Itl18Cyq23Ka7TJ5HRLRFEMbSOJMj
QmT+fpsZDnGs25Jdc2vnpBeo9e/WeV9jD7caaV9U1dVP999WQghuwEXv4e7RK2F3
MX8hSsCpu/hDna56hEjiqdcamFQDM5r3A7R/o9TPVAYx0g7vHBkcc49nTfTwNY4W
qMsg4YVDmr7g5/LUK+ReTA+sm2z3B+0U6GTUyiGReM/8IEYcwMBvGOjSjWTCUOLk
eezK2iWy2LSCtenTAhWUdycjbwDmqnLbBkmAPrc3ijdg5LMOzJTpB5QKDJ8NcuIJ
CLnkuNoJtTYH+biJo/t+Q1Xn44RghH5E1O0j0RkHbkn4Azdpgc55z5QkJQYmmnmU
BqdldfXk
=+G36
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to