Report forwarded
to debian-bugs-dist@lists.debian.org, Miriam Ruiz <little_miry@yahoo.es>: Bug#684229; Package calibre.
(Wed, 08 Aug 2012 00:03:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Silvio Cesare <silvio.cesare@gmail.com>:
New Bug report received and forwarded. Copy sent to Miriam Ruiz <little_miry@yahoo.es>.
(Wed, 08 Aug 2012 00:03:04 GMT) (full text, mbox, link).
Package: calibre
Severity: important
Tags: security
I have been working on a tool called Clonewise to automatically identify
embedded code copies in Debian packages and determine if they are out of
date and vulnerable. Ideally, embedding code and libraries should be
avoided and a system wide library should be used instead.
I recently ran the tool on Debian 6 stable. The results are here at
http://www.foocodechu.com/downloads/Clonewise-report.txt*
*The calibre package reported potential issues appended to this message.
Apologies if these are false positives. Your help in advising me on whether
these issues are real will help me improve the analysis for the future.
--
Silvio Cesare
Deakin University
### Summary:
###
feedparser CLONED_IN_SOURCE calibre <unfixed> CVE-2011-1156
feedparser CLONED_IN_SOURCE calibre <unfixed> CVE-2011-1157
feedparser CLONED_IN_SOURCE calibre <unfixed> CVE-2011-1158
### Reports by package:
###
# Package calibre may be vulnerable to the following issues:
#
CVE-2011-1156CVE-2011-1157CVE-2011-1158
# SUMMARY: feedparser.py in Universal Feed Parser (aka feedparser or
python-feedparser) before 5.0.1 allows remote attackers to cause a
denial of service (application crash) via a malformed DOCTYPE
declaration.
#
# CVE-2011-1156 relates to a vulnerability in package feedparser.
# The following source filenames are likely responsible:
# feedparser.py
#
# The following package clones are tracked in the embedded-code-copies
# database. They have not been fixed.
#
feedparser CLONED_IN_SOURCE calibre <unfixed> CVE-2011-1156
# SUMMARY: Cross-site scripting (XSS) vulnerability in feedparser.py
in Universal Feed Parser (aka feedparser or python-feedparser) 5.x
before 5.0.1 allows remote attackers to inject arbitrary web script or
HTML via malformed XML comments.
#
# CVE-2011-1157 relates to a vulnerability in package feedparser.
# The following source filenames are likely responsible:
# feedparser.py
#
# The following package clones are tracked in the embedded-code-copies
# database. They have not been fixed.
#
feedparser CLONED_IN_SOURCE calibre <unfixed> CVE-2011-1157
# SUMMARY: Cross-site scripting (XSS) vulnerability in feedparser.py
in Universal Feed Parser (aka feedparser or python-feedparser) 5.x
before 5.0.1 allows remote attackers to inject arbitrary web script or
HTML via an unexpected URI scheme, as demonstrated by a javascript:
URI.
#
# CVE-2011-1158 relates to a vulnerability in package feedparser.
# The following source filenames are likely responsible:
# feedparser.py
#
# The following package clones are tracked in the embedded-code-copies
# database. They have not been fixed.
#
feedparser CLONED_IN_SOURCE calibre <unfixed> CVE-2011-1158
**
To: Silvio Cesare <silvio.cesare@gmail.com>, 684229-done@bugs.debian.org
Subject: Re: Bug#684229: feedparser code embedded in calibre and possibly may
be out of date and vulnerable
Date: Thu, 16 Aug 2012 09:44:54 +0200
Hello Silvio,
Silvio Cesare [2012-08-08 10:01 +1000]:
> *The calibre package reported potential issues appended to this message.
Indeed calibre's source package contains a copy of feedparser, but we
have a debian/patches/use-system-feedparser.patch to use the
python-feedparser package and to be double-sure, debian/rules does
rm debian/tmp/usr/lib/calibre/calibre/web/feeds/feedparser.py
> Apologies if these are false positives. Your help in advising me on
> whether these issues are real will help me improve the analysis for
> the future.
Perhaps you can check the .debs if the code copies are actually
packaged? That wouldn't work for C libraries, but should work well for
scripting languages like Perl, Python, etc.
Closing this bug as the calibre package is not actually affected.
Thanks for doing these scans though, it's really great to have tools
like this! Is there a way to mark this particular issue as "checked,
not a problem" in your tool?
Thanks,
Martin
--
Martin Pitt | http://www.piware.de
Ubuntu Developer (www.ubuntu.com) | Debian Developer (www.debian.org)
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 14 Sep 2012 07:27:00 GMT) (full text, mbox, link).
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.