Your message dated Fri, 29 Mar 2019 09:47:49 +0000
with message-id <[email protected]>
and subject line unblock dovecot
has caused the Debian Bug report #925924,
regarding unblock: dovecot/2.3.4.1-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
925924: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925924
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: [email protected]
Usertags: unblock

Please unblock package dovecot.

2.3.4.1-3, which was uploaded to unstable today, fixes two cases of 
buffer overflows (collectively known as CVE-2019-7524). Please allow it 
to migrate to testing as soon as possible. Full source debdiff against 
testing attached.

Thanks,
Apollon

unblock dovecot/2.3.4.1-3
diff -Nru dovecot-2.3.4.1/debian/changelog dovecot-2.3.4.1/debian/changelog
--- dovecot-2.3.4.1/debian/changelog    2019-03-14 11:02:39.000000000 +0200
+++ dovecot-2.3.4.1/debian/changelog    2019-03-25 23:06:01.000000000 +0200
@@ -1,3 +1,10 @@
+dovecot (1:2.3.4.1-3) unstable; urgency=high
+
+  * [07c9212] Fix two buffer overflows when reading oversized FTS headers
+    and/or oversized POP3-UIDL headers (CVE-2019-7524).
+
+ -- Apollon Oikonomopoulos <[email protected]>  Mon, 25 Mar 2019 23:06:01 
+0200
+
 dovecot (1:2.3.4.1-2) unstable; urgency=medium
 
   [ Laurent Bigonville ]
diff -Nru dovecot-2.3.4.1/debian/patches/CVE-2019-7524 
dovecot-2.3.4.1/debian/patches/CVE-2019-7524
--- dovecot-2.3.4.1/debian/patches/CVE-2019-7524        1970-01-01 
02:00:00.000000000 +0200
+++ dovecot-2.3.4.1/debian/patches/CVE-2019-7524        2019-03-25 
23:06:01.000000000 +0200
@@ -0,0 +1,59 @@
+From 2d31f0e08a80217c039be4aaae8de25bed0251f4 Mon Sep 17 00:00:00 2001
+From: Apollon Oikonomopoulos <[email protected]>
+Date: Mon, 25 Mar 2019 23:04:44 +0200
+Subject: [PATCH] Fix CVE-2019-7524
+
+commit ad1350ff036965c33f0aae20432ec73ca84f7819
+Author: Timo Sirainen <[email protected]>
+Date:   Mon Feb 4 19:25:13 2019 -0800
+
+    fts: Fix buffer overflow when reading oversized fts header
+
+commit 89e05f17de80e19078544ef887d83d160491214e
+Author: Timo Sirainen <[email protected]>
+Date:   Mon Feb 4 19:23:02 2019 -0800
+
+    lib-storage: Fix buffer overflow when reading oversized hdr-pop3-uidl 
header
+---
+ src/lib-storage/index/index-pop3-uidl.c | 4 ++--
+ src/plugins/fts/fts-api.c               | 2 +-
+ 2 files changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/src/lib-storage/index/index-pop3-uidl.c 
b/src/lib-storage/index/index-pop3-uidl.c
+index 13b7363ef..e537e9ff5 100644
+--- a/src/lib-storage/index/index-pop3-uidl.c
++++ b/src/lib-storage/index/index-pop3-uidl.c
+@@ -37,7 +37,7 @@ bool index_pop3_uidl_can_exist(struct mail *mail)
+               /* this header isn't set yet */
+               return TRUE;
+       }
+-      memcpy(&uidl, data, size);
++      memcpy(&uidl, data, sizeof(uidl));
+       return mail->uid <= uidl.max_uid_with_pop3_uidl;
+ }
+ 
+@@ -95,7 +95,7 @@ void index_pop3_uidl_update_exists_finish(struct 
mailbox_transaction_context *tr
+ 
+       /* check if we have already the same header */
+       if (size >= sizeof(uidl)) {
+-              memcpy(&uidl, data, size);
++              memcpy(&uidl, data, sizeof(uidl));
+               if (trans->highest_pop3_uidl_uid == uidl.max_uid_with_pop3_uidl)
+                       return;
+       }
+diff --git a/src/plugins/fts/fts-api.c b/src/plugins/fts/fts-api.c
+index 5a5b2a919..4f8a1c125 100644
+--- a/src/plugins/fts/fts-api.c
++++ b/src/plugins/fts/fts-api.c
+@@ -425,7 +425,7 @@ bool fts_index_get_header(struct mailbox *box, struct 
fts_index_header *hdr_r)
+               i_zero(hdr_r);
+               ret = FALSE;
+       } else {
+-              memcpy(hdr_r, data, data_size);
++              memcpy(hdr_r, data, sizeof(*hdr_r));
+               ret = TRUE;
+       }
+       mail_index_view_close(&view);
+-- 
+2.20.1
+
diff -Nru dovecot-2.3.4.1/debian/patches/series 
dovecot-2.3.4.1/debian/patches/series
--- dovecot-2.3.4.1/debian/patches/series       2019-03-14 11:02:39.000000000 
+0200
+++ dovecot-2.3.4.1/debian/patches/series       2019-03-25 23:06:01.000000000 
+0200
@@ -9,4 +9,5 @@
 ssl-dh-params-location.patch
 lib-master-test-event-stats-Use-PRIu64-format.patch
 avoid-double-closing-mysql.patch
+CVE-2019-7524
 debian-changes

--- End Message ---
--- Begin Message ---
Unblocked.

--- End Message ---

Reply via email to