Bug#1031525: c-ares: CVE-2022-4904

2023-02-18 Thread Markus Koschany
Hi Gregor,

I'm a member of the LTS team. I intend to prepare a DLA release for this issue
so you don't have to. If you could prepare a point update for Bullseye though,
that would be appreciated. 

Cheers,

Markus


signature.asc
Description: This is a digitally signed message part


Bug#1031525: c-ares: CVE-2022-4904

2023-02-18 Thread Salvatore Bonaccorso
Hi Gregor,

On Sat, Feb 18, 2023 at 12:56:39AM +0100, Gregor Jasny wrote:
> Hi Salvatore,
> 
> On 17.02.23 21:31, Salvatore Bonaccorso wrote:
> > The following vulnerability was published for c-ares.
> > 
> > CVE-2022-4904[0]:
> > | buffer overflow in config_sortlist() due to missing string length check
> 
> I uploaded a fixed package for sid and prepared an update for bullseye and
> buster:

Perfect thanks for the upload to unstable. Can you monitor the
situation and make sure the fix land in upcoming bookworm? We are now
in soft freeze (cf.
https://lists.debian.org/debian-devel-announce/2023/02/msg3.html).

> https://salsa.debian.org/debian/c-ares/-/commits/bullseye/
> https://salsa.debian.org/debian/c-ares/-/commits/buster/
> 
> Are you a member of the Debian Security team and could give me the green
> light to upload those two packages into the "security upload queue".

Thanks for peparing them. Yes I am. We have assessed the issue to be
no-dsa (see the security-tracker CVE page), but a fix would be very
welcome in bullseye as well via a point release, can I route you
trough that path?

https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#special-case-uploads-to-the-stable-and-oldstable-distributions


That said, I cannot say about buster, which is now in LTS team hands.
I do not see a no-dsa tag but as well not listed it in the dla-needed
file (triaging in LTS context has probably not yet happened there).
But I suggest to propose the LTS update accordingly to the LTS team.
You can there either do all alone (including the DLA release), or ask
for help in the "paper work" part, and ask a LTS team member to
release the advisory, you doing the upload.

https://lts-team.pages.debian.net/wiki/Development.html

conains information, but as said, you can simply as well just propose
the update, debdiff and prepare the package update only, there is no
requirement you need to do as well the organizational and DLA advisory
releasing part involving the variuous steps.

Thanks already!

Regards,
Salvatore



Bug#1031525: c-ares: CVE-2022-4904

2023-02-17 Thread Gregor Jasny

Hi Salvatore,

On 17.02.23 21:31, Salvatore Bonaccorso wrote:

The following vulnerability was published for c-ares.

CVE-2022-4904[0]:
| buffer overflow in config_sortlist() due to missing string length check


I uploaded a fixed package for sid and prepared an update for bullseye 
and buster:


https://salsa.debian.org/debian/c-ares/-/commits/bullseye/
https://salsa.debian.org/debian/c-ares/-/commits/buster/

Are you a member of the Debian Security team and could give me the green 
light to upload those two packages into the "security upload queue".


Thanks,
Gregor



Bug#1031525: c-ares: CVE-2022-4904

2023-02-17 Thread Salvatore Bonaccorso
Source: c-ares
Version: 1.18.1-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/c-ares/c-ares/pull/497
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: fixed -1 1.19.0-1

Hi,

The following vulnerability was published for c-ares.

CVE-2022-4904[0]:
| buffer overflow in config_sortlist() due to missing string length check

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-4904
https://www.cve.org/CVERecord?id=CVE-2022-4904
[1] https://github.com/c-ares/c-ares/pull/497
[2] 
https://github.com/c-ares/c-ares/commit/9903253c347f9e0bffd285ae3829aef251cc852d

Regards,
Salvatore