Hi Helmut,

On Thu, Jun 23, 2022 at 8:33 PM Helmut Grohne <hel...@subdivi.de> wrote:
> I've been looking into updating openscad in buster to fix CVE-2022-0496
> and CVE-2022-0497. They're already fixed in bullseye and later. They are
> input sanitization issues and CVE-2022-0496 needed a little porting of
> the patch. I verified that the provided PoCs for CVE-2022-0496 do
> trigger in an asan/ubsan build and no longer trigger after applying the
> patch. The provided PoC for CVE-2022-0497 did not trigger in an
> asan/ubsan build, but the fix is quite obvious and the PoC looks quite
> sensitive to the memory layout, so that's unsurprising. Beyond the
> build-time test suite, autopkgtests also pass.
>
> Given the buster -> LTS transition, I'm unsure where to upload this to.
> Adam's mail seems to indicate that it's late for the point release.

It should go to buster p-u if you really want to fix it but it doesn't
warrant a separate stretch or LTS upload because this is marked as
"unimportant". It's really a crash in the CLI tool so no security
impact that way. The security team has triaged this. Let me know if
you have any further questions.


- u

Reply via email to