Hi,

On Thu, Jan 16, 2025 at 09:31:20PM +0100, Andrej Shadura wrote:
> Package: release.debian.org
> Severity: normal
> Tags: bookworm
> X-Debbugs-Cc: 389-ds-b...@packages.debian.org, Timo Aaltonen 
> <tjaal...@debian.org>
> Control: affects -1 + src:389-ds-base
> User: release.debian....@packages.debian.org
> Usertags: pu
> 
> [ Reason ]
> 
> The current version in bookworm has at least four CVEs unfixed which
> are trivially fixable by applying patches from the relevant upstream
> branch. These CVEs will be fixed by the upcoming LTS upload into
> bullseye, so to make sure users keep these fixes when they switch
> to bookworm, we need to get them fixed in bookworm too.
> 
> [ Impact ]
> 
> None except the server won't crash in certain situations.
> 
> [ Tests ]
> 
> Only the automated tests which run during the package build.
> 
> [ Risks ]
> 
> The changes are relatively simple and come with significant test
> coverage.
> 
> [ Checklist ]
>   [x] *all* changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in (old)stable
>   [x] the issue is verified as fixed in unstable
> 
> [ Changes ]
> 
> The following were cherry-picks with no other changes from the
> upstream’s Git repostitory, branch 2.4.6:
> 
>  - Security fix for CVE-2024-3657
>  - Security fix for CVE-2024-5953
>  - Security fix for CVE-2024-8445
>  - Security fix for CVE-2024-2199

I have a question on the followup for CVE-2024-2199, CVE-2024-8445
exists because of an incomplete fix for CVE-2024-2199. What is the
orgin of the applied patch for CVE-2024-8445? 

It has, AFAICS as well not yet as well addressed in unstable? Is the
applied fix validated from upstream?

Regards,
Salvatore

Reply via email to