Package: release.debian.org Severity: normal Tags: jessie User: release.debian....@packages.debian.org Usertags: pu
Dear release team, In order to fix CVE-2015-5695, I have prepared an updated package for Designate. The security team has already told me to go through the release team for the Jessie update. Debdiff attached, and package prepared over here: http://sid.gplhost.com/jessie-proposed-updates/designate/ Note that I have already fixed the package in Sid, and hopefully, it will soon migrate to testing. Please let me know if it is ok for uploading. Cheers, Thomas Goirand (zigo)
diff -Nru designate-2014.1/debian/changelog designate-2014.1/debian/changelog --- designate-2014.1/debian/changelog 2015-01-09 00:17:00.000000000 +0000 +++ designate-2014.1/debian/changelog 2015-08-26 09:17:49.000000000 +0000 @@ -1,3 +1,10 @@ +designate (2014.1-18+deb8u1) jessie-proposed-updates; urgency=medium + + * CVE-2015-5695: mDNS DoS through incorrect handling of large RecordSets: + applied upstream patch (Closes: #796108). + + -- Thomas Goirand <z...@debian.org> Wed, 26 Aug 2015 11:04:54 +0200 + designate (2014.1-18) unstable; urgency=medium * Removed dbc_upgrade = true check before db sync. diff -Nru designate-2014.1/debian/patches/CVE-2015-5695-Ensure-RecordSet-quotas-are-enforced.patch designate-2014.1/debian/patches/CVE-2015-5695-Ensure-RecordSet-quotas-are-enforced.patch --- designate-2014.1/debian/patches/CVE-2015-5695-Ensure-RecordSet-quotas-are-enforced.patch 1970-01-01 00:00:00.000000000 +0000 +++ designate-2014.1/debian/patches/CVE-2015-5695-Ensure-RecordSet-quotas-are-enforced.patch 2015-08-26 09:17:49.000000000 +0000 @@ -0,0 +1,46 @@ +Subject: [PATCH] Ensure RecordSet quotas are enforced + Implement RecordSet's per domain, and Records per RecordSet quota enforcement. +Author: Kiall Mac Innes <ki...@macinnes.ie> +Date: Wed, 19 Aug 2015 09:39:49 -0500 +Change-Id: If7afc70cd1ebe2e18864859de51c6ccd15c6a43c +Bug-Ubuntu: https://bugs.launchpad.net/designate/+bug/1471161 +Bug-Debian: https://bugs.debian.org/796108 +Origin: upstream +Last-Update: 2015-08-26 + +diff --git a/designate/central/service.py b/designate/central/service.py +index 564da48..25367b6 100644 +--- a/designate/central/service.py ++++ b/designate/central/service.py +@@ -255,8 +255,12 @@ class Service(rpc_service.Service): + self.quota.limit_check(context, tenant_id, domains=count) + + def _enforce_recordset_quota(self, context, domain): +- # TODO(kiall): Enforce RRSet Quotas +- pass ++ # Ensure the recordsets per domain quota is OK ++ criterion = {'domain_id': domain['id']} ++ count = self.storage.count_recordsets(context, criterion) ++ ++ self.quota.limit_check( ++ context, domain['tenant_id'], domain_recordsets=count) + + def _enforce_record_quota(self, context, domain, recordset): + # Ensure the records per domain quota is OK +@@ -266,7 +270,12 @@ class Service(rpc_service.Service): + self.quota.limit_check(context, domain['tenant_id'], + domain_records=count) + +- # TODO(kiall): Enforce Records per RRSet Quotas ++ # Ensure the records per recordset quota is OK ++ criterion = {'recordset_id': recordset['id']} ++ count = self.storage.count_records(context, criterion) ++ ++ self.quota.limit_check(context, domain['tenant_id'], ++ recordset_records=count) + + # Misc Methods + def get_absolute_limits(self, context): +-- +2.1.4 + diff -Nru designate-2014.1/debian/patches/series designate-2014.1/debian/patches/series --- designate-2014.1/debian/patches/series 2015-01-09 00:17:00.000000000 +0000 +++ designate-2014.1/debian/patches/series 2015-08-26 09:17:49.000000000 +0000 @@ -1,3 +1,4 @@ fixes-keystone-authtoken.patch allow-sqla-9.patch no-SSLv3.patch +CVE-2015-5695-Ensure-RecordSet-quotas-are-enforced.patch