Hey Jonas!

[Cc'ing security team address]

On Thu, Mar 26, 2020 at 12:13:34PM +0100, Jonas Smedegaard wrote:
> Quoting Salvatore Bonaccorso (2020-03-25 21:07:13)
> > Source: libunivalue
> > Version: 1.0.4-2
> > Severity: important
> > Tags: security upstream
> > Forwarded: https://github.com/jgarzik/univalue/pull/58
> > 
> > Hi,
> > 
> > The following vulnerability was published for libunivalue.
> > 
> > CVE-2019-18936[0]:
> > | UniValue::read() in UniValue before 1.0.5 allow attackers to cause a
> > | denial of service (the class internal data reaches an inconsistent
> > | state) via input data that triggers an error.
> > 
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] https://security-tracker.debian.org/tracker/CVE-2019-18936
> >     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18936
> > [1] https://github.com/jgarzik/univalue/pull/58
> 
> I have prepared fixed packages for stretch and buster for this issue.
> 
> In case you want to examine my work (I how highly appreciate that!) they 
> are available on newly created branches debian/buster and debian/stretch 
> in git g...@salsa.debian.org:cryptocoin-team/libunivalue.git a.k.a. 
> https://salsa.debian.org/cryptocoin-team/libunivalue.git
> 
> How do I proceed?

Many thanks for working on fixes in all affected branches. I quickly
skimmed over the cherry-picked patch and it looks good to me. That
said though the issue looks to me more a no-DSA candidate, and could
be fixed in a regular point release.

Unless you feel I'm overlooking something important, can I route you
there?
https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#special-case-uploads-to-the-stable-and-oldstable-distributions
contains some information.

Thank you!

Regards,
Salvatore

Reply via email to