A few small questions

debian.org at spam.lublink.net debian.org at spam.lublink.net
Tue Aug 29 01:56:26 BST 2023


Hello Jonas,

I am looking at CVE-2022-42705, fortunately for me the upstream commit 
is strictly the CVE patch we are looking for, so generating the patch 
was straight forward ( I included it as an attachment ).

It looks like old-stable refers to Debian Buster so I ran buster and 
downloaded the package source with 'apt source asterisk' and 'apt-get 
install build-essential devscripts --yes' and 'apt-get build-dep 
asterisk'.

I'm unsure though about how to deal with the quilt patches. Both of the 
files targeted by the patch are downloaded during the ./configure script 
:

[pjproject]  Verifying /tmp/pjproject-2.12.1.tar.bz2
[pjproject]  Verify successful
[pjproject]  Unpacking /tmp/pjproject-2.12.1.tar.bz2
[pjproject]  Applying patches 
/opt/asterisk-16.28.0~dfsg/third-party/pjproject/patches 
/opt/asterisk-16.28.0~dfsg/third-party/pjproject/source
[pjproject]  Applying user.mak
[pjproject]  Rebuilding
[pjproject]  Applying custom

I notice that the pjproject folder has patches in it, this does not seem 
covered by quilt.

Question 1 : Where should I drop the patch ? Should my patch in 
debian/patches generate a patch in third-party/pjproject/patches ?


Question 2 : Where do I write the test and how should I execute it ?

I see there is the folder debian/tests, but it doesn't seem to contain 
tests for other CVEs. I also checked tests/ and saw no mention of 
previous CVE. Where do I write the test and where/how do I run it?

Question 3 : Which version am I testing against? Is there a git branch I 
should be using instead of using the source package directly from the 
repo?



Thanks!

David





On 2023-08-28 19:35, debian.org at spam.lublink.net wrote:
> On 2023-08-28 16:45, Jonas Smedegaard wrote:
>> Quoting debian.org at spam.lublink.net (2023-08-27 23:31:35)
>>> what next smalls steps can we take ?
>> 
>> The developer's overview is https://tracker.debian.org/pkg/asterisk
>> 
>> In the "actions needed" in the middle of that is listed 3 security
>> issues in stable.
>> 
>> It would be helpful if you could...
>>   * try compose a test for each of those bugs
>>   * try isolate a minimal diff for each of those bugfixes,
>>     to be applied to the package in stable
>>   * check that the tests are succesful with the patches applie.
>> 
>> 
>> 
>> Kind regards,
>> 
>>  - Jonas
> challenge accepted
-------------- next part --------------
A non-text attachment was scrubbed...
Name: cve-2022-42705.patch
Type: text/x-diff
Size: 2549 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-voip-maintainers/attachments/20230828/bcd62b8a/attachment.patch>


More information about the Pkg-voip-maintainers mailing list