A few small questions
debian.org at spam.lublink.net
debian.org at spam.lublink.net
Sun Sep 3 17:28:48 BST 2023
Hello Jonas,
I poked around salsa and found the folder Xpjproject in branch
debian/latest, and according to debian/rules, this seems to be building
pjproject-2.12.1.tar.bz2 for the newer releases. This version already
has patches for the 3 CVEs.
I tried checking out the git branch buster, and found that the
Xpjproject folder doesn't exist and I only found the file
pjproject_2.8~dfsg.orig.tar.bz2 ( in debian/ ) .
How would I produce a patch for this ? Should I decompress the tar.bz2
file, patch it, recompress it and then apply the generate a binary patch
?
I notice there is no git branch for bullseye, is git branching still
used?
1:16.2.1~dfsg-1+deb10u2 is the only version of Asterisk that is
reportedly still affected by the three CVEs, why do we need to patch
this if buster-security contains a fixed version? If we do need to patch
it, where do I post the patch? Git branch?
What are my next steps here?
Thanks,
David Lublink
On 2023-08-28 20:56, debian.org at spam.lublink.net wrote:
> Hello Jonas,
>
> I am looking at CVE-2022-42705, fortunately for me the upstream commit
> is strictly the CVE patch we are looking for, so generating the patch
> was straight forward ( I included it as an attachment ).
>
> It looks like old-stable refers to Debian Buster so I ran buster and
> downloaded the package source with 'apt source asterisk' and 'apt-get
> install build-essential devscripts --yes' and 'apt-get build-dep
> asterisk'.
>
> I'm unsure though about how to deal with the quilt patches. Both of the
> files targeted by the patch are downloaded during the ./configure
> script :
>
> [pjproject] Verifying /tmp/pjproject-2.12.1.tar.bz2
> [pjproject] Verify successful
> [pjproject] Unpacking /tmp/pjproject-2.12.1.tar.bz2
> [pjproject] Applying patches
> /opt/asterisk-16.28.0~dfsg/third-party/pjproject/patches
> /opt/asterisk-16.28.0~dfsg/third-party/pjproject/source
> [pjproject] Applying user.mak
> [pjproject] Rebuilding
> [pjproject] Applying custom
>
> I notice that the pjproject folder has patches in it, this does not
> seem covered by quilt.
>
> Question 1 : Where should I drop the patch ? Should my patch in
> debian/patches generate a patch in third-party/pjproject/patches ?
>
>
> Question 2 : Where do I write the test and how should I execute it ?
>
> I see there is the folder debian/tests, but it doesn't seem to contain
> tests for other CVEs. I also checked tests/ and saw no mention of
> previous CVE. Where do I write the test and where/how do I run it?
>
> Question 3 : Which version am I testing against? Is there a git branch
> I should be using instead of using the source package directly from the
> repo?
>
>
>
> Thanks!
>
> David
>
>
>
>
>
> On 2023-08-28 19:35, debian.org at spam.lublink.net wrote:
>> On 2023-08-28 16:45, Jonas Smedegaard wrote:
>>> Quoting debian.org at spam.lublink.net (2023-08-27 23:31:35)
>>>> what next smalls steps can we take ?
>>>
>>> The developer's overview is https://tracker.debian.org/pkg/asterisk
>>>
>>> In the "actions needed" in the middle of that is listed 3 security
>>> issues in stable.
>>>
>>> It would be helpful if you could...
>>> * try compose a test for each of those bugs
>>> * try isolate a minimal diff for each of those bugfixes,
>>> to be applied to the package in stable
>>> * check that the tests are succesful with the patches applie.
>>>
>>>
>>>
>>> Kind regards,
>>>
>>> - Jonas
>> challenge accepted
More information about the Pkg-voip-maintainers
mailing list