Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.bugs.dist    |    Ohh some weird Debian bug report thing    |    28,835 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 27,289 of 28,835    |
|    Arnaud Rebillout to All    |
|    Bug#1127704: bookworm-pu: package contai    |
|    12 Feb 26 05:20:01    |
      XPost: linux.debian.devel.release       From: arnaudr@debian.org              This is a multi-part MIME message sent by reportbug.                     Package: release.debian.org       Severity: normal       Tags: bookworm       X-Debbugs-Cc: containerd@packages.debian.org       Control: affects -1 + src:containerd       User: release.debian.org@packages.debian.org       Usertags: pu              [ Reason ]              Backport patch for CVE-2025-64329.              The previous upload 1.6.20~ds1-1+deb12u2 had a mistake in the changelog,       and while it fixed CVE-2024-40635, it claimed to have fixed       CVE-2025-64329.              This has been discussed with Maintainer and Security Team, the security       tracker had been updated [1], and Security Team confirmed that I should       proceed with an upload to bookworm-updates.              There's a bit of churn in this debdiff: on top of fixing CVE-2025-64329,       the changes also include:       - fix the _previous_ changelog entry       - rename a patch that fixes a CVE, for clarity              You can also see the changes on Salsa at [2], in case you find it easier       to see the Git history.              [1]: https://deb.freexian.com/extended-lts/tracker/source-package/containerd       [2]: https://salsa.debian.org/arnaudr/containerd/-/commits/debia       /bookworm?ref_type=heads              [ Impact ]              Impact of CVE-2025-64329 is that a malicious user can exhaust memory on       the host by exploiting a bug in the CRI Attach implementation (goroutine       leaks).              [ Tests ]              I didn't come up with a test to confirm the fix , but the patch (that       comes from upstream) applies rather cleany. I did test that there's no       regression (ie. attaching to a running container still works).              [ Risks ]              The patch is rather trivial.              [ Checklist ]        [x] *all* changes are documented in the d/changelog        [x] I reviewed all changes and I approve them        [x] attach debdiff against the package in (old)stable        [x] the issue is verified as fixed in unstable              [ Changes ]              Backport patch for CVE-2025-64329: a malicious user can exhaust memory       on the host by exploiting a bug in the CRI Attach implementation       (goroutine leaks).              Fix previous changelog entry (1.6.20~ds1-1+deb12u2).              Rename a patch that fixes a CVE with the name of the CVE itself, for       clarity.              Best,              Arnaud              diff -Nru containerd-1.6.20~ds1/debian/changelog containerd-1.6.       0~ds1/debian/changelog       --- containerd-1.6.20~ds1/debian/changelog 2025-11-17 04:57:18.000000000 +0700       +++ containerd-1.6.20~ds1/debian/changelog 2026-02-12 10:30:28.000000000 +0700       @@ -1,9 +1,19 @@       -containerd (1.6.20~ds1-1+deb12u2) bookworm-security; urgency=medium       +containerd (1.6.20~ds1-1+deb12u3) bookworm; urgency=medium              - * Fix overly broad directory permissions, Fixes: CVE-2024-25621       + * Non-maintainer upload.       + * Rename Fix-directory-permissions patch for clarity        * Fix bug in the CRI Attach implementation, Fixes: CVE-2025-64329        Closes: #1120343              + -- Arnaud Rebillout |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca