<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>39303</bug_id>
          
          <creation_ts>2020-11-16 23:39:25 +0300</creation_ts>
          <short_desc>Версия c-ares 1.17.0 исправляет CVE-2020-8277</short_desc>
          <delta_ts>2020-11-17 17:01:15 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>libcares</component>
          <version>unstable</version>
          <rep_platform>x86_64</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>https://github.com/c-ares/c-ares/issues/371</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P5</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vitaly Lipatov">lav</reporter>
          <assigned_to name="Anton Farygin">rider</assigned_to>
          <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>194267</commentid>
    <comment_count>0</comment_count>
    <who name="Vitaly Lipatov">lav</who>
    <bug_when>2020-11-16 23:39:25 +0300</bug_when>
    <thetext>Версия c-ares 1.17.0 исправляет CVE-2020-8277.

https://github.com/c-ares/c-ares/issues/371

security release node 14.15.1 от 2020-11-16 заключается только в патче для c-ares, исправляющем
CVE-2020-8277: Denial of Service through DNS request (High). A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service by getting the application to resolve a DNS record with a larger number of responses.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>194279</commentid>
    <comment_count>1</comment_count>
    <who name="Anton Farygin">rider</who>
    <bug_when>2020-11-17 16:54:53 +0300</bug_when>
    <thetext>Сборка 1.17.0 разломана апстримом, они чинят.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>194280</commentid>
    <comment_count>2</comment_count>
    <who name="Anton Farygin">rider</who>
    <bug_when>2020-11-17 17:01:15 +0300</bug_when>
    <thetext>ну а пока они чинят я приложил апстримный патч к 1.16.1 в 1.16.1-alt2</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>