Your message dated Sat, 10 Nov 2018 10:42:56 +0000 with message-id <1541846576.3542.38.camel@adam-barratt.org.uk> and subject line Closing bugs for updates included in 9.6 has caused the Debian Bug report #906042, regarding stretch-pu: package libxcursor/1:1.1.14-1+deb9u2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 906042: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906042 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: stretch-pu: package libxcursor/1:1.1.14-1+deb9u2
- From: Chris Lamb <lamby@debian.org>
- Date: Mon, 13 Aug 2018 15:26:27 +0100
- Message-id: <1534170387.1420721.1472500432.38DD19BC@webmail.messagingengine.com>
Package: release.debian.org Severity: normal Tags: stretch User: release.debian.org@packages.debian.org Usertags: pu Dear stable release manager, Please consider libxcursor (1:1.1.14-1+deb9u2) for stretch: libxcursor (1:1.1.14-1+deb9u2) stretch; urgency=high * Fix a denial of service or potentially code execution via a one-byte heap overflow. (CVE-2015-9262) Closes: #906012) The full diff is attached. Regards, -- ,''`. : :' : Chris Lamb `. `'` lamby@debian.org / chris-lamb.co.uk `-diff --git a/debian/changelog b/debian/changelog index a0673f8..ac26e16 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +libxcursor (1:1.1.14-1+deb9u2) stretch; urgency=high + + * Fix a denial of service or potentially code execution via + a one-byte heap overflow. (CVE-2015-9262) Closes: #906012) + + -- Chris Lamb <lamby@debian.org> Mon, 13 Aug 2018 09:09:13 +0200 + libxcursor (1:1.1.14-1+deb9u1) stretch-security; urgency=high * Non-maintainer upload by the Security Team. diff --git a/debian/patches/CVE-2015-9262.patch b/debian/patches/CVE-2015-9262.patch new file mode 100644 index 0000000..1191b93 --- /dev/null +++ b/debian/patches/CVE-2015-9262.patch @@ -0,0 +1,23 @@ +commit 897213f36baf6926daf6d192c709cf627aa5fd05 +Author: shubham shrivastav <shubham.sh@samsung.com> +Date: Fri Jun 5 13:36:22 2015 -0700 + + Insufficient memory for terminating null of string in _XcursorThemeInherits + + Fix does one byte of memory allocation for null termination of string. + https://bugs.freedesktop.org/show_bug.cgi?id=90857 + + Reviewed-by: Keith Packard <keithp@keithp.com> + Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com> + +--- libxcursor-1.1.14.orig/src/library.c ++++ libxcursor-1.1.14/src/library.c +@@ -180,7 +180,7 @@ _XcursorThemeInherits (const char *full) + if (*l != '=') continue; + l++; + while (*l == ' ') l++; +- result = malloc (strlen (l)); ++ result = malloc (strlen (l) + 1); + if (result) + { + r = result; diff --git a/debian/patches/series b/debian/patches/series index b5ab2b3..6570382 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ +CVE-2015-9262.patch Fix-heap-overflows-when-parsing-malicious-files.-CVE.patch
--- End Message ---
--- Begin Message ---
- To: 886146-done@bugs.debian.org, 891566-done@bugs.debian.org, 891651-done@bugs.debian.org, 891652-done@bugs.debian.org, 891801-done@bugs.debian.org, 892764-done@bugs.debian.org, 892774-done@bugs.debian.org, 893749-done@bugs.debian.org, 895537-done@bugs.debian.org, 898741-done@bugs.debian.org, 899050-done@bugs.debian.org, 903656-done@bugs.debian.org, 903786-done@bugs.debian.org, 904196-done@bugs.debian.org, 904199-done@bugs.debian.org, 904213-done@bugs.debian.org, 904307-done@bugs.debian.org, 904662-done@bugs.debian.org, 905232-done@bugs.debian.org, 905712-done@bugs.debian.org, 905762-done@bugs.debian.org, 906042-done@bugs.debian.org, 906088-done@bugs.debian.org, 906145-done@bugs.debian.org, 906167-done@bugs.debian.org, 906741-done@bugs.debian.org, 906814-done@bugs.debian.org, 906857-done@bugs.debian.org, 907124-done@bugs.debian.org, 907386-done@bugs.debian.org, 907584-done@bugs.debian.org, 907719-done@bugs.debian.org, 907865-done@bugs.debian.org, 907899-done@bugs.debian.org, 908357-done@bugs.debian.org, 908388-done@bugs.debian.org, 908389-done@bugs.debian.org, 908474-done@bugs.debian.org, 908612-done@bugs.debian.org, 908893-done@bugs.debian.org, 908913-done@bugs.debian.org, 908956-done@bugs.debian.org, 908958-done@bugs.debian.org, 909007-done@bugs.debian.org, 909119-done@bugs.debian.org, 909526-done@bugs.debian.org, 909807-done@bugs.debian.org, 909842-done@bugs.debian.org, 909953-done@bugs.debian.org, 910065-done@bugs.debian.org, 910371-done@bugs.debian.org, 910396-done@bugs.debian.org, 910398-done@bugs.debian.org, 910445-done@bugs.debian.org, 910481-done@bugs.debian.org, 910610-done@bugs.debian.org, 910628-done@bugs.debian.org, 910629-done@bugs.debian.org, 910719-done@bugs.debian.org, 910821-done@bugs.debian.org, 910969-done@bugs.debian.org, 911114-done@bugs.debian.org, 911186-done@bugs.debian.org, 911220-done@bugs.debian.org, 911244-done@bugs.debian.org, 911347-done@bugs.debian.org, 911494-done@bugs.debian.org, 911767-done@bugs.debian.org, 911992-done@bugs.debian.org, 912032-done@bugs.debian.org, 912159-done@bugs.debian.org, 912169-done@bugs.debian.org, 912170-done@bugs.debian.org, 912191-done@bugs.debian.org, 912194-done@bugs.debian.org, 912198-done@bugs.debian.org, 912336-done@bugs.debian.org, 912401-done@bugs.debian.org, 912425-done@bugs.debian.org, 912444-done@bugs.debian.org, 912462-done@bugs.debian.org, 912629-done@bugs.debian.org, 912770-done@bugs.debian.org, 912820-done@bugs.debian.org
- Subject: Closing bugs for updates included in 9.6
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 10 Nov 2018 10:42:56 +0000
- Message-id: <1541846576.3542.38.camel@adam-barratt.org.uk>
Version: 9.6 Hi, The update referenced by each of these bugs was included in this morning's stretch point release. Regards, Adam
--- End Message ---