Your message dated Sat, 08 Feb 2020 14:23:35 +0000 with message-id <a894a0233c2d264936953d7a69507573c4a5742a.camel@adam-barratt.org.uk> and subject line Closing bugs included in 9.12 has caused the Debian Bug report #948219, regarding stretch-pu: package ros-ros-comm/1.12.6-2+deb9u2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 948219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948219 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: stretch-pu: package ros-ros-comm/1.12.6-2
- From: Jochen Sprickerhof <jspricke@debian.org>
- Date: Sun, 05 Jan 2020 15:53:47 +0100
- Message-id: <157823602786.37096.9296319347576758738.reportbug@fenchel>
Package: release.debian.org Severity: normal Tags: stretch User: release.debian.org@packages.debian.org Usertags: pu Hi release team, The ros-ros-comm version in stretch is affected by two new CVEs: CVE-2019-13465 and CVE-2019-13445. The first one was already fixed by 1.12.6-2+deb9u1, cf. #945944, but the second one is new. The attached patch is against 1.12.6-2+deb9u1 and also adopts the changelog to mention the second CVE. Cheers Jochen -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.4.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enableddiff --git a/debian/changelog b/debian/changelog index b4bfdc6..7630a9a 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,6 +1,12 @@ +ros-ros-comm (1.12.6-2+deb9u2) stretch; urgency=medium + + * Add https://github.com/ros/ros_comm/pull/1741 (Fix CVE-2019-13445) + + -- Jochen Sprickerhof <jspricke@debian.org> Sun, 05 Jan 2020 15:45:11 +0100 + ros-ros-comm (1.12.6-2+deb9u1) stretch; urgency=high - * Add https://github.com/ros/ros_comm/pull/1771 (Fix CVE-2019-13566) + * Add https://github.com/ros/ros_comm/pull/1771 (Fix CVE-2019-13566, CVE-2019-13465) -- Jochen Sprickerhof <jspricke@debian.org> Sun, 24 Nov 2019 17:03:50 +0100 diff --git a/debian/patches/1741.patch b/debian/patches/1741.patch new file mode 100644 index 0000000..86b4b35 --- /dev/null +++ b/debian/patches/1741.patch @@ -0,0 +1,21 @@ +From: Christopher Wecht <christopher.wechtstudent.kit.edu> +Date: Thu, 4 Jul 2019 21:19:14 +0200 +Subject: [PATCH] rosbag/record: fix signed int overflow + +--- + tools/rosbag/src/record.cpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/tools/rosbag/src/record.cpp b/tools/rosbag/src/record.cpp +index dda378f..95e3413 100644 +--- a/tools/rosbag/src/record.cpp ++++ b/tools/rosbag/src/record.cpp +@@ -121,7 +121,7 @@ rosbag::RecorderOptions parseOptions(int argc, char** argv) { + ROS_WARN("Use of \"--split <MAX_SIZE>\" has been deprecated. Please use --split --size <MAX_SIZE> or --split --duration <MAX_DURATION>"); + if (S < 0) + throw ros::Exception("Split size must be 0 or positive"); +- opts.max_size = 1048576 * S; ++ opts.max_size = 1048576 * static_cast<uint64_t>(S); + } + } + if(vm.count("max-splits")) diff --git a/debian/patches/series b/debian/patches/series index 6695bde..bbadad6 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -5,3 +5,4 @@ 0005-Add-defaults-to-roswtf.patch 0007-move-heaers-to-include-xmlrpcpp.patch 0007-fixing-string-check.patch +1741.patch
--- End Message ---
--- Begin Message ---
- To: 887324-done@bugs.debian.org, 902487-done@bugs.debian.org, 933263-done@bugs.debian.org, 935728-done@bugs.debian.org, 935970-done@bugs.debian.org, 939364-done@bugs.debian.org, 939897-done@bugs.debian.org, 939907-done@bugs.debian.org, 939967-done@bugs.debian.org, 940246-done@bugs.debian.org, 940477-done@bugs.debian.org, 940714-done@bugs.debian.org, 940715-done@bugs.debian.org, 941126-done@bugs.debian.org, 941169-done@bugs.debian.org, 941350-done@bugs.debian.org, 941452-done@bugs.debian.org, 942024-done@bugs.debian.org, 942110-done@bugs.debian.org, 942839-done@bugs.debian.org, 942840-done@bugs.debian.org, 942841-done@bugs.debian.org, 943352-done@bugs.debian.org, 943564-done@bugs.debian.org, 943606-done@bugs.debian.org, 944186-done@bugs.debian.org, 944233-done@bugs.debian.org, 944282-done@bugs.debian.org, 944794-done@bugs.debian.org, 944866-done@bugs.debian.org, 945821-done@bugs.debian.org, 945944-done@bugs.debian.org, 946159-done@bugs.debian.org, 946185-done@bugs.debian.org, 946558-done@bugs.debian.org, 946560-done@bugs.debian.org, 946570-done@bugs.debian.org, 946654-done@bugs.debian.org, 946704-done@bugs.debian.org, 946824-done@bugs.debian.org, 946907-done@bugs.debian.org, 947204-done@bugs.debian.org, 947255-done@bugs.debian.org, 947747-done@bugs.debian.org, 947834-done@bugs.debian.org, 948219-done@bugs.debian.org, 948391-done@bugs.debian.org, 948401-done@bugs.debian.org, 948465-done@bugs.debian.org, 948649-done@bugs.debian.org, 948704-done@bugs.debian.org, 948715-done@bugs.debian.org, 948730-done@bugs.debian.org, 948737-done@bugs.debian.org, 948898-done@bugs.debian.org, 949838-done@bugs.debian.org, 949853-done@bugs.debian.org, 949900-done@bugs.debian.org, 949905-done@bugs.debian.org, 949907-done@bugs.debian.org, 949909-done@bugs.debian.org, 950156-done@bugs.debian.org, 950256-done@bugs.debian.org, 950281-done@bugs.debian.org, 950309-done@bugs.debian.org
- Subject: Closing bugs included in 9.12
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 08 Feb 2020 14:23:35 +0000
- Message-id: <a894a0233c2d264936953d7a69507573c4a5742a.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 9.12 Hi, Each of the uploads referred to by these bugs was included in today's oldstable point release. Regards, Adam
--- End Message ---