Your message dated Sat, 26 Mar 2022 12:02:22 +0000 with message-id <540de30a27d37c3ff416b94b1adf7ff2a2cab257.camel@adam-barratt.org.uk> and subject line Closing requests for updates in 10.12 has caused the Debian Bug report #1004055, regarding buster-pu: package raptor2/2.0.14-1.1~deb10u2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1004055: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004055 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Cc: Dave Beckett <dajobe@debian.org>
- Subject: buster-pu: package raptor2/2.0.14-1.1~deb10u2
- From: Thorsten Alteholz <debian@alteholz.de>
- Date: Wed, 19 Jan 2022 22:30:10 +0000 (UTC)
- Message-id: <alpine.DEB.2.21.2201192226460.31852@postfach.intern.alteholz.me>
Package: release.debian.org Severity: normal Tags: buster User: release.debian.org@packages.debian.org Usertags: puThe attached debdiff for raptor2 fixes CVE-2020-25713 in Buster. This CVE is marked as no-dsa by the security team.The same patch is uploaded to Stretch already and nobody complained yet. Thorstendiff -Nru raptor2-2.0.14/debian/changelog raptor2-2.0.14/debian/changelog --- raptor2-2.0.14/debian/changelog 2020-11-06 22:46:38.000000000 +0100 +++ raptor2-2.0.14/debian/changelog 2021-12-27 22:03:02.000000000 +0100 @@ -1,3 +1,11 @@ +raptor2 (2.0.14-1.1~deb10u2) buster; urgency=high + + * Non-maintainer upload by the LTS Team. + * CVE-2020-25713 + Malformed input file can lead to a segfault. + + -- Thorsten Alteholz <debian@alteholz.de> Mon, 27 Dec 2021 22:03:02 +0100 + raptor2 (2.0.14-1.1~deb10u1) buster-security; urgency=high * Non-maintainer upload by the Security Team. diff -Nru raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch --- raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch 1970-01-01 01:00:00.000000000 +0100 +++ raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch 2021-12-27 22:03:02.000000000 +0100 @@ -0,0 +1,30 @@ +From a549457461874157c8c8e8e8a6e0eec06da4fbd0 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com> +Date: Tue, 24 Nov 2020 10:30:20 +0000 +Subject: [PATCH] CVE-2020-25713 raptor2: malformed input file can lead to a + segfault + +due to an out of bounds array access in +raptor_xml_writer_start_element_common + +See: +https://bugs.mageia.org/show_bug.cgi?id=27605 +https://www.openwall.com/lists/oss-security/2020/11/13/1 +https://gerrit.libreoffice.org/c/core/+/106249 +--- + src/raptor_xml_writer.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +Index: raptor2-2.0.14/src/raptor_xml_writer.c +=================================================================== +--- raptor2-2.0.14.orig/src/raptor_xml_writer.c 2021-12-29 23:35:29.272438731 +0100 ++++ raptor2-2.0.14/src/raptor_xml_writer.c 2021-12-29 23:35:29.272438731 +0100 +@@ -221,7 +221,7 @@ + + /* check it wasn't an earlier declaration too */ + for(j = 0; j < nspace_declarations_count; j++) +- if(nspace_declarations[j].nspace == element->attributes[j]->nspace) { ++ if(nspace_declarations[j].nspace == element->attributes[i]->nspace) { + declare_me = 0; + break; + } diff -Nru raptor2-2.0.14/debian/patches/series raptor2-2.0.14/debian/patches/series --- raptor2-2.0.14/debian/patches/series 2020-11-06 22:46:38.000000000 +0100 +++ raptor2-2.0.14/debian/patches/series 2021-12-27 22:03:02.000000000 +0100 @@ -1 +1,2 @@ Calcualte-max-nspace-declarations-correctly-for-XML-.patch +CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch
--- End Message ---
--- Begin Message ---
- To: 959469-done@bugs.debian.org, 985063-done@bugs.debian.org, 987376-done@bugs.debian.org, 992546-done@bugs.debian.org, 992613-done@bugs.debian.org, 995748-done@bugs.debian.org, 996023-done@bugs.debian.org, 996024-done@bugs.debian.org, 996600-done@bugs.debian.org, 996624-done@bugs.debian.org, 996695-done@bugs.debian.org, 996929-done@bugs.debian.org, 996997-done@bugs.debian.org, 997079-done@bugs.debian.org, 998042-done@bugs.debian.org, 998248-done@bugs.debian.org, 998344-done@bugs.debian.org, 1000218-done@bugs.debian.org, 1000341-done@bugs.debian.org, 1000386-done@bugs.debian.org, 1000408-done@bugs.debian.org, 1000473-done@bugs.debian.org, 1000479-done@bugs.debian.org, 1000480-done@bugs.debian.org, 1000486-done@bugs.debian.org, 1000608-done@bugs.debian.org, 1001043-done@bugs.debian.org, 1001149-done@bugs.debian.org, 1001280-done@bugs.debian.org, 1001454-done@bugs.debian.org, 1001556-done@bugs.debian.org, 1001749-done@bugs.debian.org, 1001752-done@bugs.debian.org, 1002297-done@bugs.debian.org, 1002298-done@bugs.debian.org, 1002740-done@bugs.debian.org, 1002912-done@bugs.debian.org, 1003795-done@bugs.debian.org, 1003825-done@bugs.debian.org, 1003826-done@bugs.debian.org, 1003827-done@bugs.debian.org, 1003841-done@bugs.debian.org, 1003842-done@bugs.debian.org, 1004049-done@bugs.debian.org, 1004055-done@bugs.debian.org, 1004056-done@bugs.debian.org, 1004249-done@bugs.debian.org, 1004261-done@bugs.debian.org, 1004265-done@bugs.debian.org, 1004267-done@bugs.debian.org, 1004268-done@bugs.debian.org, 1005000-done@bugs.debian.org, 1005218-done@bugs.debian.org, 1005233-done@bugs.debian.org, 1005353-done@bugs.debian.org, 1005374-done@bugs.debian.org, 1006377-done@bugs.debian.org, 1006417-done@bugs.debian.org, 1006494-done@bugs.debian.org, 1006525-done@bugs.debian.org, 1007745-done@bugs.debian.org, 1007746-done@bugs.debian.org, 1007879-done@bugs.debian.org, 1007938-done@bugs.debian.org, 1007948-done@bugs.debian.org, 1007964-done@bugs.debian.org, 1008030-done@bugs.debian.org, 1008072-done@bugs.debian.org, 1006142-done@bugs.debian.org
- Subject: Closing requests for updates in 10.12
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 26 Mar 2022 12:02:22 +0000
- Message-id: <540de30a27d37c3ff416b94b1adf7ff2a2cab257.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 10.12 Hi, The updates referenced in these requests were included in oldstable as part of today's 10.12 point release. Regards, Adam
--- End Message ---