home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   linux.debian.bugs.dist      Ohh some weird Debian bug report thing      28,835 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 27,894 of 28,835   
   Andreas Henriksson to All   
   Bug#1128227: trixie-pu: package glib2.0/   
   16 Feb 26 17:40:01   
   
   XPost: linux.debian.devel.release   
   From: andreas@fatal.se   
      
   Package: release.debian.org   
   Severity: normal   
   Tags: trixie   
   X-Debbugs-Cc: glib2.0@packages.debian.org   
   Control: affects -1 + src:glib2.0   
   User: release.debian.org@packages.debian.org   
   Usertags: pu   
      
   [ Reason ]   
   A number of security issues has been identified in glib (src:glib2.0).   
   As part of the Debian LTS efforts, I've taken responsibility to address   
   these in bullseye (LTS) and while doing so I've offered the Debian Gnome   
   Team to also handle these issues in stable (trixie) and old-stable   
   (bookworm) which was on their todo list.   
   While discussing this with Debian Gnome Team they also asked to adress   
   #1119919 which is a timezone parsing issue, which I thus also included   
   the patch for.   
      
   [ Impact ]   
   This update mainly addresses security issues that is on the Debian LTS   
   Security Team radar. It includes an additional fix for a timezone   
   parsing issue, as requested by the Debian Gnome Team.   
      
   [ Tests ]   
   The shipped tests in the package passes. No new tests has been added.   
      
   [ Risks ]   
   All changes has already been shipped in unstable/testing without issues.   
   The fixes have been cherry-picked from upstream.   
   The risk of regressions in this update should be low.   
      
   [ Checklist ]   
     [x] *all* changes are documented in the d/changelog   
     [x] I reviewed all changes and I approve them   
     [x] attach debdiff against the package in (old)stable   
     [x] the issue is verified as fixed in unstable   
      
   [ Changes ]   
   - #1119919 : timezone parsing fix   
   - #1125752 : CVE-2026-0988   
   - #1126551 : CVE-2026-1484   
   - #1126550 : CVE-2026-1485   
   - #1126549 : CVE-2026-1489   
      
   See also debian/changelog and security-tracker.debian.org   
      
   [ Other info ]   
   I will be filing a similar issue for OSPU (bookworm) with same patches   
   shortly.   
      
   Regards,   
   Andreas Henriksson   
      
   diff -Nru glib2.0-2.84.4/debian/changelog glib2.0-2.84.4/debian/changelog   
   --- glib2.0-2.84.4/debian/changelog	2025-12-12 19:43:13.000000000 +0100   
   +++ glib2.0-2.84.4/debian/changelog	2026-02-16 09:11:04.000000000 +0100   
   @@ -1,3 +1,19 @@   
   +glib2.0 (2.84.4-3~deb13u3) trixie; urgency=medium   
   +   
   +  * Non-maintainer upload by the LTS Security Team.   
   +  * Add patch to fix timezone handling with Debian & Ubuntu's symlinks   
   +    (Closes: #1119919) (LP: #2130378)   
   +  * CVE-2026-0988: Missing input validation in g_buffered_input_stream_peek   
   +    (Closes: #1125752)   
   +  * CVE-2026-1484: Integer overflow in base64 encoding can cause memory   
   +    corruption. (Closes: #1126551)   
   +  * CVE-2026-1485: Buffer underflow vulnerability in content type parsing   
   +    caused by (signed) integer wrap for large inputs. (Closes: #1126550)   
   +  * CVE-2026-1489: Integer overflow in unicode conversion   
   +    can lead to memory corruption. (Closes: #1126549)   
   +   
   + -- Andreas Henriksson   Mon, 16 Feb 2026 09:11:04 +0100   
   +   
    glib2.0 (2.84.4-3~deb13u2) trixie; urgency=medium   
      
      * d/patches: Add patches from 2.86.3 upstream to avoid integer overflows   
   diff -Nru glib2.0-2.84.4/debian/patches/CVE-2026-0988.patch glib   
   .0-2.84.4/debian/patches/CVE-2026-0988.patch   
   --- glib2.0-2.84.4/debian/patches/CVE-2026-0988.patch	1970-01-01   
   01:00:00.000000000 +0100   
   +++ glib2.0-2.84.4/debian/patches/CVE-2026-0988.patch	2026-02-16   
   09:09:38.000000000 +0100   
   @@ -0,0 +1,53 @@   
   +From: Philip Withnall    
   +Date: Thu, 18 Dec 2025 23:12:18 +0000   
   +Subject: gbufferedinputstream: Fix a potential integer overflow in peek()   
   +   
   +If the caller provides `offset` and `count` arguments which overflow,   
   +their sum will overflow and could lead to `memcpy()` reading out more   
   +memory than expected.   
   +   
   +Spotted by Codean Labs.   
   +   
   +Signed-off-by: Philip Withnall    
   +   
   +Fixes: #3851   
   +(cherry picked from commit c5766cff61ffce0b8e787eae09908ac348338e5f)   
   +---   
   + gio/gbufferedinputstream.c        |  2 +-   
   + gio/tests/buffered-input-stream.c | 10 ++++++++++   
   + 2 files changed, 11 insertions(+), 1 deletion(-)   
   +   
   +diff --git a/gio/gbufferedinputstream.c b/gio/gbufferedinputstream.c   
   +index 779f2d2..7fd0e84 100644   
   +--- a/gio/gbufferedinputstream.c   
   ++++ b/gio/gbufferedinputstream.c   
   +@@ -590,7 +590,7 @@ g_buffered_input_stream_peek (GBufferedInputStream   
   *stream,   
   +   
   +   available = g_buffered_input_stream_get_available (stream);   
   +   
   +-  if (offset > available)   
   ++  if (offset > available || offset > G_MAXSIZE - count)   
   +     return 0;   
   +   
   +   end = MIN (offset + count, available);   
   +diff --git a/gio/tests/buffered-input-stream.c b/gio/tests/buff   
   red-input-stream.c   
   +index 321654d..5d3e976 100644   
   +--- a/gio/tests/buffered-input-stream.c   
   ++++ b/gio/tests/buffered-input-stream.c   
   +@@ -60,6 +60,16 @@ test_peek (void)   
   +   g_assert_cmpint (npeek, ==, 0);   
   +   g_free (buffer);   
   +   
   ++  buffer = g_new0 (char, 64);   
   ++  npeek = g_buffered_input_stream_peek (G_BUFFERED_INPUT_STREAM (in),   
   buffer, 8, 0);   
   ++  g_assert_cmpint (npeek, ==, 0);   
   ++  g_free (buffer);   
   ++   
   ++  buffer = g_new0 (char, 64);   
   ++  npeek = g_buffered_input_stream_peek (G_BUFFERED_INPUT_STREAM (in),   
   buffer, 5, G_MAXSIZE);   
   ++  g_assert_cmpint (npeek, ==, 0);   
   ++  g_free (buffer);   
   ++   
   +   g_object_unref (in);   
   +   g_object_unref (base);   
   + }   
   diff -Nru glib2.0-2.84.4/debian/patches/CVE-2026-1484-1.patch gl   
   b2.0-2.84.4/debian/patches/CVE-2026-1484-1.patch   
   --- glib2.0-2.84.4/debian/patches/CVE-2026-1484-1.patch	1970-01-01   
   01:00:00.000000000 +0100   
   +++ glib2.0-2.84.4/debian/patches/CVE-2026-1484-1.patch	2026-02-16   
   09:09:38.000000000 +0100   
   @@ -0,0 +1,43 @@   
   +From: Marco Trevisan    
   +Date: Fri, 23 Jan 2026 18:48:30 +0100   
   +Subject: gbase64: Use gsize to prevent potential overflow   
   +MIME-Version: 1.0   
   +Content-Type: text/plain; charset="utf-8"   
   +Content-Transfer-Encoding: 8bit   
   +   
   +Both g_base64_encode_step() and g_base64_encode_close() return gsize   
   +values, but these are summed to an int value.   
   +   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca