Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.bugs.dist    |    Ohh some weird Debian bug report thing    |    28,835 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 27,897 of 28,835    |
|    Andreas Henriksson to All    |
|    Bug#1128228: bookworm-pu: package glib2.    |
|    16 Feb 26 17:40:01    |
      XPost: linux.debian.devel.release       From: andreas@fatal.se              Package: release.debian.org       Severity: normal       Tags: bookworm       X-Debbugs-Cc: glib2.0@packages.debian.org       Control: affects -1 + src:glib2.0       User: release.debian.org@packages.debian.org       Usertags: pu              [ Reason ]       A number of security issues has been identified in glib (src:glib2.0).       As part of the Debian LTS efforts, I've taken responsibility to address       these in bullseye (LTS) and while doing so I've offered the Debian Gnome       Team to also handle these issues in stable (trixie) and old-stable       (bookworm) which was on their todo list.       While discussing this with Debian Gnome Team they also asked to adress       #1119919 which is a timezone parsing issue, which I thus also included       the patch for.              [ Impact ]       This update mainly addresses security issues that is on the Debian LTS       Security Team radar. It includes an additional fix for a timezone       parsing issue, as requested by the Debian Gnome Team.              [ Tests ]       The shipped tests in the package passes. Including newly added       tests in CVE-2026-1489-4.patch and CVE-2026-0988.patch              [ Risks ]       All changes has already been shipped in unstable/testing without issues.       The fixes have been cherry-picked from upstream.       The risk of regressions in this update should be low.              [ Checklist ]        [x] *all* changes are documented in the d/changelog        [x] I reviewed all changes and I approve them        [x] attach debdiff against the package in (old)stable        [x] the issue is verified as fixed in unstable              [ Changes ]       - #1119919 : timezone parsing fix       - #1125752 : CVE-2026-0988       - #1126551 : CVE-2026-1484       - #1126550 : CVE-2026-1485       - #1126549 : CVE-2026-1489              See also debian/changelog and security-tracker.debian.org              [ Other info ]       I have also filed a similar issue for SPU (trixie) with the same       patches.              Regards,       Andreas Henriksson              diff -Nru glib2.0-2.74.6/debian/changelog glib2.0-2.74.6/debian/changelog       --- glib2.0-2.74.6/debian/changelog 2025-12-15 15:29:38.000000000 +0100       +++ glib2.0-2.74.6/debian/changelog 2026-02-13 12:35:33.000000000 +0100       @@ -1,3 +1,19 @@       +glib2.0 (2.74.6-2+deb12u9) bookworm; urgency=medium       +       + * Non-maintainer upload by the LTS Security Team.       + * Add patch to fix timezone handling with Debian & Ubuntu's symlinks       + (Closes: #1119919) (LP: #2130378)       + * CVE-2026-0988: Missing input validation in g_buffered_input_stream_peek       + (Closes: #1125752)       + * CVE-2026-1484: Integer overflow in base64 encoding can cause memory       corruption.       + (Closes: #1126551)       + * CVE-2026-1485: Buffer underflow vulnerability in content type parsing       + caused by (signed) integer wrap for large inputs. (Closes: #1126550)       + * CVE-2026-1489: Integer overflow in unicode conversion       + can lead to memory corruption. (Closes: #1126549)       +       + -- Andreas Henriksson |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca