Package: release.debian.org Severity: normal Tags: stretch User: release.debian....@packages.debian.org Usertags: pu
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 The last upload to stretch, fixing a minor security issue, had an incomplete patch provided by upstream which can lead to memory corruption and crashes in some cases. The update was first negotiated with the security team, who proposed to update via stretch-pu AND stretch-updates. Find attached the debdiff. N.B.: This is not an NMU - I am now using my debian.org mail address, but did not want to change Uploaders: in a stable update (or should I?). -----BEGIN PGP SIGNATURE----- iQKJBAEBCABzFiEEPJ1UpHV1wCb7F/0mt5o8FqDE8pYFAlrQbtsxGmh0dHBzOi8v d3d3LmRvbWluaWstZ2VvcmdlLmRlL2dwZy1wb2xpY3kudHh0LmFzYyMcZG9taW5p ay5nZW9yZ2VAaXQucGlyYXRlbnBhcnRlaS5kZQAKCRC3mjwWoMTyljN1D/9DMKk+ 5+A2QnYFxVCeqKKhBt/Yc+dXb7CsyDW80nUZWnlyP0XHi4OChJg8+MyjKVMIMTmp Vr5LBJbFDlDaQ/hqNY0KKqc4Md4PcEXF+krcN4nL0bEAdAFT7BdDJA+rFeoCGz8z Vi2Ev0JkdWJndHuNMrGFZb0ESOxy+4vF1P7j7zrTvFfeXj/PowbIUzBGPBEQ8o6y ELbMjXk0ma5gri9mvyv0xaRV7oDUhHA/czq1A+aM2anJmABaZJzLxWd/9YKcvzxV Gyhv3dQtESd+fQOzbtqW1okhxPIOnaDcldRDjdvNNLsE7PMjcxq0PresNZkeBMKM Yys7AInm3L8Pv2dHImAl7GSHyO6FpvFWy8DT9IdSgpz196X/Vx/I6do0lPPbqpWT Q52vCQ21lR7F6FXYYwoDVzpGrM1OB6bOeJxmM6AnTfzwAKsF5g0+AGZuiW0i3AQj guxhf5CnoVvUfxY7yixjOZUosvipdU/Fktcbs3rpE2tbHKV84pFcq+EJBjjzKMVc p/rQW2UP53pZGvO45t5S0cwlnqRtxcXH15yyOfMGdx9jdAWcnVHB8h69TIi0jVWB 1s74hN1IpYbCLu63f/ei1NtOKEkJ8vvTl92omHp548G09oIJNenGTI8WQ1mBXzwg ZqmqS081W7/dtRv+PiZkF+Gh8+QpQHk627f42w== =H6gU -----END PGP SIGNATURE-----
diff -Nru xrdp-0.9.1/debian/changelog xrdp-0.9.1/debian/changelog --- xrdp-0.9.1/debian/changelog 2017-12-15 19:28:28.000000000 +0100 +++ xrdp-0.9.1/debian/changelog 2018-04-12 23:43:25.000000000 +0200 @@ -1,3 +1,10 @@ +xrdp (0.9.1-9+deb9u3) stretch; urgency=high + + * Fix patch for CVE-2017-16927. (Closes: #884702) + + Off-by-one mistake could crash xrdp in some cases. + + -- Dominik George <naturesha...@debian.org> Thu, 12 Apr 2018 23:43:25 +0200 + xrdp (0.9.1-9+deb9u2) stretch; urgency=medium * Fix CVE-2017-16927. (Closes: #882463) diff -Nru xrdp-0.9.1/debian/patches/cve-2017-16927.patch xrdp-0.9.1/debian/patches/cve-2017-16927.patch --- xrdp-0.9.1/debian/patches/cve-2017-16927.patch 2017-12-15 19:28:28.000000000 +0100 +++ xrdp-0.9.1/debian/patches/cve-2017-16927.patch 2018-04-12 23:43:25.000000000 +0200 @@ -18,7 +18,7 @@ /* reading username */ in_uint16_be(c->in_s, sz); - buf[sz] = '\0'; -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); - + buf[sz] = '\0'; @@ -34,7 +34,7 @@ /* reading password */ in_uint16_be(c->in_s, sz); - buf[sz] = '\0'; -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); - + buf[sz] = '\0'; @@ -53,7 +53,7 @@ if (sz > 0) { -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); buf[sz] = '\0'; scp_session_set_domain(session, buf); @@ -65,7 +65,7 @@ if (sz > 0) { -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); buf[sz] = '\0'; scp_session_set_program(session, buf); @@ -77,7 +77,7 @@ if (sz > 0) { -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); buf[sz] = '\0'; scp_session_set_directory(session, buf); @@ -89,7 +89,7 @@ if (sz > 0) { -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); buf[sz] = '\0'; scp_session_set_client_ip(session, buf); @@ -102,7 +102,7 @@ /* reading username */ in_uint16_be(c->in_s, sz); - buf[sz] = '\0'; -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); + buf[sz] = '\0'; @@ -119,7 +119,7 @@ /* reading password */ in_uint16_be(c->in_s, sz); - buf[sz] = '\0'; -+ buf = g_new0(char, sz); ++ buf = g_new0(char, sz + 1); in_uint8a(c->in_s, buf, sz); + buf[sz] = '\0';