From cd2ab4e1bbaa777f120aded5dc46dc847397418b Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 14 Apr 2024 21:32:33 +0200 Subject: Adding debian version 2.39.3-11. Signed-off-by: Daniel Baumann --- debian/patches/series | 1 + ...-escape-sequence-Injection-CVE-2024-28085.patch | 25 ++++++++++++++++++++++ 2 files changed, 26 insertions(+) create mode 100644 debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch (limited to 'debian/patches') diff --git a/debian/patches/series b/debian/patches/series index 73a5741..d58f635 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -14,3 +14,4 @@ upstream/cfdisk-fix-menu-behavior-after-writing-changes.patch upstream/fincore-tests-also-use-nosize-error-file.patch upstream/build-only-build-test_enosys-if-an-audit-arch-exists.patch upstream/libuuid-Add-uuid_time64-for-64bit-time_t-on-32bit.patch +upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch diff --git a/debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch b/debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch new file mode 100644 index 0000000..1a0acd7 --- /dev/null +++ b/debian/patches/upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch @@ -0,0 +1,25 @@ +From: Karel Zak +Date: Thu, 21 Mar 2024 11:16:20 +0100 +Subject: wall: fix escape sequence Injection [CVE-2024-28085] + +Let's use for all cases the same output function. + +Reported-by: Skyler Ferrante +Signed-off-by: Karel Zak +--- + term-utils/wall.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/term-utils/wall.c b/term-utils/wall.c +index 377db45..1e7e9ab 100644 +--- a/term-utils/wall.c ++++ b/term-utils/wall.c +@@ -328,7 +328,7 @@ static char *makemsg(char *fname, char **mvec, int mvecsz, + int i; + + for (i = 0; i < mvecsz; i++) { +- fputs(mvec[i], fs); ++ fputs_careful(mvec[i], fs, '^', true, TERM_WIDTH); + if (i < mvecsz - 1) + fputc(' ', fs); + } -- cgit v1.2.3