Le 23/04/2019 à 07:02, Adam D. Barratt a écrit :
> On Mon, 2019-04-22 at 23:17 +0200, Xavier wrote:
>> Le 22/04/2019 à 20:15, Paul Gevers a écrit :
> [...]
>>> I think your patch seems to be invalid in stretch. When I ran the
>>> autopkgtests in stretch I see the error below, which is exactly the
>>> new code.
> [...]
>> sorry for this error in my tests. Here is a new debdiff (let replaced
>> by var for old nodejs, no consequences here since this variable isn't
>> used somewhere else).
>>
> 
> +deb9u1 is already in p-u, so this needs to be a +deb9u2 with a fix on
> top of that, not a replacement +deb9u1.

OK, here is the new one
diff --git a/debian/changelog b/debian/changelog
index 645a574..5fde1b8 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+node-superagent (0.20.0+dfsg-1+deb9u2) stretch; urgency=medium
+
+  * Fix incompatible instruction in CVE-2017-16129 patch
+
+ -- Xavier Guimard <y...@debian.org>  Tue, 23 Apr 2019 07:07:07 +0200
+
 node-superagent (0.20.0+dfsg-1+deb9u1) stretch; urgency=medium
 
   * Team upload
diff --git a/debian/patches/CVE-2017-16129.diff 
b/debian/patches/CVE-2017-16129.diff
index c1f700c..bedfe20 100644
--- a/debian/patches/CVE-2017-16129.diff
+++ b/debian/patches/CVE-2017-16129.diff
@@ -13,7 +13,7 @@ Last-Update: 2019-04-18
  
 +        if (buffer) {
 +          // Protection against zip bombs and other nuisance
-+          let responseBytesLeft = self._maxResponseSize || 200000000;
++          var responseBytesLeft = self._maxResponseSize || 200000000;
 +          res.on('data', function(buf) {
 +            responseBytesLeft -= buf.byteLength || buf.length;
 +            if (responseBytesLeft < 0) {

Reply via email to