Bug#1104646: RFP: roundcube-plugin-banner-ics -- Display information about events from iCalendar attachments at the top of the email in Roundcube Webmail

2025-05-03 Thread Neil McGovern
you'd like. Thanks! Neil

Bug#1040396: (No Subject)

2025-03-29 Thread Neil Guertin
user debian-rele...@lists.debian.org usertag 1040396 + bsp-2025-03-ca-montreal thank you Probably caused by https://github.com/Perl/perl5/commit/0351a629e7 which marked the Perl_init_debugger symbol as hidden. Seems like Perl_init_debugger was never meant to be part of the public API.

Bug#1040561: (No Subject)

2025-03-28 Thread Neil Guertin
Merge request submitted https://salsa.debian.org/gnome-team/cairomm1.16/-/merge_requests/3 Thanks, -Neil

Bug#1089181: chromium: security update wants to remove chromium package itself

2024-12-10 Thread Neil Van Dyke
Are those library updates part of the security update?     The following packages will be REMOVED:   libc++1-16 libc++abi1-16 libunwind-16     The following NEW packages will be installed:   libc++1-19 libc++abi1-19 libunwind-19     The following packages will be upgraded:   chromium c

Bug#1086996: Acknowledgement (Thunderbird Chat regression doesn't show channels that IRC ZNC bouncer has already joined)

2024-12-08 Thread Neil Van Dyke
In Thunderbird 128.5.0esr (64-bit), this regression only exhibits when checkbox **Sign-on at startup** for that account is *true*.  (From tab **Chat**, click button **Show Accounts**.) However, if the checkbox is *false* when Thunderbird is started, and so you manually push button **Connect**, the

Bug#1086996: Thunderbird Chat regression doesn't show channels that IRC ZNC bouncer has already joined

2024-11-07 Thread Neil Van Dyke
Package: thunderbird Version: 1:128.4.0esr-1~deb12u1 Regression coinciding with the Thunderbird security update in Debian `stable` a few days ago. Thunderbird Chat no longer shows IRC channels in the left pane of the Chat window if the server is the ZNC bouncer, and the channel is already joined

Bug#1078340: NumLock behavior in kcalc when launched from special Keyboard keys

2024-08-09 Thread Neil Schelly
Package: kde-plasma-desktop Version: 5:142 I have a Microsoft Natural Ergonomic Keyboard 4000. It has buttons along the top for shortcuts to various applications and functions. I use one of them as a launcher for kcalc. When I assign a KDE keyboard shortcut key to it, it is labelled "Launch (1)" a

Bug#1060323: libosp-dev: missing dependency on libosp5

2024-01-12 Thread Neil Roeth
I took the second approach suggested by Gregor, of changing the install order.  Massive rewrite of d/rules to happen at a later date.  :-) -- Neil Roeth

Bug#1060431: mkosi: nspawn settings are no longer copied into place

2024-01-11 Thread Neil Wilson
Package: mkosi Version: 20-1 Severity: normal Tags: upstream patch X-Debbugs-Cc: n...@aldur.co.uk Dear Maintainer, v20 erroneously removed the copy nspawn settings functionality even though it continues to be used by 'machinectl pull-tar'. This has been reversed upstream, and I would if you could

Bug#1057117:

2023-12-13 Thread Neil Jones
s not work even in the simplest operation. As I have reported here - https://github.com/apple/swift/issues/60690 <https://github.com/apple/swift/issues/60690> - even the basic swiftc complier is not working. Neil > On Dec 2, 2023, at 5:52, Steve M wrote: > > Neil, > > Th

Bug#1057117: swiftlang: Totally unusable - fails to build a simple Hello World project.

2023-11-29 Thread neil
Package: swiftlang Version: 5.6.3-2 Severity: important X-Debbugs-Cc: futurejonesa...@gmail.com Dear Maintainer, * What led up to the situation? Installed swiftlang and tried to build and run a simple Hello World project * What exactly did you do (or not do) that was effective (or in

Bug#1020817: aplus-fsf: reproducible-builds: Embedded build paths in binaries

2023-11-24 Thread Neil Roeth
It is not clear to me how to test if the path is embedded in the libraries and whether the fix for this is still needed.  I did a simple grep for part of my local build path in the libraries of this package and got no hits.  Maybe something has changed since this bug was filed so that this is n

Bug#1055262: inetutils-telnetd: inetutils daemon packages should have systemd as a dependency

2023-11-03 Thread Neil Wilson
Package: inetutils-telnetd Version: 2:2.4-3 Severity: wishlist Tags: patch X-Debbugs-Cc: n...@aldur.co.uk Dear Maintainer, -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 6.5.0-3-cloud-amd64 (SMP

Bug#1049929: ITS: aplus-fsf

2023-08-23 Thread Neil Roeth
intend to salvage it with the plan to orphan it in three weeks. Please notify me if you object. -- Neil Roeth

Bug#1043285: dscverify: feature request: --print-files

2023-08-08 Thread Neil Roza
parses '*.changes', '*.dsc', and '*.buildinfo' better than I can, then perhaps it could be extended to print the files being verified. Maybe it should grow a new option '--print-files' to support exactly that. Anywho, I'm happy to help if someone can sho

Bug#905649: closed by Josef Schneider (tcsh: Filetest Built-In Does Not Recognize Filenames Containing '{' (left curly brace), Whether Quoted or Escaped)

2023-02-24 Thread Neil R. Ormos
r Bug report > which was filed against the tcsh package: > #905649: tcsh: Filetest Built-In Does Not Recognize Filenames Containing '{' > (left curly brace), Whether Quoted or Escaped > It has been closed by Josef Schneider . Thank you, Josef. I agree that the problem is not p

Bug#1031358: rclone should suggest ca-certificates

2023-02-15 Thread Neil Wilson
Package: rclone Version: 1.53.3-4ubuntu1 Severity: normal Dear Maintainer, rclone uses TLS to connect to remote repositories, but lacks a Suggests on ca-certificates. This leads to "x509: certificate signed by unknown authority" errors. Adding it in would mirror the Suggests in the 'openssl' pac

Bug#1029537: libtcd: Please add this watch file

2023-01-23 Thread Neil Mayhew
ON@@ARCHIVE_EXT@ Thanks, —Neil -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.15.86 (SMP w/24 CPU threads) Ker

Bug#1019191: RM: centreon-clib -- RoQA; Orphaned and RC buggy

2022-09-05 Thread Neil Williams
Package: ftp.debian.org Severity: normal X-Debbugs-Cc: codeh...@debian.org As outlined in the orphaning bug (994986), the centreon-* packages are no longer being maintained. centreon-clib was left in unstable because it (initially) built OK without needing extra work. Other centreon-* packages hav

Bug#1018941: cimg: CVE-2022-1325 - memory exhaustion from a malicious pandore or bmp file

2022-09-02 Thread Neil Williams
Source: cimg Version: 3.0.2+dfsg-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for cimg. CVE-2022-1325[0]: | A flaw was found in Clmg, where with the help of a maliciously crafted | pandore or

Bug#1017608: jpegqs: CVE-2022-35434 - floating point exception with corrupt image

2022-08-18 Thread Neil Williams
Source: jpegqs Version: 1.20210408-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for jpegqs. CVE-2022-35434[0]: | jpeg-quantsmooth before commit 8879454 contained a floating point | exception

Bug#1017005: ring: CVE-2022-31031 - stack buffer overflow when parsing message as a STUN client

2022-08-11 Thread Neil Williams
Source: ring Version: 20210112.2.b757bac~ds1-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for ring STUN support. CVE-2022-31031[0]: | PJSIP is a free and open source multimedia communication

Bug#1017004: asterisk: CVE-2022-31031 - stack buffer overflow when parsing message as a STUN client

2022-08-11 Thread Neil Williams
Source: asterisk Version: 1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for asterisk STUN support. CVE-2022-31031[0]: | PJSIP is a free and open source mul

Bug#1014488: scapy: flaky autopkgtest: No such file or directory: 'isotpsend'

2022-08-10 Thread Neil Williams
pendencies to see if isotpsend support can be provided inside autopkgtest. If that fails, the upstream tests will need to be confined to Salsa and autopkgtests limited only to autopkgtest-pkg-python. https://salsa.debian.org/pkg-security-team/scapy/-/commit/59a4c0e2ed8c24cf5a3d4412cecdd5086a5b0395

Bug#1016899: RM: xprobe -- ROM; abandoned upstream, does not work against default installs

2022-08-09 Thread Neil Williams
Package: ftp.debian.org Severity: normal X-Debbugs-Cc: codeh...@debian.org xprobe is an old package with no upstream development - the old SF page links to a Wiki, other links in d.copyright go to 404. The current RC bug can be fixed but the package no longer works in a useful manner. xprobe is u

Bug#1016685: v4l2loopback: CVE-2022-2652 - leaking kernel memory via crafted card labels

2022-08-07 Thread Neil Williams
On Fri, 5 Aug 2022 11:22:30 +0200 =?UTF-8?Q?IOhannes_m_zm=c3=b6lnig_=28Debian_GNU=7cLinux=29?= wrote: > On Fri, 05 Aug 2022 09:41:46 +0100 Neil Williams > wrote: > > The following vulnerability was published for v4l2loopback (and is > > not included in the recent v0.12.7 git

Bug#1014391: scilab: CVE-2022-30045 incorrect memory handling in ezml support leading to a heap out-of-bounds read

2022-08-05 Thread Neil Williams
On Mon, 1 Aug 2022 18:25:04 +0200 Sylvestre Ledru wrote: > Hello, > > Le 05/07/2022 à 11:19, Neil Williams a écrit : > > Source: scilab > > Version: 6.1.1+dfsg2-3 > > Severity: important > > Tags: security > > X-Debbugs-Cc: codeh...@debian.org,

Bug#1016685: v4l2loopback: CVE-2022-2652 - leaking kernel memory via crafted card labels

2022-08-05 Thread Neil Williams
Source: v4l2loopback Version: 0.12.7-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for v4l2loopback (and is not included in the recent v0.12.7 git tag). CVE-2022-2652[0]: | Depending on the wa

Bug#1016633: pyhst2: FTBFS: redefinition of 'constexpr const _Tp std::integral_constant<_Tp, __v>::value'

2022-08-04 Thread Neil Williams
onstant<_Tp, __v>::value' 71 | > template | >^ /usr/include/c++/10/type_traits:59:29: note: > 'constexpr const _Tp value' previously declared here 59 | > static constexpr _Tp value = __v; | ^ > > Andreas -- Neil Will

Bug#1016578: milkytracker: CVE-2022-34927 - stack overflow via the component LoaderXM::load

2022-08-03 Thread Neil Williams
Source: milkytracker Version: 1.03.00+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for milkytracker. CVE-2022-34927[0]: | MilkyTracker v1.03.00 was discovered to contain a stack overflow

Bug#1003165: fixed in astrometry.net 0.89+dfsg-2

2022-08-01 Thread Neil Williams
solete field Name from debian/upstream/metadata > . >[ Ole Streicher ] >* Switch build depends on libnetpbm10-dev to libnetpbm-dev > (Closes: #1003165) 1003165 is the wrong bug number and a different package. The B-D bug in astrometry.net is 1016400. https://bugs.debian.org

Bug#1014389: mapcache: CVE-2022-30045 incorrect memory handling leading to a heap out-of-bounds read

2022-07-06 Thread Neil Williams
On Tue, 5 Jul 2022 11:58:12 +0200 Sebastiaan Couwenberg wrote: > On 7/5/22 11:14, Neil Williams wrote: > > CVE-2022-30045[0]: > > | An issue was discovered in libezxml.a in ezXML 0.8.6. The function > > | ezxml_decode() performs incorrect memory handling while parsing &g

Bug#1014391: scilab: CVE-2022-30045 incorrect memory handling in ezml support leading to a heap out-of-bounds read

2022-07-05 Thread Neil Williams
Source: scilab Version: 6.1.1+dfsg2-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for scilab. CVE-2022-30045[0]: | An issue was discovered in libezxml.a in ezXML 0.8.6. The function | ezxml_decode() pe

Bug#1014390: navit: CVE-2022-30045 incorrect memory handling in ezml support leading to a heap out-of-bounds read

2022-07-05 Thread Neil Williams
Source: navit Version: 0.5.0+dfsg.1-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for navit. CVE-2022-30045[0]: | An issue was discovered in libezxml.a in ezXML 0.8.6. The function | ezxml_decode() per

Bug#1014389: mapcache: CVE-2022-30045 incorrect memory handling leading to a heap out-of-bounds read

2022-07-05 Thread Neil Williams
Source: mapcache Version: 1.12.1-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for mapcache. CVE-2022-30045[0]: | An issue was discovered in libezxml.a in ezXML 0.8.6. The function | ezxml_decode() per

Bug#1014385: passportjs: CVE-2022-25896 - regenerates stale session on user login

2022-07-05 Thread Neil Williams
Source: passportjs Version: 0.5.2+~1.0.0-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for passportjs. CVE-2022-25896[0]: | This affects the package passport before 0.6.0. When a user logs in or | logs

Bug#1004831: transition: ffmpeg

2022-07-05 Thread Neil Williams
not ideal and it is a lot of work but it may be necessary to have libavcodec4-dev and libavcodec-dev with a new source package ffmpeg4 alongside ffmpeg. > > Thank you, > -Steve > > [1] https://mail.kde.org/pipermail/digikam-users/2022-July/033796.html > -- Neil Williams = https://linux.codehelp.co.uk/ pgpbx_gmG9Uix.pgp Description: OpenPGP digital signature

Bug#1011941: rails: CVE-2022-22577 - XSS Vulnerability in Action Pack

2022-05-27 Thread Neil Williams
Source: rails Version: 2:6.1.4.6+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for rails. CVE-2022-22577[0]: | An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that | could allow

Bug#1011940: rails: CVE-2022-21831 code injection vulnerability exists in Active Storage

2022-05-27 Thread Neil Williams
Source: rails Version: 2:6.1.4.6+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for rails. CVE-2022-21831[0]: | A code injection vulnerability exists in the Active Storage >= | v5.2.0 that

Bug#1011758: smarty3: CVE-2022-29221 - template authors can inject php code by choosing malicious filenames

2022-05-26 Thread Neil Williams
Source: smarty3 Version: 3.1.39-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for smarty3. CVE-2022-29221[0]: | Smarty is a template engine for PHP, facilitating the separation of | presentati

Bug#1011757: smarty4: CVE-2022-29221 - template authors can inject php code by choosing malicious filenames

2022-05-26 Thread Neil Williams
Source: smarty4 Version: 4.1.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for smarty4. CVE-2022-29221[0]: | Smarty is a template engine for PHP, facilitating the separation of | presentati

Bug#1011747: pyjwt: CVE-2022-29217 - Key confusion through non-blocklisted public key formats

2022-05-26 Thread Neil Williams
Source: pyjwt Version: 2.3.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for pyjwt. CVE-2022-29217[0]: | PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple | different JWT

Bug#1011741: golang-github-hashicorp-go-getter: Multiple Vulnerabilities In go-getter library

2022-05-26 Thread Neil Williams
Source: golang-github-hashicorp-go-getter Version: 1.4.1-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for golang-github-hashicorp-go-getter. CVE-2022-26945[0]: | HashiCorp go-getter befor

Bug#1011616: golang-github-tidwall-gjson: CVE-2021-42248 allows attackers to cause a redos via crafted JSON input

2022-05-25 Thread Neil Williams
Source: golang-github-tidwall-gjson Version: 1.6.7-1 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for golang-github-tidwall-gjson. CVE-2021-42248[0]: | GJSON <= 1.9.2 allows attackers to cause

Bug#1011458: snowflake: CVE-2022-29222 - fails to reject untrustworthy client certificates due to missing checks on private key

2022-05-23 Thread Neil Williams
Source: snowflake Version: 1.1.0-2 Severity: grave Tags: security Justification: user security hole X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for snowflake. CVE-2022-29222[0]: | Pion DTLS is a Go implementation of Datagram Transport L

Bug#1011457: snowflake: CVE-2022-29189 CVE-2022-29190 - infinite loop and excessive memory usage in vendor pion DTLS

2022-05-23 Thread Neil Williams
Source: snowflake Version: 1.1.0-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for snowflake, via the github.com/pion/dtls/v2 package included into debian/vendor/ CVE-2022-29189[0]: | Pion DTLS is a

Bug#1011341: node-formidable: CVE-2022-29622 - attackers able to execute arbitrary code via file upload

2022-05-20 Thread Neil Williams
Source: node-formidable Version: 3.2.3+20220426git971e3a7+~cs4.0.8-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for node-formidable. CVE-2022-29622[0]: | An arbitrary file upload vulnerability in form

Bug#1011338: golang-gopkg-yaml.v3: CVE-2022-28948 - crash when attempting to deserialize invalid input

2022-05-20 Thread Neil Williams
Source: golang-gopkg-yaml.v3 Version: 3.0.0~git20200121.a6ecf24-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for golang-gopkg-yaml.v3-dev. CVE-2022-28948[0]: | An issue in the Unmarshal function in Go

Bug#1011333: /usr/bin/pdftosrc: CVE-2021-27548 - null-pointer deference in XFAScanner::scanNode used by pdftosrc

2022-05-20 Thread Neil Williams
Package: texlive-binaries Version: 2022.20220321.62855-1 Severity: important File: /usr/bin/pdftosrc Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team texlive-binaries in unstable, experimental and bookworm embeds xpdfreader 4.03 and the code is exposed via the pdftosrc bina

Bug#1011056: dokuwiki: CVE-2022-28919 XSS vulnerability via the function _generateFilename

2022-05-16 Thread Neil Williams
Source: dokuwiki Version: 0.0.20200729-0.1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for dokuwiki. CVE-2022-28919[0]: | HTMLCreator release_stable_2020-07-29 was discovered to contain a | cross-site

Bug#1010800: apscheduler: Please fix 0.0.0 egg version information in the package

2022-05-10 Thread Neil Williams
Source: apscheduler Version: 3.8.1-1 Severity: normal X-Debbugs-Cc: codeh...@debian.org Other packages using python3-apscheduler as a dependency have to work around an error in the apscheduler packaging: /usr/lib/python3/dist-packages/APScheduler-0.0.0.egg-info/PKG-INFO Please fix the package so

Bug#1010748: uclibc: CVE-2021-27419 - integer overflow in both malloc and memalign implementations

2022-05-09 Thread Neil Williams
Source: uclibc Version: 1.0.35-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for uclibc. CVE-2021-27419[0]: | uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap- | around in functions ma

Bug#1010284: python3-pip: runs into infinite loop when installing package with pyproject.toml file

2022-05-08 Thread Neil Tallim
I've encountered the same issue when attempting to install the aiohttp package or anything that depends on it, which seems to be a lot. File "/usr/lib/python3.10/_distutils_system_mod.py", line 125, in _inject_headers scheme['headers'] = orig_install._load_schemes()['posix_prefix'

Bug#1010671: libsdl2-ttf-dev: CVE-2022-27470 - Arbitrary memory overwrite loading glyphs and rendering text

2022-05-06 Thread Neil Williams
Package: libsdl2-ttf-dev Version: 2.0.18+dfsg-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for libsdl2-ttf. CVE-2022-27470[0]: | SDL_ttf v2.0.18 and below was discovered to contain an arbitrary | memo

Bug#1010670: libgoogle-gson-java: CVE-2022-25647 Deserialization of Untrusted Data via the writeReplace method

2022-05-06 Thread Neil Williams
Source: libgoogle-gson-java Version: 2.8.8-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for libgoogle-gson-java. CVE-2022-25647[0]: | The package com.google.code.gson:gson before 2.8.9 are vulnerable

Bug#1010667: ruby-xmlhash: CVE-2022-21949 - Improper Restriction of XML External Entity Reference

2022-05-06 Thread Neil Williams
Source: ruby-xmlhash Version: 1.3.6-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for ruby-xmlhash. CVE-2022-21949[0]: | A Improper Restriction of XML External Entity Reference vulnerability | in SUSE

Bug#1010664: ecdsautils: Upstream has moved

2022-05-06 Thread Neil Williams
Source: ecdsautils Version: 0.3.2+git20151018-2 Severity: wishlist Tags: upstream X-Debbugs-Cc: codeh...@debian.org Hi, I was checking new CVEs and noticed that ecdsautils uses an old fork of the upstream project at https://github.com/tcatm/ecdsautils . This site has since moved to https://github

Bug#1010657: google-oauth-client-java: CVE-2021-22573 - IdTokenVerifier does not verify the signature of ID Token

2022-05-06 Thread Neil Williams
Source: google-oauth-client-java Version: 1.28.0-2 Severity: grave Tags: security Justification: user security hole X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for google-oauth-client-java. CVE-2021-22573[0]: | The vulnerability is that

Bug#1010571: shotwell: No pubishing plugins available

2022-05-04 Thread Neil McGovern
16:14:53.825: g_file_get_child: assertion 'G_IS_FILE (file)' failed L 257710 2022-05-04 16:14:53 [CRT] plugins_search_for_plugins: assertion 'G_TYPE_CHECK_INSTANCE_TYPE (dir, g_file_get_type ())' failed https://bugs.launchpad.net/ubuntu/+source/shotwell/+bug/1969439 may also

Bug#1009191: cctbx: please re-enable building on riscv64

2022-04-30 Thread Neil Williams
ontinues to build in Ubuntu. > > > > Please re-enable building on riscv64 as we would like to promote > > riscv64 to a release architecture. > > Neil, is there a particular reason riscv64 support was disabled in > 2021.12+ds1-3? I didn't see it as particularly likely that

Bug#1010359: node-ejs: CVE-2022-29078 server-side template injection

2022-04-29 Thread Neil Williams
Source: node-ejs Version: 3.1.6-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for node-ejs. CVE-2022-29078[0]: | The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js | allows server-si

Bug#1010348: horizon-eda: CVE-2021-21897 - heap-based buffer overflow loading a DXF file via embedded dxflib

2022-04-29 Thread Neil Williams
Source: horizon-eda Version: 2.2.0-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for horizon-eda. CVE-2021-21897[0]: | A code execution vulnerability exists in the | DL_Dxf::handleLWPolylineData functi

Bug#1010349: librecad: CVE-2021-21897 - heap-based buffer overflow loading a DXF file via embedded dxflib

2022-04-29 Thread Neil Williams
Source: librecad Version: 2.1.3-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for librecad. CVE-2021-21897[0]: | A code execution vulnerability exists in the | DL_Dxf::handleLWPolylineData functionalit

Bug#1010347: cloudcompare: CVE-2021-21897 - heap-based buffer overflow loading a DXF file via embedded dxflib

2022-04-29 Thread Neil Williams
Source: cloudcompare Version: 2.11.3-5 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for cloudcompare. CVE-2021-21897[0]: | A code execution vulnerability exists in the | DL_Dxf::handleLWPolylineData fun

Bug#1010339: libowasp-esapi-java: CVE-2022-24891 CVE-2022-23457 - cross-site-scripting and control-flow bypass

2022-04-29 Thread Neil Williams
Source: libowasp-esapi-java Version: 2.2.3.1-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for libowasp-esapi-java. CVE-2022-24891[0]: | ESAPI (The OWASP Enterprise Security API) is a free, open sou

Bug#1010336: httpx: CVE-2021-41945 blacklist bypass due to implementation of httpx.URL().copy_with

2022-04-29 Thread Neil Williams
Source: httpx Version: 0.22.0-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for httpx. CVE-2021-41945[0]: | Encode OSS httpx <=1.0.0.beta0 is affected by improper input | validation in `httpx.

Bug#1010154: libowasp-antisamy-java: CVE-2022-28366 + CVE-2022-28367

2022-04-26 Thread Neil Williams
On Mon, 25 Apr 2022 21:43:30 -0700 tony mancill wrote: > On Mon, Apr 25, 2022 at 07:22:12PM +0200, Salvatore Bonaccorso wrote: > > Hi! > > > > On Mon, Apr 25, 2022 at 01:48:43PM +0100, Neil Williams wrote: > > > On Mon, 25 Apr 2022 13:39:49 +0100 Neil Williams >

Bug#1010154: libowasp-antisamy-java: CVE-2022-28366 + CVE-2022-28367

2022-04-25 Thread Neil Williams
On Mon, 25 Apr 2022 13:39:49 +0100 Neil Williams wrote: > Please note, the current homepage for libowasp-antisamy-java appears to > have no commits beyond version 1.5.3 but the change for CVE-2022-29577 > does match the source code for libowasp-antisamy-java: > https://sources.de

Bug#1010154: libowasp-antisamy-java: CVE-2022-28366 + CVE-2022-28367

2022-04-25 Thread Neil Williams
Source: libowasp-antisamy-java Version: 1.5.3+dfsg-1.1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, Please note, the current homepage for libowasp-antisamy-java appears to have no commits beyond version 1.5.3 but the change for CVE-2022-29577 do

Bug#716555: [Mayhem] Bug report on omniorb: omniMapper crashes with exit status 139

2022-04-22 Thread Neil Williams
pecify the location of omniMapper's config file. Alternatively, set the environment variable OMNIMAPPER_CONFIG or use the default /etc/omniMapper.cfg. Use -v to verbosely record what's going on. I'll close this bug report with the next upload of omniorb. -- Neil Williams =

Bug#1009960: composer: CVE-2022-24828 - arbitrary command execution via VcsDriver getFileContent

2022-04-21 Thread Neil Williams
Source: composer Version: 2.2.9-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for composer. CVE-2022-24828[0]: | Composer is a dependency manager for the PHP programming language. | Integrators using C

Bug#1009900: fis-gtm: Multiple CVEs in fis-gtm

2022-04-20 Thread Neil Williams
thout such an upgrade feature. If there is time, then we are > working a V7 version with the V6 to V7 block upgrade capability and > would like to release that. Seems sensible. > > Thanks, > Amul > > -Original Message- > From: Andreas Tille > Sent: Wednesday

Bug#1009900: fis-gtm: Multiple CVEs in fis-gtm

2022-04-20 Thread Neil Williams
Source: fis-gtm Version: 6.3-014-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for fis-gtm. CVE-2021-44492[0]: | An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS | GT.M through

Bug#1009678: haskell-aeson: CVE-2021-41119 - JSON DoS Vulnerability in Haskell's Aeson library

2022-04-14 Thread Neil Williams
Source: haskell-aeson Version: 1.4.7.1-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for haskell-aeson. CVE-2021-41119[0]: | Wire-server is the system server for the wire back-end services. | Releases

Bug#1009676: grunt: CVE-2022-0436 - Path Traversal in grunt prior to 1.5.2

2022-04-14 Thread Neil Williams
Source: grunt Version: 1.4.1-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for grunt. CVE-2022-0436[0]: | Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2. If you fix the vulnerabilit

Bug#1009636: ruby-devise-two-factor: CVE-2021-43177 - possible reuse of OTP due to incomplete fix for CVE-2015-7225

2022-04-13 Thread Neil Williams
On Wed, 13 Apr 2022 11:18:50 +0100 Neil Williams wrote: > Source: ruby-devise-two-factor > Version: 4.0.2-1 > Severity: important > Tags: security > X-Debbugs-Cc: codeh...@debian.org, Debian Security Team > > > Hi, > > The following vulnerability was publis

Bug#1009636: ruby-devise-two-factor: CVE-2021-43177 - possible reuse of OTP due to incomplete fix for CVE-2015-7225

2022-04-13 Thread Neil Williams
Source: ruby-devise-two-factor Version: 4.0.2-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for ruby-devise-two-factor. CVE-2021-43177[0]: | As a result of an incomplete fix for CVE-2015-7225, in versi

Bug#1009626: android-platform-frameworks-base: CVE-2021-39796 - possible to trick victim to install harmful app due to a tapjacking/overlay attack

2022-04-13 Thread Neil Williams
Source: android-platform-frameworks-base Version: 1:10.0.0+r36-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for android-platform-frameworks-base. CVE-2021-39796[0]: | In HarmfulAppWarningActivity of H

Bug#1009044: mruby: CVE-2022-1212 - Use-After-Free in str_escape

2022-04-06 Thread Neil Williams
Source: mruby Version: 3.0.0-3 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team The following vulnerability was published for mruby. CVE-2022-1212[0]: | Use-After-Free in str_escape in mruby/mruby in GitHub repository | mruby/mruby prior to 3.2. Possibl

Bug#1009035: ruby-asciidoctor-include-ext: CVE-2022-24803 - Command Injection vulnerability

2022-04-06 Thread Neil Williams
Source: ruby-asciidoctor-include-ext Version: 0.3.1-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for ruby-asciidoctor-include-ext. CVE-2022-24803[0]: | Asciidoctor-include-ext is Asciidoctor’s s

Bug#1009030: twisted: CVE-2022-24801 - Inconsistent Interpretation of HTTP Requests

2022-04-06 Thread Neil Williams
Source: twisted Version: 22.2.0-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for twisted. CVE-2022-24801[0]: | Twisted is an event-based framework for internet applications, | supporting Python 3.6+.

Bug#1008970: ITP: pyimagetool -- Image Tool for multidimensional analysis

2022-04-05 Thread Neil Williams
Package: wnpp Severity: wishlist Owner: Neil Williams X-Debbugs-Cc: debian-de...@lists.debian.org, codeh...@debian.org * Package name: pyimagetool Version : 1.0 Upstream Author : Kyle Gordon * URL : https://github.com/kgord831/PyImageTool * License : GPL3

Bug#1008817: libphonenumber8: breaks evolution

2022-04-02 Thread Neil Mayhew
On 2022-04-02 09:14, tony mancill wrote: I will work on patching 8.12.46 and also mention this upstream. The changelogs for 8.12.45 and 8.12.46 only reference metadata updates. If there was a non-metadata change that wasn't mentioned in the changelog, it will be the second time this has happen

Bug#1008723: puma: CVE-2022-24790 - Inconsistent Interpretation of HTTP Requests

2022-03-31 Thread Neil Williams
Source: puma Version: 5.5.2-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for puma. CVE-2022-24790[0]: | Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for | Ruby/Rack applications. W

Bug#1008520: cctbx hard-codes the python version in it's local patches

2022-03-29 Thread Neil Williams
in but it may be necessary to retain the current patch method and I don't see why that is against Policy. It's not pretty, I agree, but I have not (yet) found an alternative. -- Neil Williams = https://linux.codehelp.co.uk/ pgp0AGDKt81aG.pgp Description: OpenPGP digital signature

Bug#1008566: ITP: xrt -- XRay Tracer and wave propagation

2022-03-28 Thread Neil Williams
Package: wnpp Severity: wishlist Owner: Neil Williams X-Debbugs-Cc: debian-de...@lists.debian.org, codeh...@debian.org * Package name: xrt Version : 1.4.0-1 Upstream Author : Konstantin Klementiev * URL : https://github.com/kklmn/xrt * License : Expat

Bug#1008216: clickhouse: Multiple CVEs in clickhouse - heap overflows and out of bounds reads in LZ4 compression

2022-03-24 Thread Neil Williams
Source: clickhouse Version: 18.16.1+ds-7.2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for clickhouse. The vulnerabilities require authentication, but can be triggered by any user with read permis

Bug#1008144: ITP: looktxt -- Convert free format text file into scientific data formats

2022-03-23 Thread Neil Williams
Package: wnpp Severity: wishlist Owner: Neil Williams X-Debbugs-Cc: debian-de...@lists.debian.org, codeh...@debian.org * Package name: looktxt Version : 1.5-1 Upstream Author : Emmanuel Farhi * URL : https://github.com/farhi/looktxt * License : GPL-2

Bug#1007952: python-model-mommy: Package has been renamed upstream

2022-03-19 Thread Neil Williams
Source: python-model-mommy Version: Replaced by python-model-bakery Severity: normal Background: https://linux.codehelp.co.uk/moving-to-bakery.html "Model Bakery is a rename of the legacy Model Mommy project." https://github.com/model-bakers/model_bakery IMPORTANT: Model Mommy is no longer maint

Bug#1007243: kotlin: CVE-2022-24329 - not possible to lock dependencies for Multiplatform Gradle Projects

2022-03-14 Thread Neil Williams
Source: kotlin Version: 1.3.31+~1.0.1+~0.11.12-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for kotlin. CVE-2022-24329[0]: | In JetBrains Kotlin before 1.6.0, it was not possible to lock | dependencie

Bug#1007239: tightvnc: CVE-2022-23967 - overflow in vncviewer, possible duplicate report of CVE-2019-15679

2022-03-14 Thread Neil Williams
Source: tightvnc Version: 1:1.3.10-5 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for tightvnc. CVE-2022-23967[0]: | In TightVNC 1.3.10, there is an integer signedness error and resultant | heap-based b

Bug#1007109: jackson-databind: CVE-2020-36518 - denial of service via a large depth of nested objects

2022-03-11 Thread Neil Williams
Source: jackson-databind Version: 2.13.0-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for jackson-databind. CVE-2020-36518[0]: | jackson-databind before 2.13.0 allows a Java StackOverflow exception |

Bug#1006759: ruby-commonmarker: CVE-2022-24724 - integer overflow prior to 0.29.0.gfm.3 and 0.28.3.gfm.21 in cmark extension

2022-03-04 Thread Neil Williams
Source: ruby-commonmarker Version: 0.23.2-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team iHi, The following vulnerability was published for ruby-commonmarker. https://sources.debian.org/src/ruby-commonmarker/0.23.2-2/ext/commonmarker/table.c/?hl=16

Bug#1006760: r-cran-commonmark: CVE-2022-24724 - integer overflow prior to 0.29.0.gfm.3 and 0.28.3.gfm.21 (cmark extension)

2022-03-04 Thread Neil Williams
Source: r-cran-commonmark Version: 1.7-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team The following vulnerability was published for r-cran-commonmark. https://sources.debian.org/src/r-cran-commonmark/1.7-2/src/extensions/table.c/?hl=140#L140 CVE-2

Bug#1006758: python-cmarkgfm: CVE-2022-24724 - integer overflow in cmark extension prior to 0.29.0.gfm.3 and 0.28.3.gfm.21

2022-03-04 Thread Neil Williams
Source: python-cmarkgfm Version: 0.4.2-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for python-cmarkgfm. https://sources.debian.org/src/python-cmarkgfm/0.4.2-1/third_party/cmark/extensions/table.c/?hl

Bug#1006756: cmark-gfm: CVE-2022-24724 - integer overflow prior to 0.29.0.gfm.3 and 0.28.3.gfm.21 may lead to heap corruption

2022-03-04 Thread Neil Williams
Source: cmark-gfm Version: 0.29.0.gfm.2-2 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team The following vulnerability was published for cmark-gfm. CVE-2022-24724[0]: | cmark-gfm is GitHub's extended version of the C reference | implementation of Commo

Bug#1006757: ghostwriter: CVE-2022-24724 - integer overflow prior to 0.29.0.gfm.3 and 0.28.3.gfm.21

2022-03-04 Thread Neil Williams
Source: ghostwriter Version: 2.1.1-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for ghostwriter. https://sources.debian.org/src/ghostwriter/2.1.1-1/3rdparty/cmark-gfm/extensions/table.c/?hl=154#L154

Bug#1006750: hoteldruid: CVE-2022-22909 - remote code execution vulnerability in Create New Room module v3.0.3

2022-03-04 Thread Neil Williams
Source: hoteldruid Version: 3.0.3-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team The following vulnerability was published for hoteldruid. CVE-2022-22909[0]: | HotelDruid v3.0.3 was discovered to contain a remote code execution | (RCE) vulnerabilit

Bug#1006749: puppet-module-puppetlabs-firewall: CVE-2022-0675 - unmanaged rules could leave system in an unsafe state via duplicate comment

2022-03-04 Thread Neil Williams
Source: puppet-module-puppetlabs-firewall Version: 1.12.0-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for puppet-module-puppetlabs-firewall. CVE-2022-0675[0]: | In certain situations it is possible f

Bug#1006731: xserver-xorg-core: Blank screen after resume using AMD Cezanne on Thinkpad L15 Gen 2a.

2022-03-03 Thread Neil Turton
. Kind regards, Neil. -- Package-specific info: /etc/X11/X does not exist. /etc/X11/X is not a symlink. /etc/X11/X is not executable. VGA-compatible devices on PCI bus: -- 07:00.0 VGA compatible controller [0300]: Advanced Micro Devices, Inc. [AMD/ATI] Cezanne [100

  1   2   3   4   5   6   7   8   9   10   >