Bug#998156: contains non-DFSG-free files

2021-11-01 Thread Florian Weimer
* Henry Cejtin: > (I assume you meant ml-nlffigen.) ml-nlffigen is part of SML/NJ, not > part of MLton. /usr/bin/mlnlffigen is part of mlton-tools. I believe the code generation requirements are different for MLton and SML/NJ.

Bug#998156: contains non-DFSG-free files

2021-11-01 Thread Florian Weimer
* Henry Cejtin: > As far as I know, the ckit stuff is just included because it needed > some tweaks to work under MLton. > I don't think that any of "our" stuff depends on it. I think mlnffigen needs ckit.

Bug#993162: libc6: i386 (Geode LX): latest push to Bookwork produces multiple sig ILL

2021-08-29 Thread Florian Weimer
* Aurelien Jarno: > I have been looking at the corresponding instruction, this is: > > 2ed0 <__cpu_indicator_init@GCC_4.8.0>: > 2ed0: f3 0f 1e fb endbr32 > > This is an Intel CET instruction, and it seems your CPU doesn't support > executing it. Anyway this shows that the

Bug#975219: [Debichem-devel] Bug#975219: elkcode: FTBFS: internal compiler error: in lookup_field_for_decl, at tree-nested.c:288

2020-11-22 Thread Florian Weimer
* Lucas Nussbaum: > Hi Michael, > > On 22/11/20 at 15:32 +0100, Michael Banck wrote: >> Hi Lucas, >> >> That looks like an ICE, shouldn't that be filed with gfortran? > > Usually my logic is: if there's only one similar failure, I file a bug > against the affected package, rather than against the

Bug#964815: it looks like dprof2calltree cannot be distributed with a GPL-2 work

2020-07-11 Thread Florian Weimer
* Nicholas D. Steeves: > Hi, > > Adrian Bunk writes: > >> On Fri, Jul 10, 2020 at 07:48:31PM -0400, Nicholas D Steeves wrote: >> >>> it would still not be DFSG-free, because it >>> fails the "desert island test" for snail mail. Were OmniTI Computer >>> Consulting would accept email, it would als

Bug#954715: glibc: FTBFS: tests failed: signal/tst-minsigstksz-1 signal/tst-minsigstksz-2

2020-03-22 Thread Florian Weimer
* Lucas Nussbaum: > Source: glibc > Version: 2.30-2 > Severity: serious > Justification: FTBFS on amd64 > Tags: bullseye sid ftbfs > Usertags: ftbfs-20200322 ftbfs-bullseye > > Hi, > > During a rebuild of all packages in sid, your package failed to build > on amd64. >> FAIL: signal/tst-minsigstks

Bug#924712: crypt() not available _XOPEN_SOURCE is defined

2019-08-25 Thread Florian Weimer
* Francesco Poli: > Hello everyone, > I am sorry to ask, but... I cannot understand what's the status of > [this bug report]. > > [this bug report]: > > A serious bug for libc6-dev without any apparent activity since last > March? Sure there must have been some hi

Bug#924891: glibc: FTBFS: /<>/build-tree/amd64-libc/conform/UNIX98/ndbm.h/scratch/ndbm.h-test.c:1:10: fatal error: ndbm.h: No such file or directory

2019-03-27 Thread Florian Weimer
retitle 924891 glibc: misc/tst-pkey fails due to cleared PKRU register after signal in amd64 32-bit compat mode thanks * Lucas Nussbaum: > On 27/03/19 at 08:48 +0100, Florian Weimer wrote: >> > If that's useful, I can easily provide access to an AWS VM to debug this >> &

Bug#924891: glibc: FTBFS: /<>/build-tree/amd64-libc/conform/UNIX98/ndbm.h/scratch/ndbm.h-test.c:1:10: fatal error: ndbm.h: No such file or directory

2019-03-27 Thread Florian Weimer
* Lucas Nussbaum: > On 26/03/19 at 23:10 +0100, Aurelien Jarno wrote: >> On 2019-03-22 17:30, Florian Weimer wrote: >> > > About the archive rebuild: The rebuild was done on EC2 VM instances from >> > > Amazon Web Services, using a clean, minimal and up-to-date

Bug#924891: glibc: FTBFS: /<>/build-tree/amd64-libc/conform/UNIX98/ndbm.h/scratch/ndbm.h-test.c:1:10: fatal error: ndbm.h: No such file or directory

2019-03-22 Thread Florian Weimer
> About the archive rebuild: The rebuild was done on EC2 VM instances from > Amazon Web Services, using a clean, minimal and up-to-date chroot. Every > failed build was retried once to eliminate random failures. I believe the actual test failure is tst-pkey. Presumably, this rebuild was performed

Bug#924712: crypt() not available _XOPEN_SOURCE is defined

2019-03-21 Thread Florian Weimer
* Laurent Bigonville: > Le 19/03/19 à 19:43, Florian Weimer a écrit : >> * Laurent Bigonville: >> >>> Package: libc6-dev >>> Version: 2.28-8 >>> Severity: serious >>> >>> Hi, >>> >>> The crypt.3 manpage, state that

Bug#924712: crypt() not available _XOPEN_SOURCE is defined

2019-03-19 Thread Florian Weimer
* Laurent Bigonville: > Package: libc6-dev > Version: 2.28-8 > Severity: serious > > Hi, > > The crypt.3 manpage, state that _XOPEN_SOURCE should be define for > crypt() to be available. > > But it looks that it's currently the opposite, if _XOPEN_SOURCE is > defined, the function cannot be found.

Bug#904808: libcap-ng0: libcap-ng's use of pthread_atfork causes segfaults

2019-02-28 Thread Florian Weimer
The problem here is the weak declaration: $ eu-readelf --symbols=.dynsym /lib64/libcap-ng.so.0.0.0 | grep pthread_atfork 28: 0 NOTYPE WEAK DEFAULTUNDEF pthread_atfork In the Fedora 29 build, the constructor looks like this: Dump of assembler code for function init

Bug#907585: Backport also needs fixing

2018-09-12 Thread Florian Weimer
found 907585 20180518-1~bpo9+1 thanks firmware-cavium_20180518-1~bpo9+1_all.deb is still in the package pool and contains the offending binary.

Bug#857909: [libc6-dev] getpid() in child process created using clone(CLONE_VM) returns parent's pid

2017-03-23 Thread Florian Weimer
* John Paul Adrian Glaubitz: > I would suggest filing a bug report to glibc upstream or posting on > their mailing list to ask for feedback. Upstream has since removed the PID cache:

Bug#846374: debsecan: Debsecan cannot access https://security-tracker.debian.org/tracker/debsecan/*/1

2016-11-30 Thread Florian Weimer
* Berke Durak: > Debsecan stopped working. It fails as it is trying to access > >https://security-tracker.debian.org/tracker/debsecan/release/1/GENERIC > > or /sid, /jessie, etc. > > It displays the following error: > > % debsecan > error: while downloading > https://security-tracke

Bug#839317: [pkg-golang-devel] Bug#839317: golang-1.7: FTBFS: tests failed

2016-10-01 Thread Florian Weimer
* Lucas Nussbaum: >> --- FAIL: TestLoadFixed (0.00s) >> time_test.go:943: Now().In(loc).Zone() = "-01", -3600, want >> "GMT+1", -3600 Is this due to a tzdata change?

Bug#832824: haskell-src-exts: reporting a bug at GHC for linker error. build fail on mips64el

2016-10-01 Thread Florian Weimer
* Clint Adams: > Can you explain what GHC might be doing wrong? Did binutils get > stricter about something? What is R_MIPS_GOT_DISP? Are the GOT > constraints the same on mips64el as they are on mipsel? I suppose so, because the instruction encoding is quite similar. According to the binutil

Bug#839260: ghostscript: various sandbox bypasses

2016-09-30 Thread Florian Weimer
Package: ghostscript Version: 9.19~dfsg-3 Tags: security Severity: grave Tavis Ormandy has reported several sandbox bypasses on the oss-security mailing list. (also see follow-ups) Filed upstream as:

Bug#839051: bind9: Unfixed crasher bug in wheezy LTS

2016-09-28 Thread Florian Weimer
Package: bind9 Version: 1:9.8.4.dfsg.P1-6+nmu2+deb7u10 Tags: security wheezy Severity: grave The wheezy LTS version of bind9 has an additional crasher bug. It may be due to an incomplete backport of the fix for CVE-2015-5477. I'm attaching the reproducer. Upstream BIND without the fix for CVE-2

Bug#839010: bind9: CVE-2016-2776: Assertion failure in query processing

2016-09-27 Thread Florian Weimer
Package: bind9 Version: 1:9.10.3.dfsg.P4-10.1 Tags: security Severity: grave ISC has released a security alert at Relevant information from this report follows: CVE: CVE-2016-2776 Document Version: 2.0 Posting date: 2016-09

Bug#838960: denial of service with crafted id3v2 tags in all mpg123 versions since 0.60

2016-09-27 Thread Florian Weimer
* Thomas Orgis: > Am Tue, 27 Sep 2016 10:27:04 +0100 > schrieb James Cowgill : > >> Does this have a CVE ID? If not it should get one. > > I wondered about that. At the moment I just acted on the bug report and > pushed the fix. I have to personal experience with the CVE procedure. > In the past,

Bug#819050: Please leave the severity at serious, this bug is a security issue.

2016-03-24 Thread Florian Weimer
* Hilko Bengen: > the original report may not have been 100% clear on this, but the bug is > the main cause of a vulnerability in Suricata (a network IDS/IPS) that > allows for remote denial of service, possibly remote code execution by > simply passing crafted packets by a Suricata installation.

Bug#807341: git-repair: uses non-random tempdir /tmp/tmprepo.0/.git/

2015-12-09 Thread Florian Weimer
* Jonas Smedegaard: > git-repair uses /tmp/tmprepo.0/.git/ which is clearly static, and I > believe therefore (on non-hardened systems) insecure. I think it does mkdir and if it fails, it tries again with /tmp/tmprepo.1, /tmp/tmrepo.2, and so on. I'm not sure you can abuse this and fool git-repa

Bug#803161: mailman: /var/log/mailman/* world-readable by default, leaking sensitive list information

2015-10-27 Thread Florian Weimer
severity 803161 normal thanks * Dominik George: > Severity: critical > Tags: security > Justification: root security hole > > The log files of mailman, residing in /var/lib/mailman/log and in > /var/log/mailman, and the log directory itself are created > world-readable by default. This discloses

Bug#801413: polarssl: CVE-2015-5291: Remote attack on clients using session tickets or SNI

2015-10-20 Thread Florian Weimer
* James Cowgill: > They seemed pretty resistive to the idea of just adding specific > patches on top of 1.3.9, and if you look at the changelog there are a > number of other security bugs which seem important but don't have CVEs > because they couldn't be triggered remotely. > https://github.com/A

Bug#781128: security.debian.org: GeoDNS load balancing of Debian Security mirrors + out of date mirrors means you cant patch

2015-03-25 Thread Florian Weimer
* Sam McLeod: > So the fix is just to wait for all Debian mirrors to be in sync > before you can patch? We usually send out the announcement email only after the mirror sync has completed. But there can be delays, and other users might get confused if there is a security update without a matchin

Bug#781128: security.debian.org: GeoDNS load balancing of Debian Security mirrors + out of date mirrors means you cant patch

2015-03-25 Thread Florian Weimer
* Sam McLeod: > 4) Mirror given by GeoDNS for security.debian.org was: > - nashira.anu.edu.au (Located in Canberra, Australia) > - Out of date and did not contain the patch. As far as I can tell, the Australian mirror is in sync now: $ wget -q -O- --header "Host: security.debian.org" http://glu

Bug#773610: libapache2-svn: apache2 restart failed: mod_dav_svn.so: undefined symbol:, dav_svn__new_error

2014-12-20 Thread Florian Weimer
* Arne Nordmark: > The wheezy-security upload breaks libapache2-svn in exactly the same > way as the previous upload 1.6.17dfsg-4+deb7u5, which was fixed in > 1.6.17dfsg-4+deb7u6, see bug number 741314 for more details. Ugh, I'm building this now myself and will upload another version if it passe

Bug#760377: confirm apache 1 and gpl-1+ situation

2014-11-10 Thread Florian Weimer
* Paul Gevers: > [2] > http://anonscm.debian.org/cgit/collab-maint/xmlrpc-c.git/tree/lib/util/getoptx.h?h=debian-sid You should investigate if you can use the getopt from glibc, which is released under the LGPL. > [3] > http://anonscm.debian.org/cgit/collab-maint/xmlrpc-c.git/tree/tools/turbocha

Bug#742140: libpam-oath: PAM module does not check whether strdup allocations succeeded

2014-11-06 Thread Florian Weimer
* Andreas Barth: > we have the following debian bug report about an security isuse in > libpam-oath (source oath-toolkit, upstream web page > http://www.nongnu.org/oath-toolkit/ ). > > What is the appropriate process to get an CVE number on it? This issue > is already public, as it is documented i

Bug#766397: Bug#766395: emacs/gnus: Uses s_client to for SSL.

2014-10-23 Thread Florian Weimer
* Richard Stallman: > I've read that falling back to ssl3 is a real security hole, > being exploited frequently. That feature should be removed. GNUTLS automatically and securely upgrades to a TLS protocol if supported by the server. Dropping SSL 3.0 support altogether will only encourage unenc

Bug#742145: openssl: uses only 32 bytes (256 bit) for key generation

2014-03-19 Thread Florian Weimer
* Thorsten Glaser: >>Historically, the OpenSSL command line tools have been intended for >>debugging only. > > I disagree, It's what I was told by the OpenSSL developers. > Also, what do other tools (that do not invoke openssl(1) > unlike most of these I saw, which were shell wrappers > around i

Bug#734789: [CVE-2013-7284] Remote pre-authentication code execution in PlRPC

2014-01-09 Thread Florian Weimer
Package: libplrpc-perl Severity: grave Version: 0.2020-2 Tags: security upstream The PlRPC module uses Storable in an unsafe way, leading to a remote code execution vulnerability (in both the client and the server). Upstream bug report: https://rt.cpan.org/Public/Bug/Display.html?id=90474 A fix

Bug#731933: libmicrohttpd: CVE-2013-7038 CVE-2013-7039

2013-12-11 Thread Florian Weimer
ine -fix theoretical overflow issue reported by Florian Weimer -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#707410: NMU debdiff

2013-10-19 Thread Florian Weimer
-1,3 +1,13 @@ +mlton (20100608-5.1) unstable; urgency=low + + * Non-Maintainer Upload + * Apply upstream patch to avoid __gmp_const breakage +(Closes: 707410) + * Apply patch from Matthias Klose to allow building on more target +triplets on i386, not just i486-linux-gnu (Closes: 640137) + +

Bug#709382: Built-Using, libgcc, and libc_nonshared

2013-06-02 Thread Florian Weimer
* Russ Allbery: > Clearly no one else in the world is worrying about this; there's lots of > GPLv2-only software out there and all the distributions are happily > distributing binaries built with current GCC without worrying about this. > I'm not sure to what extent we can use that as an excuse, t

Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-24 Thread Florian Weimer
* Steven Chamberlain: > Hi, > > On 22/05/13 19:46, Florian Weimer wrote: >> Sorry for the delay. I'm taking care of this now. > > Thank you for the DSA. > > I notice a problem though when this was (I think - I'm unsure of the > security team's process

Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-22 Thread Florian Weimer
* Steven Chamberlain: > On 01/05/13 15:20, Christoph Egger wrote: >> Florian Weimer writes: >>> Looks good. Please upload to security-master directly. You have to >>> rebuild with -sa, though, so that the upstream tarball is included in >>> the upload. >

Bug#708267: cve-2002-2443: kpasswd udp ping-pong

2013-05-20 Thread Florian Weimer
* Sam Hartman: >>>>>> "Florian" == Florian Weimer writes: > > > Florian> Yes, packet loops can be annoying. I think we should issue > Florian> a DSA for this. > > OK, do you want me to prepare patches and builds for squeeze and whe

Bug#708267: cve-2002-2443: kpasswd udp ping-pong

2013-05-20 Thread Florian Weimer
* Sam Hartman: > I assume this goes back to squeeze as well. > > Shouldn't the severity be higher? This seems probably worth a DSA > because such ping-pong attacks can really be bad for a network/server. > Or am I missing mittigations? Yes, packet loops can be annoying. I think we should issue a

Bug#708267: cve-2002-2443: kpasswd udp ping-pong

2013-05-20 Thread Florian Weimer
* Tom Yu: > Florian Weimer writes: > >> * Tom Yu: >> >>> Some limited testing indicates that when the packet storm is confined >>> to a single host, legitimate kpasswd and kadm5 requests can still get >>> through, and the CPU usage pegs at about 7

Bug#708267: cve-2002-2443: kpasswd udp ping-pong

2013-05-20 Thread Florian Weimer
* Tom Yu: > Some limited testing indicates that when the packet storm is confined > to a single host, legitimate kpasswd and kadm5 requests can still get > through, and the CPU usage pegs at about 70%. I haven't tested with > multiple hosts involved. Out of curiosity, how many spoofed packets ha

Bug#708291: libjansi-native-java: package appears to be unusable

2013-05-14 Thread Florian Weimer
Package: libjansi-native-java Version: 1.0-3 Severity: grave The package claims to provide JNI libraries, but is architecture: all. For some reason, there are no DSOs in the JAR files. I think as it stands, the package is completely usable. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@li

Bug#708164: nginx proxy_pass buffer overflow (CVE-2013-2070)

2013-05-13 Thread Florian Weimer
* Thijs Kinkhorst: > A buffer overflow in the proxy_pass module has been reported by > Nginx upstream, and a patch made available. Please see: > http://www.openwall.com/lists/oss-security/2013/05/13/3 > > The issue is already fixed in the version in sid, and as far > as I can see the code is not p

Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Florian Weimer
* Christoph Egger: > Packages will be in people.d.o:~christoph soon (or shall I upload to > security directly? Looks good. Please upload to security-master directly. You have to rebuild with -sa, though, so that the upstream tarball is included in the upload. -- To UNSUBSCRIBE, email to debi

Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Florian Weimer
* Christoph Egger: > Hi! > > Steven Chamberlain writes: >> tags 706414 + pending >> thanks >> >> I've applied upstream's patch in SVN, I'm running it now on my NFS >> server and seems okay. >> >> Christoph, would you be able to do an upload of this to unstable please? > > I'm building right now.

Bug#690817: Is that bug still open?

2012-11-04 Thread Florian Weimer
* Ingo Jürgensmann: > I'm fine with that, but unfortunately you didn't answer my question > regarding the prominent warning about security issues that is still > left open and visible to the end user. Please see the attached > screenshots. This appears to be a different bug. Apparently, Drupal p

Bug#691394: opendkim: DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust

2012-10-25 Thread Florian Weimer
* Scott Kitterman: > This is not something that can be dealt with operationally. Unlike > GPG, where keys are trusted based on signatures and web of trust > (and people can decline to sign bad keys), in DKIM keys are trusted > based on their being published in the sending domain's DNS and there >

Bug#689755: bind9: memory hole in named

2012-10-09 Thread Florian Weimer
* Christoph Anton Mitterer: > On Mon, 2012-10-08 at 07:14 +0200, Florian Weimer wrote: >> Have you configured a memory limit for the cache? > Which would you mean max-cache-size or max-acache-size? Not sure. I think in my days, there was max-cache-size only. > Well I think that

Bug#689755: bind9: memory hole in named

2012-10-07 Thread Florian Weimer
retitle 689755 bind9: memory leak in named thanks * Christoph Anton Mitterer: > Since some update (unfortunately I forgot which one,.. but it's at > least months ago) I experiece a memory hole in named. Have you configured a memory limit for the cache? By default, there is no limit, and records

Bug#682826: world writable directories possible patch

2012-09-01 Thread Florian Weimer
* Barak A. Pearlmutter: > - have a setuid program that builds fasl files from trusted sources, >which in practice means download them itself or from .deb packages Or a daemon, given that it's difficult to write SUID programs in Lisp. I thought we had common-lisp-controller for that? -- To

Bug#682826: world writable directories possible patch

2012-09-01 Thread Florian Weimer
> Using chmod 1777 could help? > > I attached a patch just in case it does. Not really, I think. Users cannot build .fasl files for other users because they could supply crafted ones which do something different from what the original Lisp sources do. -- To UNSUBSCRIBE, email to debian-bugs-rc

Bug#679828: libc6: No easy way of enabling DNSSEC validation aka RES_USE_DNSSEC

2012-07-01 Thread Florian Weimer
* Matthew Grant: > From my investigations this can only be enabled by recompiling each bit > of software to set the RES_USE_DNSSEC flag in _res.options, as well as > RES_USE_EDNS0. (Please see racoon bug #679483). The enablement method > is from openssh 6.0p1, openbsd-compat/getrrsetbyname.c Th

Bug#679272: bcfg2-server: unescaped shell command issues in the Trigger plugin

2012-06-27 Thread Florian Weimer
* Arto Jantunen: >> In Debian (and all other distros I know of) the bcfg2 server runs as >> root, so in practice this is a remote root hole (limited to attackers >> who can connect to the bcfg2 server (protected by a password and/or an >> ssl key)). > > .dsc and .debian.tar.gz for a fixed package

Bug#658276: libcurl3: Doesn't work for all sites anymore

2012-03-31 Thread Florian Weimer
* Alessandro Ghedini: >> Anyway, you can upload to security-master when ready. You must build >> the package with specifying the -sa flag, on a squeeze system. > > Ok, thank you. Thanks for uploading. I'm a bit confused--is this an interoperability issue introduced by DSA-2398-1? -- To UNSU

Bug#658276: libcurl3: Doesn't work for all sites anymore

2012-03-28 Thread Florian Weimer
* Alessandro Ghedini: >> We should fix this through stable-security. Please send a debdiff once >> the fix has been testing in unstable for a few days. > > Attached is the debdiff for stable-security. Looks good. > If everything's ok I will upload it (I'm a DD since a few hours) in > a few days,

Bug#665656: openarena-server: is vulnerable for getstatus DRDoS attack

2012-03-25 Thread Florian Weimer
* Simon McVittie: > Some proposed updates using the patch from ioquake3 are in my home > directory on alioth: > . Patch for review: > Thanks for w

Bug#665656: openarena-server: is vulnerable for getstatus DRDoS attack

2012-03-25 Thread Florian Weimer
* Simon McVittie: > Dear security team: what do you consider the severity of this bug to be? > Is it the sort of thing you issue DSAs for? So the problem seems to be traffic amplification by a factor or 250. (around 2000 bytes in, 500,000 bytes out). Is this correct? Is there any experience whi

Bug#661150: dropbear: CVE-2012-0920 SSH server use-after-free vulnerability]

2012-02-28 Thread Florian Weimer
* Gerrit Pape: > For stable, I backported the fix to 0.52, swiftly checked with upstream > (thx Matt), and prepared theses changes (debdiff attached): Thanks. Please build with -sa and upload to security-master. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subje

Bug#659899: CVE-2011-0790: XSS

2012-02-27 Thread Florian Weimer
* Antoine Beaupré: > I don't actually know - I followed your lead and used that patch in the > bugzilla Redhat bugtrackers: > > https://bugzilla.redhat.com/attachment.cgi?id=556619&action=diff&context=patch&collapsed=&headers=1&format=raw *grml* Fedora has already released the potentially incorr

Bug#659899: CVE-2011-0790: XSS

2012-02-27 Thread Florian Weimer
* Antoine Beaupré: > I don't actually know - I followed your lead and used that patch in the > bugzilla Redhat bugtrackers: > > https://bugzilla.redhat.com/attachment.cgi?id=556619&action=diff&context=patch&collapsed=&headers=1&format=raw Okay, I'm notifying folks that this patch is probably not

Bug#661509: security.debian.org: Packages-file for squeeze-amd64 broken

2012-02-27 Thread Florian Weimer
* Tim Riemenschneider: > security.debian.org is currently unusable (for amd64 squeeze) I cannot reproduce this (at 20:17 CET). What does "currently" mean, exactly? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...

Bug#659899: CVE-2011-0790: XSS

2012-02-27 Thread Florian Weimer
* Antoine Beaupré: > ++ $h =~ s/[<>&%]/./g; > ++$step =~ s/[<>&%]/./g; > ++$mode =~ s/[<>&%]/./g; > ++$t =~ s/[<>&%]/./g; > ++$targ =~ s/[<>;%]/./g; > ++$hierarchy =~ s/[<>;%]/./g; These patterns do not match the special character ". Therefore, it

Bug#659296: Comments on the 0.4.1-6 upload

2012-02-13 Thread Florian Weimer
Vasudev Kamath asked me to include this information in the bug report. From: Florian Weimer Subject: Re: Accepted surf 0.4.1-6 (source i386) To: Vasudev Kamath Date: Fri, 10 Feb 2012 23:18:36 +0100 Message-ID: <87vcnemiwz@mid.deneb.enyo.de> * Vasudev Kamath: > surf (0.4.1-6)

Bug#388141: Let's ask for a relicensing agreement

2012-01-26 Thread Florian Weimer
* David Prévot: > provided to the Debian website Perhaps it could be made clearer that this applies to the web site proper and not to other contributions to Debian which also appear on the web. I think there should be a paragraph about third party contributions submitted by the recipient. The r

Bug#516394: djbdns

2012-01-08 Thread Florian Weimer
* Russ Allbery: > The remaining statement on this bug from the security team is: > > | djbdns should not be part of squeeze until it is properly hardened > | against cache poisoning. It is between 100 and 200 times easier than > | with other DNS servers. > > I don't understand the basis of that c

Bug#652371: [CVE-2011-4824] SQL injection issue in auth_login.php

2011-12-16 Thread Florian Weimer
Package: cacti Version: 0.8.7g-1 Tags: security upstream fixed-upstream Severity: grave Several vulnerabilities have been disclosed in cacti: | SQL injection vulnerability in auth_login.php in Cacti before 0.8.7h | allows remote attackers to execute arbitrary SQL commands via the | login_username

Bug#645881: critical update 29 available

2011-12-11 Thread Florian Weimer
* Matthias Klose: > On 12/11/2011 01:07 PM, Holger Levsen wrote: >> Hi, >> >> On Sonntag, 11. Dezember 2011, Philipp Kern wrote: >>> sorry, but I'd rather like to have an announcement that it has a bug, >> >> me too, for all the reasons Philipp noted. >> >> It's also trivial to download the fix

Bug#645881: critical update 29 available

2011-12-11 Thread Florian Weimer
* Philipp Kern: > sun-java6 is sadly still a very high profile package. I won't go and > break all those installations which force sun-java6 over openjdk-6 > locally, either in unattended installations or through other means. It's really unfortunate that most of those installations seem to need

Bug#651225: Security vulnerabilities (CVE-2011-2904, CVE-2011-3263, CVE-2011-3265, CVE-2011-4674)

2011-12-06 Thread Florian Weimer
Package: zabbix Version: 1:1.8.2-1squeeze2 Tags: security Severity: grave There appear to be several unfixed unverabilities in Zabbix in squeeze, including SQL injection vulnerabilities: http://security-tracker.debian.org/tracker/CVE-2011-2904 http://security-tracker.debian.org/tracker/CVE-2011-3

Bug#650880: aptitude safe-upgrade segfaults, aptitude update fails: E: Encountered a section with no Package: header

2011-12-04 Thread Florian Weimer
reopen 650880 reassign 650880 aptitude retitle 650880 aptitude segfaults with malformed Packages file severity 650880 normal tags 650880 -security thanks * Ralf Spenneberg: > Running aptitude upgrade then fails: > > LANG=C aptitude safe-upgrade > Reading package lists... Error! > E: Encountered a

Bug#645881: critical update 29 available

2011-12-01 Thread Florian Weimer
* Moritz Mühlenhoff: > Florian, what's the status of openjdk6 for stable/oldstable? I've released the pending update for squeeze. lenny will eventually follow, and so will the pending updates for squeeze, but judging by my past performance, it will take a while. If someone else wants to work on

Bug#648373: [CVE-2011-4130] Use-after-free issue

2011-11-11 Thread Florian Weimer
* Francesco P. Lovergine: >> A use-after-free issue has been discovered in ProFTPd: >> >> >> >> It seems that squeeze is vulnerable, too. I haven't checked the code >> in lenny yet. > I have 1.3.3a-6squeeze3 ready for squeeze with the required fix

Bug#648373: [CVE-2011-4130] Use-after-free issue

2011-11-10 Thread Florian Weimer
Package: proftpd-dfsg Version: 1.3.3a-6squeeze1 Severity: grave Tags: security A use-after-free issue has been discovered in ProFTPd: It seems that squeeze is vulnerable, too. I haven't checked the code in lenny yet. -- To UNSUBSCRIBE, email to

Bug#648359: [CVE-2011-4000] Unspecified buffer overflow vulnerability

2011-11-10 Thread Florian Weimer
Package: libchasen2 Version: 2.4.4-16 Severity: grave Tags: security JPCERT disclosed an unspecified buffer overflow vulnerability in ChaSen: Apparently, upstream will not provide patches. Would you be willing to work on this issue if we can obtain f

Bug#645881: critical update 29 available

2011-10-21 Thread Florian Weimer
* Moritz Muehlenhoff: > As for stable/oldstable: I noticed that Red Hat provided packages for > update 29 for RHEL 4 (RHEL 5 onwards use OpenJDK): > http://lwn.net/Articles/463919/ If anyone remembers the rationale behind the DLJ, perhaps they can check if the current BCL matches our needs, too?

Bug#645881: critical update 29 available

2011-10-19 Thread Florian Weimer
* Thijs Kinkhorst: > Upstream has released Java SE 6 update 29 yesterday: > http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html > with security fixes. Does the lack of a DLJ version affect us? The special distributor license is no longer available from Oracle: | As a co

Bug#641950: secuity of Crypt::RC4

2011-09-18 Thread Florian Weimer
* Nicholas Bamber: > Please could have someone have a look at #641950? This module was > packaged as it has been flagged up as a dependency of a new version of > an existing package. However based upon the comments in the bug report > it really is something we do not wish to encourage. > In any ca

Bug#639916: spread: license wackiness

2011-09-04 Thread Florian Weimer
* Ken Arromdee: > Unlike the original BSD 4 clause license this adds "or software that uses > this software". Is it really that much different in effect from the Affero GPL? It may be a bit more far-reaching, but compliance is so much easier. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ..

Bug#640093: Incorrect version number prevents automatic upgrades

2011-09-02 Thread Florian Weimer
Package: opensync Version: 0.22-4squeeze1 Severity: serious At one point, a binary NMU produced a 0.22-4+b1 version, which is larger than 0.22-4squeeze1. Please reupload with a version number like 0.22-4+squeeze1. (Setting severity to serious because #580867 was serious.) -- Florian Weimer

Bug#628476: Package does not seem to work at all

2011-08-19 Thread Florian Weimer
* Jakub Wilk: > Please note however that DCWHyphenator is only one of the available > hyphenators; you might have better luck with others. I couldn't find out how to instantiate any of them. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". T

Bug#629852: Oracle Java SE Critical Patch Update Advisory - June 2011

2011-06-13 Thread Florian Weimer
* Torsten Werner: > Am 09.06.2011 02:07, schrieb Sylvestre Ledru: >> Le mercredi 08 juin 2011 à 23:08 +0200, Nico Golde a écrit : >>> Package: openjdk-6-jre, sun-java6-jre >>> Severity: serious >>> Tags: security >>> >>> A new round of java issues: >>> CVE-2011-0862 CVE-2011-0873 CVE-2011-0815 CVE

Bug#533934: pperl: FTBFS: tests failed directory

2011-06-13 Thread Florian Weimer
* Dominic Hargreaves: > I added the quotation marks because I'm starting to doubt that it is > worth spending time on. I use pperl a bit, but probably wouldn't miss > it hugely, and upstream appears to be dead. I don't use it anymore, either. You could probably get away without hashing, by using

Bug#628476: Package does not seem to work at all

2011-05-29 Thread Florian Weimer
Package: python-wordaxe Version: 0.3.2-1 Severity: grave The documentation mentions importing wordaxe.DCWHyphenator. But this does not work: fw@deneb:~$ python Python 2.6.6 (r266:84292, Dec 26 2010, 22:31:48) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more inform

Bug#622817: perl: CVE-2011-1487: taint laundering in lc, uc

2011-04-19 Thread Florian Weimer
* Niko Tyni: > Security team, I assume this is going to be fixed through a DSA? I don't think this is a security bug on its own. > It should be trivial to port this to squeeze and lenny. I'll try to > prepare the debdiffs on Sunday, but if somebody else wants to do that, > feel free. If this bu

Bug#616114: man in the middle security issue

2011-03-02 Thread Florian Weimer
* Thijs Kinkhorst: > The following report by PolarSSL upstream was brought to our attention: > https://lists.ubuntu.com/archives/ubuntu-motu/2011-February/007026.html > > Unfortunately it doesn't disclose details. I'll contact the upstream > maintainer about that, but in any case a good start woul

Bug#614151: icedtea6-plugin: (PRSC) Please backport fixes for CVE-2011-0025, 4351 to squeeze, lenny

2011-02-20 Thread Florian Weimer
* Jonathan Wiltshire: > Package: icedtea6-plugin > Version: 6b11-9.1 > Severity: grave > Tags: squeeze lenny security > Justification: user security hole > Usertags: prsc-target-lenny, prsc-target-squeeze > > Please backport your fixes for the following CVE reports: There is no icedtea6-plugin pa

Bug#613098: Zero is unusable on amd64

2011-02-12 Thread Florian Weimer
Package: openjdk-6-jre-zero Version: 6b18-1.8.3-2 Severity: grave At least on amd64, all tests fail during build, and all non-trivial programs fail. Here's a stack trace from "javac -zero" compiling a trivial program: java.nio.BufferOverflowException at java.nio.charset.CoderResult.throw

Bug#607794: bind 9.6.ESV.R3 DLV and further delegation issue

2011-01-21 Thread Florian Weimer
severity 607794 important forwarded 607794 bind-b...@isc.org thanks * Peter Palfrader: > Peter Palfrader schrieb am Mittwoch, dem 19. Jänner 2011: > >> severity 607794 serious >> thanks >> >> So, I managed to reproduce the problem which has come up a few times >> now. Note that 9.7.2.dfsg.P3 is

Bug#493599: pushing udns into squeeze

2010-12-02 Thread Florian Weimer
* Michael Tokarev: >> udns doesn't handle truncation, so it won't play well with the >> PowerDNS recursor (which doesn't support EDNS). > > One of the limitations of simplicity of design - only one > socket and it's obviously UDP. With deployment of DNSSEC > everywhere EDNS support becomes a requ

Bug#600667: eglibc: cve-2010-3847 dynamic linker expands $ORIGIN in setuid library search path

2010-10-22 Thread Florian Weimer
* Aurelien Jarno: > I have just committed the fix, I am planning to do an upload soon to > unstable. Do you think we should also fix it in stable? via a security > release? FYI, I have uploaded eglibc 2.11.2-6+squeeze1 to testing-security. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@li

Bug#584911: bind9: hard-coded dependency on "/usr/lib/ssl/openssl.cnf" might cause trouble

2010-06-08 Thread Florian Weimer
reassign 584911 openssl 0.9.8g-15+lenny6 retitle 584911 unreadable /usr/lib/ssl/openssl.cnf file breaks OPENSSL_config thanks * Mirko Gebauer: >> BIND uses the NULL argument, as far as I can tell. So this might be >> an OpenSSL bug. > > Well, all I can say is that bind9 as provided by the packag

Bug#584911: bind9: hard-coded dependency on "/usr/lib/ssl/openssl.cnf" might cause trouble

2010-06-07 Thread Florian Weimer
* Mirko Gebauer: > "/usr/lib/ssl/openssl.cnf" is a symlink to "/etc/ssl/openssl.cnf", > both provided by the package "openssl". Unfortunately, on the > respective machine, "/etc/ssl/openssl.cnf" is modified and not > world-readable as it is by default after installing the "openssl" > package. Tha

Bug#584585: file conflict with libisc50

2010-06-04 Thread Florian Weimer
* Peter Palfrader: >> Stable has libisc40, and there are no conflicts with that TTBOMK. > > Ah. Apparently from the libisc50 that was in unstable (and testing?) > with bind 9.6 at one point and its backport to lenny-backports. > > Hmm. I'm not sure what to do about this. Upload a -0+lenny2 with

Bug#584585: file conflict with libisc50

2010-06-04 Thread Florian Weimer
* Peter Palfrader: > Unpacking libisc52 (from .../libisc52_1%3a9.6.ESV.R1+dfsg-0+lenny1_i386.deb) > ... > dpkg: error processing > /var/cache/apt/archives/libisc52_1%3a9.6.ESV.R1+dfsg-0+le > nny1_i386.deb (--unpack): > trying to overwrite `/usr/lib/libisc.so.50', which is also in package > lib

Bug#560238: Status, client-side breakage

2010-05-30 Thread Florian Weimer
What's the status here? I think the client-side breakage of v4-mapped addresses reported by Guillaume Gimenez in pretty much settles this. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsu

Bug#567039: trac-git: Arbitrary command execution

2010-02-03 Thread Florian Weimer
* Stefan Göbel: > Package: trac-git > Version: 0.0.20080710-3 > Severity: grave > Tags: patch security > Justification: user security hole > > > The trac-git package in Debian Lenny - if enabled in Trac - allows a > remote attacker to execute arbitrary commands on the system with the > rights of t

Bug#506652: status on copyright clearance for boilerplate for xml2rfc?

2009-12-02 Thread Florian Weimer
* Daniel Kahn Gillmor: > On 12/02/2009 02:00 PM, Florian Weimer wrote: >> I misread the document. non-free is definitely a possibility. > > If you think non-free is a reasonable choice for now, could you package > up 1.34 and put it there while the request for DFSG-free licensi

Bug#506652: status on copyright clearance for boilerplate for xml2rfc?

2009-12-02 Thread Florian Weimer
* Daniel Kahn Gillmor: > What's the status on copyright clearance for the boilerplate included in > xml2rfc? It would be useful to me to have the latest version available > through the repositories (even if it means moving it to non-free, though > i hope that wouldn't be necessary). We can't mov

  1   2   3   4   5   >