Bug#1034875: kitty: Should not handle application/x-sh mime type by executing the script

2023-05-06 Thread Gabriel Corona
Hi, In the mean time, it's probably a good idea to drop "application/x-sh;application/x-shellscript" from the list of supported mime type to limit the risk. (I assume that even with "text/plain" and a .sh file extension or a shebang, kitty might still decide to execute the script... so the issu

Bug#972146: /usr/share/applications/mono-runtime-common.desktop: should not handle MIME type by executing arbitrary code

2023-02-18 Thread Gabriel Corona
Hi! > A while has passed, and have now proposed the same change for bullseye > as well, cf. #1031527. Great! There is no CVE assigned, if you feel strong about it, can you try to get one allocated by MITRE via the cveform? I think we won't go trough the needed workflow to assign a Debian speci

Bug#972146: /usr/share/applications/mono-runtime-common.desktop: should not handle MIME type by executing arbitrary code

2023-02-16 Thread Gabriel Corona
Hi, Thanks for the patch! This has been fixed in Debian testing and sid. However, stable is still affected. I believe it would make sense to port the patch to stable and allocate a CVE for this. Regards, Gabriel

Bug#972146: /usr/share/applications/mono-runtime-common.desktop: should not handle MIME type by executing arbitrary code

2022-12-05 Thread Gabriel Corona
As a workaround, you should be able to disable this feature (and have the fix persist after a package update) with something like: mkdir -p /usr/local/share/applications cp /usr/share/applications/mono-runtime-*.desktop /usr/local/share/applications sed -i 's/^Exec=.*/Exec=false/' /usr/local/s

Bug#972146: /usr/share/applications/mono-runtime-common.desktop: should not handle MIME type by executing arbitrary code

2021-11-10 Thread Gabriel Corona
Hi, Any help needed for this? Regards, Gabriel

Bug#898373: lilypond: CVE-2017-17523 (again)

2018-05-10 Thread Gabriel Corona
Package: lilypond Version: 2.18.2-12 Severity: grave Tags: security Justification: user security hole Hi, lilypond-invoke-editor as shipped in Debian is still vulnerable to shell command injection in URIs (CVE-2017-17523). This is easily demonstrated by running this shell command using an update

Bug#881767: closed by Bastien Roucariès (Bug#881767: fixed in sensible-utils 0.0.11)

2017-11-15 Thread Gabriel Corona
Hi, > Source: sensible-utils > Source-Version: 0.0.11 > > We believe that the bug you reported is fixed in the latest version of > sensible-utils, which is due to be installed in the Debian FTP archive. I can't find the source of the new version yet so I can't review it yet. I think we need to

Bug#881767: sensible-utils: Argument injection in sensible-browser

2017-11-14 Thread Gabriel Corona
Package: sensible-utils Version: 0.0.10 Severity: grave Tags: security Justification: user security hole When the BROWSER environment variable is set, an invalid URI can be used to inject arguments in sensible-browser. Description === When BROWSER is set, sensible-browser calls the actu

Bug#818540: pepperflashplugin-nonfree: broken by new apt

2016-05-05 Thread Gabriel Corona
Hi, > + warning_ck=`echo ${stdouterr} |grep "^W\:"` || [ "$verbose" != "yes" ] > || echo "no 'apt-get update' warning" > + if [ "${warning_ck}" != "" ]; then > + echo "WARNING: $stdouterr" > + stdouterr="" > + fi AFAIU, if there is any warning, we clean stdout

Bug#775062: Acknowledgement (grok doesn't grok group name ('group name must start with a non-digit'))

2015-01-10 Thread Gabriel Corona
I bisected the issue and found it was fixed by this commit: 44ce9372a29319c01d4ac7f24287fb36315e0e34 is the first bad commit commit 44ce9372a29319c01d4ac7f24287fb36315e0e34 Author: Guillaume Bour Date: Thu Dec 11 14:07:21 2014 +0100 [fix] grok is not working anymore with PCRE >= 8.34 becau

Bug#775062: grok doesn't grok group name ('group name must start with a non-digit')

2015-01-10 Thread Gabriel Corona
Package: grok Version: 1.20110708.1-4 Severity: grave Justification: renders package unusable Dear maintainer, I tried to use the grok examples packaged with grok: $ grok -f /usr/share/doc/grok/examples/number-predicate2.grok Failure compiling pattern '%{NUMBER > 20}': group name must start wit

Bug#763237: gav: FTBFS: ld: final link failed: Bad value

2014-09-30 Thread Gabriel Corona
Hello, Same problem here when trying to compile LLVM/clang: > .eh_frame_hdr refers to overlapping FDEs. It seems to be a bug in binutils[1]. I updated to binutils 2.24.51.20140918-1 today at 11:05:02: before this the compilation was working correctly. [1] https://bugs.launchpad.net/ubuntu/+sou

Bug#763228: cbmc: FTBFS: ld: final link failed: Bad value

2014-09-30 Thread Gabriel Corona
Hello, Same problem here when trying to compile LLVM/clang: > .eh_frame_hdr refers to overlapping FDEs. It seems to be a bug in binutils[1]. I updated to binutils 2.24.51.20140918-1 today at 11:05:02: before this the compilation was working correctly. [1] https://bugs.launchpad.net/ubuntu/+sou