Processed: found 992046 in 0.12.1-1

2021-08-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 992046 0.12.1-1 Bug #992046 [src:rust-anymap] rust-anymap: CVE-2021-38187 Marked as found in versions rust-anymap/0.12.1-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 992046:

Processed: tagging 992046, tagging 992045 ..., tagging 992047

2021-08-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 992046 + upstream Bug #992046 [src:rust-anymap] rust-anymap: CVE-2021-38187 Added tag(s) upstream. > tags 992045 + upstream Bug #992045 [cpio] CVE-2021-38185 Added tag(s) upstream. > forwarded 992045 >

Bug#991971: [pkg-lynx-maint] Bug#991971: [CVE-2021-38165] lynx: bug in SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)

2021-08-09 Thread Axel Beckert
Hi, Axel Beckert wrote: > I can also look into how well the patch applies to buster's version of > Lynx, but it might take until Monday. Done now, built with -sa, did a source-only uploaded to security-master and pushed it into the branch 10_buster on Salsa including the according git tag.

Bug#992046: rust-anymap: CVE-2021-38187

2021-08-09 Thread Moritz Mühlenhoff
Source: rust-anymap X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for rust-anymap. CVE-2021-38187[0]: | An issue was discovered in the anymap crate through 0.12.1 for Rust. | It violates soundness via conversion of a *u8 to a

Bug#991971: marked as done (lynx: [CVE-2021-38165] SSL certificate validation fails with URLs containing user name or user name and password, i.e. https://user:password@host/ and https://user@host/\;

2021-08-09 Thread Debian Bug Tracking System
Your message dated Mon, 09 Aug 2021 21:18:51 + with message-id and subject line Bug#991971: fixed in lynx 2.9.0dev.6-3~deb11u1 has caused the Debian Bug report #991971, regarding lynx: [CVE-2021-38165] SSL certificate validation fails with URLs containing user name or user name and password,

Bug#992045: CVE-2021-38185

2021-08-09 Thread Moritz Muehlenhoff
Package: cpio Version: 2.13+dfsg-4 Severity: grave Tags: security X-Debbugs-Cc: Debian Security Team https://github.com/fangqyi/cpiopwn https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg0.html

Bug#991046: marked as done (tomcat9: CVE-2021-33037 CVE-2021-30640 CVE-2021-30639)

2021-08-09 Thread Debian Bug Tracking System
Your message dated Mon, 09 Aug 2021 21:19:52 + with message-id and subject line Bug#991046: fixed in tomcat9 9.0.43-2~deb11u1 has caused the Debian Bug report #991046, regarding tomcat9: CVE-2021-33037 CVE-2021-30640 CVE-2021-30639 to be marked as done. This means that you claim that the

Bug#992008: ruby-google-protobuf: Missing lib/google/protobuf directory and fails require

2021-08-09 Thread Pirate Praveen
Control: tags -1 patch On Mon, 09 Aug 2021 01:35:43 +0530 Pirate Praveen wrote: > Adding, > ruby/lib/google usr/lib/ruby/vendor_ruby > to debian/ruby-google-protobuf.install makes require 'google/protobuf' > to pass. This can be used as a workaround until we figure out why > gem2deb is not

Processed: Re: ruby-google-protobuf: Missing lib/google/protobuf directory and fails require

2021-08-09 Thread Debian Bug Tracking System
Processing control commands: > tags -1 patch Bug #992008 [ruby-google-protobuf] ruby-google-protobuf: Missing lib/google/protobuf directory and fails require Added tag(s) patch. -- 992008: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992008 Debian Bug Tracking System Contact

Bug#992040: marked as done (gitlab 2FA broken: NoMethodError (undefined method `module_count' for #)

2021-08-09 Thread Debian Bug Tracking System
Your message dated Mon, 09 Aug 2021 18:03:35 + with message-id and subject line Bug#992040: fixed in ruby-rqrcode-rails3 0.1.7-2 has caused the Debian Bug report #992040, regarding gitlab 2FA broken: NoMethodError (undefined method `module_count' for # to be marked as done. This means that

Processed: severity of 992040 is grave

2021-08-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 992040 grave Bug #992040 [ruby-rqrcode-rails3] gitlab 2FA broken: NoMethodError (undefined method `module_count' for # Severity set to 'grave' from 'important' > thanks Stopping processing here. Please contact me if you need

Bug#992008: ruby-google-protobuf: Missing lib/google/protobuf directory and fails require

2021-08-09 Thread Pirate Praveen
On Mon, Aug 9, 2021 at 1:50 pm, Antonio Terceiro wrote: On Mon, Aug 09, 2021 at 01:35:43AM +0530, Pirate Praveen wrote: On Mon, Aug 9, 2021 at 12:12 am, Pirate Praveen wrote: > [copying debian-ruby list] > > On Sun, 08 Aug 2021 22:08:39 +0530 Akshay S Dinesh > wrote: > > Package:

Bug#991982: nano does not work with TERM unset

2021-08-09 Thread Bastien Roucariès
Le dimanche 8 août 2021, 10:04:30 UTC Benno Schulenberg a écrit : > > $env -i nano > > command fail because TERM is unset > > I can work around an unset TERM. But what if TERM=="" or TERM=="nonsense"? > Checking whether TERM is a valid terminal name goes too far, in my opinion. > > Also, is the

Bug#991982: nano does not work with TERM unset

2021-08-09 Thread Bastien Roucariès
Le dimanche 8 août 2021, 14:57:42 UTC Bastien Roucariès a écrit : > Le dimanche 8 août 2021, 10:04:30 UTC Benno Schulenberg a écrit : > > > $env -i nano > > > command fail because TERM is unset > > > > I can work around an unset TERM. But what if TERM=="" or > > TERM=="nonsense"? > > Checking