Bug#1082001: linux-image-6.1.0-25-amd64: TOMOYO LSM rejects execveat(AT_EMPTY_PATH) inside chroot

2024-09-17 Thread Alfred Agrell
Package: src:linux Version: 6.1.106-3 Severity: normal X-Debbugs-Cc: blub...@gmail.com Dear Maintainer, Please run the following program (as root, so the chroot succeeds): #define _GNU_SOURCE #include #include #include int main(int argc, char** argv) { chdir("/lib/"); if (ch

Bug#1051492: is subject necessary

2023-09-12 Thread Alfred Agrell
And that commit does indeed change window handling: https://salsa.debian.org/wine-team/wine/-/commit/e055001f272c3a3d7a0b28865f1de9fda13c2f10#fb90e219a3e9d2931384a3375b23cedfd6b428fb Manually applying that piece to upstream Wine reproduces the issue (or at least reproduces issue #1043052 - I do

Bug#1043052: wine: d3d9 doesn't work on WS_CHILD windows

2023-08-05 Thread Alfred Agrell
Package: wine Version: 8.0~repack-4 Severity: normal X-Debbugs-Cc: blub...@gmail.com Dear Maintainer, please compile and run the following program (x86_64-w64-mingw32-gcc test.c -ld3d9 && wine a.exe): #include #include #include #include HWND wnd_parent; HWND wnd; int f; LRESULT myWindow

Bug#1037041: linux-image-6.1.0-9-amd64: Spurious failures from mmap(MAP_32BIT)

2023-06-02 Thread Alfred Agrell
Package: src:linux Version: 6.1.27-1 Severity: normal Tags: upstream X-Debbugs-Cc: blub...@gmail.com Dear Maintainer, Please run this program 20 times: #include #include #include int main() { for (int i=0;i<1000;i++) { void* p = mmap(NULL, 65536, PROT_READ|PR

Bug#792420: zsnes: emulator escape vulnerability

2015-07-14 Thread Alfred Agrell
On Tue, 14 Jul 2015 18:57:02 +0200 Etienne Millon wrote: > * Paul Wise [150714 18:20]: > > According to this Youtube video and forum post, there are at least 3 > > vulnerabilities in zsnes that allow ROMs to escape the zsnes > > emulator and execute arbitrary code on the host running zsnes. The