Re: CVE-2019-14866

2019-11-03 Thread Ola Lundqvist
Hi again

The new patch can be found here:
http://apt.inguza.net/wheezy-security/cpio/CVE-2019-14866.patch

It is not perfectly properly documented since it refers to a commit that do
not contain it all. But I think you get the point anyway.

// Ola

On Mon, 4 Nov 2019 at 08:10, Ola Lundqvist  wrote:

> Hi Sergey, Thomas and cpio Debian maintainers
>
> I have been preparing fixes for CVE-2019-14866 for Debian oldstable and
> oldoldstable. While doing that I realized that the patch mentioned here (1)
> do work for amd64 but do not work for i386.
> I was able to build on both amd64 and i386 but the fix obviously did not
> work on i386 since I could reproduce the problem.
>
> I think the reason for this is that a long is 32 bit on i386 while it is
> 64 bits on amd64.
>
> (1) https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg3.html
>
> The fix is very simple. Change the "long" to a "long long" in
> to_out_or_error.
>
> With that correction it works when I build and test on i386.
> Please let me know what you think. I'm going to upload a fixed package to
> debian old and oldold stable tomorrow.
>
> Best regards
>
> // Ola
>
> --
>  --- Inguza Technology AB --- MSc in Information Technology 
> |  o...@inguza.como...@debian.org|
> |  http://inguza.com/Mobile: +46 (0)70-332 1551 |
>  ---
>
>

-- 
 --- Inguza Technology AB --- MSc in Information Technology 
|  o...@inguza.como...@debian.org|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
 ---


CVE-2019-14866

2019-11-03 Thread Ola Lundqvist
Hi Sergey, Thomas and cpio Debian maintainers

I have been preparing fixes for CVE-2019-14866 for Debian oldstable and
oldoldstable. While doing that I realized that the patch mentioned here (1)
do work for amd64 but do not work for i386.
I was able to build on both amd64 and i386 but the fix obviously did not
work on i386 since I could reproduce the problem.

I think the reason for this is that a long is 32 bit on i386 while it is 64
bits on amd64.

(1) https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg3.html

The fix is very simple. Change the "long" to a "long long" in
to_out_or_error.

With that correction it works when I build and test on i386.
Please let me know what you think. I'm going to upload a fixed package to
debian old and oldold stable tomorrow.

Best regards

// Ola

-- 
 --- Inguza Technology AB --- MSc in Information Technology 
|  o...@inguza.como...@debian.org|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
 ---


Re: cpio and CVE-2019-14866 for testing

2019-11-03 Thread Ola Lundqvist
Hi

Thank you. I have concluded that the patch only works on amd64, not on i386.

I'll contact the maintainer.

// Ola

On Sun, 3 Nov 2019 at 18:03, Sylvain Beucler  wrote:

> Hi,
>
> On 29/10/2019 23:12, Ola Lundqvist wrote:
> > Hi LTS contributors
> >
> > I have built a cpio package with CVE-2019-14866 corrected.
> > According to my testing it is no longer possible to reproduce the
> > problem reported in this CVE.
> >
> > You can find the packages I have produced here:
> > http://apt.inguza.net/jessie-security/cpio
> >
> > The (so far rather limited) testing I have done can be found in
> > README.testresult
> > How to reproduce the problem can be found in the patch. It is easy to
> > reproduce the problem on both jessie and wheezy.
> >
> > The debdiff is found in cpio.debdiff.
> >
> > Since cpio is a rather crucial package I would like some more people
> > to test this package. At least for regression.
>
> I got contacted by cpio maintainer Sergey Poznyakoff 
> who told me he was in process of fixing it.
>
> You could coordinate with him and/or watch the upstream git repo for a
> sanctioned patch, which should help with your testing requirements :)
>
> Cheers!
> Sylvain
>
>

-- 
 --- Inguza Technology AB --- MSc in Information Technology 
|  o...@inguza.como...@debian.org|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
 ---


(semi-)automatic unclaim of packages with more than 2 weeks of inactivity

2019-11-03 Thread Holger Levsen
hi,

today I unclaimed for LTS:

-ampache (Roberto C. Sánchez)
-thunderbird (Emilio)

and none for eLTS.


-- 
tschau,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C


signature.asc
Description: PGP signature


Re: cpio and CVE-2019-14866 for testing

2019-11-03 Thread Sylvain Beucler
Hi,

On 29/10/2019 23:12, Ola Lundqvist wrote:
> Hi LTS contributors
>
> I have built a cpio package with CVE-2019-14866 corrected.
> According to my testing it is no longer possible to reproduce the
> problem reported in this CVE.
>
> You can find the packages I have produced here:
> http://apt.inguza.net/jessie-security/cpio
>
> The (so far rather limited) testing I have done can be found in
> README.testresult
> How to reproduce the problem can be found in the patch. It is easy to
> reproduce the problem on both jessie and wheezy.
>
> The debdiff is found in cpio.debdiff.
>
> Since cpio is a rather crucial package I would like some more people
> to test this package. At least for regression.

I got contacted by cpio maintainer Sergey Poznyakoff 
who told me he was in process of fixing it.

You could coordinate with him and/or watch the upstream git repo for a
sanctioned patch, which should help with your testing requirements :)

Cheers!
Sylvain



RFT: Linux 3.16.76 package

2019-11-03 Thread Ben Hutchings
I uploaded a snapshot of the jessie-security branch of linux, with the
version 3.16.76-1~git20191101.154b211, to people.debian.org:

https://people.debian.org/~benh/packages/jessie-security/

There are source and binaries for amd64 and i386, along with a signed
.changes file.

Let me know if you find any regressions from the current released
version (3.16.74-1).

Ben.

-- 
Ben Hutchings
The generation of random numbers is too important to be left to chance.
   - Robert Coveyou



signature.asc
Description: This is a digitally signed message part