Re: Bug#839607: Robustify manager_dispatch_notify_fd()

2016-10-03 Thread Michael Biebl
Am 03.10.2016 um 12:11 schrieb Michael Biebl:
> Am 03.10.2016 um 08:22 schrieb Wolfgang Karall:
>> Hello Michael,
>>
>> On 16-10-02 22:36:00, Michael Biebl wrote:
>>> The news about systemd crashing when getting a zero sized message
>>> on the notification socket made the rounds recently.  While v215 is
>>> not directly affected by this crash (the code to access messages of
>>> length=0 was added in v219)
>> [..]
>>> I would propose to fix this in stable via regular stable update but
>>> would appreciate if the debian-security team would comment on this.
>>> If they would prefer a security upload I'm happy to do that as well.
>>
>> https://security-tracker.debian.org/tracker/CVE-2016-7796 says all but
>> the version in sid are vulnerable to CVE-2016-7796 and reading
> 
> No, sid is not vulnerable. It has been fixed in 231-9
> 
>> https://github.com/systemd/systemd/issues/4234#issuecomment-250441246
>>
>> this sounds still rather serious, so a security upload would be
>> appreciated.
>>
> 
> This bugs is *not* about CVE-2016-7796 and as I wrote, stable is not
> affected by the crash.
> 
> Are you a member of the security team? I've never seen your name before
> so I'm a bit confused as I explicitly asked from input from the security
> team.

It was pointed out that I used the wrong list and that
debian-security@l.d.o is not actually the correct list to contact the
debian security team. So apologies for that.

I've added t...@security.debian.org now and will drop
debian-security@lists.debian.org on further replies.

Dear security team, I'd appreciate your input on bug #839607

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Bug#839607: Robustify manager_dispatch_notify_fd()

2016-10-03 Thread Michael Biebl
Am 03.10.2016 um 12:11 schrieb Michael Biebl:
> Am 03.10.2016 um 08:22 schrieb Wolfgang Karall:
>> Hello Michael,
>>
>> On 16-10-02 22:36:00, Michael Biebl wrote:
>>> The news about systemd crashing when getting a zero sized message
>>> on the notification socket made the rounds recently.  While v215 is
>>> not directly affected by this crash (the code to access messages of
>>> length=0 was added in v219)
>> [..]
>>> I would propose to fix this in stable via regular stable update but
>>> would appreciate if the debian-security team would comment on this.
>>> If they would prefer a security upload I'm happy to do that as well.
>>
>> https://security-tracker.debian.org/tracker/CVE-2016-7796 says all but
>> the version in sid are vulnerable to CVE-2016-7796 and reading
> 
> No, sid is not vulnerable. It has been fixed in 231-9
> 
>> https://github.com/systemd/systemd/issues/4234#issuecomment-250441246
>>
>> this sounds still rather serious, so a security upload would be
>> appreciated.
>>

Fwiw, we discussed this issue briefly within the pkg-systemd team. While
a local DoS, which we consider the issue in stable to be, is not great,
it's not like local users can't DoS the system via other means just as
easily, like say fork bombs.

Why would you consider this particular issue to be "rather serious"?


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Robustify manager_dispatch_notify_fd()

2016-10-03 Thread Michael Biebl
Am 03.10.2016 um 08:22 schrieb Wolfgang Karall:
> Hello Michael,
> 
> On 16-10-02 22:36:00, Michael Biebl wrote:
>> The news about systemd crashing when getting a zero sized message
>> on the notification socket made the rounds recently.  While v215 is
>> not directly affected by this crash (the code to access messages of
>> length=0 was added in v219)
> [..]
>> I would propose to fix this in stable via regular stable update but
>> would appreciate if the debian-security team would comment on this.
>> If they would prefer a security upload I'm happy to do that as well.
> 
> https://security-tracker.debian.org/tracker/CVE-2016-7796 says all but
> the version in sid are vulnerable to CVE-2016-7796 and reading

No, sid is not vulnerable. It has been fixed in 231-9

> https://github.com/systemd/systemd/issues/4234#issuecomment-250441246
> 
> this sounds still rather serious, so a security upload would be
> appreciated.
> 

This bugs is *not* about CVE-2016-7796 and as I wrote, stable is not
affected by the crash.

Are you a member of the security team? I've never seen your name before
so I'm a bit confused as I explicitly asked from input from the security
team.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Robustify manager_dispatch_notify_fd()

2016-10-02 Thread Michael Biebl
Control: fixed -1 231-9

Am 02.10.2016 um 22:36 schrieb Michael Biebl:
> Package: systemd
> Version: 215-17+deb8u5
> Severity: important
> User: pkg-systemd-maintain...@lists.alioth.debian.org
> Usertags: jessie-backport
> 
> The news about systemd crashing when getting a zero sized message on the
> notification socket made the rounds recently.
> While v215 is not directly affected by this crash (the code to access
> messages of length=0 was added in v21), the version in unstable still

was added in v219, not v21

> get's confused when it receives such a message and basically disables
> the notification system. This is bad, because services relying on the
> notification system, e.g. using the watchdog functionality, are getting
> killed.
> 
> The relevant upstream issue is
> https://github.com/systemd/systemd/pull/4240
> 
> 231-9 in unstable already contains this fix.

Marking accordingly

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#839607: Robustify manager_dispatch_notify_fd()

2016-10-02 Thread Michael Biebl
Package: systemd
Version: 215-17+deb8u5
Severity: important
User: pkg-systemd-maintain...@lists.alioth.debian.org
Usertags: jessie-backport

The news about systemd crashing when getting a zero sized message on the
notification socket made the rounds recently.
While v215 is not directly affected by this crash (the code to access
messages of length=0 was added in v21), the version in unstable still
get's confused when it receives such a message and basically disables
the notification system. This is bad, because services relying on the
notification system, e.g. using the watchdog functionality, are getting
killed.

The relevant upstream issue is
https://github.com/systemd/systemd/pull/4240

231-9 in unstable already contains this fix.

I would propose to fix this in stable via regular stable update but
would appreciate if the debian-security team would comment on this.
If they would prefer a security upload I'm happy to do that as well.


Regards,
Michael



-- Package-specific info:

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.7.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages systemd depends on:
ii  adduser 3.115
ii  libacl1 2.2.52-3
ii  libapparmor12.10.95-4+b1
ii  libaudit1   1:2.6.7-1
ii  libblkid1   2.28.2-1
ii  libc6   2.24-3
ii  libcap2 1:2.25-1
ii  libcryptsetup4  2:1.7.0-2
ii  libgcrypt20 1.7.3-1
ii  libgpg-error0   1.24-1
ii  libidn111.33-1
ii  libip4tc0   1.6.0-3
ii  libkmod222-1.1
ii  liblzma55.1.1alpha+20120614-2.1
ii  libmount1   2.28.2-1
ii  libpam0g1.1.8-3.3
ii  libseccomp2 2.3.1-2
ii  libselinux1 2.5-3
ii  libsystemd0 231-9
ii  mount   2.28.2-1
ii  util-linux  2.28.2-1

Versions of packages systemd recommends:
ii  dbus1.10.10-1
ii  libpam-systemd  231-9

Versions of packages systemd suggests:
ii  policykit-10.105-16
ii  systemd-container  231-9
pn  systemd-ui 

Versions of packages systemd is related to:
ii  udev  231-9

-- no debconf information



Re: [SECURITY] [DSA 3337-1] gdk-pixbuf security update

2015-08-21 Thread Michael Biebl
Hi Moritz,

Am 18.08.2015 um 15:37 schrieb Moritz Muehlenhoff:
> -
> Debian Security Advisory DSA-3337-1   secur...@debian.org
> https://www.debian.org/security/   Moritz Muehlenhoff
> August 18, 2015   https://www.debian.org/security/faq
> -
> 
> Package: gdk-pixbuf
> CVE ID : CVE-2015-4491
> 
> Gustavo Grieco discovered a heap overflow in the processing of BMP images
> which may result in the execution of arbitrary code if a malformed image
> is opened.
> 
> For the oldstable distribution (wheezy), this problem has been fixed
> in version 2.26.1-1+deb7u1.
> 
> For the stable distribution (jessie), this problem has been fixed in
> version 2.31.1-2+deb8u2.

Thanks for taking care of this.
From a cursory glance, the patch in 2.31.1-2+deb8u2 seems to be
incomplete and is missing the follow-up commit [1].

I'll update the package in unstable. Would be great if you can handle
the stable upload.

Regards,
Michael


[1]
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=8dba67cb4f38d62a47757741ad41e3f245b4a32a
-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Bug#614785: Found too in oldstable/lenny?

2011-02-24 Thread Michael Biebl
Am 24.02.2011 15:48, schrieb Alexander Kurtz:
> So, the code which introduced this vulnerability (CVE-2011-1002[1]) was
> actually added[2] when fixing another vulnerability (CVE-2010-2244[3]).
> As a consequence, lenny IS indeed vulnerable and needs to be fixed too.

Correct.

I uploaded a fixed lenny package to oldstable-security 30min ago.

Cheers,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Bug#614785: Found too in oldstable/lenny?

2011-02-24 Thread Michael Biebl
Am 24.02.2011 15:52, schrieb Michael Biebl:
> Am 24.02.2011 15:48, schrieb Alexander Kurtz:
>> So, the code which introduced this vulnerability (CVE-2011-1002[1]) was
>> actually added[2] when fixing another vulnerability (CVE-2010-2244[3]).
>> As a consequence, lenny IS indeed vulnerable and needs to be fixed too.
> 
> Correct.
> 
> I uploaded a fixed lenny package to oldstable-security 30min ago.

But you are right, the security tracker should be updated


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: [Pkg-utopia-maintainers] Bug#501443: CVE-2008-0595: possible DoS in dbus

2008-10-20 Thread Michael Biebl

Quoting Michael Gilbert <[EMAIL PROTECTED]>:


retitle 501443 dbus: CVE-2008-3834, possible DoS
thank you

hello, now that ubuntu has released fixes for this issue [1], can we
hope to see the same action from debian soon?



Hi Michael,

thanks for the detailed bug report and apologies for the late reply.  
I'll prepare a new release in the next few days and will also try to  
get this fix into lenny.


Cheers,
Michael


This mail was sent through TecO-Webmail: http://www.teco.edu


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]