Bug#868466: php-cas: CVE-2017-1000071

2019-02-08 Thread Moritz Mühlenhoff
On Sat, Jul 15, 2017 at 09:06:41PM +0200, Salvatore Bonaccorso wrote: > Source: php-cas > Version: 1.3.3-1 > Severity: important > Tags: security upstream > Forwarded: https://github.com/Jasig/phpCAS/issues/228 > > Hi, > > the following vulnerability was published for php-cas. > > CVE-2017-1

Bug#918969: ceph: CVE-2018-16889: debug logging for v4 auth does not sanitize encryption keys

2019-02-10 Thread Moritz Mühlenhoff
On Fri, Jan 11, 2019 at 09:03:37AM +0100, Salvatore Bonaccorso wrote: > Source: ceph > Version: 12.2.10+dfsg1-1 > Severity: important > Tags: patch security upstream > Forwarded: http://tracker.ceph.com/issues/37847 > > Hi, > > The following vulnerability was published for ceph. > > CVE-2018-168

Bug#918730: libexif: CVE-2018-20030: Input validation issue resulting in a denial of service

2019-02-10 Thread Moritz Mühlenhoff
On Tue, Jan 08, 2019 at 09:36:52PM +0100, Salvatore Bonaccorso wrote: > Source: libexif > Version: 0.6.21-5 > Severity: important > Tags: security upstream > Control: found -1 0.6.21-2 > > Hi, > > The following vulnerability was published for libexif, for now filling > primarly for tracking, as t

Bug#672449: x11vnc: Option -no6 and -noipv6 do not seem to have effect

2019-02-10 Thread Moritz Mühlenhoff
On Fri, May 11, 2012 at 04:15:46PM +0900, Ryo IGARASHI wrote: > Package: x11vnc > Version: 0.9.13-1 > Severity: normal > Tags: ipv6 > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Dear Maintainer, > > After reporting the bug #672435, I try to disable ipv6 settings of x11vnc. > Accordin

Bug#917557: O: reportbug-ng -- Easy to use alternative to Debian's classic reportbug

2019-02-14 Thread Moritz Mühlenhoff
On Fri, Dec 28, 2018 at 05:47:18PM +0100, Bastian Venthur wrote: > Package: wnpp > Severity: normal > > I intend to orphan the reportbug-ng package. I've been asking for help > maintaining it years ago without response, so I'm now orphaning it. The > current > popcon value is around 300, so it ma

Bug#922027: python-django: Django security release

2019-02-14 Thread Moritz Mühlenhoff
On Mon, Feb 11, 2019 at 03:07:36PM +0100, Chris Lamb wrote: > [Adding t...@security.debian.org to CC] > > Chris Lamb wrote: > > > retitle 922027 CVE-2019-6975: Memory exhaustion in > > django.utils.numberformat.format() > > severity 922027 grave > > found 922027 1:1.10.7-2+deb9u3 > > tags 922027

Bug#921748: stretch-pu: package icedtea-web/1.6.2-3.1+deb9u1

2019-02-16 Thread Moritz Mühlenhoff
On Sat, Feb 16, 2019 at 11:31:24AM +, Adam D. Barratt wrote: > On Fri, 2019-02-08 at 21:03 +0100, Moritz Muehlenhoff wrote: > > This disables the browser plugin (which was broken due to the Firefox > > Quantum changes), the equivalent change in sid was done in 1.7.1-1. > > Unfortunately, we

Bug#905061: stretch-pu: package mruby/1.2.0+20161228+git30d5424a-1+deb9u1

2018-07-31 Thread Moritz Mühlenhoff
On Tue, Jul 31, 2018 at 11:29:16AM +0900, Nobuhiro Iwamatsu wrote: > Package: release.debian.org > Severity: normal > Tags: stretch > User: release.debian@packages.debian.org > Usertags: pu > > Dear stable release manager, > > I hereby propose an update for stretch of mruby. There's a few mo

Bug#905332: debdiff

2018-08-03 Thread Moritz Mühlenhoff
Hi Ferenc, On Fri, Aug 03, 2018 at 11:59:08AM +0200, Ferenc Wágner wrote: > The proposed source debdiff for stretch-security: > > I tested the resulting package, it fixed the bug and didn't cause any > breakage for me. Ok, sounds good. > There is a header file change affecting inline function b

Bug#891510: O: h323plus

2018-06-05 Thread Moritz Mühlenhoff
On Mon, Feb 26, 2018 at 12:01:35PM +0100, Bernhard Schmidt wrote: > Package: wnpp > Severity: normal > > Hi, > > on behalf of the Debian VoIP team I intent to orphan the package > h323plus. > > It is a reverse dependency of > > - gnugk (orphaned in #891509) > - openam (RM requested in #891508)

Bug#898943: Multiple vulnerabiliities in Mongoose

2018-06-05 Thread Moritz Mühlenhoff
On Mon, Jun 04, 2018 at 12:47:48PM -0400, Reinhard Tartler wrote: > Ok, thanks. That sounds like a good plan! BTW, I'm not sure if Talos security actually reported these to the censenta/mongoose upstream project or whether they're doing it for the security buzz/advertising factor... I saw that up

Bug#900848: Should this package be removed?

2018-06-08 Thread Moritz Mühlenhoff
retitle 900848 RM: skipfish -- RoM; dead upstream, RC-buggy reassign 900848 ftp.debian.org severity 900848 normal thanks On Fri, Jun 08, 2018 at 08:41:06AM +0200, bart...@fenski.pl wrote: > Hey Moritz, > > Yeah I think we should remove that package at this point. > Thanks a lot for taking care of

Bug#901276: jessie-pu: package lame/3.99.5+repack1-7+deb8u2

2018-06-11 Thread Moritz Mühlenhoff
On Sun, Jun 10, 2018 at 02:59:49PM -0400, Hugo Lefeuvre wrote: > > lame 3.99.5+repack1-7+deb8u1 is affected by several vulnerabilities in > the code used to read the input file. These issues are not present in > any Debian release after Jessie because the package switched to > libsndfile to read a

Bug#901495: redis: multiple security issues in Lua scripting

2018-06-16 Thread Moritz Mühlenhoff
On Thu, Jun 14, 2018 at 02:10:27PM +0100, Chris Lamb wrote: > Chris Lamb wrote: > > > > redis: multiple security issues in Lua scripting > > > > This has now been assigned CVE-2018-11219 & CVE-2018-11218. > > Security team, oermission to upload the attached to > stretch-security? > > redis (3

Bug#901495: redis: multiple security issues in Lua scripting

2018-06-17 Thread Moritz Mühlenhoff
On Sat, Jun 16, 2018 at 04:09:04PM +0100, Chris Lamb wrote: > Hi Moritz, > > > For future updates please include the git commit IDs to debian/patches > > Sure. I've added commit IDs to the files in debian/patches and > uploaded redis_3.2.6-3+deb9u1_amd64.changes with those — and no > other! — cha

Bug#882621: stretch-pu: package python2.7/2.7.13-2+deb9u2

2017-11-26 Thread Moritz Mühlenhoff
On Sun, Nov 26, 2017 at 01:52:04PM +, Adam D. Barratt wrote: > Control: tags -1 + confirmed > > On Fri, 2017-11-24 at 23:18 +0100, Moritz Muehlenhoff wrote: > > I'd like to add a fix for a minor security issue in Python 2.7 to the > > as a followup update to what's already in spu. debdiff is b

Bug#817286: Simplify testing access for packages on security-master

2017-12-01 Thread Moritz Mühlenhoff
On Thu, Nov 30, 2017 at 11:59:26AM +0100, Raphael Hertzog wrote: > Hello Moritz, > > On Wed, 09 Mar 2016, Moritz Muehlenhoff wrote: > > (This is a first high level view, the exact requirements can be hashed > > out later.) > > It would be good to go a bit into more details now. > > > It would be

Bug#902176: CVE-2018-11212 CVE-2018-11213 CVE-2018-11214

2018-06-23 Thread Moritz Mühlenhoff
On Sat, Jun 23, 2018 at 09:11:14AM +0200, Moritz Muehlenhoff wrote: > Source: libjpeg9 > Severity: normal > Tags: security > > There have been three reports of minor bugs in libjpeg, which > ended up getting a CVE ID assigned: > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11214 > htt

Bug#901355: stretch-pu: package llvm-4.0/1:4.0.1-10~deb9u1

2018-06-27 Thread Moritz Mühlenhoff
On Wed, Jun 27, 2018 at 08:18:01PM +0100, Adam D. Barratt wrote: > Control: tags -1 + confirmed > > It's a straightforward rebuild. The debdiff against 1:4.0.1-10 > > from buster is very simple (with an additional build conflicts > > I ran into when preparing the build). > > Please go ahead. Upl

Bug#901089: stretch-pu: package dosbox/0.74-4.2+deb9u1

2018-07-01 Thread Moritz Mühlenhoff
On Sun, Jul 01, 2018 at 06:44:08PM +0100, Adam D. Barratt wrote: > Control: tags -1 + confirmed > > On Fri, 2018-06-08 at 22:41 +0200, Moritz Muehlenhoff wrote: > > dosbox is broken in the default setting on a number of systems/DOS > > binaries > > (see #857341). This got fixed in unstable back in

Bug#885183: stretch-pu: package ntopng/2.4+dfsg1-3+deb9u1

2017-12-26 Thread Moritz Mühlenhoff
On Mon, Dec 25, 2017 at 09:26:58PM +0100, Ludovico Cavedon wrote: > - #866721 and #866719, which are securirity-related issues. Do you want > me to reach out to the security team about these first? Those are marked no-dsa for quite a while, so not needed. Cheers, Moritz

Bug#875858: pkgsel: Offer to install/manage unattended-upgrades

2018-01-02 Thread Moritz Mühlenhoff
Hi, Sorry for the late reply, busy over the holiday season. On Mon, Dec 18, 2017 at 12:12:08PM +0100, Raphael Hertzog wrote: > Hi, > > On Sun, 17 Dec 2017, Moritz Mühlenhoff wrote: > > unattended-upgrades are not an appropriate default. It's okay for a desktop > > syst

Bug#892590: graphite2: CVE-2018-7999: null pointer dereference in Segment()

2018-03-11 Thread Moritz Mühlenhoff
On Sun, Mar 11, 2018 at 02:02:22PM +0100, Rene Engelhard wrote: > Hi, > > On Sun, Mar 11, 2018 at 08:43:32AM +0100, Salvatore Bonaccorso wrote: > > CVE-2018-7999[0]: > > | In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference > > | vulnerability was found in Segment.cpp during a dumbRend

Bug#887856: intel-microcode: Spectre / Meltdown : bring intel-microcode 20180104 to stretch

2018-03-14 Thread Moritz Mühlenhoff
On Wed, Mar 14, 2018 at 12:39:22PM -0300, Henrique de Moraes Holschuh wrote: > On Wed, 14 Mar 2018, Moritz Muehlenhoff wrote: > > On Sun, Jan 21, 2018 at 07:47:35AM -0200, Henrique de Moraes Holschuh wrote: > > > severity 887856 grave > > > block 887856 by 886998 > > > thanks > > > > > > On Sat, 2

Bug#892590: Review graphite2

2018-03-19 Thread Moritz Mühlenhoff
On Mon, Mar 19, 2018 at 05:04:17PM +0100, Rene Engelhard wrote: > I am not going over the .-release procedure for this, I'd have uploaded > to security, though, but... > > I don't think we should special-case our oldest, > soon-to-be-not-supported release. Agreed, it doesn't make sense to fix thi

Bug#872885: netty-tcnative-1.1: Please migrate to openssl1.1 in Buster

2018-10-12 Thread Moritz Mühlenhoff
n Thu, Oct 12, 2017 at 11:44:47PM +0200, Sebastian Andrzej Siewior wrote: > > this is a remainder about the openssl transition [0]. We really want to > remove libssl1.0-dev from unstable for Buster. I will raise the severity > of this bug to serious in a month. Please react before that happens. E

Bug#828481: ori: FTBFS with openssl 1.1.0

2018-10-12 Thread Moritz Mühlenhoff
On Fri, Oct 13, 2017 at 12:52:55AM -0400, Afif Elghraoui wrote: > > > على الخميس 12 تشرين الأول 2017 ‫17:44، كتب Sebastian Andrzej Siewior: > > Hi, > > > > this is a remainder about the openssl transition [0]. We really want to > > remove libssl1.0-dev from unstable for Buster. I will raise the

Bug#872885: netty-tcnative-1.1: Please migrate to openssl1.1 in Buster

2018-10-13 Thread Moritz Mühlenhoff
On Sat, Oct 13, 2018 at 12:32:16AM +0200, Emmanuel Bourg wrote: > Le 12/10/2018 à 22:33, Moritz Mühlenhoff a écrit : > > > src:tcnetty has been fixed wrt OpenSSL 1.1 and netty-tcnative-1.1 has no > > reverse dependencies in the archive. Shall we remove it from the archive? &

Bug#893448: please add a chromium-source binary package

2018-10-15 Thread Moritz Mühlenhoff
On Mon, Oct 15, 2018 at 10:41:25PM +0200, Steinar H. Gunderson wrote: > On Mon, Oct 15, 2018 at 10:33:11PM +0200, Moritz Muehlenhoff wrote: > > Ultimately this is up for Michael to decide, as he's dealing with Chromium > > updates single-handedly. > > Agreed. > > > Personally I have no reservatio

Bug#890034: Backport of Perc 740/840 for Stretch

2018-10-16 Thread Moritz Mühlenhoff
On Sun, Sep 16, 2018 at 03:48:50PM +, Phil Lavin wrote: > We have some spare hardware with a H740P installed. Would having access to > the IDRAC to run some tests help? Simply install the new kernel and let us know if everything works as expected, no need for IDRAC access. The updated kernel

Bug#910398: stretch-pu: package gnupg2/2.1.18-8~deb9u3

2018-10-21 Thread Moritz Mühlenhoff
On Sat, Oct 20, 2018 at 10:43:31AM +0100, Adam D. Barratt wrote: > On Fri, 2018-10-05 at 17:48 -0500, Daniel Kahn Gillmor wrote: > > I'd like to update the version of GnuPG in debian stable with a > > series of targeted bugfixes (most of which are backported from > > upstream). > [...] > > I note t

Bug#828481: ori: FTBFS with openssl 1.1.0

2018-10-21 Thread Moritz Mühlenhoff
On Fri, Oct 12, 2018 at 08:07:48PM -0400, Afif Elghraoui wrote: > > > على ٣‏/٢‏/١٤٤٠ هـ ‫٤:٣٣ م، كتب Moritz Mühlenhoff: > > On Fri, Oct 13, 2017 at 12:52:55AM -0400, Afif Elghraoui wrote: > > > > > > > > > > What's the status? ori hasn

Bug#874882: [freeplayer] Future Qt4 removal from Buster

2018-10-21 Thread Moritz Mühlenhoff
On Sun, Sep 10, 2017 at 01:43:08PM +0200, Vincent Danjean wrote: > severity 874882 grave > tag 874882 +help > thanks > > Hi, > > Unless someone step up to maintain (debian and upstream) this > program, I will ask for its removal. Upstream is long dead. I > kept this program in Debian while th

Bug#904565: RM: zendframework -- ROM; Deprecated upstream, superseded by php-zend-*

2018-10-21 Thread Moritz Mühlenhoff
On Wed, Jul 25, 2018 at 01:30:14PM +0800, David Prévot wrote: > Package: ftp.debian.org > Severity: normal > > Hi, > > Please remove zendframework when you see fit. It seems the letodms stack > still depends on it, and I don’t know when that will be fixed. #831418 > explains the rationales for th

Bug#911797: Multiple vulnerabilities

2018-10-26 Thread Moritz Mühlenhoff
On Fri, Oct 26, 2018 at 03:24:27PM +0800, Andrew Lee (李健秋) wrote: > * CVE-2018-12466 probably not affected: > - This pointed to the same commit in upstream github. And the url > provided on the CVE listed vulnerable products that doesn't > contains OBS 2.7.x: > https://www.securityfoc

Bug#911584: libopenmpt: out of bounds memory read in MED files

2018-10-26 Thread Moritz Mühlenhoff
On Mon, Oct 22, 2018 at 09:44:27AM +0100, James Cowgill wrote: > Source: libopenmpt > Version: 0.2.7025~beta20.1-1 > Severity: important > Tags: security upstream fixed-upstream > > Hi, > > Upstream 0.3.13 released a fix for an out of bound read in malformed MED > files. It affects stretch. Does

Bug#900787: nvidia-graphics-drivers-legacy-304xx: does not support Xorg Xserver 1.20

2019-02-18 Thread Moritz Mühlenhoff
On Mon, Jun 04, 2018 at 11:47:35PM +0200, Andreas Beckmann wrote: > Source: nvidia-graphics-drivers-legacy-304xx > Version: 304.137-5 > Severity: serious > Tags: sid buster upstream wontfix > > The 304.xx legacy series is EoL upstream and won't be updated for the > latest Xorg. > > Let's get it o

Bug#913467: nvidia-graphics-drivers: CVE‑2018‑6260: access to application data processed on the GPU through a side channel exposed by the GPU performance counters

2019-02-18 Thread Moritz Mühlenhoff
On Mon, Nov 12, 2018 at 02:36:23PM +, Luca Boccassi wrote: > On Mon, 2018-11-12 at 13:47 +0100, Andreas Beckmann wrote: > > On 2018-11-11 13:54, Luca Boccassi wrote: > > > https://nvidia.custhelp.com/app/answers/detail/a_id/4738 > > > > So we expect new releases soon. There is already 415.* ..

Bug#922242: lucene-solr: CVE-2017-3164

2019-02-19 Thread Moritz Mühlenhoff
On Fri, Feb 15, 2019 at 11:21:13AM +0100, Markus Koschany wrote: > On Wed, 13 Feb 2019 17:43:43 +0100 Salvatore Bonaccorso > wrote: > > Source: lucene-solr > > Version: 3.6.2+dfsg-16 > > Severity: important > > Tags: security upstream > > Forwarded: https://issues.apache.org/jira/browse/SOLR-12770

Bug#914796: sleuthkit: CVE-2018-19497 out of bounds read in Sleuthkit

2019-02-19 Thread Moritz Mühlenhoff
On Tue, Nov 27, 2018 at 01:38:43PM +0100, Jordy Zomer wrote: > Package: sleuthkit > Version: 4.2.0-3 > Severity: normal > > Dear Maintainer, > > An issue was discovered in The Sleuth Kit (TSK) through 4.6.4. > The "tsk_getu16(hfs->fs_info.endian, &rec_buf[rec_off2])" call in > hfs_dir_open_meta_

Bug#915087: nasm: CVE-2018-19755

2019-02-19 Thread Moritz Mühlenhoff
On Fri, Nov 30, 2018 at 10:08:58AM +0100, Salvatore Bonaccorso wrote: > Source: nasm > Version: 2.14-1 > Severity: important > Tags: patch security upstream > Forwarded: https://bugzilla.nasm.us/show_bug.cgi?id=3392528 > > Hi, > > The following vulnerability was published for nasm. > > CVE-2018-

Bug#776246: Processed: severity of 776246 is grave

2019-02-19 Thread Moritz Mühlenhoff
On Sat, Feb 16, 2019 at 10:35:05PM +0500, Andrey Rahmatullin wrote: > On Sat, Feb 16, 2019 at 12:33:08PM +, Debian Bug Tracking System wrote: > > Processing commands for cont...@bugs.debian.org: > > > > > severity 776246 grave > > Bug #776246 [librsync1] MD4 collision/preimage attacks (CVE-201

Bug#851085: conserver: FTBFS with openssl 1.1.0

2019-02-19 Thread Moritz Mühlenhoff
On Thu, Dec 13, 2018 at 08:55:05PM +0100, Moritz Mühlenhoff wrote: > On Tue, Jun 05, 2018 at 11:12:34PM +0200, Moritz Muehlenhoff wrote: > > On Sun, Jun 26, 2016 at 12:21:20PM +0200, Kurt Roeckx wrote: > > > OpenSSL 1.1.0 is about to released. During a rebuild of all pac

Bug#859784: Bug #859784: validns: Please migrate to openssl1.1 in Buster

2019-02-19 Thread Moritz Mühlenhoff
On Thu, Jan 10, 2019 at 08:39:36PM +0100, Joost van Baal-Ilić wrote: > Hi Moritz, > > On Thu, Jan 10, 2019 at 08:33:05PM +0100, Moritz Mühlenhoff wrote: > > On Mon, Nov 05, 2018 at 03:13:08PM +0100, Joost van Baal-Ilić wrote: > > > > > > FWIW, this work: > >

Bug#776246: Processed: severity of 776246 is grave

2019-02-19 Thread Moritz Mühlenhoff
On Wed, Feb 20, 2019 at 02:12:55AM +0500, Andrey Rahmatullin wrote: > On Tue, Feb 19, 2019 at 10:00:34PM +0100, Moritz Mühlenhoff wrote: > > If a transition (even though it's marginal in size) isn't an option at this > > point > That's not for me to decide. Sho

Bug#922723: RM: conserver -- RoQA; RC-buggy, depends on openssl 1.0

2019-02-19 Thread Moritz Mühlenhoff
On Tue, Feb 19, 2019 at 10:30:37PM +0100, Salvatore Bonaccorso wrote: > Hi, > > On Tue, Feb 19, 2019 at 10:09:15PM +0100, Moritz Muehlenhoff wrote: > > Package: ftp.debian.org > > Severity: normal > > > > Please remove conserver. It hasn't seen an upload since 2016 and > > was removed from testing

Bug#917030: python-pykmip: CVE-2018-1000872

2019-02-19 Thread Moritz Mühlenhoff
On Fri, Dec 21, 2018 at 07:13:52PM +0100, Salvatore Bonaccorso wrote: > Source: python-pykmip > Version: 0.7.0-2 > Severity: important > Tags: patch security upstream > Forwarded: https://github.com/OpenKMIP/PyKMIP/issues/430 > > Hi, > > The following vulnerability was published for python-pykmip

Bug#859553: pidentd: Please migrate to openssl1.1 in buster

2019-02-20 Thread Moritz Mühlenhoff
On Wed, Feb 20, 2019 at 08:51:16AM +0100, Moritz Muehlenhoff wrote: > On Wed, Feb 20, 2019 at 12:28:48AM +0100, Sebastian Andrzej Siewior wrote: > > On 2017-10-12 23:44:37 [+0200], To 859...@bugs.debian.org wrote: > > > this is a remainder about the openssl transition [0]. We really want to > > > r

Bug#915805: Should this package be removed?

2019-02-20 Thread Moritz Mühlenhoff
On Tue, Jan 15, 2019 at 10:31:17AM +, Kevin Smith wrote: > On 27 Dec 2018, at 22:52, Moritz Mühlenhoff wrote: > > > > On Fri, Dec 07, 2018 at 01:41:47PM +, Kevin Smith wrote: > >> Apologies, I’d forgotten that we’d prepared an update from upstream and > >&g

Bug#828441: moonshot-trust-router: FTBFS with openssl 1.1.0

2019-02-20 Thread Moritz Mühlenhoff
On Fri, Oct 13, 2017 at 12:24:26AM -0400, Sam Hartman wrote: > There's a new upstream for moonshot-trust-router that I believe should > work with openssl 1.1. > Realistically, I should be able to deal with moonshot-gss-eap #848680 > within a month. > I think it may be more like two months to deal w

Bug#876780: libvorbis: CVE-2017-14160

2019-02-20 Thread Moritz Mühlenhoff
On Fri, May 11, 2018 at 10:20:42PM +0200, Salvatore Bonaccorso wrote: > Control: retitle -1 libvorbis: CVE-2017-14160 (+ CVE-2018-10392 > CVE-2018-10393) > Control: tags -1 + fixed-upstream > > Hi > > This issue (cf. https://gitlab.xiph.org/xiph/vorbis/issues/2330) was > adressed upstream by > h

Bug#914384: sysstat: CVE-2018-19416: the remap_struct function in sa_common.c has an out-of-bounds read during a memmove call

2019-02-20 Thread Moritz Mühlenhoff
On Thu, Nov 22, 2018 at 09:35:39PM +0100, Salvatore Bonaccorso wrote: > Source: sysstat > Version: 12.0.1-1 > Severity: important > Tags: security upstream > Forwarded: https://github.com/sysstat/sysstat/issues/196 > > Hi, > > The following vulnerability was published for sysstat. > > CVE-2018-1

Bug#914553: sysstat: CVE-2018-19517: out of bound read in sadf which leads to crash

2019-02-20 Thread Moritz Mühlenhoff
On Sat, Nov 24, 2018 at 09:07:45PM +0100, Salvatore Bonaccorso wrote: > Source: sysstat > Version: 12.0.1-1 > Severity: important > Tags: security upstream > Forwarded: https://github.com/sysstat/sysstat/issues/199 > > Hi, > > The following vulnerability was published for sysstat, similar to > CV

Bug#922806: chromium-driver: Cannot start browser through python-selenium.

2019-02-20 Thread Moritz Mühlenhoff
reassign 922806 python-selenium severity 922806 important thanks On Wed, Feb 20, 2019 at 11:19:53PM +0100, Jens- Birger Schlie wrote: > Package: chromium-driver > Version: 70.0.3538.110-1~deb9u1 > Severity: grave > Justification: renders package unusable > > Before this worked like a bliss. > >

Bug#828441: moonshot-trust-router: FTBFS with openssl 1.1.0

2019-02-20 Thread Moritz Mühlenhoff
On Wed, Feb 20, 2019 at 05:30:35PM -0500, Sam Hartman wrote: > Is it possible to remove openssl and make moonshot-trust-router > uninstallable? That might be possible, I'll check with the FTP masters. Cheers, Moritz

Bug#859553: pidentd: Please migrate to openssl1.1 in buster

2019-02-22 Thread Moritz Mühlenhoff
On Thu, Feb 21, 2019 at 11:37:02PM +0100, Sebastian Andrzej Siewior wrote: > The debian maintainer of this package looks MIA. Nobody spoke up for > keeping it so far. I'm happy to NMU it so it builds against libssl-dev > but I see little to no reason for it. I think we have alternatives which > *ar

Bug#916902: pspp: CVE-2018-20230

2019-02-22 Thread Moritz Mühlenhoff
On Wed, Dec 19, 2018 at 10:07:59PM -0800, Ben Pfaff wrote: > On Thu, Dec 20, 2018 at 06:22:14AM +0100, Salvatore Bonaccorso wrote: > > Source: pspp > > Version: 1.2.0-2 > > Severity: important > > Tags: security upstream > > > > Hi, > > > > The following vulnerability was published for pspp. > >

Bug#921156: etcd: CVE-2018-1098 CVE-2018-1099

2019-02-22 Thread Moritz Mühlenhoff
severity 921156 important thanks On Tue, Feb 19, 2019 at 11:24:47PM -0600, Stephen Gelman wrote: > On Tue, 12 Feb 2019 09:32:48 +0700 Arnaud Rebillout > wrote: > > I looked into this a bit yesterday. > > > > As mentioned in the issue upstream at > > https://github.com/etcd-io/etcd/issues/9353, th

Bug#922179: shim-signed depends on packages not repos

2019-02-26 Thread Moritz Mühlenhoff
On Fri, Feb 15, 2019 at 07:28:57PM +0100, Cyril Brulebois wrote: > Right, this also breaks the build of the debian-installer source package > on amd64 since its build dependencies cannot be satisfied. Is there an ETA for a fix? Cheers, Moritz

Bug#926043: CVE-2019-0816

2019-04-01 Thread Moritz Mühlenhoff
Hi Thomas, On Sun, Mar 31, 2019 at 12:33:45AM +0100, Thomas Goirand wrote: > If I understand well the problem, the issue is simply that some extra > Microsoft keys may end up being setup into an Azure Debian instance. I > don't see this as a very "grave" security issue because: > > 1/ Azure users

Bug#926043: CVE-2019-0816

2019-04-02 Thread Moritz Mühlenhoff
severity 926043 important thanks On Tue, Apr 02, 2019 at 01:56:35PM +0200, Thomas Goirand wrote: > On 4/2/19 12:46 PM, Moritz Muehlenhoff wrote: > > On Tue, Apr 02, 2019 at 12:33:10PM +0200, Thomas Goirand wrote: > >> On 4/1/19 11:44 PM, Moritz Mühlenhoff wrote: > >>&g

Bug#876905: qtwebkit should not be release with buster

2019-04-02 Thread Moritz Mühlenhoff
On Fri, Mar 22, 2019 at 05:45:56PM -0300, Lisandro Damián Nicanor Pérez Meyer wrote: > El jue., 21 mar. 2019 09:33, Thierry fa...@linux.ibm.com < > thie...@linux.ibm.com> escribió: > > > On Tue, 26 Sep 2017 22:15:12 +0300 Adrian Bunk wrote: > > > Source: qtwebkit > > > Version: 2.3.4.dfsg-9.1 >

Bug#920321: lua5.3: CVE-2019-6706

2019-04-08 Thread Moritz Mühlenhoff
On Thu, Jan 24, 2019 at 07:02:59AM +0100, Salvatore Bonaccorso wrote: > Source: lua5.3 > Version: 5.3.3-1.1 > Severity: important > Tags: security upstream > Control: found -1 5.3.3-1 > > Hi, > > The following vulnerability was published for lua5.3. > > CVE-2019-6706[0]: > | Lua 5.3.5 has a use-

Bug#914796: sleuthkit: CVE-2018-19497 out of bounds read in Sleuthkit

2019-04-08 Thread Moritz Mühlenhoff
On Tue, Feb 19, 2019 at 05:39:10PM +0100, Moritz Mühlenhoff wrote: > On Tue, Nov 27, 2018 at 01:38:43PM +0100, Jordy Zomer wrote: > > Package: sleuthkit > > Version: 4.2.0-3 > > Severity: normal > > > > Dear Maintainer, > > > > An issue was dis

Bug#924349: linux-image-4.19.0-2-amd64: IPv6 reverse path filtering incorrectly removes IPv6 traffic from bridge

2019-04-14 Thread Moritz Mühlenhoff
On Sun, Apr 14, 2019 at 09:53:12AM +0200, Ralf Jung wrote: > Hi Salvatore, > > >> A self-compiled upstream 4.20.14 kernel does not show this problem, but the > >> latest kernel in testing still does. > > > > have you tried to isolate the fixing commit for this issue? > > No, I have not. > We are

Bug#925506: stretch-pu: package java-common/0.58+deb9u1

2019-04-15 Thread Moritz Mühlenhoff
On Sun, Apr 14, 2019 at 09:20:13PM +0100, Adam D. Barratt wrote: > Control: tags -1 + moreinfo > > On Mon, 2019-03-25 at 22:35 +0100, Moritz Muehlenhoff wrote: > > How about the following debdiff to address the fallout of > > the Xul deprecation in icedtea-web (#921748) for the next > > point upda

Bug#926700: cacti: CVE-2019-11025:

2019-04-15 Thread Moritz Mühlenhoff
On Wed, Apr 10, 2019 at 10:51:33AM -0400, Chris Lamb wrote: > retitle 926700 cacti: CVE-2019-11025 - XSS in utilities.php > thanks > > Hi all, > > I've attached a patch that I intend to upload to jessie LTS. May I > also prepare an update for stretch based on this? I doubt this really warrants a

Bug#925506: stretch-pu: package java-common/0.58+deb9u1

2019-04-16 Thread Moritz Mühlenhoff
On Tue, Apr 16, 2019 at 10:04:20AM +0100, Adam D. Barratt wrote: > Control: tags -1 + confirmed > > On Mon, 2019-04-15 at 22:49 +0200, Moritz Mühlenhoff wrote: > > On Sun, Apr 14, 2019 at 09:20:13PM +0100, Adam D. Barratt wrote: > > > Control: tags -1 + moreinfo > >

Bug#969926: glibc: Parsing of /etc/gshadow can return bad pointers causing segfaults in applications

2021-06-01 Thread Moritz Mühlenhoff
Am Wed, Sep 09, 2020 at 12:30:44PM +0200 schrieb Aurelien Jarno: > control: forcemerge 967938 969926 > > Hi, > > On 2020-09-09 02:58, Bernd Zeimetz wrote: > > Source: glibc > > Version: 2.28-10 > > Severity: serious > > Tags: security upstream patch > > X-Debbugs-Cc: Debian Security Team > > >

Bug#989288: CVE-2021-29629

2021-06-01 Thread Moritz Mühlenhoff
Am Mon, May 31, 2021 at 04:31:13PM +0200 schrieb Christoph Berg: > Re: Moritz Muehlenhoff > > Package: dacs > > Severity: important > > Tags: security > > X-Debbugs-Cc: Debian Security Team > > > > dacs bundles a copy in src/libradius/src/radlib.c: > > https://www.freebsd.org/security/advisories/

Bug#987504: imagemagick: attempt to perform an operation not allowed by the security policy `EPS'

2021-06-03 Thread Moritz Mühlenhoff
Am Wed, May 19, 2021 at 08:49:01PM +0200 schrieb Paul Gevers: > Hi, > > First off, thanks Adrian for raising the concern. In general, at this > stage we don't like packages breaking other packages. This should have been fixed in unstable for a long time, I pinged the maintainer multiple times eve

Bug#989062: pillow: diff for NMU version 8.1.2+dfsg-0.2

2021-06-13 Thread Moritz Mühlenhoff
debdiff for my NMU. diff -Nru pillow-8.1.2+dfsg/debian/changelog pillow-8.1.2+dfsg/debian/changelog --- pillow-8.1.2+dfsg/debian/changelog 2021-04-24 15:51:24.0 +0200 +++ pillow-8.1.2+dfsg/debian/changelog 2021-06-13 18:11:04.0 +0200 @@ -1,3 +1,12 @@ +pillow (8.1.2+dfsg-0.2) unstabl

Bug#718272: Processed: reopening 718272

2021-01-27 Thread Moritz Mühlenhoff
reopen 718272 thx Reopening. The reasons are listed in the bug log and were given by the upstream developers. If you want to provide it to bullseye stable users, get it into fasttrack.debian.net. Cheers, Moritz

Bug#937194: opencaster: Python2 removal in sid/bullseye

2021-01-29 Thread Moritz Mühlenhoff
Am Fri, Aug 30, 2019 at 07:29:17AM + schrieb Matthias Klose: > Package: src:opencaster > Version: 3.2.2+dfsg-1.1 > Severity: normal > Tags: sid bullseye > User: debian-pyt...@lists.debian.org > Usertags: py2removal > > Python2 becomes end-of-live upstream, and Debian aims to remove > Python2 f

Bug#975016: OpenJDK 15 support state for Bullseye

2021-02-03 Thread Moritz Mühlenhoff
Am Tue, Jan 26, 2021 at 04:36:13PM +0100 schrieb Matthias Klose: > On 12/2/20 5:42 PM, Holger Levsen wrote: > > On Fri, Nov 20, 2020 at 08:40:22AM +, Holger Levsen wrote: > >>> Thanks for the upload. > >> :) note however that "#975016: OpenJDK 15 support state for Bullseye" is > >> still > >>

Bug#981664: buster-pu: package privoxy/3.0.28-2

2021-02-04 Thread Moritz Mühlenhoff
Am Tue, Feb 02, 2021 at 07:15:37PM +0100 schrieb Roland Rosenfeld: > Package: release.debian.org > Severity: normal > Tags: buster > User: release.debian@packages.debian.org > Usertags: pu > > This fixes CVE-2021-20216 and CVE-2021-20217. > Since both are tagged " (Minor issue)" in security tr

Bug#993146: rust-crossbeam-deque: CVE-2021-32810

2021-08-27 Thread Moritz Mühlenhoff
Source: rust-crossbeam-deque X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for rust-crossbeam-deque. CVE-2021-32810[0]: | crossbeam-deque is a package of work-stealing deques for building task | schedulers when programming

Bug#937269: peframe: Python2 removal in sid/bullseye

2021-08-31 Thread Moritz Mühlenhoff
Am Sun, Sep 13, 2020 at 05:44:44PM +0200 schrieb Sascha Steinbiss: > Hi Moritz, > > >> Just an update: Python 3 compatibility is indeed introduced in the latest > >> upstream version, however, that version also adds some new dependencies > >> that would need to be packaged and pass NEW. For exam

Bug#992973: plib: CVE-2021-38714

2021-09-14 Thread Moritz Mühlenhoff
Am Wed, Aug 25, 2021 at 09:23:37PM +0200 schrieb Salvatore Bonaccorso: > Source: plib > Version: 1.8.5-8 > Severity: grave > Tags: security upstream > Justification: user security hole > Forwarded: https://sourceforge.net/p/plib/bugs/55/ > X-Debbugs-Cc: car...@debian.org, Debian Security Team > >

Bug#968850: software-properties: CVE-2020-15709

2021-05-06 Thread Moritz Mühlenhoff
Am Sat, Aug 22, 2020 at 01:14:19PM +0200 schrieb Salvatore Bonaccorso: > Source: software-properties > Version: 0.96.20.2-2.1 > Severity: important > Tags: security upstream > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > Control: found -1 0.96.20.2-2 > Control: found -1 0.96.20.2-1 >

Bug#987149: xscreensaver: allows starting external programs with cap_net_raw

2021-05-06 Thread Moritz Mühlenhoff
Am Mon, Apr 19, 2021 at 11:42:54AM +0200 schrieb Moritz Muehlenhoff: > On Sun, Apr 18, 2021 at 07:21:31PM +0200, Tormod Volden wrote: > > Yes, I think dropping the set_cap is the easy way out of here. sonar > > will still be visually pleasing, just not so interesting. > > Let's do that for buster/

Bug#973245: openrc: CVE-2018-21269: checkpath root privilege escalation following non-terminal symlinks

2021-05-06 Thread Moritz Mühlenhoff
Am Sun, Jan 10, 2021 at 12:34:35AM +0100 schrieb Moritz Mühlenhoff: > Am Tue, Oct 27, 2020 at 08:53:28PM +0100 schrieb Salvatore Bonaccorso: > > Source: openrc > > Version: 0.42-1 > > Severity: important > > Tags: security upstream > > Forwarded: https://github.c

Bug#970253: CVE-2020-15469

2021-05-06 Thread Moritz Mühlenhoff
Am Sun, Sep 13, 2020 at 10:42:36PM +0200 schrieb Moritz Muehlenhoff: > Package: qemu > Severity: important > Tags: security > X-Debbugs-Cc: Debian Security Team > > Not fixed upstream yet at this point: > > https://www.openwall.com/lists/oss-security/2020/07/02/1 > https://lists.gnu.org/archive/

Bug#816176: linux-image-4.3.0-0.bpo.1-amd64: xhci_hub_control causes abnormally high CPU usage when no USB devices attached

2021-05-06 Thread Moritz Mühlenhoff
Am Tue, Sep 25, 2018 at 08:19:13PM +0200 schrieb Yves-Alexis Perez: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Sun, 28 Feb 2016 12:19:43 +0100 Anders Nylander > wrote: > > > Following the removal of of the USB device, I noticed very high CPU usage > > being caused by kworker and

Bug#987353: CVE-2020-8903 CVE-2020-8907 CVE-2020-8933

2021-05-10 Thread Moritz Mühlenhoff
Am Thu, Apr 22, 2021 at 09:53:24AM -0700 schrieb Zach Marano: > Hi, since this package was brought into Debian in ~2018, there have been > several transformations in the GCE guest software stack and thus the > current landscape is very different. Google doesn't actually maintain the > official Debi

Bug#986803: [Pkg-rust-maintainers] Bug#986803: CVE-2021-28875 CVE-2021-28876 CVE-2021-28877 CVE-2021-28878 CVE-2021-28879 CVE-2020-36317 CVE-2020-36318

2021-05-18 Thread Moritz Mühlenhoff
Sorry for the late reply, got backlogged in my inbox. Am Mon, Apr 12, 2021 at 11:18:16AM +0100 schrieb Ximin Luo: > It looks like these CVEs affect all versions up to 1.52 (which is not yet > released). > > Do you have links to patches fixing these bugs that can be backported to > 1.48? We've h

Bug#961298: Dropping jodd from bullseye

2021-05-18 Thread Moritz Mühlenhoff
Am Mon, Mar 01, 2021 at 10:54:31AM +0100 schrieb Salvatore Bonaccorso: > Hi Emmanuel, > > On Sat, May 30, 2020 at 02:50:32PM +0200, Emmanuel Bourg wrote: > > Control: severity -1 important > > > > Le 22/05/2020 à 22:51, Salvatore Bonaccorso a écrit : > > > > > The following vulnerability was pub

Bug#986006: libpdfbox2-java: CVE-2021-27807

2021-05-18 Thread Moritz Mühlenhoff
Am Mon, Apr 05, 2021 at 09:37:41AM -0700 schrieb tony mancill: > On Sat, Mar 27, 2021 at 07:52:37PM +0100, Salvatore Bonaccorso wrote: > > Source: libpdfbox2-java > > Version: 2.0.22-1 > > Severity: important > > Tags: security upstream > > X-Debbugs-Cc: car...@debian.org, Debian Security Team > >

Bug#988746: RM: jodd/3.8.6-1.1

2021-05-20 Thread Moritz Mühlenhoff
Am Wed, May 19, 2021 at 08:47:24PM +0200 schrieb Sebastian Ramacher: > On 2021-05-18 23:38:58 +0200, Moritz Muehlenhoff wrote: > > Package: release.debian.org > > Severity: normal > > User: release.debian@packages.debian.org > > Usertags: rm > > X-Debbugs-Cc: ebo...@apache.org > > > > Please r

Bug#988729: [Pkg-rust-maintainers] Bug#988729: CVE-2021-21299

2021-05-24 Thread Moritz Mühlenhoff
Am Wed, May 19, 2021 at 07:39:55PM +0200 schrieb Fabian Grünbichler: > On May 18, 2021 8:42 pm, Moritz Muehlenhoff wrote: > > Source: rust-hyper > > Severity: grave > > Tags: security > > X-Debbugs-Cc: Debian Security Team > > > > CVE-2021-21299: > > https://github.com/hyperium/hyper/security/adv

Bug#988886: adminer: CVE-2021-29625: XSS in doc_link

2021-05-24 Thread Moritz Mühlenhoff
Am Fri, May 21, 2021 at 12:39:42PM +0200 schrieb Alexandre Rossi: > bullseye : this bug is not RC, so no update. Security bugs can still be fixed in they are sensibly backportable, even if not RC. Simply upload to unstable and ask for an unblock. Cheers, Moritz

Bug#989086: New version 1.11.12 available

2021-05-26 Thread Moritz Mühlenhoff
Am Tue, May 25, 2021 at 05:08:33PM +0200 schrieb Marcus Frings: > Package: leafnode > Version: 1.11.11-3 > Severity: wishlist > > Dear Moritz, > > After some years of dormant sleep, leafnode received an update to 1.11.12 in > 2021. > > Please consider the new version to be included in Debian.

Bug#986593: syncthing: CVE-2021-21404

2021-05-27 Thread Moritz Mühlenhoff
Am Wed, Apr 07, 2021 at 09:36:01PM +0200 schrieb Salvatore Bonaccorso: > Source: syncthing > Version: 1.12.1~ds1-2 > Severity: important > Tags: security upstream > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > > Hi, > > The following vulnerability was published for syncthing. > >

Bug#977767: opendmarc: CVE-2020-12272

2021-05-28 Thread Moritz Mühlenhoff
Am Sun, Dec 20, 2020 at 02:15:34PM +0100 schrieb Salvatore Bonaccorso: > Source: opendmarc > Version: 1.4.0~beta1+dfsg-3 > Severity: important > Tags: security upstream > Forwarded: https://sourceforge.net/p/opendmarc/tickets/237/ > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > Contro

Bug#984668: python-markdown2: CVE-2021-26813

2021-05-28 Thread Moritz Mühlenhoff
Am Sat, Mar 06, 2021 at 09:39:52PM +0100 schrieb Salvatore Bonaccorso: > Source: python-markdown2 > Version: 2.3.10-1 > Severity: important > Tags: security upstream > Forwarded: https://github.com/trentm/python-markdown2/pull/387 > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > > Hi,

Bug#990522: libtpms: CVE-2021-3623

2021-07-01 Thread Moritz Mühlenhoff
Source: libtpms X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libtpms. CVE-2021-3623[0]: out-of-bounds access when trying to resume the state of the vTPM https://github.com/stefanberger/libtpms/pull/223 https://github

Bug#990524: rabbitmq-server: CVE-2021-32719 CVE-2021-32718

2021-07-01 Thread Moritz Mühlenhoff
Source: rabbitmq-server X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for rabbitmq-server. CVE-2021-32719[0]: | RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server | prior to version 3.8.18, when a federat

Bug#990525: libgrokj2k: CVE-2021-36089

2021-07-01 Thread Moritz Mühlenhoff
Source: libgrokj2k X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libgrokj2k. CVE-2021-36089[0]: | Grok 7.6.6 through 9.2.0 has a heap-based buffer overflow in | grk::FileFormatDecompress::apply_palette_clr (called from | g

Bug#990526: libsepol: CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087

2021-07-01 Thread Moritz Mühlenhoff
Source: libsepol X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libsepol. CVE-2021-36084[0]: | The CIL compiler in SELinux 3.2 has a use-after-free in | __cil_verify_classperms (called from __cil_verify_classpermissi

Bug#990527: kimageformats: CVE-2021-36083

2021-07-01 Thread Moritz Mühlenhoff
Source: kimageformats X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for kimageformats. CVE-2021-36083[0]: | KDE KImageFormats 5.70.0 through 5.81.0 has a stack-based buffer | overflow in XCFImageFormat::loadTileRLE. https://b

<    10   11   12   13   14   15   16   17   18   19   >