Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595

2014-11-21 Thread Moritz Mühlenhoff
On Wed, Nov 19, 2014 at 11:45:02PM +0100, Moritz Muehlenhoff wrote: Source: xen Severity: grave Tags: security Hi, the following security issues apply to Xen in jessie: CVE-2014-5146,CVE-2014-5149: https://marc.info/?l=oss-securitym=140784877111813w=2 CVE-2014-8594:

Bug#734107: web2ldap: CVE-2013-7258: XSS vulnerability in displaying group DN and entry data in group administration UI

2014-11-13 Thread Moritz Mühlenhoff
On Fri, Jan 03, 2014 at 11:30:13PM +0200, Henri Salo wrote: Package: web2ldap Version: 1.1.43~dfsg-1 Severity: important Tags: security, fixed-upstream http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7258 http://www.web2ldap.de/changes-1.1.html http://secunia.com/advisories/56160

Bug#742186: ruby-rack-ssl: CVE-2014-2538

2014-11-29 Thread Moritz Mühlenhoff
On Thu, Mar 20, 2014 at 01:19:00PM +0100, Moritz Muehlenhoff wrote: Package: ruby-rack-ssl Severity: important Tags: security Please see http://www.openwall.com/lists/oss-security/2014/03/19/2 https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b Can we please

Bug#726093: python-scipy: CVE-2013-4251: weave /tmp and current directory issues

2014-11-29 Thread Moritz Mühlenhoff
On Wed, Oct 23, 2013 at 08:04:17AM +0200, Salvatore Bonaccorso wrote: Hi Julian, On Wed, Oct 23, 2013 at 01:16:36AM +0200, Julian Taylor wrote: On 22.10.2013 08:43, Salvatore Bonaccorso wrote: Hi Julian, Cc'ing Julian directly as per short discussion on IRC. On IRC you

Bug#752092: softhsm-keyconv creates security-sensibe file world-readable

2014-11-29 Thread Moritz Mühlenhoff
On Thu, Jun 19, 2014 at 05:10:35PM +0200, Ondřej Surý wrote: Control: forwarded -1 https://issues.opendnssec.org/browse/SUPPORT-136 Funny, I have just fixed exactly same bug in ldns. Will push that forward... Can you please upload a fix for jessie? Cheers, Moritz -- To

Bug#770463: unblock: dhcpcd5/6.0.5-2

2014-12-03 Thread Moritz Mühlenhoff
On Fri, Nov 21, 2014 at 08:30:37PM +0100, Niels Thykier wrote: On 2014-11-21 14:56, Salvatore Bonaccorso wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi Release Team, Please unblock package dhcpcd5, which

Bug#745808: speech-dispatcher: CVE-2014-1724

2014-12-04 Thread Moritz Mühlenhoff
On Fri, May 16, 2014 at 11:17:32AM +1000, Luke Yelavich wrote: On Fri, Apr 25, 2014 at 10:06:04PM EST, Moritz Muehlenhoff wrote: Hi, the details are a bit scarce, can you contact upstream whether the Chrome developers have contacted them?

Bug#733496: Code copy of older Mozilla code

2014-12-06 Thread Moritz Mühlenhoff
severity serious thanks This package forks a local copy of the Iceweasel Javascript engine which is no longer supported with security updates (currently only the ESR24 series is maintained) What's the strategy here? Do you plan to backport/triage all Javascript related security issues

Bug#695348: collabtive: XSS and CSRF issues

2014-12-09 Thread Moritz Mühlenhoff
On Thu, Jan 10, 2013 at 04:47:35PM -0600, Gunnar Wolf wrote: FWIW the exploit-db webpage points at three different problems, two XSS and one CSRF. The XSS are not present in collabtive 0.7.6, but the CSRF is. I'm getting in touch with the authors right now. Thanks!

Bug#769632: kde-runtime: CVE-2014-8600: Insufficient Input Validation By IO Slaves and Webkit Part

2014-12-09 Thread Moritz Mühlenhoff
On Sat, Nov 15, 2014 at 08:25:41AM +0100, Salvatore Bonaccorso wrote: Source: kde-runtime Version: 4:4.8.4-2 Severity: normal Tags: security upstream patch fixed-upstream Hi, the following vulnerability was published for kde-runtime. CVE-2014-8600[0]: Insufficient Input Validation By

Bug#695348: collabtive: XSS and CSRF issues

2014-12-28 Thread Moritz Mühlenhoff
On Tue, Dec 09, 2014 at 08:56:21PM -0600, Gunnar Wolf wrote: Moritz Mühlenhoff dijo [Tue, Dec 09, 2014 at 10:17:14PM +0100]: I'm getting in touch with the authors right now. Thanks! http://collabtive.o-dyn.de/forum/viewtopic.php?f=11t=8479 Gunnar, is this fixed in the version

Bug#767227: [oss-security] Re: CVE request: lsyncd command injection

2014-12-28 Thread Moritz Mühlenhoff
On Wed, Nov 26, 2014 at 12:18:13AM +0100, Ángel González wrote: On 20-11-2014 Mitre wrote: There is a command injection flaw in lsyncd, a file change monitoring and synchronization daemon: https://github.com/axkibe/lsyncd/issues/220

Bug#773671: libv8-3.14: multiple security issues

2014-12-28 Thread Moritz Mühlenhoff
On Sun, Dec 21, 2014 at 03:19:42PM -0500, Michael Gilbert wrote: package: src:libv8-3.14 severity: grave tags: security Hi, the following vulnerabilities were published for libv8-3.14. So if I'm understanding the discussion on debian-devel correctly the libv8 maintainers want to see this

Bug#773671: [Pkg-javascript-devel] Bug#773671: libv8-3.14: multiple security issues

2014-12-29 Thread Moritz Mühlenhoff
On Mon, Dec 29, 2014 at 12:28:30PM +0100, Bálint Réczey wrote: Hi Moritz, 2014-12-29 3:01 GMT+01:00 Moritz Mühlenhoff j...@inutil.org: On Sun, Dec 21, 2014 at 03:19:42PM -0500, Michael Gilbert wrote: package: src:libv8-3.14 severity: grave tags: security Hi, the following

Bug#758086: CVE-2012-6153: Apache HttpComponents client: Hostname verification susceptible to MITM attack

2014-12-29 Thread Moritz Mühlenhoff
On Mon, Sep 22, 2014 at 03:56:00PM +0200, Raphael Hertzog wrote: Hi, On Mon, 18 Aug 2014, Salvatore Bonaccorso wrote: On Thu, Aug 14, 2014 at 11:43:32PM +0200, Emmanuel Bourg wrote: Is there an example available somewhere of a subject improperly parsed by commons-httpclient/3.1-10.2?

Bug#774748: #774748: ruby-redcloth: CVE-2012-6684

2015-01-26 Thread Moritz Mühlenhoff
On Fri, Jan 09, 2015 at 10:57:13PM +0100, Christian Hofstaedtler wrote: AFAICT there is no publicly available patch, and upstream is more or less dead. Redmine's patched redcloth3 looks very different from the current redcloth 4.x sources, so I have my doubts if forward porting this is

Bug#775866: vlc: multiple vulnerabilities

2015-01-26 Thread Moritz Mühlenhoff
On Tue, Jan 20, 2015 at 09:47:26PM +0100, Yves-Alexis Perez wrote: * The potential invalid writes in modules/services_discovery/sap.c and modules/access/ftp.c were not fixed as I did not provide a trigger. Note, that the code looks very similar to the confirmed bug in

Bug#775662: oss4: Insufficient validation of USB device descriptors

2015-01-26 Thread Moritz Mühlenhoff
On Sun, Jan 18, 2015 at 10:24:30AM +, Ben Hutchings wrote: Source: oss4 Version: 4.2-build2006-2 Severity: critical Tags: security In kernel/drv/oss_usb/oss_usb.c: OSS maintainers, did you forward this upstream? Cheers, Moritz -- To UNSUBSCRIBE, email to

Bug#774854: race condition between fur and fex_cleanup

2015-01-26 Thread Moritz Mühlenhoff
On Mon, Jan 26, 2015 at 01:41:54PM +0100, Kilian Krause wrote: Hi Moritz, On Mon, Jan 26, 2015 at 12:28:00PM +0100, Moritz Mühlenhoff wrote: On Mon, Dec 22, 2014 at 10:33:50PM +0100, Kilian Krause wrote: Package: fex Version: 20140917-1 Severity: serious Tags: security patch

Bug#775892: unblock (pre-approval): python-django/1.7.3-1

2015-01-26 Thread Moritz Mühlenhoff
On Fri, Jan 23, 2015 at 02:26:06PM +0100, Raphael Hertzog wrote: On Wed, 21 Jan 2015, Raphael Hertzog wrote: Some notes: - the final upload will include the bug closure of #775375 - there's a small tweak of a Suggests dependency, it was not intended for jessie but I don't see how it can

Bug#773577: libssh: CVE-2014-8132: Double free on dangling pointers in initial key exchange packet

2015-01-26 Thread Moritz Mühlenhoff
On Sat, Dec 27, 2014 at 02:27:29PM +0100, Laurent Bigonville wrote: On Sat, 20 Dec 2014 08:18:29 +0100 Salvatore Bonaccorso car...@debian.org wrote: Hi, Hello, the following vulnerability was published for libssh. CVE-2014-8132[0]: Possible double free on a dangling pointer

Bug#775306: pxz: race condition in setting permissions on output file

2015-01-26 Thread Moritz Mühlenhoff
On Wed, Jan 14, 2015 at 05:25:02AM +0100, Holger Levsen wrote: control: severity -1 important Hi Alexander, On Dienstag, 13. Januar 2015, Alexander Cherepanov wrote: pxz sets the mode of an output file to be the same as the one of an input file but does it only after compression is

Bug#774048: CVE-2014-9390

2015-01-26 Thread Moritz Mühlenhoff
On Mon, Jan 05, 2015 at 01:47:40AM +1100, Russell Sim wrote: Moritz Muehlenhoff j...@debian.org writes: Source: libgit2 Severity: important Tags: security libgit2 is also affected by the recent git vulnerability: http://openwall.com/lists/oss-security/2014/12/18/21 Thanks for the

Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-26 Thread Moritz Mühlenhoff
On Mon, Jan 26, 2015 at 09:07:19PM +0530, Ritesh Raj Sarraf wrote: On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote: In the past someone from upstream posted the upstream commits to the bug log, maybe you can contact them for more information so that we can merge the isolated fixes into the

Bug#776007: buffer overrun in acknowledge.c(gi)

2015-01-30 Thread Moritz Mühlenhoff
On Fri, Jan 30, 2015 at 11:17:49AM +0100, Axel Beckert wrote: Hi Moritz, Moritz Mühlenhoff wrote: On Tue, Jan 27, 2015 at 12:34:09PM +0100, Axel Beckert wrote: Moritz Mühlenhoff wrote: I think it's sufficient if we fix this in a point update, can you take care of that? Do

Bug#775346: chicken: buffer overrun in CHICKEN Scheme's substring-index (no CVE yet)

2015-02-08 Thread Moritz Mühlenhoff
On Wed, Jan 14, 2015 at 03:13:04PM +0100, Moritz Muehlenhoff wrote: Package: chicken Severity: important Tags: security Hi, please see http://www.openwall.com/lists/oss-security/2015/01/12/3 for details. This has been assigned CVE-2014-9651. What's the status? Cheers, Moritz

Bug#775591: [src:linux] AUFS missing from 3.18.0 kernel = Docker 10x slower

2015-01-17 Thread Moritz Mühlenhoff
reassign 775591 docker.io thanks On Sat, Jan 17, 2015 at 10:43:23PM +, Ben Hutchings wrote: Control: reassign -1 docker Control: retitle -1 Docker should support overlayfs as alternative to aufs On Sat, 2015-01-17 at 21:45 +0200, Török Edwin wrote: Package: src:linux Version:

Bug#774050: CVE-2014-9390

2015-01-16 Thread Moritz Mühlenhoff
On Tue, Dec 30, 2014 at 08:13:08AM -0800, tony mancill wrote: On 12/30/2014 05:18 AM, Emmanuel Bourg wrote: Here are the relevant commits to backport: Always ignore case when forbidding .git in ObjectChecker https://github.com/eclipse/jgit/commit/07612a6 Disallow .git. and .gitspace

Bug#775536: CVE-2014-9447

2015-01-17 Thread Moritz Mühlenhoff
On Sat, Jan 17, 2015 at 12:34:51AM +0100, Kurt Roeckx wrote: On Sat, Jan 17, 2015 at 12:12:44AM +0100, Moritz Muehlenhoff wrote: Package: elfutils Version: 0.159-4 Severity: important Tags: security Please see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447 for

Bug#681888: CVE-2012-3406: exploits in the wild, upstream report?

2015-01-17 Thread Moritz Mühlenhoff
On Tue, Feb 05, 2013 at 05:56:15PM +0100, Arne Wichmann wrote: Hi, just for information: [1] suggests that exploits for one of 340[456] may be out in the wild. Moreover I did not find an upstream glibc-bug about this yet. Is there one? [1]

Bug#774299: wheezy-pu: openssl: disable SSLv3 by default

2015-01-18 Thread Moritz Mühlenhoff
On Wed, Dec 31, 2014 at 04:41:29PM +0100, Kurt Roeckx wrote: On Wed, Dec 31, 2014 at 02:00:23PM +, Adam D. Barratt wrote: Control: tags -1 + moreinfo On Wed, 2014-12-31 at 13:52 +0100, Kurt Roeckx wrote: I would like to disable SSLv3 by default in wheezy. Do we know how well

Bug#777694: ITA: icu -- Development utilities for International Components for Unicode

2015-02-16 Thread Moritz Mühlenhoff
On Mon, Feb 16, 2015 at 12:12:02AM +0100, László Böszörményi (GCS) wrote: Hi all, On Thu, Feb 12, 2015 at 4:50 PM, j...@debian.org wrote: It would be great if you (or any co-maintainer) would initially take care of the open icu security issues in jessie/sid (with a minimal upload to sid

Bug#778412: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability

2015-02-16 Thread Moritz Mühlenhoff
On Sat, Feb 14, 2015 at 03:41:21PM +0100, Luciano Bello wrote: Package: nvi Severity: important Tags: security patch The security team received a report from the CERT Coordination Center that the Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability.

Bug#778409: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability

2015-02-15 Thread Moritz Mühlenhoff
On Sat, Feb 14, 2015 at 10:09:09PM +, Colin Watson wrote: On Sat, Feb 14, 2015 at 03:40:31PM +0100, Luciano Bello wrote: The security team received a report from the CERT Coordination Center that the Henry Spencer regular expressions (regex) library contains a heap overflow

Bug#778261: Buffer overflow in GIF encoder

2015-02-15 Thread Moritz Mühlenhoff
On Fri, Feb 13, 2015 at 12:28:28AM +0100, Markus Koschany wrote: Control: tags -1 moreinfo On Thu, 12. Feb 23:13 Moritz Muehlenhoff j...@debian.org wrote: Package: byzanz Severity: important Tags: security Hi, this was reported by Red Hat:

Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Moritz Mühlenhoff
On Tue, Jan 27, 2015 at 09:53:45AM +, Gianfranco Costamagna wrote: Hi Moritz, please read carefully this thread :) Could you please check back with upstream on CVE-2015-0377 and CVE-2015-0418? jessie is not affected, and wheezy has already the patch on this thread the two CVEs are

Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Moritz Mühlenhoff
On Mon, Jan 26, 2015 at 09:14:55PM +0530, Ritesh Raj Sarraf wrote: On 01/26/2015 09:07 PM, Ritesh Raj Sarraf wrote: On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote: In the past someone from upstream posted the upstream commits to the bug log, maybe you can contact them for more information

Bug#734303: Not to be released with jessie

2015-01-27 Thread Moritz Mühlenhoff
On Sun, Jan 05, 2014 at 06:34:55PM +, Dominic Hargreaves wrote: Source: movabletype-opensource Version: 5.2.7+dfsg-1 Severity: serious Justification: maintainer Support of MTOS by upstream (at least in the English speaking community) is now very sketchy. The security update announced

Bug#776007: buffer overrun in acknowledge.c(gi)

2015-01-27 Thread Moritz Mühlenhoff
On Thu, Jan 22, 2015 at 06:00:54PM +0100, Christoph Berg wrote: Re: To Debian Bug Tracking System 2015-01-22 20150122161925.ga23...@msg.df7cb.de Source: xymon Version: 4.3.17-1 Severity: grave Tags: security patch pending web/acknowledge.c uses a string twice in a format string,

Bug#776007: buffer overrun in acknowledge.c(gi)

2015-01-27 Thread Moritz Mühlenhoff
On Tue, Jan 27, 2015 at 12:34:09PM +0100, Axel Beckert wrote: Hi Moritz, Moritz Mühlenhoff wrote: I think it's sufficient if we fix this in a point update, can you take care of that? Do you think of Jessie or Wheezy? As far as I can see, Wheezy is not affected: https

Bug#774211: freeze exception for binutils 2.25-3

2015-01-26 Thread Moritz Mühlenhoff
On Tue, Dec 30, 2014 at 12:29:35PM +0100, Matthias Klose wrote: forgot to mention that there are no regression in the binutils testsuite on all release architectures, and that there are no regression in the gcc-4.8 and gcc-4.9 testsuites on all release architectures. Did someone from the

Bug#774854: race condition between fur and fex_cleanup

2015-01-26 Thread Moritz Mühlenhoff
On Mon, Dec 22, 2014 at 10:33:50PM +0100, Kilian Krause wrote: Package: fex Version: 20140917-1 Severity: serious Tags: security patch upstream pending confirmed jessie As upstream has released a new version of the fex package which closes a security issue and there is no CVE assigned,

Bug#774769: [lftp] saves unknown host's fingerprint in known_hosts without any prompt

2015-01-26 Thread Moritz Mühlenhoff
On Wed, Jan 07, 2015 at 02:25:49PM +0100, Noël Köthe wrote: tags 774769 + upstream forwarded 774769 https://github.com/lavv17/lftp/issues/116 thanks Hello Marcin, Am Mittwoch, den 07.01.2015, 12:39 +0100 schrieb Marcin Szewczyk: From the src/SSH_Access.cc file: 47: const char

Bug#775044: openjdk-7: FTBFS: java.lang.RuntimeException: time is more than 10 years from present: 1104530400000

2015-01-11 Thread Moritz Mühlenhoff
for me. For details please see https://bugs.gentoo.org/show_bug.cgi?id=534118 Cheers, Moritz -- Moritz Mühlenhoff Open Source Software Engineer Univention GmbH be open. Mary-Somerville-Str.1 28359 Bremen Tel. : +49 421 22232-0 [.] Fax : +49 421 22232-99 muehlenh...@univention.de http

Bug#774530: dwarfutils: CVE-2014-9482

2015-01-08 Thread Moritz Mühlenhoff
On Tue, Jan 06, 2015 at 01:13:25PM -0700, Troy Heber wrote: tag upstream thanks Upstream has pushed patches to the repo but has not yet done a release yet. Hi, since jessie is frozen, only a targeted security fix would be allowed by the release team anyway. Can you please prepare one?

Bug#761963: security-tracker: consolidate vulnerable/fixed per release in overviews

2015-03-18 Thread Moritz Mühlenhoff
On Wed, Sep 17, 2014 at 09:10:39AM +, Thijs Kinkhorst wrote: Package: security-tracker Severity: wishlist Hi, In the overview per-package, the tracker currently shows for each CVE name about seven columns: squeeze, squeeze-security, squeeze-lts, wheezy, wheezy-security, jessie, sid.

Bug#779550: qt4-x11: CVE-2015-0295

2015-03-15 Thread Moritz Mühlenhoff
On Mon, Mar 02, 2015 at 03:37:03PM -0300, Lisandro Damián Nicanor Pérez Meyer wrote: On Monday 02 March 2015 18:20:22 Moritz Muehlenhoff wrote: On Mon, Mar 02, 2015 at 07:32:11PM +0300, Dmitry Shachnev wrote: clone -1 -2 reassign -2 libqt5gui5 5.3.2+dfsg-4 thanks On Mon, 02 Mar

Bug#778646: Multiple issues

2015-03-15 Thread Moritz Mühlenhoff
On Tue, Feb 17, 2015 at 10:02:37PM +0100, Moritz Muehlenhoff wrote: Package: potrace Version: 1.11-2 Severity: grave Tags: security Hi, please see https://bugzilla.redhat.com/show_bug.cgi?id=955808 Could you report this upstream? A CVE ID has been requested, but not yet assigned:

Bug#780643: fbi: fbgs shows PDF files in black and white

2015-03-17 Thread Moritz Mühlenhoff
On Tue, Mar 17, 2015 at 12:56:36PM +0100, Stéphane Aulery wrote: Hello Ben, Le samedi 14 mars 2015 à 11:13:15, Ben Wong a écrit : The fbgs wrapper for fbi is great for viewing PDF files from the Linux console, however it shows them in black and white by default. There is a command

Bug#761859: security-tracker json deployed

2015-03-17 Thread Moritz Mühlenhoff
On Tue, Mar 17, 2015 at 08:17:03AM +0800, Paul Wise wrote: On Tue, 2015-03-17 at 00:03 +0100, Raphael Hertzog wrote: I also noticed that we have nowhere data that says that an issue is undetermined... maybe those issues should be entirely dropped? I don't understand why we have that

Bug#761859: security-tracker json deployed

2015-03-17 Thread Moritz Mühlenhoff
On Tue, Mar 17, 2015 at 01:09:44PM +0100, Moritz Mühlenhoff wrote: On Tue, Mar 17, 2015 at 08:17:03AM +0800, Paul Wise wrote: On Tue, 2015-03-17 at 00:03 +0100, Raphael Hertzog wrote: I also noticed that we have nowhere data that says that an issue is undetermined... maybe those issues

Bug#780100: tcllib: XSS in html::textarea

2015-03-09 Thread Moritz Mühlenhoff
On Mon, Mar 09, 2015 at 03:08:39PM +0300, Sergei Golovan wrote: tags 780100 + patch thanks Hi Moritz, On Mon, Mar 9, 2015 at 1:29 PM, Moritz Muehlenhoff j...@inutil.org wrote: Hi, please see https://www.sektioneins.de/en/advisories/advisory-012015-xss-tcllib-html-textarea.html

Bug#778332: RM: oss4/4.2-build2010-1.1

2015-03-09 Thread Moritz Mühlenhoff
On Wed, Mar 04, 2015 at 09:46:20AM +0100, Ivo De Decker wrote: Hi, On Fri, Feb 13, 2015 at 05:52:36PM +0100, Moritz Muehlenhoff wrote: please remove oss4 from jessie. There's been no maintainer followup since a month (plus no action back then we Ben initially reported it to the

Bug#778333: CVE-2014-9512

2015-03-05 Thread Moritz Mühlenhoff
On Fri, Feb 13, 2015 at 05:55:46PM +0100, Moritz Muehlenhoff wrote: Package: rsync Version: 3.1.1-2+b1 Severity: important Tags: security This was assigned CVE-2014-9512: http://xteam.baidu.com/?p=169 Patch is here:

Bug#778753: cabextract: Directory traversal (CVE pending)

2015-03-05 Thread Moritz Mühlenhoff
On Sat, Feb 21, 2015 at 08:10:11AM -0500, Eric Sharkey wrote: On Sat, Feb 21, 2015 at 3:35 AM, Salvatore Bonaccorso car...@debian.org wrote: Btw, please do not upload to security-master without prior coordination with the security-team, see

Bug#781497: musl: CVE-2015-1817: stack-based buffer overflow in ipv6 literal parsing

2015-03-30 Thread Moritz Mühlenhoff
On Mon, Mar 30, 2015 at 06:30:57AM +0200, Salvatore Bonaccorso wrote: Source: musl Version: 1.1.5-1 Severity: grave Tags: security upstream patch fixed-upstream Hi, the following vulnerability was published for musl. CVE-2015-1817[0]: stack-based buffer overflow in ipv6 literal

Bug#781250: CVE-2015-1779 / CVE-2015-XXXX

2015-03-29 Thread Moritz Mühlenhoff
On Fri, Mar 27, 2015 at 11:26:35AM +0300, Michael Tokarev wrote: 26.03.2015 16:47, Moritz Muehlenhoff wrote: Source: qemu Severity: important Tags: security Hi Michael, two security issues in qemu (you're probably aware, but let's track this through a bug): Yes indeed, I've

Bug#699754: grub core.img too large when using lvm+md

2015-03-05 Thread Moritz Mühlenhoff
tags 699754 moreinfo thanks On Tue, Feb 05, 2013 at 11:14:05AM +0100, Joost van Baal-Ilić wrote: Hi, I hope to get this bug squashed, soonish. On Mon, Feb 04, 2013 at 04:43:22PM +0100, Thijs Kinkhorst wrote: Package: release-notes Severity: normal Tags: wheezy Hi Joost,

Bug#774669: cpio: diff for NMU version 2.11+dfsg-4.1

2015-03-05 Thread Moritz Mühlenhoff
Control: tags 774669 + patch Control: tags 774669 + pending Anibal, I've prepared an NMU for cpio (versioned as 2.11+dfsg-4.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Cheers, Moritz diff -Nru cpio-2.11+dfsg/debian/changelog

Bug#778634: CVE-2008-7313 / CVE-2014-5008

2015-03-05 Thread Moritz Mühlenhoff
On Wed, Feb 25, 2015 at 05:17:28PM -0300, Marcelo Jorge Vieira wrote: Hello Security team, I fixed the CVE-2008-7313 and CVE-2014-5008 in the libphp-snoopy package. The current libphp-snoopy package is 1.2.4-2 and it is the same for squeeze, wheezy, jessie and sid. As the Snoopy

Bug#779488: putty: CVE-2015-2157

2015-03-01 Thread Moritz Mühlenhoff
On Sun, Mar 01, 2015 at 09:18:39PM +, Colin Watson wrote: On Sun, Mar 01, 2015 at 08:21:17PM +, Colin Watson wrote: On Sun, Mar 01, 2015 at 01:21:32PM +0100, Moritz Muehlenhoff wrote: This has been assigned CVE-2015-2157:

Bug#775535: [Pkg-puppet-devel] Bug#775535: CVE-2015-1029

2015-02-25 Thread Moritz Mühlenhoff
On Sat, Feb 21, 2015 at 08:58:13PM +0100, Stig Sandbeck Mathisen wrote: Moritz Muehlenhoff j...@debian.org writes: On Sat, Jan 17, 2015 at 12:09:51AM +0100, Moritz Muehlenhoff wrote: Package: puppet-module-puppetlabs-stdlib Severity: important Tags: security Hi, please see

Bug#779201: kfreebsd-{8,9}: CVE-2015-1414: DoS via IGMP packet

2015-02-25 Thread Moritz Mühlenhoff
On Wed, Feb 25, 2015 at 02:27:47PM +0100, Christoph Egger wrote: Hi! I would like to upload to stable security for this kernel crash / DoS vulnerability. Patch for -8 is below, -9 is the same modulo version numbers. Please upload for kfreebsd-9. For kfreebsd-8 we've skipped previous

Bug#777033: php5: CVE-2015-1351 CVE-2015-1352

2015-02-21 Thread Moritz Mühlenhoff
On Wed, Feb 04, 2015 at 09:45:26AM +0100, Moritz Muehlenhoff wrote: Package: php5 Severity: important Tags: security Justification: user security hole Hi, CVE-2015-1351: https://bugs.php.net/bug.php?id=68677

Bug#777036: php5: CVE-2015-1351 CVE-2015-1352

2015-02-21 Thread Moritz Mühlenhoff
On Wed, Feb 04, 2015 at 09:45:26AM +0100, Moritz Muehlenhoff wrote: Package: php5 Severity: important Tags: security Justification: user security hole Hi, CVE-2015-1351: https://bugs.php.net/bug.php?id=68677

Bug#780102: libjbcrypt-java: CVE-2015-0886

2015-03-18 Thread Moritz Mühlenhoff
On Mon, Mar 09, 2015 at 03:00:27PM +0100, Emmanuel Bourg wrote: Thank you for the report Moritz. According to the Bugzilla report the issue happens when BCrypt.gensalt() is called with the value 31. jenkins is the only package using this library and it calls this method with no parameter

Bug#780160: CVE-2014-9639

2015-04-02 Thread Moritz Mühlenhoff
On Mon, Mar 09, 2015 at 11:08:57PM +0100, Moritz Muehlenhoff wrote: Package: opus-tools Version: 0.1.9-1 Severity: important Tags: security Hi, CVE-2014-9638 and CVE-2014-9639 for vorbis-tools also affect opus-tools, please see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776086 for

Bug#755359: [kdm] systemd seem to fail to start display-manager.service

2015-04-02 Thread Moritz Mühlenhoff
On Thu, Apr 02, 2015 at 04:20:06PM +0200, John Paul Adrian Glaubitz wrote: On 04/02/2015 12:57 PM, John Paul Adrian Glaubitz wrote: Attaching a debdiff with the proposed changes to the kde-workspace source package which will add systemd support to kdm. Attaching a cleaned up revision the

Bug#781443: capnproto: FTBFS on armhf and armel (test seg. faults) but built there in the past

2015-04-02 Thread Moritz Mühlenhoff
On Sun, Mar 29, 2015 at 07:30:55PM -0700, Tom Lee wrote: Hey Niels, Understood. Hard to see exactly what's going on here because we seem to be falling afoul of https://lists.debian.org/debian-devel/2014/04/msg00322.html. Do you happen to know if there's another way to get access to

Bug#778753: cabextract: Directory traversal (CVE pending)

2015-04-02 Thread Moritz Mühlenhoff
On Fri, Feb 20, 2015 at 09:25:56PM -0500, Eric Sharkey wrote: On Thu, Feb 19, 2015 at 5:38 AM, Moritz Muehlenhoff j...@inutil.org wrote: Upstream fix is here: http://sourceforge.net/p/libmspack/code/217 Since unstable has a more recent version than testing, could you make a targeted

Bug#781608: MATE should disable automounting when screen is locked

2015-04-03 Thread Moritz Mühlenhoff
On Fri, Apr 03, 2015 at 07:04:23PM +0200, Mike Gabriel wrote: Package: caja Version: 1.8.2-3 Followup-For: Bug #781608 Control: severity -1 serious Control: forwarded -1 https://github.com/mate-desktop/caja/issues/398 Dear Kees, dear Debian Security Team, @Kees: Thanks for bringing up

Bug#782770: unblock: openjdk-7/7u79-2.5.5-1

2015-04-23 Thread Moritz Mühlenhoff
tOn Thu, Apr 23, 2015 at 10:03:02PM +0100, Jonathan Wiltshire wrote: Control: tag -1 moreinfo On Fri, Apr 17, 2015 at 05:23:39PM +0200, Moritz Muehlenhoff wrote: Please unblock package openjdk-7. It fixes multiple security issues. ATM the build failed on mips (that was sorted out with a

Bug#782769: unblock: chromium-browser/42.0.2311.90-1

2015-04-26 Thread Moritz Mühlenhoff
On Sun, Apr 26, 2015 at 11:57:43AM +0100, Jonathan Wiltshire wrote: On Fri, Apr 17, 2015 at 05:21:05PM +0200, Moritz Muehlenhoff wrote: Please unblock package chromium-browser. It fixes multiple security issues (and would also need some aging at this point) Should this be progressed to

Bug#783142: VMs fail to start on Broadwell CPUs

2015-04-22 Thread Moritz Mühlenhoff
On Wed, Apr 22, 2015 at 09:48:01PM +0200, Moritz Muehlenhoff wrote: Package: virtualbox Version: 4.3.18-dfsg-3 Severity: important Hi, virtualbox doesn't work on Broadwell CPUs; all VMs fail to start no matter what the user configures in the VM settings. This was reported upstream at

Bug#763148: Prevent migration to jessie

2015-04-29 Thread Moritz Mühlenhoff
Andreas Cadhalpun wrote: But having mysql-5.5 and mariadb-10.0 in jessie is apparently no problem, despite previous claims. What's the difference? To properly migrate over a daemon they need to co-exist for a stable release, while a lib does not. Stretch will only have one of them. How do

Bug#763148: Prevent migration to jessie

2015-04-29 Thread Moritz Mühlenhoff
On Wed, Apr 29, 2015 at 08:33:07PM +0200, Andreas Cadhalpun wrote: Having both for a year along each other will only waste people's time. Now at the beginning of the release cycle is the time to make a decision, not by dragging things into a year as of today. Picking one of the two won't

Bug#784118: RM: squid -- RoQA; replaced by squid3

2015-05-07 Thread Moritz Mühlenhoff
On Mon, May 04, 2015 at 07:38:24AM -0400, Scott Kitterman wrote: On Sunday, May 03, 2015 11:25:39 AM you wrote: Package: ftp.debian.org Severity: normal Hi, please remove squid. It has been replaced by squid3 (672156) and is already not part of jessie, so let's also remove it from

Bug#782499: RM: multiple packages in squeeze-security

2015-04-16 Thread Moritz Mühlenhoff
On Mon, Apr 13, 2015 at 11:31:18AM +0200, Raphaël Hertzog wrote: Package: ftp.debian.org Severity: normal Hello, squeeze-security (on security.debian.org) contains packages which were dropped from squeeze (on main archive) because they are no longer supported. They should thus be also

Bug#782573: Installation on Thinkpad X250 worked fine

2015-04-14 Thread Moritz Mühlenhoff
On Tue, Apr 14, 2015 at 03:44:37PM +0200, Cyril Brulebois wrote: I doubt we'll change anything in templates at this point (strings need to be translated), but we already have: https://www.debian.org/releases/testing/amd64/ch02s02.html

Bug#755359: [kdm] systemd seem to fail to start display-manager.service

2015-04-03 Thread Moritz Mühlenhoff
On Fri, Apr 03, 2015 at 09:05:17AM +0200, John Paul Adrian Glaubitz wrote: On 04/02/2015 10:15 PM, Moritz Mühlenhoff wrote: My patch from https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754314 retains the kdmrc customisation currently present in the sysvinit script; maybe you can fold

Bug#781250: CVE-2015-1779 / CVE-2015-XXXX

2015-04-09 Thread Moritz Mühlenhoff
On Thu, Apr 09, 2015 at 07:06:06PM +0300, Michael Tokarev wrote: 9 апреля 2015 г. 18:42:13 GMT+03:00, Salvatore Bonaccorso car...@debian.org пишет: Hi Michael, Mortiz, Small update for CVE-2015-1779: so the patches commited upstream are: Yes, thanks, I've seen the commits the other day,

Bug#778265: [Pkg-puppet-devel] Bug#778265: CVE-2015-1426

2015-04-09 Thread Moritz Mühlenhoff
On Wed, Feb 25, 2015 at 07:57:31PM +0100, Stig Sandbeck Mathisen wrote: Control: tags -1 + patch confirmed Moritz Muehlenhoff j...@inutil.org writes: Moritz Muehlenhoff wrote: Package: facter Severity: important Tags: security Please see

Bug#781640: Downgrading bug severity

2015-06-05 Thread Moritz Mühlenhoff
On Fri, Jun 05, 2015 at 03:58:23AM +0200, Daniele Tricoli wrote: Hello, On Sunday 31 May 2015 12:00:17 Moritz Mühlenhoff wrote: What's the status? Sorry for the delay! I cherry picked and adapted the patch for pyjwt version in Jessie. I worked on this branch: https://anonscm.debian.org

Bug#788321: elinks: FTBFS on arm64

2015-06-10 Thread Moritz Mühlenhoff
On Wed, Jun 10, 2015 at 09:41:48AM +0100, Edmund Grimley Evans wrote: Source: elinks Version: 0.12~pre6-8 Tags: patch It failed to build on arm64: https://buildd.debian.org/status/package.php?p=elinkssuite=sid Mysteriously, I couldn't reproduce the build failure in my chroot. However,

Bug#788321: elinks: FTBFS on arm64

2015-06-10 Thread Moritz Mühlenhoff
On Wed, Jun 10, 2015 at 10:22:03AM +0100, Edmund Grimley Evans wrote: Your patch seems to have been made against the debian/rules file from jessie, but it has been migrated to dh in 0.12~pre6-7. I wonder how that happened. Perhaps I'm using a tardy mirror. Well, referring to

Bug#787644: libwmf: CVE-2015-0848: heap overflow when decoding BMP images

2015-06-19 Thread Moritz Mühlenhoff
On Fri, Jun 19, 2015 at 02:07:10PM +0200, Guido Günther wrote: Hi, On Tue, Jun 16, 2015 at 06:26:31AM +0200, Salvatore Bonaccorso wrote: Hi, A second CVE was assigned for a further issue: http://www.openwall.com/lists/oss-security/2015/06/16/4 (CVE-2015-4588). Attached debdiff

Bug#788306: [PKG-Openstack-devel] Bug#788306: Bug#788306: horizon: CVE-2015-3219: XSS in Horizon Heat stack creation

2015-06-10 Thread Moritz Mühlenhoff
On Wed, Jun 10, 2015 at 05:00:27PM +0200, Thomas Goirand wrote: On 06/10/2015 12:23 PM, László Böszörményi (GCS) wrote: On Wed, Jun 10, 2015 at 10:42 AM, Salvatore Bonaccorso car...@debian.org wrote: On Wed, Jun 10, 2015 at 09:10:56AM +0200, László Böszörményi (GCS) wrote: Just checked.

Bug#788160: elinks: unhandled symlink to directory conversion: /usr/share/doc/PACKAGE

2015-06-10 Thread Moritz Mühlenhoff
On Tue, Jun 09, 2015 at 12:48:58AM +0200, Andreas Beckmann wrote: Package: elinks Version: 0.12~pre6-7 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, an upgrade test with piuparts revealed that your package installs files over existing symlinks and possibly

Bug#784216: /etc/elinks/elinks.conf is gone

2015-06-13 Thread Moritz Mühlenhoff
On Mon, May 04, 2015 at 09:25:13AM +0200, Jakub Wilk wrote: Package: elinks Version: 0.12~pre6-6 User: debian...@lists.debian.org Usertags: adequate obsolete-conffile Sorry for the late reply, this fell through the cracks of my inbox. elinks_0.12~pre6-6 no longer ships the

Bug#781640: Downgrading bug severity

2015-06-17 Thread Moritz Mühlenhoff
On Fri, Jun 05, 2015 at 12:17:56PM +0200, Moritz Mühlenhoff wrote: On Fri, Jun 05, 2015 at 03:58:23AM +0200, Daniele Tricoli wrote: Hello, On Sunday 31 May 2015 12:00:17 Moritz Mühlenhoff wrote: What's the status? Sorry for the delay! I cherry picked and adapted the patch for pyjwt

Bug#787313: [pkg-gnupg-maint] Bug#787313: Bug#787313: Systemd user unit for gnupg-agent

2015-06-03 Thread Moritz Mühlenhoff
On Wed, Jun 03, 2015 at 10:03:42AM +0200, Werner Koch wrote: On Wed, 3 Jun 2015 08:05, gni...@fsij.org said: Thank you. I think it makes sense. I don't think so. GnuPG uses a locking mechanism to avoid that several instances of gpg and friends start gpg-agent. Thus watching the socket

Bug#774195: marked as done (libnss3: libpkix incorrect prefers older, weaker certs over stronger, newer certs)

2015-05-27 Thread Moritz Mühlenhoff
On Mon, May 25, 2015 at 11:21:26AM -0700, Andrew Ayer wrote: On Wed, 20 May 2015 06:39:06 + ow...@bugs.debian.org (Debian Bug Tracking System) wrote: On Wed, May 20, 2015 at 05:58:55PM +1200, VeNoMouS wrote: Seriously, how long do we have to wait on this to be fixed...

Bug#781640: Downgrading bug severity

2015-05-31 Thread Moritz Mühlenhoff
On Mon, Apr 13, 2015 at 04:25:24PM +0200, Daniele Tricoli wrote: On Saturday 11 April 2015 14:50:19 Luke Faraone wrote: However, the package is vulnerable to the other issue: - If the secretKey was expected to be a RSA public key, but the attacker changed the header to indicate a

Bug#788306: [PKG-Openstack-devel] Bug#788306: Bug#788306: Bug#788306: horizon: CVE-2015-3219: XSS in Horizon Heat stack creation

2015-06-11 Thread Moritz Mühlenhoff
On Thu, Jun 11, 2015 at 01:01:35AM +0200, Thomas Goirand wrote: Could you please allow me to upload the package to the security FTP, even without a DSA? Dealing with the release team to update software for security is often frustrating because it takes too long (because they are busy, and they

Bug#785424: Re: [vbox-dev] CVE-2015-3456 aka VENOM

2015-05-20 Thread Moritz Mühlenhoff
On Tue, May 19, 2015 at 09:36:45AM +, Gianfranco Costamagna wrote: Hi Debian security team, can we please followup with the two uploads then? I'm attaching the two debdiffs, Ok, please upload. Jessie needs to be build with -sa since virtualbox is new in jessie-security. I'll take care of

Bug#788471: elasticsearch: CVE-2015-4165: unspecified arbitrary files modification vulnerability

2015-07-07 Thread Moritz Mühlenhoff
On Sun, Jun 21, 2015 at 02:56:36PM +0200, Hilko Bengen wrote: * Salvatore Bonaccorso: Did you had a chance to get more details on it? ,[ http://seclists.org/bugtraq/2015/Jun/53 ] | Elasticsearch versions 1.0.0 - 1.5.2 are vulnerable to an engineered | attack on other applications on

Bug#794323: Should xmail be removed?

2015-08-16 Thread Moritz Mühlenhoff
reassign 794323 ftp.debian.org retitle 794323 RM: xmail thanks On Sat, Aug 01, 2015 at 01:31:37PM +0200, Moritz Muehlenhoff wrote: Package: xmail Severity: serious The last upstream release in was 2010, that's also when the last maintainer upload occured. It has longstanding RC bugs and

Bug#791761: flashplugin-nonfree: please provide a cronjob to run update-flashplugin-nonfree regularly

2015-08-18 Thread Moritz Mühlenhoff
On Wed, Jul 08, 2015 at 11:32:14AM +0200, Fabian Greffrath wrote: Package: flashplugin-nonfree Version: 1:3.6.1 Severity: wishlist Hi there, while trying to keep track if the critical security holes that are discovered in Flashplayer regularly, it would help if this package provided a

Bug#795718: Don't include libav in stretch

2015-08-19 Thread Moritz Mühlenhoff
On Tue, Aug 18, 2015 at 08:08:01PM +0200, Andreas Cadhalpun wrote: Hi Moritz, On 16.08.2015 14:27, Moritz Muehlenhoff wrote: It was decided to switch to ffmpeg for stretch and it's now in testing. Please remove libav from testing (or rather from unstable unless someone wants to

Bug#796111: [Pkg-libvirt-maintainers] Bug#796111: CVE-2015-5160

2015-08-19 Thread Moritz Mühlenhoff
On Wed, Aug 19, 2015 at 05:00:53PM +0200, Guido Günther wrote: Hi, On Wed, Aug 19, 2015 at 04:53:46PM +0200, Moritz Muehlenhoff wrote: Source: libvirt Severity: normal Tags: security This was assigned CVE-2015-5160:

<    1   2   3   4   5   6   7   8   9   10   >