Bug#920442: (no subject)

2019-01-25 Thread Marc Deslauriers
Looks like this is caused by texlive-base (2018.20190122-1), reverting to texlive-base (2018.20181214-1) fixes the FTBFS.

Bug#920442: libcaca FTBFS in unstable

2019-01-25 Thread Marc Deslauriers
Package: libcaca Version: 0.99.beta19-2 Severity: serious Justification: fails to build from source (but built successfully in the past) See: http://debomatic-amd64.debian.net/distribution#unstable/libcaca/0.99.beta19-2/buildlog

Bug#858564: (no subject)

2017-03-24 Thread Marc Deslauriers
We're hitting the same issue in Ubuntu: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1675698 "follow symlinks = no" is required to reproduce it.

Bug#803012: tar ftbfs everywhere (test suite errors)

2015-11-03 Thread Marc Deslauriers
Package: tar Version: 1.28-2 Followup-For: Bug #803012 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu xenial ubuntu-patch *** /tmp/tmp70_1Po/bug_body In Ubuntu, the attached patch was applied to achieve the following: * debian/patches/use-sort-in-t-dir-tests.diff: upstream

Bug#795429: CVE-2015-5177

2015-08-28 Thread Marc Deslauriers
Package: openslp-dfsg Version: 1.2.1-10 Followup-For: Bug #795429 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu wily ubuntu-patch *** /tmp/tmpHzlE84/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service via double

Bug#731480: hplip: CVE-2013-6427: insecure (undocumented) auto update feature

2013-12-12 Thread Marc Deslauriers
Package: hplip Version: 3.13.11-1 Followup-For: Bug #731480 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch -- Package-specific info: *** /tmp/tmp2P2w3P/bug_body In Ubuntu, the attached patch was applied to achieve the following: *

Bug#726601: libcommons-fileupload-java: CVE-2013-218

2013-11-13 Thread Marc Deslauriers
Package: libcommons-fileupload-java Version: 1.3-2 Followup-For: Bug #726601 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpA8shKI/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: arbitrary file

Bug#729006: closed by Emmanuel Bourg ebo...@apache.org (Bug#729006: fixed in maven-javadoc-plugin 2.9.1-2)

2013-11-08 Thread Marc Deslauriers
Thank you Emmanuel! -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#729006: FTBFS: missing libmockito-java dependency

2013-11-07 Thread Marc Deslauriers
Package: maven-javadoc-plugin Version: 2.9.1-1 Severity: serious Tags: patch Justification: fails to build from source (but built successfully in the past) User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu trusty ubuntu-patch *** /tmp/tmpvJaNhd/bug_body In Ubuntu, the attached patch

Bug#729006: FTBFS: missing libmockito-java dependency

2013-11-07 Thread Marc Deslauriers
On 13-11-07 04:05 PM, Emmanuel Bourg wrote: The tests are ignored in maven-javadoc-plugin (maven.test.skip is set to true in debian/maven.properties), so adding this dependency will make no difference. Do you have a log of the build failure? Here is the build log we were getting:

Bug#710344: (no subject)

2013-06-05 Thread Marc Deslauriers
Here's what I did...not sure if it's the best way to fix it though: --- libxcb-1.8.1.orig/tests/Makefile.am +++ libxcb-1.8.1/tests/Makefile.am @@ -12,9 +12,6 @@ check_PROGRAMS = check_all check_all_SOURCES = check_all.c check_suites.h check_public.c -all-local:: - $(RM) CheckLog*.xml -

Bug#692791: #692791 - CVE-2012-5519 - cups lpadmin-to-root privilege escalation - Proposed solutions

2012-11-29 Thread Marc Deslauriers
On 12-11-29 05:30 AM, Didier 'OdyX' Raboud wrote: snip B) Disable any remote configuration by lpadmin users This has been attempted by Marc on [1]. For now, it is incomplete as it still allows lpadmin users to HTTP PUT updates to the configuration files. Pros: + Addresses the problem in a

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-29 Thread Marc Deslauriers
Michael, On 12-11-29 10:12 AM, Michael Sweet wrote: So, your alternate fix doesn't actually solve the problem as I can still do something like: PageLog /var/log/cups/../../../etc/shadow Adding a check for ../ in the path will catch that, easy fix... Also, there are a lot of other

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-28 Thread Marc Deslauriers
On 12-11-27 11:38 PM, Michael Sweet wrote: After looking at this patch in detail, it doesn't actually prevent users in the lpadmin group from modifying cupsd.conf and performing the specified privilege escalation. An alternate fix for cups-1.5 and earlier that specifically addresses the

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-27 Thread Marc Deslauriers
FYI, as a security fix for our stable releases in Ubuntu, we plan on disabling cupsd.conf modification in the web interface entirely. Attached is the patch we plan on using. Marc. Description: fix privilege escalation by disabling config file editing via the web interface Author: Marc

Bug#692791: members of lpadmin can read every file on server via cups

2012-11-27 Thread Marc Deslauriers
On 12-11-27 03:51 PM, Didier 'OdyX' Raboud wrote: Le mardi, 27 novembre 2012 15.30:46, Marc Deslauriers a écrit : FYI, as a security fix for our stable releases in Ubuntu, we plan on disabling cupsd.conf modification in the web interface entirely. Attached is the patch we plan on using. Hi

Bug#692345: tiff: CVE-2012-4564

2012-11-15 Thread Marc Deslauriers
Package: tiff Version: 4.0.2-4 Followup-For: Bug #692345 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu raring ubuntu-patch *** /tmp/tmpm0_BMg/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service and possible code

Bug#682115: tiff: CVE-2012-3401 heap overflow in tiff2pdf

2012-07-21 Thread Marc Deslauriers
On Sat, 2012-07-21 at 20:57 -0400, Jay Berkenbilt wrote: Marc Deslauriers marc.deslauri...@ubuntu.com wrote: *** /tmp/tmpgGHwFf/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: possible arbitrary code execution via heap overflow

Bug#672492: CVE-2012-2141

2012-05-23 Thread Marc Deslauriers
Package: net-snmp Version: 5.4.3~dfsg-2.4 Followup-For: Bug #672492 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu quantal ubuntu-patch *** /tmp/tmp7KXNLG/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: denial of service via SNMP

Bug#664990: libzip1: CVE-2012-1162 CVE-2012-1163 Incorrect loop construct and numeric overflow

2012-03-28 Thread Marc Deslauriers
Package: libzip Version: 0.10-1 Followup-For: Bug #664990 User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu precise ubuntu-patch *** /tmp/tmpvDE7OS/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: arbitrary code execution or

Bug#625966: libmodplug = 0.8.8.2 .abc Stack-Based Buffer Overflow

2011-08-05 Thread Marc Deslauriers
Package: libmodplug Version: 1:0.8.8.2-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmpNcrGvL In Ubuntu, the attached patch was applied to fix the security issue: * SECURITY UPDATE: multiple security issues in ABC

Bug#554759: gupnp-ui: Fix for FTBFS

2011-07-29 Thread Marc Deslauriers
Package: gupnp-ui Version: 0.1.1-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu oneiric ubuntu-patch *** /tmp/tmp8b36Ny In Ubuntu, the attached patch was applied to fix the FTBFS: * configure, configure.ac: add libgupnp libraries to LIBS in

Bug#584516: [Re: CVE-2010-1628: allows context-dependent attackers to execute arbitrary code

2010-07-22 Thread Marc Deslauriers
Package: ghostscript Version: 8.63.dfsg.1-2 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu maverick ubuntu-patch *** /tmp/tmpQ4x52y In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: arbitrary code execution via

Bug#567554: samba: Ubuntu patch for the issue

2010-02-07 Thread Marc Deslauriers
Package: samba Version: 2:3.4.0-3 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu lucid ubuntu-patch *** /tmp/tmpUnTGqJ In Ubuntu, we've applied the attached patch in our current releases: * SECURITY UPDATE: privilege escalation via mount.cifs race

Bug#550442: ffmpeg: deluge of crashes due to missing input sanitization

2009-10-31 Thread Marc Deslauriers
On Sat, 2009-10-31 at 09:12 +0100, Reinhard Tartler wrote: One problem, it breaks build. Therefore, I had to backport svn r18016 aka 'MOV-Support-stz2-Compact-Sample-Size-Box' to fix FTBFS. without this patch, libavformat/mov.c won't compile, as field_size is introduced with this commit. While

Bug#550442: ffmpeg: deluge of crashes due to missing input sanitization

2009-10-29 Thread Marc Deslauriers
On Thu, 2009-10-15 at 13:03 +0200, Reinhard Tartler wrote: snip of chromium patches and managed to locate most patches in ffmpeg trunk Patches that I couldn't find upstream include: 09_mov_stsz_int_oflow.patch 32_mov_stream_index.patch 35_mov_bad_timings.patch

Bug#537254: mimetex: patch to fix security issues

2009-10-08 Thread Marc Deslauriers
Package: mimetex Version: 1.50-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu karmic ubuntu-patch *** /tmp/tmpXGbr7m In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: arbitrary code execution via long picture,

Bug#542218: backuppc: Security hole when using rsync and multiple users

2009-10-05 Thread Marc Deslauriers
The patch included in 3.1.0-7 doesn't actually fix the problem. Normal users can still set the ClientNameAlias by adding something like override_ClientNameAlias=1v_zZ_ClientNameAlias= to their POST. Marc. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject

Bug#542218: backuppc: Security hole when using rsync and multiple users

2009-10-05 Thread Marc Deslauriers
Included is a patch that moves the previous fix to a location before the settings get applied. Marc. diff -Naur backuppc-3.1.0.ori/lib/BackupPC/CGI/EditConfig.pm backuppc-3.1.0/lib/BackupPC/CGI/EditConfig.pm --- backuppc-3.1.0.ori/lib/BackupPC/CGI/EditConfig.pm 2009-10-05 08:04:01.0

Bug#510205: buffer overflow in libaudiofile

2009-06-16 Thread Marc Deslauriers
The SUSE update simply contains the patch from: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205#17 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#524806: poppler: multiple vulnerabilities

2009-05-13 Thread Marc Deslauriers
Here are the patches Ubuntu used: http://patches.ubuntu.com/by-release/extracted/intrepid-security/p/poppler/0.8.7-1ubuntu0.2/64_security_jbig2.patch http://patches.ubuntu.com/by-release/extracted/hardy-security/p/poppler/0.6.4-1ubuntu3.2/104_security_jbig2.patch

Bug#527474: pango1.0: integer overflow in heap allocation size calculations

2009-05-08 Thread Marc Deslauriers
Here is the upstream commit: http://git.gnome.org/cgit/pango/commit/?id=4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#516801: CVE-2008-6123: Access restriction bypass

2009-03-02 Thread Marc Deslauriers
The CVE-2008-6123 security issue was introduced in the following commit: http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=revrevision=16654 So, the issue was introduced in 5.2.5, 5.3.2 and 5.4.2. -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of