Bug#1028451: 2nd DisplayPort doesn't get video

2023-01-16 Thread Moritz Mühlenhoff
Am Mon, Jan 16, 2023 at 12:46:37PM + schrieb Didier 'OdyX' Raboud: > > I understand that would be annoying for you, but I don't think that it would > > affect the majority of our users. > > Hrm. More and more laptops come with usb-c only, and dongles/docks become more > and more common. > >

Bug#926276: Should guacamole-client be removed?

2023-01-11 Thread Moritz Mühlenhoff
reassign 926276 ftp.debian.org retitle 926276 RM: guacamole-client -- RoQA; unmaintained, RC-buggy, open security issues, dropping from testing since 2017 severity 926276 normal thanks Am Tue, Apr 02, 2019 at 10:04:34PM +0200 schrieb Moritz Muehlenhoff: > Source: guacamole-client > Severity:

Bug#1004441: unblocking chromium?

2023-01-10 Thread Moritz Mühlenhoff
Am Sun, Jan 08, 2023 at 12:27:52AM -0500 schrieb Andres Salomon: > > On Fri, Jan 6 2023 at 11:36:02 AM +0200, Adrian Bunk > wrote: > > On Fri, Jan 06, 2023 at 10:18:16AM +0100, Moritz Muehlenhoff wrote: > > > ... > > > We might consider to set some expectation for oldstable-security, > > >

Bug#1027163: python-git: CVE-2022-24439

2022-12-28 Thread Moritz Mühlenhoff
Source: python-git X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for python-git. CVE-2022-24439[0]: | All versions of package gitpython are vulnerable to Remote Code | Execution (RCE) due to improper user input validation,

Bug#1027153: ruby-rails-html-sanitizer: CVE-2022-23517 CVE-2022-23518 CVE-2022-23519 CVE-2022-23520

2022-12-28 Thread Moritz Mühlenhoff
Source: ruby-rails-html-sanitizer X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for ruby-rails-html-sanitizer. CVE-2022-23517[0]: | rails-html-sanitizer is responsible for sanitizing HTML fragments in | Rails applications.

Bug#1027143: openimageio: CVE-2022-43592 CVE-2022-43593 CVE-2022-43594 CVE-2022-43595 CVE-2022-43596 CVE-2022-43597 CVE-2022-43598 CVE-2022-43599 CVE-2022-43600 CVE-2022-43601 CVE-2022-43602 CVE-2022-

2022-12-28 Thread Moritz Mühlenhoff
Am Wed, Dec 28, 2022 at 05:31:34PM +0100 schrieb Moritz Mühlenhoff: > Source: openimageio > X-Debbugs-CC: t...@security.debian.org > Severity: grave > Tags: security > > Hi, > > The following vulnerabilities were published for openimageio. And two more

Bug#1027143: openimageio: CVE-2022-43592 CVE-2022-43593 CVE-2022-43594 CVE-2022-43595 CVE-2022-43596 CVE-2022-43597 CVE-2022-43598 CVE-2022-43599 CVE-2022-43600 CVE-2022-43601 CVE-2022-43602 CVE-2022-

2022-12-28 Thread Moritz Mühlenhoff
Source: openimageio X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for openimageio. CVE-2022-43592[0]: | An information disclosure vulnerability exists in the | DPXOutput::close() functionality of OpenImageIO Project

Bug#1023697: Keep out of testing

2022-12-20 Thread Moritz Mühlenhoff
Am Wed, Nov 16, 2022 at 03:27:53PM +0100 schrieb Jan Altenberg: > On Thu, 10 Nov 2022 22:45:57 +0100 Bastian Germann wrote: > > As a new maintainer has stepped up, this cannot be the reason anymore > > to dump the package. Actually, with the next version of swupdate (one > > of those handful) I

Bug#1026048: redmine: CVE-2022-44030 CVE-2022-44637 CVE-2022-44031

2022-12-13 Thread Moritz Mühlenhoff
Source: redmine X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for redmine. CVE-2022-44030[0]: | Redmine 5.x before 5.0.4 allows downloading of file attachments of any | Issue or any Wiki page due to insufficient permission

Bug#1025816: libde265: CVE-2022-43243 CVE-2022-43248 CVE-2022-43253

2022-12-09 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2022-43243[0]: | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow | vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in

Bug#1014966: onionshare: CVE-2021-41867 CVE-2021-41868 CVE-2022-21688 CVE-2022-21689 CVE-2022-21690 CVE-2022-21691 CVE-2022-21692 CVE-2022-21693 CVE-2022-21694 CVE-2022-21695 CVE-2022-21696

2022-11-27 Thread Moritz Mühlenhoff
Am Sun, Nov 27, 2022 at 11:45:27AM +0100 schrieb Clément Hermann: > Hi > > Le 25/10/2022 à 13:53, Clément Hermann a écrit : > > Hi Moritz, > > > > Le 25/10/2022 à 11:15, Moritz Muehlenhoff a écrit : > > > > > Given that the primary use case for onionshare will be tails, my > > > suggestion

Bug#1021278: pngcheck: CVE-2020-35511

2022-11-27 Thread Moritz Mühlenhoff
Am Thu, Oct 20, 2022 at 11:28:22PM -0300 schrieb David da Silva Polverari: > Hi, > > I adjusted the affected versions in the BTS, but I couldn't find any > patch for it. The reference to buffer overflows seem related to > CVE-2020-27818, so I wonder whether it is a duplicate or not. > > If it

Bug#1024021: netatalk: CVE-2022-45188

2022-11-13 Thread Moritz Mühlenhoff
Source: netatalk X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for netatalk. CVE-2022-45188[0]: | Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow | resulting in code execution via a crafted .appl file.

Bug#1024016: mysql-8.0: CVE-2022-39400 CVE-2022-39402 CVE-2022-39403 CVE-2022-39408 CVE-2022-39410 CVE-2022-21594 CVE-2022-21599 CVE-2022-21604 CVE-2022-21608 CVE-2022-21611 CVE-2022-21617 CVE-2022-21

2022-11-13 Thread Moritz Mühlenhoff
Source: mysql-8.0 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mysql-8.0. CVE-2022-39400[0]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer). Supported versions that are

Bug#937049: mini-buildd: Python2 removal in sid/bullseye

2022-10-27 Thread Moritz Mühlenhoff
Am Fri, Aug 30, 2019 at 07:26:40AM + schrieb Matthias Klose: > Package: src:mini-buildd > Version: 1.0.41 > Severity: normal > Tags: sid bullseye > User: debian-pyt...@lists.debian.org > Usertags: py2removal > > Python2 becomes end-of-live upstream, and Debian aims to remove > Python2 from

Bug#1022555: tiff: CVE-2022-3627 CVE-2022-3626 CVE-2022-3599 CVE-2022-3598 CVE-2022-3597 CVE-2022-3570

2022-10-23 Thread Moritz Mühlenhoff
Source: tiff X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for tiff. CVE-2022-3627[0]: | LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in | libtiff/tif_unix.c:346 when called from extractImageSection, |

Bug#1015860: libxalan2-java: CVE-2022-34169

2022-10-14 Thread Moritz Mühlenhoff
Am Thu, Oct 13, 2022 at 09:36:09PM +0200 schrieb Markus Koschany: > Hi, > > I just had a go at this issue and I discovered that libxalan2-java in Debian > is > not affected but rather bcel. > > https://tracker.debian.org/pkg/bcel > > The fixing commit in OpenJDK addresses the same code which

Bug#1021787: commons-text: CVE-2022-42889

2022-10-14 Thread Moritz Mühlenhoff
Source: commons-text X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for commons-text. CVE-2022-42889[0]: | Apache Commons Text performs variable interpolation, allowing | properties to be dynamically evaluated and expanded.

Bug#1021739: nekohtml: CVE-2022-24839

2022-10-13 Thread Moritz Mühlenhoff
Source: nekohtml X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for nekohtml. CVE-2022-24839[0]: | org.cyberneko.html is an html parser written in Java. The fork of | `org.cyberneko.html` used by Nokogiri (Rubygem) raises a |

Bug#1021737: lava: CVE-2022-42902

2022-10-13 Thread Moritz Mühlenhoff
Source: lava X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for lava. CVE-2022-42902[0]: | In Linaro Automated Validation Architecture (LAVA) before 2022.10, | there is dynamic code execution in lava_server/lavatable.py. Due

Bug#1021278: pngcheck: CVE-2020-35511

2022-10-04 Thread Moritz Mühlenhoff
Source: pngcheck X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for pngcheck. CVE-2020-35511[0]: | A global buffer overflow was discovered in pngcheck function in | pngcheck-2.4.0(5 patches applied) via a crafted png file.

Bug#1021276: snort: CVE-2020-3315 CVE-2021-1223 CVE-2021-1224 CVE-2021-1494 CVE-2021-1495 CVE-2021-34749 CVE-2021-40114

2022-10-04 Thread Moritz Mühlenhoff
Source: snort X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for snort. These all lack details, but all boil down to the fact Snort needs to be updated: CVE-2020-3315[0]: | Multiple Cisco products are affected by a

Bug#1021277: strongswan: CVE-2022-40617

2022-10-04 Thread Moritz Mühlenhoff
Source: strongswan X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for strongswan. CVE-2022-40617[0]: https://www.strongswan.org/blog/2022/10/03/strongswan-vulnerability-(cve-2022-40617).html Patch:

Bug#1021274: python-opcua: CVE-2022-25304

2022-10-04 Thread Moritz Mühlenhoff
Source: python-opcua X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for python-opcua. CVE-2022-25304[0]: | All versions of package opcua; all versions of package asyncua are | vulnerable to Denial of Service (DoS) due to a

Bug#1021273: nomad: CVE-2021-37218 CVE-2021-43415 CVE-2022-24683 CVE-2022-24684 CVE-2022-24685 CVE-2022-24686

2022-10-04 Thread Moritz Mühlenhoff
Source: nomad X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for nomad. CVE-2021-37218[0]: | HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server | agents with a valid certificate signed by the same CA to

Bug#1021270: libmodbus: CVE-2022-0367

2022-10-04 Thread Moritz Mühlenhoff
Source: libmodbus X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libmodbus. CVE-2022-0367[0]: | A heap-based buffer overflow flaw was found in libmodbus in function | modbus_reply() in src/modbus.c.

Bug#1021138: php8.1: CVE-2022-31628 CVE-2022-31629

2022-10-02 Thread Moritz Mühlenhoff
Source: php8.1 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for php8.1. CVE-2022-31628[0]: | In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar | uncompressor code would recursively uncompress "quines" gzip files,

Bug#1021139: barbican: CVE-2022-3100

2022-10-02 Thread Moritz Mühlenhoff
Source: barbican X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for barbican. CVE-2022-3100[0]: access policy bypass via query string injection Only reference so far is Red Hat Bugzilla:

Bug#1021136: sox: CVE-2022-39236 CVE-2022-39249 CVE-2022-39251

2022-10-02 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for sox. CVE-2022-39236[0]: | Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. | Starting with version 17.1.0-rc.1, improperly formed beacon

Bug#1021021: wolfssl: CVE-2022-38152 CVE-2022-38153 CVE-2022-39173

2022-09-30 Thread Moritz Mühlenhoff
Source: wolfssl X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for wolfssl. CVE-2022-38152[0]: | An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client | connects to a wolfSSL server and SSL_clear is called

Bug#1021013: mplayer: CVE-2022-38600 CVE-2022-38856 CVE-2022-38861 CVE-2022-38862 CVE-2022-38864

2022-09-30 Thread Moritz Mühlenhoff
Source: mplayer X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mplayer. CVE-2022-38600[0]: | Mplayer SVN-r38374-13.0.1 is vulnerable to Memory Leak via vf.c and | vf_vo.c.

Bug#1019600: swfmill: CVE-2022-36139 CVE-2022-36144

2022-09-12 Thread Moritz Mühlenhoff
Source: swfmill X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for swfmill. CVE-2022-36139[0]: | SWFMill commit 53d7690 was discovered to contain a heap-buffer | overflow via SWF::Writer::writeByte(unsigned char).

Bug#1019589: dpdk: CVE-2022-28199 CVE-2022-2132

2022-09-12 Thread Moritz Mühlenhoff
Source: dpdk X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities are fixed in DSA 5222, but filing a bug to track the fix in unstable: CVE-2022-28199[0]: | NVIDIA#8217;s distribution of the Data Plane Development Kit | (MLNX_DPDK) contains a

Bug#995838: [htcondor-debian] Bug#995838: Should condor be removed?

2022-09-09 Thread Moritz Mühlenhoff
severity 995838 normal reassign 995838 ftp.debian.org retitle 995838 RM: condor -- RoM; unmaintained, many RC bugs, toolchain issues (GCC9/Python2) thanks Am Mon, Apr 25, 2022 at 11:05:51PM +0200 schrieb Moritz Mühlenhoff: > Am Fri, Oct 29, 2021 at 01:36:27PM + schrieb Tim Theisen: &g

Bug#1016986: Should pd-py be removed?

2022-09-09 Thread Moritz Mühlenhoff
severity 1016986 normal reassign 1016986 ftp.debian.org retitle 1016986 RM: pd-py -- RoM; depends on Python 2 thanks > Your package came up as a candidate for removal from Debian: > - Still depends on Python 2, which is finally being removed in Bookworm > - Last upload in 2018 > > If you

Bug#1016667: Should this package be removed?

2022-09-09 Thread Moritz Mühlenhoff
severity 1016667 normal reassign 1016667 ftp.debian.org retitle 1016667 RM: caldav-tester -- RoM; depends on Python 2 thanks > Your package came up as a candidate for removal from Debian: > The plan is to remove Python 2 in Bookworm and there's no > porting activity towards Python 3. > > If you

Bug#1015981: Should grokmirror be removed?

2022-08-29 Thread Moritz Mühlenhoff
severity 1015981 normal reassign 1015981 ftp.debian.org retitle 1015981 RM: grokmirror -- RoM; Depends on Python 2, unmaintained thanks Am Sun, Jul 24, 2022 at 08:20:21PM +0200 schrieb Moritz Muehlenhoff: > Source: grokmirror > Version: 1.0.0-1.1 > Severity: serious > > Your package came up as a

Bug#1015980: Should pd-aubio be removed?

2022-08-29 Thread Moritz Mühlenhoff
severity 1015980 normal reassign 1015980 ftp.debian.org retitle 1015980 RM: pd-aubio -- RoM; Depends on Python 2, unmaintained thanks Am Sun, Jul 24, 2022 at 08:17:27PM +0200 schrieb Moritz Muehlenhoff: > Source: pd-aubio > Version: 0.4-1 > Severity: serious > > Your package came up as a

Bug#1015979: Should python-unshare be removed?

2022-08-24 Thread Moritz Mühlenhoff
severity 1015979 normal reassign 1015979 ftp.debian.org retitle 1015979 RM: python-unshare -- RoM; depends on Python 2 thanks Am Sun, Jul 24, 2022 at 08:15:51PM +0200 schrieb Moritz Muehlenhoff: > Source: python-unshare > Version: 0.2-1 > Severity: serious > > Your package came up as a candidate

Bug#1015977: Should vland be removed?

2022-08-24 Thread Moritz Mühlenhoff
severity 1015977 normal reassign 1015977 ftp.debian.org retitle 1015977 RM: vland -- RoM; depends on Python 2 thanks Am Sun, Jul 24, 2022 at 08:12:27PM +0200 schrieb Moritz Muehlenhoff: > Source: vland > Version: 0.8-1 > Severity: serious > > Your package came up as a candidate for removal from

Bug#1015973: Should xdeb be removed?

2022-08-24 Thread Moritz Mühlenhoff
severity 1015973 normal reassign 1015973 ftp.debian.org retitle 1015973 RM: xdeb -- RoM; depends on Python 2, unmaintained thanks Am Sun, Jul 24, 2022 at 07:59:33PM +0200 schrieb Moritz Muehlenhoff: > Source: xdeb > Version: 0.6.7 > Severity: serious > > Your package came up as a candidate for

Bug#1015975: Should python-neuroshare be removed?

2022-08-24 Thread Moritz Mühlenhoff
severity 1015975 normal reassign 1015975 ftp.debian.org retitle 1015975 RM: -- RoM; depends on Python 2, unmaintained, dead upstream thanks Am Sun, Jul 24, 2022 at 08:03:54PM +0200 schrieb Moritz Muehlenhoff: > Source: python-neuroshare > Version: 0.9.2-1 > Severity: serious > > Your package

Bug#1016982: rails: CVE-2022-27777

2022-08-10 Thread Moritz Mühlenhoff
Source: rails X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for rails. CVE-2022-2[0]: | A XSS Vulnerability in Action View tag helpers = 5.2.0 and | 5.2.0 which would allow an attacker to inject content if able to |

Bug#1016976: connman: CVE-2022-32292 CVE-2022-32293

2022-08-10 Thread Moritz Mühlenhoff
Source: connman X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for connman. CVE-2022-32292[0]: | In ConnMan through 1.41, remote attackers able to send HTTP requests | to the gweb component are able to exploit a heap-based

Bug#1016978: frr: CVE-2022-37035

2022-08-10 Thread Moritz Mühlenhoff
Source: frr X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for frr. CVE-2022-37035[0]: | An issue was discovered in bgpd in FRRouting (FRR) 8.3. In | bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, |

Bug#1016974: sofia-sip: CVE-2022-31001 CVE-2022-31002 CVE-2022-31003

2022-08-10 Thread Moritz Mühlenhoff
Source: sofia-sip X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for sofia-sip. CVE-2022-31001[0]: | Sofia-SIP is an open-source Session Initiation Protocol (SIP) User- | Agent library. Prior to version 1.13.8, an attacker

Bug#1016972: php8.1: CVE-2022-31627

2022-08-10 Thread Moritz Mühlenhoff
Source: php8.1 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for php8.1. It's specific to 8.1.x CVE-2022-31627[0]: | In PHP versions 8.1.x below 8.1.8, when fileinfo functions, such as | finfo_buffer, due to incorrect patch

Bug#1015978: Should falcon be removed?

2022-08-05 Thread Moritz Mühlenhoff
Am Fri, Aug 05, 2022 at 09:36:00AM +0200 schrieb Andreas Tille: > Hi Moritz, > > Am Fri, Jul 29, 2022 at 04:42:00PM +0200 schrieb Moritz Mühlenhoff: > > Am Sun, Jul 24, 2022 at 10:06:03PM +0200 schrieb Andreas Tille: > > > Unfortunately the package does not build[1]

Bug#1016448: undertow: CVE-2022-1319 CVE-2021-3629

2022-07-31 Thread Moritz Mühlenhoff
Source: undertow X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for undertow. CVE-2022-1319[0]: https://bugzilla.redhat.com/show_bug.cgi?id=2073890 CVE-2021-3629[1]: | A flaw was found in Undertow. A potential security

Bug#1016445: 389-ds-base: CVE-2022-0918

2022-07-31 Thread Moritz Mühlenhoff
Source: 389-ds-base X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for 389-ds-base. CVE-2022-0918[0]: | A vulnerability was discovered in the 389 Directory Server that allows | an unauthenticated attacker with network access

Bug#1016443: gpac: CVE-2022-29339 CVE-2022-29340 CVE-2022-29537 CVE-2022-30976 CVE-2022-1035 CVE-2022-1172 CVE-2022-1222 CVE-2022-1441 CVE-2022-1795

2022-07-31 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2022-29339[0]: | In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in | utils/bitstream.c has a failed assertion, which causes a Denial

Bug#990419: closed by Debian FTP Masters (reply to Jérôme Charaoui ) (Bug#990419: fixed in puppetdb 7.10.1-1)

2022-07-31 Thread Moritz Mühlenhoff
Am Sun, Jul 31, 2022 at 11:42:01AM +0200 schrieb Salvatore Bonaccorso: > Hi Jérôme, > > On Sat, Jul 16, 2022 at 12:42:05AM +, Debian Bug Tracking System wrote: > > puppetdb (7.10.1-1) experimental; urgency=medium > > . > >* New upstream version 7.10.1 (Closes: #990419, #1012577) > >

Bug#1016351: dovecot: CVE-2022-30550

2022-07-30 Thread Moritz Mühlenhoff
Am Fri, Jul 29, 2022 at 02:52:32PM -0700 schrieb Noah Meyerhans: > My inclination is that this won't need a DSA and can wait for a bullseye > point release, Agreed! Marking it as such in the Debian Security Tracker. Cheers, Moritz

Bug#1016351: dovecot: CVE-2022-30550

2022-07-29 Thread Moritz Mühlenhoff
Source: dovecot X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for dovecot. CVE-2022-30550[0]: | An issue was discovered in the auth component in Dovecot 2.2 and 2.3 | before 2.3.20. When two passdb configuration entries exist

Bug#1015978: Should falcon be removed?

2022-07-29 Thread Moritz Mühlenhoff
Am Sun, Jul 24, 2022 at 10:06:03PM +0200 schrieb Andreas Tille: > Unfortunately the package does not build[1] which is probably a gcc > issue. If someone would volunteer to fix this issue we might be able to > keep the package. If there is no response in say two weeks we should > probably remove

Bug#1016139: (net-snmp: CVE-2022-24810 CVE-2022-24809 CVE-2022-24808 CVE-2022-24807 CVE-2022-24806 CVE-2022-24805)

2022-07-29 Thread Moritz Mühlenhoff
Am Thu, Jul 28, 2022 at 09:25:44PM +1000 schrieb Craig Small: > I said: > > > I had uploaded net-snmp 5.9.3 anyway but I'll add those CVEs to the > > changelog. > > I'm trying to find where they've made the changes to see if it is possible > > to get at least bullseye fixed. > > > I've had a look

Bug#1016140: rails: CVE-2022-32224

2022-07-27 Thread Moritz Mühlenhoff
Source: rails X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for rails. CVE-2022-32224[0]: https://github.com/advisories/GHSA-3hhc-qp5v-9p2j If you fix the vulnerability please also make sure to include the CVE (Common

Bug#1016139: net-snmp: CVE-2022-24810 CVE-2022-24809 CVE-2022-24808 CVE-2022-24807 CVE-2022-24806 CVE-2022-24805

2022-07-27 Thread Moritz Mühlenhoff
Source: net-snmp X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for net-snmp. 5.9.3 fixes the following issues: - These two CVEs can be exploited by a user with read-only credentials: - CVE-2022-24805 A buffer overflow

Bug#1016089: mistune: CVE-2022-34749

2022-07-26 Thread Moritz Mühlenhoff
Source: mistune X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for mistune. CVE-2022-34749[0]: | In mistune through 2.0.2, support of inline markup is implemented by | using regular expressions that can involve a high amount

Bug#1015986: guacamole-client: CVE-2021-41767 CVE-2021-43999 CVE-2020-11997

2022-07-24 Thread Moritz Mühlenhoff
Source: guacamole-client X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for guacamole-client. CVE-2021-41767[0]: | Apache Guacamole 1.3.0 and older may incorrectly include a private | tunnel identifier in the non-private

Bug#1015983: undertow: CVE-2021-3859

2022-07-24 Thread Moritz Mühlenhoff
Source: undertow X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for undertow. CVE-2021-3859[0]: https://bugzilla.redhat.com/show_bug.cgi?id=2010378 If you fix the vulnerability please also make sure to include the CVE (Common

Bug#1009281: [Debichem-devel] Bug#1009281: Bug#1009281: Should cinfony be removed?

2022-07-24 Thread Moritz Mühlenhoff
Am Mon, Apr 11, 2022 at 09:21:25AM +0200 schrieb Michael Banck: > Hi, > > On Mon, Apr 11, 2022 at 08:38:21AM +0300, Andrius Merkys wrote: > > Hi, > > > > On 2022-04-11 01:35, Moritz Muehlenhoff wrote: > > > Source: cinfony > > > Version: 1.2-4 > > > Severity: serious > > > > > > Your package

Bug#1015874: php-dompdf: CVE-2022-2400

2022-07-22 Thread Moritz Mühlenhoff
Source: php-dompdf X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for php-dompdf. CVE-2022-2400[0]: | External Control of File Name or Path in GitHub repository | dompdf/dompdf prior to 2.0.0.

Bug#1015873: libtirpc: CVE-2021-46828

2022-07-22 Thread Moritz Mühlenhoff
Source: libtirpc X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libtirpc. CVE-2021-46828[0]: | In libtirpc before 1.3.3rc1, remote attackers could exhaust the file | descriptors of a process that uses libtirpc because idle

Bug#1015860: libxalan2-java: CVE-2022-34169

2022-07-22 Thread Moritz Mühlenhoff
Source: libxalan2-java X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libxalan2-java. CVE-2022-34169[0]: | The Apache Xalan Java XSLT library is vulnerable to an integer | truncation issue when processing malicious XSLT

Bug#1015789: mysql-8.0: CVE-2022-21569 CVE-2022-21556 CVE-2022-21553 CVE-2022-21550 CVE-2022-21547 CVE-2022-21539 CVE-2022-21538 CVE-2022-21537 CVE-2022-21535 CVE-2022-21534 CVE-2022-21531 CVE-2022-21

2022-07-21 Thread Moritz Mühlenhoff
Source: mysql-8.0 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mysql-8.0. All fixed in latest CPU: CVE-2022-21569[0]: | Vulnerability in the MySQL Server product of Oracle MySQL (component: | Server: Optimizer).

Bug#1015218: consul: CVE-2021-37219 CVE-2021-38698 CVE-2022-29153

2022-07-17 Thread Moritz Mühlenhoff
Source: consul X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for consul. CVE-2021-37219[0]: | HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows | non-server agents with a valid certificate signed by the

Bug#1014998: ring: CVE-2021-32686 CVE-2021-37706 CVE-2022-21723 CVE-2022-23608 CVE-2021-43299 CVE-2021-43300 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722 C

2022-07-15 Thread Moritz Mühlenhoff
Source: ring X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for ring. CVE-2021-32686[0]: | PJSIP is a free and open source multimedia communication library | written in C language implementing standard based protocols such

Bug#1014982: apache-jena: CVE-2021-33192 CVE-2021-39239 CVE-2022-28890

2022-07-15 Thread Moritz Mühlenhoff
Source: apache-jena X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for apache-jena. Unfortunately the Apache security process is quite poor and limited information gets made available, so it might be needed to reach out to

Bug#1014977: libde265: CVE-2022-1253 CVE-2021-36411 CVE-2021-36410 CVE-2021-36408 CVE-2021-35452

2022-07-15 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2022-1253[0]: | Heap-based Buffer Overflow in GitHub repository strukturag/libde265 | prior to and including 1.0.8. The fix is established in

Bug#1014976: asterisk: CVE-2022-24764 CVE-2022-24763 CVE-2022-24786 CVE-2022-24792 CVE-2022-24793

2022-07-15 Thread Moritz Mühlenhoff
Source: asterisk X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for asterisk. CVE-2022-24764[0]: | PJSIP is a free and open source multimedia communication library | written in C. Versions 2.12 and prior contain a stack

Bug#1014968: mruby: CVE-2021-46020 CVE-2022-0240 CVE-2022-0481 CVE-2022-0890 CVE-2022-1071 CVE-2022-1427 CVE-2022-1201

2022-07-15 Thread Moritz Mühlenhoff
Source: mruby X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mruby. CVE-2021-46020[0]: | An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can | lead to a segmentation fault or application crash.

Bug#1014966: onionshare: CVE-2021-41867 CVE-2021-41868 CVE-2022-21688 CVE-2022-21689 CVE-2022-21690 CVE-2022-21691 CVE-2022-21692 CVE-2022-21693 CVE-2022-21694 CVE-2022-21695 CVE-2022-21696

2022-07-15 Thread Moritz Mühlenhoff
Source: onionshare X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for onionshare. CVE-2021-41867[0]: | An information disclosure vulnerability in OnionShare 2.3 before 2.4 | allows remote unauthenticated attackers to

Bug#1014957: dogtag-pki: CVE-2022-2414

2022-07-15 Thread Moritz Mühlenhoff
Source: dogtag-pki X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for dogtag-pki. CVE-2022-2414[0]: https://bugzilla.redhat.com/show_bug.cgi?id=2104676 https://github.com/dogtagpki/pki/pull/4021

Bug#938351: marked as pending in renpy

2022-07-14 Thread Moritz Mühlenhoff
Am Sat, Dec 18, 2021 at 03:46:28PM +0100 schrieb Markus Koschany: > Renpy still has not been ported to Python 3 yet. The status of renpy and other > Python 2 games was previously discussed on debian-devel-games. > > https://lists.debian.org/debian-devel-games/2020/12/msg00013.html > > A removal

Bug#1014828: openexr: CVE-2021-3933 CVE-2021-3941 CVE-2021-45942

2022-07-12 Thread Moritz Mühlenhoff
Source: openexr X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for openexr. CVE-2021-3933[0]: | An integer overflow could occur when OpenEXR processes a crafted file | on systems where size_t 64 bits. This could cause an

Bug#1014807: ruby-jmespath: CVE-2022-32511

2022-07-12 Thread Moritz Mühlenhoff
Source: ruby-jmespath X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for ruby-jmespath. CVE-2022-32511[0]: | jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a | situation where JSON.parse is preferable.

Bug#1014803: ruby-yajl: CVE-2022-24795

2022-07-12 Thread Moritz Mühlenhoff
Source: ruby-yajl X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for ruby-yajl. CVE-2022-24795[0]: | yajl-ruby is a C binding to the YAJL JSON parsing and generation | library. The 1.x branch and the 2.x branch of `yajl`

Bug#1014785: dojo: CVE-2021-23450

2022-07-11 Thread Moritz Mühlenhoff
Source: dojo X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for dojo. CVE-2021-23450[0]: | All versions of package dojo are vulnerable to Prototype Pollution via | the setObject function.

Bug#1014780: ruby-kubeclient: CVE-2022-0759

2022-07-11 Thread Moritz Mühlenhoff
Source: ruby-kubeclient X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for ruby-kubeclient. CVE-2022-0759[0]: | A flaw was found in all versions of kubeclient up to (but not | including) v4.9.3, the Ruby client for Kubernetes

Bug#1014717: ruby-sinatra: CVE-2022-29970

2022-07-10 Thread Moritz Mühlenhoff
Source: ruby-sinatra X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for ruby-sinatra. CVE-2022-29970[0]: | Sinatra before 2.2.0 does not validate that the expanded path matches | public_dir when serving static files.

Bug#926276: Should guacamole-client be removed?

2022-07-10 Thread Moritz Mühlenhoff
Am Mon, Mar 08, 2021 at 09:05:22AM + schrieb Mike Gabriel: > Hi Salvatore, > > On Sa 06 Mär 2021 20:31:46 CET, Salvatore Bonaccorso wrote: > > > Hi, > > > > On Wed, Apr 03, 2019 at 12:27:25PM +, Mike Gabriel wrote: > > > Hi Moritz, > > > > > > On Di 02 Apr 2019 22:04:34 CEST, Moritz

Bug#1014539: squirrel3: CVE-2022-30292

2022-07-07 Thread Moritz Mühlenhoff
Source: squirrel3 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for squirrel3. CVE-2022-30292[0]: | Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to | lack of a certain sq_reservestack call.

Bug#1014534: dlt-daemon: CVE-2022-31291

2022-07-07 Thread Moritz Mühlenhoff
Source: dlt-daemon X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for dlt-daemon. CVE-2022-31291[0]: | An issue in dlt_config_file_parser.c of dlt-daemon v2.18.8 allows | attackers to cause a double free via crafted TCP

Bug#1014492: guzzle: CVE-2022-31090 CVE-2022-31091

2022-07-06 Thread Moritz Mühlenhoff
Source: guzzle X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for guzzle. CVE-2022-31090[0]: | Guzzle, an extensible PHP HTTP client. `Authorization` headers on | requests are sensitive information. In affected versions

Bug#1014478: radare2: CVE-2022-1714 CVE-2022-1809 CVE-2022-1899 CVE-2022-0849 CVE-2022-1052 CVE-2022-1061 CVE-2022-1207 CVE-2022-1237 CVE-2022-1238 CVE-2022-1240 CVE-2022-1244 CVE-2022-0476 CVE-2022-0

2022-07-06 Thread Moritz Mühlenhoff
Source: radare2 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for radare2. CVE-2022-1714[0]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.7.0. The bug causes the program reads data past

Bug#1014166: bitcoin: CVE-2021-31876

2022-07-01 Thread Moritz Mühlenhoff
Source: bitcoin X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for bitcoin. CVE-2021-31876[0]: | Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the | replacement policy specified in BIP125, which makes it

Bug#1014124: nomacs: CVE-2020-23884

2022-06-30 Thread Moritz Mühlenhoff
Source: nomacs X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for nomacs. CVE-2020-23884[0]: | A buffer overflow in Nomacs v3.15.0 allows attackers to cause a denial | of service (DoS) via a crafted MNG file.

Bug#1010355: Fwd: Bug#1010355: CVE-2022-0530: null pointer dereference on invalid UTF-8 input

2022-06-30 Thread Moritz Mühlenhoff
Am Thu, Jun 30, 2022 at 02:16:55PM +0200 schrieb Santiago Vila: > Dear Steven and Mark: > > I plan to apply the attached patches (from Enrico Zini) to fix CVE-2022-0529 > and CVE-2022-0530 in Debian unzip, but before doing so I would like to have > some feedback from upstream (i.e. you) or either

Bug#1013129: exo: CVE-2022-32278

2022-06-17 Thread Moritz Mühlenhoff
Source: exo X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for exo. CVE-2022-32278[0]: | XFCE 4.16 allows attackers to execute arbitrary code because xdg-open | can execute a .desktop file on an attacker-controlled FTP server.

Bug#1012513: apache2: CVE-2022-31813 CVE-2022-26377 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30522 CVE-2022-30556

2022-06-08 Thread Moritz Mühlenhoff
Source: apache2 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for apache2. CVE-2022-31813[0]: | Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* | headers to the origin server based on client side

Bug#1012512: libengine-gost-openssl1.1: CVE-2022-29242

2022-06-08 Thread Moritz Mühlenhoff
Source: libengine-gost-openssl1.1 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libengine-gost-openssl1.1. CVE-2022-29242[0]: | GOST engine is a reference implementation of the Russian GOST crypto | algorithms for

Bug#1009282: Should live-wrapper be removed?

2022-05-17 Thread Moritz Mühlenhoff
severity 1009282 normal reassign 1009282 ftp.debian.org retitle 1009282 RM: live-wrapper -- RoQA; Depends on Python 2, depends on removed package thanks Reassigning for removal. Cheers, Moritz

Bug#1009280: Should python-passfd be removed?

2022-05-17 Thread Moritz Mühlenhoff
severity 1009280 normal reassign 1009280 ftp.debian.org retitle 1009280 RM: python-passfd -- RoQA; Depends on Python 2, no reverse deps thanks Reassigning for removal. Cheers, Moritz

Bug#1009276: Should fsl be removed?

2022-05-17 Thread Moritz Mühlenhoff
severity 1009276 normal reassign 1009276 ftp.debian.org retitle 1009276 RM: fsl -- RoM; Depends on Python 2, FTBFS, unmaintained thanks Reassigning for removal.

Bug#1008792: Should vmtk be removed?

2022-05-05 Thread Moritz Mühlenhoff
severity 1008792 normal reassign 1008792 ftp.debian.org retitle 1008792 RM: vmtk -- RoM; Depends on Python 2, unmaintained thanks Reassigning for removal

Bug#1008704: Sould astk be removed?

2022-05-05 Thread Moritz Mühlenhoff
severity 1008704 normal reassign 1008704 ftp.debian.org retitle 1008704 RM: astk -- RoM; depends on Python 2, unmaintained thanks Reassigning for removal.

Bug#1008700: Should geda-gaf be removed?

2022-05-05 Thread Moritz Mühlenhoff
severity 1008700 normal reassign 1008700 ftp.debian.org retitle 1008700 RM: geda-gaf -- RoM; Depends on Python 2, replacement exists thanks Reassigning for removal.

Bug#1008703: Should sortsmill-tools be removed?

2022-05-05 Thread Moritz Mühlenhoff
severity 1008703 normal reassign 1008703 ftp.debian.org retitle 1008703 RM: sortsmill-tools -- RoM; Depends on Python 2, unmaintained thanks Reassigning for removal

Bug#1008499: Should neard be removed?

2022-04-29 Thread Moritz Mühlenhoff
severity 1008499 normal reassign 1008499 ftp.debian.org retitle 1008499 RM: neard -- RoQA; depends on Python 2, unmaintained thanks Reassigning for removal

<    1   2   3   4   5   6   7   8   9   10   >