Bug#985858: Fails to start with seccomp violation (eventfd2)

2021-03-26 Thread kpcyrd
hey, if you don't mind please go ahead. Thank you!

Bug#985858: Fails to start with seccomp violation (eventfd2)

2021-03-24 Thread kpcyrd
Package: sniffglue Version: 0.11.1-5+b1 Severity: grave I've noticed it's currently not possible to use sniffglue due to seccomp violations: # sniffglue -vv Bad system call (core dumped) # sniffglue uses a seccomp sandbox to allow-list a reduced set of syscalls to attempt to

Bug#985309: CVE-2021-21235

2021-03-16 Thread kpcyrd
hi, the package is likely too old to have this bug, but since this package is currently not used by anything and not meant to be used by any users, I'd recommend to remove it from testing (we're eventually going to close it by uploading the latest version to unstable). cheers

Bug#972802: [Pkg-rust-maintainers] Bug#972802: rust-webpki-roots: duplicates ca-certificates, remove from Debian?

2020-11-03 Thread kpcyrd
On Sat, Oct 24, 2020 at 11:50:14AM +0800, Paul Wise wrote: > > This is a very non-trivial downstream patch though, the project I'm > > trying to package runs in a sandbox and loading certificates from disk > > at runtime is not possible without redesigning some things. > > One option to solve

Bug#972802: rust-webpki-roots: duplicates ca-certificates, remove from Debian?

2020-10-23 Thread kpcyrd
On Sat, Oct 24, 2020 at 09:42:40AM +0800, Paul Wise wrote: > Source: rust-webpki-roots > Severity: serious > Tags: security > X-Debbugs-Cc: Debian Security Team , kpcyrd > > Usertags: embed > > rust-webpki-roots is essentially a duplicate of ca-certificates. > >

Bug#943868: [Pkg-rust-maintainers] Bug#943868: rust-chrono: issues in d/copyright

2019-10-31 Thread kpcyrd
On Wed, Oct 30, 2019 at 06:11:47PM -0700, Sean Whitton wrote: > There are some inaccuracies in d/copyright. I'm filing this bug at RC > severity because the MIT license requires all copyright claims to be > collated in d/copyright. > > (The package is dual-licensed under Apache-2.0, which the

Bug#942487: [Pkg-rust-maintainers] Bug#942487: Bug#942487: Bug#942487: rust-web-sys: Provides header is more than 256K long and it breaks reprepro...

2019-10-17 Thread kpcyrd
On Thu, Oct 17, 2019 at 09:40:59PM +0200, Raphael Hertzog wrote: > Look, I'm not a cargo/rust expert, I won't design the tool for you but I > implemented dpkg-gensymbols and the symbols support for dpkg-shlibdeps > and I'm pretty confident that such a solution can work for your case too. > > We

Bug#940983: [Pkg-rust-maintainers] Bug#940983: Bug#940983: rust-sha-1: rebuilding results in broken dependencies.

2019-09-26 Thread kpcyrd
On Thu, Sep 26, 2019 at 04:57:10PM +0100, peter green wrote: > apt-get build-dep rust-sha-1 > apt-get source rust-sha1-1 This one should be rust-sha-1 > dpkg-buildpackage -B > dcmd --deb dpkg -i  rust-sha-1_0.8.1-2_amd64.changes > > > Selecting previously unselected package

Bug#940983: [Pkg-rust-maintainers] Bug#940983: rust-sha-1: rebuilding results in broken dependencies.

2019-09-23 Thread kpcyrd
On Sun, Sep 22, 2019 at 11:07:57PM +0100, peter green wrote: > Package: rust-sha-1 > Version: 0.8.1-2 > Severity: serious > > If rust-sha-1 is re-built, the version mentioned in virtual package names in > the provides changes from "0.4" to "0.8", but the version mentioned in the > virtual

Bug#842939: WOT found guilty to sell user data

2016-11-02 Thread kpcyrd
"sess":wot_stats.getSession()['id'], "q":encodeURIComponent(url), //(kpcyrd): this is the current url "prev":encodeURIComponent(wot_stats.last_prev), //(kpcyrd): this is the previously seen url "link":0, "sub

Bug#833087: bruteforcable challenge responses in unprotected logfile

2016-07-31 Thread kpcyrd
Package: mongodb-server Version: 2.4.10-5 Severity: grave Tags: security There's a bugfix[1] from 2013 for an issue that wasn't announced for security that's currently not included in debian stable. [1]: https://jira.mongodb.org/browse/SERVER-9476 Current mongodb in stable logs authentication

Bug#832908: mongodb: CVE-2016-6494: world-readable .dbshell history file

2016-07-31 Thread kpcyrd
On Sat, Jul 30, 2016 at 05:53:10AM +, László Böszörményi (GCS) wrote: > While this is a real issue, I somewhat agree with upstream. Being a > system administrator for long time, I know as others should know: > - don't run sensitive services on a machine which can be accessed by > untrusted

Bug#832908: mongodb: CVE-2016-6494: world-readable .dbshell history file

2016-07-29 Thread kpcyrd
So, upstream just closed the issue I created with 'Works as Designed' blaming the default umask for the bug and that specifying file permissions for files created by mongodb is not something mongodb should do. https://jira.mongodb.org/browse/SERVER-25335#comment-1342085 The bug is locked, what

Bug#832908: world-readable .dbshell history file

2016-07-29 Thread kpcyrd
Package: mongodb-clients Version: 2.4.10-5 Severity: grave Tags: security During the report on redis-tools (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832460), lamby@ linked to a codesearch and the same bug was found in mongodb-clients. mongodb-clients stores its history in ~/.dbshell,

Bug#832460: World readable .rediscli_history

2016-07-25 Thread kpcyrd
> > Another bug report by @denisvm, this time on the linenoise library: > > https://github.com/antirez/linenoise/issues/121 > > Indeed this looks like it might affect some other packages in Debian: > > https://codesearch.debian.net/search?q=int+linenoiseHistorySave=1 > > Can you check these?

Bug#832460: World readable .rediscli_history

2016-07-25 Thread kpcyrd
> > I've contacted upstream on 2016-05-30 without any reaction at all and > > discovered this bug was first reported 3 years ago, still unfixed. > > @RedisLabs keeps referring to their paid support on twitter. > > Boo. Is there an upstream bug# for this or was this reported privately? My report:

Bug#832460: World readable .rediscli_history

2016-07-25 Thread kpcyrd
Package: redis-tools Version: 2.8.17-1+deb8u3 Severity: grave Tags: security redis-cli stores its history in ~/.rediscli_history, this file is created with permissions 0644. Home folders are world readable as well in debian, so any user can access other users redis history, including AUTH