Bug#1051563: mutt: CVE-2023-4874 CVE-2023-4875

2023-09-10 Thread Salvatore Bonaccorso
Hi Antonio, On Sun, Sep 10, 2023 at 01:05:31PM +0200, Antonio Radici wrote: > On Sat, Sep 09, 2023 at 10:23:32PM +0200, Salvatore Bonaccorso wrote: > > Source: mutt > > Version: 2.2.9-1 > > Severity: grave > > Tags: security upstream > > Justification: user se

Bug#1051592: linux: Regression - upgrade to 6.1.52-1 breaks nftables

2023-09-10 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi On Sun, Sep 10, 2023 at 10:38:45AM +0200, Timo Sigurdsson wrote: > Package: linux > Version: 6.1.52-1 > Severity: grave > > Dear Maintainers, > > linux-image-6.1.0-12-amd64 causes a serious regression in nftables. > After upgrading one of my machines, nftables

Bug#1051563: mutt: CVE-2023-4874 CVE-2023-4875

2023-09-09 Thread Salvatore Bonaccorso
Source: mutt Version: 2.2.9-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for mutt. CVE-2023-4874[0]: | Null pointer dereference when viewing a specially crafted

Bug#1051535: linux: HW_RANDOM_TPM disabled due to IMA=y

2023-09-09 Thread Salvatore Bonaccorso
Hi, Thanks for the report. On Sat, Sep 09, 2023 at 12:38:21PM +0100, Tj wrote: > Source: linux > Severity: normal > > Working with a Debian user in Matrix channel #Debian where they report > that the TPM hardware random number generator that was available in > v5.10* series is missing from

Bug#1051512: redis: CVE-2023-41053

2023-09-08 Thread Salvatore Bonaccorso
Source: redis Version: 5:7.0.12-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for redis. CVE-2023-41053[0]: | Redis is an in-memory database that persists on disk. Redis does not | correctly

Bug#1051511: lua-http: CVE-2023-4540

2023-09-08 Thread Salvatore Bonaccorso
Source: lua-http Version: 0.4-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for lua-http. CVE-2023-4540[0]: | Improper Handling of Exceptional Conditions vulnerability in | Daurnimator lua-http

Bug#1051504: salt: CVE-2023-20897 CVE-2023-20898

2023-09-08 Thread Salvatore Bonaccorso
Source: salt Version: 3004.1+dfsg-2.2 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for salt. CVE-2023-20897[0]: | Salt masters prior to 3005.2 or 3006.2 contain a

Bug#1051288: axis: CVE-2023-40743

2023-09-05 Thread Salvatore Bonaccorso
Source: axis Version: 1.4-28 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for axis. CVE-2023-40743[0]: | ** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in | an application, it

Bug#1043430: Accepted trafficserver 9.2.2+ds-1 (source) into unstable

2023-09-05 Thread Salvatore Bonaccorso
Source: trafficserver Source-Version: 9.2.2+ds-1 This fixes #1043430. On Tue, Sep 05, 2023 at 12:22:05PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Mon, 04 Sep 2023 16:38:33 +0200 > Source: trafficserver > Architecture: source >

Bug#1051249: linux: s390x: FTBFS: kernel-wedge install-files: missing modules mptfc, mptsas and mptspi

2023-09-04 Thread Salvatore Bonaccorso
Source: linux Version: 6.5~rc4-1~exp1 Severity: serious Tags: ftbfs Justification: FTBFS X-Debbugs-Cc: car...@debian.org linux/6.5~rc4-1~exp1 onwards in experimental FTBFS for s390x: https://buildd.debian.org/status/fetch.php?pkg=linux=s390x=6.5%7Erc4-1%7Eexp1=1691173177=0 Regards, Salvatore

Bug#1051231: timg: CVE-2023-40968

2023-09-04 Thread Salvatore Bonaccorso
Source: timg Version: 1.4.5-1 Severity: important Tags: security upstream Forwarded: https://github.com/hzeller/timg/issues/115 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for timg. CVE-2023-40968[0]: | Buffer Overflow vulnerability in

Bug#1051230: libxml2: CVE-2023-39615

2023-09-04 Thread Salvatore Bonaccorso
Source: libxml2 Version: 2.9.14+dfsg-1.3 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for libxml2. CVE-2023-39615[0]: | Xmlsoft

Bug#1051228: shiro: CVE-2023-34478

2023-09-04 Thread Salvatore Bonaccorso
Source: shiro Version: 1.3.2-5 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for shiro. CVE-2023-34478[0]: | Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to | a path traversal

Bug#1051088: nfs-common: Spurious additional words left behind in EXAMPLES section of nfs(5).

2023-09-04 Thread Salvatore Bonaccorso
Control: tags -1 + upstream On Sat, Sep 02, 2023 at 12:49:35PM +0100, James Youngman wrote: > Package: nfs-common > Version: 1:2.6.2-4 > Severity: minor > Tags: patch > > There is a spurious phrase "mount option" at the beginning of the > EXAMPLES section. > > This patch fixes it: Can you

Bug#1042517: Fixed in 6.4.13-1

2023-09-03 Thread Salvatore Bonaccorso
Source: linux Source-Version: 6.4.13-1 Hi On Sun, Sep 03, 2023 at 10:20:15PM +0800, Mad Horse wrote: > The fix > https://patchwork.freedesktop.org/patch/msgid/20230804084600.1005818-1-jani.nik...@intel.com > has been merged to upstream and backported to 6.4.13, so it is > available in

Bug#1050957: [ftpmas...@ftp-master.debian.org: Accepted borgbackup 1.2.6-2 (source) into unstable]

2023-09-02 Thread Salvatore Bonaccorso
Source: borgbackup Source-Version: (1.2.6-2 - Forwarded message from Debian FTP Masters - -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 01 Sep 2023 14:37:27 +0200 Source: borgbackup Built-For-Profiles: noudeb Architecture: source Version: 1.2.6-2 Distribution:

Bug#1043477: [ftpmas...@ftp-master.debian.org: Accepted php8.2 8.2.10-1 (source) into unstable]

2023-09-02 Thread Salvatore Bonaccorso
Source: php8.2 Source-Version: 8.2.10-1 This upload fixes as well #1043477, tracking bug for CVE-2023-3823 and CVE-2023-3824. - Forwarded message from Debian FTP Masters - -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 02 Sep 2023 08:31:05 +0200 Source: php8.2

Bug#1051101: rust-vm-memory: CVE-2023-41051

2023-09-02 Thread Salvatore Bonaccorso
Source: rust-vm-memory Version: 0.12.0-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for rust-vm-memory. CVE-2023-41051[0]: | In a typical Virtual Machine Monitor (VMM) there are several |

Bug#1051100: libtommath: CVE-2023-36328

2023-09-02 Thread Salvatore Bonaccorso
Source: libtommath Version: 1.2.0-6 Severity: important Tags: security upstream Forwarded: https://github.com/libtom/libtommath/pull/546 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for libtommath. CVE-2023-36328[0]: | Integer Overflow

Bug#1051062: shadow: CVE-2023-4641: gpasswd(1) password leak

2023-09-01 Thread Salvatore Bonaccorso
Source: shadow Version: 1:4.13+dfsg1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 1:4.8.1-1 Hi, The following vulnerability was published for shadow. CVE-2023-4641[0]: | gpasswd(1) password leak If you fix the

Bug#1051061: xrdp: CVE-2023-40184

2023-09-01 Thread Salvatore Bonaccorso
Source: xrdp Version: 0.9.21.1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for xrdp. CVE-2023-40184[0]: | xrdp is an open source remote desktop protocol (RDP) server. In | versions prior to

Bug#1051058: rails: CVE-2023-28362

2023-09-01 Thread Salvatore Bonaccorso
Source: rails Version: 2:6.1.7.3+dfsg-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for rails. CVE-2023-28362[0]: | Possible XSS via User Supplied Values to redirect_to If you fix the

Bug#1051057: rails: CVE-2023-38037

2023-09-01 Thread Salvatore Bonaccorso
Source: rails Version: 2:6.1.7.3+dfsg-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for rails. CVE-2023-38037[0]: Active Support Possibly Discloses Locally Encrypted Files If you fix the

Bug#1050970: open-vm-tools: CVE-2023-20900

2023-08-31 Thread Salvatore Bonaccorso
Source: open-vm-tools Version: 2:12.2.5-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for open-vm-tools. CVE-2023-20900[0]: | VMware Tools contains a SAML token signature bypass vulnerability. A

Bug#1050957: borgbackup: NEWS.Debian file not installed into /usr/share/doc/borgbackup

2023-08-31 Thread Salvatore Bonaccorso
Source: borgbackup Version: 1.2.5-4 Severity: normal X-Debbugs-Cc: car...@debian.org Hi Gianfranco Thanks for adding a note in NEWS.Debian file for the compact and CVE-2023-36811. Unfortunately the NEWS.Debian file is tough not installed by dh_installchangelogs because it searches by default

Bug#1050880: borgbackup: Mention required documentation for upgrading repositories for fixes for CVE-2023-36811

2023-08-30 Thread Salvatore Bonaccorso
Source: borgbackup Version: 1.2.5-1 Severity: normal X-Debbugs-Cc: car...@debian.org, t...@security.debian.org Control: clone -1 -2 Control: reassign -2 release-notes Hi borgbackup/1.2.5-1 contained a fix for CVE-2023-36811. But additionally to the package upgrades, users need to follow the

Bug#1050239: linux-image-6.1.0-11-amd64 breaks usermode networking for Windows VM in Gnome Boxes

2023-08-30 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo On Tue, Aug 22, 2023 at 03:45:08PM +0200, Stijn Segers wrote: > Package: linux-image-6.1.0-11-amd64 > Version: 6.1.38-4 > > Using kernel linux-image-6.1.0-11-amd64, my Windows 10 VM loses network > connectivity. Linux VMs still work (tested with an Xubuntu 23.04 and

Bug#1043598: ovn: CVE-2023-3153

2023-08-30 Thread Salvatore Bonaccorso
Hi, On Sun, Aug 13, 2023 at 02:12:34PM +0200, Salvatore Bonaccorso wrote: > Source: ovn > Version: 23.03.0-1 > Severity: important > Tags: security upstream > Forwarded: https://github.com/ovn-org/ovn/issues/198 > X-Debbugs-Cc: car...@debian.org, Debian Securit

Bug#1050740: python-pyramid: CVE-2023-40587

2023-08-28 Thread Salvatore Bonaccorso
Source: python-pyramid Version: 2.0+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for python-pyramid. CVE-2023-40587[0]: | Pyramid is an open source Python web framework. A path traversal |

Bug#1050739: nodejs: CVE-2023-32002 CVE-2023-32006 CVE-2023-32559

2023-08-28 Thread Salvatore Bonaccorso
Source: nodejs Version: 18.13.0+dfsg1-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for nodejs. CVE-2023-32002[0]: | The use of `Module._load()` can bypass the

Bug#1041810: librsvg: CVE-2023-38633

2023-08-27 Thread Salvatore Bonaccorso
Hi Simon, On Sat, Aug 19, 2023 at 06:57:30PM +0200, Salvatore Bonaccorso wrote: > Hi Simon, > > On Sun, Jul 30, 2023 at 09:48:57PM +0100, Simon McVittie wrote: > > On Sun, 30 Jul 2023 at 22:04:24 +0200, Salvatore Bonaccorso wrote: > > > For bullseye I think we should

Bug#1050558: Accepted prometheus-alertmanager 0.26.0+ds-1 (source) into unstable

2023-08-27 Thread Salvatore Bonaccorso
Source: prometheus-alertmanager Source-Version: 0.26.0+ds-1 On Sat, Aug 26, 2023 at 04:06:58PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Sat, 26 Aug 2023 15:50:44 + > Source: prometheus-alertmanager > Architecture: source >

Bug#1043585: AMD64 Kernel update prevents an emulated TPM working correctly inside Windows 11 KVM guest OS

2023-08-27 Thread Salvatore Bonaccorso
Hi Martin, On Sun, Aug 13, 2023 at 11:27:57AM +0100, Martin Johnson wrote: > Package: linux-image > > Version: 6.1.0-11-amd64 > > When latest Debian kernel is installed it is causing a problem with KVM > virtual machine and the current version of QEMU on Bookworm. This is when > swtpm is used

Bug#1050643: cairosvg: Embedded images using data URIs no longer work without unsafe flag (after original fix for CVE-2023-27586)

2023-08-27 Thread Salvatore Bonaccorso
Source: cairosvg Version: 2.5.2-1.1 Severity: important Tags: upstream fixed-upstream Forwarded: https://github.com/Kozea/CairoSVG/issues/383 X-Debbugs-Cc: Joe Burmeister , car...@debian.org Control: done -1 2.7.1-1 Control: found -1 2.5.0-1.1+deb11u1 Control: affects +

Bug#1050560: gerbv: CVE-2023-4508

2023-08-26 Thread Salvatore Bonaccorso
Source: gerbv Version: 2.9.8-1 Severity: important Tags: security upstream Forwarded: https://github.com/gerbv/gerbv/issues/191 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for gerbv. CVE-2023-4508[0]: | A user able to control file input

Bug#1050558: prometheus-alertmanager: CVE-2023-40577

2023-08-26 Thread Salvatore Bonaccorso
Source: prometheus-alertmanager Version: 0.25.0+ds-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for prometheus-alertmanager. CVE-2023-40577[0]: | Alertmanager handles alerts sent by client

Bug#1042753: nouveau bug in linux/6.1.38-2

2023-08-24 Thread Salvatore Bonaccorso
Control: tags -1 + fixed-upstream On Sat, Aug 05, 2023 at 12:40:24PM +0200, Diederik de Haas wrote: > Control: forwarded -1 > https://lore.kernel.org/dri-devel/20be6650-5db3-b72a-a7a8-5e817113c...@kravcenko.com/ > > https://lore.kernel.org/dri-devel/20230805101813.2603989-1-kher...@redhat.com/

Bug#1049885: overlayfs: cannot rename symlink if lower filesystem is NFS

2023-08-24 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi Guido, On Wed, Aug 16, 2023 at 03:34:45PM +0200, Guido Berhoerster wrote: > Package: linux-image-6.1.0-10-amd64 > Version: 6.1.38-2 > > rename(2) on a symlink on an overlayfs where the lower filesystem is NFS > fails with ENXIO. > > It can be reproduced as

Bug#1050299: rust-webpki: RUSTSEC-2023-0052

2023-08-22 Thread Salvatore Bonaccorso
Source: rust-webpki Version: 0.22.0-2 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi Please see https://rustsec.org/advisories/RUSTSEC-2023-0052.html . FWIW, there is a fix in the rustls-webpki is a fork, which

Bug#1050298: rust-rustls-webpki: RUSTSEC-2023-0053

2023-08-22 Thread Salvatore Bonaccorso
Source: rust-rustls-webpki Version: 0.101.3-2 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi Please see https://rustsec.org/advisories/RUSTSEC-2023-0053.html . Regards, Salvatore

Bug#1050142: qemu: CVE-2023-4135

2023-08-20 Thread Salvatore Bonaccorso
Source: qemu Version: 1:8.0.4+dfsg-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for qemu. CVE-2023-4135[0]: | A heap out-of-bounds memory read flaw was found in the virtual nvme | device in

Bug#1050140: qemu: CVE-2023-40360

2023-08-20 Thread Salvatore Bonaccorso
Source: qemu Version: 1:8.0.4+dfsg-1 Severity: important Tags: security upstream Forwarded: https://gitlab.com/qemu-project/qemu/-/issues/1815 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for qemu. CVE-2023-40360[0]: | QEMU through 8.0.4

Bug#1050095: faad2: CVE-2023-38858

2023-08-19 Thread Salvatore Bonaccorso
Source: faad2 Version: 2.10.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/knik0/faad2/issues/173 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for faad2. CVE-2023-38858[0]: | Buffer Overflow vulnerability

Bug#1050094: faad2: CVE-2023-38857

2023-08-19 Thread Salvatore Bonaccorso
Source: faad2 Version: 2.10.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/knik0/faad2/issues/171 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for faad2. CVE-2023-38857[0]: | Buffer Overflow vulnerability

Bug#1041810: librsvg: CVE-2023-38633

2023-08-19 Thread Salvatore Bonaccorso
Hi Simon, On Sun, Jul 30, 2023 at 09:48:57PM +0100, Simon McVittie wrote: > On Sun, 30 Jul 2023 at 22:04:24 +0200, Salvatore Bonaccorso wrote: > > For bullseye I think we should simply pick the upstream commit? > > Yes: we didn't keep up with upstream 2.50.x so there are a bunch

Bug#1050080: unrar: Fix CVE-2022-48579 for Debian 11

2023-08-19 Thread Salvatore Bonaccorso
Hi, On Sat, Aug 19, 2023 at 10:04:40PM +0900, YOKOTA Hiroshi wrote: > Package: unrar > Version: 1:6.0.3-1+deb11u1 > Severity: normal > X-Debbugs-Cc: yokota.h...@gmail.com, a...@debian.org, t...@security.debian.org > > > CVE-2022-48579 was fixed at unrar-nonfree/1:5.6.6-1+deb10u2 in Debian 10 >

Bug#1050079: puma: CVE-2023-40175: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

2023-08-19 Thread Salvatore Bonaccorso
Source: puma Version: 5.6.5-4 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 6.0.2-1 Hi, The following vulnerability was published for puma. CVE-2023-40175[0]: | Puma is a Ruby/Rack web server built for parallelism. Prior to

Bug#1049366: indent: CVE-2023-40305

2023-08-19 Thread Salvatore Bonaccorso
Hi Santiago, On Sat, Aug 19, 2023 at 02:23:03PM +0200, Santiago Vila wrote: > Thanks for the report. > > I'm going to apply the two patches which Petr Písař > has recently posted in Savannah. Thanks! > After that: Should I prepare packages for security > (stable and oldstable) for you to

Bug#1043058: libesmtp: diff for NMU version 1.1.0-3.1

2023-08-19 Thread Salvatore Bonaccorso
and Breaks against +libesmtp5 (<< 1.0.6-1~) (Closes: #1043058) + + -- Salvatore Bonaccorso Sat, 19 Aug 2023 12:04:32 +0200 + libesmtp (1.1.0-3) unstable; urgency=medium * debian: Clean up build environment diff -Nru libesmtp-1.1.0/debian/control libesmtp-1.1.0/debian/c

Bug#1043058: libesmtp6: missing Breaks: libesmtp5

2023-08-18 Thread Salvatore Bonaccorso
Hi Disclaimer, not the maintainer here, but maintainer of a package which would get autoremoved. On Sat, Aug 05, 2023 at 02:17:53PM +0200, Andreas Beckmann wrote: > Package: libesmtp6 > Version: 1.1.0-3 > Severity: serious > User: debian...@lists.debian.org > Usertags: piuparts

Bug#1050057: clamav: CVE-2023-20197 CVE-2023-20212

2023-08-18 Thread Salvatore Bonaccorso
Source: clamav Version: 1.0.1+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 0.103.8+dfsg-0+deb11u1 Hi, The following vulnerabilities were published for clamav. CVE-2023-20197[0]: | A vulnerability in the filesystem

Bug#1043585: Update on this issue

2023-08-17 Thread Salvatore Bonaccorso
Hi Martin, On Thu, Aug 17, 2023 at 05:10:44PM +0100, Martin Johnson wrote: > Hi Salvadore, > > Thanks for getting in contact regarding this issue, > > Yes I did mean to reference the two bugzilla entries, since it seems to be > the same patch that's causing issues with the emulated TPM, at

Bug#1043585: Update on this issue

2023-08-17 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo upstream Hi Martin, On Wed, Aug 16, 2023 at 07:16:58PM +0100, Martin Johnson wrote: > Package: linux-image-amd64 > > Version: 6.1.0-11-amd64 > > Update of this recent issue - I might not have specified the package > correctly, sorry for that - its the first bug I

Bug#1049365: inetutils: CVE-2023-40303

2023-08-16 Thread Salvatore Bonaccorso
Hi Guillem, Nice to read from you. On Thu, Aug 17, 2023 at 01:19:34AM +0200, Guillem Jover wrote: > Hi! > > On Mon, 2023-08-14 at 20:42:10 +0200, Salvatore Bonaccorso wrote: > > Source: inetutils > > Version: 2:2.4-2 > > Severity: important > > Tags: securi

Bug#1049436: Accepted efibootguard 0.15-1 (source) into unstable

2023-08-16 Thread Salvatore Bonaccorso
Source: efibootguard Source-Version: 0.15-1 On Wed, Aug 16, 2023 at 10:20:07AM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Mon, 14 Aug 2023 16:59:53 +0200 > Source: efibootguard > Architecture: source > Version: 0.15-1 >

Bug#1043501: Accepted gst-plugins-ugly1.0 1.22.5-1 (source) into unstable

2023-08-15 Thread Salvatore Bonaccorso
Source: gst-plugins-ugly1.0 Source-Version: 1.22.5-1 On Tue, Aug 15, 2023 at 03:06:19PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Tue, 15 Aug 2023 10:46:22 -0400 > Source: gst-plugins-ugly1.0 > Built-For-Profiles: noudeb >

Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel

2023-08-15 Thread Salvatore Bonaccorso
Hi Adam, On Tue, Aug 15, 2023 at 10:48:35PM +0200, Salvatore Bonaccorso wrote: > Control: tags -1 + upstream > > Hi Adam, > > On Tue, Aug 15, 2023 at 10:06:16PM +0200, Salvatore Bonaccorso wrote: > > Hi Adam, > > > > On Tue, Aug 15, 2023 at 09:37:36PM

Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel

2023-08-15 Thread Salvatore Bonaccorso
Control: tags -1 + upstream Hi Adam, On Tue, Aug 15, 2023 at 10:06:16PM +0200, Salvatore Bonaccorso wrote: > Hi Adam, > > On Tue, Aug 15, 2023 at 09:37:36PM +0200, Salvatore Bonaccorso wrote: > > Control: tags -1 + confirmed > > > > Hi Adam, > > > > O

Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel

2023-08-15 Thread Salvatore Bonaccorso
Hi Adam, On Tue, Aug 15, 2023 at 09:37:36PM +0200, Salvatore Bonaccorso wrote: > Control: tags -1 + confirmed > > Hi Adam, > > On Tue, Aug 15, 2023 at 06:26:59PM +0100, Adam D. Barratt wrote: > > On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > > > Sinc

Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel

2023-08-15 Thread Salvatore Bonaccorso
Control: tags -1 + confirmed Hi Adam, On Tue, Aug 15, 2023 at 06:26:59PM +0100, Adam D. Barratt wrote: > On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > > Since the kernels on both the host and guests were upgraded to > > 5.10.179-5 (from 5.10.179-3), the guests on one of our Ganeti

Bug#1049436: efibootguard: CVE-2023-39950

2023-08-15 Thread Salvatore Bonaccorso
Source: efibootguard Version: 0.13-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for efibootguard. CVE-2023-39950[0]: | efibootguard is a simple UEFI boot loader with support for safely |

Bug#1042517:

2023-08-15 Thread Salvatore Bonaccorso
Control: tags -1 - moreinfo Hi, On Mon, Aug 14, 2023 at 09:18:02AM +0800, Mad Horse wrote: > > Control: tags -1 + moreinfo > > > > Hi > > > > On Wed, Aug 09, 2023 at 11:26:01AM +0800, Mad Horse wrote: > >> The bug has been reported to upstream ( > >>

Bug#1049366: indent: CVE-2023-40305

2023-08-14 Thread Salvatore Bonaccorso
Source: indent Version: 2.2.13-2 Severity: important Tags: security upstream Forwarded: https://savannah.gnu.org/bugs/index.php?64503 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 2.2.12-4+deb12u1 Control: found -1 2.2.12-1 Hi, The following vulnerability was published

Bug#1049365: inetutils: CVE-2023-40303

2023-08-14 Thread Salvatore Bonaccorso
Source: inetutils Version: 2:2.4-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for inetutils. CVE-2023-40303[0]: | GNU inetutils through 2.4 may allow privilege escalation because of | unchecked

Bug#1043139: linux-image-6.3.0-2-amd64: tg3 backtraces in net/core/skbuff.c:376 __build_skb_around with "Use slab_build_skb() instead"

2023-08-13 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi, On Sun, Aug 06, 2023 at 05:08:08PM +0200, наб wrote: > Package: src:linux > Version: 6.3.11-1 > Severity: normal > > Dear Maintainer, > > On boot I get: > -- >8 -- > Aug 06 14:49:47 szarotka kernel: [ cut here ] > Aug 06 14:49:47 szarotka

Bug#1042517:

2023-08-13 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi On Wed, Aug 09, 2023 at 11:26:01AM +0800, Mad Horse wrote: > The bug has been reported to upstream ( > https://gitlab.freedesktop.org/drm/intel/-/issues/8991 ), and a fix > is available there, though it may need backport. Were you able to confirm that the upstream

Bug#1043598: ovn: CVE-2023-3153

2023-08-13 Thread Salvatore Bonaccorso
Source: ovn Version: 23.03.0-1 Severity: important Tags: security upstream Forwarded: https://github.com/ovn-org/ovn/issues/198 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for ovn. CVE-2023-3153[0]: | service monitor MAC flow is not rate

Bug#1029435: The describes bug is fixed

2023-08-12 Thread Salvatore Bonaccorso
Source: linux Source-Version: 6.3.11-1 Hi, On Fri, Aug 11, 2023 at 03:11:31PM +0200, Jan Ries wrote: > Dear Maintainers, > > the aformentioned bug is fixed as of linux-image-amd64 6.1.38-1. > > Thanks a lot! Can you confirm that this is as well fixed in 6.3.11-1 or later? I'm already

Bug#1043564: linux: Please Re-enable DC states for drm/i915

2023-08-12 Thread Salvatore Bonaccorso
Control: tags -1 + confirmed upstream fixed-upstream pending Hi, On Sat, Aug 12, 2023 at 10:40:09PM -0400, Jesse Rhodes wrote: > Source: linux > Severity: important > Tags: patch > X-Debbugs-Cc: je...@sney.ca > > Dear debian kernel team, > > The upstream commit "drm/i915: Disable DC states for

Bug#1043553: cargo: CVE-2023-38497

2023-08-12 Thread Salvatore Bonaccorso
Source: cargo Version: 0.66.0+ds1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: clone -1 -2 Control: reassign -2 src:rust-cargo 0.66.0-4 Control: retitle -2 rust-cargo: CVE-2023-38497 Hi, The following vulnerability was published

Bug#1043548: fastdds: CVE-2023-39945 CVE-2023-39946 CVE-2023-39947

2023-08-12 Thread Salvatore Bonaccorso
Source: fastdds Version: 2.10.1+ds-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for fastdds. CVE-2023-39945[0]: | eprosima Fast DDS is a C++ implementation of the Data Distribution | Service

Bug#1043528: RM: tuxcmd -- RoQA; depends on gtk2; orphaned; alternative exists

2023-08-12 Thread Salvatore Bonaccorso
Hi, On Sat, Aug 12, 2023 at 03:19:05PM +0200, Bastian Germann wrote: > Package: ftp.debian.org > Severity: normal > User: ftp.debian@packages.debian.org > Usertags: remove > Control: affects -1 + src:tuxcmd > > Please remove tuxcmd. It is unmaintained upstream (last release in 2009) and >

Bug#1043503: python-git: CVE-2023-40267

2023-08-11 Thread Salvatore Bonaccorso
Source: python-git Version: 3.1.30-1 Severity: important Tags: security upstream Forwarded: https://github.com/gitpython-developers/GitPython/pull/1609 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for python-git. CVE-2023-40267[0]: |

Bug#1043502: haproxy: CVE-2023-40225

2023-08-11 Thread Salvatore Bonaccorso
Source: haproxy Version: 2.6.14-1 Severity: important Tags: security upstream Forwarded: https://github.com/haproxy/haproxy/issues/2237 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for haproxy. CVE-2023-40225[0]: | HAProxy through 2.0.32,

Bug#1043501: gst-plugins-ugly1.0: ZDI-CAN-21443 ZDI-CAN-21444

2023-08-11 Thread Salvatore Bonaccorso
Source: gst-plugins-ugly1.0 Version: 1.22.4-1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team There are two gst-streamer-ugly1.0 reports from ZDI (not yet public) tracked as https://gstreamer.freedesktop.org/security/sa-2023-0004.html

Bug#1043477: php8.2: CVE-2023-3823 CVE-2023-3824

2023-08-11 Thread Salvatore Bonaccorso
Source: php8.2 Version: 8.2.7-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 8.2.7-1~deb12u1 Hi, The following vulnerabilities were published for php8.2. CVE-2023-3823[0]: | In PHP versions

Bug#1043438: linux-headers-amd64: Package dependecy is currently broken

2023-08-10 Thread Salvatore Bonaccorso
On Fri, Aug 11, 2023 at 12:33:54AM -0500, Caleb McKay wrote: > Package: linux-headers-amd64 > Version: 6.1.38-3 > Severity: important > X-Debbugs-Cc: ca...@candj.us > > Dear Maintainer, > > *** Reporter, please consider answering these questions, where appropriate *** > >* What led up to

Bug#1043437: linux: report microcode upgrade *from* version as well

2023-08-10 Thread Salvatore Bonaccorso
Source: linux Source-Version: 6.3.1-1~exp1 Hi Thorsten, On Fri, Aug 11, 2023 at 07:23:57AM +0200, Thorsten Glaser wrote: > Package: src:linux > Version: 5.10.179-3 > Severity: wishlist > Tags: upstream > X-Debbugs-Cc: t...@mirbsd.de > > I have this in dmesg: > > [0.00] microcode:

Bug#1043432: ruby-protocol-http1: CVE-2023-38697

2023-08-10 Thread Salvatore Bonaccorso
Source: ruby-protocol-http1 Version: 0.14.6-1 Severity: important Tags: security upstream Forwarded: https://github.com/socketry/protocol-http1/pull/20 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for ruby-protocol-http1.

Bug#1043431: krb5: CVE-2023-36054

2023-08-10 Thread Salvatore Bonaccorso
Source: krb5 Version: 1.20.1-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for krb5. CVE-2023-36054[0]: | lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 | and 1.21.x before

Bug#1043430: trafficserver: CVE-2022-47185 CVE-2023-33934

2023-08-10 Thread Salvatore Bonaccorso
Source: trafficserver Version: 9.2.1+ds-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 9.2.0+ds-2+deb12u1 Control: found -1 8.1.7+ds-1~deb11u1 Control: found -1 8.1.6+ds-1 Hi, The following vulnerabilities were published for

Bug#1043381: amd64-microcode: Followups for 4th Gen AMD EPYC processors for CVE-2023-20569 / AMD Inception

2023-08-09 Thread Salvatore Bonaccorso
Source: amd64-microcode Version: 3.20230719.1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 3.20230414.1 Control: found -1 3.20230719.1~deb12u1 Control: found -1 3.20191218.1 Control: found -1 3.20230719.1~deb11u1 Hi Henrique,

Bug#1043305: intel-microcode: CVE-2022-40982 CVE-2022-41804 CVE-2023-23908

2023-08-08 Thread Salvatore Bonaccorso
Source: intel-microcode Version: 3.20230512.1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 3.20220510.1~deb11u1 Control: found -1 3.20230214.1~deb11u1 Hi, The following vulnerabilities were published for intel-microcode.

Bug#1043270: bullseye-pu: package autofs/5.1.7-1+deb11u2

2023-08-08 Thread Salvatore Bonaccorso
.1.7/debian/changelog 2023-08-08 10:31:29.0 +0200 @@ -1,3 +1,10 @@ +autofs (5.1.7-1+deb11u2) bullseye; urgency=medium + + * use correct reference for IN6 macro call + * dont probe interface that cant send packet (Closes: #1041051) + + -- Salvatore Bonaccorso Tue, 08 Aug 2023 10:

Bug#1043269: bookworm-pu: package autofs/5.1.8-2+deb12u2

2023-08-08 Thread Salvatore Bonaccorso
that cant send packet (Closes: #1041051) + + -- Salvatore Bonaccorso Tue, 08 Aug 2023 10:27:23 +0200 + autofs (5.1.8-2+deb12u1) bookworm; urgency=medium * debian/patches: diff -Nru autofs-5.1.8/debian/patches/dont-probe-interface-that-cant-send-pac.patch autofs-5.1.8/debian/patches

Bug#1043163: golang-golang-x-net: CVE-2023-3978

2023-08-06 Thread Salvatore Bonaccorso
Source: golang-golang-x-net Version: 1:0.10.0-1 Severity: important Tags: security upstream Forwarded: https://go.dev/issue/61615 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for golang-golang-x-net. CVE-2023-3978[0]: | Text nodes not in

Bug#1043162: matrix-sydent: CVE-2023-38686

2023-08-06 Thread Salvatore Bonaccorso
Source: matrix-sydent Version: 2.5.1-1.1 Severity: important Tags: security upstream Forwarded: https://github.com/matrix-org/sydent/pull/574 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for matrix-sydent. CVE-2023-38686[0]: | Sydent is an

Bug#1043161: i2p: CVE-2023-36325

2023-08-06 Thread Salvatore Bonaccorso
Source: i2p Version: 0.9.48-1.1 Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for i2p. CVE-2023-36325[0]: | Attackers can de-anonymize i2p hidden services with a message replay |

Bug#1043159: golang-golang-x-image: CVE-2023-29407 CVE-2023-29408

2023-08-06 Thread Salvatore Bonaccorso
Source: golang-golang-x-image Version: 0.7.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for golang-golang-x-image. CVE-2023-29407[0]: | A maliciously-crafted image can cause excessive CPU

Bug#1043078: linux-image-6.3.0-2-amd64: kernel NULL pointer dereference with MD write-back journal

2023-08-06 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo On Sat, Aug 05, 2023 at 12:45:18PM -0700, Corey Hickey wrote: > Package: src:linux > Version: 6.3.11-1 > Severity: normal > > Dear Maintainer, > > I was testing RAID-5 write-back journal (AKA cache) for the first time. > >

Bug#1043033: ghostscript: CVE-2023-38559

2023-08-04 Thread Salvatore Bonaccorso
Source: ghostscript Version: 10.01.2~dfsg-1 Severity: important Tags: security upstream Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=706897 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 10.0.0~dfsg-11+deb12u1 Control: found -1 10.0.0~dfsg-11 Control: found -1

Bug#1043004: mozillavpn: CVE-2023-4104

2023-08-03 Thread Salvatore Bonaccorso
Source: mozillavpn Version: 2.9.0-1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for mozillavpn. CVE-2023-4104[0]: | Privileged vpndaemon on Linux wrongly and incompletely implements | Polkit

Bug#1025489: Accepted rxvt-unicode 9.31-1 (source) into unstable

2023-08-03 Thread Salvatore Bonaccorso
Source: rxvt-unicode Source-Version: 9.31-1 On Thu, Aug 03, 2023 at 02:42:53PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Thu, 03 Aug 2023 10:05:54 -0400 > Source: rxvt-unicode > Architecture: source > Version: 9.31-1 >

Bug#1035026: singularity-container: CVE-2023-30549

2023-08-01 Thread Salvatore Bonaccorso
Hi Nilesh, On Tue, Aug 01, 2023 at 09:33:16PM +0530, Nilesh Patra wrote: > On Tue, Aug 01, 2023 at 05:10:10PM +0200, Salvatore Bonaccorso wrote: > > On Tue, Aug 01, 2023 at 07:57:22PM +0530, Nilesh Patra wrote: > > > I asked this upstream[1] and upstream thinks tha

Bug#1035026: singularity-container: CVE-2023-30549

2023-08-01 Thread Salvatore Bonaccorso
Hi On Tue, Aug 01, 2023 at 07:57:22PM +0530, Nilesh Patra wrote: > Hi Salvatore, > > On Thu, 27 Apr 2023 22:06:36 +0200 Salvatore Bonaccorso > wrote: > > Source: singularity-container > > Version: 3.11.0+ds1-1 > > Severity: important > > Tags: security upst

Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi, On Tue, Aug 01, 2023 at 07:22:17PM +1000, AP wrote: > Package: linux-image-6.1.0-10-amd64 > Severity: important > Tags: patch > > Dear Maintainer, > > Current kernel failed to load modules for MASQUERADE nat rules giving the > following > in dmesg: > >

Bug#1042811: poppler: CVE-2023-34872: crash in pdftohtml

2023-08-01 Thread Salvatore Bonaccorso
Source: poppler Version: 22.12.0-2 Severity: important Tags: security upstream Forwarded: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for poppler. CVE-2023-34872[0]: | A

Bug#1041810: librsvg: CVE-2023-38633

2023-07-30 Thread Salvatore Bonaccorso
Hi Simon, On Sun, Jul 30, 2023 at 04:07:50PM +0100, Simon McVittie wrote: > On Sun, 23 Jul 2023 at 21:13:38 +0200, Salvatore Bonaccorso wrote: > > The following vulnerability was published for librsvg. > > > > CVE-2023-38633[0]: > > | A directory traversal problem in

Bug#1042550: spectre-meltdown-checker: Update to 0.46 upstream to support Zenbleed detection

2023-07-30 Thread Salvatore Bonaccorso
Source: spectre-meltdown-checker Version: 0.45-2 Severity: wishlist X-Debbugs-Cc: car...@debian.org Hi The new 0.46 upstream adds: feat: detect the vulnerability and mitigation of Zenbleed (CVE-2023-20593) in particular. Can you update the package to the new upstream version? (Might it be an

Bug#1041007: linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM hardware RNG support (CONFIG_HW_RANDOM_TPM)

2023-07-29 Thread Salvatore Bonaccorso
hi Vincent, On Sat, Jul 29, 2023 at 12:33:35AM +0200, Vincent Blut wrote: > Hello, > > Le 2023-07-13 23:10, jflf_ker...@gmx.com a écrit : > > Package: src:linux > > Version: 6.1.20-2~bpo11+1 > > Severity: normal > > X-Debbugs-Cc: jflf_ker...@gmx.com > > > > Dear Maintainer, > > > > Currently

<    3   4   5   6   7   8   9   10   11   12   >