Bug#1063554: closed by Helmut Grohne (Re: Bug#1063554: firmware-linux-free: move files to /usr (DEP17))

2024-02-09 Thread Salvatore Bonaccorso
> by > replying to this email. > > > -- > 1063554: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063554 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems > From: Helmut Grohne > Date: Fri, 9 Feb 2024 22:48:44 +0100 > To: Salvatore Bonaccorso

Bug#1063554: firmware-linux-free: move files to /usr (DEP17)

2024-02-09 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi Helmut, On Fri, Feb 09, 2024 at 04:02:42PM +0100, Helmut Grohne wrote: > Package: firmware-linux-free > Version: 20200122-2 > Tags: patch > User: helm...@debian.org > Usertags: dep17m2 > > Hi, > > we want to finalize the /usr-merge transition by moving all

Bug#1060925: Accepted sogo 5.9.1-1 (source) into unstable

2024-02-09 Thread Salvatore Bonaccorso
Source: sogo Source-Version: 5.9.1-1 Fixes CVE-2023-48104, #1060925, so closing it with this version. On Fri, Feb 09, 2024 at 07:59:18PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Wed, 07 Feb 2024 16:39:36 +0100 > Source: sogo >

Bug#1063603: composer: CVE-2024-24821

2024-02-09 Thread Salvatore Bonaccorso
Source: composer Version: 2.6.6-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for composer. CVE-2024-24821[0]: | Composer is a dependency Manager for the PHP

Bug#1063494: engrampa: CVE-2023-52138: Path traversal via crafted cpio archives in Engrampa archivers

2024-02-08 Thread Salvatore Bonaccorso
Source: engrampa Version: 1.26.1-4 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for engrampa. CVE-2023-52138[0]: | Engrampa is an archive manager for the MATE

Bug#1063492: openvswitch: CVE-2023-3966: Invalid memory access in Geneve with HW offload

2024-02-08 Thread Salvatore Bonaccorso
Source: openvswitch Version: 3.3.0~git20240118.e802fe7-3 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 3.1.0-2 Hi, The following vulnerability was published for openvswitch. CVE-2023-3966[0]: | Invalid memory access in

Bug#1063422: [regression 6.1.y] f2fs: invalid zstd compress level: 6

2024-02-08 Thread Salvatore Bonaccorso
Hi Jaegeuk Kim, Chao Yu, In Debian the following regression was reported after a Dhya updated to 6.1.76: On Wed, Feb 07, 2024 at 10:43:47PM -0500, Dhya wrote: > Package: src:linux > Version: 6.1.76-1 > Severity: critical > Justification: breaks the whole system > > Dear Maintainer, > > After

Bug#1063484: libuv1: CVE-2024-24806

2024-02-08 Thread Salvatore Bonaccorso
Source: libuv1 Version: 1.46.0-3 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for libuv1. CVE-2024-24806[0]: | libuv is a multi-platform support library with a focus on | asynchronous I/O. The

Bug#1063479: clamav: CVE-2024-20290 CVE-2024-20328

2024-02-08 Thread Salvatore Bonaccorso
Source: clamav Version: 1.0.4+dfsg-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 1.0.3+dfsg-1~deb12u1 Hi, The following vulnerabilities were published for clamav. CVE-2024-20290[0]: | A vulnerability in the OLE2 file

Bug#1063422: linux-image-6.1.0-18-amd64: F2FS rw mount at boot fails with "invalid zstd compress level: 6"

2024-02-07 Thread Salvatore Bonaccorso
Control: tags -1 + upstream Control: severity -1 important Hi On Wed, Feb 07, 2024 at 10:43:47PM -0500, Dhya wrote: > Package: src:linux > Version: 6.1.76-1 > Severity: critical > Justification: breaks the whole system > > Dear Maintainer, > > After upgrade to linux-image-6.1.0-18-amd64

Bug#1063338: [regression 6.1.76] dlm: cannot start dlm midcomms -97 after backport of e9cdebbe23f1 ("dlm: use kernel_connect() and kernel_bind()")

2024-02-07 Thread Salvatore Bonaccorso
Hi Alexander, On Wed, Feb 07, 2024 at 04:27:48PM -0500, Alexander Aring wrote: > Hi, > > On Wed, Feb 7, 2024 at 1:33 PM Jordan Rife wrote: > > > > On Wed, Feb 7, 2024 at 2:39 AM Salvatore Bonaccorso > > wrote: > > > > > > Hi Valentin, hi all >

Bug#1063416: libgit2: CVE-2024-24577: Arbitrary code execution due to heap corruption in `git_index_add`

2024-02-07 Thread Salvatore Bonaccorso
Source: libgit2 Version: 1.7.1+ds-2 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 1.5.1+ds-1 Control: found -1 1.1.0+dfsg.1-4+deb11u1 Control: found -1 1.1.0+dfsg.1-4 Hi, The following vulnerability was published for libgit2.

Bug#1063415: libgit2: CVE-2024-24575: Denial of service attack in `git_revparse_single`

2024-02-07 Thread Salvatore Bonaccorso
Source: libgit2 Version: 1.7.1+ds-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 1.5.1+ds-1 Hi, The following vulnerability was published for libgit2. CVE-2024-24575[0]: | libgit2 is a portable C implementation of the Git

Bug#1063414: openexr: CVE-2023-5841

2024-02-07 Thread Salvatore Bonaccorso
Source: openexr Version: 3.1.5-5 Severity: important Tags: security upstream Forwarded: https://github.com/AcademySoftwareFoundation/openexr/issues/1625 https://github.com/AcademySoftwareFoundation/openexr/pull/1627 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following

Bug#1063338: [regression 6.1.67] dlm: cannot start dlm midcomms -97 after backport of e9cdebbe23f1 ("dlm: use kernel_connect() and kernel_bind()")

2024-02-07 Thread Salvatore Bonaccorso
Hi Valentin, hi all [This is about a regression reported in Debian for 6.1.67] On Tue, Feb 06, 2024 at 01:00:11PM +0100, Valentin Kleibel wrote: > Package: linux-image-amd64 > Version: 6.1.76+1 > Source: linux > Source-Version: 6.1.76+1 > Severity: important > Control: notfound -1 6.6.15-2 > >

Bug#1057107: bullseye-pu: package libssh2/1.9.0-2

2024-02-06 Thread Salvatore Bonaccorso
Hi Nicolas, On Tue, Feb 06, 2024 at 01:46:04PM -0500, Nicolas Mora wrote: > Control: tag - moreinfo > > Thanks, > > Sorry, it seems that I'm not very well aware of the BTS process, according > to [1] this is how I should untag the bug. > > [1] https://www.debian.org/Bugs/server-control If you

Bug#1060345: puma: CVE-2024-21647: Invalid parsing of chunked encoding in HTTP/1.1 allows DoS attacks

2024-02-05 Thread Salvatore Bonaccorso
Source: puma Source-Version: 6.4.2-1 On Tue, Jan 09, 2024 at 10:15:07PM +0100, Salvatore Bonaccorso wrote: > Source: puma > Version: 5.6.7-1 > Severity: important > Tags: security upstream > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > > Hi, > &g

Bug#1063240: expat: CVE-2023-52426

2024-02-05 Thread Salvatore Bonaccorso
Source: expat Version: 2.5.0-2 Severity: important Tags: security upstream Forwarded: https://github.com/libexpat/libexpat/pull/777 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for expat. CVE-2023-52426[0]: | libexpat through 2.5.0 allows

Bug#1063238: expat: CVE-2023-52425

2024-02-05 Thread Salvatore Bonaccorso
Source: expat Version: 2.5.0-2 Severity: important Tags: security upstream Forwarded: https://github.com/libexpat/libexpat/pull/789 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for expat. CVE-2023-52425[0]: | libexpat through 2.5.0 allows

Bug#1063234: libxml2: CVE-2024-25062

2024-02-05 Thread Salvatore Bonaccorso
Source: libxml2 Version: 2.9.14+dfsg-1.3 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 2.9.14+dfsg-1.3~deb12u1 Control: found -1 2.9.10+dfsg-6.7+deb11u4 Hi, The

Bug#1063031: RFP: pwru -- eBPF-based Linux kernel networking debugger

2024-02-04 Thread Salvatore Bonaccorso
Package: wnpp Severity: wishlist X-Debbugs-Cc: car...@debian.org * Package name: pwru Version : 1.0.5 Upstream Contact: Tobias Klauser * URL : https://github.com/cilium/pwru * License : Apache-2.0 Programming Lang: Go Description : eBPF-based Linux

Bug#1063020: linux: documentation build failure: Sphinx parallel build error: UnboundLocalError: cannot access local variable 'fname' where it is not associated with a value

2024-02-04 Thread Salvatore Bonaccorso
Intreestingly and unfortunately my local test now fails in a different way. So first sorting that out. The xmldocs build hangs instead now. Regards, Salvatore

Bug#1063020: linux: documentation build failure: Sphinx parallel build error: UnboundLocalError: cannot access local variable 'fname' where it is not associated with a value

2024-02-04 Thread Salvatore Bonaccorso
Source: linux Version: 6.6.15-1 Severity: serious Justification: FTBFS X-Debbugs-Cc: car...@debian.org The build for arch:all package FTBFS due to a problem in the documentation build: [2Kreading sources... [ 98%] userspace-api/media/v4l/vidioc-g-frequency .. virt/kvm/devices/vfio

Bug#1061262: ecdh-nist-p256: stack dump on boot

2024-02-04 Thread Salvatore Bonaccorso
Source: linux Source-Version: 6.6.13-1 Hi, On Sun, Feb 04, 2024 at 08:51:13AM +0100, kjell.myksv...@gmail.com wrote: > lør. 27. jan. 2024 kl. 14:00 skrev Salvatore Bonaccorso : > > > Control: tags -1 + moreinfo > > > > On Sun, Jan 21, 2024 at 06:43:11PM +0100,

Bug#1062846: libowasp-antisamy-java: CVE-2024-23635

2024-02-03 Thread Salvatore Bonaccorso
Source: libowasp-antisamy-java Version: 1.7.4-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for libowasp-antisamy-java. CVE-2024-23635[0]: | AntiSamy is a library for performing fast,

Bug#1062845: ledgersmb: CVE-2024-23831

2024-02-03 Thread Salvatore Bonaccorso
Source: ledgersmb Version: 1.6.33+ds-2.1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 1.6.9+ds-2+deb11u3 Hi, The following vulnerability was published for ledgersmb. CVE-2024-23831[0]: | LedgerSMB is a free web-based

Bug#1021738: man2html: CVE-2021-40647 CVE-2021-40648

2024-02-03 Thread Salvatore Bonaccorso
Hi, On Sat, Feb 03, 2024 at 04:29:17PM +0100, Salvatore Bonaccorso wrote: > Hi, > > On Wed, Jan 31, 2024 at 10:05:04AM +0100, Robert Luberda wrote: > > clone 1021738 -1 > > retitle 1021738 man2html: CVE-2021-40647 > > tags 1021738 +pending > > retitle -1 man

Bug#1021738: man2html: CVE-2021-40647 CVE-2021-40648

2024-02-03 Thread Salvatore Bonaccorso
Hi, On Wed, Jan 31, 2024 at 10:05:04AM +0100, Robert Luberda wrote: > clone 1021738 -1 > retitle 1021738 man2html: CVE-2021-40647 > tags 1021738 +pending > retitle -1 man2html: CVE-2021-40648 > tags -1 +moreinfo > thanks > > Moritz Mühlenhoff pisze: > > Hi > > First of all I'm sorry for not

Bug#1058720: slurm-wlm: CVE-2023-49933 CVE-2023-49935 CVE-2023-49936 CVE-2023-49937 CVE-2023-49938

2024-02-03 Thread Salvatore Bonaccorso
Ciao Gennaro, On Sat, Feb 03, 2024 at 12:28:24PM +0100, Gennaro Oliva wrote: > Ciao Salvatore, > > On Sun, Jan 28, 2024 at 11:37:34AM +0100, Salvatore Bonaccorso wrote: > > Reviewing your uploaded changes, the changelog mentions > > CVE-2023-49935, but believe his was

Bug#1062710: kanboard: CVE-2024-22720

2024-02-02 Thread Salvatore Bonaccorso
Source: kanboard Version: 1.2.31+ds2-1 Severity: important Tags: security upstream Forwarded: https://github.com/kanboard/kanboard/issues/5411 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for kanboard. CVE-2024-22720[0]: | Kanboard 1.2.34

Bug#1062709: python-aiohttp: CVE-2024-23334

2024-02-02 Thread Salvatore Bonaccorso
Source: python-aiohttp Version: 3.9.1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for python-aiohttp. CVE-2024-23334[0]: | aiohttp is an asynchronous HTTP client/server framework for asyncio |

Bug#1062708: python-aiohttp: CVE-2024-23829

2024-02-02 Thread Salvatore Bonaccorso
Source: python-aiohttp Version: 3.9.1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for python-aiohttp. CVE-2024-23829[0]: | aiohttp is an asynchronous HTTP client/server framework for asyncio |

Bug#1062532: Accepted runc 1.1.12+ds1-1 (source) into unstable

2024-02-02 Thread Salvatore Bonaccorso
Source: runc Source-Version: 1.1.12+ds1-1 Control: fixed 1062532 1.0.0~rc93+ds1-5+deb11u3 Control: fixed 1062532 1.1.5+ds1-1+deb12u1 This fixes #1062532. Adding as well the fixed version for the pending runc update via bullseye-security and bookworm-security. - Forwarded message from Debian

Bug#1062532: runc: CVE-2024-21626

2024-02-01 Thread Salvatore Bonaccorso
Source: runc Version: 1.1.10+ds1-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for runc. CVE-2024-21626[0]: | runc is a CLI tool for spawning and running containers

Bug#1061688: rtl8821: WARNING: CPU: 37 PID: 1366 at drivers/iommu/dma-iommu.c:1091 iommu_dma_unmap_page+0x7d/0x90

2024-01-29 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi, On Sun, Jan 28, 2024 at 06:02:44PM +, Breno Leitao wrote: > Package: src:linux > Version: 6.6.13-1 > Severity: critical > X-Debbugs-Cc: lei...@debian.org > > > System is crashing from time to time with the most recent kernel > (6.6.13). > > I was able to

Bug#1061704: libcoap3: CVE-2024-0962

2024-01-28 Thread Salvatore Bonaccorso
Source: libcoap3 Version: 4.3.4-1 Severity: important Tags: security upstream Forwarded: https://github.com/obgm/libcoap/issues/1310 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for libcoap3. CVE-2024-0962[0]: | A vulnerability was found

Bug#1058720: slurm-wlm: CVE-2023-49933 CVE-2023-49935 CVE-2023-49936 CVE-2023-49937 CVE-2023-49938

2024-01-28 Thread Salvatore Bonaccorso
Hi Gennaro, On Sat, Dec 30, 2023 at 10:55:32PM +0100, Gennaro Oliva wrote: > Dear Salvatore, > I prepared an updated version of the slurm-wlm package for bookworm in > response to CVE-2023-49933/49935/49936/49937/49938 > > The package can be found here: > >

Bug#1050256: AppArmor breaks locking non-fs Unix sockets

2024-01-28 Thread Salvatore Bonaccorso
Hi John, On Sun, Jan 28, 2024 at 12:43:33AM -0800, John Johansen wrote: > On 12/30/23 20:24, Mathias Gibbens wrote: > > On Sat, 2023-12-30 at 16:44 +0100, Salvatore Bonaccorso wrote: > > > John, did you had a chance to work on this backport for 6.1.y stable > > >

Bug#988730: CVE-2017-18641

2024-01-27 Thread Salvatore Bonaccorso
Hi, On Sun, Jan 28, 2024 at 12:51:58AM +, Mathias Gibbens wrote: > Control: tags -1 + wontfix > > lxc-templates is essentially deprecated upstream in favor of > distrobuilder. From the launchpad discussion: Thanks for the update. Do you know of any plans of making distrobuilder available?

Bug#1061449: linux-image-6.7-amd64: a boot message from amdgpu

2024-01-27 Thread Salvatore Bonaccorso
Hi In Debian (https://bugs.debian.org/1061449) we got the following quotred report: On Wed, Jan 24, 2024 at 07:38:16PM +0100, Patrice Duroux wrote: > Package: src:linux > Version: 6.7.1-1~exp1 > Severity: normal > > Dear Maintainer, > > Giving a try to 6.7, here is a message extracted from

Bug#1061262: ecdh-nist-p256: stack dump on boot

2024-01-27 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo On Sun, Jan 21, 2024 at 06:43:11PM +0100, Kjell M. Myksvoll wrote: > Package: ecdh-nist-p256 > Severity: normal > X-Debbugs-Cc: kjell.myksv...@gmail.com > > Dear Maintainer, > > *** Reporter, please consider answering these questions, where appropriate *** > >*

Bug#1060052: Status?

2024-01-27 Thread Salvatore Bonaccorso
Hi, On Thu, Jan 25, 2024 at 02:55:52AM +, Dennis Haney wrote: > Can we please get a new release of a stable kernel? > This keeps crashing our machines, and it is a pain manually updating > to the 6.5 kernel on all of them. A fix for this issue will be released with the upcoming point

Bug#1050256: AppArmor breaks locking non-fs Unix sockets

2024-01-27 Thread Salvatore Bonaccorso
Hi John, On Sun, Dec 31, 2023 at 04:24:47AM +, Mathias Gibbens wrote: > On Sat, 2023-12-30 at 16:44 +0100, Salvatore Bonaccorso wrote: > > John, did you had a chance to work on this backport for 6.1.y stable > > upstream so we could pick it downstream in Debian in one of the

Bug#1061521: linux-image-6.6.13-amd64: 6.6.13-1 no more keyboard resuming from suspend

2024-01-27 Thread Salvatore Bonaccorso
Hi Antoine, On Fri, Jan 26, 2024 at 06:26:48PM +0100, Antoine wrote: > On 1/25/24 22:08, Salvatore Bonaccorso wrote: > > can you please try to bisect the changes in upstreams 6.6.11 to 6.6.13 > Hi, Before considering bisecting, > > > do you get anything logged in the kerne

Bug#1061582: openssl: CVE-2024-0727

2024-01-26 Thread Salvatore Bonaccorso
Source: openssl Version: 3.1.4-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for openssl. CVE-2024-0727[0]: | Issue summary: Processing a maliciously formatted PKCS12 file may | lead OpenSSL to

Bug#1061524: tiff: CVE-2023-52356

2024-01-25 Thread Salvatore Bonaccorso
Source: tiff Version: 4.5.1+git230720-3 Severity: important Tags: security upstream Forwarded: https://gitlab.com/libtiff/libtiff/-/issues/622 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for tiff. CVE-2023-52356[0]: | A segment fault

Bug#1061522: atril: CVE-2023-52076

2024-01-25 Thread Salvatore Bonaccorso
Source: atril Version: 1.26.1-4 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for atril. CVE-2023-52076[0]: | Atril Document Viewer is the default document reader of

Bug#1061521: linux-image-6.6.13-amd64: 6.6.13-1 no more keyboard resuming from suspend

2024-01-25 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo On Thu, Jan 25, 2024 at 10:01:04PM +0100, r2rien wrote: > Package: linux-image-6.6.13-amd64 > Version: 6.6.13-1 > Severity: grave > Justification: renders package unusable > X-Debbugs-Cc: deb...@r2rien.net > > Resuming from suspend keyboard totally unresponsive, thus

Bug#1061520: mathtex: CVE-2023-51885 CVE-2023-51886 CVE-2023-51887 CVE-2023-51888 CVE-2023-51889 CVE-2023-51890

2024-01-25 Thread Salvatore Bonaccorso
Source: mathtex Version: 1.03-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for mathtex. CVE-2023-51885[0]: | Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a | remote

Bug#1061519: shim: CVE-2023-40546 CVE-2023-40547 CVE-2023-40548 CVE-2023-40549 CVE-2023-40550 CVE-2023-40551

2024-01-25 Thread Salvatore Bonaccorso
Source: shim Version: 15.7-1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 15.7-1~deb11u1 Hi, The following vulnerabilities were published for shim. According to [6]: * Various CVE fixes: CVE-2023-40546 mok: fix LogError()

Bug#1061460: firmware-nonfree: CVE-2023-4969

2024-01-24 Thread Salvatore Bonaccorso
Source: firmware-nonfree Version: 20230625-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for firmware-nonfree. CVE-2023-4969[0]: | A GPU kernel can read sensitive data from another GPU kernel

Bug#1061390: iwlwifi: crash when disabling wifi

2024-01-23 Thread Salvatore Bonaccorso
Control: forcemerge 1058887 -1 Hi Thomas, On Tue, Jan 23, 2024 at 04:19:18PM +0100, Thomas Goirand wrote: > Source: linux > Version: 6.1.69-1 > Severity: important > > Hi, > > In some cases, when I disable wifi with the network manager GUI > (ie: right click, "Enable Wifi" to disable it), my

Bug#1059315: tinyxml: CVE-2023-34194 CVE-2023-40462 CVE-2023-40458

2024-01-22 Thread Salvatore Bonaccorso
Hi, On Sun, Jan 14, 2024 at 05:48:54PM +0100, Salvatore Bonaccorso wrote: > Hi, > > On Sun, Jan 14, 2024 at 04:41:00PM +, Bastien Roucari?s wrote: > > On Sun, 31 Dec 2023 07:14:26 +0100 Salvatore Bonaccorso > > wrote: > > Hi Guilhem, hi Moritz,

Bug#1061110: xorg-server: Regression from fixes for CVE-2024-21886

2024-01-21 Thread Salvatore Bonaccorso
Hi, On Thu, Jan 18, 2024 at 02:30:08PM +0100, Salvatore Bonaccorso wrote: > Source: xorg-server > Version: 2:21.1.11-1 > Severity: important > Tags: upstream > X-Debbugs-Cc: car...@debian.org, jcris...@debian.org, a...@debian.org, > t...@security.debian.org > > Wh

Bug#1061256: edk2: CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237

2024-01-21 Thread Salvatore Bonaccorso
Source: edk2 Version: 2023.11-5 Severity: important X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for edk2. CVE-2023-45229[0]: | EDK2's Network Package is susceptible to an out-of-bounds read | vulnerability when processing the IA_NA or

Bug#1061221: jupyterlab: CVE-2024-22420 CVE-2024-22421

2024-01-20 Thread Salvatore Bonaccorso
Source: jupyterlab Version: 4.0.10+ds1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for jupyterlab. CVE-2024-22420[0]: | JupyterLab is an extensible environment for interactive and |

Bug#1061190: bullseye-pu: package gnutls28/3.7.1-5+deb11u5

2024-01-20 Thread Salvatore Bonaccorso
Hi, On Sat, Jan 20, 2024 at 03:53:45PM +0100, Andreas Metzler wrote: > Package: release.debian.org > Severity: normal > Tags: bullseye > User: release.debian@packages.debian.org > Usertags: pu > X-Debbugs-Cc: gnutl...@packages.debian.org, t...@security.debian.org > Control: affects -1 +

Bug#1061046: Bug#1061045: gnutls28: CVE-2024-0567 / #1061046 gnutls28: CVE-2024-0553

2024-01-20 Thread Salvatore Bonaccorso
Hi, On Sat, Jan 20, 2024 at 01:28:33PM +0100, Andreas Metzler wrote: > Hello, > > do you plan/would you rather fix these two issues (CVE-2024-0567 and > CVE-2024-0553) by DSA or should I go for a (old)stable update? IMHO they can go as well via the point releases (which should be, though yet

Bug#1061177: bullseye-pu: package tar/1.34+dfsg-1+deb11u1

2024-01-20 Thread Salvatore Bonaccorso
; urgency=medium + + * Non-maintainer upload. + * Fix boundary checking in base-256 decoder (CVE-2022-48303) + * Fix handling of extended header prefixes (CVE-2023-39804) +(Closes: #1058079) + + -- Salvatore Bonaccorso Sat, 20 Jan 2024 10:59:10 +0100 + tar (1.34+dfsg-1) unstable; urgency

Bug#1061176: bookworm-pu: package tar/1.34+dfsg-1.2+deb12u1

2024-01-20 Thread Salvatore Bonaccorso
) bookworm; urgency=medium + + * Non-maintainer upload. + * Fix boundary checking in base-256 decoder (CVE-2022-48303) + * Fix handling of extended header prefixes (CVE-2023-39804) +(Closes: #1058079) + + -- Salvatore Bonaccorso Sat, 20 Jan 2024 10:27:07 +0100 + tar (1.34+dfsg-1.2) unstable

Bug#1061173: freerdp2: CVE-2024-22211: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset

2024-01-20 Thread Salvatore Bonaccorso
Source: freerdp2 Version: 2.11.2+dfsg1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for freerdp2. CVE-2024-22211[0]: | FreeRDP is a set of free and open source remote desktop protocol | library

Bug#1061172: pillow: CVE-2023-50447

2024-01-20 Thread Salvatore Bonaccorso
Source: pillow Version: 10.1.0-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for pillow. CVE-2023-50447[0]: | Pillow through 10.1.0 allows PIL.ImageMath.eval

Bug#1061156: ansible-core: CVE-2024-0690

2024-01-19 Thread Salvatore Bonaccorso
Source: ansible-core Version: 2.14.13-1 Severity: important Tags: security upstream Forwarded: https://github.com/ansible/ansible/pull/82565 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for ansible-core. CVE-2024-0690[0]: | possible

Bug#1061097: pam: CVE-2024-22365: pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations

2024-01-19 Thread Salvatore Bonaccorso
Hi Sam, On Thu, Jan 18, 2024 at 08:41:29AM +0100, Salvatore Bonaccorso wrote: > Source: pam > Version: 1.5.2-9.1 > Severity: important > Tags: security upstream > X-Debbugs-Cc: car...@debian.org, Debian Security Team > > Control: found -1 1.5.2-6+deb12u1 > Control: fo

Bug#1061138: coreutils: CVE-2024-0684: heap overflow in split --line-bytes with very long lines

2024-01-18 Thread Salvatore Bonaccorso
Source: coreutils Version: 9.4-3 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for coreutils. CVE-2024-0684[0]: | heap overflow in split --line-bytes with very long

Bug#1060706: linux-image-6.1.0-17-amd64: intel i225 NIC loses PCIe link, network becomes unusable

2024-01-18 Thread Salvatore Bonaccorso
Hi, On Sat, Jan 13, 2024 at 04:39:51PM +0100, Arno Lehmann wrote: > Hi Salvatore, > > Am 13.01.2024 um 13:47 schrieb Salvatore Bonaccorso: > > > Just to be clear, can you confirm this is or is not a regression from > > a previous running 6.1.y kernel? > > On thi

Bug#1061126: mysql-8.0: Security fixes from January 2024 CPU

2024-01-18 Thread Salvatore Bonaccorso
Source: mysql-8.0 Version: 8.0.35-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, See https://www.oracle.com/security-alerts/cpujan2024.html#AppendixMSQL for a list of CVEs affecting src:mysql-8.0. Regards,

Bug#1061110: xorg-server: Regression from fixes for CVE-2024-21886

2024-01-18 Thread Salvatore Bonaccorso
Source: xorg-server Version: 2:21.1.11-1 Severity: important Tags: upstream X-Debbugs-Cc: car...@debian.org, jcris...@debian.org, a...@debian.org, t...@security.debian.org While preparing the update for xorg-server for bookworm an autopkgtest regression in uqm was seen. The same is shown with

Bug#1061098: libspreadsheet-parsexlsx-perl: CVE-2024-23525

2024-01-18 Thread Salvatore Bonaccorso
Source: libspreadsheet-parsexlsx-perl Version: 0.29-1 Severity: important Tags: security upstream Forwarded: https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for

Bug#1061097: pam: CVE-2024-22365: pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations

2024-01-17 Thread Salvatore Bonaccorso
Source: pam Version: 1.5.2-9.1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 1.5.2-6+deb12u1 Control: found -1 1.5.2-6 Control: found -1 1.4.0-9+deb11u1 Control: found -1 1.4.0-9 Hi, The following vulnerability was published

Bug#1061046: gnutls28: CVE-2024-0553

2024-01-16 Thread Salvatore Bonaccorso
Source: gnutls28 Version: 3.8.2-1 Severity: important Tags: security upstream Forwarded: https://gitlab.com/gnutls/gnutls/-/issues/1522 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 3.7.9-2+deb12u1 Control: found -1 3.7.1-5+deb11u4 Hi, The following vulnerability was

Bug#1061045: gnutls28: CVE-2024-0567

2024-01-16 Thread Salvatore Bonaccorso
Source: gnutls28 Version: 3.8.2-1 Severity: important Tags: security upstream Forwarded: https://gitlab.com/gnutls/gnutls/-/issues/1521 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for gnutls28. CVE-2024-0567[0]: | A vulnerability was

Bug#1060925: sogo: CVE-2023-48104

2024-01-16 Thread Salvatore Bonaccorso
Source: sogo Version: 5.8.4-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for sogo. CVE-2023-48104[0]: | Alinto SOGo 5.8.0 is vulnerable to HTML Injection. If you fix the vulnerability please

Bug#1014722: ansible: CVE-2021-3532

2024-01-15 Thread Salvatore Bonaccorso
On Sun, Jul 10, 2022 at 10:27:06PM +0200, Moritz Mühlenhoff wrote: > Source: ansible > X-Debbugs-CC: t...@security.debian.org > Severity: normal > Tags: security > > Hi, > > The following vulnerability was published for ansible. > > CVE-2021-3532[0]: > | A flaw was found in Ansible where the

Bug#1060861: RUSTSEC-2023-0078

2024-01-15 Thread Salvatore Bonaccorso
Hi Moritz, On Mon, Jan 15, 2024 at 08:49:04PM +0100, Moritz Muehlenhoff wrote: > Source: rust-tracing > Version: 0.1.37-1 > Severity: important > Tags: security > X-Debbugs-Cc: Debian Security Team > > https://rustsec.org/advisories/RUSTSEC-2023-0078.html >

Bug#1060863: ocsinventory-server: CVE-2023-3726

2024-01-15 Thread Salvatore Bonaccorso
Source: ocsinventory-server Version: 2.8.1+dfsg1+~2.11.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/OCSInventory-NG/OCSInventory-ocsreports/pull/1545 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for

Bug#1060862: freeimage: CVE-2023-47995

2024-01-15 Thread Salvatore Bonaccorso
Source: freeimage Version: 3.18.0+ds2-10 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for freeimage. CVE-2023-47995[0]: | Buffer Overflow vulnerability in |

Bug#1060858: openssl: CVE-2023-6237: Checking excessively long invalid RSA public keys may take a long time

2024-01-15 Thread Salvatore Bonaccorso
Source: openssl Version: 3.1.4-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 3.0.11-1~deb12u2 Hi, The following vulnerability was published for openssl. CVE-2023-6237[0]: | Checking excessively long invalid RSA public keys

Bug#1059315: tinyxml: CVE-2023-34194 CVE-2023-40462 CVE-2023-40458

2024-01-14 Thread Salvatore Bonaccorso
Hi, On Sun, Jan 14, 2024 at 04:41:00PM +, Bastien Roucariès wrote: > On Sun, 31 Dec 2023 07:14:26 +0100 Salvatore Bonaccorso > wrote: > Hi Guilhem, hi Moritz, > > Hi Guilhem, hi Moritz, > > > > On Sat, Dec 30, 2023 at 11:26:02PM +0100, Guilhem Moulin wrote: >

Bug#1060753: exiftags: CVE-2023-50671

2024-01-14 Thread Salvatore Bonaccorso
Hi, On Sun, Jan 14, 2024 at 03:54:59PM +0100, László Böszörményi wrote: > Hi Salvatore, > > On Sat, Jan 13, 2024 at 5:51 PM Salvatore Bonaccorso > wrote: > > If you fix the vulnerability please also make sure to include the > > CVE (Common Vulnerabilities & Exp

Bug#1060693: Accepted qt6-base 6.4.2+dfsg-21 (source) into unstable

2024-01-13 Thread Salvatore Bonaccorso
Source: qt6-base Source-Version: 6.4.2+dfsg-21 On Sat, Jan 13, 2024 at 02:37:52PM +, Debian FTP Masters wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Sat, 13 Jan 2024 14:53:25 +0100 > Source: qt6-base > Architecture: source > Version: 6.4.2+dfsg-21 >

Bug#1060753: exiftags: CVE-2023-50671

2024-01-13 Thread Salvatore Bonaccorso
Source: exiftags Version: 1.01-7 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi Laszlo, The following vulnerability was published for exiftags. CVE-2023-50671[0]: | In exiftags 1.01, nikon_prop1 in nikon.c has a heap-based buffer | overflow

Bug#1060754: shiro: CVE-2023-46749

2024-01-13 Thread Salvatore Bonaccorso
Source: shiro Version: 1.3.2-5 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for shiro. CVE-2023-46749[0]: | path traversal attack If you fix the vulnerability please also make sure to include

Bug#1060751: atril: CVE-2023-51698

2024-01-13 Thread Salvatore Bonaccorso
Source: atril Version: 1.26.1-3 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for atril. CVE-2023-51698[0]: | Atril is a simple multi-page document viewer. Atril is

Bug#1060749: qemu: CVE-2023-6683: ui/clipboard: avoid crash upon request when clipboard peer is no

2024-01-13 Thread Salvatore Bonaccorso
Source: qemu Version: 1:8.2.0+ds-4 Severity: important Tags: security upstream Forwarded: https://lists.nongnu.org/archive/html/qemu-devel/2024-01/msg02382.html X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for qemu. CVE-2023-6683[0]: | A

Bug#1060748: jinja2: CVE-2024-22195: HTML attribute injection when passing user input as keys to xmlattr filter

2024-01-13 Thread Salvatore Bonaccorso
Source: jinja2 Version: 3.1.2-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for jinja2. CVE-2024-22195[0]: | Jinja is an extensible templating engine. Special placeholders in | the template

Bug#1060747: rear: CVE-2024-23301

2024-01-13 Thread Salvatore Bonaccorso
Source: rear Version: 2.7+dfsg-1.1 Severity: important Tags: security upstream Forwarded: https://github.com/rear/rear/issues/3122 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 2.7+dfsg-1 Hi, The following vulnerability was published for rear. CVE-2024-23301[0]: |

Bug#1060706: linux-image-6.1.0-17-amd64: intel i225 NIC loses PCIe link, network becomes unusable

2024-01-13 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo On Sat, Jan 13, 2024 at 11:45:29AM +0100, Arno Lehmann wrote: > Package: src:linux > Version: 6.1.69-1 > Severity: normal > Tags: upstream > > Dear Maintainer, > > > just having the computer run for a while, the network loses connection because > the NIC detached

Bug#1060005: cifs-utils: Copy file with cp, hangs with a kernel NULL pointer dereference.

2024-01-13 Thread Salvatore Bonaccorso
Hi A fix for this issue has been queued for the 6.1.y series: https://lore.kernel.org/stable/zajygki9o5j1u...@eldamar.lan/T/#m934ca5a14db8bcef8f24329c7edee8a3592465b2 If someone additionally might or want to test testbuilds please have a look at:

Bug#1060701: go-git: CVE-2023-49568 CVE-2023-49569

2024-01-13 Thread Salvatore Bonaccorso
Source: golang-github-go-git-go-git Version: 5.4.2-4 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for go-git. CVE-2023-49568[0]: | A denial of service (DoS)

Bug#1060415: [Pkg-freeipa-devel] Bug#1060415: freeipa: CVE-2023-5455

2024-01-11 Thread Salvatore Bonaccorso
Hi, On Thu, Jan 11, 2024 at 10:02:45AM +0200, Timo Aaltonen wrote: > Salvatore Bonaccorso kirjoitti 10.1.2024 klo 23.14: > > Source: freeipa > > Version: 4.10.2-2 > > Severity: important > > Tags: security upstream > > X-Debbugs-Cc: car...@debian.org, Debian Secur

Bug#1059713: closed by Debian FTP Masters (reply to Bastian Blank ) (Bug#1059713: fixed in linux 6.7-1~exp1)

2024-01-10 Thread Salvatore Bonaccorso
Hi, On Wed, Jan 10, 2024 at 09:42:17PM -0800, Alison Chaiken wrote: > On 2024-01-09 00:15, Debian Bug Tracking System wrote: > > This is an automatic notification regarding your Bug report > > which was filed against the linux-image-6.6.8-amd64-dbg package: > > > > #1059713:

Bug#1060415: freeipa: CVE-2023-5455

2024-01-10 Thread Salvatore Bonaccorso
Source: freeipa Version: 4.10.2-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 4.9.11-1 Hi, The following vulnerability was published for freeipa. CVE-2023-5455[0]: | A Cross-site request forgery vulnerability exists in |

Bug#1060347: openssl: CVE-2023-6129

2024-01-09 Thread Salvatore Bonaccorso
Source: openssl Version: 3.1.4-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: found -1 3.0.11-1~deb12u2 Hi, The following vulnerability was published for openssl. CVE-2023-6129[0]: | Issue summary: The POLY1305 MAC (message

Bug#1060345: puma: CVE-2024-21647: Invalid parsing of chunked encoding in HTTP/1.1 allows DoS attacks

2024-01-09 Thread Salvatore Bonaccorso
Source: puma Version: 5.6.7-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for puma. CVE-2024-21647[0]: | Puma is a web server for Ruby/Rack applications built for | parallelism. Prior to version

Bug#1054620: bcachefs-tools: Issues in packaging and git repo

2024-01-09 Thread Salvatore Bonaccorso
Hi, On Mon, Jan 08, 2024 at 12:31:52PM +0200, Faidon Liambotis wrote: [...] > On a related note, 1.3.4 is behind now; upstream has released v1.4.0 a > couple of weeks ago. bcachefs is now in Linux 6.7 (released yesterday), > so it'd be nice to have up-to-date userspace as well. FWIW, it will be

Bug#1060339: bcache-tools: Package description: Refer to moved Documentation location

2024-01-09 Thread Salvatore Bonaccorso
Source: bcache-tools Version: 1.0.8-4 Severity: minor X-Debbugs-Cc: car...@debian.org Hi The package description mentions: Documentation for the run-time interface is included in the kernel tree; in Documentation/bcache.txt. This should/can be adjusted to the new location in upstream

Bug#1034891: closed by Timo Aaltonen (Re: [Pkg-freeipa-devel] Bug#1034891: 389-ds-base: CVE-2023-1055)

2024-01-08 Thread Salvatore Bonaccorso
Hi, On Mon, Jan 08, 2024 at 07:06:10PM +0100, Salvatore Bonaccorso wrote: > Hi, > > On Mon, Jan 08, 2024 at 06:56:40PM +0100, Salvatore Bonaccorso wrote: > > > Source: 389-ds-base > > > Version: 2.3.4+dfsg1-1 > > > > > > Moritz Mühlenhoff kirjoitt

Bug#1034891: closed by Timo Aaltonen (Re: [Pkg-freeipa-devel] Bug#1034891: 389-ds-base: CVE-2023-1055)

2024-01-08 Thread Salvatore Bonaccorso
Hi, On Mon, Jan 08, 2024 at 06:56:40PM +0100, Salvatore Bonaccorso wrote: > > Source: 389-ds-base > > Version: 2.3.4+dfsg1-1 > > > > Moritz Mühlenhoff kirjoitti 26.4.2023 klo 20.43: > > > Source: 389-ds-base > > > X-Debbugs-CC: t...@security.debia

Bug#1034891: closed by Timo Aaltonen (Re: [Pkg-freeipa-devel] Bug#1034891: 389-ds-base: CVE-2023-1055)

2024-01-08 Thread Salvatore Bonaccorso
> Source: 389-ds-base > Version: 2.3.4+dfsg1-1 > > Moritz Mühlenhoff kirjoitti 26.4.2023 klo 20.43: > > Source: 389-ds-base > > X-Debbugs-CC: t...@security.debian.org > > Severity: important > > Tags: security > > > > Hi, > > > > The following vulnerability was published for 389-ds-base. > > >

<    1   2   3   4   5   6   7   8   9   10   >