Re: New proposed-updates diff: libapache2-mod-rivet 3.2.1-1

2021-11-14 Thread Massimo Manghi

My mistake. My sponsor corrected the problem and re-uploaded to unstable
as 3.2.1-2. Still there is a p-u-new reference to the 3.2.1-1 package in
https://release.debian.org/proposed-updates/stable.html. Am I supposed
to take some action to correct this?

 -- Massimo

On 11/13/21 9:18 PM, Adam D. Barratt wrote:

Hi,

On Sat, 2021-11-13 at 20:03 +, Debian Queue Viewer wrote:

Version in base suite: 3.2.0-1

Base version: libapache2-mod-rivet_3.2.0-1
Target version: libapache2-mod-rivet_3.2.1-1


+libapache2-mod-rivet (3.2.1-1) stable; urgency=medium
+
+  * New upstream release.
+  * New rivet version addresses issue with multiple AM_AUTOMAKE_INIT
+expansion (Closes: #998490).
+  * Correcting the name of the target directory where rivet library and
+Tcl scripts are moved into (it still had the old 3.1 version name)

I'm assuming that you intended to upload this to unstable, not stable.
If targetting stable was actually intentional, then I'm afraid that you
need to fix the issue in unstable before we can consider accepting it
for stable.

Any upload to stable should also be accompanied by a "p-u" bug filed
against release.debian.org, which would need to explain why a larger
release should be accepted, rather than a smaller targetted fix.

Regards,

Adam




Firma il tuo 5x1000 all’Università di Parma, aiutaci a essere sempre più 
accoglienti e inclusivi verso le nostre studentesse e i nostri studenti - 
Indica 00308780345 nella tua denuncia dei redditi.



Re: New proposed-updates diff: libapache2-mod-rivet 3.2.1-1

2021-11-14 Thread Sven Hoexter
On Sat, Nov 13, 2021 at 08:27:39PM +, Adam D. Barratt wrote:
> Hi,
> 
> On Sat, 2021-11-13 at 20:03 +, Debian Queue Viewer wrote:
> > Version in base suite: 3.2.0-1
> > 
> > Base version: libapache2-mod-rivet_3.2.0-1
> > Target version: libapache2-mod-rivet_3.2.1-1
> 
> +libapache2-mod-rivet (3.2.1-1) stable; urgency=medium
> +
> +  * New upstream release.
> +  * New rivet version addresses issue with multiple AM_AUTOMAKE_INIT
> +expansion (Closes: #998490).
> +  * Correcting the name of the target directory where rivet library and 
> +Tcl scripts are moved into (it still had the old 3.1 version name)
> 
> I'm assuming that you intended to upload this to unstable, not stable.
> If targetting stable was actually intentional, then I'm afraid that you
> need to fix the issue in unstable before we can consider accepting it
> for stable.

Hello Adam,
yes that was intended to be uploaded to unstable, I missed the issue and
I screwed that up as the sponsor. Please remove the package from the queue.

Sorry for the noise.

Regards,
Sven


signature.asc
Description: PGP signature


Bug#999673: bullseye-pu: package lldpd/1.0.11-1

2021-11-14 Thread Vincent Bernat
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

[ Reason ]

- - Low-severity security issue when receiving SONMP packets.
  CVE-2021-43612

- - Annoying bug where LLDP packets are encapsulated in VLAN 0 when some
  configuration directives are used. Many implementations reject such
  a packet (regression introduced in 1.0.6)

[ Impact ]

- - Someone could crash lldpd from another neighbor if the user enables
  SONMP (quite unlikely).

- - People cannot use some configuration directives.

[ Tests ]

- - Both codes are covered by tests in upstream. The SONMP tests are run
  during build as well. The VLAN 0 test is not run during build.

[ Risks ]

- - For SONMP, low risk as it is seldomly used and correctly formed
  packets are part of the tests run during build.

- - For VLAN 0, the change is trivial, tested upstream and reported OK by two 
users.

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]

- - SONMP: there was a confusion about the size of a packet. The same
  variable was used for the payload size and for checking the size
  with Ethernet headers.

- - VLAN 0: when changing some settings, a struct containing the changed
  settings is transmitted. -1 was used to say "no change" but it was
  interpreted as a change.

[ Other info ]

- - Security team is OK to fix the security issue in a point release.

- - I don't think this is worth fixing the SONMP issue in Buster, but I
  can do that too. The VLAN issue is not present.


-BEGIN PGP SIGNATURE-
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=W7Cl
-END PGP SIGNATURE-
>From d70b8be04c6d8638e6f2cd612a07e73992fa0798 Mon Sep 17 00:00:00 2001
From: Vincent Bernat 
Date: Sun, 14 Nov 2021 15:42:12 +0100
Subject: [PATCH] Tentative security update for Bullseye

---
 debian/changelog  |  8 ++
 ...et-VLAN-tag-if-client-did-not-set-it.patch | 27 ++
 ...-overflow-when-reading-SONMP-packets.patch | 93 +++
 debian/patches/series |  2 +
 4 files changed, 130 insertions(+)
 create mode 100644 
debian/patches/0001-client-do-not-set-VLAN-tag-if-client-did-not-set-it.patch
 create mode 100644 
debian/patches/0001-sonmp-fix-heap-overflow-when-reading-SONMP-packets.patch

diff --git a/debian/changelog b/debian/changelog
index bb87d8129f9e..68ae7b91d22d 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+lldpd (1.0.12-1+deb11u1) bullseye; urgency=high
+
+  * d/patches: sonmp: fix heap overflow when reading SONMP packets.
+CVE-2021-43612
+  * d/patches: client: do not set VLAN tag if client did not set it
+
+ -- Vincent Bernat   Sun, 14 Nov 2021 15:41:59 +0100
+
 lldpd (1.0.12-1) unstable; urgency=medium
 
   * New upstream release.
diff --git 
a/debian/patches/0001-client-do-not-set-VLAN-tag-if-client-did-not-set-it.patch 
b/debian/patches/0001-client-do-not-set-VLAN-tag-if-client-did-not-set-it.patch
new file mode 100644
index ..1f65986ae27e
--- /dev/null
+++ 
b/debian/patches/0001-client-do-not-set-VLAN-tag-if-client-did-not-set-it.patch
@@ -0,0 +1,27 @@
+From 261afbe371ab316a4bf710338f6d9183a01e083f Mon Sep 17 00:00:00 2001
+From: Vincent Bernat 
+Date: Wed, 29 Sep 2021 12:02:15 +0200
+Subject: [PATCH] client: do not set VLAN tag if client did not set it
+
+This fixes a bug where frames could be tagged with VLAN 0 after client
+configuration.
+---
+ src/daemon/client.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/daemon/client.c b/src/daemon/client.c
+index b4a08aae80a8..0d0f3ea37a19 100644
+--- a/src/daemon/client.c
 b/src/daemon/client.c
+@@ -390,7 +390,7 @@ _client_handle_set_port(struct lldpd *cfg,
+   port->p_disable_rx = port->p_disable_tx = 1;
+   break;
+   }
+-  if (set->vlan_tx_enabled >= -1) {
++  if (set->vlan_tx_enabled > -1) {
+   port->p_vlan_tx_enabled = set->vlan_tx_enabled;
+   port->p_vlan_tx_tag = set->vla

Bug#999668: bullseye-pu: package jwm/2.3.7-5+deb11u1

2021-11-14 Thread Samuel Henrique
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bullseye
X-Debbugs-Cc: samuel...@debian.org
Severity: normal

[ Reason ]
Fix segfault when using keyboard bindings to move a window for the
first time (uninitialized variable).
This issue is present on jwm 2.3.7, so it affects both stable and
oldstable (It also affects testing but 2.4.0 is soon gonna migrate
from unstable).

[ Impact ]
JWM will crash and exit if the user tries to move a window using the
keyboard bindings for the first time (it won't if the window gets
moved by the mouse first).

[ Tests ]
Manually reproduced the issue and confirmed that the fix addresses it.

[ Risks ]
I don't think there's a risk of a regression since the fix is a
oneliner, initializing the variable.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Backport of an upstream patch that initializes the currentClient variable.

[ Other info ]
https://bugs.debian.org/977878
https://github.com/joewing/jwm/issues/410
https://github.com/rdnvndr/jwm/commit/d0e28abd8eb8748470f07595be6da5cec05b4939

As per the latest instructions from the release team, I have gone
ahead and uploaded the fix already.

-- 
Samuel Henrique 


jwm_2.3.7-5+deb11u1.debdiff
Description: Binary data


Bug#998907: closed by Håvard Flaget Aasen (Closing, CVE marked as unimportant)

2021-11-14 Thread Salvatore Bonaccorso
Hi Håvard,

On Fri, Nov 12, 2021 at 11:21:08PM +, Debian Bug Tracking System wrote:
[...]
> CVE-2021-40985 has now been marked as unimportant, I'm therefore
> closing this bug, since the CVE was the sole purpose of the update.
> 
> Regards,
> Håvard

In case this was just caused by a uncertainity what is acceptable to
fix via a point release and what not: I guess SRM will accept updates
in stable as well for simpler bugfixes with low severity (even more if
you had already prepared the debdiff as attached to this bug and as
well #998902).

Regards,
Salvatore