Bug#812455: glibc: CVE-2015-8779: Unbounded stack allocation in catopen function

2016-01-23 Thread Salvatore Bonaccorso
Source: glibc Version: 2.19-18 Severity: important Tags: security upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=17905 Hi, the following vulnerability was published for glibc. CVE-2015-8779[0]: catopen() Multiple unbounded stack allocations If you fix the vulnerability plea

Processed: Bug#810322 marked as pending

2016-01-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tag 810322 pending Bug #810322 {Done: Aurelien Jarno } [libc6] libc6:amd64: Unexpected asseration in pthread_mutex_unlock() Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 810322: http://bug

Processed: fixed 812445 in 2.21-7

2016-01-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 812445 2.21-7 Bug #812445 [src:glibc] glibc: CVE-2015-8776: Segmentation fault caused by passing out-of-range data to strftime() The source 'glibc' and version '2.21-7' do not appear to match any binary packages Marked as fixed in versions

glibc_2.21-7_source.changes ACCEPTED into unstable

2016-01-23 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 24 Jan 2016 00:21:18 +0100 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-de

Processing of glibc_2.21-7_source.changes

2016-01-23 Thread Debian FTP Masters
glibc_2.21-7_source.changes uploaded successfully to localhost along with the files: glibc_2.21-7.dsc glibc_2.21-7.debian.tar.xz Greetings, Your Debian queue daemon (running on host franck.debian.org)

[glibc] branch sid updated (74bef2c -> 9e41d9d)

2016-01-23 Thread Aurelien Jarno
This is an automated email from the git hooks/post-receive script. aurel32 pushed a change to branch sid in repository glibc. from 74bef2c Fix wrong assertion in pthread_mutex_unlock() adds 46e2752 releasing package glibc version 2.21-7 new 9e41d9d New changelog entry

[glibc] annotated tag debian/2.21-7 created (now 64d3020)

2016-01-23 Thread Aurelien Jarno
This is an automated email from the git hooks/post-receive script. aurel32 pushed a change to annotated tag debian/2.21-7 in repository glibc. at 64d3020 (tag) tagging 46e27525dd169fad7ad2601e208db999d2c4e334 (commit) replaces debian/2.21-6 tagged by Aurelien Jarno on

Bug#812445: glibc: CVE-2015-8776: Segmentation fault caused by passing out-of-range data to strftime()

2016-01-23 Thread Salvatore Bonaccorso
Source: glibc Version: 2.19-18 Severity: important Tags: security upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18985 Hi, the following vulnerability was published for glibc. CVE-2015-8776[0]: Passing out of range data to strftime() causes a segfault If you fix the vulnera

Bug#812351: marked as done (glibc: [INTL:nl] Dutch translation of debconf messages)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:55 + with message-id and subject line Bug#812351: fixed in glibc 2.21-7 has caused the Debian Bug report #812351, regarding glibc: [INTL:nl] Dutch translation of debconf messages to be marked as done. This means that you claim that the problem has bee

Bug#809636: marked as done (glibc: [INTL:fr] French debconf templates translation update)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#809636: fixed in glibc 2.21-7 has caused the Debian Bug report #809636, regarding glibc: [INTL:fr] French debconf templates translation update to be marked as done. This means that you claim that the problem h

Bug#810053: marked as done (glibc: Fix dladdr and nss Bug#791537 on hppa)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#810053: fixed in glibc 2.21-7 has caused the Debian Bug report #810053, regarding glibc: Fix dladdr and nss Bug#791537 on hppa to be marked as done. This means that you claim that the problem has been dealt wi

Bug#809776: marked as done (glibc: Please add patch to support HUGE PAGES on hppa)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#809776: fixed in glibc 2.21-7 has caused the Debian Bug report #809776, regarding glibc: Please add patch to support HUGE PAGES on hppa to be marked as done. This means that you claim that the problem has been

Bug#808143: marked as done (bg_BG locale should use colon as time separator, not comma)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#808143: fixed in glibc 2.21-7 has caused the Debian Bug report #808143, regarding bg_BG locale should use colon as time separator, not comma to be marked as done. This means that you claim that the problem has

Bug#812441: glibc: CVE-2015-8778: Integer overflow in hcreate and hcreate_r

2016-01-23 Thread Salvatore Bonaccorso
Source: glibc Version: 2.19-18 Severity: important Tags: security upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18240 Hi, the following vulnerability was published for glibc. CVE-2015-8778[0]: Integer overflow in hcreate and hcreate_r If you fix the vulnerability please al

Bug#800900: marked as done (hurd-i386: changeset from r6489 breaks SIGBUS handling)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#800900: fixed in glibc 2.21-7 has caused the Debian Bug report #800900, regarding hurd-i386: changeset from r6489 breaks SIGBUS handling to be marked as done. This means that you claim that the problem has bee

Bug#809741: marked as done (glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation)

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#809741: fixed in glibc 2.21-7 has caused the Debian Bug report #809741, regarding glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation to be marked as done. This means that you claim that the

Bug#810322: marked as done (libc6:amd64: Unexpected asseration in pthread_mutex_unlock())

2016-01-23 Thread Debian Bug Tracking System
Your message dated Sat, 23 Jan 2016 23:34:54 + with message-id and subject line Bug#810322: fixed in glibc 2.21-7 has caused the Debian Bug report #810322, regarding libc6:amd64: Unexpected asseration in pthread_mutex_unlock() to be marked as done. This means that you claim that the problem h

[glibc] 01/01: New changelog entry

2016-01-23 Thread Aurelien Jarno
This is an automated email from the git hooks/post-receive script. aurel32 pushed a commit to branch sid in repository glibc. commit 9e41d9ddedf8862fb37091df2a3d3ffcd6d39c4f Author: Aurelien Jarno Date: Sun Jan 24 00:32:27 2016 +0100 New changelog entry --- debian/changelog | 6 ++ 1

[glibc] 01/02: Remove ldconfig wrapper, new debhelper versions use the trigger directly

2016-01-23 Thread Aurelien Jarno
This is an automated email from the git hooks/post-receive script. aurel32 pushed a commit to branch glibc-2.22 in repository glibc. commit cafff52ac961fd04d4243b42b27526a6b77cd3ec Author: Aurelien Jarno Date: Fri Jan 22 22:31:51 2016 +0100 Remove ldconfig wrapper, new debhelper versions

squeeze update of eglibc?

2016-01-23 Thread Thorsten Alteholz
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Squeeze version of eglibc: https://security-tracker.debian.org/tracker/CVE-2014-9761 https://security-tracker.debian.org/tracker/CVE-2015-8776 https://security-tracker.debian.org/tr

Bug#812403: libc6: remalloc(x, malloc_usage_size(x)) should not cause x to change.

2016-01-23 Thread Perry Lorier
Package: libc6 Severity: normal Tags: upstream Dear Maintainer, I believe that realloc(x, malloc_usage_size(x)) should possibly extend the size of the allocation of x, but not move it in memory. glibc appears to return a new block of memory for this idiom when the block is already "large", presu