Re: Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-07 Thread R hertoric
Thank you

On Tue, Jul 7, 2020, 1:24 PM Samuel Henrique  wrote:

> > Please go ahead.
>
> Thank you Adam,
>
> nmap_7.70+dfsg1-6+deb10u1_source.changes ACCEPTED into
> proposed-updates->stable-new
>
> Regards,
>
> --
> Samuel Henrique 
>
>


Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-07 Thread Samuel Henrique
> Please go ahead.

Thank you Adam,

nmap_7.70+dfsg1-6+deb10u1_source.changes ACCEPTED into
proposed-updates->stable-new

Regards,

-- 
Samuel Henrique 



Processed: Re: Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-07 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #964228 [release.debian.org] buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Added tag(s) confirmed.

-- 
964228: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964228
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-07 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Fri, 2020-07-03 at 22:19 +0100, Samuel Henrique wrote:
> A backported upstream patch [0] is required to fix #940284 [1] on
> nmap;
> Bug title: autogeneration of ssl key in ssl server mode of ncat is
> broken
> 
> The issue itself is well described in both BTS [1] and the upstream
> bug report [2], but the summary of it is that the openssl shipped
> with Buster requires a key with minimum size of 2048b, while nmap
> 7.70 generates one sized 1024b. This has been fixed in 7.80 (which is
> the version on Testing right now).

Please go ahead.

Regards,

Adam



Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-07 Thread R hertoric
Samuel Henrique do you know where backdoor is I believe you don't

On Fri, Jul 3, 2020, 4:24 PM Samuel Henrique  wrote:

> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> A backported upstream patch [0] is required to fix #940284 [1] on nmap;
> Bug title: autogeneration of ssl key in ssl server mode of ncat is broken
>
> The issue itself is well described in both BTS [1] and the upstream
> bug report [2], but the summary of it is that the openssl shipped with
> Buster requires a key with minimum size of 2048b, while nmap 7.70
> generates one sized 1024b. This has been fixed in 7.80 (which is the
> version on Testing right now).
>
> The debdiff is attached to this email,
>
> Thanks,
>
> [0]
> https://github.com/nmap/nmap/commit/25db5fbb0d8fb88b6e7f4f298c862cd05ed0f8b1
> [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940284
> [2] https://github.com/nmap/nmap/pull/1310
>
> --
> Samuel Henrique 
>


Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-05 Thread R hertoric
Yes, it is correct.

On Sun, Jul 5, 2020, 7:00 PM Samuel Henrique  wrote:

> Hello, I believe you picked the wrong bug id, could you double check that,
> please?
>
> Thanks
>


Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-05 Thread Samuel Henrique
Hello, I believe you picked the wrong bug id, could you double check that,
please?

Thanks


Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-05 Thread R hertoric
> tags -1 + confirmed
Bug #964350 [release.debian.org] buster-pu: package
intel-microcode/3.20200616.1~deb10u1
Added tag(s) confirmed.

On Fri, Jul 3, 2020, 4:24 PM Samuel Henrique  wrote:

> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> A backported upstream patch [0] is required to fix #940284 [1] on nmap;
> Bug title: autogeneration of ssl key in ssl server mode of ncat is broken
>
> The issue itself is well described in both BTS [1] and the upstream
> bug report [2], but the summary of it is that the openssl shipped with
> Buster requires a key with minimum size of 2048b, while nmap 7.70
> generates one sized 1024b. This has been fixed in 7.80 (which is the
> version on Testing right now).
>
> The debdiff is attached to this email,
>
> Thanks,
>
> [0]
> https://github.com/nmap/nmap/commit/25db5fbb0d8fb88b6e7f4f298c862cd05ed0f8b1
> [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940284
> [2] https://github.com/nmap/nmap/pull/1310
>
> --
> Samuel Henrique 
>


Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1

2020-07-03 Thread Samuel Henrique
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

A backported upstream patch [0] is required to fix #940284 [1] on nmap;
Bug title: autogeneration of ssl key in ssl server mode of ncat is broken

The issue itself is well described in both BTS [1] and the upstream
bug report [2], but the summary of it is that the openssl shipped with
Buster requires a key with minimum size of 2048b, while nmap 7.70
generates one sized 1024b. This has been fixed in 7.80 (which is the
version on Testing right now).

The debdiff is attached to this email,

Thanks,

[0] https://github.com/nmap/nmap/commit/25db5fbb0d8fb88b6e7f4f298c862cd05ed0f8b1
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940284
[2] https://github.com/nmap/nmap/pull/1310

-- 
Samuel Henrique 


nmap_7.70+dfsg1-6+deb10u1.debdiff
Description: Binary data