Re: Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Thank you On Tue, Jul 7, 2020, 1:24 PM Samuel Henrique wrote: > > Please go ahead. > > Thank you Adam, > > nmap_7.70+dfsg1-6+deb10u1_source.changes ACCEPTED into > proposed-updates->stable-new > > Regards, > > -- > Samuel Henrique > >
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
> Please go ahead. Thank you Adam, nmap_7.70+dfsg1-6+deb10u1_source.changes ACCEPTED into proposed-updates->stable-new Regards, -- Samuel Henrique
Processed: Re: Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Processing control commands: > tags -1 + confirmed Bug #964228 [release.debian.org] buster-pu: package nmap/7.70+dfsg1-6+deb10u1 Added tag(s) confirmed. -- 964228: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964228 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Control: tags -1 + confirmed On Fri, 2020-07-03 at 22:19 +0100, Samuel Henrique wrote: > A backported upstream patch [0] is required to fix #940284 [1] on > nmap; > Bug title: autogeneration of ssl key in ssl server mode of ncat is > broken > > The issue itself is well described in both BTS [1] and the upstream > bug report [2], but the summary of it is that the openssl shipped > with Buster requires a key with minimum size of 2048b, while nmap > 7.70 generates one sized 1024b. This has been fixed in 7.80 (which is > the version on Testing right now). Please go ahead. Regards, Adam
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Samuel Henrique do you know where backdoor is I believe you don't On Fri, Jul 3, 2020, 4:24 PM Samuel Henrique wrote: > Package: release.debian.org > Severity: normal > Tags: buster > User: release.debian@packages.debian.org > Usertags: pu > > A backported upstream patch [0] is required to fix #940284 [1] on nmap; > Bug title: autogeneration of ssl key in ssl server mode of ncat is broken > > The issue itself is well described in both BTS [1] and the upstream > bug report [2], but the summary of it is that the openssl shipped with > Buster requires a key with minimum size of 2048b, while nmap 7.70 > generates one sized 1024b. This has been fixed in 7.80 (which is the > version on Testing right now). > > The debdiff is attached to this email, > > Thanks, > > [0] > https://github.com/nmap/nmap/commit/25db5fbb0d8fb88b6e7f4f298c862cd05ed0f8b1 > [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940284 > [2] https://github.com/nmap/nmap/pull/1310 > > -- > Samuel Henrique >
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Yes, it is correct. On Sun, Jul 5, 2020, 7:00 PM Samuel Henrique wrote: > Hello, I believe you picked the wrong bug id, could you double check that, > please? > > Thanks >
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Hello, I believe you picked the wrong bug id, could you double check that, please? Thanks
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
> tags -1 + confirmed Bug #964350 [release.debian.org] buster-pu: package intel-microcode/3.20200616.1~deb10u1 Added tag(s) confirmed. On Fri, Jul 3, 2020, 4:24 PM Samuel Henrique wrote: > Package: release.debian.org > Severity: normal > Tags: buster > User: release.debian@packages.debian.org > Usertags: pu > > A backported upstream patch [0] is required to fix #940284 [1] on nmap; > Bug title: autogeneration of ssl key in ssl server mode of ncat is broken > > The issue itself is well described in both BTS [1] and the upstream > bug report [2], but the summary of it is that the openssl shipped with > Buster requires a key with minimum size of 2048b, while nmap 7.70 > generates one sized 1024b. This has been fixed in 7.80 (which is the > version on Testing right now). > > The debdiff is attached to this email, > > Thanks, > > [0] > https://github.com/nmap/nmap/commit/25db5fbb0d8fb88b6e7f4f298c862cd05ed0f8b1 > [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940284 > [2] https://github.com/nmap/nmap/pull/1310 > > -- > Samuel Henrique >
Bug#964228: buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu A backported upstream patch [0] is required to fix #940284 [1] on nmap; Bug title: autogeneration of ssl key in ssl server mode of ncat is broken The issue itself is well described in both BTS [1] and the upstream bug report [2], but the summary of it is that the openssl shipped with Buster requires a key with minimum size of 2048b, while nmap 7.70 generates one sized 1024b. This has been fixed in 7.80 (which is the version on Testing right now). The debdiff is attached to this email, Thanks, [0] https://github.com/nmap/nmap/commit/25db5fbb0d8fb88b6e7f4f298c862cd05ed0f8b1 [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940284 [2] https://github.com/nmap/nmap/pull/1310 -- Samuel Henrique nmap_7.70+dfsg1-6+deb10u1.debdiff Description: Binary data