Your message dated Tue, 26 Sep 2023 16:28:07 +0000 with message-id <e1qlaut-009b98...@fasolo.debian.org> and subject line Bug#1051399: Removed package(s) from unstable has caused the Debian Bug report #1040154, regarding collada2gltf: embedded yajl is vulnerable to CVE-2023-33460. to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1040154: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040154 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: yajl Version: 2.1.0-2 Severity: important Tags: security upstream patch X-Debbugs-Cc: Debian Security Team <t...@security.debian.org> The following CVE was published for yajl: CVE-2023-33460[0]: There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash. Upstream Issue [1] links to a potential patch [2] I'm filing this bug as I'm going to fix the issue for ELTS (stretch/jessie) and then possibly also will NMU for sid, bookworm and bullseye and buster. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. [0] https://security-tracker.debian.org/tracker/CVE-2023-33460 [1] https://github.com/lloyd/yajl/issues/250 [2] https://github.com/openEuler-BaseService/yajl/commit/23a122eddaa28165a6c219000adcc31ff9a8a698 -- Cheers, tobi -- System Information: Debian Release: 12.0 APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'oldstable-security'), (500, 'oldoldstable'), (500, 'unstable'), (500, 'testing'), (500, 'oldstable'), (100, 'bullseye-fasttrack'), (100, 'bullseye-backports-staging'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-9-amd64 (SMP w/12 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Version: 20140924-9+rm Dear submitter, as the package collada2gltf has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/1051399 The version of this package that was in Debian prior to this removal can still be found using https://snapshot.debian.org/. Please note that the changes have been done on the master archive and will not propagate to any mirrors until the next dinstall run at the earliest. This message was generated automatically; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org. Debian distribution maintenance software pp. Scott Kitterman (the ftpmaster behind the curtain)
--- End Message ---