Re: xen_4.1.6.1-1+deb7u2.dsc

2016-07-26 Thread Brian May
Bastian Blank  writes:

> Here you go:
>
> https://korte.credativ.com/~bbl/xen/xen_4.1.6.lts1~e98efe58-1.dsc

Thanks.

I don't have time right now, however will look at this early next week.
-- 
Brian May 



July Report

2016-07-26 Thread Brian May
In June 2017, my 5th month as a debian-lts contributor, I was allocated
14.7 hours and I used all the 14.7 hours.

In this time I did the following:

* Reviewed changes for xen.

* Updated and released security update for pidgin. Fixed:
CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323

* Updated and released binutils. Fixed:
   * CVE-2016-2226.patch: Exploitable buffer overflow
   * CVE-2016-4487.patch: Invalid write due to a use-after-free to array 
btypevec
   * CVE-2016-4488.patch: Invalid write due to a use-after-free to array 
ktypevec
   * CVE-2016-4489.patch: Invalid write due to integer overflow
   * CVE-2016-4490-1.patch: Write access violation
   * CVE-2016-4490-2.patch: Write access violation
   * CVE-2016-4492_CVE-2016-4493.patch: Read/write access violations
   * CVE-2016-6131.patch: Libiberty Demangler segfaults
   * CVE-2016-.patch: Stack buffer overflow when printing bad bytes in
 Intel Hex objects

* Researched security fix for kde4libs. In particular CVE-2016-6232.
-- 
Brian May 



Re: xen_4.1.6.1-1+deb7u2.dsc

2016-07-26 Thread Bastian Blank
Hi Guido

I fixed the problem with i386.  Turns out it was I way too large shift.

Fixed  sources:
https://korte.credativ.com/~bbl/xen/xen_4.1.6.lts1~f5a8dc19-1.dsc

On Mon, Jul 25, 2016 at 06:57:13PM +0200, Guido Günther wrote:
> Can you give us an idea what you tested and what would be needed to
> get this in a DLA ready state? Will you perform the remaining tests
> so we can upload the package and release the DSA?

I tested on AMD hardware the following combinations:
- x86-32 hypervisor, i386 system
- x86-64 hypervisor, i386 system
- x86-64 hypervisor, am64 system

I tested a minimal PV domain with the following config:
| name="test"
| kernel="/boot/vmlinuz-3.2.0-4-amd64"
| ramdisk="/boot/initrd.img-3.2.0-4-amd64"
| on_crash="preserve"

I tested HVM with a full debian 7 system.

I tested migration (non-live and live) with itself:
| # xen migrate --live test localhost

I'm missing any test on Intel hardware.  If this works I'll make a
release.

Regards,
Bastian

-- 
One does not thank logic.
-- Sarek, "Journey to Babel", stardate 3842.4



Re: Security support for libav in Debian Wheezy

2016-07-26 Thread Diego Biurrun

Sorry, I'm afraid I maintained too much radio silence..

On 2016-07-23 19:08, Markus Koschany wrote:

I am contacting you on behalf of the Debian LTS team. Two months ago you
voiced your interest in helping us to fix open security issues in libav.

https://security-tracker.debian.org/tracker/source-package/libav

Can you tell us more about the latest developments? If you have any
questions regarding Debian LTS work, please send them to the debian-lts
list and I will try to answer them in a timely manner.


I got sidetracked by other work and by trying to get access to the 
Google ClusterFuzz samples[1].  I have access to a bunch of them now, 
but not the whole lot and it turns out that I don't necessarily need 
them in each and every case to port fixes.  So yeah, that was a bit of a 
wild goose chase :-/


In any case I have the first set of three patches[2] queued up for 
pushing to the 0.8 branch. I've sent them to the libav-devel mailing 
list to give other devs a chance to react. I expect nobody to care about 
stale branches, however. Thus the ETA for the patches to hit the 0.8 
branch is tomorrow evening CET or the next morning at the latest.


I hope and expect to churn out a steady trickle of 1-3 backports per 
week going forward while not on vacation now that I have all the pieces 
for working with those old branches back in place.


best regards, Diego

[1] Things with names like 
"0231a17345734228011c6f35a64e4594/asan_heap-oob_1d92a72_3218_1213809a9e3affec77e4c191fdfdc0a9.mov" 
that go along references to Mateusz "j00ru" Jurczyk and Gynvael Coldwind.


[2] One backport from the Debian package, CVE-2015-1872, CVE-2015-5479.



Re: Wheezy update of libupnp?

2016-07-26 Thread Bálint Réczey
Hi Nick,

2016-07-19 15:35 GMT+02:00 Nick Leverton :
> On Tue, Jul 19, 2016 at 08:54:18AM +0200, Chris Lamb wrote:
>> Hello dear maintainer(s),
>>
>> the Debian LTS team would like to fix the security issues which are
>> currently open in the Wheezy version of libupnp:
>> https://security-tracker.debian.org/tracker/TEMP-000-867096
>>
>> Would you like to take care of this yourself?
>
> Hi,
>
> Thanks very much for the headsup on this.  I've a bit to do for Squeeze
> at the moment and would really appreciate any help your team can provide
> on LTS.  If I do get enough time though I'll check in on your task
> tracker as suggested.

I will prepare a fix for Wheezy tomorrow.

Cheers,
Balint



Security update of openssh for wheezy

2016-07-26 Thread Ola Lundqvist
Hi OpenSSH Maintainers and LTS team

I have prepared a security update of openssh for wheezy.

For more information about the issue solved see here:
https://security-tracker.debian.org/tracker/CVE-2016-6210
I have applied the same patch as in sid and it applied fine, except that I
had to change a call to a clear memory function to a loop instead. This
function is not available in wheezy.

You can find the debdiff here:
http://apt.inguza.net/wheezy-security/openssh/CVE-2016-6210.debdiff

You can also find the packages that I intend to upload here:
http://apt.inguza.net/wheezy-security/openssh/

I have regression tested and I could login still, and use the client too.
I could not reproduce the problem good enough to tell for sure that they
are solved. However they should be solved just as good as in sid and jessie.

If no-one objects I will upload this package in four days, that is on
Saturday.

Best regards

// Ola

-- 
 --- Inguza Technology AB --- MSc in Information Technology 
/  o...@inguza.comFolkebogatan 26\
|  o...@debian.org   654 68 KARLSTAD|
|  http://inguza.com/Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---