Re: qemu: CVE-2016-7116

2016-09-04 Thread Hugo Lefeuvre
> Yes, qemu is supported (and there has was lots of file renaming after
> the Wheezy version). If you handle qemu please look at qemu-kvm as well
> (they're the same version).

Thanks for the hint.

By the way, could you explain me why this CVE is still labeled RESERVED,
although a public fix explaining the security issue has been released ?

-- 
 Hugo Lefeuvre (hle)|www.owl.eu.com
4096/ ACB7 B67F 197F 9B32 1533 431C AC90 AC3E C524 065E


signature.asc
Description: PGP signature


Re: qemu: CVE-2016-7116

2016-09-04 Thread Thorsten Alteholz

Hi Hugo,

are you aware that this CVE is marked as  in Jessie and soon will 
be in Wheezy as well.


So unless you disagree with this , it would be better to 
avoid any potential regression and not upload qemu or qemu-kvm.


 Thorsten



Re: qemu: CVE-2016-7116

2016-09-04 Thread Salvatore Bonaccorso
Hi Hugo,

On Sun, Sep 04, 2016 at 01:25:56PM +0200, Hugo Lefeuvre wrote:
> > Yes, qemu is supported (and there has was lots of file renaming after
> > the Wheezy version). If you handle qemu please look at qemu-kvm as well
> > (they're the same version).
> 
> Thanks for the hint.
> 
> By the way, could you explain me why this CVE is still labeled RESERVED,
> although a public fix explaining the security issue has been released ?

MITRE has assigned the CVE here:
https://marc.info/?l=oss-security&m=147259351226835&w=2 . Basically that
it is still RESERVED mean, that MITRE has not yet updated the
corresponding description entry in their database, at some point then
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116 will
contain the MITRE provided description.

Regards,
Salvatore



Wheezy update of jsch?

2016-09-04 Thread Thorsten Alteholz

Hello dear maintainer(s),

the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of jsch:
https://security-tracker.debian.org/tracker/source-package/jsch

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

Thank you very much.

Thorsten Alteholz,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup




Wheezy update of libtomcrypt?

2016-09-04 Thread Thorsten Alteholz

Hello Michael,

the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of libtomcrypt:
https://security-tracker.debian.org/tracker/CVE-2016-6129

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

Thank you very much.

Thorsten Alteholz,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup




Re: Wheezy update of libtomcrypt?

2016-09-04 Thread Michael Stapelberg
Thanks for your work on LTS.

Time does not permit me to do any of this work myself.

Please go ahead and make any changes as you see fit, there’s no need for my
review.

On Sun, Sep 4, 2016 at 5:38 PM, Thorsten Alteholz 
wrote:

> Hello Michael,
>
> the Debian LTS team would like to fix the security issues which are
> currently open in the Wheezy version of libtomcrypt:
> https://security-tracker.debian.org/tracker/CVE-2016-6129
>
> Would you like to take care of this yourself?
>
> If yes, please follow the workflow we have defined here:
> https://wiki.debian.org/LTS/Development
>
> If that workflow is a burden to you, feel free to just prepare an
> updated source package and send it to debian-lts@lists.debian.org
> (via a debdiff, or with an URL pointing to the source package,
> or even with a pointer to your packaging repository), and the members
> of the LTS team will take care of the rest. Indicate clearly whether you
> have tested the updated package or not.
>
> If you don't want to take care of this update, it's not a problem, we
> will do our best with your package. Just let us know whether you would
> like to review and/or test the updated package before it gets released.
>
> Thank you very much.
>
> Thorsten Alteholz,
>   on behalf of the Debian LTS team.
>
> PS: A member of the LTS team might start working on this update at
> any point in time. You can verify whether someone is registered
> on this update in this file:
> https://anonscm.debian.org/viewvc/secure-testing/data/dla-
> needed.txt?view=markup
>
>
>


-- 
Best regards,
Michael


LTS report for August 2016

2016-09-04 Thread Emilio Pozuelo Monfort
Hi,

This month I was allocated 14.75 hours to work on Debian-LTS. I spent 13.5 hours
doing the following:

- openjdk-7: after some back and forth, finally pushed the update for openjdk-7
- icedtea-web: pushed the update to make icedtea-plugin default to openjdk-7
- fontconfig: prepared, tested and uploaded security update
- tiff: prepared, tested and uploaded an update fixing several vulnerabilities.
  there still are some unfixed vulnerabilities which I'll look at soon
- cacti: prepared and tested and pushed package to fix regression
- gcc-4.8 & firefox: looked at building gcc-4.8 (gcc-mozilla) for wheezy.
  built and tested firefox_49.0~b1-1 against it

Thanks,
Emilio



Re: qemu: CVE-2016-7116

2016-09-04 Thread Guido Günther
Hi Thorsten,
On Sun, Sep 04, 2016 at 05:23:40PM +0200, Thorsten Alteholz wrote:
> Hi Hugo,
> 
> are you aware that this CVE is marked as  in Jessie and soon will be
> in Wheezy as well.
> 
> So unless you disagree with this , it would be better to avoid any
> potential regression and not upload qemu or qemu-kvm.

no-dsa should be used very scarcely in LTS since we don't have a s-p-u
to fix minor issues and reading the RedHat entry[1]:

"A privileged user inside guest could use this flaw to access undue
files on the host."

I think we should well fix this vulnerability.
Cheers,
 -- Guido

[1]: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7116



Re: qemu: CVE-2016-7116

2016-09-04 Thread Thorsten Alteholz

Hi Guido,

On Sun, 4 Sep 2016, Guido Günther wrote:

no-dsa should be used very scarcely in LTS since we don't have a s-p-u
to fix minor issues and reading the RedHat entry[1]:


yes, but ...


"A privileged user inside guest could use this flaw to access undue
files on the host."


... you should also cite:
"... host directory sharing via Plan 9 File System(9pfs) support ..."

The latest news on [1] is from 2008. I am not sure whether there are 
really that much installations in the wild that really use it.



I think we should well fix this vulnerability.


I still think it is not needed.

So qemu and qemu-kvm users: Do you use 9pfs on a Wheezy system?
(me does not)


  Thorsten

[1] http://9p.cat-v.org/News

Re: matrixssl

2016-09-04 Thread Christopher Samuel
On 02/09/16 18:42, Brian May wrote:

> sslio[8259]: fatal: unable to read cert or key file: no error

I found that error reported in an unrelated bug report, the solution
seems to be:

https://bugs.contribs.org/show_bug.cgi?id=7664#c4

> I have been hit by the problem lamented by Jean Franco whiel deploying Netsol 
> released certificates.
> 
> After much puzzling over the probLEM (I had done similar activities in the 
> past w/no problems whatsoever) I found out that converting the key with:
> 
> openssl rsa -in a.key -out b.key
> 
> and the cert with:
> 
> openssl x509 -in a.key -out b.key
> 
> (this last step i snot really necessary
> 
> and then using the - functionially equivalent - b.crt, b.key in place of 
> a.crt, a.key makes the issue go away.   
> 
> The problem appears to lie with sslio being unable to interpret the key file 
> - the ones that failed begin with 
> -BEGIN PRIVATE KEY-
> 
> while the onoe that succed begin with:
> 
> -BEGIN RSA PRIVATE KEY-


cheers,
Chris
-- 
 Christopher SamuelSenior Systems Administrator
 VLSCI - Victorian Life Sciences Computation Initiative
 Email: sam...@unimelb.edu.au Phone: +61 (0)3 903 55545
 http://www.vlsci.org.au/  http://twitter.com/vlsci



Re: qemu: CVE-2016-7116

2016-09-04 Thread Guido Günther
On Sun, Sep 04, 2016 at 08:06:11PM +0200, Thorsten Alteholz wrote:
> Hi Guido,
> 
> On Sun, 4 Sep 2016, Guido Günther wrote:
> > no-dsa should be used very scarcely in LTS since we don't have a s-p-u
> > to fix minor issues and reading the RedHat entry[1]:
> 
> yes, but ...
> 
> > "A privileged user inside guest could use this flaw to access undue
> > files on the host."
> 
> ... you should also cite:
> "... host directory sharing via Plan 9 File System(9pfs) support ..."

Sorry for the omission, I thought that was clear from the context
already. I know quiet some installations that share files via 9pfs
between host and guest since this is the simplest way if you don't want
to fiddle with network filesystems and it's easy to setup with common
tools like libvirt/virt-manager.
Cheers,
 -- Guido