linux backport in jessie LTS

2018-04-22 Thread Ben Hutchings
The backports team decided in 2016 that backports suites will no longer
be updated once the corresponding stable suite enters LTS.  This
implies that jessie-backports will be closed at the end of May.

It is clear that a fair number of wheezy LTS users relied on backported
kernel versions and were caught out when this policy was applied to
wheezy (and not announced as clearly as it could have been).  I would
not be surprised if this recurs with jessie.

Therefore, would it make sense to add a Linux 4.9 backport to the
regular jessie and jessie-security suites?  Are there users currently
running jessie with Linux 4.9 and expecting to continue doing so
through the LTS period?

(Maintaining kernel backports is generally quite easy once the suite
they are backported from is stable.)

Ben.

-- 
Ben Hutchings
It is easier to write an incorrect program
than to understand a correct one.



signature.asc
Description: This is a digitally signed message part


Re: ruby1.9.1 test packages for wheezy

2018-04-22 Thread Santiago R.R.
El 19/04/18 a las 18:07, Gabriel Filion escribió:
> Hi there,
> 
> I've run a test on our setup here after getting a poke from Antoine.
> 
> I'm not sure that the test is actually conclusive of anything though..
> basically, it still works for us but that's probably because of how
> things are setup.
> 
> we run the puppet master with passenger
> 
> plus we've had some weird issues with puppet master 2.7 + ruby 1.9.3 so
> we're forcing the default ruby to be 1.8.7 on the master.
> 
> after upgrade of ruby, clients were still able to run against the
> puppetmaster.
> 

Thanks for your feedback, Gabriel! I will finish the upload for 1.9.1,
and include one for 1.8 along too.

I am still working on jessie and stretch versions.

Santiago


signature.asc
Description: PGP signature


Re: tiff: CVE-2018-8905: heap-based buffer overflow in LZWDecodeCompat

2018-04-22 Thread Hugo Lefeuvre
It looks like this buffer overflow is the consequence of an earlier buffer
overflow in the GetNextCodeCompat macro:

> #define GetNextCodeCompat(sp, bp, code) {   \
>  nextdata |= (unsigned long) *(bp)++ << nextbits;\
>  nextbits += 8;  \
>  if (nextbits < nbits) { \
>  nextdata |= (unsigned long) *(bp)++ << nextbits;\
>  nextbits += 8;  \
>  }   \
>  code = (hcode_t)(nextdata & nbitsmask); \
>  nextdata >>= nbits; \
>  nextbits -= nbits;  \
> }

The raw data buffer is read using the bp pointer without proper bound checking.
At some point, we start to read garbage, store it into the code variable which
is later used to create the codep. This invalid codep later triggers the second
overflow.

So now the question is: Why is this first buffer overflow happening ?

My guess is that the sample is declaring more strips than actually available, or
declares strips with incorrect size. I still have to check that however.

Regards,
 Hugo

-- 
 Hugo Lefeuvre (hle)|www.owl.eu.com
4096/ 9C4F C8BF A4B0 8FC5 48EB 56B8 1962 765B B9A8 BACA


signature.asc
Description: PGP signature