Jessie update of twig?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team has started fixing the security issues which are
currently open in the Jessie version of twig:
https://security-tracker.debian.org/tracker/CVE-2018-13818

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of twig updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team has already started working on this update.
You can verify who is registered on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of sam2p?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of sam2p:
https://security-tracker.debian.org/tracker/CVE-2018-12578
https://security-tracker.debian.org/tracker/CVE-2018-12601

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of sam2p updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of mutt?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of mutt:
https://security-tracker.debian.org/tracker/source-package/mutt

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of mutt updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of ruby-zip?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of ruby-zip:
https://security-tracker.debian.org/tracker/CVE-2018-1000544

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of ruby-zip updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of vim-syntastic?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of vim-syntastic:
https://security-tracker.debian.org/tracker/CVE-2018-11319

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of vim-syntastic updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of resiprocate?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of resiprocate:
https://security-tracker.debian.org/tracker/CVE-2018-12584

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of resiprocate updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of phpldapadmin?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of phpldapadmin:
https://security-tracker.debian.org/tracker/CVE-2018-12689

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of phpldapadmin updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of clamav?

2018-07-19 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of clamav:
https://security-tracker.debian.org/tracker/CVE-2018-0360
https://security-tracker.debian.org/tracker/CVE-2018-0361

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of clamav updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Re: Jessie update of phpldapadmin?

2018-07-19 Thread Fabio Tranchitella

Dear Mike,

I'm really sorry to inform you I don't have enough time to prepare the 
upload of phpldapadmin for the CVE.


Best regards,
Fabio

On 19/07/2018 16:25, Mike Gabriel wrote:

Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of phpldapadmin:
https://security-tracker.debian.org/tracker/CVE-2018-12689

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of phpldapadmin updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
   on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt





linux-4.9 in jessie, broken dependency on linux-base

2018-07-19 Thread Baptiste Jonglez
Hi,

I saw the recent announcement about linux-4.9 [1,2] in jessie.

However, these new packages are not installable without jessie-backports,
because they depend on linux-base >= 4.3~, while only linux-base 3.5 is
available on plain jessie:

# apt install linux-image-4.9.0-0.bpo.7-amd64
The following packages have unmet dependencies:
 linux-image-4.9.0-0.bpo.7-amd64 : Depends: linux-base (>= 4.3~) but 3.5 is 
to be installed

Aren't these linux-image-4.9* packages supposed to be used without
jessie-backports?  I may have misunderstood the intent.

Thanks and best regards,
Baptiste


[1] https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
[2] https://lists.debian.org/debian-lts-announce/2018/07/msg00021.html


signature.asc
Description: PGP signature


Re: linux-4.9 in jessie, broken dependency on linux-base

2018-07-19 Thread Ben Hutchings
On Thu, 2018-07-19 at 17:26 +0200, Baptiste Jonglez wrote:
> Hi,
> 
> I saw the recent announcement about linux-4.9 [1,2] in jessie.
> 
> However, these new packages are not installable without jessie-backports,
> because they depend on linux-base >= 4.3~, while only linux-base 3.5 is
> available on plain jessie:
> 
> # apt install linux-image-4.9.0-0.bpo.7-amd64
> The following packages have unmet dependencies:
>  linux-image-4.9.0-0.bpo.7-amd64 : Depends: linux-base (>= 4.3~) but 3.5 
> is to be installed
> 
> Aren't these linux-image-4.9* packages supposed to be used without
> jessie-backports?  I may have misunderstood the intent.

No-one should install these unless they are already using jessie-
backports.  The intent is primarily that they can be updated even
though jessie-backports will not be updated.

However, this dependency on a version not in jessie is a real bug.  It
is probably safe to update linux-base in jessie, but I'll have to take
some time to verify that.

Ben.

-- 
Ben Hutchings
We get into the habit of living before acquiring the habit of thinking.
 - Albert Camus



signature.asc
Description: This is a digitally signed message part


Re: #860064 dnsmasq will not start after dns-root-data upgrade

2018-07-19 Thread Christoph Martin
tags 860064 +stretch
tags 860064 +jessie
thanks

Am 01.07.2018 um 15:38 schrieb Adam D. Barratt:
> On Sun, 2018-07-01 at 11:38 +, Martin, Christoph wrote:
>> dns-root-data had an update a week before. the file with the dns root
>> keys was updated. at least the format has changed.
> 
> To re-iterate, no such change has happened recently in stretch.
> 
> I understand that the update in jessie may have introduced such a
> change, but at this stage there's unfortunately nothing that either the
> security or release teams can do about that, as jessie is EOL and has
> moved to the LTS team.

The file /usr/share/dns/root.ds was changed in both jessie and stretch
with the update at june 24th:

# ls -l /tmp/usr/share/dns/root.ds /usr/share/dns/root.ds
-rw-r--r-- 1 root root  83 Aug 24  2017 /tmp/usr/share/dns/root.ds
-rw-r--r-- 1 root root 180 Dec  8  2017 /usr/share/dns/root.ds

# diff -u /tmp/usr/share/dns/root.ds /usr/share/dns/root.ds
--- /tmp/usr/share/dns/root.ds  2017-08-24 11:37:46.0 +0200
+++ /usr/share/dns/root.ds  2017-12-08 07:31:40.0 +0100
@@ -1 +1,2 @@
-. IN DS 19036 8 2
49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E8FB5
+.  172800  IN  DS  19036 8 2
49aac11d7b6f6446702e54a1607371607a1a41855200fd2ce1cdde32f24e8fb5
+.  172800  IN  DS  20326 8 2
e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d

So both jessie and stretch are affected und should get an update of
/etc/init.d/dnsmasq .

The following patch fixes it:

# diff -u /etc/init.d/dnsmasq~ /etc/init.d/dnsmasq
--- /etc/init.d/dnsmasq~2015-05-05 11:17:08.0 +0200
+++ /etc/init.d/dnsmasq 2018-06-25 10:04:05.138221809 +0200
@@ -111,7 +111,8 @@
 ROOT_DS="/usr/share/dns/root.ds"

 if [ -f $ROOT_DS ]; then
-   DNSMASQ_OPTS="$DNSMASQ_OPTS `sed -e s/". IN DS "/--trust-anchor=.,/
-e s/" "/,/g $ROOT_DS | tr '\n' ' '`"
+#   DNSMASQ_OPTS="$DNSMASQ_OPTS `sed -e s/". IN DS "/--trust-anchor=.,/
-e s/" "/,/g $ROOT_DS | tr '\n' ' '`"
+   DNSMASQ_OPTS="$DNSMASQ_OPTS `sed -e
s/".*\sIN\sDS\s"/--trust-anchor=.,/ -e s/" "/,/g $ROOT_DS | tr '\n' ' '`"
 fi

 start()



-- 

Christoph Martin, Leiter Unix-Systeme
Zentrum für Datenverarbeitung, Uni-Mainz, Germany
 Anselm Franz von Bentzel-Weg 12, 55128 Mainz
 Telefon: +49(6131)3926337
 Instant-Messaging: Jabber/XMPP: mar...@jabber.uni-mainz.de

<>

signature.asc
Description: OpenPGP digital signature


Re: #860064 dnsmasq will not start after dns-root-data upgrade

2018-07-19 Thread Adam D. Barratt
On Thu, 2018-07-19 at 18:42 +0200, Christoph Martin wrote:
> tags 860064 +stretch
> tags 860064 +jessie
> thanks
> 
> Am 01.07.2018 um 15:38 schrieb Adam D. Barratt:
> > On Sun, 2018-07-01 at 11:38 +, Martin, Christoph wrote:
> > > dns-root-data had an update a week before. the file with the dns
> > > root
> > > keys was updated. at least the format has changed.
> > 
> > To re-iterate, no such change has happened recently in stretch.
[...]
> > The file /usr/share/dns/root.ds was changed in both jessie and
> stretch
> with the update at june 24th:

Please explain how the file was changed in stretch on that date.
Specifically, which version of dns-root-data was updated, from which
version.

Sorry to keep going on about this, but there wasn't a dns-root-data
update in the stretch point release that occurred on June 24th, so I'm
very confused as to what effect you're apparently seeing.

regards,

Adam



Re: #860064 dnsmasq will not start after dns-root-data upgrade

2018-07-19 Thread Adam D. Barratt
On Thu, 2018-07-19 at 18:23 +0100, Adam D. Barratt wrote:
> On Thu, 2018-07-19 at 18:42 +0200, Christoph Martin wrote:
> > tags 860064 +stretch
> > tags 860064 +jessie
> > thanks
> > 
> > Am 01.07.2018 um 15:38 schrieb Adam D. Barratt:
> > > On Sun, 2018-07-01 at 11:38 +, Martin, Christoph wrote:
> > > > dns-root-data had an update a week before. the file with the
> > > > dns
> > > > root
> > > > keys was updated. at least the format has changed.
> > > 
> > > To re-iterate, no such change has happened recently in stretch.
> 
> [...]
> > > The file /usr/share/dns/root.ds was changed in both jessie and
> > 
> > stretch
> > with the update at june 24th:
> 
> Please explain how the file was changed in stretch on that date.
> Specifically, which version of dns-root-data was updated, from which
> version.
> 
> Sorry to keep going on about this, but there wasn't a dns-root-data
> update in the stretch point release that occurred on June 24th, so
> I'm very confused as to what effect you're apparently seeing.

To correct myself, there wasn't even a stretch point release on that
date, just a jessie one. The remainder of my request still stands -
please provide exact details of the upgrade demonstrating the breakage
in stretch, including binary package names and before and after
versions.

Regards,

Adam



Re: Jessie update of clamav?

2018-07-19 Thread Sebastian Andrzej Siewior
On 2018-07-19 17:06:30 [+0200], Mike Gabriel wrote:
> The Debian LTS team would like to fix the security issues which are
> currently open in the Jessie version of clamav:
> https://security-tracker.debian.org/tracker/CVE-2018-0360
> https://security-tracker.debian.org/tracker/CVE-2018-0361
> 
> Would you like to take care of this yourself?

I will look after the Stretch update. I won't do it for Jessie. I
*strongly* recommend that you take the Stretch version and and push it
into Jessie. That means you end up with 0.100.1 and not 0.100.0 plus
those two CVEs. One thing that did not receive a CVE was the fix in the
libmspack library which in bundled in clamav and libmspack upstream
fixed it differently (hint: the debian version uses the library). The
same goes for the unrar parts.

> PS: A member of the LTS team might start working on this update at
> any point in time. You can verify whether someone is registered
> on this update in this file:
> https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
As I said, I strongly recommend to not only fix the CVEs mentioned.
Upstream is not very good at it.

Sebastian



Re: #860064 dnsmasq will not start after dns-root-data upgrade

2018-07-19 Thread Christoph Martin
tags 860064 -stretch
thanks

Am 19.07.2018 um 19:34 schrieb Adam D. Barratt:

>>
>> Please explain how the file was changed in stretch on that date.
>> Specifically, which version of dns-root-data was updated, from which
>> version.
>>
>> Sorry to keep going on about this, but there wasn't a dns-root-data
>> update in the stretch point release that occurred on June 24th, so
>> I'm very confused as to what effect you're apparently seeing.
> 
> To correct myself, there wasn't even a stretch point release on that
> date, just a jessie one. The remainder of my request still stands -
> please provide exact details of the upgrade demonstrating the breakage
> in stretch, including binary package names and before and after
> versions.

Sorry, I have to apologize.

I manage several hundred Debian machines. Most of them are already
stretch. I was shure that one of the two machines which I checked is
stretch, but it is still jessie. I found out when I tried to gather the
data, which you regested:

>From jessie dpkg.log:

2018-06-24 06:49:52 upgrade dns-root-data:all 2017072601~deb8u1
2017072601~deb8u2

So. Sorry again. The bug is really only in jessie and it came with the
update of dns-root-data for jessie on 2018-06-24.

So hopefully the Debian-LTS team can do something about the problem in
Jessie.

Regards
Christoph



Re: Jessie update of clamav?

2018-07-19 Thread Mike Gabriel

Hi all,

On  Do 19 Jul 2018 21:18:13 CEST, Sebastian Andrzej Siewior wrote:


On 2018-07-19 17:06:30 [+0200], Mike Gabriel wrote:

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of clamav:
https://security-tracker.debian.org/tracker/CVE-2018-0360
https://security-tracker.debian.org/tracker/CVE-2018-0361

Would you like to take care of this yourself?


I will look after the Stretch update. I won't do it for Jessie. I
*strongly* recommend that you take the Stretch version and and push it
into Jessie. That means you end up with 0.100.1 and not 0.100.0 plus
those two CVEs. One thing that did not receive a CVE was the fix in the
libmspack library which in bundled in clamav and libmspack upstream
fixed it differently (hint: the debian version uses the library). The
same goes for the unrar parts.


PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt

As I said, I strongly recommend to not only fix the CVEs mentioned.
Upstream is not very good at it.

Sebastian


Thanks for the quick response and the feedback. Much appreciated. We  
will discuss your proposal and someone will pick up the task soon.


Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4354) 8390 139

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgpDNpx0y_d_J.pgp
Description: Digitale PGP-Signatur


Re: Jessie update of phpldapadmin?

2018-07-19 Thread Mike Gabriel

Hi Fabio,

On  Do 19 Jul 2018 16:34:36 CEST, Fabio Tranchitella wrote:


Dear Mike,

On 19/07/2018 16:25, Mike Gabriel wrote:

Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of phpldapadmin:
https://security-tracker.debian.org/tracker/CVE-2018-12689

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of phpldapadmin updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt



I'm really sorry to inform you I don't have enough time to prepare  
the upload of phpldapadmin for the CVE.


That is totally fine. One reason for having a paid team for Debian LTS  
is that many package maintainers normally lack bandwidth to handle  
long-term support of packages.


The LTS team will take over.

light+love,
Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4354) 8390 139

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgpzbS2PfxEtF.pgp
Description: Digitale PGP-Signatur


Re: linux-4.9 in jessie, broken dependency on linux-base

2018-07-19 Thread Baptiste Jonglez
On 19-07-18, Ben Hutchings wrote:
> On Thu, 2018-07-19 at 17:26 +0200, Baptiste Jonglez wrote:
> > I saw the recent announcement about linux-4.9 [1,2] in jessie.
> > 
> > However, these new packages are not installable without jessie-backports,
> > because they depend on linux-base >= 4.3~, while only linux-base 3.5 is
> > available on plain jessie:
> > 
> > # apt install linux-image-4.9.0-0.bpo.7-amd64
> > The following packages have unmet dependencies:
> >  linux-image-4.9.0-0.bpo.7-amd64 : Depends: linux-base (>= 4.3~) but 
> > 3.5 is to be installed
> > 
> > Aren't these linux-image-4.9* packages supposed to be used without
> > jessie-backports?  I may have misunderstood the intent.
> 
> No-one should install these unless they are already using jessie-
> backports.  The intent is primarily that they can be updated even
> though jessie-backports will not be updated.

Ok, but that is only for updating from the kernel version in jessie-backports.

To use linux 4.9 on a fresh jessie, it looks like jessie-backports is no
longer needed? (notwithstanding the bug below)

> However, this dependency on a version not in jessie is a real bug.  It
> is probably safe to update linux-base in jessie, but I'll have to take
> some time to verify that.

Ok, thanks!

Baptiste


signature.asc
Description: PGP signature


Re: linux-4.9 in jessie, broken dependency on linux-base

2018-07-19 Thread Ben Hutchings
On Fri, 2018-07-20 at 01:09 +0200, Baptiste Jonglez wrote:
> On 19-07-18, Ben Hutchings wrote:
> > On Thu, 2018-07-19 at 17:26 +0200, Baptiste Jonglez wrote:
> > > I saw the recent announcement about linux-4.9 [1,2] in jessie.
> > > 
> > > However, these new packages are not installable without jessie-backports,
> > > because they depend on linux-base >= 4.3~, while only linux-base 3.5 is
> > > available on plain jessie:
> > > 
> > > # apt install linux-image-4.9.0-0.bpo.7-amd64
> > > The following packages have unmet dependencies:
> > >  linux-image-4.9.0-0.bpo.7-amd64 : Depends: linux-base (>= 4.3~) but 
> > > 3.5 is to be installed
> > > 
> > > Aren't these linux-image-4.9* packages supposed to be used without
> > > jessie-backports?  I may have misunderstood the intent.
> > 
> > No-one should install these unless they are already using jessie-
> > backports.  The intent is primarily that they can be updated even
> > though jessie-backports will not be updated.
> 
> Ok, but that is only for updating from the kernel version in jessie-backports.
> 
> To use linux 4.9 on a fresh jessie, it looks like jessie-backports is no
> longer needed? (notwithstanding the bug below)

Yes, that's the intent.

However some systems will need firmware that is not included in the
non-free section for jessie.  I will probably update firmware-nonfree
as well.

Ben.

> > However, this dependency on a version not in jessie is a real bug.  It
> > is probably safe to update linux-base in jessie, but I'll have to take
> > some time to verify that.
> 
> Ok, thanks!
> 
> Baptiste
-- 
Ben Hutchings
No political challenge can be met by shopping. - George Monbiot



signature.asc
Description: This is a digitally signed message part


Re: Advice for building tomcat8 on jessie?

2018-07-19 Thread tony mancill
On Wed, Jul 18, 2018 at 02:48:56PM -0400, Roberto C. Sánchez wrote:
> On Mon, Jul 09, 2018 at 09:07:00AM -0400, Roberto C. Sánchez wrote:
> > On Sun, Jul 08, 2018 at 09:15:26PM -0700, tony mancill wrote:
> > > Hello Roberto,
> > > 
> > > If you're still running into build failures, I would be interested in
> > > taking a look.  Could you push your branch to Salsa when you have a
> > > chance?
> > > 
> > 
> > Hi Tony,
> > 
> > I am still getting failures.  I have pushed the minimal set of changes
> > that I think should work.  Here is my fork on Salsa:
> > 
> > g...@salsa.debian.org:roberto/tomcat8.git
> > 
> 
> Anything?

Hi Roberto,

I was able to build your jessie branch in clean jessie chroot without
any problems.  I use sbuild on amd64.  It took about 50 minutes:

> Build Architecture: amd64
> Build Type: full
> Build-Space: n/a
> Build-Time: 3049
> Distribution: jessie
> Host Architecture: amd64
> Install-Time: 39
> Job: /data/debian/sponsor/tomcat8/build-area/tomcat8_8.0.14-1+deb8u12.dsc
> Lintian: warn
> Machine Architecture: amd64
> Package: tomcat8
> Package-Time: 3093
> Piuparts: fail
> Source-Version: 8.0.14-1+deb8u12
> Space: n/a
> Status: successful
> Version: 8.0.14-1+deb8u12

Piuparts isn't consistent on my box, so I wouldn't worry about that. It
seems okay.

Cheers,
tony


signature.asc
Description: PGP signature


Re: Advice for building tomcat8 on jessie?

2018-07-19 Thread Roberto C . Sánchez
On Thu, Jul 19, 2018 at 10:35:50PM -0700, tony mancill wrote:
> 
> Hi Roberto,
> 
> I was able to build your jessie branch in clean jessie chroot without
> any problems.  I use sbuild on amd64.  It took about 50 minutes:
> 
> > Build Architecture: amd64
> > Build Type: full
> > Build-Space: n/a
> > Build-Time: 3049
> > Distribution: jessie
> > Host Architecture: amd64
> > Install-Time: 39
> > Job: /data/debian/sponsor/tomcat8/build-area/tomcat8_8.0.14-1+deb8u12.dsc
> > Lintian: warn
> > Machine Architecture: amd64
> > Package: tomcat8
> > Package-Time: 3093
> > Piuparts: fail
> > Source-Version: 8.0.14-1+deb8u12
> > Space: n/a
> > Status: successful
> > Version: 8.0.14-1+deb8u12
> 
> Piuparts isn't consistent on my box, so I wouldn't worry about that. It
> seems okay.
> 


Tony,

That is very puzzling.  Do you mind sending me the .build file along
with the complete command you used to invoke the build so that I can
compare it to what I am doing on my system?  If the file would be too
large for the mailing list, feel free to mail it to me directly.

Regards,

-Roberto

-- 
Roberto C. Sánchez