LTS report for November 2019 - Abhijith PA

2019-11-29 Thread Abhijith PA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

November was my 21st month as a Debian LTS paid contributor. I was
assigned 8 hours and I spent all of them for the following:

 * libssh2: Fixed CVE-2019-17498, tested and uploaded. DLA[1]

 * slurm-lnll: Backported a huge part of CVE-2019-12838, CVE-2019-6438
   after combing through the upstream changes history. Currently testing
   the build and will be uploaded soon. Thanks to Gennaro Oliva for
   helping in testing. Package is available here[2].

 * otrs2: Started Working on CVE-2019-18179, CVE-2019-18180.



Regards
Abhijith PA


[1] - https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html
[2] -
https://people.debian.org/~abhijith/upload/slurm-llnl_14.03.9-5+deb8u5.dsc
-BEGIN PGP SIGNATURE-
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=xnnZ
-END PGP SIGNATURE-



Jessie update of ssvnc?

2019-11-29 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of ssvnc:
https://security-tracker.debian.org/tracker/CVE-2018-20020
https://security-tracker.debian.org/tracker/CVE-2018-20021
https://security-tracker.debian.org/tracker/CVE-2018-20022
https://security-tracker.debian.org/tracker/CVE-2018-20024

These security issues have recently become known while looking
into all Debian packages that bundle some or another version
of code originally derived from the libvncserver source package.

I will soon send a .debdiff to the Debian bugtracker that resolves above
named issues for ssvnc in Debian jessie. The patches should be easily
forward-portable to ssvnc in stretch, buster and testing/unstable.

Would you like to take care of the jessie LTS upload yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just review the
proposed fixes in the source package and give feedback, if there is any.
I, with my LTS team member hat on, will take care of the upload then.

If you don't want to take care of this update at all, it's not a problem,
we will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of ssvnc updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Re: RFS: 389-ds-base

2019-11-29 Thread Mike Gabriel

Hi Utkarsh,

On  Mo 25 Nov 2019 02:11:35 CET, Utkarsh Gupta wrote:


Hey,

I have fixed CVE-2019-14824 for 389-ds-base and uploaded the same to
mentors.d.net.
The relevant .dsc could be found at [1].
Requesting to upload the same on my behalf.

Attaching the DLA file for the same.

Also, sent a patch for (Stretch,) Buster, Bullseye, and Sid to the
maintainer. CCed #944150.


Best,
Utkarsh
---
[1]:
https://mentors.debian.net/debian/pool/main/3/389-ds-base/389-ds-base_1.3.3.5-4+deb8u7.dsc


Sorry for the delay. Looking into it right now.

Mike (with LTS frontdesk hat on)

--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp3nBL3t8Fg8.pgp
Description: Digitale PGP-Signatur


Re: RFS: 389-ds-base

2019-11-29 Thread Mike Gabriel

Hi,

On  Mo 25 Nov 2019 02:11:35 CET, Utkarsh Gupta wrote:


Hey,

I have fixed CVE-2019-14824 for 389-ds-base and uploaded the same to
mentors.d.net.
The relevant .dsc could be found at [1].
Requesting to upload the same on my behalf.

Attaching the DLA file for the same.

Also, sent a patch for (Stretch,) Buster, Bullseye, and Sid to the
maintainer. CCed #944150.


Best,
Utkarsh
---
[1]:
https://mentors.debian.net/debian/pool/main/3/389-ds-base/389-ds-base_1.3.3.5-4+deb8u7.dsc


Upload to security-master now.

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp8fJc2LbsIt.pgp
Description: Digitale PGP-Signatur


Re: RFS: tnef

2019-11-29 Thread Mike Gabriel

Hi,

On  Mo 25 Nov 2019 06:00:51 CET, Utkarsh Gupta wrote:


Hey,

I have fixed CVE-2019-18849 for tnef and uploaded the same to mentors.d.net.
The relevant .dsc could be found at [1].
Requesting to upload the same on my behalf.

Attaching the DLA file for the same.

Also, sent a patch for Stretch, Buster, Bullseye, and Sid to the
maintainer. CCed #944851 and the Security team as well.


Best,
Utkarsh
---
[1]:
https://mentors.debian.net/debian/pool/main/t/tnef/tnef_1.4.9-1+deb8u4.dsc


Uploaded to security-master now.

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpCEl1eXdxAi.pgp
Description: Digitale PGP-Signatur


Re: RFS: 389-ds-base

2019-11-29 Thread Holger Levsen
Hi Mike, Utkarsh,

On Fri, Nov 29, 2019 at 12:24:34PM +, Mike Gabriel wrote:
> Sorry for the delay. Looking into it right now.
> Mike (with LTS frontdesk hat on)

thanks a lot for this and the uploads, Mike! Utkarsh has pinged me
privately last night and thus it was on my list for today, but I'm glad
to scratch it from there now! ;)


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C



signature.asc
Description: PGP signature


Re: RFS: 389-ds-base

2019-11-29 Thread Mike Gabriel

Hi Holger,

On  Fr 29 Nov 2019 13:46:23 CET, Holger Levsen wrote:


Hi Mike, Utkarsh,

On Fri, Nov 29, 2019 at 12:24:34PM +, Mike Gabriel wrote:

Sorry for the delay. Looking into it right now.
Mike (with LTS frontdesk hat on)


thanks a lot for this and the uploads, Mike! Utkarsh has pinged me
privately last night and thus it was on my list for today, but I'm glad
to scratch it from there now! ;)


I saw those mails yesterday and wondered why nobody picked those RFSs up...

Then I realized this week's frontdesk hat of mine..., and it still  
took a day for the bells to start ringing gently, that this might be  
my task...


You could hear the clockwork creak in my brain before the bell rang, tststs...

:-)
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp7PoBvEvRMT.pgp
Description: Digitale PGP-Signatur


Jessie update of libjackson-json-java?

2019-11-29 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of libjackson-json-java:
https://security-tracker.debian.org/tracker/CVE-2019-10172

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of libjackson-json-java updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of asterisk?

2019-11-29 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of asterisk:
https://security-tracker.debian.org/tracker/CVE-2019-18790
https://security-tracker.debian.org/tracker/CVE-2019-18610

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of asterisk updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Jessie update of proftpd-dfsg?

2019-11-29 Thread Mike Gabriel
Dear maintainer(s),

The Debian LTS team would like to fix the security issues which are
currently open in the Jessie version of proftpd-dfsg:
https://security-tracker.debian.org/tracker/CVE-2019-19269
https://security-tracker.debian.org/tracker/CVE-2019-19270
https://security-tracker.debian.org/tracker/CVE-2019-19271
https://security-tracker.debian.org/tracker/CVE-2019-19272

Would you like to take care of this yourself?

If yes, please follow the workflow we have defined here:
https://wiki.debian.org/LTS/Development

If that workflow is a burden to you, feel free to just prepare an
updated source package and send it to debian-lts@lists.debian.org
(via a debdiff, or with an URL pointing to the source package,
or even with a pointer to your packaging repository), and the members
of the LTS team will take care of the rest. Indicate clearly whether you
have tested the updated package or not.

If you don't want to take care of this update, it's not a problem, we
will do our best with your package. Just let us know whether you would
like to review and/or test the updated package before it gets released.

You can also opt-out from receiving future similar emails in your
answer and then the LTS Team will take care of proftpd-dfsg updates
for the LTS releases.

Thank you very much.

Mike Gabriel,
  on behalf of the Debian LTS team.

PS: A member of the LTS team might start working on this update at
any point in time. You can verify whether someone is registered
on this update in this file:
https://salsa.debian.org/security-tracker-team/security-tracker/raw/master/data/dla-needed.txt
-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



signature.asc
Description: PGP signature


Re: RFT: OpenJDK 7 7u241-2.6.20-1~deb8u1

2019-11-29 Thread Roberto C . Sánchez
On Tue, Nov 26, 2019 at 04:01:44PM +0100, Markus Koschany wrote:
> Hello,
> 
> I have uploaded a new version of OpenJDK 7 to
> 
> https://people.debian.org/~apo/openjdk7/amd64/
> 
> including all binaries and sources, along with a signed .changes file.
> 
> Please let me know if you find any regressions from the current released
> version 7u231-2.6.19-1~deb8u2.
> 

I have spent some time working on bringing the autopkg tests to
openjdk-7 for wheezy.  Here is a summary of my findings so far:

- the openjdk-11 autopkg tests, which Markus suggested to me as a
  potential starting point via direct email, are substantially different
  to the point where making them work with openjdk-7 is likely more
  difficult than it is worth; the openjdk-8 tests, however, make for a
  better starting point
- the openjdk-8 tests contain some restrictions (i.e., skippable and
  flaky) which do seem to cause errors when running the tests on wheezy
- apart from removing the skippable and flaky restrictions, the scripts
  in debian/tests (taken from openjdk-8) need only some minor tweaks to
  be able to function and execute
- in order to run any autopkg test suite on wheezy, it must be done from
  a host environment of stretch or older; the dpkg in buster produces
  .deb archives which the older dpkg in wheezy is not capable of reading
  (the specific error had to do with a not understandable control.tar.xz
  member)
- the naming conventions are a bit different in the openjdk-7 package
  with respect to the jtreg report files; interestingly, the packages I
  build locally seem to include the failed test report (used by the
  jtdiff-autopkgtest.sh to compare the results of the test suite in the
  last version with those produced by the autopkgtest run), while the
  packages in the archive (on deb.freexian.com, that is) do not contain
  the jtreg support files
- after finally figuring out the last item, it seems that I will need to
  rebuild the last version to generate the necessary jtreg reports, then
  use those for autopkg test to make a comparison to the current update
  we are preparing; I looked in the archive [0] and it seems that the
  jessie openjdk-7 packages ship the necessary files so the rebuild
  should not be needed for the jessie opnejdk-7

I still need to work on tweaking the scripts under debian/tests and will
provide a further update when I have something that at least somewhat
works.

Regards,

-Roberto

-- 
Roberto C. Sánchez



Re: RFT: OpenJDK 7 7u241-2.6.20-1~deb8u1

2019-11-29 Thread Roberto C . Sánchez
On Fri, Nov 29, 2019 at 10:48:06AM -0500, Roberto C. Sánchez wrote:
> 
> I still need to work on tweaking the scripts under debian/tests and will
> provide a further update when I have something that at least somewhat
> works.
> 
I have been able to get a "working" autopkgtest such that the test
executes and completes.  At the moment the test passes, but I need
ensure that the result is correct.  The autopkgtest which I used from
openjdk-8 to form the basis of what I implemented for openjdk-7 assumes
some differences in layout of the test reports generated at build time.
I will continue investigating and update again when there is more to
report.

Regards,

-Roberto
-- 
Roberto C. Sánchez