Bug#911495: x-tile 2.5-3 fails to launch with Segmentation fault error message (Bug #911495)
Hello, I just tried to reproduce the crash. As far as I see the interface glue between python and x11 is not prepared for 64 bit pointers. Without being explicit python assumes here just 32 bits and therefore truncates the pointers. This probably worked in older 64 bit releases because there pointers did not grow that large. Saw too late that the package is not in testing and unstable anymore. Nevertheless attached patch makes at least the application window appear. (Nothing more tested, also not if it will break 32 bits.) Kind regards, Bernhard Breakpoint 8, XOpenDisplay (display=0x0) at ../../src/OpenDis.c:66 (gdb) print/d dpy $27 = 93825002153648 (gdb) print/x dpy $28 = 0x55eca6b0 (gdb) cont Continuing. Program received signal SIGSEGV, Segmentation fault. XDefaultRootWindow (dpy=0x55eca6b0) at ../../src/Macros.c:52 52 return (RootWindow(dpy,DefaultScreen(dpy))); (gdb) py-bt Traceback (most recent call first): File "/usr/share/x-tile/modules/globs.py", line 104, in __init__ self.root = self.x11.XDefaultRootWindow(self.disp) File "/usr/bin/x-tile", line 54, in __builtin__.glob = globs.GlobalsObject() (gdb) py-print self local 'self' = --- globs.py.orig 2012-09-10 16:23:08.0 +0200 +++ globs.py 2018-10-21 14:50:18.430315883 +0200 @@ -100,6 +100,15 @@ class GlobalsObject(object): support.glob = self # x11 reference to xlib library display and root window globals self.x11 = ctypes.CDLL(ctypes.util.find_library("X11")) +self.x11.XOpenDisplay.restype = ctypes.c_void_p +self.x11.XDefaultRootWindow.argtypes = [ctypes.c_void_p] +self.x11.XInternAtom.argtypes = [ctypes.c_void_p, ctypes.c_char_p, ctypes.c_int] +self.x11.XGetWindowAttributes.argtypes = [ctypes.c_void_p, ctypes.c_long, ctypes.c_void_p] +self.x11.XScreenNumberOfScreen.argtypes = [ctypes.c_void_p] +# dpy, w, property, offset,length,delete, req_type, actual_type, actual_format, nitems, bytesafter, prop +self.x11.XGetWindowProperty.argtypes = [ctypes.c_void_p, ctypes.c_long, ctypes.c_long, ctypes.c_long, ctypes.c_long, ctypes.c_int, ctypes.c_long, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p] +# dpy, w, root,parent, children,nchildren +self.x11.XQueryTree.argtypes = [ctypes.c_void_p, ctypes.c_long, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p, ctypes.c_void_p] self.disp = self.x11.XOpenDisplay(0) self.root = self.x11.XDefaultRootWindow(self.disp) # property atoms for moveresize apt install mc devscripts dpkg-dev xserver-xorg lightdm openbox xterm dbus-x11 systemd-coredump gdb x-tile libx11-6-dbgsym libffi6-dbg libpython2.7-dbg python-dbg systemctl start lightdm # login mkdir libx11-6/orig -p cdlibx11-6/orig apt source libx11-6 cd ../.. mkdir x-tile/orig -p cdx-tile/orig apt source x-tile cd ../.. benutzer@debian:~$ export DISPLAY=:0 benutzer@debian:~$ x-tile Speicherzugriffsfehler (Speicherabzug geschrieben) directory /home/benutzer/libx11-6/orig/libx11-1.6.4/src/util root@debian:~# coredumpctl gdb PID: 8019 (x-tile) UID: 1000 (benutzer) GID: 1000 (benutzer) Signal: 11 (SEGV) Timestamp: Sun 2018-10-21 11:51:42 CEST (4min 28s ago) Command Line: /usr/bin/python /usr/bin/x-tile Executable: /usr/bin/python2.7 Control Group: /user.slice/user-1000.slice/session-5.scope Unit: session-5.scope Slice: user-1000.slice Session: 5 Owner UID: 1000 (benutzer) Boot ID: 1671e7394781478a89715aba6ef16d5d Machine ID: 9e5901179cfe4b73bc18669e6a6e0ab9 Hostname: debian Storage: /var/lib/systemd/coredump/core.x-tile.1000.1671e7394781478a89715aba6ef16d5d.8019.1540115502.lz4 Message: Process 8019 (x-tile) of user 1000 dumped core. Stack trace of thread 8019: #0 0x7fdba42f91e0 XDefaultRootWindow (libX11.so.6) #1 0x7fdba8661038 ffi_call_unix64 (libffi.so.6) #2 0x7fdba8660a9a ffi_call (libffi.so.6) #3 0x7fdba8875224 _ctypes_callproc (_ctypes.x86_64-linux-gnu.so) #4 0x7fdba8874be5 n/a (_ctypes.x86_64-linux-gnu.so) #5 0x55f87dd7c0c3 PyObject_Call (python2.7) #6 0x55f87dd9535f PyEval_EvalFrameEx (python2.7) #7 0x55f87dd8d9f5 PyEval_EvalCodeEx (python2.7) #8 0x55f87ddaa5be n/a (python2.7) #9 0x55f87dd7c0c3 PyObject_Call (python2.7) #10 0x55f87ddc0e1e n/a (python2.7) #11 0x55f87dd7c0c3 PyObject_Call (python2.7) #12 0x55f87ddc0b57 n/a (
Processing of groovebasin_1.4.0-4_source.changes
groovebasin_1.4.0-4_source.changes uploaded successfully to localhost along with the files: groovebasin_1.4.0-4.dsc groovebasin_1.4.0-4.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
groovebasin_1.4.0-4_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 13:18:53 -0300 Source: groovebasin Binary: groovebasin Architecture: source Version: 1.4.0-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Felipe Sateler Description: groovebasin - music player server with a web-based user interface Changes: groovebasin (1.4.0-4) unstable; urgency=medium . [ Felipe Sateler ] * QA upload. * Upload to unstable . [ Petter Reinholdtsen ] * Really change maintainer address to the QA group. * Rename patches to follow suggested name schema. * Document increased versioned dependency on node-mime. Checksums-Sha1: 683e47e8b3779320e2edecab0f1378168b836e98 2131 groovebasin_1.4.0-4.dsc 238864d1a23ba8a5f54192cf8557a1284506ab48 9652 groovebasin_1.4.0-4.debian.tar.xz Checksums-Sha256: b5da02739ef720097e7cc35a2822786ea4f9b446de94f8d272f7cdde0e2983ee 2131 groovebasin_1.4.0-4.dsc d419097ac11a626d0b1fe89febd1b6d87286f59dca9962ff494bdac3a43897df 9652 groovebasin_1.4.0-4.debian.tar.xz Files: c790e33acc4305a6ca76db66ac74ee2e 2131 sound optional groovebasin_1.4.0-4.dsc dd3f4f3ad969734263b0322143461d0a 9652 sound optional groovebasin_1.4.0-4.debian.tar.xz -BEGIN PGP SIGNATURE- iQJIBAEBCAAyFiEEIY7gNiAzyHtsE1+ko7q64kCN1s8FAlvMp8IUHGZzYXRlbGVy QGRlYmlhbi5vcmcACgkQo7q64kCN1s/ktw//WGfo36L02eotLZ76tp/rjIRYsFbO DuDviULk3OQdsAHX8XY1JM4+8+hm+PAYYa08RxKzCAyhCtLhohuhnrJR8tWwt5cV WUmdHTQjv6e3fV3WgjzACpgQqLLop6ReutOTlZp7wF4Es/1qO4NFCw+HGLvLQkWP YjtLYz6sBrmq+ZwOBSVEyyJa920d9QhkCtma4frVK0mdFqtOlR5udcLVNfwiX1Az LxgTS2vudfwzSHvegnLXNzDLMofiI5vQRbBAFkUSMPw3gK+28dq5aoJ8mM21u4mW bP6gRRQBLYTel7zECgM3r5g1RQbQBbN1WEkpwcUQV1vKTJzm3hBpUBUr2sqa9su+ aaUMl4YyW9nGWS0FoENBYfmxIhc/EVfnKcijYZzIz4xiDTLHosYwDK18VMGM1vUH UqvUmD8Qf79yuwHSz/t34aNGGgKUm5Tye/uMoBFR9bGzFfne3J51t1o1uWaH+UEI jq+ySxZgx/ui8Y1XqJ78Va1K37u4TGNqXm+FyqWKehWmGgv83NCdZVehUWmsxKZt UBiWQB1pRx7oJ5Ks7vF/6f81SKHqfLYCJunpGM/NlmeXiI5FMsXnoJejiTL5J1Oq OpAFZInG3z/e9PfzZoJo8m9t6JruaM/TIl2S/PFpLh5oAG5kMHO5qQPaghL2Lvjw GzOalGtHI+YMJes= =Khba -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#870196: marked as done (libytnef: CVE-2017-9470: NULL pointer dereference in MAPIPrint)
Your message dated Sun, 21 Oct 2018 22:20:00 + with message-id and subject line Bug#870196: fixed in libytnef 1.9.3-1 has caused the Debian Bug report #870196, regarding libytnef: CVE-2017-9470: NULL pointer dereference in MAPIPrint to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 870196: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870196 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: libytnef Version: 1.9.2-2 Severity: important Tags: upstream security Forwarded: https://github.com/Yeraze/ytnef/issues/37 Hi, the following vulnerability was published for libytnef. CVE-2017-9470[0]: | In ytnef 1.9.2, the MAPIPrint function in lib/ytnef.c allows remote | attackers to cause a denial of service (NULL pointer dereference and | application crash) via a crafted file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-9470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9470 [1] https://github.com/Yeraze/ytnef/issues/37 Please adjust the affected versions in the BTS as needed, older versions than 1.9.2 might be affected as well. Regards, Salvatore --- End Message --- --- Begin Message --- Source: libytnef Source-Version: 1.9.3-1 We believe that the bug you reported is fixed in the latest version of libytnef, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 870...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ricardo Mones (supplier of updated libytnef package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 00:36:17 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: medium Maintainer: Ricardo Mones Changed-By: Ricardo Mones Description: libytnef0 - improved decoder for application/ms-tnef attachments libytnef0-dev - headers for application/ms-tnef attachments decoder ytnef-tools - ytnef decoder commandline tools Closes: 460390 870192 870194 870196 870815 870816 870817 Changes: libytnef (1.9.3-1) unstable; urgency=medium . * New upstream release fixing the following: • [CVE-2017-9470] NULL pointer dereference in MAPIPrint. Closes: #870196. • [CVE-2017-9471] heap-based-buffer overflow in SwapWord. Closes: #870194. • [CVE-2017-9474] heap-based buffer overflow in DecompressRTF. Closes: #870192. • [CVE-2017-12142] SEGV in ytnef.c in SwapDWord. Closes: #870816. • [CVE-2017-12141] heap-buffer-overflow in TNEFFillMapi. Closes: #870815. • [CVE-2017-12144] allocation failure in TNEFFillMapi. Closes: #870817. * Remove patch for CVE-2017-9058 already in this release * New maintainers for package (Closes: #460390) * Priority extra has been replaced by optional * Update Vcs-* for current infrastructure * Standards-Version updated to latest * Set debhelper compat level to 11 Checksums-Sha1: 968edfc9e0c29e54e5313fa9aa16761e53c22044 1966 libytnef_1.9.3-1.dsc 83d320ef862b0e1d1a9c6d5e717594e9360cc67e 301338 libytnef_1.9.3.orig.tar.gz 212ba8d953b37f7fe52d162cf2584dd7e829fa9d 4524 libytnef_1.9.3-1.debian.tar.xz dc2e7a57c819770aacc709e5ef1daadfcb5c7b30 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 3b23f82fbd2d194ad53e918ecd9a23a85ca246c1 32388 libytnef0-dev_1.9.3-1_amd64.deb 1059847295d9a501c2e546828e13348d54964334 26184 libytnef0_1.9.3-1_amd64.deb 8ef39733da213bf66dc6f94b1f88903bf0edee9c 6554 libytnef_1.9.3-1_amd64.buildinfo 63fbb4e9445a9219ae7d8ce0d64f7c0cdd987af2 38292 ytnef-tools-dbgsym_1.9.3-1_amd64.deb 4732a11faf7f1ac5ce5532b7f91da0c8274e7562 21404 ytnef-tools_1.9.3-1_amd64.deb Checksums-Sha256: 7e3da3f548a4ace8603d11dacb4992a39dee0ffeb15e87a8bbc3c72ddeb62f66 1966 libytnef_1.9.3-1.dsc 41a0033bde33c86a7e4aa4e14bb822dd03084098638e7d6557263e47e80b4f4f 301338 libytnef_1.9.3.orig.tar.gz e27c66f7fbf1c417304f5ff969104e4aecad756af1b94594300f1cf77683a699 4524 libytnef_1.9.3-1.debian.tar.xz 84828250bced2d25
Bug#870192: marked as done (libytnef: CVE-2017-9474: heap-based buffer overflow in DecompressRTF)
Your message dated Sun, 21 Oct 2018 22:20:00 + with message-id and subject line Bug#870192: fixed in libytnef 1.9.3-1 has caused the Debian Bug report #870192, regarding libytnef: CVE-2017-9474: heap-based buffer overflow in DecompressRTF to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 870192: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870192 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: libytnef Version: 1.9.2-2 Severity: important Tags: upstream security Forwarded: https://github.com/Yeraze/ytnef/issues/40 Hi, the following vulnerability was published for libytnef. CVE-2017-9474[0]: | In ytnef 1.9.2, the DecompressRTF function in lib/ytnef.c allows remote | attackers to cause a denial of service (heap-based buffer over-read and | application crash) via a crafted file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-9474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9474 [1] https://github.com/Yeraze/ytnef/issues/40 Please adjust the affected versions in the BTS as needed, older version than 1.9.2 might be similarly affected. Regards, Salvatore --- End Message --- --- Begin Message --- Source: libytnef Source-Version: 1.9.3-1 We believe that the bug you reported is fixed in the latest version of libytnef, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 870...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ricardo Mones (supplier of updated libytnef package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 00:36:17 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: medium Maintainer: Ricardo Mones Changed-By: Ricardo Mones Description: libytnef0 - improved decoder for application/ms-tnef attachments libytnef0-dev - headers for application/ms-tnef attachments decoder ytnef-tools - ytnef decoder commandline tools Closes: 460390 870192 870194 870196 870815 870816 870817 Changes: libytnef (1.9.3-1) unstable; urgency=medium . * New upstream release fixing the following: • [CVE-2017-9470] NULL pointer dereference in MAPIPrint. Closes: #870196. • [CVE-2017-9471] heap-based-buffer overflow in SwapWord. Closes: #870194. • [CVE-2017-9474] heap-based buffer overflow in DecompressRTF. Closes: #870192. • [CVE-2017-12142] SEGV in ytnef.c in SwapDWord. Closes: #870816. • [CVE-2017-12141] heap-buffer-overflow in TNEFFillMapi. Closes: #870815. • [CVE-2017-12144] allocation failure in TNEFFillMapi. Closes: #870817. * Remove patch for CVE-2017-9058 already in this release * New maintainers for package (Closes: #460390) * Priority extra has been replaced by optional * Update Vcs-* for current infrastructure * Standards-Version updated to latest * Set debhelper compat level to 11 Checksums-Sha1: 968edfc9e0c29e54e5313fa9aa16761e53c22044 1966 libytnef_1.9.3-1.dsc 83d320ef862b0e1d1a9c6d5e717594e9360cc67e 301338 libytnef_1.9.3.orig.tar.gz 212ba8d953b37f7fe52d162cf2584dd7e829fa9d 4524 libytnef_1.9.3-1.debian.tar.xz dc2e7a57c819770aacc709e5ef1daadfcb5c7b30 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 3b23f82fbd2d194ad53e918ecd9a23a85ca246c1 32388 libytnef0-dev_1.9.3-1_amd64.deb 1059847295d9a501c2e546828e13348d54964334 26184 libytnef0_1.9.3-1_amd64.deb 8ef39733da213bf66dc6f94b1f88903bf0edee9c 6554 libytnef_1.9.3-1_amd64.buildinfo 63fbb4e9445a9219ae7d8ce0d64f7c0cdd987af2 38292 ytnef-tools-dbgsym_1.9.3-1_amd64.deb 4732a11faf7f1ac5ce5532b7f91da0c8274e7562 21404 ytnef-tools_1.9.3-1_amd64.deb Checksums-Sha256: 7e3da3f548a4ace8603d11dacb4992a39dee0ffeb15e87a8bbc3c72ddeb62f66 1966 libytnef_1.9.3-1.dsc 41a0033bde33c86a7e4aa4e14bb822dd03084098638e7d6557263e47e80b4f4f 301338 libytnef_1.9.3.orig.tar.gz e27c66f7fbf1c417304f5ff969104e4aecad756af1b94594300f1cf77683a699 4524 libytnef_1.9.3-1.debian.tar.xz 84
Bug#870817: marked as done (libytnef: CVE-2017-12144)
Your message dated Sun, 21 Oct 2018 22:20:00 + with message-id and subject line Bug#870817: fixed in libytnef 1.9.3-1 has caused the Debian Bug report #870817, regarding libytnef: CVE-2017-12144 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 870817: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870817 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: libytnef Version: 1.9.2-2 Severity: normal Tags: security upstream Forwarded: https://github.com/Yeraze/ytnef/issues/51 Hi, the following vulnerability was published for libytnef. CVE-2017-12144[0]: | In ytnef 1.9.2, an allocation failure was found in the function | TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of | service via a crafted file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-12144 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12144 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: libytnef Source-Version: 1.9.3-1 We believe that the bug you reported is fixed in the latest version of libytnef, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 870...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ricardo Mones (supplier of updated libytnef package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 00:36:17 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: medium Maintainer: Ricardo Mones Changed-By: Ricardo Mones Description: libytnef0 - improved decoder for application/ms-tnef attachments libytnef0-dev - headers for application/ms-tnef attachments decoder ytnef-tools - ytnef decoder commandline tools Closes: 460390 870192 870194 870196 870815 870816 870817 Changes: libytnef (1.9.3-1) unstable; urgency=medium . * New upstream release fixing the following: • [CVE-2017-9470] NULL pointer dereference in MAPIPrint. Closes: #870196. • [CVE-2017-9471] heap-based-buffer overflow in SwapWord. Closes: #870194. • [CVE-2017-9474] heap-based buffer overflow in DecompressRTF. Closes: #870192. • [CVE-2017-12142] SEGV in ytnef.c in SwapDWord. Closes: #870816. • [CVE-2017-12141] heap-buffer-overflow in TNEFFillMapi. Closes: #870815. • [CVE-2017-12144] allocation failure in TNEFFillMapi. Closes: #870817. * Remove patch for CVE-2017-9058 already in this release * New maintainers for package (Closes: #460390) * Priority extra has been replaced by optional * Update Vcs-* for current infrastructure * Standards-Version updated to latest * Set debhelper compat level to 11 Checksums-Sha1: 968edfc9e0c29e54e5313fa9aa16761e53c22044 1966 libytnef_1.9.3-1.dsc 83d320ef862b0e1d1a9c6d5e717594e9360cc67e 301338 libytnef_1.9.3.orig.tar.gz 212ba8d953b37f7fe52d162cf2584dd7e829fa9d 4524 libytnef_1.9.3-1.debian.tar.xz dc2e7a57c819770aacc709e5ef1daadfcb5c7b30 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 3b23f82fbd2d194ad53e918ecd9a23a85ca246c1 32388 libytnef0-dev_1.9.3-1_amd64.deb 1059847295d9a501c2e546828e13348d54964334 26184 libytnef0_1.9.3-1_amd64.deb 8ef39733da213bf66dc6f94b1f88903bf0edee9c 6554 libytnef_1.9.3-1_amd64.buildinfo 63fbb4e9445a9219ae7d8ce0d64f7c0cdd987af2 38292 ytnef-tools-dbgsym_1.9.3-1_amd64.deb 4732a11faf7f1ac5ce5532b7f91da0c8274e7562 21404 ytnef-tools_1.9.3-1_amd64.deb Checksums-Sha256: 7e3da3f548a4ace8603d11dacb4992a39dee0ffeb15e87a8bbc3c72ddeb62f66 1966 libytnef_1.9.3-1.dsc 41a0033bde33c86a7e4aa4e14bb822dd03084098638e7d6557263e47e80b4f4f 301338 libytnef_1.9.3.orig.tar.gz e27c66f7fbf1c417304f5ff969104e4aecad756af1b94594300f1cf77683a699 4524 libytnef_1.9.3-1.debian.tar.xz 84828250bced2d250ab81149ef8c131253af59ed43770fb7797e35200ace1652 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 1d1ff166f552a08b8800d8e8c19b8242fd032dad1dd89996ba536e444be8
Bug#870194: marked as done (libytnef: CVE-2017-9471: heap-based-buffer overflow in SwapWord)
Your message dated Sun, 21 Oct 2018 22:20:00 + with message-id and subject line Bug#870194: fixed in libytnef 1.9.3-1 has caused the Debian Bug report #870194, regarding libytnef: CVE-2017-9471: heap-based-buffer overflow in SwapWord to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 870194: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870194 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: libytnef Version: 1.9.2-2 Severity: important Tags: security upstream Forwarded: https://github.com/Yeraze/ytnef/issues/39 Hi, the following vulnerability was published for libytnef. CVE-2017-9471[0]: | In ytnef 1.9.2, the SwapWord function in lib/ytnef.c allows remote | attackers to cause a denial of service (heap-based buffer over-read and | application crash) via a crafted file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-9471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9471 [1] https://github.com/Yeraze/ytnef/issues/39 Please adjust the affected versions in the BTS as needed, older versions than 1.9.2 might be affected as well. Regards, Salvatore --- End Message --- --- Begin Message --- Source: libytnef Source-Version: 1.9.3-1 We believe that the bug you reported is fixed in the latest version of libytnef, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 870...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ricardo Mones (supplier of updated libytnef package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 00:36:17 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: medium Maintainer: Ricardo Mones Changed-By: Ricardo Mones Description: libytnef0 - improved decoder for application/ms-tnef attachments libytnef0-dev - headers for application/ms-tnef attachments decoder ytnef-tools - ytnef decoder commandline tools Closes: 460390 870192 870194 870196 870815 870816 870817 Changes: libytnef (1.9.3-1) unstable; urgency=medium . * New upstream release fixing the following: • [CVE-2017-9470] NULL pointer dereference in MAPIPrint. Closes: #870196. • [CVE-2017-9471] heap-based-buffer overflow in SwapWord. Closes: #870194. • [CVE-2017-9474] heap-based buffer overflow in DecompressRTF. Closes: #870192. • [CVE-2017-12142] SEGV in ytnef.c in SwapDWord. Closes: #870816. • [CVE-2017-12141] heap-buffer-overflow in TNEFFillMapi. Closes: #870815. • [CVE-2017-12144] allocation failure in TNEFFillMapi. Closes: #870817. * Remove patch for CVE-2017-9058 already in this release * New maintainers for package (Closes: #460390) * Priority extra has been replaced by optional * Update Vcs-* for current infrastructure * Standards-Version updated to latest * Set debhelper compat level to 11 Checksums-Sha1: 968edfc9e0c29e54e5313fa9aa16761e53c22044 1966 libytnef_1.9.3-1.dsc 83d320ef862b0e1d1a9c6d5e717594e9360cc67e 301338 libytnef_1.9.3.orig.tar.gz 212ba8d953b37f7fe52d162cf2584dd7e829fa9d 4524 libytnef_1.9.3-1.debian.tar.xz dc2e7a57c819770aacc709e5ef1daadfcb5c7b30 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 3b23f82fbd2d194ad53e918ecd9a23a85ca246c1 32388 libytnef0-dev_1.9.3-1_amd64.deb 1059847295d9a501c2e546828e13348d54964334 26184 libytnef0_1.9.3-1_amd64.deb 8ef39733da213bf66dc6f94b1f88903bf0edee9c 6554 libytnef_1.9.3-1_amd64.buildinfo 63fbb4e9445a9219ae7d8ce0d64f7c0cdd987af2 38292 ytnef-tools-dbgsym_1.9.3-1_amd64.deb 4732a11faf7f1ac5ce5532b7f91da0c8274e7562 21404 ytnef-tools_1.9.3-1_amd64.deb Checksums-Sha256: 7e3da3f548a4ace8603d11dacb4992a39dee0ffeb15e87a8bbc3c72ddeb62f66 1966 libytnef_1.9.3-1.dsc 41a0033bde33c86a7e4aa4e14bb822dd03084098638e7d6557263e47e80b4f4f 301338 libytnef_1.9.3.orig.tar.gz e27c66f7fbf1c417304f5ff969104e4aecad756af1b94594300f1cf77683a699 4524 libytnef_1.9.3-1.debian.tar.xz 84828250bced2
Bug#870815: marked as done (libytnef: CVE-2017-12141: heap-buffer-overflow)
Your message dated Sun, 21 Oct 2018 22:20:00 + with message-id and subject line Bug#870815: fixed in libytnef 1.9.3-1 has caused the Debian Bug report #870815, regarding libytnef: CVE-2017-12141: heap-buffer-overflow to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 870815: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870815 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: libytnef Version: 1.9.2-2 Severity: grave Tags: security upstream Justification: user security hole Forwarded: https://github.com/Yeraze/ytnef/issues/50 Hi, the following vulnerability was published for libytnef. CVE-2017-12141[0]: | In ytnef 1.9.2, a heap-based buffer overflow vulnerability was found in | the function TNEFFillMapi in ytnef.c, which allows attackers to cause a | denial of service via a crafted file. Reproducible with an ASAN build and the given reproducer. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-12141 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12141 [1] https://github.com/Yeraze/ytnef/issues/50 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: libytnef Source-Version: 1.9.3-1 We believe that the bug you reported is fixed in the latest version of libytnef, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 870...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ricardo Mones (supplier of updated libytnef package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 00:36:17 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: medium Maintainer: Ricardo Mones Changed-By: Ricardo Mones Description: libytnef0 - improved decoder for application/ms-tnef attachments libytnef0-dev - headers for application/ms-tnef attachments decoder ytnef-tools - ytnef decoder commandline tools Closes: 460390 870192 870194 870196 870815 870816 870817 Changes: libytnef (1.9.3-1) unstable; urgency=medium . * New upstream release fixing the following: • [CVE-2017-9470] NULL pointer dereference in MAPIPrint. Closes: #870196. • [CVE-2017-9471] heap-based-buffer overflow in SwapWord. Closes: #870194. • [CVE-2017-9474] heap-based buffer overflow in DecompressRTF. Closes: #870192. • [CVE-2017-12142] SEGV in ytnef.c in SwapDWord. Closes: #870816. • [CVE-2017-12141] heap-buffer-overflow in TNEFFillMapi. Closes: #870815. • [CVE-2017-12144] allocation failure in TNEFFillMapi. Closes: #870817. * Remove patch for CVE-2017-9058 already in this release * New maintainers for package (Closes: #460390) * Priority extra has been replaced by optional * Update Vcs-* for current infrastructure * Standards-Version updated to latest * Set debhelper compat level to 11 Checksums-Sha1: 968edfc9e0c29e54e5313fa9aa16761e53c22044 1966 libytnef_1.9.3-1.dsc 83d320ef862b0e1d1a9c6d5e717594e9360cc67e 301338 libytnef_1.9.3.orig.tar.gz 212ba8d953b37f7fe52d162cf2584dd7e829fa9d 4524 libytnef_1.9.3-1.debian.tar.xz dc2e7a57c819770aacc709e5ef1daadfcb5c7b30 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 3b23f82fbd2d194ad53e918ecd9a23a85ca246c1 32388 libytnef0-dev_1.9.3-1_amd64.deb 1059847295d9a501c2e546828e13348d54964334 26184 libytnef0_1.9.3-1_amd64.deb 8ef39733da213bf66dc6f94b1f88903bf0edee9c 6554 libytnef_1.9.3-1_amd64.buildinfo 63fbb4e9445a9219ae7d8ce0d64f7c0cdd987af2 38292 ytnef-tools-dbgsym_1.9.3-1_amd64.deb 4732a11faf7f1ac5ce5532b7f91da0c8274e7562 21404 ytnef-tools_1.9.3-1_amd64.deb Checksums-Sha256: 7e3da3f548a4ace8603d11dacb4992a39dee0ffeb15e87a8bbc3c72ddeb62f66 1966 libytnef_1.9.3-1.dsc 41a0033bde33c86a7e4aa4e14bb822dd03084098638e7d6557263e47e80b4f4f 301338 libytnef_1.9.3.orig.tar.gz e27c66f7fbf1c417304f5ff969104e4aecad756af1b94594300f1cf77683a699 4524 libytnef_1.9.3-1.de
Bug#870816: marked as done (libytnef: CVE-2017-12142: SEGV in ytnef.c in SwapDWord)
Your message dated Sun, 21 Oct 2018 22:20:00 + with message-id and subject line Bug#870816: fixed in libytnef 1.9.3-1 has caused the Debian Bug report #870816, regarding libytnef: CVE-2017-12142: SEGV in ytnef.c in SwapDWord to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 870816: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870816 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: libytnef Version: 1.9.2-2 Severity: important Tags: upstream security Forwarded: https://github.com/Yeraze/ytnef/issues/49 Hi, the following vulnerability was published for libytnef. CVE-2017-12142[0]: | In ytnef 1.9.2, an invalid memory read vulnerability was found in the | function SwapDWord in ytnef.c, which allows attackers to cause a denial | of service via a crafted file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-12142 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12142 [1] https://github.com/Yeraze/ytnef/issues/49 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: libytnef Source-Version: 1.9.3-1 We believe that the bug you reported is fixed in the latest version of libytnef, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 870...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ricardo Mones (supplier of updated libytnef package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 21 Oct 2018 00:36:17 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.3-1 Distribution: unstable Urgency: medium Maintainer: Ricardo Mones Changed-By: Ricardo Mones Description: libytnef0 - improved decoder for application/ms-tnef attachments libytnef0-dev - headers for application/ms-tnef attachments decoder ytnef-tools - ytnef decoder commandline tools Closes: 460390 870192 870194 870196 870815 870816 870817 Changes: libytnef (1.9.3-1) unstable; urgency=medium . * New upstream release fixing the following: • [CVE-2017-9470] NULL pointer dereference in MAPIPrint. Closes: #870196. • [CVE-2017-9471] heap-based-buffer overflow in SwapWord. Closes: #870194. • [CVE-2017-9474] heap-based buffer overflow in DecompressRTF. Closes: #870192. • [CVE-2017-12142] SEGV in ytnef.c in SwapDWord. Closes: #870816. • [CVE-2017-12141] heap-buffer-overflow in TNEFFillMapi. Closes: #870815. • [CVE-2017-12144] allocation failure in TNEFFillMapi. Closes: #870817. * Remove patch for CVE-2017-9058 already in this release * New maintainers for package (Closes: #460390) * Priority extra has been replaced by optional * Update Vcs-* for current infrastructure * Standards-Version updated to latest * Set debhelper compat level to 11 Checksums-Sha1: 968edfc9e0c29e54e5313fa9aa16761e53c22044 1966 libytnef_1.9.3-1.dsc 83d320ef862b0e1d1a9c6d5e717594e9360cc67e 301338 libytnef_1.9.3.orig.tar.gz 212ba8d953b37f7fe52d162cf2584dd7e829fa9d 4524 libytnef_1.9.3-1.debian.tar.xz dc2e7a57c819770aacc709e5ef1daadfcb5c7b30 38788 libytnef0-dbgsym_1.9.3-1_amd64.deb 3b23f82fbd2d194ad53e918ecd9a23a85ca246c1 32388 libytnef0-dev_1.9.3-1_amd64.deb 1059847295d9a501c2e546828e13348d54964334 26184 libytnef0_1.9.3-1_amd64.deb 8ef39733da213bf66dc6f94b1f88903bf0edee9c 6554 libytnef_1.9.3-1_amd64.buildinfo 63fbb4e9445a9219ae7d8ce0d64f7c0cdd987af2 38292 ytnef-tools-dbgsym_1.9.3-1_amd64.deb 4732a11faf7f1ac5ce5532b7f91da0c8274e7562 21404 ytnef-tools_1.9.3-1_amd64.deb Checksums-Sha256: 7e3da3f548a4ace8603d11dacb4992a39dee0ffeb15e87a8bbc3c72ddeb62f66 1966 libytnef_1.9.3-1.dsc 41a0033bde33c86a7e4aa4e14bb822dd03084098638e7d6557263e47e80b4f4f 301338 libytnef_1.9.3.orig.tar.gz e27c66f7fbf1c417304f5ff969104e4aecad756af1b94594300f1cf77683a699 4524 libytnef_1.9.3-1.debian.tar.xz 84828250bced2d250ab81149ef8c131253af59ed43770fb7797e35200ace1652 38788 libyt
Processed: tagging 876190
Processing commands for cont...@bugs.debian.org: > tags 876190 + confirmed Bug #876190 [backuppc] Missing jLib.pm Added tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 876190: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876190 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: tagging 887490, tagging 876190, tagging 876233
Processing commands for cont...@bugs.debian.org: > tags 887490 + pending Bug #887490 [wnpp] ITA: backuppc -- high-performance, enterprise-grade system for backing up PCs Added tag(s) pending. > tags 876190 + pending Bug #876190 [backuppc] Missing jLib.pm Added tag(s) pending. > tags 876233 + pending Bug #876233 [backuppc] backuppc: Can't backup IPv6-only hosts due to IPv4-only DNS lookups Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 876190: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876190 876233: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876233 887490: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887490 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#903217: backuppc: Web interface status page doesn't show graphs
Hi, Dominique Brazziel wrote: > No graphs shown, images broken This might be the same as https://bugs.launchpad.net/ubuntu/+source/backuppc/+bug/1612600 in Ubuntu. A fix for that is part of https://patches.ubuntu.com/b/backuppc/backuppc_3.3.1-4ubuntu1.patch We should try to reproduce the issue and see if the according hunks of the Ubuntu patch fixes it. Regards, Axel -- ,''`. | Axel Beckert , https://people.debian.org/~abe/ : :' : | Debian Developer, ftp.ch.debian.org Admin `. `' | 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5 `-| 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE
pidgin-audacious is marked for autoremoval from testing
pidgin-audacious 2.0.0-5 is marked for autoremoval from testing on 2018-10-31 It (build-)depends on packages with these RC bugs: 883731: audacious: Debian packaging has incorrect license
simulavr is marked for autoremoval from testing
simulavr 1.0.0+git20160221.e53413b-1 is marked for autoremoval from testing on 2018-10-31 It (build-)depends on packages with these RC bugs: 906453: binutils-avr: FTBFS in buster/sid (cast between incompatible function types)
flowscan-cuflow is marked for autoremoval from testing
flowscan-cuflow 1.7-9 is marked for autoremoval from testing on 2018-11-01 It (build-)depends on packages with these RC bugs: 887743: ksh: ksh FTBFS: ast_stdio.h:82:15: error: conflicting types for '_sfio_FILE'