Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-13 Thread Sylvain Beucler

Hi,

IIUC this is about fixing 2 non-security bugs, that were introduced 
prior to buster's initial release.


I personally don't think this fits the LTS project scope.
Maybe other LTS members will have a different opinion.

Cheers!
Sylvain Beucler
Debian LTS Team

On 13/09/2022 15:27, Santiago R.R. wrote:

El 10/09/22 a las 19:11, Adam D. Barratt escribió:

On Wed, 2020-05-27 at 11:56 +0200, Santiago R.R. wrote:

Since 1.0.6-9, bzip2 was built without the -D_FILE_OFFSET_BITS=64
CPPFLAG, and so it's not able to handle > 2GB files in 32-bit archs.
See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944557

I've uploaded a fixed version to unstable yesterday. It would be
great
to fix it also in buster. Please, consider the attached debdiff.
Would it be OK for you to upload it?



Apologies for apparently letting this sit unanswered. (FTR there was a
reply from a non-SRM member 18 months ago.)


And I am sorry I missed that answer.



The final point release for buster has now happened, so any further
updates to packages in buster will need to be handled via LTS. I'm
therefore going to close this request now.

[snip]

I am forwarding this to the LTS folks, so they can decide about this
change.




tla update for Debian 5.0.5

2010-04-13 Thread Sylvain Beucler
Hello stable release managers,

I would like to upload a security update for Lenny, for package 'tla'.
http://www.debian.org/security/2009/dsa-1953

As it's a minor issue, the security team asked me to upload it through
a point-release update (cf. forwarded message below).

A package can be found at:
http://www.beuc.net/tmp/tla/lenny-stable/tla_1.3.5+dfsg-14+lenny1.dsc

Is it OK with you?

Here's the interdiff:
diff -u tla-1.3.5+dfsg/debian/changelog tla-1.3.5+dfsg/debian/changelog
--- tla-1.3.5+dfsg/debian/changelog
+++ tla-1.3.5+dfsg/debian/changelog
@@ -1,3 +1,11 @@
+tla (1.3.5+dfsg-14+lenny1) stable; urgency=low
+
+  * QA upload.
+  * Fix CVE-2009-3560 and CVE-2009-3720 denial-of-services by patching
+bundled libexpat (closes: #560940).
+
+ -- Sylvain Beucler   Tue, 13 Apr 2010 17:55:51 +0200
+
 tla (1.3.5+dfsg-14) unstable; urgency=low
 
   * QA upload.
diff -u tla-1.3.5+dfsg/debian/patches/00list 
tla-1.3.5+dfsg/debian/patches/00list
--- tla-1.3.5+dfsg/debian/patches/00list
+++ tla-1.3.5+dfsg/debian/patches/00list
@@ -5,0 +6,2 @@
+CVE-2009-3560.dpatch
+CVE-2009-3720.dpatch
only in patch2:
unchanged:
--- tla-1.3.5+dfsg.orig/debian/patches/CVE-2009-3720.dpatch
+++ tla-1.3.5+dfsg/debian/patches/CVE-2009-3720.dpatch
@@ -0,0 +1,22 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## CVE-2009-3720.dpatch by Sylvain Beucler 
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: Fix CVE-2009-3720 vulnerability
+## DP: Check:
+## DP: 
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?r1=1.13&r2=1.15&diff_format=l
+## DP: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
+
+...@dpatch@
+diff -urNad tla-1.3.5+dfsg~/src/expat/lib/xmltok_impl.c 
tla-1.3.5+dfsg/src/expat/lib/xmltok_impl.c
+--- tla-1.3.5+dfsg~/src/expat/lib/xmltok_impl.c2006-07-20 
08:34:33.0 +0200
 tla-1.3.5+dfsg/src/expat/lib/xmltok_impl.c 2010-01-23 19:35:20.0 
+0100
+@@ -1741,7 +1741,7 @@
+const char *end,
+POSITION *pos)
+ {
+-  while (ptr != end) {
++  while (ptr < end) {
+ switch (BYTE_TYPE(enc, ptr)) {
+ #define LEAD_CASE(n) \
+ case BT_LEAD ## n: \
only in patch2:
unchanged:
--- tla-1.3.5+dfsg.orig/debian/patches/CVE-2009-3560.dpatch
+++ tla-1.3.5+dfsg/debian/patches/CVE-2009-3560.dpatch
@@ -0,0 +1,23 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## CVE-2009-3560.dpatch by Sylvain Beucler 
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: Fix CVE-2009-3560 vulnerability
+## DP: Check:
+## DP: 
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.166&diff_format=h
+## DP: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
+
+...@dpatch@
+diff -urNad tla-1.3.5+dfsg~/src/expat/lib/xmlparse.c 
tla-1.3.5+dfsg/src/expat/lib/xmlparse.c
+--- tla-1.3.5+dfsg~/src/expat/lib/xmlparse.c   2006-07-20 08:34:33.0 
+0200
 tla-1.3.5+dfsg/src/expat/lib/xmlparse.c2010-01-23 19:32:26.0 
+0100
+@@ -3615,6 +3615,9 @@
+ return XML_ERROR_UNCLOSED_TOKEN;
+   case XML_TOK_PARTIAL_CHAR:
+ return XML_ERROR_PARTIAL_CHAR;
++  case -XML_TOK_PROLOG_S:
++tok = -tok;
++break;
+   case XML_TOK_NONE:
+ #ifdef XML_DTD
+ /* for internal PE NOT referenced between declarations */


Best regards,

- Sylvain

- Forwarded message from Moritz Muehlenhoff  -

Date: Mon, 22 Mar 2010 18:56:22 +0100
From: Moritz Muehlenhoff 
To: Sylvain Beucler 
Cc: t...@security.debian.org, b...@decadent.org.uk
Subject: Re: Versioning: security updates and binary uploads
User-Agent: Mutt/1.5.20 (2009-06-14)

On Mon, Mar 22, 2010 at 02:19:13PM +0100, Sylvain Beucler wrote:
> Ciao!
> 
> On Mon, Mar 22, 2010 at 01:21:55PM +0100, Giuseppe Iuculano wrote:
> > Il 21/03/2010 14:16, Sylvain Beucler ha scritto:
> > > There's no conflict right now, because 'b' '<' 'etch', but there would
> > > be a conflict if 'etch' had been called instead 'alfred' or anything
> > > that is '<' 'b'.
> > > 
> > > So maybe I should use:
> > > -> tla-1.3.5+dfsg-9+b1+etch1
> > > as a rule?
> > 
> > As you wrote, there is no conflict right now, so you should use
> > tla-1.3.5+dfsg-9+etch1.
> 
> Ok, thanks.
>  
> > BTW, currently there isn't any security issues opened for tla, what are
> > you preparing?
> 
> tla includes a copy of libexpat, so it's affected by:
> http://www.debian.org/security/2009/dsa-1953
> A fix was uploaded to testing, but not to stable and old-stable.

This specific issue doesn't warrant a DSA, please update it through a stable
point update:
http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable
 
> Btw, do you still accept old-stable uploads?

Support for Etch has ended some weeks ago.

Cheers,
Moritz

- End forwarded message -


signature.asc
Description: Digital signature


Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u3

2024-08-14 Thread Sylvain Beucler

Hi,

On Mon, 8 Jul 2024 09:48:40 -0400 (EDT) Nicolas Mora 
 wrote:

Thanks for the update, I will upload it next week if that's ok


I'm checking the alignment of bullseye and bookworm, in preparation of 
the bullseye LTS phase starting tomorrow. :)


Do you intend to fix CVE-2024-25715 as well?
(as in bookworm 12.6, "fix open redirection via redirect_uri")

Is it something a LTS contributor could help with?

Cheers!
Sylvain Beucler
Debian LTS Team



Bug#1007884: bullseye-pu: package glewlwyd/2.5.2-2+deb11u3

2024-08-14 Thread Sylvain Beucler

Hello Nicolas,

On 14/08/2024 17:09, Nicolas Mora wrote:

Thanks for your offer. I'm away for a few days. I can prepare the package for 
Bullseye LTS at the end of August.


That would be nice, thanks :)


I've never made a package for LTS before, so I don't know how it works though. 
Is it like a pu package? Send a debdiff to the LTS team, then when accepted 
push it via dput to ftp-master?


We have a step-by-step documentation here:
https://lts-team.pages.debian.net/wiki/Development.html

In short, DDs can directly upload to bullseye-lts and publish a DLA. Or, 
one can propose a debdiff at debian-...@lists.debian.org (ideally along 
with test procedures) and the LTS Team will take care of the 
administrativia.


Cheers!
Sylvain Beucler
Debian LTS Team



Bug#601420: unblock: freedink-data/1.08.20100103-3

2010-10-25 Thread Sylvain Beucler
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


Please unblock package freedink-data

I updated the Dutch translation, along with instructions to regenerate
the .mo (in debian/rules).  Cf. #601245.

I also used by new @debian.org in debian/control.

unblock freedink-data/1.08.20100103-3

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing'), (300, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash





-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101025222333.8154.25840.report...@gun



Bug#1071417: org-mode 9.4.0+dfsg-1+deb11u2 flagged for acceptance

2025-05-05 Thread Sylvain Beucler

Hi Release Team,

FTR this is not the right bug, this was a bullseye PU for fossil, not 
org-mode (#1070108). Not sure what happened.


This fossil update never made it to bullseye.

Leaving this closed, planning a DLA with an updated fix.

Cheers!
Sylvain Beucler
Debian LTS Team

On Mon, 27 May 2024 14:04:37 + Jonathan Wiltshire  
wrote:

package release.debian.org
tags 1071417 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: org-mode
Version: 9.4.0+dfsg-1+deb11u2

Explanation: protect against unsafe remote resources [CVE-2024-30203 
CVE-2024-30204 CVE-2024-30205]




Bug#1104760: bookworm-pu: package fossil/1:2.21-1+deb12u1

2025-05-05 Thread Sylvain Beucler

Package: release.debian.org
Control: affects -1 + src:fossil
X-Debbugs-Cc: fos...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bookworm
X-Debbugs-Cc: b...@beuc.net
Severity: normal

Hello Release Team,

[ Reason ]

This update fixes #1070069: serious issue in the fossil HTTP client,
related to the fix for CVE-2024-24795 for apache2 (2.4.59-1~deb12u1),
preventing it from cloning from a fixed Apache2 server (which now
strips the 'Content-Length' response header issued by the fossil CGI
server, to prevent a general case of response splitting).

This was fixed in DLA-3819-1 for fossil/buster.
https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html

This superseeds #1070998 (full backport proposal), this is a targeted
fix.

[ Impact ]

The user can't use the fossil client to clone Fossil repositories
hosted with Apache2 (unless a specific server-side work-around was
applied in the Apache2 configuration), and otherwise can't cope with a
network configuration where the 'Content-Length' header is not
provided by the remote server/proxy stack.

[ Tests ]

No new test cases were introduced upstream. The embedded test suite
has errors, even in unstable, but with the patch it runs with the same
number of successes and errors, so no regression was spotted.

Later history of src/http.c was reviewed to spot possible regressions,
and follow-up fixes for 'Connection' headers is also included.

Manual testing was performed by reproducing the issue with an
Apache2+CGI+Fossil setup, with or without the configuration
work-around, and with or without enabling mod_http2 which triggers
different 'Connection' headers. In all cases cloning is now fixed.

[ Risks ]

The Fossil internal HTTP code seems a bit ad-hoc, but the upstream fix
is published for a year, and so is the buster DLA.

[ Checklist ]

  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in stable
  [X] the issue is verified as fixed in unstable (1:2.24-5)

[ Changes ]

Minimal backport of upstream changes, that make the HTTP client code a
bit more robust.

Typically the fossil client now can read data up to connection close
when the 'Content-Length' header is missing. Also fixes 'Connection'
header parsing to handle multiple values.

Unlike DLA-3819-1, no 'Break' header was introduced in debian/control,
as there's no particular conflict when fossil and apache2 are on the
same server. This is an issue with the fossil *client* and a remote
apache2.

[ Other info ]

A DLA is also planned for bullseye.
(#1071417 somehow didn't make it as a OSPU.)diff -Nru fossil-2.21/debian/changelog fossil-2.21/debian/changelog
--- fossil-2.21/debian/changelog2023-02-26 19:58:27.0 +0100
+++ fossil-2.21/debian/changelog2025-05-04 11:12:18.0 +0200
@@ -1,3 +1,13 @@
+fossil (1:2.21-1+deb12u1) bookworm; urgency=medium
+
+  * Non-maintainer upload by the LTS Security Team.
+  * Fix issue in the fossil HTTP client, related to the fix for
+CVE-2024-24795/apache2, preventing it from cloning from a fixed
+Apache2 server (which now strips the Content-Length response header
+issued by the fossil CGI server). (Closes: #1070069)
+
+ -- Sylvain Beucler   Sun, 04 May 2025 11:12:18 +0200
+
 fossil (1:2.21-1) unstable; urgency=medium
 
   * Add upstream/metadata
diff -Nru fossil-2.21/debian/patches/CVE-2024-24795-regression.patch 
fossil-2.21/debian/patches/CVE-2024-24795-regression.patch
--- fossil-2.21/debian/patches/CVE-2024-24795-regression.patch  1970-01-01 
01:00:00.0 +0100
+++ fossil-2.21/debian/patches/CVE-2024-24795-regression.patch  2025-05-04 
11:12:18.0 +0200
@@ -0,0 +1,139 @@
+Origin: https://fossil-scm.org/home/info/a8e33fb161f45b65
+Origin: https://fossil-scm.org/home/info/71919ad1b542832c
+Origin: https://fossil-scm.org/home/info/f4ffefe708793b03
+Origin: https://fossil-scm.org/home/info/5f47bb59a7846aeb
+Reviewed-by: Sylvain Beucler 
+Last-Update: 2025-05-04
+
+Only backported parts relevant to the fossil HTTP client fix,
+discarded debugging improvements.
+
+Commit:   a8e33fb161f45b65167f0dfe39b6fcbad21f5844ee469131fd8fa8fc09cd5e99
+Date: 2024-04-17 12:58:08
+Author:   drh
+Comment:  Fix the HTTP-reply parser so that it is able to deal with replies 
that lack a Content-Length header field.  This resolves the issue reported by 
[forum:/forumpost/12ac403fd29cfc89|forum post 12ac403fd29cfc89].  Also in this 
merge: (1) Add the --xverbose option to "fossil clone".  (2) Improved error 
messages when web servers misbehave.  See also my misguided and incorrect 
[https://bz.apache.org/bugzilla/show_bug.cgi?id=68905|Apache bug 68905]. 
Special thanks to Apache devs for setting me straight.
+Branch:   trunk
+Tags: trunk
+Phase:*MERGE* 
+
+Commit:   71919ad1b542832c615df0af08999c9624ade13

Bug#1101047: RM: php-horde/5.2.23+debian0-6

2025-03-22 Thread Sylvain Beucler

Package: release.debian.org
Control: affects -1 + src:php-horde
X-Debbugs-Cc: php-ho...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: rm
X-Debbugs-Cc: debian-...@lists.debian.org, b...@beuc.net
Severity: normal

Hello Release Team,

This is a request to RM the php-horde-* package set, from Debian 12
bookworm specifically.

Horde 5.x is currently incompatible with PHP8, making the package
mostly unusable, with many random errors.
See grave bugs at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?dist=stable;maint=team%2Bdebian-horde-team%40tracker.debian.org

No complete patch set for these issues is currently available.

New working installs are currently not possible, notably preventing
testing security fixes.

Note: php-horde-* is already dropped from trixie.
Note: The maintainers wish to maintain it in unstable.

See also the recap at:
https://lists.debian.org/debian-lts/2025/03/msg00012.html
and the maintainer's OK at:
https://lists.debian.org/debian-lts/2025/03/msg00017.html

There are many packages,
`grep 'Package: php-horde' 
deb.debian.org_debian_dists_bookworm_main_source_Sources`

gives me:

php-horde php-horde-activesync php-horde-alarm php-horde-ansel
php-horde-argv php-horde-auth php-horde-autoloader php-horde-browser
php-horde-cache php-horde-cli php-horde-compress
php-horde-compress-fast php-horde-constraint php-horde-content
php-horde-controller php-horde-core php-horde-crypt
php-horde-crypt-blowfish php-horde-css-parser php-horde-cssminify
php-horde-data php-horde-date php-horde-date-parser php-horde-dav
php-horde-db php-horde-editor php-horde-elasticsearch
php-horde-exception php-horde-feed php-horde-form php-horde-gollem
php-horde-group php-horde-groupware php-horde-hashtable
php-horde-history php-horde-http php-horde-icalendar php-horde-idna
php-horde-image php-horde-imap-client php-horde-imp php-horde-imsp
php-horde-ingo php-horde-injector php-horde-itip
php-horde-javascriptminify php-horde-kolab-format
php-horde-kolab-server php-horde-kolab-session php-horde-kolab-storage
php-horde-kronolith php-horde-ldap php-horde-listheaders
php-horde-lock php-horde-log php-horde-logintasks php-horde-lz4
php-horde-mail php-horde-mail-autoconfig php-horde-mapi
php-horde-memcache php-horde-mime php-horde-mime-viewer
php-horde-mnemo php-horde-nag php-horde-nls php-horde-notification
php-horde-oauth php-horde-openxchange php-horde-pack php-horde-passwd
php-horde-pdf php-horde-perms php-horde-prefs php-horde-queue
php-horde-rdo php-horde-role php-horde-routes php-horde-rpc
php-horde-scheduler php-horde-scribe php-horde-secret
php-horde-serialize php-horde-service-facebook
php-horde-service-gravatar php-horde-service-twitter
php-horde-service-urlshortener php-horde-service-weather
php-horde-sesha php-horde-sessionhandler php-horde-share
php-horde-smtp php-horde-socket-client php-horde-spellchecker
php-horde-stream php-horde-stream-filter php-horde-stream-wrapper
php-horde-support php-horde-syncml php-horde-template php-horde-test
php-horde-text-diff php-horde-text-filter php-horde-text-flowed
php-horde-thrift php-horde-timeobjects php-horde-timezone
php-horde-token php-horde-translation php-horde-trean php-horde-tree
php-horde-turba php-horde-url php-horde-util php-horde-vfs
php-horde-view php-horde-webmail php-horde-whups php-horde-wicked
php-horde-xml-element php-horde-xml-wbxml

Let me know if I can assist in any way.

Cheers!
Sylvain Beucler
Debian LTS Team



Re: Tooling for rebuilding outdated Built-Using

2025-06-19 Thread Sylvain Beucler

Hi,

On 18/06/2025 19:17, Jonathan Wiltshire wrote:

https://github.com/sebastinas/drt-tools

Output for bullseye attached, though it does not (afaik) add overlay suites
like o-p-u and I can't vouch for the accuracy of the run I did, I haven't
checked it at all.


Attached this time :(


Thanks!

AFAICS it's overall consistent with the other tooling, except for the 
extra 'supermin' (which doesn't seem to contain static executables).



On 18/06/2025 19:31, Adrian Bunk wrote:

Note that in LTS you will afterwards need either either manual
Build-Depends on the new version (if making a manual upload) or
extra-depends (when making a normal binNMU) since the pre-LTS
version of the glibc packages is in the chroots.

In the latter case any future DLAs (e.g. for bash or qemu) would again
be built against the pre-LTS glibc.

A solution for that would be either generating bullseye-security chroots
in setup-all-dchroots and using them, or dist-upgrade at the start of
the build.


Thanks for the info!

Is this specific to essential packages pre-installed in the buildd chroots?

Cheers!
Sylvain



Re: Tooling for rebuilding outdated Built-Using

2025-06-18 Thread Sylvain Beucler

Hi,

On 27/05/2025 14:06, Sean Whitton wrote:

Hello release team,

How do you detect packages that need rebuilding in stable releases
because they have outdated Built-Using?  Sylvain Beucler of the LTS team
noted that we may need to do this for bullseye because we have updated
glibc.

If there are already scripts to do this, it would be great if you could
direct me to them.  Thanks.


Probably something like:

# apt-cache dumpavail | \
grep-dctrl \
-F Built-Using 'glibc' -a \
'(' --not -F Architecture all ')' \
-s Source,Package,Version
Package: aide
Version: 0.17.3-4+deb11u2

Source: bash
Package: bash-static
Version: 5.1-2+deb11u1

Source: cdebootstrap (0.7.8)
Package: cdebootstrap-static
Version: 0.7.8+b3

Source: chkrootkit (0.54-1)
Package: chkrootkit
Version: 0.54-1+b2

Source: dar (2.6.13-2)
Package: dar-static
Version: 2.6.13-2+b3

Package: debian-installer
Version: 20210731+deb11u12

Source: sash (3.8-5)
Package: sash
Version: 3.8-5+b13

Source: tripwire (2.4.3.7-3)
Package: tripwire
Version: 2.4.3.7-3+b3

Source: zsh
Package: zsh-static
Version: 5.8-6+deb11u1

Source: zutils (1.10-1)
Package: zutils
Version: 1.10-1+b2

Source: busybox
Package: busybox-static
Version: 1:1.30.1-6+deb11u1

Package: docker.io
Version: 20.10.5+dfsg1-1+deb11u4

Source: qemu
Package: qemu-user-static
Version: 1:5.2+dfsg-11+deb11u4


then manually checking the last upload date, and evaluating the CVE impact.


Some more packages are selected without "--not -F Architecture all", 
including debian-installer-netboot-images and 
cross-toolchain-base-ports, but we don't have to rebuild everything, 
only those we think may be impacted by fixed CVEs.



Note: Built-Using is less exhaustive in older (ELTS) releases.
See also 
https://lts-team.pages.debian.net/wiki/TestSuites/golang.html#identify-reverse-build-dependencies



This is tracked through
https://salsa.debian.org/lts-team/lts-updates-tasks/-/issues/227

Cheers!
Sylvain Beucler
Debian LTS Team