Debian (E)LTS report for January 2025

2025-02-02 Thread Guilhem Moulin
During the month of January 2025 and on behalf of Freexian, I worked on the following: python-reportlab Uploaded 3.1.8-3+deb8u3 (jessie) and issued ELA-1289-1. https://www.freexian.com/lts/extended/updates/ela-1289-1-python-reportlab/ * CVE-2019-19450: Code injection in parapar

Debian (E)LTS report for December 2024

2025-01-01 Thread Guilhem Moulin
During the month of December 2024 and on behalf of Freexian, I worked on the following: php7.4, php7.3, php7.0 and php5 --- Uploaded php7.4=7.4.33-1+deb11u7 and issued DLA-3986-1. https://lists.debian.org/msgid-search/?m=z1wxnl0vw0es6...@debian.org * CVE-2024-8929:

Debian LTS report for November 2024

2024-12-01 Thread Guilhem Moulin
During the month of November 2024 and on behalf of Freexian, I worked on the following: opensc -- Kept backporting more fixes for known vulnerabilities, notably CVE-2023-5992, CVE-2023-40660 and CVE-2023-40661, but didn't upload yet as more security issues need to fixed first. Work is ongoin

Debian (E)LTS report for October 2024

2024-10-31 Thread Guilhem Moulin
During the month of October 2024 and on behalf of Freexian, I worked on the following: php7.4 -- Uploaded 7.4.33-1+deb11u6 and issued DLA-3920-1. https://lists.debian.org/msgid-search/?m=zw20swdcj3zl6...@debian.org * CVE-2022-4900: Setting the environment variable PHP_CLI_SERVER_WORKER

Debian (E)LTS report for September 2024

2024-09-30 Thread Guilhem Moulin
During the month of September 2024 and on behalf of Freexian, I worked on the following: dovecot --- Uploaded 1:2.3.13+dfsg1-2+deb11u2 and issued DLA-3860-1. https://lists.debian.org/msgid-search/?m=ztxjlvofwoqm2...@debian.org * CVE-2024-23184: Having a large number of address headers (Fro

Debian (E)LTS report for August 2024

2024-09-01 Thread Guilhem Moulin
During the month of August 2024 and on behalf of Freexian, I worked on the following: roundcube - Uploaded 1.3.17+dfsg.1-1~deb10u7 to buster-security resp. 1.4.15+dfsg.1-1+deb11u4 to bullseye-security, and issued ELA-1170-1 for * CVE-2024-42008: XSS in serving of attachments other than

Debian LTS report for July 2024

2024-07-31 Thread Guilhem Moulin
During the month of July 2024 and on behalf of Freexian, I worked on the following: libvirt --- Submitted an os-pu for 7.0.0-3+deb11u3, fixing the following no-dsa security issues: * CVE-2021-3631: SELinux MCS may be accessed by another machine. * CVE-2021-3667: Improper locking in the v

Debian LTS report for June 2024

2024-07-02 Thread Guilhem Moulin
During the month of June 2024 and on behalf of Freexian, I worked on the following: python-idna --- Upload 2.10-1+deb11u1 and 3.3-1+deb12u1 to (o)s-pu to fix CVE-2024-3651 (potential DoS issue). roundcube - Uploaded 1.3.17+dfsg.1-1~deb10u6 and issued DLA-3835-1. https://lists.de

Debian LTS report for May 2024

2024-06-02 Thread Guilhem Moulin
During the month of May 2024 and on behalf of Freexian, I worked on the following: php7.3 -- Uploaded 7.3.31-1~deb10u6 and issued DLA-3810-1. https://lists.debian.org/msgid-search/?m=zjq5or0vqptng...@debian.org * CVE-2024-2756: Due to an incomplete fix to CVE-2022-31629, network and sa

Debian LTS report for April 2024

2024-05-01 Thread Guilhem Moulin
During the month of April 2024 and on behalf of Freexian, I worked on the following: gnutls28 Triaged CVE-2024-28834 and -28835. util-linux -- Uploaded 2.33.1-0.1+deb10u1 and issued DLA-3782-1. https://lists.debian.org/msgid-search/?m=zhj4lnfse0rh2...@debian.org * CVE-2021-3

Debian LTS report for March 2024

2024-04-01 Thread Guilhem Moulin
During the month of March 2024 and on behalf of Freexian, I worked on the following: phpseclib - Uploaded 1.0.19-3~deb10u3 and issued DLA-3749-1. https://lists.debian.org/msgid-search/?m=zeck08zg6y-jz...@debian.org * CVE-2024-27354: An attacker can construct a malformed certificate

Debian LTS report for February 2024

2024-03-02 Thread Guilhem Moulin
During the month of February 2024 and on behalf of Freexian, I worked on the following: gnutls28 Uploaded 3.6.7-4+deb10u12 and issued DLA-3740-1 https://lists.debian.org/msgid-search/?m=zdxck-hkepfc8...@debian.org * CVE-2024-0553: Timing side-channel attack in the RSA-PSK key exchan

Debian LTS report for January 2024

2024-02-01 Thread Guilhem Moulin
During the month of January 2024 and on behalf of Freexian, I worked on the following: php-phpseclib - Uploaded 2.0.30-2~deb10u2 and issued DLA-3718-1 https://lists.debian.org/msgid-search/?m=zbhgvxygvemfp...@debian.org * CVE-2023-48795: Terrapin attack phpseclib - Uploade

Debian LTS report for December 2023

2024-01-01 Thread Guilhem Moulin
During the month of December 2023 and on behalf of Freexian, I worked on the following: ncurses --- Uploaded 6.1+20181013-2+deb10u5 and issued DLA-3682-1 https://lists.debian.org/msgid-search/?m=zwznc9mam3buc...@debian.org * CVE-2021-39537: The tic(1) utility was susceptible to a heap

Re: [SECURITY] [DLA 3676-1] horizon security update

2023-11-30 Thread Guilhem Moulin
On Thu, 30 Nov 2023 at 19:47:42 -0500, Roberto C. Sánchez wrote: > Yes, I would recommend two things. Done, thanks Roberto! -- Guilhem.

Re: [SECURITY] [DLA 3676-1] horizon security update - INCORRECT DLA ID

2023-11-30 Thread Guilhem Moulin
On Thu, 30 Nov 2023 at 23:59:28 +0100, Guilhem Moulin wrote: > - > Debian LTS Advisory DLA-3676-1debian-lts@lists.debian.org > https://www.debian.org/lts/security/ Guilh

Debian LTS report for November 2023

2023-11-30 Thread Guilhem Moulin
During the month of November 2023 and on behalf of Freexian, I worked on the following: opensc -- Uploaded 0.19.0-1+deb10u3 and issued DLA-3668-1 https://lists.debian.org/msgid-search/?m=zwpsqzcsk_2as...@debian.org * CVE-2023-40660: Potential PIN bypass. The bypass was removed and exp

Re: [SECURITY] [DLA 3676-1] horizon security update

2023-11-30 Thread Guilhem Moulin
On Thu, 30 Nov 2023 at 23:59:28 +0100, Guilhem Moulin wrote: > - > Debian LTS Advisory DLA-3676-1debian-lts@lists.debian.org > https://www.debian.org/lts/security/ Guilh

Re: MediaWiki on buster

2023-11-20 Thread Guilhem Moulin
Hi, On Sat, 18 Nov 2023 at 03:39:33 -0500, Chris Frey wrote: > I noticed that MediaWiki has suffered from the following CVE's for > a while: > > CVE-2023-45363 > CVE-2023-45362 > CVE-2023-45360 > > Is the work-in-progress available via git somewhere? Fixed CVE-2023-3550 and -453

Debian LTS report for October 2023

2023-11-01 Thread Guilhem Moulin
During the month of October 2023 and on behalf of Freexian, I worked on the following: python-urllib3 -- Uploaded 1.24.1-1+deb10u1 and issued DLA-3610-1 https://lists.debian.org/msgid-search/?m=zsknlpfmnhu4q...@debian.org * CVE-2018-25091: The fix for CVE-2018-20060 did not cover

Debian LTS report for September 2023

2023-10-01 Thread Guilhem Moulin
During the month of September 2023 and on behalf of Freexian, I worked on the following: php7.3 -- Uploaded 7.3.31-1~deb10u5 and issued DLA-3555-1 https://lists.debian.org/msgid-search/?m=zpexm9jokfktz...@debian.org * CVE-2023-3823: Security issue with external entity loading in XML wi

Debian LTS report for August 2023

2023-08-31 Thread Guilhem Moulin
During the month of August 2023 and on behalf of Freexian, I worked on the following: * DLA-3515-1 for cjose=0.6.1+dfsg1-1+deb10u1 [CVE-2023-37464] https://lists.debian.org/msgid-search/?m=zmzs4jlh%2bwykb...@debian.org * DLA-3551-1 for otrs2=6.0.16-2+deb10u1 [CVE-2019-11358, CVE-2

Debian LTS report for July 2023

2023-08-01 Thread Guilhem Moulin
During the month of July 2023 and on behalf of Freexian, I worked on the following: * DLA-3488-1 for node-tough-cookie=2.3.4+dfsg-1+deb10u1 [CVE-2023-26136] https://lists.debian.org/msgid-search/?m=zkxrmnkoiqoif...@debian.org * DLA-3493-1 for symfony=3.4.22+dfsg-2+deb10u2 [CVE-202

Debian LTS report for June 2023

2023-07-01 Thread Guilhem Moulin
During the month of June 2023 and on behalf of Freexian, I worked on the following: * DLA-3442-1 for nbconvert=5.4-2+deb10u1 [CVE-2021-32862: GHSL-2021-1013 to -1028] https://lists.debian.org/msgid-search/?m=zhteirpktw6wr...@debian.org * DLA-3458-1 for php7.3=7.3.31-1~deb10u4 [CVE

Debian LTS report for May 2023

2023-06-01 Thread Guilhem Moulin
During the month of May 2023 and on behalf of Freexian, I worked on the following: * DLA-3424-1 for python-ipaddress=1.0.17-1+deb10u1 CVE-2020-14422 https://lists.debian.org/msgid-search/?m=zglark8btpj4t...@debian.org * DLA-3425-1 for sqlparse=0.2.4-1+deb10u1 CVE-2023-30608 ht

Debian LTS report for April 2023

2023-05-01 Thread Guilhem Moulin
During the month of April 2023 and on behalf of Freexian, I worked on the following: * DLA-3410-1 for openvswitch=2.10.7+ds1-0+deb10u4 CVE-2023-1668 https://lists.debian.org/msgid-search/?m=ze8ep8fiq5ztl...@debian.org * Triage WordPress' outstanding CVEs and conclude no DLA is warrant

Debian LTS report for March 2023

2023-04-02 Thread Guilhem Moulin
During the month of March 2023 and on behalf of Freexian, I worked on the following: * DLA-3347-2 for spip=3.2.4-1+deb10u11 [Regression update for DLA-3347-1] https://lists.debian.org/msgid-search/?m=zaj85ko1lavxw...@debian.org * DLA-3363-1 for pcre2=10.32-5+deb10u1 CVE-2019-20454

Debian LTS report for February 2023

2023-03-01 Thread Guilhem Moulin
During the month of February 2023 and on behalf of Freexian, I worked on the following: * DLA-3336-1 for node-url-parse=1.2.0-2+deb10u2 CVE-2021-3664, CVE-2021-27515, CVE-2022-0512, CVE-2022-0639, CVE-2022-0686 and CVE-2022-0691 https://lists.debian.org/msgid-search/?m=Y/a5cbemzr3li.

Debian LTS report for January 2023

2023-02-01 Thread Guilhem Moulin
During the month of January 2023 and on behalf of Freexian, I worked on the following: * DLA-3270-1: net-snmp 5.7.3+dfsg-5+deb10u4 CVE-2022-44793 and CVE-2022-44792 https://lists.debian.org/msgid-search/Y8Nreff/4mms8...@debian.org * DLA-3271-1: node-minimatch 3.0.4-3+deb10u1 CVE-2

LTS report for December 2022

2023-01-08 Thread Guilhem Moulin
Hi, During the month of December 2022 and on behalf of Freexian, I worked on the following: * DLA-3221-1, node-cached-path-relative (prototype pollution) https://lists.debian.org/msgid-search/y40yr8jdg8vmg...@debian.org * DLA-3222-1, node-fetch (information leak) https://lists.debian.org

Re: roundcube: CVE-2021-46144: XSS vulnerability via HTML messages with malicious CSS content

2022-01-12 Thread Guilhem Moulin
Hi Sylvain! On Wed, 12 Jan 2022 at 15:48:51 +0100, Sylvain Beucler wrote: > On 12/01/2022 14:15, Guilhem Moulin wrote: >> In a recent post roundcube webmail upstream has announced the following >> security fix for #1003027. >> >> CVE-2021-46144: Cross-site script

roundcube: CVE-2021-46144: XSS vulnerability via HTML messages with malicious CSS content

2022-01-12 Thread Guilhem Moulin
x for CVE-2021-46144: Fix cross-site scripting (XSS) via HTML +messages with malicious CSS content. (Closes: #1003027) + + -- Guilhem Moulin Wed, 12 Jan 2022 12:56:32 +0100 + roundcube (1.2.3+dfsg.1-4+deb9u9) stretch-security; urgency=high * Non-maintainer upload by the LTS team. diff

Re: roundcube: CVE-2020-35730: XSS vulnerability via malious HTML or plaintext messages

2020-12-28 Thread Guilhem Moulin
On Mon, 28 Dec 2020 at 12:10:46 +0530, Utkarsh Gupta wrote: > On Mon, Dec 28, 2020 at 8:28 AM Guilhem Moulin wrote: >> Debdiff tested and attached. I can upload if you'd like but would >> appreciate if you could take care of the DLA :-) > > Yes, please. I can take ca

roundcube: CVE-2020-35730: XSS vulnerability via malious HTML or plaintext messages

2020-12-27 Thread Guilhem Moulin
cious content svg/namespace. (Closes: #978491) + + -- Guilhem Moulin Mon, 28 Dec 2020 03:25:57 +0100 + roundcube (1.2.3+dfsg.1-4+deb9u7) stretch-security; urgency=high * Backport security fix for CVE-2020-16145: Cross-site scripting (XSS) diff -Nru roundcube-1.2.3+dfsg.1/debian/patches/CVE-2020-

Re: roundcube: CVE-2020-16145: XSS vulnerability via HTML messages with malicious SVG or math content

2020-08-11 Thread Guilhem Moulin
Hi Roberto, On Tue, 11 Aug 2020 at 14:57:15 -0400, Roberto C. Sánchez wrote: >>> Dear security team, Should have been LTS team of course, bad templating from my side :-P >> I'll take care of it shortly. >> > I have uploaded the updated, published the DLA to the mailing list and > submitted a Sa

roundcube: CVE-2020-16145: XSS vulnerability via HTML messages with malicious SVG or math content

2020-08-11 Thread Guilhem Moulin
16145: Cross-site scripting (XSS) +vulnerability via HTML messages with malicious svg or math +content. (Closes: #968216) + + -- Guilhem Moulin Tue, 11 Aug 2020 18:38:40 +0200 + roundcube (1.2.3+dfsg.1-4+deb9u6) stretch; urgency=high * Backport security fix for CVE-2020-15562: Cross

Re: CVE-2019-11627: Shell injection vulnerability in signing-party 1.1.10-3

2019-05-01 Thread Guilhem Moulin
On Wed, 01 May 2019 at 18:44:39 +0200, Markus Koschany wrote: > Thank you very much. I didn't want to bother you and went ahead and > uploaded your patch only an hour ago. I will issue the DLA now. Aha, should have refreshed the page before sending this :-P Thanks! -- Guilhem. signature.asc D

CVE-2019-11627: Shell injection vulnerability in signing-party 1.1.10-3

2019-05-01 Thread Guilhem Moulin
helling out to `iconv`. (Closes: #928256.) + + -- Guilhem Moulin Wed, 01 May 2019 17:39:56 +0200 + signing-party (1.1.10-3) unstable; urgency=medium [ Guilhem Moulin ] diff -Nru signing-party-1.1.10/debian/control signing-party-1.1.10/debian/control --- signing-party-1.1.10/debian/control 2014-11

Re: buffer overflow vulnerability in netmask 2.3.12

2019-02-06 Thread Guilhem Moulin
Hi anarcat, On Wed, 06 Feb 2019 at 14:13:23 -0500, Antoine Beaupré wrote: > On 2019-02-06 01:59:58, Guilhem Moulin wrote: >> * Upstream hasn't yet filed a CVE for this issue; I forwarded jmm's >> instructions regarding this. > > Sorry, forwarded where? Did I mi

buffer overflow vulnerability in netmask 2.3.12

2019-02-05 Thread Guilhem Moulin
og 2010-04-26 04:29:39.0 +0200 +++ netmask-2.3.12+deb8u1/debian/changelog 2019-02-06 01:08:09.0 +0100 @@ -1,3 +1,10 @@ +netmask (2.3.12+deb8u1) jessie-security; urgency=medium + + * Fix buffer overflow vulnerability +https://github.com/tlby/netmask/issues/3 + + -- Guil

Re: dropbear 2014.65-1+deb8u3 to fix CVE-2018-15599

2018-08-24 Thread Guilhem Moulin
Hi Holger, On Fri, 24 Aug 2018 at 09:06:43 +, Holger Levsen wrote: > On Fri, Aug 24, 2018 at 08:22:50AM +, Holger Levsen wrote: >>> dropbear 2014.65-1+deb8u2 from jessie-security is vulnerable to >>> CVE-2018-15599: >>> dget -x >>> https://people.debian.org/~guilhem/tmp/dropbear_2014.65

dropbear 2014.65-1+deb8u3 to fix CVE-2018-15599

2018-08-23 Thread Guilhem Moulin
Adapted from https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00 . + + -- Guilhem Moulin Fri, 24 Aug 2018 02:52:26 +0200 + dropbear (2014.65-1+deb8u2) stable-security; urgency=high * Backport security fixes from 2017.75 (closes: #862970): only in patch2: unchanged: --- dropbear-2014.65.o

Re: Wheezy update of roundcube?

2017-11-19 Thread Guilhem Moulin
Hi Ola, Sorry for the delay, not sure if you got an answer yet; either way I'm not answering on behalf of the team here. On Sat, 11 Nov 2017 at 20:14:38 +0100, Ola Lundqvist wrote: > Would you like to take care of this yourself? > > The proposed patch for later release will not apply cleanly to

Re: Wheezy update of dropbear?

2017-05-21 Thread Guilhem Moulin
Hi, On Sun, 21 May 2017 at 20:52:30 +0200, Ola Lundqvist wrote: > I saw the upload now. Do you plan to send a DLA for it as well? In a reply to the other thread Thorsten Alteholz wrote he uploaded 2012.55-1.3+deb7u2 and will later also send the DLA. Cheers, -- Guilhem. signature.asc Descripti

Re: Wheezy update of dropbear?

2017-05-21 Thread Guilhem Moulin
Hi Ola, On Sun, 21 May 2017 at 14:11:54 +0200, Ola Lundqvist wrote: > Would you like to take care of this yourself? > […] > If that workflow is a burden to you, feel free to just prepare an > updated source package and send it to debian-lts@lists.debian.org > (via a debdiff, or with an URL pointin

Re: dropbear 2012.55-1.3+deb7u2 to fix CVE-2017-9079

2017-05-20 Thread Guilhem Moulin
On Sat, 20 May 2017 at 21:37:02 +0200, Guilhem Moulin wrote: > Not sure how to tell the security tracker, though. Oops, just saw the docs :-P -- Guilhem. signature.asc Description: PGP signature

dropbear 2012.55-1.3+deb7u2 to fix CVE-2017-9079

2017-05-20 Thread Guilhem Moulin
o contain valid +authorized_keys with command= options it might be possible to read other +contents of that file. +This information disclosure is to an already authenticated user. + + -- Guilhem Moulin Sat, 20 May 2017 20:49:16 +0200 + dropbear (2012.55-1.3+deb7u1) wheezy-securit

Re: Wheezy update of dropbear?

2016-09-17 Thread Guilhem Moulin
Dear LTS team, On Thu, 15 Sep 2016 at 17:56:49 +0200, Markus Koschany wrote: > If you don't want to take care of this update, it's not a problem, we > will do our best with your package. Just let us know whether you would > like to review and/or test the updated package before it gets released. S

Re: Wheezy update of roundcube?

2016-05-03 Thread Guilhem Moulin
On Tue, 03 May 2016 at 10:47:31 -0400, Antoine Beaupré wrote: > I agree, however I suspect most people using roundcube in production are > probably using the backport... There's even a dangling backport in > wheezy right now (0.9)... a little messy. Sorry, I meant oldstable-backports not oldstable

Re: Wheezy update of roundcube?

2016-05-02 Thread Guilhem Moulin
Hi there, On Mon, 02 May 2016 at 21:19:13 +0200, Markus Koschany wrote: > Would you like to take care of this yourself? Not replying in the name of team (however I'm the one who pushed for Roundcube in jessie-backports and who is trying to taking care of it there), unfortunately I don't have the