LTS report for October 2023

2023-11-02 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in October 2023. I reviewed the patch for CVE-2023-44487 in h2o backported by Anton Gladky regarding the ABI break in the shared library. Here, the difficulty arises from the need to add runtime state to an exported structure (whic

(E)LTS and Debian report for September 2023

2023-09-29 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in September 2023. In previous months I worked on other topics than LTS. I no longer include funding aspects here to avoid duplication with the Freexian funding blog, so this is just about LTS/ELTS. In September, I uploaded python2

(E)LTS and Debian report for April 2023

2023-05-03 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in April 2023. (E)LTS == I issued DLA-3393-1 and ELA-836-1 for protobuf in buster, stretch and jessie. In that process, I deemed three out of six vulnerabilities (all being denial of service conditions in the Java implementati

(E)LTS and Debian report for March 2023

2023-04-03 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in March 2023. (E)LTS == I issued a regression update for my previous security update of sox for all suites. Thanks to the security team for coordination and doing the stable part. I issued a security update for joblib to all

(E)LTS and Debian report for February 2023

2023-03-01 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in February 2023. (E)LTS == I promised an update of heimdal since December. We finally are there. The thing that took us so long was CVE-2022-45142 and you can get the details from https://www.openwall.com/lists/oss-security/2

(E)LTS and Debian report for January 2023

2023-02-02 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in January 2023. LTS === I issued DLA-3265-1 for exiv2 fixing 26 CVEs. I continued the heimdal saga. We finally have an embargo deadline being February 8th. I started working on sox. The embargo for sox will end tomorrow. Stay tu

(E)LTS and Debian report for December 2022

2023-01-02 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in December 2022. LTS === * I issued DLA-3223-1 for giflib. * I reviewed the joblib DLA and reopened it. * I issued DLA-3226-1 for cgal. * I issued DLA-3233-1 for leptonlib. * I started working on exiv2, but ran out of time. * I s

(E)LTS and Debian report for November 2022

2022-12-04 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in November 2022. LTS === I issued DLA-3204-1 for vim and DLA-3214-1 for libraw. These took care of all outstanding issues including no-dsa ones at the time of their release. ELTS I finished my work on the glibc update, whi

(E)LTS and Debian report for October 2022

2022-11-01 Thread Helmut Grohne
Hi, I am funded by Freexian SARL and thus reporting about my work in October 2022. LTS === I issued DLA-3133-1 for lighttpd fixing a denial of service vulnerability in buster. I issued DLA-3152-1 for glibc fixing 14 CVEs in buster and triaged a few more. Thus far one regression has surfaced. P

Re: Call for testing: glibc update for buster

2022-10-17 Thread Helmut Grohne
Hi Sylvain, On Wed, Oct 12, 2022 at 03:45:11PM +0200, Sylvain Beucler wrote: > I'll give it some testing on my buster system. Thank you. I take the absense of a further reponse as "nothing broke". > A couple things I noticed right now: > > - dist in debian/changelog should be 'buster-security'

Call for testing: glibc update for buster

2022-10-11 Thread Helmut Grohne
Hi, I've prepared a LTS update for glibc and seek people testing it. Builds for amd64 and armfh as well as a .debdiff are available from http://subdivi.de/~helmut/glibc_lts. I plan to fix no less than 14 CVEs. Those mostly fall into one of the following categories: * 4 * iconv * 2 * unix socket

Re: RFR: openscad update

2022-06-27 Thread Helmut Grohne
Hi Anton, On Mon, Jun 27, 2022 at 09:12:11PM +0200, Anton Gladky wrote: > Thus you can get an experience with dealing of such uploads. Anyway, for > LTS we do not have any point releases. So basically it is possible to fix > even those CVEs which are not DSA-considered. But for not-important issue

RFR: openscad update

2022-06-23 Thread Helmut Grohne
-1,3 +1,10 @@ +openscad (2019.01~RC2-2+deb10u2) UNRELEASED; urgency=high + + * Non-maintainer upload by the LTS Team. + * Fix input validation (CVE-2022-0496 and CVE-2022-0497) (Closes: #1005641) + + -- Helmut Grohne Wed, 22 Jun 2022 22:06:51 +0200 + openscad (2019.01~RC2-2+deb10u1) buster;