Re: EOLing nvidia-graphics-drivers for bullseye?

2025-08-08 Thread Santiago Ruano Rincón
El 24/06/25 a las 22:53, Santiago Ruano Rincón escribió: > El 24/06/25 a las 23:15, Andreas Beckmann escribió: > > On 6/24/25 19:46, Santiago Ruano Rincón wrote: > > > I plan to contact directly the sponsor to study the impact of > > > (officially) stopping supporting n

Re: ca-certificates and backport to bullseye => ca-certificates-java problem

2025-08-07 Thread Santiago Ruano Rincón
El 01/08/25 a las 19:08, Bastien Roucaries escribió: > Le jeudi 31 juillet 2025, 22:30:11 heure d’été d’Europe centrale Vladimir > Petko a écrit : > Hi, > > > Hi, > > > > As far as I remember, 20230707 removes the circular dependency that > > caused upgrade issues[1][2][3]. It also requires open

Re: EOLing nvidia-graphics-drivers for bullseye?

2025-06-24 Thread Santiago Ruano Rincón
El 24/06/25 a las 23:15, Andreas Beckmann escribió: > On 6/24/25 19:46, Santiago Ruano Rincón wrote: > > I plan to contact directly the sponsor to study the impact of > > (officially) stopping supporting nvidia-graphics-driver. But before > > that, it would be helpful to k

Re: EOLing nvidia-graphics-drivers for bullseye?

2025-06-24 Thread Santiago Ruano Rincón
Hello all, El 24/06/25 a las 14:06, Sylvain Beucler escribió: > Hi, > > On 24/06/2025 12:57, Andreas Beckmann wrote: > > On 6/23/25 20:51, Tobias Frost wrote: > > > Therefore I'd suggest to drop support for nvidia-graphics-drivers and > > > add it to debian-security-support. > > > > No objection

Re: [SECURITY] [DLA 4208-1] mariadb-10.5 security update

2025-06-04 Thread Santiago Ruano Rincón
Hello Otto, El 04/06/25 a las 19:44, Otto Kekalainen escribió: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > From: Otto Kekäläinen > To: debian-lts-annou...@lists.debian.org > Subject: [SECURITY] [DLA 4208-1] mariadb-10.5 security update > > - -

Re: tcpdf {old,}stable security update

2025-05-29 Thread Santiago Ruano Rincón
El 29/05/25 a las 12:28, Moritz Mühlenhoff escribió: > Am Tue, May 27, 2025 at 06:40:38PM -0300 schrieb Santiago Ruano Rincón: > > > Else, you can push to a debian/bookworm branch and release the changes. > > > Each > > > commit looks good. > > > > Thank

Re: tcpdf {old,}stable security update

2025-05-27 Thread Santiago Ruano Rincón
for reviewing! > > Let me know for the upload. > > -- > William Desportes > Le 2025/05/26 18:44, Santiago Ruano Rincón a écrit : > > Bonjour William, hello security team, > > > > El 16/05/25 a las 17:37, Santiago Ruano Rincón escribió: > > > El 16/05/25 a

Re: tcpdf {old,}stable security update (was: PHP ReDoS question)

2025-05-26 Thread Santiago Ruano Rincón
Bonjour William, hello security team, El 16/05/25 a las 17:37, Santiago Ruano Rincón escribió: > El 16/05/25 a las 21:08, William Desportes escribió: > > Hello, > > > > Thank you for reaching out to me. > > Do you have access to the salsa repository? [...] This is

Re: tcpdf {old,}stable security update (was: PHP ReDoS question)

2025-05-16 Thread Santiago Ruano Rincón
t pushed into tcpdf > since some years. Great! > > And yes, no POC to be found. Quite a shame, fixes come out of nowhere and are > released as they are. > -- > William Desportes > > Le 16 mai 2025 20:13:21 GMT+02:00, "Santiago Ruano Rincón" > a écrit : >

tcpdf {old,}stable security update (was: PHP ReDoS question)

2025-05-16 Thread Santiago Ruano Rincón
Hello William, hello all, This is just a quick heads-up about my on-going work to prepare a security update for tcpdf, and to avoid any double-work. Among the currently open CVEs [tcpdf], the most complex backport seems to be CVE-2024-32489, since among the two referenced commits, the only one th

Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped)

2025-05-16 Thread Santiago Ruano Rincón
Dear security team, El 10/05/25 a las 16:14, Samuel Henrique escribió: > Hello Salvatore, sorry about the late reply, I was in MiniDebConf Maceió. > > On Thu, 1 May 2025 at 06:24, Salvatore Bonaccorso wrote: > > Yes the A2 would go in the direction we are thingking, internally we > > have said t

Re: Bug#1079454: bookworm-pu: package python-django/3:3.2.19-1+deb12u2

2025-05-09 Thread Santiago Ruano Rincón
El 08/05/25 a las 13:05, Chris Lamb escribió: > Hi Santiago, Hi Chris, > > As a follow up of https://lists.debian.org/debian-lts/2025/05/msg00023.html, > > I forgot to check if a pu for python-django was in the queue. And I > > would just like to point you out about the above questions from > >

Re: Test uploads for bookworm-security on debusine.debian.net

2025-05-08 Thread Santiago Ruano Rincón
El 08/05/25 a las 18:45, Adrian Bunk escribió: > On Wed, May 07, 2025 at 01:26:32PM -0300, Santiago Ruano Rincón wrote: Hi Adrian > > Currently, debusine.d.n helps to verify how a packages builds on > > different architectures, to run autopkgest (contrary to Salsa CI, > > d

Re: Bug#1079454: bookworm-pu: package python-django/3:3.2.19-1+deb12u2

2025-05-07 Thread Santiago Ruano Rincón
Hi again Chris! El 19/04/25 a las 21:16, Salvatore Bonaccorso escribió: > Hi Chris, > > On Fri, Mar 14, 2025 at 06:38:56AM +0100, Salvatore Bonaccorso wrote: > > Hi, > > > > [including Chris in CC] > > > > On Sun, Oct 20, 2024 at 09:05:43AM +0200, Paul Gevers wrote: > > > Hi Steve, > > > > > >

Re: Test uploads for bookworm-security on debusine.debian.net

2025-05-07 Thread Santiago Ruano Rincón
Hi Chris, (Moving the secteam to BCC, to avoid spamming them too much afterwards.) El 07/05/25 a las 09:36, Chris Lamb escribió: > Hey Santiago, > > > According to dsa-needed.txt, nodejs and python-django are being > > prepared by rouca and lamby, respectively. > > > > Could you please tell me i

Test uploads for bookworm-security on debusine.debian.net

2025-05-07 Thread Santiago Ruano Rincón
Hello all, (CCing the security team just for visibility - I hope this is not too much noise.) As I mentioned to rouca on #debian-lts, I would like to ask your help to test debusine.debian.net to test the uploads that you are preparing for bookworm-security. According to dsa-needed.txt, nodejs an

Xen 4.17 LTS

2025-04-29 Thread Santiago Ruano Rincón
Hello all, (And sorry, I realise now that I should had put the security team and Xen maintainers more in the loop at some point.) This is something that we had tried to do for Xen 4.14 (https://bugs.debian.org/1053246), but we failed to find an external party able to help. The full announcement c

Re: Debian LTS BoF at DebConf 25?

2025-04-16 Thread Santiago Ruano Rincón
El 16/04/25 a las 15:06, Sylvain Beucler escribió: > Hi, > > On 14/04/2025 02:49, Santiago Ruano Rincón wrote: > > Who is interested in having an LTS BoF during DC 25? > > > > Part of the topics that we could discuss is the security-tracker-related > > work that

Debian LTS BoF at DebConf 25?

2025-04-13 Thread Santiago Ruano Rincón
Hi there! Who is interested in having an LTS BoF during DC 25? Part of the topics that we could discuss is the security-tracker-related work that we plan to tackle during DebCamp (BTW, deadline for bursaries is tomorrow, 2025-04-14!). If LTS sponsors are planing to attend, it would be a nice opp

Re: [SECURITY] [DLA 4124-1] twitter-bootstrap3 security update

2025-04-13 Thread Santiago Ruano Rincón
Hi Bastien, El 13/04/25 a las 16:15, ro...@debian.org escribió: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > - - > Debian LTS Advisory DLA-4124-1debian-lts@lists.debian.org > https://www.debian.org/

Bug#1100929: debian-security-support: Mark odoo as EOL'ed in bullseye LTS

2025-03-20 Thread Santiago Ruano Rincón
Package: debian-security-support Version: 1:13+2025.01.30 Severity: normal X-Debbugs-Cc: debian-lts@lists.debian.org Hello there, I would like to propose EOL'ing odoo in bullseye, because 14.0 has been EOL'ed by upstream and the complexity of backporting patches seems to be too high. There is cu

Re: Bug#1095239: fuse3: Please package latest upstream version available: 3.16.2

2025-02-10 Thread Santiago Ruano Rincón
El 08/02/25 a las 08:58, Santiago Ruano Rincón escribió: > El 06/02/25 a las 17:46, László Böszörményi (GCS) escribió: > > On Wed, Feb 5, 2025 at 8:18 PM Santiago Ruano Rincón > > wrote: [snip] > > It seems 3.17 is coming, at least this commit [4] seems interesting &

Re: Bug#1095239: fuse3: Please package latest upstream version available: 3.16.2

2025-02-08 Thread Santiago Ruano Rincón
El 06/02/25 a las 17:46, László Böszörményi (GCS) escribió: > Hi Santiago, > > On Wed, Feb 5, 2025 at 8:18 PM Santiago Ruano Rincón > wrote: > > Testing (trixie) currently ships fuse3 3.14.0. FYI, upstream released > > 3.16.2 on Oct 10th 2023: > > https://github.co

simplesamlphp 2.x for trixie? (Re: Bug#1088816: Current version not supported)

2025-02-06 Thread Santiago Ruano Rincón
Control: User -1 debian-lts@lists.debian.org Control: Usertag -1 + upstream-trixie Hello Thijs and LTS team, El 01/12/24 a las 17:38, Thijs Kinkhorst escribió: > Package: simplesamlphp > Severity: grave > Tags: trixie sid > > The current package in testing and unstable is version 1.19. Upstream

Bug#1095239: fuse3: Please package latest upstream version available: 3.16.2

2025-02-05 Thread Santiago Ruano Rincón
Source: fuse3 Version: 3.14.0-10 Severity: normal User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear László, Testing (trixie) currently ships fuse3 3.14.0. FYI, upstream released 3.16.2 on Oct 10th 2023: https://github.com/libfuse/libfuse/re

Re: Bug#1095072: orthanc: Orthanc crashes with lastest dcmtk or libdcmtk15 security update

2025-02-05 Thread Santiago Ruano Rincón
Hi, El 03/02/25 a las 15:15, infra...@alara-group.fr escribió: > Package: orthanc > Version: 1.9.2+really1.9.1+dfsg-1+deb11u1 > Severity: grave > Justification: renders package unusable > X-Debbugs-Cc: debian-lts@lists.debian.org > > Dear Maintainer, > > The last dcmtk/libdcmtk15 security update

Bug#1095109: wget: New upstream relase available: 1.25.0

2025-02-03 Thread Santiago Ruano Rincón
Source: wget Severity: normal User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear Noël, Testing (trixie) currently ships wget 1.24.5-2. FYI, upstream released 1.25.0 on November 10th 2024: https://ftp.gnu.org/gnu/wget/wget-1.25.0.tar.gz. Whi

Re: Bug#1073508: Bug#1074338: Bug#1073508: Bug#1074338: src:libxml2: fails to migrate to testing for too long: unresolved RC issue

2025-02-03 Thread Santiago Ruano Rincón
Hi! El 02/02/25 a las 22:29, Aron Xu escribió: > On 2025年1月29日周三 19:32 Santiago Ruano Rincón wrote: > > > On Mon, Aug 19, 2024 at 3:54 PM Emilio Pozuelo Monfort > > wrote: > > > > > > > > On 17/08/2024 11:13, Paul Gevers wrote: > > > > &

Bug#1094825: wpa: Please package new upstream release: 2.11

2025-01-31 Thread Santiago Ruano Rincón
Source: wpa Severity: important User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear Debian wpasupplicant Maintainers, Testing (trixie) currently ships wpa 2.10. FYI, upstream released 2.11 on July 20th 2024: https://w1.fi/cgit/hostap/plain/wp

Bug#1094762: async-http-client: Please package latest upstream release(s): 2.12.4 (and 3.0.1)

2025-01-30 Thread Santiago Ruano Rincón
Source: async-http-client Severity: important User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear async-http-client maintainer(s), Testing (trixie) currently ships async-http-client 2.12.3. Upstream released 2.12.4 and 3.0.1 (whose breaking c

Re: Bug#1073508: Bug#1074338: Bug#1073508: Bug#1074338: src:libxml2: fails to migrate to testing for too long: unresolved RC issue

2025-01-29 Thread Santiago Ruano Rincón
Hi Aron, Thanks a lot for your work on libxml2! El 21/08/24 a las 19:32, Aron Xu escribió: > On Mon, Aug 19, 2024 at 3:54 PM Emilio Pozuelo Monfort > wrote: > > > > On 17/08/2024 11:13, Paul Gevers wrote: > > > Hi, > > > > > > [Disclaimer: I'm not the most experienced person on transitions in t

Bug#1094590: libapache-mod-jk: Please package new upstream version: 1.2.50

2025-01-28 Thread Santiago Ruano Rincón
Source: libapache-mod-jk Severity: important User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear libapache-mod-jk maintainer(s), Testing (trixie) currently ships libapache-mod-jk 1.2.49. Upstream released the latest version, 1.2.50, on Augus

Bug#1094311: bouncycastle: Please package new upstream version: 1.80

2025-01-26 Thread Santiago Ruano Rincón
Source: bouncycastle Severity: important User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear bouncycastle maintainer(s), Testing (trixie) currently ships bouncycastle 1.77. Upstream released the latest version, 1.80, on January 14th 2025. W

Re: Bug#1052527: nagios4: New upstream release available

2025-01-23 Thread Santiago Ruano Rincón
Control: User -1 debian-lts@lists.debian.org Control: Usertags -1 upstream-trixie Dear nagios4 maintainer, El 23/09/23 a las 17:57, Unit 193 escribió: > Source: nagios4 > Severity: wishlist > > Dear Maintainer, > > Please update nagios4 in Debian as, at the time of this writing, 4.4.14 is > a

Re: Fixing src:ucf environmnent variable insecurity in [old]stable

2024-12-23 Thread Santiago Ruano Rincón
Hello! El 20/12/24 a las 10:09, Santiago Ruano Rincón escribió: > Thank you Emilio for doing the triaging, and thanks Chris for claiming > the package. > > El 20/12/24 a las 11:12, Emilio Pozuelo Monfort escribió: > > On 20/12/2024 03:53, Santiago Ruano Rincón wrote: > &g

Re: Fixing src:ucf environmnent variable insecurity in [old]stable

2024-12-20 Thread Santiago Ruano Rincón
Thank you Emilio for doing the triaging, and thanks Chris for claiming the package. El 20/12/24 a las 11:12, Emilio Pozuelo Monfort escribió: > On 20/12/2024 03:53, Santiago Ruano Rincón wrote: > > Hi Mark, and thanks for the heads-up, > > > > CC'ing the LTS mailing li

Re: Fixing src:ucf environmnent variable insecurity in [old]stable

2024-12-19 Thread Santiago Ruano Rincón
Hi Mark, and thanks for the heads-up, CC'ing the LTS mailing list for visibility. BCC'ing debian-devel. El 19/12/24 a las 17:50, Mark Hindley escribió: > Hello, > > I recently completed salvaging of src:ucf[1]. > > As part of code cleanup I discovered a variable inherited from the environment >

Re: Bug#1089033: xen: Please package xen version 4.19

2024-12-10 Thread Santiago Ruano Rincón
Thanks a lot to Hans, Maximilian and Sean! El 08/12/24 a las 13:38, Sean Whitton escribió: > Hello, > > On Sat 07 Dec 2024 at 12:58pm +01, Hans van Kranenburg wrote: > > > Yes, we need some assistance. > > Thank you for the write-up. Santiago, maybe we should add a link to > this thread to pac

Re: Revisiting some old DLAs

2024-12-09 Thread Santiago Ruano Rincón
Hi, El 08/12/24 a las 07:30, Adrian Bunk escribió: > On Fri, Dec 06, 2024 at 10:10:19PM -0500, Roberto C. Sánchez wrote: > > Hello everyone, > > Hi Roberto, > > > The Security Team has supplied a list of packages/CVEs which were fixed > > by DLA (some in bullseye and some in buster) but which re

Bug#1089596: openjpeg2: Please package upstream version 2.5.2

2024-12-09 Thread Santiago Ruano Rincón
Source: openjpeg2 Severity: important User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear openjpeg2 maintainer(s), Testing (trixie) currently ships openjpeg2 2.5.0. Upstream released 2.5.2 on Februray 28th 2024, and they are considering doin

Re: twitter-bootstrap3/4 support

2024-12-06 Thread Santiago Ruano Rincón
Hi! El 05/12/24 a las 19:43, Daniel Baumann escribió: > Hi, > > On 12/5/24 18:39, Santiago Ruano Rincón wrote: > > I thought I had mentioned somewhere than Daniel Baumann showed some > > interests in working on those CVEs, but that was some time ago. > > I was mo

Re: twitter-bootstrap3/4 support

2024-12-05 Thread Santiago Ruano Rincón
't seem to consider these CVEs. > > > > This is triaged in bookworm with: > >   (Minor issue, revisit when fixed upstream) > > but this has much likely no chances to happen, because EOL'd. > > > > Do we want to reach out to HeroDevs? > > Do we want to EOL these packages? > > Do we want to try and fix this ourselves? > > > > Cheers! > > Sylvain > > (FD this week) -- Santiago Ruano Rincón ◈ Freexian SARL https://www.freexian.com signature.asc Description: PGP signature

Re: ceph 14.2.22 for bullseye

2024-12-05 Thread Santiago Ruano Rincón
Hello Daniel! Thanks a lot for preparing this update. However, I have some comments/questions below: El 05/12/24 a las 08:03, Daniel Baumann escribió: > Hi, > > although ceph 14 is not affected by the RGW issue from yesterday > (#1088993, CVE-2024-48916), I have similar to [bookworm] also prepar

Bug#1089033: xen: Please package xen version 4.19

2024-12-04 Thread Santiago Ruano Rincón
Source: xen Severity: normal User: debian-lts@lists.debian.org Usertags: upstream-trixie X-Debbugs-Cc: debian-lts@lists.debian.org Dear xen maintainers, Testing (trixie) currently ships xen 4.17, which, according to the upstream support matrix [x], will get security support until 2025-12-12. The

Re: CVE-2024-7531/nss for debian/bullseye LTS

2024-10-25 Thread Santiago Ruano Rincón
Hi, El 24/10/24 a las 10:55, Arturo Borrero Gonzalez escribió: > Hi, > > On 10/23/24 23:48, Santiago Ruano Rincón wrote: > > I added the reference to the commit that introduced the vulnerability > > after you committed it to the elts security tracker. > > I have no r

CVE-2022-41678,CVE-2023-46604/activemq (was Re: CVE-2023-46604/activemq)

2024-10-24 Thread Santiago Ruano Rincón
Salut Pierre, hello security team, Sorry for this very late reply. El 07/10/24 a las 23:46, Pierre Gruet escribió: > Hi Santiago, > > Le 07/10/2024 à 20:21, Santiago Ruano Rincón a écrit : > > Dear teams, > > > > activemq is listed in both dla-needed and dsa-neede

Re: CVE-2024-7531/nss for debian/bullseye LTS

2024-10-23 Thread Santiago Ruano Rincón
El 23/10/24 a las 13:03, Arturo Borrero Gonzalez escribió: > Hi, sorry for the late follow up. > > On 10/16/24 00:38, Santiago Ruano Rincón wrote: > > > > Again, you can also ask upstream. They are in a better position to tell > > you if the vulnerability is present in

Re: CVE-2024-7531/nss for debian/bullseye LTS

2024-10-15 Thread Santiago Ruano Rincón
Hola, El 15/10/24 a las 23:07, Arturo Borrero Gonzalez escribió: > On 10/15/24 16:58, Santiago Ruano Rincón wrote: > > > > Moreover, I do see the code introduced by that change as part of > > 2:3.61-1+deb11u3, that relate to HACL* AVX2 support for different crypto >

Re: CVE-2024-7531/nss for debian/bullseye LTS

2024-10-15 Thread Santiago Ruano Rincón
Hello Arturo, El 12/10/24 a las 13:08, Arturo Borrero Gonzalez escribió: > Hi there, > > this email is to propose we mark the nss package in debian bullseye as not > affected by CVE-2024-7531 [0]. > > The upstream patch is clearly identified [1], but debian/bullseye [2] just > doesn't contain th

CVE-2023-46604/activemq

2024-10-07 Thread Santiago Ruano Rincón
ian/changelog 2024-10-07 13:25:51.0 -0300 @@ -1,3 +1,10 @@ +activemq (5.17.2+dfsg-2+deb12u1) bookworm-security; urgency=medium + + * CVE-2023-46604: The Java OpenWire protocol marshaller is vulnerable to +Remote Code Execution (Closes: #1054909). + + -- Santiago Ruano Rincón Mo

Re: Mirroring the ELTS repository with rsync

2024-09-30 Thread Santiago Ruano Rincón
Hello Bernhard, El 28/09/24 a las 15:39, Schmidt, Bernhard escribió: > Hi, > > the ELTS documentation suggests to use a local mirror > > https://www.freexian.com/lts/extended/docs/how-to-use-extended-lts/ > > We run an official mirror for our local infrastructure, and we would be > willing to

Bug#1080418: override: systemd-timesyncd:admin/standard

2024-09-03 Thread Santiago Ruano Rincón
Package: ftp.debian.org Severity: normal User: ftp.debian@packages.debian.org Usertags: override X-Debbugs-Cc: syst...@packages.debian.org, debian-lts@lists.debian.org, Adrian Bunk , debian-ad...@lists.debian.org Control: affects -1 + src:systemd Dear FTP Master team, It seems the bullseye-s

Re: bullseye-security upload queue open (was: [SECURITY] [DLA 3856-1] python-html-sanitizer security update)

2024-08-31 Thread Santiago Ruano Rincón
El 31/08/24 a las 16:43, Adrian Bunk escribió: > On Sat, Aug 31, 2024 at 10:12:19AM -0300, Santiago Ruano Rincón wrote: > >... > > It seems the bullseye-security upload queue is finally open (now that > > the point release has been published). > >... > > Are yo

bullseye-security upload queue open (was: [SECURITY] [DLA 3856-1] python-html-sanitizer security update)

2024-08-31 Thread Santiago Ruano Rincón
Hello Chris, hello LTS Team, El 26/08/24 a las 13:59, Santiago Ruano Rincón escribió: > El 26/08/24 a las 19:22, Adrian Bunk escribió: > > Hi, > > > > where has the binary package been built, and where is it available for > > our users to download? > > > &g

Re: Security support for pypy and jython

2024-08-29 Thread Santiago Ruano Rincón
El 13/08/24 a las 19:37, Sylvain Beucler escribió: > Hi, > > On 13/08/2024 11:54, Moritz Mühlenhoff wrote: > > Am Mon, Aug 12, 2024 at 03:10:06PM -0300 schrieb Santiago Ruano Rincón: > > > El 08/08/24 a las 12:10, Sylvain Beucler escribió: > > > > python2.

Call for testers: Freeradius updates that mitigate Blast-RADIUS

2024-08-26 Thread Santiago Ruano Rincón
Dear Debian LTS users, Bernhard (FreeRADIUS debian maintainer), Bastien and myself (with the kind help from Alan DeKok - upstream maintainer) have been preparing freeradius updates that mitigate the Blast-RADIUS issue for both bookworm and bullseye. To mitigate the vulnerability, RADIUS servers a

The bullseye-security upload queue is still closed (was: [SECURITY] [DLA 3856-1] python-html-sanitizer security update)

2024-08-26 Thread Santiago Ruano Rincón
El 26/08/24 a las 19:22, Adrian Bunk escribió: > Hi, > > where has the binary package been built, and where is it available for > our users to download? > > Except for this announcement, I have not seen traces of it anywhere. python-html-sanitizer and libtommath uploads have been rejected. Chri

Re: Bug#1079502: youtube-dl: GHSA-22fp-mf44-f2mq GHSA-9jqj-9wwh-r5mg

2024-08-26 Thread Santiago Ruano Rincón
Control: severity -1 important (CCing: the security team) Hi, El 24/08/24 a las 02:08, alexvong.rc...@simplelogin.com escribió: > Subject: youtube-dl: GHSA-22fp-mf44-f2mq GHSA-9jqj-9wwh-r5mg > Source: youtube-dl > Version: 2021.12.17-1~bpo11+1 > X-Debbugs-Cc: debian-lts@lists.debian.org > Severi

Re: Make stable-security build logs public after embargo

2024-08-22 Thread Santiago Ruano Rincón
Hi! El 22/08/24 a las 14:30, Sylvain Beucler escribió: > Hi Wanna-Build Team, > > On 19/08/2024 18:57, Aurelien Jarno wrote: > > On 2024-08-14 12:59, Santiago Ruano Rincón wrote: > > > El 13/12/23 a las 11:56, Salvatore Bonaccorso escribió: > > > > On W

Re: mark wpewebkit unsupported in bullseye once bullseye becomes LTS in July 2024

2024-08-19 Thread Santiago Ruano Rincón
El 19/08/24 a las 05:33, Holger Levsen escribió: > On Fri, Aug 16, 2024 at 02:31:02PM -0300, Santiago Ruano Rincón wrote: > > I have updated > > https://salsa.debian.org/debian/debian-security-support/-/merge_requests/29 > > accordingly. > > will you also merge it? :

Re: mark wpewebkit unsupported in bullseye once bullseye becomes LTS in July 2024

2024-08-16 Thread Santiago Ruano Rincón
El 16/08/24 a las 18:03, Alberto Garcia escribió: > On Thu, Aug 15, 2024 at 02:32:42PM -0300, Santiago Ruano Rincón wrote: > > > > Alberto, does the following change matches your thoughts? > > > > diff --git a/security-support-limited.deb11 b/security-support-limi

Re: mark wpewebkit unsupported in bullseye once bullseye becomes LTS in July 2024

2024-08-15 Thread Santiago Ruano Rincón
Hi! El 12/05/23 a las 12:06, Alberto Garcia escribió: > On Fri, May 12, 2023 at 08:27:49AM +, Holger Levsen wrote: > > > Note that wpewebkit is still supported in bullseye and will remain > > > supported until the distro reaches EOL. > > does that mean when the Debian security stops supporting

Re: Make stable-security build logs public after embargo

2024-08-14 Thread Santiago Ruano Rincón
Dear wanna-build team, El 13/12/23 a las 11:56, Salvatore Bonaccorso escribió: > Hi Sylvain, > > On Wed, Dec 13, 2023 at 07:50:38AM +0100, Sylvain Beucler wrote: > > Hi all, > > > > Actually we have a summary of the situation here: > > https://salsa.debian.org/lts-team/lts-extra-tasks/-/issues/5

Re: Security support for pypy and jython

2024-08-12 Thread Santiago Ruano Rincón
Hi, El 08/08/24 a las 12:10, Sylvain Beucler escribió: > Hello Security Team, > > python2.7 was marked unsupported in bullseye. > > We recently noted that pypy[v2] (included up to bullseye) and jython (all > dists) include the python2 stdlib. Unlike pypy3, neither package currently > track the

Re: Support for ckeditor3 in Debian

2024-08-12 Thread Santiago Ruano Rincón
El 12/08/24 a las 00:27, Mike Gabriel escribió: > Hi Moritz, hi Santiago, > > On So 11 Aug 2024 12:57:23 CEST, Moritz Muehlenhoff wrote: > > > On Sat, Aug 10, 2024 at 11:19:24AM -0300, Santiago Ruano Rincón wrote: > > > (I had tried to answer from the web debian-lt

Re: Support for ckeditor3 in Debian

2024-08-10 Thread Santiago Ruano Rincón
(I had tried to answer from the web debian-lts archive, and I don't know why firefox ended up sending four empty emails to the list. Really sorry for the noise) El 31/05/22 a las 05:42, Mike Gabriel escribió: > Hi Moritz, Salvatore, Sylvain, > > On Mo 30 Mai 2022 20:04:14 CEST, Moritz Mühlenhoff

Re: Re: Support for ckeditor3 in Debian

2024-08-10 Thread Santiago Ruano Rincón

Re: Re: Support for ckeditor3 in Debian

2024-08-10 Thread Santiago Ruano Rincón

Re: Re: Support for ckeditor3 in Debian

2024-08-10 Thread Santiago Ruano Rincón

Re: Re: Support for ckeditor3 in Debian

2024-08-10 Thread Santiago Ruano Rincón

Re: end-of-life iotjs for the upcoming bullseye LTS

2024-08-09 Thread Santiago Ruano Rincón
El 08/08/24 a las 23:06, Moritz Mühlenhoff escribió: > Am Thu, Aug 08, 2024 at 09:31:31PM +0200 schrieb Salvatore Bonaccorso: > > So the package can be safely removed I would say and so my proposal > > would be to ask for removal of iotjs in the last bullseye point > > release. > > > > What do you

end-of-life iotjs for the upcoming bullseye LTS

2024-08-08 Thread Santiago Ruano Rincón
Hi all, As suggested by Moritz, giving the status of iotjs, I think it is not possible to support it during the bullseye LTS period. iotjs was removed from unstable (and bookworm when it was testing) nearly two years ago: https://tracker.debian.org/news/1354004/removed-10715-1-from-unstable/. It

Re: gpac end-of-life in stretch (and recommendation for buster/bullseye)

2024-08-08 Thread Santiago Ruano Rincón
nt to mark gpac EOL for bullseye as well? I think it makes sense, yes. Would you like to proceed and document this in d-d-s? Thanks, -- Santiago Ruano Rincón ◈ Freexian SARL https://www.freexian.com signature.asc Description: PGP signature

Re: git CVE-2024-32004 & CVE-2024-32020

2024-05-31 Thread Santiago Ruano Rincón
Hi Ubuntu security team, I would just like to put you in the loop about this git issue, and a possible regression in Ubuntu related to its fix. Please, see below. El 31/05/24 a las 10:41, Roberto C. Sánchez escribió: > Hi Sean, > > On Fri, May 31, 2024 at 03:05:35PM +0100, Sean Whitton wrote: >

Bug#1070494: ITP: linux-livepatching -- linux livepatching module for Debian

2024-05-06 Thread Santiago Ruano Rincón
Package: wnpp Severity: wishlist Owner: Emmanuel Arias , Santiago Ruano Rincón X-Debbugs-Cc: debian-de...@lists.debian.org, t...@security.debian.org, debian-ker...@lists.debian.org, debian-lts@lists.debian.org, eam...@debian.org * Package name: linux-livepatching Version

Re: bind9 LTS

2024-04-29 Thread Santiago Ruano Rincón
the first time I looked at these CVEs, when they just came out. Thanks, and sorry for the noise, -- S > > Cheers > > // Ola > > On Tue, 23 Apr 2024 at 22:55, Santiago Ruano Rincón > wrote: > > > > Hi Ola, > > El 19/04/24 a las 07:54, Ola Lundqvist

Re: freeimage and CVE-2019-12214

2024-04-26 Thread Santiago Ruano Rincón
Hi Cyrille! El 25/04/24 a las 15:00, Cyrille Bollu escribió: > Hi Santiago, > > Here's some follow up :-) > > Best regards, > > Cyrille > > Le mardi 16 avril 2024 à 12:52 -0300, Santiago Ruano Rincón a écrit : > > Hi Cyrille, > > > > El 16/0

Re: bind9 LTS

2024-04-23 Thread Santiago Ruano Rincón
Hi Ola, El 19/04/24 a las 07:54, Ola Lundqvist escribió: > Hi > > I have now made the package build. Thank you for preparing the patch. I've built, tested basic functionality and tested reversed dependencies. However, I have a question: could you please point me where do you get from the changes

LTS Team's samba git repository and forced push debian/buster branch

2024-04-22 Thread Santiago Ruano Rincón
Dear team, TL;DR: if you have a local copy of the lts-team/packages/samba repo, please consider resetting the debian/buster branch. The lts-team's was originally created from scratch, then we moved over a fork of the debian maintainers. To reconcile the differences in history between the buster u

Re: freeimage and CVE-2019-12214

2024-04-16 Thread Santiago Ruano Rincón
Hi Cyrille, El 16/04/24 a las 16:09, Cyrille Bollu escribió: > Hi Santiago, > > >It is not a question of trust. It is a problem of lack of strong > >evidence that the issue is no longer there in freeimage or openjepg2. > >We cannot rely only on CVE description to track the issues. > > I think yo

Re: freeimage and CVE-2019-12214

2024-04-15 Thread Santiago Ruano Rincón
Hi, El 15/04/24 a las 21:47, Ola Lundqvist escribió: > Hi Santiago > > On Mon, 15 Apr 2024 at 21:10, Santiago Ruano Rincón > wrote: > > > > Hi Ola, > > > > As being discussed with Salvatore, there is not enough evidence to > > conclude there is n

Re: freeimage and CVE-2019-12214

2024-04-15 Thread Santiago Ruano Rincón
t; > NOTE: in libopenjpeg, not freeimage. Without reproducer or > > stacktrace, this is > > NOTE: nearly unfixable. > > + NOTE: Turned out that the issue is not in freeimage at all, > > but rather in openjpeg. > > + NOTE: For more information see >

Re: freeimage and CVE-2019-12214

2024-04-15 Thread Santiago Ruano Rincón
Hi, Cyrille, thank you for checking this. However, I don't think the contact address you had sent the email is correct. CVE is maintained by MITRE (not NIST). And there exist several CNAs that could issue CVE IDs for specific products/domains. According to https://www.cve.org/CVERecord?id=CVE-2019

Re: Guidance for CVE triage and listing packages in dla-needed.txt

2024-04-11 Thread Santiago Ruano Rincón
Hello Cyrille, El 11/04/24 a las 09:15, Cyrille Bollu escribió: > Why not using CVSS as a base calculation for assigning severity levels? > > IIRC, something like: > > CVSS>=8 => High > 4<=CVSS<8 => Medium > CVSS<4 => Low ... Thanks for the comment! I cannot talk for the security team, but I u

Re: How to handle freeimage package

2024-04-11 Thread Santiago Ruano Rincón
Hi Ola, El 11/04/24 a las 08:25, Ola Lundqvist escribió: > On Thu, 11 Apr 2024 at 02:34, Santiago Ruano Rincón > > El 10/04/24 a las 22:08, Ola Lundqvist escribió: > > > Hi all > > > > > > Sorry for late reply. It took me too long today to answer the CVE &g

Re: How to handle freeimage package

2024-04-10 Thread Santiago Ruano Rincón
Hi Ola, El 10/04/24 a las 22:08, Ola Lundqvist escribió: > Hi all > > Sorry for late reply. It took me too long today to answer the CVE > triaging discussion. Now to this issue. > > Regarding the fedora patches. The patches seem to help for those > specific issues they solve. > > My intention f

Re: How to handle freeimage package

2024-04-09 Thread Santiago Ruano Rincón
Hi (especially Ola), El 08/04/24 a las 13:59, Sylvain Beucler escribió: > Hi, > > I think this requires a bit of coordination: > - the package is basically dead upstream, there hasn't been a fix in the > official repos, neither Debian or other distros attempted to fix them The only "exception" s

Re: Expanding the scope (slightly) of dla-needed.txt

2024-03-15 Thread Santiago Ruano Rincón
El 15/03/24 a las 08:31, Roberto C. Sánchez escribió: > On Fri, Mar 15, 2024 at 11:06:10AM +0100, Raphael Hertzog wrote: > > Hello Roberto, > > > > On Thu, 14 Mar 2024, Roberto C. Sánchez wrote: > > > Santiago and I are in agreement that at the moment the best available > > > option is to use dla-

Re: kfreebsd-10 supported in buster?

2024-03-08 Thread Santiago Ruano Rincón
El 08/03/24 a las 18:51, Ola Lundqvist escribió: > Hi > > Ah, right. I was thinking i386, amd64 were only hardware architectures. If > it includes freebsd as a separate then it is clearly not supported. > Thank you That is a good point. We tend to use the term architecture, but if you want to be

Re: kfreebsd-10 supported in buster?

2024-03-07 Thread Santiago Ruano Rincón
Hello Ola, El 08/03/24 a las 00:20, Ola Lundqvist escribió: > Hi > > I'm triaging issues and I found one undetermined one for kfreebsd-10. > There is very little information on the issue so I agree with the > undetermined status. > > My question is whether we should even try to determine it... I

Re: debvm invocations for ELTS

2024-02-29 Thread Santiago Ruano Rincón
El 29/02/24 a las 14:14, Sean Whitton escribió: > Hello, > > Does anyone have working debvm runes for stretch & jessie? > > If you just use 'debvm-create -r stretch -- > http://deb.freexian.com/extended-lts' > then there isn't working networking. AFAIU, networking is set up while running debvm-

Re: man-db hardening fixes

2024-02-05 Thread Santiago Ruano Rincón
El 05/02/24 a las 15:30, Colin Watson escribió: > On Mon, Feb 05, 2024 at 11:33:41AM -0300, Santiago Ruano Rincón wrote: > > As part of the LTS workflow, we keep information about VCS of the > > packages uploaded, including git tags for every upload. > > > > Woul

Re: man-db hardening fixes

2024-02-05 Thread Santiago Ruano Rincón
El 01/02/24 a las 13:34, Colin Watson escribió: > On Thu, Feb 01, 2024 at 05:41:19PM +0530, Utkarsh Gupta wrote: > > On Thu, Feb 1, 2024 at 1:44 AM Colin Watson wrote: > > > I'm both the Debian and upstream maintainer of man-db. I'm considering > > > uploading some variation of the attached diff

Re: Security releases for ecosystems that use static linking

2023-12-22 Thread Santiago Ruano Rincón
El 22/12/23 a las 14:21, Moritz Muehlenhoff escribió: > On Fri, Dec 22, 2023 at 10:19:15AM -0300, Santiago Ruano Rincón wrote: > > El 22/12/23 a las 09:54, Moritz Muehlenhoff escribió: > > > On Thu, Dec 21, 2023 at 07:30:51PM -0300, Santiago Ruano Rincón wrote: > > > &

Re: Security releases for ecosystems that use static linking

2023-12-22 Thread Santiago Ruano Rincón
El 22/12/23 a las 09:54, Moritz Muehlenhoff escribió: > On Thu, Dec 21, 2023 at 07:30:51PM -0300, Santiago Ruano Rincón wrote: > > So let me ask you: are you interested in addressing the infrastructure > > limitations to handle those kind of packages? and having some he

Security releases for ecosystems that use static linking

2023-12-21 Thread Santiago Ruano Rincón
Dear Security, Release and Wanna-build teams, As some of you may be aware, we (the LTS Team) are reviewing the packages with limitations in their support, and I would like to bring some discussion regarding Go, Rust and the like. As the bookworm (and older) release notes document: The Debian

Support of Tor in buster LTS

2023-11-28 Thread Santiago Ruano Rincón
unce/2023/msg00258.html and: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056606 I think we should follow that for buster. Any objections? Cheers, -- Santiago Ruano Rincón ◈ Freexian SARL https://www.freexian.com signature.asc Description: PGP signature

Re: Accepted node-babel 6.26.0+dfsg-3+deb10u1 (source all) into oldoldstable

2023-10-19 Thread Santiago Ruano Rincón
El 19/10/23 a las 11:29, Yadd escribió: > Hi, > > I think I did what is needed (mail + webml). Let me know if everything is > OK. It is perfect. Thank you! Cheers, -- Santiago signature.asc Description: PGP signature

Re: Accepted node-babel 6.26.0+dfsg-3+deb10u1 (source all) into oldoldstable

2023-10-18 Thread Santiago Ruano Rincón
Hey, node-babel was accepted into buster-security. Yadd, will you do the paperwork by yourself or do you want some help? Cheers, -- S El 18/10/23 a las 21:20, Debian FTP Masters escribió: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Format: 1.8 > Date: Fri, 13 Oct 2023 20:56:38 +04

Re: Bug#1053880: node-babel7: CVE-2023-45133

2023-10-13 Thread Santiago Ruano Rincón
Hi Yadd, El 13/10/23 a las 20:59, Yadd escribió: > and Buster ;-) Thanks for preparing the fix! Just to be on the safe side, have you been able to test it, and how? Are you willing to upload it by yourself, or do you want some help? Cheers, -- Santiago signature.asc Description: PGP signat

  1   2   3   >