Re: imagemagick

2016-01-28 Thread Brian May
a reasonable assumption, as it looks like the patches are tracked in git. For the purposes of fixing this in squeeze it doesn't actually have any impact anyway. -- Brian May

Re: gajim 0.13.4-3+squeeze4 for testing

2016-02-04 Thread Brian May
Brian May writes: > The version for testing is available here: > > https://linuxpenguins.xyz/debian/pool/main/g/gajim/ Just noticed this version has some quilt files in the source which are not applicable because gajim doesn't use quilt format. Ignore them, I will fix this befor

Re: eglibc 2.11.3-4+deb6u9 crashes php on reload

2016-02-08 Thread Brian May
ibm.so.6? (squeeze-amd64-default)root@prune:/tmp/eglibc-2.11.3# objdump -T /lib/libm.so.6 | grep __strtod_nan DF *UND* GLIBC_2.2.5 __strtod_nan Not sure I can see the problem. Maybe something wrong with Matus' libm.so.6? -- Brian May

Re: eglibc 2.11.3-4+deb6u9 crashes php on reload

2016-02-08 Thread Brian May
Brian May writes: > Which package owns /lib/i686/cmov/libm.so.6? I am not able to find this file in any package on my chroot. -- Brian May

Re: eglibc 2.11.3-4+deb6u9 crashes php on reload

2016-02-08 Thread Brian May
UND* GLIBC_2.0 __strtod_nan That doesn't look healthy to me. -- Brian May

Re: eglibc 2.11.3-4+deb6u9 crashes php on reload

2016-02-08 Thread Brian May
Brian May writes: > That doesn't look healthy to me. Spoke too soon. (squeeze-i386-default)root@prune:/home/brian# objdump -T /lib/libc.so.6 | grep __strtod_nan 0003b180 gDF .text 00b5 GLIBC_2.0 __strtod_nan On i386, looks like GLIBC_2.0 is correct, and as such it should

Re: eglibc 2.11.3-4+deb6u9 crashes php on reload

2016-02-08 Thread Brian May
actually loading the new symbol. -- Brian May

Re: imagemagick

2016-02-08 Thread Brian May
0072 if I persisted, not sure I would necessarily be able to trust the results. So I am inclined to apply the 0071 patch to the version in squeeze, and then mark TEMP-0811308-B63DA1 as resolved. Or should I do something else like create seperate entries for each issue or something? -- Brian May

Re: imagemagick

2016-02-10 Thread Brian May
rning imagemagick have been marked no-DSA for wheezy and jessie. What would you advise for these issues? Also I note that a number of security issues fixed in squeeze-lts don't have assigned CVEs - is this something that needs rectifying? Brian May writes: > Just been looking

Re: imagemagick

2016-02-11 Thread Brian May
Sébastien Delafond writes: > - imagemagick in squeeze appears to only be vulnerable > TEMP-0811308-B63DA1[0]. This is five separate issues. See #811308. So does it make sense to ask for a separate CVE for each issue? -- Brian May

Re: Accepted eglibc 2.11.3-4+deb6u10 (source all amd64) into squeeze-lts

2016-02-11 Thread Brian May
bian.org/msgid-search/20160208082335.ga10...@fantomas.sk I don't think there was a bug report filed in the BTS. The previous upload was announced here: https://lists.debian.org/msgid-search/20160205162120.GA20334@novelo -- Brian May

Re: Accepted eglibc 2.11.3-4+deb6u10 (source all amd64) into squeeze-lts

2016-02-12 Thread Brian May
y breakage other then with already running processes. Especially as squeeze-lts support will be ending soon. -- Brian May

Re: Accepted eglibc 2.11.3-4+deb6u10 (source all amd64) into squeeze-lts

2016-02-12 Thread Brian May
have had to restart all processes anyway. -- Brian May

Re: imagemagick

2016-02-24 Thread Brian May
Brian May writes: > This is five separate issues. See #811308. So does it make sense to ask > for a separate CVE for each issue? Requests for CVEs aren't getting any response. Might have to deal without. http://www.openwall.com/lists/oss-security/2016/02/22/4 -- Brian May

Re: squid3 LTS assertion errors

2016-03-02 Thread Brian May
oing a full restart, it still crashes in the same manner? -- Brian May

Re: squid3 LTS assertion errors

2016-03-02 Thread Brian May
at the changes made between the squeeze version (3.1.6-1.2+squeeze3) and squeeze-lts version (3.1.6-1.2+squeeze6) however nothing seems to touch either forward.cc or the server_fd global variable. Seems to be crashing when trying to close a connection. -- Brian May

Re: squid3 LTS assertion errors

2016-03-02 Thread Brian May
Brian May writes: > What version did you upgrade from? > > Does this crash happen immediately after restart, or in response to in > incoming request? > > Can I assume that after doing a full restart, it still crashes in the > same manner? Just realized I should have also a

Re: squid3 LTS assertion errors

2016-03-03 Thread Brian May
* Revert CVE-2016-2569 patch. This fix heavily relies on exception handling of more recent squid versions, and more intrusive changes. Closes: #816601 -- Brian May

Re: imagemagick

2016-03-05 Thread Brian May
Brian May writes: > I will also make debs available for testing. Available now at: https://people.debian.org/~bam/wheezy/imagemagick/ -- Brian May

Re: tracking security issues without CVEs

2016-03-06 Thread Brian May
asy way of being able to link each issue to each patch. So if a CVE was provided for each issue, it would be relatively hard to link it to the appropriate patch with 100% certainty. With so many different issues, I suspect it is going to be overwhelming requesting a CVE for each issue no matter what you do. -- Brian May

Re: tracking security issues without CVEs

2016-03-06 Thread Brian May
good if it does get resolved. -- Brian May

Re: imagemagick

2016-03-07 Thread Brian May
Luciano Bello writes: > On Sunday 06 March 2016 16.34.26 Brian May wrote: >> The following patch applied to the imagemagick in Debian wheezy should >> fix the security problem already resolved in squeeze. The patches have >> been ported from the squeeze version. > > Th

Re: imagemagick

2016-03-09 Thread Brian May
bols files for the C ABIs, only the C++ ABI -- Simon McVittie Wed, 12 Aug 2015 07:50:55 +0100 -- Brian May

Re: imagemagick

2016-03-09 Thread Brian May
Brian May writes: > However, it looks like version -5.1 (see below) has some non-security > related changes that might not be appopriate for Jessie, so not yet > decided. I will investigate further and report here. Here is my attempt at a Jessie security update. It takes all secur

Re: imagemagick

2016-03-09 Thread Brian May
Brian May writes: >> However, it looks like version -5.1 (see below) has some non-security >> related changes that might not be appopriate for Jessie, so not yet >> decided. I will investigate further and report here. > > Here is my attempt at a Jessie security updat

Re: working for wheezy-security until wheezy-lts starts

2016-03-12 Thread Brian May
ne atomic operation or do we have to do them one at a time? The later could be potentially risky and break things if both versions end up being included in the one application, especially if versioned symbols not used (I haven't checked). -- Brian May

Re: working for wheezy-security until wheezy-lts starts

2016-03-12 Thread Brian May
Brian May writes: >> 2. Spend some time on investigating what it takes to backport >> libav from jessie to wheezy. 11.x is still supported by >> libav upstream and we could share triage work for jessie/wheezy >> going forwards. 0.8 has simply too much missing. >> Th

Re: working for wheezy-security until wheezy-lts starts

2016-03-15 Thread Brian May
.html So I am wondering if I can just mark xen in squeeze and wheezy as not being affected by CVE-2015-2756 too? -- Brian May

Re: working for wheezy-security until wheezy-lts starts

2016-03-15 Thread Brian May
time now, will continue looking at this later. -- Brian May >From 16794c97e99228ca551ff09fa696d00f39ceee82 Mon Sep 17 00:00:00 2001 From: Konrad Rzeszutek Wilk Date: Wed, 19 Nov 2014 12:57:11 -0500 Subject: Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64 GFNs (or less) S

Re: working for wheezy-security until wheezy-lts starts

2016-03-16 Thread Brian May
Ubuntu precise has 4.1.6; no idea if this matters. Am speculating that 4.1.6 might have security updates. So one possible strategy might be to take Ubuntu's package as is and port it to Debian wheezy. Wonder how many of the CVEs the Ubuntu version fixes. -- Brian May

Re: working for wheezy-security until wheezy-lts starts

2016-03-21 Thread Brian May
Brian May writes: > So one possible strategy might be to take Ubuntu's package as is and > port it to Debian wheezy. Have rebuilt Ubuntu's xen package for wheezy. The results are available for testing. https://people.debian.org/~bam/wheezy/xen/ The most significant change I h

Re: working for wheezy-security until wheezy-lts starts

2016-03-21 Thread Brian May
Brian May writes: >> Wonder how many of the CVEs the Ubuntu version fixes. > > Will have a look at this now. Comparing the changelog with our security tracker (by hand; not sure if anybody has written a tool to automate this, if not might be a good idea): Not fixed in backported Ub

Re: working for wheezy-security until wheezy-lts starts

2016-03-25 Thread Brian May
according to the > security tracker. You probably mean CVE-2015-8104... Yes, that looks like a typo. Thanks for the correction. > That is an impressive list, and it does seem like we should merge our > efforts with Ubuntu here! Agreed. -- Brian May

Re: Xen security updates on Wheezy

2016-03-25 Thread Brian May
you want to > followup on Xen yourself? I won't be able to look again at this until next week. So sure, go ahead. If you haven't looked at it by then, I will have a look again. -- Brian May

Re: imagemagick

2016-03-25 Thread Brian May
Luciano Bello writes: > On Thursday 10 March 2016 13.39.31 Brian May wrote: >> I have wheezy packages for testing: >> https://people.debian.org/~bam/wheezy/imagemagick/ >> >> I also have jessie packages for testing: >> https://people.debian.org/~bam/jessie/ima

March Report

2016-03-31 Thread Brian May
of these are at the stage where they can be uploaded or almost there. I will continue working on these next month. -- Brian May

Re: imagemagick

2016-04-06 Thread Brian May
Luciano Bello writes: > On Saturday 26 March 2016 17.40.39 Brian May wrote: >> > If you didn't get any other comment, fill free to upload to security >> > master. I'm not part of the LTS team, but I guess you can also update >> > there. I will release t

Re: imagemagick

2016-04-06 Thread Brian May
the documentation from http://secure-testing-master.debian.net/uploading.html I tried security-master too, but got identical results. Permission Denied with the upload. -- Brian May

Re: imagemagick

2016-04-06 Thread Brian May
e problem. I didn't notice that this used ftp, and ftp is broken on my network because I haven't needed it in ages and haven't noticed it was broken. So I have uploaded the packages now using my 4G network. -- Brian May

Re: imagemagick

2016-04-10 Thread Brian May
Luciano Bello writes: > On Thursday 07 April 2016 12.36.12 Brian May wrote: >> Found the problem. I didn't notice that this used ftp, and ftp is broken >> on my network because I haven't needed it in ages and haven't noticed it >> was broken. > > Gr

Re: imagemagick

2016-04-10 Thread Brian May
Brian May writes: > However the upload of imagemagick for Jessie didn't go so well; I didn't > realize that packages.debian.org has the correct binary but old source > (doesn't take into account point updates properly), so I will have to > redo it with the la

Re: Xen updates for wheezy ready for testing

2016-04-10 Thread Brian May
Antoine Beaupré writes: > Heads up! The Xen packages prepared by Brian May have passed preliminary > testing and are ready for wider testing on Wheezy! See: > > https://people.debian.org/~anarcat/debian/wheezy-lts/ [...] > So here's a debdiff based on Brian's work. I d

Re: working for wheezy-security until wheezy-lts starts

2016-04-13 Thread Brian May
nd on libav, however during the process suddenly noticed that the --extra-packages argument to sbuild (used by ratt) doesn't appear to be working for me, so I actually was testing against the libav already in wheezy :-( I submitted bug report #820882 on this. In a previous email, Brian M

Re: working for wheezy-security until wheezy-lts starts

2016-04-13 Thread Brian May
Brian May writes: > I intended to rebuild all packages that depend on libav, however during > the process suddenly noticed that the --extra-packages argument to > sbuild (used by ratt) doesn't appear to be working for me, so I actually > was testing against the libav already

Re: working for wheezy-security until wheezy-lts starts

2016-04-13 Thread Brian May
Brian May writes: > The following packages have unmet dependencies: > libpostproc-dev : Depends: libavutil-dev (= 6:0.8.17-2) but 6:11.6-1~deb7u1 > is to be installed > E: Unable to correct problems, you have held broken packages. Ok, so looks like we would need a new version of

Re: working for wheezy-security until wheezy-lts starts

2016-04-19 Thread Brian May
Brian May writes: > The current list of packages that fail to build against the new libav is > (the building is still ongoing): All build logs in https://people.debian.org/~bam/wheezy/libav/amd64/buildlogs/ Looks like a total of 85 packages failed to build and 46 packages succeeded.

Re: Xen updates for wheezy ready for testing

2016-04-19 Thread Brian May
Antoine Beaupré writes: > Heads up! The Xen packages prepared by Brian May have passed preliminary > testing and are ready for wider testing on Wheezy! See: > > https://people.debian.org/~anarcat/debian/wheezy-lts/ This was missing the original source. I have updated my pac

Re: working for wheezy-security until wheezy-lts starts

2016-04-20 Thread Brian May
tproc-dev will be uninstallable - does this matter? Or do we have to somehow upload everything in one single atomic batch? For now, I am going to look at creating a simple staging area with reprepro on people.debian.org -- Brian May

Re: working for wheezy-security until wheezy-lts starts

2016-04-20 Thread Brian May
Brian May writes: > For now, I am going to look at creating a simple staging area with > reprepro on people.debian.org Ok, mostly done. I think. Has xen and libav packages. Find instructions at: https://people.debian.org/~bam/debian/README.txt I appear to be having random problems try

Re: working for wheezy-security until wheezy-lts starts

2016-04-21 Thread Brian May
Holger Levsen writes: > yes, if you break packages like this you cannot fix them if other more > severe problems show up in those packages. Good point. My current plan will be to to to fix all non-EOLed packages in my staging repository, and then find out what I need to do next. -- Brian May

Re: working for wheezy-security until wheezy-lts starts

2016-04-22 Thread Brian May
Brian May writes: > libpostproc-dev will be uninstallable - does this matter? Whoops. Just noticed that libpostproc-dev is provided by the old libav, however not provided by the new libav. I had thought it was another source package. So any packages that depend on it will need to be fixed

Re: working for wheezy-security until wheezy-lts starts

2016-04-22 Thread Brian May
eg_impl.hpp:1443:35: error: 'dump_format' was not declared in this scope /<>/modules/highgui/src/cap_ffmpeg_impl.hpp:1470:36: error: 'avcodec_open' was not declared in this scope /<>/modules/highgui/src/cap_ffmpeg_impl.hpp:1507:42: error: 'URL_WRONLY' was not declared in this scope /<>/modules/highgui/src/cap_ffmpeg_impl.hpp:1507:52: error: 'url_fopen' was not declared in this scope /<>/modules/highgui/src/cap_ffmpeg_impl.hpp:1513:25: error: 'av_write_header' was not declared in this scope make[3]: *** [modules/highgui/CMakeFiles/opencv_highgui.dir/src/cap_ffmpeg.o] Error 1 -- Brian May

Re: working for wheezy-security until wheezy-lts starts

2016-04-22 Thread Brian May
Brian May writes: > Whoops. Just noticed that libpostproc-dev is provided by the old libav, > however not provided by the new libav. I had thought it was another > source package. What do I do with ffmpeg? Looks like this use to be provided by libav. Jessie doesn't have ffm

Re: working for wheezy-security until wheezy-lts starts

2016-04-23 Thread Brian May
Brian May writes: > So guessing the solution might be to backport the stretch version to > wheezy? Backporting ffmpeg could prove challenging, this is the version from jessie-backports: The following packages have unmet dependencies: sbuild-build-depends-ffmpeg-dummy : Depends: deb

April Report

2016-04-27 Thread Brian May
for staging my proposed updates for testing. https://people.debian.org/~bam/debian/ There is much work remaining fixing the dependancies of libav, which I plan to continue on - as much as feasible anyway - next month. ffmpeg might be a stumbling point. -- Brian May https://linuxpenguins.xyz

Re: Supporting libav in wheezy

2016-05-02 Thread Brian May
te important too, e.g. ffmpeg. -- Brian May

Re: Supporting libav in wheezy

2016-05-03 Thread Brian May
Unless our sponsors are using wheezy LTS actively for multimedia processing, it is very possible they will not get hit by the security issues we are attempting to fix. Is it worth continuing with this? -- Brian May

Re: CVE-2016-3714 in ImageMagick

2016-05-05 Thread Brian May
pplied to imagemagick, this will completely fix CVE-2016-3714? Thanks -- Brian May

Re: CVE-2016-3714 in ImageMagick

2016-05-05 Thread Brian May
/github.com/ImageMagick/ImageMagick/commit/a347456a1ef3b900c20402f9866992a17eb5d181 It does seem like that these 2 patches combined don't fix CVE-2016-3714 and I can't see anything that attempts to fix CVE-2016-3715 - CVE-2016-3718 either. -- Brian May

Re: libidn test packages [resent]

2016-05-06 Thread Brian May
versions of this work; however I will have a look at the above and see if I can stil reproduce the Jessie build errors. -- Brian May

Re: libidn test packages [resent]

2016-05-06 Thread Brian May
Brian May writes: > I see that there are two versions of this work; however I will have a > look at the above and see if I can stil reproduce the Jessie build > errors. Looks like your patch modifies files such as lib/nfkc.c which have been declared the source to the documentati

Re: libidn test packages [resent]

2016-05-09 Thread Brian May
documentation which was failing to build after applying security patches triggered a rebuild. Versions for wheezy and jessie available here: https://people.debian.org/~bam/debian/pool/main/libi/libidn/ Please test. Also attached is the debdiff patches. -- Brian May diff -Nru libidn-1.25/debian

Re: Xen 4.1.6.1 backport + Ubuntu patches ready for testing (take 3)

2016-05-09 Thread Brian May
y, I will > not have time to followup on those until next week so I hope others can > pick this up! I think it might be worth uploading what he have, and then fixing this security issue in another upload. -- Brian May

Re: Wheezy update of librsvg?

2016-05-11 Thread Brian May
fuzz) to librsvg in Wheezy, I imagine they will apply equally as cleanly to librsvg in Jessie. Hence the reason for CCing the security team. Wheezy packages for testing are available here: https://people.debian.org/~bam/debian/pool/main/libr/librsvg/ The patch is attached. Any comments?? Thanks

Re: Xen 4.1.6.1 backport + Ubuntu patches ready for testing (take 3)

2016-05-14 Thread Brian May
al change > unto itself anyway? Any objections by anybody if I upload Antoine Beaupré's packages to Debian, this Monday morning at Melbourne timezone? https://people.debian.org/~anarcat/debian/wheezy-lts/ Unless of course Antoine Beaupré wants to do it himself; he said he might have time this week. -- Brian May

Re: libidn test packages [resent]

2016-05-14 Thread Brian May
Antoine Beaupré writes: > I reviewed the patch quickly, nothing strikes me as completely wrong, > but I am not currently in a position to test the patchset. Unless there are any objections I plan on rechecking this and uploading this to wheezy-security, Monday, Melbourne timezone. -- Brian May

Re: Xen 4.1.6.1 backport + Ubuntu patches ready for testing (take 3)

2016-05-16 Thread Brian May
Brian May writes: > Any objections by anybody if I upload Antoine Beaupré's packages to > Debian, this Monday morning at Melbourne timezone? Done. Next step, the DLA. I went through the changelog and remove entries that are already marked as fixed in the security tracker. I think

Re: No DLA for xen, librsvg, libidn?

2016-05-17 Thread Brian May
Antoine Beaupré writes: > I do believe you are correct: some DLAs are definitely missing. I wrote > about libidn in <871t50elvf@angela.anarcat.ath.cx>, the uploader was > Brian May (in CC). I sent DLAs for both libidn and librsvg: libidn: 20160516070110.ga26...@prune.li

Re: libidn test packages [resent]

2016-05-17 Thread Brian May
Antoine Beaupré writes: > Indeed, sorry I missed that. Then let me rephrase: > > Brian, do you still intend to send that DLA? :) I did. My emails appears to have gone missing somewhere along the way :-( -- Brian May

Re: Xen 4.1.6.1 backport + Ubuntu patches ready for testing (take 3)

2016-05-17 Thread Brian May
Antoine Beaupré writes: > It's hard to tell without redoing the exact same process you did > yourself. :p Ok, I will go ahead. Will pay particular attention this time, see if my email goes missing again. -- Brian May

Re: libidn test packages [resent]

2016-05-17 Thread Brian May
Markus Koschany writes: > Don't forget to use Inline-PGP for signing the e-mails. :) Yes, did that. Oh wait, maybe I signed with the wrong key. My old key, not my new one. Ooops. Apologies for that, will resend the DLAs. -- Brian May

Re: No DLA for xen, librsvg, libidn?

2016-05-17 Thread Brian May
Brian May writes: > However I don't see them in the archives. I can try resending... I resent the DLAs. I suspect I might have used the wrong GPG key for signing. Apologies. -- Brian May

Re: imagemagick

2016-05-18 Thread Brian May
ode vs policy patches? My code passes these tests. I have built debs available for testing: https://people.debian.org/~bam/debian/pool/main/i/imagemagick/ Unless I get feedback I plan to upload next Mondayish, UTC+10 timezone. -- Brian May

Re: No DLA for xen, librsvg, libidn?

2016-05-19 Thread Brian May
nal sanity check you listed the correct CVE), if there are many CVE's the risk of error in filling out details for one of the CVEs by hand increases. It could also add more standardised text (such as "This is fixed in version X; we recommend you upgrade."). -- Brian May

HFS+ specific vulnerability

2016-06-02 Thread Brian May
Hello, Do we care about vulerabilities that are specific to HFS+? http://www.talosintel.com/reports/TALOS-2016-0093/ CVE-2016-2334 Regards -- Brian May https://linuxpenguins.xyz/brian/

Re: HFS+ specific vulnerability

2016-06-02 Thread Brian May
Brian May writes: > Hello, > > Do we care about vulerabilities that are specific to HFS+? > > http://www.talosintel.com/reports/TALOS-2016-0093/ > CVE-2016-2334 Along similar lines, just noticed that the next issue is UDF specific. http://www.talosintel.com/reports/TALOS-2

Re: HFS+ specific vulnerability

2016-06-03 Thread Brian May
Ben Hutchings writes: > [ Unknown signature status ] > On Thu, 2016-06-02 at 17:39 +1000, Brian May wrote: >> Hello, >> >> Do we care about vulerabilities that are specific to HFS+? >> >> http://www.talosintel.com/reports/TALOS-2016-0093/ >> CVE-2016-2

Re: HFS+ specific vulnerability

2016-06-03 Thread Brian May
Brian May writes: > Will continue to check the code to make sure. Actually looks like the vulnerable HFS+ is not present in the wheezy version p7zip. In this version CPP/7zip/Archive/Hfs/HfsHandler.cpp is only 243 lines, the exploit is in a function that doesn't exist on lines 1496

Re: HFS+ specific vulnerability

2016-06-03 Thread Brian May
Brian May writes: > I think there would need to be some code to disable the UDF code if it > isn't a UDF file system. Even if just for compression not > decompression. Still looking for this however. Just realized I have been talking a lot of nonsense. UDF support isn't abou

Re: HFS+ specific vulnerability

2016-06-05 Thread Brian May
gt; http://www.talosintel.com/reports/TALOS-2016-0093/ claims that as well > 9.20 is affected. Yes, I noticed this too. Will check. -- Brian May

Re: HFS+ specific vulnerability

2016-06-05 Thread Brian May
1072 I note the following code which is the same (if my arithmetic is correct): const UInt32 kBufSize = (1 << 16); In report this is: const size_t kBufSize = kCompressionBlockSize; // 0x1 However everything else looks very different. -- Brian May

Re: HFS+ specific vulnerability

2016-06-06 Thread Brian May
Brian May writes: > I asked here https://twitter.com/penguin_brian/status/739583514153091072 I got a response: @penguin_brian there is wrong info. Ofc vulnerable code exist since : 9.32 alpha 2013-12-01 https://twitter.com/_Icewall/status/739731922998448129 Looks like Jessie is

Re: HFS+ specific vulnerability

2016-06-06 Thread Brian May
Brian May writes: > Just realized I have been talking a lot of nonsense. UDF support isn't > about compressing files from UDF file systems, it is about compressing > UDF images. So yes, it is a format issue like Ben said, and it should > get fixed. I have a version available f

Re: HFS+ specific vulnerability

2016-06-07 Thread Brian May
Brian May writes: > I have a version available for testing with a fix for the UDF issue > (CVE-2016-2335): > > https://people.debian.org/~bam/debian/pool/main/p/p7zip/ > > (only i386 version so far, hope to upload amd64 version ASAP). Now got AMD64 version available for testing. -- Brian May

imagemagick CVE-2016-4562, CVE-2016-4563, CVE-2016-4564

2016-06-08 Thread Brian May
eInfo *) NULL); + } } dot_product=dx.q*dy.p-dx.p*dy.q; if (dot_product <= 0.0) Am wondering if maybe only this last part is required - it merges cleanly too. Although not really entirely sure how this one function can fit all CVEs. Possibly this patch only fixes CVE-2016-4563? Anyway, out of time now, just wanted to summarize the situation so I don't forget... -- Brian May

Re: imagemagick CVE-2016-4562, CVE-2016-4563, CVE-2016-4564

2016-06-08 Thread Brian May
Just guessing a bit here: Brian May writes: > CVE-2016-4562 > > The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before > 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain > vertices integer data, which allows remote attackers to cause a deni

Re: imagemagick CVE-2016-4562, CVE-2016-4563, CVE-2016-4564

2016-06-09 Thread Brian May
Brian May writes: > DrawDashPolygon had the following change: > > - for (i=1; (i < number_vertices) && (length >= 0.0); i++) > + for (i=1; (i < (ssize_t) number_vertices) && (length >= 0.0); i++) Actually just noticed this change is a NOP. Both

Re: Re: Wheezy update of roundcube?

2016-06-09 Thread Brian May
oundcube-dummy : Depends: libjs-jquery-ui (>= 1.10) but it is not going to be installed E: Unable to correct problems, you have held broken packages. apt-get failed. E: Package installation failed Not removing build depends: cloned chroot in use -- Brian May

Re: Wheezy update of roundcube?

2016-06-11 Thread Brian May
s not necessary. Not sure if you were asking me or the mailing list, however no objections from me. I say go ahead and do it. -- Brian May

Re: imagemagick CVE-2016-4562, CVE-2016-4563, CVE-2016-4564

2016-06-11 Thread Brian May
Brian May writes: > Significant changes to TraceStrokePolygon function: Here is a diff ignoring white space changes: @@ -6021,13 +6022,25 @@ } if (q >= (ssize_t) (max_strokes-6*BezierQuantum-360)) { +if (~max_strokes < (6*BezierQu

Re: imagemagick CVE-2016-4562, CVE-2016-4563, CVE-2016-4564

2016-06-13 Thread Brian May
I have a version available for testing at: https://people.debian.org/~bam/debian/pool/main/i/imagemagick/ Brian May writes: > CVE-2016-4562 > > The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before > 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certai

Re: Wheezy update of roundcube?

2016-06-20 Thread Brian May
Brian May writes: > Markus Koschany writes: > >> I just had a closer look at the vulnerabilities. I have marked >> CVE-2016-5103, CVE-2015-2181 and CVE-2015-2180 as not-affected because >> the vulnerable code is not present in this version. There is no upstream >&

Re: openssl / CVE-2016-2177.patch

2016-06-21 Thread Brian May
Brian May writes: > It might be worth somebody else testing it, just in case this is > something specific to my build. > > Will continue investigating. Looks like the test certificates may have expired. https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1581084 Most likely r

Re: openssl / CVE-2016-2177.patch

2016-06-21 Thread Brian May
Brian May writes: > Looks like the test certificates may have expired. > > https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1581084 Yes, builds fine now after applying the patch from the above link. -- Brian May

Re: xen_4.1.6.1-1+deb7u2.dsc

2016-06-21 Thread Brian May
4.1.6.1-1+deb7u2.dsc; however I never uploaded that version. It has known problems on i386. Maybe you meant to say you have version 4.1.6.1-1+deb7u1 ? -- Brian May

Re: xen_4.1.6.1-1+deb7u2.dsc

2016-06-21 Thread Brian May
nd the same > error here: > > https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1515145 -- Brian May

Re: xen_4.1.6.1-1+deb7u2.dsc

2016-06-23 Thread Brian May
Brian May writes: > It appears that we need an extra patch to get the fix for xsa97 working > properly. See the linked Ubuntu bug report. > > https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1515145 > > Just wondering if you included this in version 4.1.6.1-1+deb7u2 by an

pidgin

2016-06-27 Thread Brian May
identified for CVE-2016-2372 was the same as one of the patches for CVE-2016-2369 so I didn't apply it twice. Still need to test this and make a copy for testing. -- Brian May https://linuxpenguins.xyz/brian/ diff -Nru pidgin-2.10.10/debian/changelog pidgin-2.10.10/debian/changelog --- p

Re: pidgin

2016-06-28 Thread Brian May
Brian May writes: > Attached is a patch to fix all known security issues in pidgin in > Wheezy-LTS. > > I found that a number of ther CVEs under security-tracker.debian.org > referenced the patch for the fix for the wrong CVE, so I had to retrieve > the correct patches from u

Re: pidgin

2016-06-28 Thread Brian May
OS-CAN-0123 https://bitbucket.org/pidgin/main/commits/8172584fd640 - correct * CVE-2016-4323 / TALOS-CAN-0128 Patch not given - Believe correct patch is 5fa3f2bc69d7918d1e537e780839df63d5df59aa - was patch listed for CVE-2016-2365 / TALOS-CAN-0133 -- Brian May

<    1   2   3   4   5   6   >