GNU bug report logs

#47510 cflow is vulnerable to CVE-2019-16165 and CVE-2019-16166

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Full log

Message #12 received at 47510-done@debbugs.gnu.org (full text, mbox, reply):

Received: (at 47510-done) by debbugs.gnu.org; 18 Mar 2022 02:35:22 +0000
From debbugs-submit-bounces@debbugs.gnu.org Thu Mar 17 22:35:22 2022
Received: from localhost ([127.0.0.1]:55818 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1nV2SX-0005e4-R8
	for submit@debbugs.gnu.org; Thu, 17 Mar 2022 22:35:22 -0400
Received: from mail-qk1-f169.google.com ([209.85.222.169]:36773)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <maxim.cournoyer@gmail.com>) id 1nV2SV-0005dr-9V
 for 47510-done@debbugs.gnu.org; Thu, 17 Mar 2022 22:35:19 -0400
Received: by mail-qk1-f169.google.com with SMTP id v13so5894808qkv.3
 for <47510-done@debbugs.gnu.org>; Thu, 17 Mar 2022 19:35:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
 h=from:to:cc:subject:references:date:in-reply-to:message-id
 :user-agent:mime-version:content-transfer-encoding;
 bh=8rpFAWNHClOKZqmcEEl/xDCkqsIZWTstqbVWUa4phAs=;
 b=SHEZWuVvTuDrJ81cgwuMqyidqxoKXD9Lgydfp6htPZ7l0TBpdp7qgynlLnMp+fjIjN
 /FiJwS7qdIpvAo0+U/7UHL6F2WN6/u+TupWSXd3xWYKAGHkp0uASbtyEJluHVTTUjOr2
 7MmPm+7h/XMe/UqWOn3zWWAmAaURwB6DtAJ4WO2WQMTvshVO/k3Tz4yHQpRouuph3HQ6
 iV5RiQL0lyVUnJ8jpLKDSzySROKZrdR66rmGbArYq/ksNV6/0c8rwhDZTCSuM0evk3d8
 Ml4OQWPjucuJQ6Xo+3FIyFLMjOMl7AA4QWQWQOdtCAacR6KVvF4tk9Tz628S+Oi0PJ6o
 BIKA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20210112;
 h=x-gm-message-state:from:to:cc:subject:references:date:in-reply-to
 :message-id:user-agent:mime-version:content-transfer-encoding;
 bh=8rpFAWNHClOKZqmcEEl/xDCkqsIZWTstqbVWUa4phAs=;
 b=hZ3CM7r4OGR50nSfbImIqCkoQniTwii0Jp7c7we9RRITtualBmpNVmUxeoRGHK2mxs
 wvPYz4IkOsiDVaJh9W8V6Cu9hwjhF9Hl2qu9nZRUrq3VcDEV+lfyvGMM+njcIiLT/jTc
 4C+6VsA0xQ/YDF3VfTU4AcldptNL7rj5vmkFNBQi0J8bcZpPThW9nWG7XhWhxqp+PsYv
 /vz2qvG7oCg5s/MqksmhMsEnvXVRL68HbbOQv3izEf8bGWyCAyiZh5EFMDKZxkgdMmfM
 OYvAFrUfCg/ov8ry1mhOX78nPo17q9ocnja43HLBl2+YkviBE82MzK/TipYDsQUuAz9r
 5a4g==
X-Gm-Message-State: AOAM531XPRNXEIG8AWZBtc+96mv7OpAAGBJ92ZYH+gykdviYChJq2Ebv
 W/4fMpvDYCjMZbshFwpDTMdq9VjfkOw=
X-Google-Smtp-Source: ABdhPJzWstjFX3Y5RDRvxBUC6ZqyHEv9tP3qvoTI+FI9ccKwudW1a2mENsSSbJKaYCt1B515BRIMSg==
X-Received: by 2002:a05:620a:a92:b0:67d:7305:3c38 with SMTP id
 v18-20020a05620a0a9200b0067d73053c38mr4521006qkg.783.1647570913663; 
 Thu, 17 Mar 2022 19:35:13 -0700 (PDT)
Received: from hurd (dsl-10-131-58.b2b2c.ca. [72.10.131.58])
 by smtp.gmail.com with ESMTPSA id
 h22-20020a05620a245600b0067d6dae634csm3744608qkn.9.2022.03.17.19.35.12
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Thu, 17 Mar 2022 19:35:13 -0700 (PDT)
From: Maxim Cournoyer <maxim.cournoyer@gmail.com>
To: Léo Le Bouter <lle-bout@zaclys.net>
Subject: Re: bug#47510: cflow is vulnerable to CVE-2019-16165 and
 CVE-2019-16166
References: <ac7acbed2ed51a67ee4b791d692d5d0a3a9eb16f.camel@zaclys.net>
Date: Thu, 17 Mar 2022 22:35:12 -0400
In-Reply-To: <ac7acbed2ed51a67ee4b791d692d5d0a3a9eb16f.camel@zaclys.net>
 ("Léo
 Le Bouter"'s message of "Wed, 31 Mar 2021 03:50:22 +0200")
Message-ID: <87fsng6l9b.fsf@gmail.com>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: -0.0 (/)
X-Debbugs-Envelope-To: 47510-done
Cc: 47510-done@debbugs.gnu.org
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: -1.0 (-)
Hello!

Léo Le Bouter <lle-bout@zaclys.net> writes:

> I asked the maintainer to fix the issues because they were unfixed
> since a while, they have done so recently:
>
> https://git.savannah.gnu.org/cgit/cflow.git/commit/?id=b9a7cd5e9d4efb54141dd0d11c319bb97a4600c6
>
> They have not made a recently, also it seems they fixed other issues
> that could be security relevant in their commit log, not sure if we
> apply/backport patches or wait for release.

Our cflow package is now at 1.7, which includes the above commit and CVE
fixes.

Thank you,

Maxim




Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sat Dec 21 17:53:07 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.