[Secure-testing-team] Status of unfixed security issues
Joey Hess
joeyh at debian.org
Tue Apr 5 22:15:45 UTC 2005
Moritz Muehlenhoff wrote:
> slash CAN-2002-1647
> - Maintainer doesn't consider possible disclosure of user account passwords
> a security problem. It should be explained to him, why this _is_ indeed
> a (minor) security problem.
I tried and he ignored me with the comment that he's ignored others who
have tried to explain it to him. :-/
The fact that upstream apparently fixed it years ago and he's not even
updating the package is just weird.
> ssh CAN-2004-1653
> - This can be closed, it's known and documented SSH behaviour. Any objections?
I'd been waiting for Colin to close it as the ssh maintainer. No
objections though.
> openwebmail CAN-2005-0445
> - Fixed upstream and no maintainer reaction since six weeks. Given the fact that
> another security issue is open for 2.5 months without reaction and 291478
> describes the security state of the code as rather poor this package should
> be given up for adoption or removed from sid as well. It's currently not part
> of Sarge, but there's still about 100 sid users in popcon alone which use the
> vulnerable version.
You should contact the MIA handling guys for this I think.
> tftpd-hpa CAN-2004-1485
> - No maintainer reaction for seven weeks, but the proposed solution from Joey
> seems correct.
I'll re-ping him, he's been responsive about non-security issues in the
past.
> mozilla-firefox CAN-2005-0233
> - I guess we can marked this fixed for the testing tracking purposes. Spoofing
> is no longer possible with IDN disabled and the punycode representation
> present. It's a problem implicit in Unicode representations. Konqueror fixed
> this by allowing IDN only for TLDs that have an anti-scam policy on Unicode,
> but that's not necessarily a better solution. Objections?
I've been leaving it open only because the firefox maintainer noted that
he's not fully happy with the fix. OTOH, we could just throw in a NOTE
to that effect.
> tnftp CAN-2004-1294
> - No maintainer reaction since 3.5 months. Someone prepared an updated package
> of fixed upstream. Any DD willing to review and upload?
Also not in testing, probably due to this hole. I'd say let MIA know
about it, I don't know if I want to fix it if that ends up getting the
unmaintained package back into testing..
> lesstif1 CAN-2004-0914 and 0688 and 0687
> - MOTIF 1.2 support is no longer maintained upstream and it has already proven
> to be difficult to support for this issue. Is it really a good idea to keep
> support for lesstif1 for at least three more years (till Sarge, Sarge life
> cycle, Sarge-oldstable)? Only about two dozen binary packages still depend on
> lesstif1, mostly legacy X11 applications that haven't been touched by their
> maintainers for years. I just tried to "port" xsol simply by changing
> build-depends and it worked without problems. Maybe it's doable to fix the
> few remaining packages and drop lesstif1 before Sarge freeze? Comments?
I count about 30 that use lesstif1. It surely wouldn't hurt to file bugs
on all of them but it seems likely some would need more than a rebuild
and without mass MMUing I doubt we'd get them all fixed for sarge.
Still, it's probably the most viable way to avoid these CANs. We could
bring this up on debian-release and see what the RMs think about the
idea.
--
see shy jo
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20050405/64a691ca/attachment.pgp
More information about the Secure-testing-team
mailing list