Here is my monthly update covering what I have been doing in the free software world during February 2021 (previous month):
- Reviewed and merged a number of contribution from Peter Law to my django-cache-toolbox library for Django-based web applications, including: support always fetching some relations when loading a model (#27), allow use of custom
auth.Usermodel. (#29), avoid some more database calls (#30), wrap some collections in tuples for compatibility (#32) and cope with only some of our related models actually being loaded (#33).
-
As part of my role of being the assistant Secretary of the Open Source Initiative and a board director of Software in the Public Interest, I attended their respective monthly meetings and participated in various licensing and other discussions occurring on the internet, as well as the usual internal discussions, etc.
-
Opened a pull request to fix the relative target of manpage links in Roger Wesson's mocassin library. [...]
Reproducible Builds
The motivation behind the Reproducible Builds effort is to ensure no flaws have been introduced during compilation process by promising identical results are always generated from a given source, therefore allowing multiple third-parties to come to a consensus on whether a build was compromised.
The project is proud to be a member project of the Software Freedom Conservancy. Conservancy acts as a corporate umbrella allowing projects to operate as non-profit initiatives without managing their own corporate structure. If you like the work of the Conservancy or the Reproducible Builds project, please consider becoming an official supporter.
This month, I:
-
Filed an upstream pull request to fix relative symlink targets of manpage links in
mocassin. [...] -
In Debian:
-
Submitted 5 patches to fix specific reproducibility issues in
crossfire,golang-github-revel-revel,golang-github-viant-toolbox,python-aiosqlite&zmk. -
Kept isdebianreproducibleyet.com up to date. [...]
-
Submitted a patch to fix reproducibility-related toolchain issue in
kjs: Please make the opcodes.h file reproducible. (#983046)
-
-
Categorised a large number of packages and issues in the Reproducible Builds
notes.gitrepository as well as wrote a script to automatically-classify a number of issues [...]. -
Drafted, published and publicised our monthly report for January.
I also made the following changes to diffoscope, including preparing and uploading versions 167 and 168 to Debian:
-
Bug fixes:
- Don't call
difflib.Differ.comparewith very large inputs; it is at least O(n^2) and makes diffoscope (appear to) hang. [...] - Don't rely on
dumpimagereturning an appropriate exit code; check that the file actually exists. [...] - Don't rely on
magic.Magicto have an identical API between file'smagic.pyand PyPI'spython-magiclibrary. [...]
- Don't call
-
Revamp temporary file handling:
-
Testsuite improvements:
- Strip newlines when determining Black version to avoid
requires black >= 20.8b1 (18.9b0\n detected)in test output. [...] - Fix
weakref-related handling in Python 3.7 (i.e. Debian buster). [...] - If our temporary directory does not exist anymore, recreate it. [...]
- Fix FIT-related tests in Debian buster [...] and
fit_expected_diff[...]. - Gnumeric is back in testing so re-add to (test)
Build-Depends. [...] - Mark
test_apk.py::test_android_manifestas being allowed to fail for now. [...] - Add
u-boot-toolsto (test) Build-Depends so salsa.debian.org pipelines test the new U-Boot FIT comparator. [...] - Move to
assert_diffutility in a number of tests. [...][...]
- Strip newlines when determining Black version to avoid
-
Codebase improvements:
- Correct capitalisation of 'jQuery'. [...]
- Update my copyright years. [...]
- Tidy imports in
diffoscope.comparators.fit. [...] - Don't use
Inheriting PATH of X, usePATH is Xin logging messages. [...] - Drop unused
Config.aclandConfig.xattrattributes [...] and set a defaultConfig.extended_filesystem_attributes. [...]
Debian
Uploads
-
2.2.18-1— New upstream security release. (#981562)2.2.19-1— New upstream security release. (#983090)3.2~alpha1-2— Apply security fix from upstream. (#983090)3.2~beta1-1— New upstream beta release.
-
6.0.10-4— New upstream release, fixing cluster access to unaligned memory on ARM architectures with hard alignment requirements (such asarmhfandarm64). (#982504)6.0.11-1— New upstream release, incorporating security fixes. (#983446)6.2~rc3-1— New upstream release candidate.6.2.0-1— New upstream stable release, incorporating security fixes. (#983446)
-
gunicorn(20.1.0-1) — New upstream release. -
xtrlock(2.15) — Also support theXK_KP_Enterkey (i.e. the Enter on the numeric keypad) to submit a password. (#982634)
I also sponsored an upload of adminer (4.7.9-1) for Alexandre Rossi.
Debian LTS
This month I have worked 18 hours on Debian Long Term Support (LTS) and 12 hours on its sister Extended LTS project.
-
Frontdesk duties, responding to user/developer questions, reviewing others' packages, participating in mailing list discussions, and attending our monthly development meeting. etc.
-
Updated the
lts-cve-triage.pytool to configure Python paths early due to transitive imports in an included library. [...] -
Investigated and triaged:
avahi(CVE-2021-26720),gdk-pixbuf(CVE-2021-20240),libraw(CVE-2020-24870),python3.5(CVE-2021-3177),qemu(CVE-2020-15469,CVE-2020-15859,CVE-2020-25084etc.),rails(CVE-2021-22880&CVE-2021-22881),stunnel4(CVE-2021-20230&CVE-2021-20231) &zeromq3(CVE-2021-20237) -
Issued DLA 2555-1 for
nettyas it was discovered that there was an insecure temporary file issue that could have lead to disclosure of arbitrary local files. -
Issued DLA 2562-1 to address a remote code execution vulnerability in
mumble, a VoIP client commonly used for group chats. The exploit could have been been triggered by a maliciously crafted URL on the server list. -
Issued DLA 2563-1, DLA 2565-1 and ELA-366-1 for
opensslto prevent an issue where "Digital EnVeloPe" EVP-related calls could cause applications to behave incorrectly or even crash (CVE-2021-23840) and address to an issue in the X.509 certificate parsing caused by the lack of error handling while ingesting the 'issuer' field. -
Issued DLA 2568-1 and ELA-369-1 as it was discovered that there was a buffer overflow attack in the
bind9DNS server, caused by an issue in the GSSAPI ("Generic Security Services") security policy negotiation. -
Issued DLA 2540-1, DLA 2569-1 and ELA-354-1 for
python-djangoto address a potential directory-traversal (CVE-2021-3281) and a cache-poisoning issue (CVE-2021-23336). -
Issued DLA 2576-1 for
redisas it was reported that there were a number of integer overflow.
You can find out more about the project via the following video:
