Here is my monthly update covering what I have been doing in the free software world during February 2025 (previous month).
Reproducible Builds
-
Kept isdebianreproducibleyet.com up to date. [...]
-
Submitted 8 patches to fix specific reproducibility issues in
acme.sh,node-svgdotjs-svg.js,onevpl-intel-gpu,pkg-rocm-tools,python-assertpy,rocdbgapi,siege&terminaltables3.
-
Drafted, published and publicised our monthly report for January 2025.
-
Categorised a large number of packages and issues in the Reproducible Builds
notes.gitrepository.
-
Elsewhere in our tooling, I made the following changes to diffoscope, including preparing and uploading versions
288and289to Debian:
Debian
Uploads
-
bfs:4.0.5-2— Fix a test failure due to changes in gawk/bash. (#1095329)4.0.6-1— New upstream release.
-
docbook-to-man(1:2.0.0-48) — Set-std=gnu17to avoid a build failure under GCC 15. (#1096534) -
1.6.36-1— New upstream release.1.6.37-1— New upstream release.
-
4.2.19-1— New upstream bugfix release.5.2~beta1-1— New upstream beta release.
Finally, I also sponsored the following packages on behalf of Reiner Herrmann:
-
musl(1.2.5-2) — Import upstream fix for an out-of-bounds write vulnerability. (#1098238)
Debian LTS
This month I have worked 18 hours on Debian Long Term Support (LTS) and 12 hours on its sister Extended LTS project.
-
Investigated and triaged:
libcap2(CVE-2023-2603) andphpmyadmin(CVE-2025-24529,CVE-2025-24530). -
Frontdesk duties, responding to user/developer questions, reviewing others' packages, participating in mailing list discussions, etc.
-
Uploaded
muslversion1.2.5-2to unstable in order to fix an out-of-bounds write vulnerability (#1098238). -
Prepared uploads for
libcap2,muslandphpmyadmin, pending release in early March after completing review. These uploads will address 4+ CVEs. -
Issued DLA 4062-1 because it was discovered that there was a potential remote code execution vulnerability in
python-werkzeug, a library used to create WSGI-based web applications in Python.
You can find out more about the project via the following video:
