Here is my monthly update covering what I have been doing in the free software world during January 2024 (previous month):
-
IEEE Software announced that a paper that I co-authored with Dr. Stefano Zacchiroli has recently been awarded their ‘Best Paper’ award. (More info.)
-
I merged a change from Alexandre Detiste to remove a dependency on the Six Python library in a Django library of mine. [...]
Reproducible Builds
The motivation behind the Reproducible Builds effort is to ensure no flaws have been introduced during this compilation process by promising identical results are always generated from a given source, thus allowing multiple third-parties to come to a consensus on whether a build was compromised.
This month, I:
-
Kept isdebianreproducibleyet.com up to date. [...]
-
Submitted a patch to fix a specific reproducibility issues in
mumble.
-
Drafted, published and publicised our monthly report.
-
Categorised a large number of packages and issues in the Reproducible Builds
notes.gitrepository.
Elsewhere in our tooling, I made a number of changes to diffoscope, our in-depth and content-aware diff utility that can locate and diagnose reproducibility issues, including preparing and uploading versions 254 and 255 to Debian.
Debian
-
1.2.0-5— Upload 1.2 branch to Debian unstable (from experimental).1.2.0-6— Temporarily allow timeout-related tests to fail.
-
memcached(1.6.23-1) — New upstream release. -
4.2.9-1— New upstream bugfix release.5.0.1-1— New upstream bugfix release (to experimental).
-
2.3.2-1— New upstream release and migrate to usingdh_auto_test.2.3.2-2— Don't use local version of libhiredis; use the system one. (#1057791)
-
7.0.15-1— New [upstream 7.0.x security release]https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES).7.2.4-1— New upstream 7.2.x security release.
Elsewhere in Debian, I requested the removal of my aptfs package. (#1061331)
Debian LTS
This month I have worked 18 hours on Debian Long Term Support (LTS) and 12 hours on its sister Extended LTS project.
-
Investigated and triaged
coreutils(CVE-2024-0684),gnutls28(CVE-2024-0553),golang-1.11(CVE-2023-39326,CVE-2023-45285&CVE-2023-45287),gpac(CVE-2023-50120,CVE-2024-0321&CVE-2024-0322),gtkwave,mock(CVE-2023-6395),python-asyncssh(CVE-2023-48795),qemu(CVE-2023-1544&CVE-2023-3354),spip(CVE-2024-23659),sympa(CVE-2021-46900) &trilead-ssh2(CVE-2023-48795) -
Frontdesk duties, responding to user/developer questions, reviewing others' packages, etc.
-
Updated the Git workflow documentation. [...]
-
Issued DLA 3715-1, as it was discovered that there was an injection attack in Jinja, a popular templating engine used in Python applications. It was possible to inject arbitrary HTML attributes into rendered HTML via the
xmlattrfilter, potentially leading to a Cross-Site Scripting (XSS) attack. It may also have been possible to bypass attribute validation checks if they were blacklist-based. -
Issued DLA 3716-1 for
ruby-httparty, a web service library used in Ruby applications, because it was discovered that there was a HTTP header injection vulnerability. A remote, unauthenticated attacker could have provided a crafted filename parameter duringmultipart/form-datauploads which could have resulted in, for example, an attacker controlling filenames being written to disk. -
Uploaded Redis version
7.0.15-1~deb12u1to Debian bookworm in order to addressCVE-2023-41056. -
Issued DLA 3724-1 because it was discovered that there was a potential arbitrary code execution vulnerability in Pillow, a popular library for manipulating images used by Python applications.
You can find out more about the Debian LTS project via the following video:
