nodejs: CVE-2014-5256

Related Vulnerabilities: CVE-2014-5256   CVE-2013-6668  

Debian Bug report logs - #760385
nodejs: CVE-2014-5256

Reported by: henri@nerv.fi

Date: Wed, 3 Sep 2014 14:24:02 UTC

Severity: serious

Tags: fixed-upstream, jessie-ignore, security, stretch-ignore, upstream

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package nodejs. (Wed, 03 Sep 2014 14:24:07 GMT) (full text, mbox, link).


Acknowledgement sent to "Henri Salo" <fgeek@nerv.fi>:
New Bug report received and forwarded. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Wed, 03 Sep 2014 14:24:07 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Henri Salo" <fgeek@nerv.fi>
To: submit@bugs.debian.org
Subject: nodejs: V8 Memory Corruption and Stack Overflow
Date: Wed, 3 Sep 2014 17:20:24 +0300
[Message part 1 (text/plain, inline)]
Package: nodejs
Version: 0.10.29~dfsg-1
Severity: important
Tags: security, fixed-upstream

Hi,

the following vulnerability has been fixed in nodejs v.0.10.30

http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/

---
Henri Salo
[signature.asc (application/pgp-signature, inline)]

Changed Bug submitter to 'henri@nerv.fi' from '"Henri Salo" <fgeek@nerv.fi>' Request was from "Henri Salo" <fgeek@nerv.fi> to control@bugs.debian.org. (Wed, 03 Sep 2014 14:45:04 GMT) (full text, mbox, link).


Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 03 Sep 2014 15:21:13 GMT) (full text, mbox, link).


Changed Bug title to 'nodejs: CVE-2014-5256' from 'nodejs: V8 Memory Corruption and Stack Overflow' Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 04 Sep 2014 15:33:05 GMT) (full text, mbox, link).


Severity set to 'grave' from 'important' Request was from Moritz Muehlenhoff <jmm@inutil.org> to control@bugs.debian.org. (Thu, 13 Nov 2014 19:48:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package nodejs. (Sat, 15 Nov 2014 12:27:04 GMT) (full text, mbox, link).


Acknowledgement sent to debian@jbfavre.org:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 12:27:04 GMT) (full text, mbox, link).


Message #18 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jean Baptiste Favre <debian@jbfavre.org>
To: 760385@bugs.debian.org
Subject: RE: nodejs: V8 Memory Corruption and Stack Overflow
Date: Sat, 15 Nov 2014 13:15:07 +0100
[Message part 1 (text/plain, inline)]
Hello,
We added upstream patch provided from [1] during Debian BSP in Paris.

Package build went well, even if we face an error during tests.
This error is referenced and has been commented in bug #766484 and is
related to libssl-dev version.

Please find patch attached.

Regards,
Jean Baptiste

[1] http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/
[nodejs_0.10.29~dfsg-1.1.diff (text/x-patch, attachment)]
[signature.asc (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package nodejs. (Sat, 15 Nov 2014 13:48:17 GMT) (full text, mbox, link).


Acknowledgement sent to Jérémy Lal <kapouer@melix.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 13:48:17 GMT) (full text, mbox, link).


Message #23 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jérémy Lal <kapouer@melix.org>
To: debian@jbfavre.org, 760385@bugs.debian.org
Cc: "control@bugs.debian.org" <control@bugs.debian.org>
Subject: Re: Bug#760385: nodejs: V8 Memory Corruption and Stack Overflow
Date: Sat, 15 Nov 2014 14:44:24 +0100
reassign 760385 libv8-3.14
thanks

The problem with that patch is that i can't tell if libv8-3.14 ABI
changes with it or not.
I had plans to use abi-compliance-checker in debian/rules, unfortunately
i need to spend my time on the paid job if i want to heat my house this
winter :(

Jérémy.


Le samedi 15 novembre 2014 à 13:15 +0100, Jean Baptiste Favre a écrit :
> Hello,
> We added upstream patch provided from [1] during Debian BSP in Paris.
> 
> Package build went well, even if we face an error during tests.
> This error is referenced and has been commented in bug #766484 and is
> related to libssl-dev version.
> 
> Please find patch attached.
> 
> Regards,
> Jean Baptiste
> 
> [1] http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/






Bug reassigned from package 'nodejs' to 'libv8-3.14'. Request was from Jérémy Lal <kapouer@melix.org> to control@bugs.debian.org. (Sat, 15 Nov 2014 13:48:20 GMT) (full text, mbox, link).


No longer marked as found in versions nodejs/0.10.29~dfsg-1. Request was from Jérémy Lal <kapouer@melix.org> to control@bugs.debian.org. (Sat, 15 Nov 2014 13:48:21 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 15 Nov 2014 14:54:04 GMT) (full text, mbox, link).


Acknowledgement sent to debian@jbfavre.org:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 14:54:04 GMT) (full text, mbox, link).


Message #32 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jean Baptiste Favre <debian@jbfavre.org>
To: Jérémy Lal <kapouer@melix.org>
Cc: "control@bugs.debian.org" <control@bugs.debian.org>, 760385@bugs.debian.org
Subject: Re: Bug#760385: nodejs: V8 Memory Corruption and Stack Overflow
Date: Sat, 15 Nov 2014 15:50:49 +0100
Maybe I can help to check wether ABI changed or not.
How can I check that ?

Regards,
Jean Baptiste

On 15/11/2014 14:44, Jérémy Lal wrote:
> reassign 760385 libv8-3.14
> thanks
>
> The problem with that patch is that i can't tell if libv8-3.14 ABI
> changes with it or not.
> I had plans to use abi-compliance-checker in debian/rules, unfortunately
> i need to spend my time on the paid job if i want to heat my house this
> winter :(
>
> Jérémy.
>
>
> Le samedi 15 novembre 2014 à 13:15 +0100, Jean Baptiste Favre a écrit :
> > Hello,
> > We added upstream patch provided from [1] during Debian BSP in Paris.
> >
> > Package build went well, even if we face an error during tests.
> > This error is referenced and has been commented in bug #766484 and is
> > related to libssl-dev version.
> >
> > Please find patch attached.
> >
> > Regards,
> > Jean Baptiste
> >
> > [1] http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 15 Nov 2014 15:03:09 GMT) (full text, mbox, link).


Acknowledgement sent to Jérémy Lal <kapouer@melix.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 15:03:09 GMT) (full text, mbox, link).


Message #37 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jérémy Lal <kapouer@melix.org>
To: debian@jbfavre.org
Cc: 760385 <760385@bugs.debian.org>
Subject: Re: Bug#760385: nodejs: V8 Memory Corruption and Stack Overflow
Date: Sat, 15 Nov 2014 16:00:40 +0100
Yes i think you can,
you have to build the package, run abi-compliance-checker,
patch, rebuild, rerun a-c-c and compare.

To run a-c-c you might find some example config at:
http://upstream.rosalinux.ru/versions/v8.html
(click [show log])


Le samedi 15 novembre 2014 à 15:50 +0100, Jean Baptiste Favre a écrit :
> Maybe I can help to check wether ABI changed or not.
> How can I check that ?
> 
> Regards,
> Jean Baptiste
> 
> On 15/11/2014 14:44, Jérémy Lal wrote:
> > reassign 760385 libv8-3.14
> > thanks
> >
> > The problem with that patch is that i can't tell if libv8-3.14 ABI
> > changes with it or not.
> > I had plans to use abi-compliance-checker in debian/rules, unfortunately
> > i need to spend my time on the paid job if i want to heat my house this
> > winter :(
> >
> > Jérémy.
> >
> >
> > Le samedi 15 novembre 2014 à 13:15 +0100, Jean Baptiste Favre a écrit :
> > > Hello,
> > > We added upstream patch provided from [1] during Debian BSP in Paris.
> > >
> > > Package build went well, even if we face an error during tests.
> > > This error is referenced and has been commented in bug #766484 and is
> > > related to libssl-dev version.
> > >
> > > Please find patch attached.
> > >
> > > Regards,
> > > Jean Baptiste
> > >
> > > [1] http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/






Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 15 Nov 2014 19:54:04 GMT) (full text, mbox, link).


Acknowledgement sent to Thomas Viehmann <tv@beamnet.de>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 19:54:04 GMT) (full text, mbox, link).


Message #42 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Thomas Viehmann <tv@beamnet.de>
To: Jean Baptiste Favre <debian@jbfavre.org>, 760385@bugs.debian.org
Subject: Re: Fix for CVE-2014-5256
Date: Sat, 15 Nov 2014 20:44:22 +0100
Hi Jean Baptiste,

thank you for looking into this.
Note that the changelog entries for nodejs 0.10.31 and .32 include
  v8: backport CVE-2013-6668
  v8: fix a crash introduced by previous release
If libv8 in Debian is affected by those, you might also consider also 
backporting those fixes when preparing a new v8 package.

(Elsewhere in NodeJS .33 there is "crypto: Disable autonegotiation for 
SSLv2/3 by default", not sure whether the release team would let 
something like that through.)

Best regards

Thomas



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 15 Nov 2014 20:33:10 GMT) (full text, mbox, link).


Acknowledgement sent to debian@jbfavre.org:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 20:33:10 GMT) (full text, mbox, link).


Message #47 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jean Baptiste Favre <debian@jbfavre.org>
To: Thomas Viehmann <tv@beamnet.de>, 760385@bugs.debian.org
Subject: Re: Fix for CVE-2014-5256
Date: Sat, 15 Nov 2014 21:28:43 +0100
[Message part 1 (text/plain, inline)]
Hello Thomas,
Thanks for your update.

I decided to have a look on this bug because it seemed quite easy to fix
it: upstream patch was available and small anough for me.
Unfortunatly, I'm sure I'll be able to deal with lib8-3.14. The more I
dig into, the less I understand (more or less) :)

I'll try anyway,
Regards,
Jean Baptiste

On 15/11/2014 20:44, Thomas Viehmann wrote:
> Hi Jean Baptiste,
>
> thank you for looking into this.
> Note that the changelog entries for nodejs 0.10.31 and .32 include
>   v8: backport CVE-2013-6668
>   v8: fix a crash introduced by previous release
> If libv8 in Debian is affected by those, you might also consider also
> backporting those fixes when preparing a new v8 package.
>
> (Elsewhere in NodeJS .33 there is "crypto: Disable autonegotiation for
> SSLv2/3 by default", not sure whether the release team would let
> something like that through.)
>
> Best regards
>
> Thomas

[signature.asc (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 15 Nov 2014 20:54:09 GMT) (full text, mbox, link).


Acknowledgement sent to debian@jbfavre.org:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 15 Nov 2014 20:54:09 GMT) (full text, mbox, link).


Message #52 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jean Baptiste Favre <jbfavre@jbfavre.org>
To: Thomas Viehmann <tv@beamnet.de>, 760385@bugs.debian.org
Subject: Re: Fix for CVE-2014-5256
Date: Sat, 15 Nov 2014 21:42:42 +0100
[Message part 1 (text/plain, inline)]
I meant "I'm *not* sure I'll be able to deal with lib8-3.14

Sorry,
Jean Baptiste

On 15/11/2014 21:28, Jean Baptiste Favre wrote:
> Hello Thomas,
> Thanks for your update.
> 
> I decided to have a look on this bug because it seemed quite easy to fix
> it: upstream patch was available and small anough for me.
> Unfortunatly, I'm sure I'll be able to deal with lib8-3.14. The more I
> dig into, the less I understand (more or less) :)
> 
> I'll try anyway,
> Regards,
> Jean Baptiste
> 
> On 15/11/2014 20:44, Thomas Viehmann wrote:
>> Hi Jean Baptiste,
>>
>> thank you for looking into this.
>> Note that the changelog entries for nodejs 0.10.31 and .32 include
>>   v8: backport CVE-2013-6668
>>   v8: fix a crash introduced by previous release
>> If libv8 in Debian is affected by those, you might also consider also
>> backporting those fixes when preparing a new v8 package.
>>
>> (Elsewhere in NodeJS .33 there is "crypto: Disable autonegotiation for
>> SSLv2/3 by default", not sure whether the release team would let
>> something like that through.)
>>
>> Best regards
>>
>> Thomas
> 


[signature.asc (application/pgp-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 02:15:04 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 02:15:05 GMT) (full text, mbox, link).


Message #57 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: 760385@bugs.debian.org
Subject: Re: Bug#760385: Fix for CVE-2014-5256
Date: Fri, 19 Dec 2014 21:11:10 -0500
control: severity -1 important

There is no security support for libv8 in jessie, so security issues aren't RC.

Best wishes,
Mike



Severity set to 'important' from 'grave' Request was from Michael Gilbert <mgilbert@debian.org> to 760385-submit@bugs.debian.org. (Sat, 20 Dec 2014 02:15:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 10:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to Balint Reczey <balint@balintreczey.hu>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 10:03:04 GMT) (full text, mbox, link).


Message #64 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Balint Reczey <balint@balintreczey.hu>
To: 760385@bugs.debian.org, Michael Gilbert <mgilbert@debian.org>
Subject: Re: Bug#760385: Fix for CVE-2014-5256
Date: Sat, 20 Dec 2014 10:59:16 +0100
Hi Mike,

On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert <mgilbert@debian.org>
wrote:
> control: severity -1 important
> 
> There is no security support for libv8 in jessie, so security issues aren't RC.
Could you please add some links to explain that?
I was about to fix this issue in an NMU after double-checking the fix.

Cheers,
Balint



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 10:09:05 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 10:09:05 GMT) (full text, mbox, link).


Message #69 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: 760385@bugs.debian.org
Subject: Re: Bug#760385: Fix for CVE-2014-5256
Date: Sat, 20 Dec 2014 05:06:47 -0500
On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
> Hi Mike,
>
> On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert
> wrote:
>> control: severity -1 important
>>
>> There is no security support for libv8 in jessie, so security issues aren't RC.
> Could you please add some links to explain that?
> I was about to fix this issue in an NMU after double-checking the fix.

Severity doesn't say anything about whether or not a bugs can be
fixed, so you can still do that.  Anyway it was decided recently on
the security team ml.

Best wishes,
Mike



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 10:15:04 GMT) (full text, mbox, link).


Acknowledgement sent to Jonas Smedegaard <dr@jones.dk>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 10:15:04 GMT) (full text, mbox, link).


Message #74 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jonas Smedegaard <dr@jones.dk>
To: Michael Gilbert <mgilbert@debian.org>, 760385@bugs.debian.org, Michael Gilbert <mgilbert@debian.org>, 760385@bugs.debian.org
Subject: Re: Bug#760385: Fix for CVE-2014-5256
Date: Sat, 20 Dec 2014 11:13:08 +0100
[Message part 1 (text/plain, inline)]
Quoting Michael Gilbert (2014-12-20 03:11:10)
> control: severity -1 important
> 
> There is no security support for libv8 in jessie, so security issues aren't RC.

Lack of support do not change severity.  Seems more appropriate to then 
tag as *-ignore instead.

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 10:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Jonas Smedegaard <dr@jones.dk>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 10:39:04 GMT) (full text, mbox, link).


Message #79 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jonas Smedegaard <dr@jones.dk>
To: 760385@bugs.debian.org
Cc: debian-devel@lists.homebase.dk
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sat, 20 Dec 2014 11:34:40 +0100
[Message part 1 (text/plain, inline)]
Quoting Michael Gilbert (2014-12-20 11:06:47)
> On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
>> On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert wrote:
>>> control: severity -1 important
>>>
>>> There is no security support for libv8 in jessie, so security issues 
>>> aren't RC.
>> Could you please add some links to explain that?
>> I was about to fix this issue in an NMU after double-checking the 
>> fix.
>
> Severity doesn't say anything about whether or not a bugs can be 
> fixed, so you can still do that.  Anyway it was decided recently on 
> the security team ml.

I find it sensible for the security team to give up on maintaining some 
packages - and I find it great to try communicate that to our users by 
use of the debian-security-support package.

Just now I learned from above bugreport that the security team also 
actively *lower* bugreports to avoid them being treated as release 
candidate, for packages not maintained by the security team.  That I 
find a horrible approach: Severity of a bug is independent on whether it 
will be fixed or not.  The more proper tag to use is *-ignore, IMO.

Please let us not hide problems!


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 10:51:04 GMT) (full text, mbox, link).


Acknowledgement sent to Jonas Smedegaard <dr@jones.dk>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 10:51:04 GMT) (full text, mbox, link).


Message #84 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jonas Smedegaard <dr@jones.dk>
To: 760385@bugs.debian.org
Cc: debian-devel@lists.debian.org
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sat, 20 Dec 2014 11:48:28 +0100
[Message part 1 (text/plain, inline)]
[sent again, cc correct list address this time]

Quoting Michael Gilbert (2014-12-20 11:06:47)
> On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
>> On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert wrote:
>>> control: severity -1 important
>>>
>>> There is no security support for libv8 in jessie, so security issues 
>>> aren't RC.
>> Could you please add some links to explain that?
>> I was about to fix this issue in an NMU after double-checking the 
>> fix.
>
> Severity doesn't say anything about whether or not a bugs can be 
> fixed, so you can still do that.  Anyway it was decided recently on 
> the security team ml.

I find it sensible for the security team to give up on maintaining some 
packages - and I find it great to try communicate that to our users by 
use of the debian-security-support package.

Just now I learned from above bugreport that the security team also 
actively *lower* bugreports to avoid them being treated as release 
candidate, for packages not maintained by the security team.  That I 
find a horrible approach: Severity of a bug is independent on whether it 
will be fixed or not.  The more proper tag to use is *-ignore, IMO.

Please let us not hide problems!


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 11:18:10 GMT) (full text, mbox, link).


Acknowledgement sent to "Adam D. Barratt" <adam@adam-barratt.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 11:18:10 GMT) (full text, mbox, link).


Message #89 received at 760385@bugs.debian.org (full text, mbox, reply):

From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
To: 760385@bugs.debian.org
Cc: debian-devel@lists.debian.org
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sat, 20 Dec 2014 11:15:26 +0000
On Sat, 2014-12-20 at 11:48 +0100, Jonas Smedegaard wrote:
> [sent again, cc correct list address this time]
> 
> Quoting Michael Gilbert (2014-12-20 11:06:47)
> > On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
> >> On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert wrote:
> >>> control: severity -1 important
> >>>
> >>> There is no security support for libv8 in jessie, so security issues 
> >>> aren't RC.
> >> Could you please add some links to explain that?
> >> I was about to fix this issue in an NMU after double-checking the 
> >> fix.
> >
> > Severity doesn't say anything about whether or not a bugs can be 
> > fixed, so you can still do that.  Anyway it was decided recently on 
> > the security team ml.

I'm not aware of it having been decided that the security team were the
arbiters of release criticality in such situations.

> I find it sensible for the security team to give up on maintaining some 
> packages - and I find it great to try communicate that to our users by 
> use of the debian-security-support package.
> 
> Just now I learned from above bugreport that the security team also 
> actively *lower* bugreports to avoid them being treated as release 
> candidate, for packages not maintained by the security team.  That I 
> find a horrible approach: Severity of a bug is independent on whether it 
> will be fixed or not.  The more proper tag to use is *-ignore, IMO.

The setting of -ignore by people other the Release Team (or those who
have previously discussed doing so, e.g. for certain classes of bug in
stable) is still wrong.

Regards,

Adam




Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 18:45:04 GMT) (full text, mbox, link).


Acknowledgement sent to Balint Reczey <balint@balintreczey.hu>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 18:45:04 GMT) (full text, mbox, link).


Message #94 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Balint Reczey <balint@balintreczey.hu>
To: Michael Gilbert <mgilbert@debian.org>
Cc: 760385@bugs.debian.org, Jonas Smedegaard <dr@jones.dk>, "Adam D. Barratt" <adam@adam-barratt.org.uk>
Subject: Re: Bug#760385: Fix for CVE-2014-5256
Date: Sat, 20 Dec 2014 19:43:38 +0100
Hi Mike,

On Sat, 20 Dec 2014 05:06:47 -0500 Michael Gilbert <mgilbert@debian.org>
wrote:
> On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
> > Hi Mike,
> >
> > On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert
> > wrote:
> >> control: severity -1 important
> >>
> >> There is no security support for libv8 in jessie, so security issues aren't RC.
> > Could you please add some links to explain that?
> > I was about to fix this issue in an NMU after double-checking the fix.
> 
> Severity doesn't say anything about whether or not a bugs can be
> fixed, so you can still do that.  Anyway it was decided recently on
I beg to disagree here. According to freeze policy [1] only targeted
fixes for RC bugs are considered to be accepted without pre-approval to
testing now. Fixes to unstable which won't be accepted to testing are
also discouraged during the freeze.
Those implies that decreasing the severity _does_ affect if a bug should
be fixed.

Please restore the severity of this bug since it is about security flaw
and let the Release Team decide if they want to see a vulnerable libv8
in Jessie.

BTW the fix seems to be trivial and since I'm in the JavaScript team I
can actually fix it in a normal maintainer upload.

> the security team ml.
Please provide a link to a public resource to let others understand the
reasoning.

Thanks,
Balint

[1] https://release.debian.org/jessie/freeze_policy.html



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sat, 20 Dec 2014 20:00:05 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sat, 20 Dec 2014 20:00:05 GMT) (full text, mbox, link).


Message #99 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: 760385@bugs.debian.org
Cc: debian developers <debian-devel@lists.debian.org>
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sat, 20 Dec 2014 14:57:25 -0500
On Sat, Dec 20, 2014 at 6:15 AM, Adam D. Barratt wrote:
> On Sat, 2014-12-20 at 11:48 +0100, Jonas Smedegaard wrote:
>> [sent again, cc correct list address this time]
>>
>> Quoting Michael Gilbert (2014-12-20 11:06:47)
>> > On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
>> >> On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert wrote:
>> >>> control: severity -1 important
>> >>>
>> >>> There is no security support for libv8 in jessie, so security issues
>> >>> aren't RC.
>> >> Could you please add some links to explain that?
>> >> I was about to fix this issue in an NMU after double-checking the
>> >> fix.
>> >
>> > Severity doesn't say anything about whether or not a bugs can be
>> > fixed, so you can still do that.  Anyway it was decided recently on
>> > the security team ml.
>
> I'm not aware of it having been decided that the security team were the
> arbiters of release criticality in such situations.

The severity was bumped to grave by Moritz about a month ago, likely
to get the libv8 maintainers to actually pay attention to their vast
volume of unaddressed security issues.

Now that it's been decided that libv8 won't get security support in
jessie, it seems perfectly reasonable to move back to the original
severity, which is important.

>> I find it sensible for the security team to give up on maintaining some
>> packages - and I find it great to try communicate that to our users by
>> use of the debian-security-support package.
>>
>> Just now I learned from above bugreport that the security team also
>> actively *lower* bugreports to avoid them being treated as release
>> candidate, for packages not maintained by the security team.  That I
>> find a horrible approach: Severity of a bug is independent on whether it
>> will be fixed or not.  The more proper tag to use is *-ignore, IMO.

The release team will still consider important bug fixes, you just
need to ask for
 a pre-unblock.

Best wishes,
Mike



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sun, 21 Dec 2014 00:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to balint@balintreczey.hu:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sun, 21 Dec 2014 00:57:04 GMT) (full text, mbox, link).


Message #104 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Bálint Réczey <balint@balintreczey.hu>
To: Michael Gilbert <mgilbert@debian.org>
Cc: 760385@bugs.debian.org, debian developers <debian-devel@lists.debian.org>
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sun, 21 Dec 2014 01:52:24 +0100
Control: severity -1 grave

Hi Mike,

2014-12-20 20:57 GMT+01:00 Michael Gilbert <mgilbert@debian.org>:
> On Sat, Dec 20, 2014 at 6:15 AM, Adam D. Barratt wrote:
>> On Sat, 2014-12-20 at 11:48 +0100, Jonas Smedegaard wrote:
>>> [sent again, cc correct list address this time]
>>>
>>> Quoting Michael Gilbert (2014-12-20 11:06:47)
>>> > On Sat, Dec 20, 2014 at 4:59 AM, Balint Reczey wrote:
>>> >> On Fri, 19 Dec 2014 21:11:10 -0500 Michael Gilbert wrote:
>>> >>> control: severity -1 important
>>> >>>
>>> >>> There is no security support for libv8 in jessie, so security issues
>>> >>> aren't RC.
>>> >> Could you please add some links to explain that?
>>> >> I was about to fix this issue in an NMU after double-checking the
>>> >> fix.
>>> >
>>> > Severity doesn't say anything about whether or not a bugs can be
>>> > fixed, so you can still do that.  Anyway it was decided recently on
>>> > the security team ml.
>>
>> I'm not aware of it having been decided that the security team were the
>> arbiters of release criticality in such situations.
>
> The severity was bumped to grave by Moritz about a month ago, likely
> to get the libv8 maintainers to actually pay attention to their vast
> volume of unaddressed security issues.
>
> Now that it's been decided that libv8 won't get security support in
> jessie, it seems perfectly reasonable to move back to the original
> severity, which is important.
The proper severity of this bug is grave as set by Moritz IMO. I'm
restoring it wearing my maintainer hat.
I have also checked if the fix changed the ABI using objdump (did not
change it) and uploaded a fixed version to DELAYED/2.
The fix can be found in the usual packaging repository.

Cheers,
Balint



Severity set to 'grave' from 'important' Request was from Bálint Réczey <balint@balintreczey.hu> to 760385-submit@bugs.debian.org. (Sun, 21 Dec 2014 00:57:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sun, 21 Dec 2014 01:15:04 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sun, 21 Dec 2014 01:15:04 GMT) (full text, mbox, link).


Message #111 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: 760385@bugs.debian.org
Cc: debian developers <debian-devel@lists.debian.org>
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sat, 20 Dec 2014 20:13:35 -0500
On Sat, Dec 20, 2014 at 7:52 PM, Bálint Réczey wrote:
> The proper severity of this bug is grave as set by Moritz IMO. I'm
> restoring it wearing my maintainer hat.

It's not really constructive arguing over severity, so that's fine.
You've saved yourself from needing to write an unblock request.

The problem still remains that the backlog of libv8 security issues
never get fixed (except for a new upstream every now and then), so
treating this one as RC but not the others is rather inconsistent:
https://security-tracker.debian.org/tracker/source-package/libv8
https://security-tracker.debian.org/tracker/source-package/libv8-3.14

Note that unimportant there indicates lack of security support for the package.

If there is interest in security support for libv8, that is a good
thing, but a lot more needs to be done for that to be true.

Best wishes,
Mike



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sun, 21 Dec 2014 14:15:05 GMT) (full text, mbox, link).


Acknowledgement sent to balint@balintreczey.hu:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sun, 21 Dec 2014 14:15:05 GMT) (full text, mbox, link).


Message #116 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Bálint Réczey <balint@balintreczey.hu>
To: Michael Gilbert <mgilbert@debian.org>
Cc: 760385@bugs.debian.org, debian developers <debian-devel@lists.debian.org>, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sun, 21 Dec 2014 15:11:48 +0100
Hi Mike,

First, I had to cancel the upload because of too strict reverse
dependencies. Dear fellow JavaScript maintainers please figure out a
less strict dependency graph because every otherwise fully compatible
libv8 update would break several packages.

2014-12-21 2:13 GMT+01:00 Michael Gilbert <mgilbert@debian.org>:
> On Sat, Dec 20, 2014 at 7:52 PM, Bálint Réczey wrote:
>> The proper severity of this bug is grave as set by Moritz IMO. I'm
>> restoring it wearing my maintainer hat.
>
> It's not really constructive arguing over severity, so that's fine.
I appreciate the work done by the Security Team but to work together
we have to know what actions can be taken by the Security Team.
Increasing severity of bugs is business as usual and perfectly
reasonable, but _decreasing_ the severity _based on the availability
of security support_ was crossing a line IMO. It seems the line was
there based on Jonas' and Adam's email.
To clarify my position the Security Team can and is expected to
decrease the severity in case a security bug's impact turns out to be
less than originally expected but in this particular case this rule
does not seem to be applicable.

> You've saved yourself from needing to write an unblock request.
>
> The problem still remains that the backlog of libv8 security issues
> never get fixed (except for a new upstream every now and then), so
> treating this one as RC but not the others is rather inconsistent:
> https://security-tracker.debian.org/tracker/source-package/libv8
> https://security-tracker.debian.org/tracker/source-package/libv8-3.14
If there were bugs opened for those CVE-s those should have been
opened with grave severity, too.

>
> Note that unimportant there indicates lack of security support for the package.
This is confusing. Please don't mark them as unimportant because in
this context unimportant is defined differently.

https://security-tracker.debian.org/tracker/status/unimportant :
"This page lists packages that are affected by issues that are
considered unimportant from a security perspective. These issues are
thought to be unexploitable or uneffective in most situations (for
example, browser denial-of-services)."

>
> If there is interest in security support for libv8, that is a good
> thing, but a lot more needs to be done for that to be true.
Well, there is a long way to go, I agree.

Thank you for helping the Security Team and keeping the bugs and CVE-s updated.

Cheers,
Balint



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Sun, 21 Dec 2014 20:27:04 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Gilbert <mgilbert@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sun, 21 Dec 2014 20:27:04 GMT) (full text, mbox, link).


Message #121 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Michael Gilbert <mgilbert@debian.org>
To: 760385@bugs.debian.org
Cc: debian developers <debian-devel@lists.debian.org>
Subject: Re: lowering severity of bugs not tracked by release team
Date: Sun, 21 Dec 2014 15:23:55 -0500
On Sun, Dec 21, 2014 at 9:11 AM, Bálint Réczey wrote:
>> The problem still remains that the backlog of libv8 security issues
>> never get fixed (except for a new upstream every now and then), so
>> treating this one as RC but not the others is rather inconsistent:
>> https://security-tracker.debian.org/tracker/source-package/libv8
>> https://security-tracker.debian.org/tracker/source-package/libv8-3.14
>
> If there were bugs opened for those CVE-s those should have been
> opened with grave severity, too.

Here you go:
http://bugs.debian.org/773671

Good luck!

Best wishes,
Mike



Severity set to 'normal' from 'grave' Request was from Michael Gilbert <mgilbert@debian.org> to control@bugs.debian.org. (Fri, 13 Feb 2015 21:39:09 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Tue, 28 Feb 2017 12:33:05 GMT) (full text, mbox, link).


Acknowledgement sent to Adrian Bunk <bunk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Tue, 28 Feb 2017 12:33:05 GMT) (full text, mbox, link).


Message #128 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Adrian Bunk <bunk@debian.org>
To: 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Unfixed old CVEs should really be RC
Date: Tue, 28 Feb 2017 14:28:28 +0200
Control: severity -1 serious

Dozens of unfixed CVEs, the oldest unfixed CVEs will be more than
4 years old when stretch gets released.

In the current state the package is really too buggy for shipping
in a new stable release.

cu
Adrian

-- 

       "Is there not promise of rain?" Ling Tan asked suddenly out
        of the darkness. There had been need of rain for many days.
       "Only a promise," Lao Er said.
                                       Pearl S. Buck - Dragon Seed




Severity set to 'serious' from 'normal' Request was from Adrian Bunk <bunk@debian.org> to 760385-submit@bugs.debian.org. (Tue, 28 Feb 2017 12:33:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Mon, 03 Apr 2017 18:06:03 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Mon, 03 Apr 2017 18:06:03 GMT) (full text, mbox, link).


Message #135 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: Adrian Bunk <bunk@debian.org>
Cc: 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Re: Unfixed old CVEs should really be RC
Date: Mon, 3 Apr 2017 20:03:16 +0200
On Tue, Feb 28, 2017 at 02:28:28PM +0200, Adrian Bunk wrote:
> Control: severity -1 serious
> 
> Dozens of unfixed CVEs, the oldest unfixed CVEs will be more than
> 4 years old when stretch gets released.
> 
> In the current state the package is really too buggy for shipping
> in a new stable release.

Note that nodejs will not be covered by security support in stretch (as it was
done for jessie already). We had initially considered it, but with
nodejs 6 not having it made into stretch, that's not realistic.

So these can be downgraded to non-RC (or if the release team thinks
nodejs should rather be remove from testing, removal is also an option
of course).

Cheers,
        Moritz



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Mon, 03 Apr 2017 18:18:03 GMT) (full text, mbox, link).


Acknowledgement sent to Adrian Bunk <bunk@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Mon, 03 Apr 2017 18:18:03 GMT) (full text, mbox, link).


Message #140 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Adrian Bunk <bunk@debian.org>
To: Moritz Muehlenhoff <jmm@inutil.org>
Cc: 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Re: Unfixed old CVEs should really be RC
Date: Mon, 3 Apr 2017 21:13:56 +0300
On Mon, Apr 03, 2017 at 08:03:16PM +0200, Moritz Muehlenhoff wrote:
> On Tue, Feb 28, 2017 at 02:28:28PM +0200, Adrian Bunk wrote:
> > Control: severity -1 serious
> > 
> > Dozens of unfixed CVEs, the oldest unfixed CVEs will be more than
> > 4 years old when stretch gets released.
> > 
> > In the current state the package is really too buggy for shipping
> > in a new stable release.
> 
> Note that nodejs will not be covered by security support in stretch (as it was
> done for jessie already). We had initially considered it, but with
> nodejs 6 not having it made into stretch, that's not realistic.
> 
> So these can be downgraded to non-RC (or if the release team thinks
> nodejs should rather be remove from testing, removal is also an option
> of course).

This is not even the normal Node.js, this is a version of V8 from an 
upstream branch that is dead for 4 years already.

> Cheers,
>         Moritz

cu
Adrian

-- 

       "Is there not promise of rain?" Ling Tan asked suddenly out
        of the darkness. There had been need of rain for many days.
       "Only a promise," Lao Er said.
                                       Pearl S. Buck - Dragon Seed




Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Mon, 03 Apr 2017 19:03:06 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Mon, 03 Apr 2017 19:03:06 GMT) (full text, mbox, link).


Message #145 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: Adrian Bunk <bunk@debian.org>
Cc: 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Re: Unfixed old CVEs should really be RC
Date: Mon, 3 Apr 2017 21:01:34 +0200
On Mon, Apr 03, 2017 at 09:13:56PM +0300, Adrian Bunk wrote:
> On Mon, Apr 03, 2017 at 08:03:16PM +0200, Moritz Muehlenhoff wrote:
> > On Tue, Feb 28, 2017 at 02:28:28PM +0200, Adrian Bunk wrote:
> > > Control: severity -1 serious
> > > 
> > > Dozens of unfixed CVEs, the oldest unfixed CVEs will be more than
> > > 4 years old when stretch gets released.
> > > 
> > > In the current state the package is really too buggy for shipping
> > > in a new stable release.
> > 
> > Note that nodejs will not be covered by security support in stretch (as it was
> > done for jessie already). We had initially considered it, but with
> > nodejs 6 not having it made into stretch, that's not realistic.
> > 
> > So these can be downgraded to non-RC (or if the release team thinks
> > nodejs should rather be remove from testing, removal is also an option
> > of course).
> 
> This is not even the normal Node.js, this is a version of V8 from an 
> upstream branch that is dead for 4 years already.

Right. Initially there was some plan to provide a supported libv8
from src:nodejs, though.

libv8 has never been covered by security support in any Debian release
so far, upstream does no real security support apart from what lands
in Chrome.

Cheers,
        Moritz



Added tag(s) stretch-ignore. Request was from Niels Thykier <niels@thykier.net> to control@bugs.debian.org. (Wed, 05 Apr 2017 07:09:06 GMT) (full text, mbox, link).


Added tag(s) jessie-ignore. Request was from Andreas Beckmann <anbe@debian.org> to control@bugs.debian.org. (Wed, 19 Apr 2017 09:57:08 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Fri, 18 Jan 2019 10:39:05 GMT) (full text, mbox, link).


Acknowledgement sent to Andreas Tille <andreas@an3as.eu>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Fri, 18 Jan 2019 10:39:06 GMT) (full text, mbox, link).


Message #154 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Andreas Tille <andreas@an3as.eu>
To: Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>, Jérémy Lal <kapouer@melix.org>, Jonas Smedegaard <dr@jones.dk>, Balint Reczey <balint@balintreczey.hu>
Cc: 853512@bugs.debian.org, 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Status of libv8?
Date: Fri, 18 Jan 2019 11:37:30 +0100
Hi,

I just realised that one of my packages does not migrate to testing due
to its dependency from r-cran-v8 and in turn from libv8-devel.  I
realised that while libv8 has 3 security bugs which are set to
stretch-ignore (#760385, #773623, #773671 - should this somehow also be
set to buster-ignore??? - I had no idea that we ignore CVEs at all but
anyway) it probably can not migrate to testing since it does not even
build:

   #853512 libv8-3.14: ftbfs with GCC-7

This bug is RC since 6 months but there is no response from any
uploader.  So I tried to clone the repository from Salsa and realised
that there is none at the place I would have expected
(https://salsa.debian.org/js-team/libv8).  Is there any other place
(besides digging into Alioth archives where I could find the
repository?)  I admit I'm not motivated to find out how to restore
old repositories but would rather use

   gbp import-dscs --ignore-repo-config --debsnap --pristine-tar libv8

instead.  Any information about the status of this package would be
really welcome.

However, when reading

   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773671#59

it might rather the best idea to remove this lib from Debian at all and
I need to see how I can avoid depending from this package.

Kind regards

       Andreas.

PS: Please CC me.  I'm not subscribed to this list.

-- 
http://fam-tille.de



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Fri, 18 Jan 2019 10:57:05 GMT) (full text, mbox, link).


Acknowledgement sent to Jérémy Lal <kapouer@melix.org>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Fri, 18 Jan 2019 10:57:05 GMT) (full text, mbox, link).


Message #159 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Jérémy Lal <kapouer@melix.org>
To: Andreas Tille <andreas@an3as.eu>
Cc: Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>, Jonas Smedegaard <dr@jones.dk>, Balint Reczey <balint@balintreczey.hu>, 853512@bugs.debian.org, 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Re: Status of libv8?
Date: Fri, 18 Jan 2019 11:51:38 +0100
[Message part 1 (text/plain, inline)]
Le ven. 18 janv. 2019 à 11:37, Andreas Tille <andreas@an3as.eu> a écrit :

> Hi,
>
> I just realised that one of my packages does not migrate to testing due
> to its dependency from r-cran-v8 and in turn from libv8-devel.  I
> realised that while libv8 has 3 security bugs which are set to
> stretch-ignore (#760385, #773623, #773671 - should this somehow also be
> set to buster-ignore??? - I had no idea that we ignore CVEs at all but
> anyway) it probably can not migrate to testing since it does not even
> build:
>
>    #853512 libv8-3.14: ftbfs with GCC-7
>
> This bug is RC since 6 months but there is no response from any
> uploader.  So I tried to clone the repository from Salsa and realised
> that there is none at the place I would have expected
> (https://salsa.debian.org/js-team/libv8).  Is there any other place
> (besides digging into Alioth archives where I could find the
> repository?)  I admit I'm not motivated to find out how to restore
> old repositories but would rather use
>
>    gbp import-dscs --ignore-repo-config --debsnap --pristine-tar libv8
>
> instead.  Any information about the status of this package would be
> really welcome.
>
> However, when reading
>
>    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773671#59
>
> it might rather the best idea to remove this lib from Debian at all and
> I need to see how I can avoid depending from this package.
>

Indeed, i am sorry for this bad state of things; i thought i could handle
it,
but obviously i couldn't.

Possible solutions (besides not using it at all):
- bundle it - nodejs bundles it
- change nodejs to build its v8 as a shared lib, and provide it
it makes sense because upstream nodejs do all the work of keeping ABI
stability,
backporting security fixes, choosing the right version, and so on.
- take over maintenance and distribute it independently of nodejs

Jérémy
[Message part 2 (text/html, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#760385; Package libv8-3.14. (Fri, 18 Jan 2019 12:09:03 GMT) (full text, mbox, link).


Acknowledgement sent to Andreas Tille <andreas@an3as.eu>:
Extra info received and forwarded to list. Copy sent to Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Fri, 18 Jan 2019 12:09:03 GMT) (full text, mbox, link).


Message #164 received at 760385@bugs.debian.org (full text, mbox, reply):

From: Andreas Tille <andreas@an3as.eu>
To: Jérémy Lal <kapouer@melix.org>
Cc: Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>, Jonas Smedegaard <dr@jones.dk>, Balint Reczey <balint@balintreczey.hu>, 853512@bugs.debian.org, 760385@bugs.debian.org, 773623@bugs.debian.org, 773671@bugs.debian.org
Subject: Re: Status of libv8?
Date: Fri, 18 Jan 2019 13:04:30 +0100
Hi Jérémy,

On Fri, Jan 18, 2019 at 11:51:38AM +0100, Jérémy Lal wrote:
> > However, when reading
> >
> >    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773671#59
> >
> > it might rather the best idea to remove this lib from Debian at all and
> > I need to see how I can avoid depending from this package.
> 
> Indeed, i am sorry for this bad state of things; i thought i could handle
> it,
> but obviously i couldn't.
> 
> Possible solutions (besides not using it at all):
> - bundle it - nodejs bundles it
> - change nodejs to build its v8 as a shared lib, and provide it
> it makes sense because upstream nodejs do all the work of keeping ABI
> stability,
> backporting security fixes, choosing the right version, and so on.
> - take over maintenance and distribute it independently of nodejs

This sounds like a pretty sensible solution.  I see you and Jonas are
also uploaders for nodejs.  It would be really great if you could do
this.

Kind regards

       Andreas.

-- 
http://fam-tille.de



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:22:22 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.