Debian Package Tracker
Register | Log in
Subscribe

pesign

Signing utility for UEFI binaries

Choose email to subscribe with

general
  • source: pesign (main)
  • version: 0.112-6
  • maintainer: Debian UEFI maintainers (archive) (DMD)
  • uploaders: Steve McIntyre [DMD] – Daniel Jared Dominguez [DMD]
  • arch: amd64 arm64 armel armhf i386
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.112-5
  • oldstable: 0.112-6
  • stable: 0.112-6
  • testing: 0.112-6
  • unstable: 0.112-6
versioned links
  • 0.112-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.112-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • pesign (1 bugs: 0, 1, 0, 0)
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
In debian/watch no matching files for watch line
  https://github.com/rhinstaller/pesign/releases .*[^n]/(?:|v|version-|r|REL_|rel-|pesign(?:_|-))(\d[^\s/]*)\.(?:tar\.xz|txz|tar\.bz2|tbz2|tar\.gz|tgz)
Created: 2022-09-19 Last update: 2023-09-24 01:41
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2022-3560: A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.
Created: 2023-01-31 Last update: 2023-06-11 06:30
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2022-3560: A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.
Created: 2023-06-11 Last update: 2023-06-11 06:30
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2023-09-13 Last update: 2023-09-24 01:33
2 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit ffe3a6775137be0e0659af56bd066c64fd1bccc8
Merge: de47569 3ff944e
Author: Mario Limonciello <superm1@gmail.com>
Date:   Tue Dec 20 04:36:15 2022 +0000

    Merge branch 'scrub-obsolete' into 'debian'
    
    Remove unnecessary constraints
    
    See merge request efi-team/pesign!1

commit 3ff944ed9d3aeb416a5a725792442d2ce77b3d6a
Author: Debian Janitor <janitor@jelmer.uk>
Date:   Sat Oct 29 21:17:13 2022 +0000

    Remove constraints unnecessary since buster (oldstable)
    
    * Build-Depends: Drop versioned constraint on libefivar-dev, libnspr4-dev, libnss3-dev and opensc.
    
    Changes-By: deb-scrub-obsolete
Created: 2022-12-20 Last update: 2023-09-15 14:38
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2022-3560: (needs triaging) A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.

You can find information about how to handle this issue in the security team's documentation.

Created: 2023-01-31 Last update: 2023-06-11 06:30
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2022-3560: (needs triaging) A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.

You can find information about how to handle this issue in the security team's documentation.

Created: 2023-06-10 Last update: 2023-06-11 06:30
debian/patches: 4 patches to forward upstream low

Among the 4 debian patches available in version 0.112-6 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-26 15:54
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-12-17 19:18
news
[rss feed]
  • [2021-01-07] pesign 0.112-6 MIGRATED to testing (Debian testing watch)
  • [2021-01-01] Accepted pesign 0.112-6 (source) into unstable (Steve McIntyre)
  • [2019-05-09] pesign 0.112-5 MIGRATED to testing (Debian testing watch)
  • [2019-05-05] Accepted pesign 0.112-5 (source) into unstable (Steve McIntyre)
  • [2017-06-06] Accepted pesign 0.112-4~bpo8+1 (source amd64) into jessie-backports->backports-policy, jessie-backports (Julien Cristau)
  • [2017-05-19] pesign 0.112-4 MIGRATED to testing (Debian testing watch)
  • [2017-05-13] Accepted pesign 0.112-4 (source) into unstable (Julien Cristau)
  • [2017-02-22] Accepted pesign 0.112-3~bpo8+1 (source amd64) into jessie-backports, jessie-backports (Julien Cristau)
  • [2016-07-03] pesign 0.112-3 MIGRATED to testing (Debian testing watch)
  • [2016-06-27] Accepted pesign 0.112-3 (source) into unstable (Julien Cristau)
  • [2016-06-27] Accepted pesign 0.112-2 (source amd64) into unstable (Steve McIntyre)
  • [2016-05-01] pesign 0.112-1 MIGRATED to testing (Debian testing watch)
  • [2016-04-20] Accepted pesign 0.112-1 (source amd64) into unstable (Daniel Jared Dominguez) (signed by: Steve McIntyre)
  • [2015-06-30] pesign 0.110-2 MIGRATED to testing (Britney)
  • [2015-06-24] Accepted pesign 0.110-2 (source amd64) into unstable (Daniel Jared Dominguez) (signed by: Steve McIntyre)
  • [2015-06-15] Accepted pesign 0.110-1 (source amd64) into unstable, unstable (Daniel Jared Dominguez) (signed by: Steve McIntyre)
bugs [bug history graph]
  • all: 4
  • RC: 1
  • I&N: 2
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.112-6

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing