Bug#1071449: bookworm-pu: package sendmail/8.17.1.9-2+deb12u1

2024-05-19 Thread Bastien Roucariès
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: sendm...@packages.debian.org
Control: affects -1 + src:sendmail
User: release.debian@packages.debian.org
Usertags: pu

[ Reason ]
sendmail was affected by CVE-2023-51765

[ Impact ]
close CVE-2023-51765 and reject NUL mail

[ Tests ]
CVE-2023-51765 fix was tested manually and cross checked

[ Risks ]
Code is complex and rejecting NUL is slighly RFC non conformant

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
Fix CVE-2023-51765 (Closes: #1059386):
sendmail allowed SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation
technique to inject e-mail messages with a spoofed
MAIL FROM address, allowing bypass of an SPF protection
mechanism. This occurs because sendmail supports
. but some other popular e-mail servers
do not. This is resolved with 'o' in srv_features.
  * Enable _FFR_REJECT_NUL_BYTE for rejecting mail that
include NUL byte
  * By default enable rejecting mail that include NUL byte.
set confREJECT_NUL to 'true' by default .
User could disable by setting confREJECT_NUL to false.
(Closes: #1070190). Close a variant of CVE-2023-51765
aka SMTP smuggling.


[ Other info ]
No regression bugs in sid/trixie since at least two week
diff -Nru sendmail-8.17.1.9/debian/cf/ostype/debian.m4.in sendmail-8.17.1.9/debian/cf/ostype/debian.m4.in
--- sendmail-8.17.1.9/debian/cf/ostype/debian.m4.in	2023-01-11 22:26:28.0 +
+++ sendmail-8.17.1.9/debian/cf/ostype/debian.m4.in	2024-05-13 18:44:56.0 +
@@ -65,6 +65,9 @@
 dnl #
 define(`confDEF_USER_ID', `mail:mail')dnl
 dnl #
+ifelse(eval(index(sm_ffr, `-D_FFR_REJECT_NUL_BYTE') >= 0), `1',dnl
+`define(`confREJECT_NUL',`true')')dnl
+dnl #
 dnl #-
 dnl # mailer paths and options
 dnl #-
diff -Nru sendmail-8.17.1.9/debian/changelog sendmail-8.17.1.9/debian/changelog
--- sendmail-8.17.1.9/debian/changelog	2023-01-11 22:26:28.0 +
+++ sendmail-8.17.1.9/debian/changelog	2024-05-13 18:44:56.0 +
@@ -1,3 +1,24 @@
+sendmail (8.17.1.9-2+deb12u1) bookworm-security; urgency=high
+
+  * QA upload
+  * Fix CVE-2023-51765 (Closes: #1059386):
+sendmail allowed SMTP smuggling in certain configurations.
+Remote attackers can use a published exploitation
+technique to inject e-mail messages with a spoofed
+MAIL FROM address, allowing bypass of an SPF protection
+mechanism. This occurs because sendmail supports
+. but some other popular e-mail servers
+do not. This is resolved with 'o' in srv_features.
+  * Enable _FFR_REJECT_NUL_BYTE for rejecting mail that
+include NUL byte
+  * By default enable rejecting mail that include NUL byte.
+set confREJECT_NUL to 'true' by default .
+User could disable by setting confREJECT_NUL to false.
+(Closes: #1070190). Close a variant of CVE-2023-51765
+aka SMTP smuggling.
+
+ -- Bastien Roucari??s   Mon, 13 May 2024 18:44:56 +
+
 sendmail (8.17.1.9-2) unstable; urgency=medium
 
   * QA upload.
diff -Nru sendmail-8.17.1.9/debian/configure.ac sendmail-8.17.1.9/debian/configure.ac
--- sendmail-8.17.1.9/debian/configure.ac	2023-01-11 22:26:28.0 +
+++ sendmail-8.17.1.9/debian/configure.ac	2024-05-13 18:44:56.0 +
@@ -466,6 +466,7 @@
 sm_envdef="$sm_envdef -DHASFLOCK=1";
 sm_libsm_envdef="$sm_libsm_envdef -DHAVE_NANOSLEEP=1";
 sm_ffr="$sm_ffr -D_FFR_QUEUE_SCHED_DBG"; # %% TESTING 
+sm_ffr="$sm_ffr -D_FFR_REJECT_NUL_BYTE";
 #
 # version specific setup
 if test "$sm_version_major" = "8.17"; then
diff -Nru sendmail-8.17.1.9/debian/NEWS.Debian sendmail-8.17.1.9/debian/NEWS.Debian
--- sendmail-8.17.1.9/debian/NEWS.Debian	1970-01-01 00:00:00.0 +
+++ sendmail-8.17.1.9/debian/NEWS.Debian	2024-05-13 18:44:56.0 +
@@ -0,0 +1,19 @@
+sendmail (8.17.1.9-2+deb12u1) bookworm-security; urgency=medium
+
+  Sendmail was affected by SMTP smurgling (CVE-2023-51765).
+  Remote attackers can use a published exploitation technique
+  to inject e-mail messages with a spoofed MAIL FROM address,
+  allowing bypass of an SPF protection mechanism.
+  This occurs because sendmail supports some combinaison of
+  .
+  .
+  This particular injection vulnerability has been closed,
+  unfortunatly full closure need to reject mail that
+  contain NUL.
+  .
+  This is slighly non conformant with RFC and could
+  be opt-out by setting confREJECT_NUL to 'false'
+  in sendmail.mc file.
+
+ -- Bastien Roucari??s   Sun, 12 May 2024 19:38:09 +
+
diff -Nru sendmail-8.17.1.9/debian/patches/0024-CVE-2023-51765.patch sendmail-8.17.1.9/debian/patches/0024-CVE-2023-51765.patch

Bug#1071417: bullseye-pu: package fossil/2.15.2-1+deb11u1

2024-05-18 Thread Bastien Roucariès
Package: release.debian.org
Severity: normal
Tags: bullseye
X-Debbugs-Cc: fos...@packages.debian.org
Control: affects -1 + src:fossil
User: release.debian@packages.debian.org
Usertags: pu

this bug was opened by previous arrangement with maintainer.

[ Reason ]
fossil is affected by a regression due to a security update of apache
CVE-2024-24795. Backport was choosen
because upstream does not document all commit needed for fixing the regression.

[ Impact ]
Fossil is broken at least server part

[ Tests ]
Full upstream test suite

[ Risks ]
Broken fossil

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
Cherry picked and backport fix

[ Other info ]
None
diff -Nru fossil-2.15.2/debian/changelog fossil-2.15.2/debian/changelog
--- fossil-2.15.2/debian/changelog	2021-06-15 09:55:20.0 +
+++ fossil-2.15.2/debian/changelog	2024-05-14 21:29:39.0 +
@@ -1,3 +1,13 @@
+fossil (1:2.15.2-1+deb11u1) bullseye; urgency=medium
+
+  * Non maintainer fix with acknowlegment by maintainer.
+  * Cherry-pick fix f4ffefe708793b03 for CVE-2024-24795 and add
+"Breaks: apache2 (<< 2.4.59-1~)" to stage fix; see
+https://bz.apache.org/bugzilla/show_bug.cgi?id=68905
+(closes: #1070069)
+
+ -- Bastien Roucari??s   Tue, 14 May 2024 21:29:39 +
+
 fossil (1:2.15.2-1) unstable; urgency=high
 
   * New upstream version, announcement (expurgated) says:
diff -Nru fossil-2.15.2/debian/control fossil-2.15.2/debian/control
--- fossil-2.15.2/debian/control	2021-04-07 08:12:51.0 +
+++ fossil-2.15.2/debian/control	2024-05-14 21:29:39.0 +
@@ -22,6 +22,7 @@
 Architecture: any
 Multi-Arch: foreign
 Depends: libtcl8.6 | libtcl, ${misc:Depends}, ${shlibs:Depends}
+Breaks: apache2 (<< 2.4.59-1~), apache2-bin (<< 2.4.59-1~)
 Suggests: gnupg | gnupg2
 Description: DSCM with built-in wiki, http interface and server, tickets database
  Fossil is an easy-to-use Distributed Source Control Management system
diff -Nru fossil-2.15.2/debian/patches/0002-Deal-with-the-missing-Content-Length-field.patch fossil-2.15.2/debian/patches/0002-Deal-with-the-missing-Content-Length-field.patch
--- fossil-2.15.2/debian/patches/0002-Deal-with-the-missing-Content-Length-field.patch	1970-01-01 00:00:00.0 +
+++ fossil-2.15.2/debian/patches/0002-Deal-with-the-missing-Content-Length-field.patch	2024-05-14 21:29:39.0 +
@@ -0,0 +1,361 @@
+From: =?utf-8?q?Bastien_Roucari=C3=A8s?= 
+Date: Tue, 14 May 2024 21:23:16 +
+Subject: Deal with the missing Content-Length field
+
+fix regression of CVE-2024-24795
+
+bug: https://bz.apache.org/bugzilla/show_bug.cgi?id=68905
+origin: https://fossil-scm.org/home/vpatch?from=9c40ddbcd182f264=a8e33fb161f45b65
+---
+ src/cgi.c   | 43 -
+ src/clone.c | 14 +++-
+ src/http.c  | 71 +
+ src/main.c  | 14 ++--
+ src/xfer.c  |  1 +
+ 5 files changed, 121 insertions(+), 22 deletions(-)
+
+diff --git a/src/cgi.c b/src/cgi.c
+index d47575b..aade0fb 100644
+--- a/src/cgi.c
 b/src/cgi.c
+@@ -1034,7 +1034,7 @@ void cgi_trace(const char *z){
+ }
+ 
+ /* Forward declaration */
+-static NORETURN void malformed_request(const char *zMsg);
++static NORETURN void malformed_request(const char *zMsg, ...);
+ 
+ /*
+ ** Initialize the query parameter database.  Information is pulled from
+@@ -1080,6 +1080,7 @@ void cgi_init(void){
+   const char *zRequestUri = cgi_parameter("REQUEST_URI",0);
+   const char *zScriptName = cgi_parameter("SCRIPT_NAME",0);
+   const char *zPathInfo = cgi_parameter("PATH_INFO",0);
++  const char *zContentLength = 0;
+ #ifdef _WIN32
+   const char *zServerSoftware = cgi_parameter("SERVER_SOFTWARE",0);
+ #endif
+@@ -1186,7 +1187,15 @@ void cgi_init(void){
+ g.zIpAddr = fossil_strdup(z);
+   }
+ 
+-  len = atoi(PD("CONTENT_LENGTH", "0"));
++  zContentLength = P("CONTENT_LENGTH");
++  if( zContentLength==0 ){
++len = 0;
++if( sqlite3_stricmp(PD("REQUEST_METHOD",""),"POST")==0 ){
++  malformed_request("missing CONTENT_LENGTH on a POST method");
++}
++  }else{
++len = atoi(zContentLength);
++  }
+   zType = P("CONTENT_TYPE");
+   zSemi = zType ? strchr(zType, ';') : 0;
+   if( zSemi ){
+@@ -1593,11 +1602,22 @@ void cgi_vprintf(const char *zFormat, va_list ap){
+ /*
+ ** Send a reply indicating that the HTTP request was malformed
+ */
+-static NORETURN void malformed_request(const char *zMsg){
+-  cgi_set_status(501, "Not Implemented");
+-  cgi_printf(
+-"Bad Request: %s\n", zMsg
+-  );
++static NORETURN void malformed_request(const char *zMsg, ...){
++  va_list ap;
++  char *z;
++  va_start(ap, zMsg);
++  z = vmprintf(zMsg, ap);
++  va_end(ap);
++  cgi_set_status(400, "Bad Request");
++  zContentType = "text/plain";
++  if( 

Bug#1070998: bookworm-pu: package fossil/2.24-5~deb11u1

2024-05-12 Thread Bastien Roucariès
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: fos...@packages.debian.org
Control: affects -1 + src:fossil
User: release.debian@packages.debian.org
Usertags: pu

this bug was opened by previous arrangement with maintainer.

[ Reason ]
fossil is affected by a regression due to a security update of apache
CVE-2024-24795. Backport was choosen
because upstream does not document all commit needed for fixing the regression.

[ Impact ]
Fossil is broken at least server part

[ Tests ]
Full upstream test suite

[ Risks ]
Broken fossil

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
Backport from sid. They are no incompatibility and this is upstream maintenance
and fix only version.

[ Other info ]
I have not attached the debdiff due to the fix beeing a backport from sid. 
Attached debdiff to sid instead
diff -Nru fossil-2.24/debian/changelog fossil-2.24/debian/changelog
--- fossil-2.24/debian/changelog	2024-04-30 14:32:05.0 +
+++ fossil-2.24/debian/changelog	2024-05-07 19:26:27.0 +
@@ -1,3 +1,10 @@
+fossil (1:2.24-6~deb12u1) bookworm; urgency=medium
+
+  * Non maintainer upload with acknowledgement by maintainer
+  * Backport to bookworm
+
+ -- Bastien Roucari??s   Tue, 07 May 2024 19:26:27 +
+
 fossil (1:2.24-6) unstable; urgency=medium
 
   * Add "Breaks: apache2-bin (<< 2.4.59-1~)" per #1070069 discussion.


signature.asc
Description: This is a digitally signed message part.


Bug#1070190: sendmail-bin: CVE-2023-51765 SMTP smuggling with NUL followup

2024-05-09 Thread Bastien Roucariès
Le samedi 4 mai 2024, 12:40:25 UTC Andreas Beckmann a écrit :
> On 04/05/2024 13.02, Andreas Beckmann wrote:
> >> I have patched sendmail in order to enable O RejectNUL=True directive,
> >> but I do not achieved the fact to enable it by default.
> 
> >> Andreas could you get a glimpse at how to render  RejectNUL a default ?
> 
> Second attempt. Completely untested. This should work for both fresh 
> installations and upgrades (as long as *.cf gets regenerated).
> 
> Could you try that? And especially that the opt-out instructions are 
> working?
> 
> Short explanation of the changes:
> - Patch upstream proto.m4 to unconditionally emit 'O RejectNUL' with a
>default of 'false'. As long as confREJECT_NUL is not defined (also the
>default), this will be commented, so safe if built without
>_FFR_REJECT_NUL_BYTE
> - In debian.m4 define confREJECT_NUL to 'true' if sendmail was built
>with _FFR_REJECT_NUL_BYTE, so it is enabled by default on Debian
> - If sendmail.mc undefines confREJECT_NUL (or defines it to 'false'),
>RejectNUL will be disabled again.
> 
> If that works on sid, it should be trivially backportable to 
> (old)*stable. There should be NEWS about that change.

Test validated and pushed to git.

Lack only the NEWS entry.

Due to the complexity of this issue, as an outsider due you have an idea how to 
explain to a simple user.

Bastien
> 
> Andreas
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1070069: fossil: CVE-2024-24795 unreleated breakage

2024-05-06 Thread Bastien Roucariès
Le lundi 29 avril 2024, 18:40:39 UTC Barak A. Pearlmutter a écrit :
> Bastien,
> 
> Okay, got it. Thanks for letting me know.
> 
> I can cherry-pick that fossil commit, but you know the right magic for
> a versioned apache2 breakage and how to deal with proposed-updates.
> So I think it would make sense for you to do all of this in a
> coordinated fashion?
> If that's okay with you, please feel free to just do a regular upload
> if you want, or an NMU, as you please.
> I will push your changes into the debian fossil branch, unless you'd
> like write access to my fossil packaging repo
>  https://people.debian.org/~bap/fossil.fsl
> which I'd be happy to set up.
> 
> Cheers,
> 
> --Barak.
> 
Thanks for you work, do you think a full backport of fossil is worthwhile for 
stable ?

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1070190: sendmail-bin: CVE-2023-51765 SMTP smuggling with NUL followup

2024-05-01 Thread Bastien Roucariès
Package: sendmail-bin
Severity: important
Tags: security help
Forwarded: https://marc.info/?l=oss-security=171447187004229=2

Dear Maintainer,

CVE-2023-51765 is not fully fixed at least for forwarding bad mail.

We must reject NUL including mail as a stop gap method.

I have patched sendmail in order to enable O RejectNUL=True directive,
but I do not achieved the fact to enable it by default.

It will need a NEWS.debian entry I suppose

Andreas could you get a glimpse at how to render  RejectNUL a default ?

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1070155: bullseye-pu: package wpa/2.9.0-21+deb11u1

2024-04-30 Thread Bastien Roucariès
Package: release.debian.org
Severity: important
Tags: bullseye
X-Debbugs-Cc: w...@packages.debian.org
Control: affects -1 + src:wpa
User: release.debian@packages.debian.org
Usertags: pu
tags: security


[ Reason ]
CVE-2023-52160 security bug

[ Impact ]
security bug is present

[ Tests ]
Test suite run fine

[ Checklist ]
  [ X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [ X] attach debdiff against the package in (old)stable
  [ X] the issue is verified as fixed in unstable

[ Changes ]
The previous PEAP client behavior allowed the server to skip Phase 2
authentication with the expectation that the server was authenticated
during Phase 1 through TLS server certificate validation. Various PEAP
specifications are not exactly clear on what the behavior on this front
is supposed to be and as such, this ended up being more flexible than
the TTLS/FAST/TEAP cases. However, this is not really ideal when
unfortunately common misconfiguration of PEAP is used in deployed
devices where the server trust root (ca_cert) is not configured or the
user has an easy option for allowing this validation step to be skipped.

Change the default PEAP client behavior to be to require Phase 2
authentication to be successfully completed for cases where TLS session
resumption is not used and the client certificate has not been
configured. Those two exceptions are the main cases where a deployed
authentication server might skip Phase 2 and as such, where a more
strict default behavior could result in undesired interoperability
issues. Requiring Phase 2 authentication will end up disabling TLS
session resumption automatically to avoid interoperability issues.

[ Other info ]
Buster is fixed so upgrade reintroduce the CVE

Bastiendiff -Nru wpa-2.9.0/debian/changelog wpa-2.9.0/debian/changelog
--- wpa-2.9.0/debian/changelog	2021-02-25 21:19:14.0 +
+++ wpa-2.9.0/debian/changelog	2024-04-30 22:45:18.0 +
@@ -1,3 +1,19 @@
+wpa (2:2.9.0-21+deb11u1) bullseye; urgency=high
+
+  * Non-maintainer upload on behalf of the Security Team.
+  * Fix CVE-2023-52160 (Closes: #1064061):
+The implementation of PEAP in wpa_supplicant allows
+authentication bypass. For a successful attack,
+wpa_supplicant must be configured to not verify
+the network's TLS certificate during Phase 1
+authentication, and an eap_peap_decrypt vulnerability
+can then be abused to skip Phase 2 authentication.
+The attack vector is sending an EAP-TLV Success packet
+instead of starting Phase 2. This allows an adversary
+to impersonate Enterprise Wi-Fi networks.
+
+ -- Bastien Roucari??s   Tue, 30 Apr 2024 22:45:18 +
+
 wpa (2:2.9.0-21) unstable; urgency=high
 
   * Fix typos in the package descriptions.
diff -Nru wpa-2.9.0/debian/patches/0033-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch wpa-2.9.0/debian/patches/0033-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch
--- wpa-2.9.0/debian/patches/0033-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch	1970-01-01 00:00:00.0 +
+++ wpa-2.9.0/debian/patches/0033-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch	2024-04-30 22:45:18.0 +
@@ -0,0 +1,211 @@
+From: Jouni Malinen 
+Date: Sat, 8 Jul 2023 19:55:32 +0300
+Subject: CVE-2023-52160 PEAP client: Update Phase 2 authentication
+ requirements
+
+The previous PEAP client behavior allowed the server to skip Phase 2
+authentication with the expectation that the server was authenticated
+during Phase 1 through TLS server certificate validation. Various PEAP
+specifications are not exactly clear on what the behavior on this front
+is supposed to be and as such, this ended up being more flexible than
+the TTLS/FAST/TEAP cases. However, this is not really ideal when
+unfortunately common misconfiguration of PEAP is used in deployed
+devices where the server trust root (ca_cert) is not configured or the
+user has an easy option for allowing this validation step to be skipped.
+
+Change the default PEAP client behavior to be to require Phase 2
+authentication to be successfully completed for cases where TLS session
+resumption is not used and the client certificate has not been
+configured. Those two exceptions are the main cases where a deployed
+authentication server might skip Phase 2 and as such, where a more
+strict default behavior could result in undesired interoperability
+issues. Requiring Phase 2 authentication will end up disabling TLS
+session resumption automatically to avoid interoperability issues.
+
+Allow Phase 2 authentication behavior to be configured with a new phase1
+configuration parameter option:
+'phase2_auth' option can be used to control Phase 2 (i.e., within TLS
+tunnel) behavior for PEAP:
+ * 0 = do not require Phase 2 authentication
+ * 1 = require Phase 2 authentication when client certificate
+   (private_key/client_cert) is no used and TLS session resumption was
+   not used 

Bug#1070151: bookworm-pu: package wpa/2:2.10-12

2024-04-30 Thread Bastien Roucariès
Package: release.debian.org
Severity: important
Tags: bookworm
X-Debbugs-Cc: w...@packages.debian.org
Control: affects -1 + src:wpa
User: release.debian@packages.debian.org
Usertags: pu
tags: security


[ Reason ]
CVE-2023-52160 security bug

[ Impact ]
security bug is present

[ Tests ]
Test suite run fine

[ Checklist ]
  [ X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [ X] attach debdiff against the package in (old)stable
  [ X] the issue is verified as fixed in unstable

[ Changes ]
The previous PEAP client behavior allowed the server to skip Phase 2
authentication with the expectation that the server was authenticated
during Phase 1 through TLS server certificate validation. Various PEAP
specifications are not exactly clear on what the behavior on this front
is supposed to be and as such, this ended up being more flexible than
the TTLS/FAST/TEAP cases. However, this is not really ideal when
unfortunately common misconfiguration of PEAP is used in deployed
devices where the server trust root (ca_cert) is not configured or the
user has an easy option for allowing this validation step to be skipped.

Change the default PEAP client behavior to be to require Phase 2
authentication to be successfully completed for cases where TLS session
resumption is not used and the client certificate has not been
configured. Those two exceptions are the main cases where a deployed
authentication server might skip Phase 2 and as such, where a more
strict default behavior could result in undesired interoperability
issues. Requiring Phase 2 authentication will end up disabling TLS
session resumption automatically to avoid interoperability issues.

[ Other info ]
Buster is fixed so upgrade reintroduce the CVE

Bastiendiff -Nru wpa-2.10/debian/changelog wpa-2.10/debian/changelog
--- wpa-2.10/debian/changelog	2023-02-24 13:01:35.0 +
+++ wpa-2.10/debian/changelog	2024-04-30 22:45:18.0 +
@@ -1,3 +1,19 @@
+wpa (2:2.10-12+deb12u1) bookworm; urgency=high
+
+  * Non-maintainer upload on behalf of the Security Team.
+  * Fix CVE-2023-52160 (Closes: #1064061):
+The implementation of PEAP in wpa_supplicant allows
+authentication bypass. For a successful attack,
+wpa_supplicant must be configured to not verify
+the network's TLS certificate during Phase 1
+authentication, and an eap_peap_decrypt vulnerability
+can then be abused to skip Phase 2 authentication.
+The attack vector is sending an EAP-TLV Success packet
+instead of starting Phase 2. This allows an adversary
+to impersonate Enterprise Wi-Fi networks.
+
+ -- Bastien Roucari??s   Tue, 30 Apr 2024 22:45:18 +
+
 wpa (2:2.10-12) unstable; urgency=medium
 
   * Prevent hostapd units from being started if there???s
diff -Nru wpa-2.10/debian/patches/0013-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch wpa-2.10/debian/patches/0013-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch
--- wpa-2.10/debian/patches/0013-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch	1970-01-01 00:00:00.0 +
+++ wpa-2.10/debian/patches/0013-CVE-2023-52160-PEAP-client-Update-Phase-2-authentica.patch	2024-04-30 22:42:02.0 +
@@ -0,0 +1,211 @@
+From: Jouni Malinen 
+Date: Sat, 8 Jul 2023 19:55:32 +0300
+Subject: CVE-2023-52160 PEAP client: Update Phase 2 authentication
+ requirements
+
+The previous PEAP client behavior allowed the server to skip Phase 2
+authentication with the expectation that the server was authenticated
+during Phase 1 through TLS server certificate validation. Various PEAP
+specifications are not exactly clear on what the behavior on this front
+is supposed to be and as such, this ended up being more flexible than
+the TTLS/FAST/TEAP cases. However, this is not really ideal when
+unfortunately common misconfiguration of PEAP is used in deployed
+devices where the server trust root (ca_cert) is not configured or the
+user has an easy option for allowing this validation step to be skipped.
+
+Change the default PEAP client behavior to be to require Phase 2
+authentication to be successfully completed for cases where TLS session
+resumption is not used and the client certificate has not been
+configured. Those two exceptions are the main cases where a deployed
+authentication server might skip Phase 2 and as such, where a more
+strict default behavior could result in undesired interoperability
+issues. Requiring Phase 2 authentication will end up disabling TLS
+session resumption automatically to avoid interoperability issues.
+
+Allow Phase 2 authentication behavior to be configured with a new phase1
+configuration parameter option:
+'phase2_auth' option can be used to control Phase 2 (i.e., within TLS
+tunnel) behavior for PEAP:
+ * 0 = do not require Phase 2 authentication
+ * 1 = require Phase 2 authentication when client certificate
+   (private_key/client_cert) is no used and TLS session resumption was
+   not 

Bug#1070069: fossil: CVE-2024-24795 unreleated breakage

2024-04-30 Thread Bastien Roucariès
Le mardi 30 avril 2024, 14:56:07 UTC Barak A. Pearlmutter a écrit :
> I've uploaded a package with this fixed to unstable, 1:2.24-5, and
> it's been autobuilt and pushed out. Seems to work okay, and can be
> co-installed with apache2/sid.
> 
> Just uploaded 1:2.24-6 that adds Breaks: apach2-bin per your recent message.
> 
> Honestly, I'm not confident in my ability to properly back-port
> security-related patches to old versions of fossil. It's a big
> network-facing program with a large number of moving parts and a
> substantial attack surface, all written in C. It uses its own sqlite3
> copy when the shared library in Debian isn't a high enough version or
> doesn't have the right options enabled (currently Debian sqlite3 is
> compiled without SQLITE_ENABLE_JSON1 so the internal version is used.)
> All this means it would be super easy for me to miss some issue and
> introduce a vulnerability if I try to back-port a security patch,
> > particularly without myself deeply understanding the security issue.
> 
> Stable has 1:2.21-1.
> 
> I just made a debian-bookworm-proposed-updates branch rooted there and
> tried to cherry-pick the fix,
> https://fossil-scm.org/home/info/f4ffefe708793b03 but it does not
> apply cleanly. Obviously I can do it manually though, however there
> have been changes in the neighborhood.
> 
> Also, are you *sure* I shouldn't also be applying
> https://fossil-scm.org/home/info/71919ad1b542832c to the fixed
> versions? Because I'm not! I'd be most comfortable if upstream simply
> made a proper release with this fixed (which I bet they'd do upon
> request), and I uploaded that with the appropriate "Breaks:
> apache2-bin (<<...)", and did the (trivial) backport of that package
> to bookworm and bullseye, with the "breaks:" modified to the
> appropriate version.

I agree with you, may be a fullbackport is better for bookworm see changes here 
(line with * are interesting commit to backport)

Yadd do you have a piece of advice ?

Bastien

2024-04-22

*16:29  
cgi.md: be less specific about the Apache version in which the 
Content-Length change happened because a new forum post reports that it happens 
at least as far back as 2.4.41. ...
2024-04-21

18:51   
Merge the update to zLib-1.3.1. ...
18:46   
Improvements to comments in graph.c. No changes to actual code. ...
*16:20  
Fix parsing of the argument to the "Connection:" header of HTTP reply 
messages to deal with unusual arguments added by Apache mod_cgi. See forum 
thread ca6fc85c80f4704f. ...
*15:37  
Simplify parsing of the Connection: header in HTTP replies. ...
*06:15  
Only accept commas as separators for multiple values in "Connection:" 
HTTP headers, and ignore any white space surrounding (but not embedded into) 
values. The previous method would fall for (fictional) HTTP header values 
containing spaces, like "Connection: don't close", and recognize a value of 
"close". ...
2024-04-20

21:58   
In /chat preview mode, apply the click handlers to pikchrs in the 
preview. ...
*14:42  
Fix parsing of "Connection:" HTTP headers with multiple values. ...
2024-04-19

16:08   
Fix a minor problem in graph layout for timelines that made use of the 
offset-merge-riser enhancement. Problem originally seen on the bottom node of 
/timeline?p=6da255034b30b4b4=47362306a7dd7c6f. ...
*13:11  
More change-log enhancements: More details about the work-around for 
the Apache mod_cgi breakage, and put that work-around first on the change log 
since it seems to be important to people. ...
12:59   
Formatting enhancements to the change log for the upcoming 2.24 
release. ...
2024-04-18

17:14   
Update the built-in SQLite to the latest pre-release of version 3.46.0, 
including the bug fix for the use of VALUES-as-coroutine with an OUTER JOIN. ...
17:00   
Typo fix and add specific Apache version number to the notes about the 
Content-Length change. ...
2024-04-17

17:59   
Change log updates. ...
*15:30  • Edit [18d76fff]: Edit check-in comment. ...
*14:02  
Output a warning if a client sync or clone gets back a keep-alive HTTP 
reply that lacks a content-length header. ...
*13:27  
Only process HTTP replies that lack a Content-Length header if the 
connection is set to be closed. Suggested by 
https://bz.apache.org/bugzilla/show_bug.cgi?id=68905. ...
*13:21  
Update the change log in order to mention the Apache 
mod_cgi/Content-Length fix. ...
*13:14  
Update Apache mod_cgi/Content-Length documentation. ...
*12:58  
Fix the HTTP-reply parser so that it is able to deal with replies that 
lack a Content-Length header field. This resolves the issue reported by forum 
post 12ac403fd29cfc89. Also in this merge: (1) Add the --xverbose option to 
"fossil clone". (2) Improved error messages when web 

Bug#1070069: fossil: CVE-2024-24795 unreleated breakage

2024-04-30 Thread Bastien Roucariès
Le mardi 30 avril 2024, 14:56:07 UTC Barak A. Pearlmutter a écrit :
> currently Debian sqlite3 is
> compiled without SQLITE_ENABLE_JSON1 so the internal version is used.)

On this proble could you cross check ?
>SQLITE_ENABLE_JSON1
>
>This compile-time option is a no-op. Prior to SQLite version 3.38.0 
> (2022-02-22), it was necessary to compile with this option in order to 
> include the JSON SQL functions in the build. However, beginning with SQLite 
> version 3.38.0, those functions are included by default. Use the 
> -DSQLITE_OMIT_JSON option to omit them. 

If so you could drop for bookworm (if release team is ok) and sid this embeded 
code copy

BTW I have just opened a bug and add some comment on embded code copy

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1070126: fossil: Do not use embded sqlite

2024-04-30 Thread Bastien Roucariès
Source: fossil
Severity: important

Dear Maintainer,

> currently Debian sqlite3 is
> compiled without SQLITE_ENABLE_JSON1 so the internal version is used.)

On this proble could you cross check ?
>SQLITE_ENABLE_JSON1
>
>This compile-time option is a no-op. Prior to SQLite version 3.38.0
(2022-02-22), it was necessary to compile with this option in order to include
the JSON SQL functions in the build. However, beginning with SQLite version
3.38.0, those functions are included by default. Use the -DSQLITE_OMIT_JSON
option to omit them.

If so you could drop for bookworm (if release team is ok) and sid this embeded
code copy

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1069063: distro-info: Please support distro-info --alias=trixie -r

2024-04-30 Thread Bastien Roucariès
Le mardi 30 avril 2024, 15:24:11 UTC Benjamin Drung a écrit :
> Hi,
> 
> On Mon, 2024-04-15 at 18:58 +, Bastien Roucariès wrote:
> > Package: distro-info
> > Version: 1.7
> > Severity: minor
> > 
> > Dear Maintainer,
> > 
> > distro-info --alias=trixie -r is misleading it return trixie instead of 
> > 13...
> > 
> > Maybe a feature but should be documented
> > 
> > I workarround by doing in my script in two steps:
> > distro-info --$(distro-info --alias=trixie) -r
> 
> --alias was not developed to be combined with -c/-r/-f. So either
> distro-info should reject this parameter combination or change the
> behaviour to what you wanted to do.
> 
> 
Yes that is the bug, with additionnally a documentation bug.

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1070120: postfix: can't send mail due to obsolete /var/spool/postfix/etc/resolv.conf on new network

2024-04-30 Thread Bastien Roucariès
Le mardi 30 avril 2024, 14:52:46 UTC Vincent Lefevre a écrit :
Hi,

> Control: tags -1 security
> 
> On 2024-04-30 16:33:14 +0200, Vincent Lefevre wrote:
> > If I try to restart postfix, I get:
> > 
> > postfix/postfix-script: warning: /var/spool/postfix/etc/resolv.conf and 
> > /etc/resolv.conf differ

A solution may be to bind mount ro /etc/resolv.conf to 
/var/spool/postfix/etc/resolv.conf

Bastien
> 
> BTW, note that this is a security issue, because with wifi,
> the DNS server often corresponds to the local router (e.g.
> 10.3.0.1), and it may happen that the obsolete IP address
> may correspond to some random machine on the network, which
> could act as a malicious DNS server.
> 
> > Indeed, /var/spool/postfix/etc/resolv.conf contains obsolete data.
> > 
> > I had to do "cp /etc/resolv.conf /var/spool/postfix/etc/resolv.conf".
> 
> I don't know how the update should be done. I suppose that
> /etc/network/if-up.d/postfix is pointless in case of wifi as
> it says "Called when a new interface comes up", but for wifi,
> this is the same interface, only a new network.
> 
> And I don't understand why restarting postfix did not update
> the file.
> 
> BTW, even ethernet connections may be affected in case of
> network reconfiguration.
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1070069: fossil: CVE-2024-24795 unreleated breakage

2024-04-30 Thread Bastien Roucariès
Le lundi 29 avril 2024, 18:40:39 UTC Barak A. Pearlmutter a écrit :
> Bastien,
> 
> Okay, got it. Thanks for letting me know.
> 
> I can cherry-pick that fossil commit, but you know the right magic for
> a versioned apache2 breakage and how to deal with proposed-updates.
> So I think it would make sense for you to do all of this in a
> coordinated fashion?
> If that's okay with you, please feel free to just do a regular upload
> if you want, or an NMU, as you please.
> I will push your changes into the debian fossil branch, unless you'd
> like write access to my fossil packaging repo
>  https://people.debian.org/~bap/fossil.fsl
> which I'd be happy to set up.

Hi

I give up for fossil patches (i am not fossil fluent)

The bookworm version will need:
- to add the patch
- Breaks against apache2-bin ( 2.4.59-1~)
The bullseye version will need:
- to add the patch
- Breaks against apache2-bin ( 2.4.59-1~)

We have done a full backport of apache due to several bug

BTW I suppose that sid version should for extra safety break against 
apache2-bin ( 2.4.59-1~)  instead of apache2

You should begin and apache2 will follow ASAP

Bastien

For buster I will reprod you when done,
> 
> Cheers,
> 
> --Barak.
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1070069: fossil: CVE-2024-24795 unreleated breakage

2024-04-29 Thread Bastien Roucariès
Le lundi 29 avril 2024, 18:40:39 UTC Barak A. Pearlmutter a écrit :
> Bastien,
> 
> Okay, got it. Thanks for letting me know.
> 
> I can cherry-pick that fossil commit, but you know the right magic for
> a versioned apache2 breakage and how to deal with proposed-updates.
> So I think it would make sense for you to do all of this in a
> coordinated fashion?

Yes except for unstable where you could go without coordination

Fixed apache is 2.4.59-1

So I think a
breaks: apache2 (<<2.4.59-1~) 

is safe on your side (transition will be blocked)

When done I will upload a apache2 version with
breaks: fossil ( << 2.4.59-2~)

I will do the bpu when done with release team

Bastien
> If that's okay with you, please feel free to just do a regular upload
> if you want, or an NMU, as you please.
> I will push your changes into the debian fossil branch, unless you'd
> like write access to my fossil packaging repo
>  https://people.debian.org/~bap/fossil.fsl
> which I'd be happy to set up.


> 
> Cheers,
> 
> --Barak.
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1070069: fossil: CVE-2024-24795 unreleated breakage

2024-04-29 Thread Bastien Roucariès
Package: fossil
Severity: serious
Justification: break unreleated package
affects: apache2

Dear Maintainer,

CVE-2024-24795 is fixed in apache2. However it break fossil

You need to apply https://fossil-scm.org/home/info/f4ffefe708793b03

See bug here:
https://bz.apache.org/bugzilla/show_bug.cgi?id=68905

I can help here and do proposed update

We also need to use breaks relationship in apache2, in order to allow smooth
upgrade

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1061519: shim: CVE-2023-40546 CVE-2023-40547 CVE-2023-40548 CVE-2023-40549 CVE-2023-40550 CVE-2023-40551

2024-04-17 Thread Bastien Roucariès
Le lundi 15 avril 2024, 13:58:19 UTC Steve McIntyre a écrit :
> On Mon, Apr 15, 2024 at 11:33:14AM +0000, Bastien Roucariès wrote:
> >Source: shim
> >Followup-For: Bug #1061519
> >Control: tags -1 + patch
> >
> >Dear Maintainer,
> >
> >Please find a MR here
> >https://salsa.debian.org/efi-team/shim/-/merge_requests/13
> 
> ACK. Thanks for trying to help, but the merge isn't the hard bit here.
> 
> Tthe new upstream is a little problematic and I'm debugging some boot
> failures in my local CI already.

I have backported here 
https://salsa.debian.org/efi-team/shim/-/merge_requests/14

Need test
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1069063: distro-info: Please support distro-info --alias=trixie -r

2024-04-15 Thread Bastien Roucariès
Package: distro-info
Version: 1.7
Severity: minor

Dear Maintainer,

distro-info --alias=trixie -r is misleading it return trixie instead of 13...

Maybe a feature but should be documented

I workarround by doing in my script in two steps:
distro-info --$(distro-info --alias=trixie) -r




Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1069054: shim: install ca for secure boot

2024-04-15 Thread Bastien Roucariès
Source: shim
Severity: minor

Dear Maintainer,

Could you install the ca used for secure boot somewhere in the tree ?

It will help to check by autopkgtest the ca chain

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1061519: shim: CVE-2023-40546 CVE-2023-40547 CVE-2023-40548 CVE-2023-40549 CVE-2023-40550 CVE-2023-40551

2024-04-15 Thread Bastien Roucariès
Source: shim
Followup-For: Bug #1061519
Control: tags -1 + patch

Dear Maintainer,

Please find a MR here
https://salsa.debian.org/efi-team/shim/-/merge_requests/13

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1068940: json-smart: please package the new upstream version

2024-04-13 Thread Bastien Roucariès
Source: json-smart
Version: 2.2-3
Severity: wishlist

Dear Maintainer,

Please package the new upstream version

I do not achieve to get maven compile it

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1068694: bullseye-pu: package json-smart/2.2-2+deb11u1

2024-04-13 Thread Bastien Roucariès
Le samedi 13 avril 2024, 14:01:24 UTC Bastien Roucariès a écrit :
> Le samedi 13 avril 2024, 14:00:00 UTC Moritz Mühlenhoff a écrit :
> Hi,
> 
> > Am Tue, Apr 09, 2024 at 10:01:11AM +0200 schrieb Andreas Beckmann:
> > > Package: release.debian.org
> > > Severity: normal
> > > Tags: bullseye
> > > User: release.debian@packages.debian.org
> > > Usertags: pu
> > > X-Debbugs-Cc: Bastien Roucariès 
> > > Control: affects -1 + src:json-smart
> > > Control: block 1039985 with -1
> > > Control: block 1033474 with -1
> > > 
> > > [ Reason ]
> > > Two CVEs were fixed in buster-lts, but not yet in bullseye or later,
> > > causing version skew on upgrades:
> > 
> > CVE-2023-1370 / #1033474 is unfixed in sid, and being fixed in unstable
> > is a pre condition for a point update.
> > 
> > Bastien, since you fixed it in buster-lts, can you please also take care
> > of addressing unstable?

Done
> 
> 
> Ok will do
> > 
> > Cheers,
> > Moritz
> > 
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1068694: bullseye-pu: package json-smart/2.2-2+deb11u1

2024-04-13 Thread Bastien Roucariès
Le samedi 13 avril 2024, 14:00:00 UTC Moritz Mühlenhoff a écrit :
Hi,

> Am Tue, Apr 09, 2024 at 10:01:11AM +0200 schrieb Andreas Beckmann:
> > Package: release.debian.org
> > Severity: normal
> > Tags: bullseye
> > User: release.debian@packages.debian.org
> > Usertags: pu
> > X-Debbugs-Cc: Bastien Roucariès 
> > Control: affects -1 + src:json-smart
> > Control: block 1039985 with -1
> > Control: block 1033474 with -1
> > 
> > [ Reason ]
> > Two CVEs were fixed in buster-lts, but not yet in bullseye or later,
> > causing version skew on upgrades:
> 
> CVE-2023-1370 / #1033474 is unfixed in sid, and being fixed in unstable
> is a pre condition for a point update.
> 
> Bastien, since you fixed it in buster-lts, can you please also take care
> of addressing unstable?


Ok will do
> 
> Cheers,
> Moritz
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1068888: bookworm-pu: package zookeeper/3.8.0-11+deb12u2

2024-04-12 Thread Bastien Roucariès
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: zookee...@packages.debian.org
Control: affects -1 + src:zookeeper
User: release.debian@packages.debian.org
Usertags: pu


[ Reason ]
CVE-2024-23944 (Closes: #1066947):
An information disclosure in persistent watchers handling was found in
Apache ZooKeeper due to missing ACL check.  It allows an attacker to
monitor child znodes by attaching a persistent watcher (addWatch
command) to a parent which the attacker has already access
to. ZooKeeper server doesn't do ACL check when the persistent watcher
is triggered and as a consequence, the full path of znodes that a
watch event gets triggered upon is exposed to the owner of the
watcher. It's important to note that only the path is exposed by this
vulnerability, not the data of znode, but since znode path can contain
sensitive information like user name or login ID, this issue is
potentially critical.

[ Impact ]
CVE-2024-23944 is not fixed

[ Tests ]
Full upstream testsuite run at build time

[ Risks ]
None know

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
See debdiff
diff -Nru zookeeper-3.8.0/debian/changelog zookeeper-3.8.0/debian/changelog
--- zookeeper-3.8.0/debian/changelog	2023-10-29 07:57:11.0 +
+++ zookeeper-3.8.0/debian/changelog	2024-03-25 08:30:56.0 +
@@ -1,3 +1,22 @@
+zookeeper (3.8.0-11+deb12u2) bookworm-security; urgency=medium
+
+  * Team upload
+  * Bug fix: CVE-2024-23944 (Closes: #1066947):
+An information disclosure in persistent watchers handling was found in
+Apache ZooKeeper due to missing ACL check.  It allows an attacker to
+monitor child znodes by attaching a persistent watcher (addWatch
+command) to a parent which the attacker has already access
+to. ZooKeeper server doesn't do ACL check when the persistent watcher
+is triggered and as a consequence, the full path of znodes that a
+watch event gets triggered upon is exposed to the owner of the
+watcher. It's important to note that only the path is exposed by this
+vulnerability, not the data of znode, but since znode path can contain
+sensitive information like user name or login ID, this issue is
+potentially critical.
+  * Add salsa CI
+
+ -- Bastien Roucari??s   Mon, 25 Mar 2024 08:30:56 +
+
 zookeeper (3.8.0-11+deb12u1) bookworm-security; urgency=medium
 
   * Team upload:
diff -Nru zookeeper-3.8.0/debian/patches/0027-CVE-2024-23944-ZOOKEEPER-4799-Refactor-ACL-check-in-.patch zookeeper-3.8.0/debian/patches/0027-CVE-2024-23944-ZOOKEEPER-4799-Refactor-ACL-check-in-.patch
--- zookeeper-3.8.0/debian/patches/0027-CVE-2024-23944-ZOOKEEPER-4799-Refactor-ACL-check-in-.patch	1970-01-01 00:00:00.0 +
+++ zookeeper-3.8.0/debian/patches/0027-CVE-2024-23944-ZOOKEEPER-4799-Refactor-ACL-check-in-.patch	2024-03-25 08:30:56.0 +
@@ -0,0 +1,1223 @@
+From: Andor Molnar 
+Date: Tue, 28 Nov 2023 21:25:00 +0100
+Subject: CVE-2024-23944: ZOOKEEPER-4799: Refactor ACL check in 'addWatch'
+ command
+
+As of today, it is impossible to diagnose which watch events are dropped
+because of ACLs.  Let's centralize, systematize, and log the checks at
+the 'process()' site in the Netty and NIO connections.
+
+(These 'process()' methods contain some duplicated code, and should also
+be refactored at some point.  This series does not change them.)
+
+This patch also adds a substantial number of tests in order to avoid
+unexpected regressions.
+
+Co-authored-by: Patrick Hunt 
+Co-authored-by: Damien Diederen 
+
+origin: https://github.com/apache/zookeeper/commit/65b91d2d9a56157285c2a86b106e67c26520b01d
+bug: https://issues.apache.org/jira/browse/ZOOKEEPER-4799
+bug-debian-security: https://security-tracker.debian.org/tracker/CVE-2024-23944
+---
+ .../apache/zookeeper/server/watch/WatchBench.java  |   6 +-
+ .../java/org/apache/zookeeper/server/DataTree.java |  23 +-
+ .../org/apache/zookeeper/server/DumbWatcher.java   |   4 +-
+ .../org/apache/zookeeper/server/NIOServerCnxn.java |  16 +-
+ .../apache/zookeeper/server/NettyServerCnxn.java   |  17 +-
+ .../org/apache/zookeeper/server/ServerCnxn.java|  10 +-
+ .../org/apache/zookeeper/server/ServerWatcher.java |  29 +
+ .../zookeeper/server/watch/IWatchManager.java  |   7 +-
+ .../zookeeper/server/watch/WatchManager.java   |  15 +-
+ .../server/watch/WatchManagerOptimized.java|  15 +-
+ .../apache/zookeeper/server/MockServerCnxn.java|   4 +-
+ .../zookeeper/server/watch/WatchManagerTest.java   |  14 +-
+ .../zookeeper/test/PersistentWatcherACLTest.java   | 629 +
+ .../zookeeper/test/UnsupportedAddWatcherTest.java  |   9 +-
+ 14 files changed, 763 insertions(+), 35 deletions(-)
+ create mode 100644 

Bug#1064061: CVE-2023-52160

2024-04-12 Thread Bastien Roucariès
control: tags -1 + patch

Hi,

You will find a merge request for fixing CVE-2023-52160

https://salsa.debian.org/debian/wpa/-/merge_requests/15

I can do a NMU if neeeded

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1067130: modernizr: NMU or update to latest upstream 3.12 or 3.13

2024-03-28 Thread Bastien Roucariès
Le jeudi 28 mars 2024, 18:36:54 UTC Fab Stz a écrit :
> To build modernizr an additional source file is required (file.js) this file 
> is added to missing-sources (it comes from the npm package of the same name 
> from npm server or from upstreams repo). It is required by the build script 
> from upstream.
> 
> The patch is only here to use that file. That way there is no need to create 
> a Debian package for it (packaging npm nodes is beyond my knowledge and I'm 
> not really interested in doing that).
> 
> Concerning your other question, I don't understand it. The binary packages 
> only ships the js & min.js, not the build script. The missing sources is 
> required only by the build script iirc.

Thanks, this should be documented in:
- the comment at the begiging of missing-source/file
- the header of patch  see https://dep-team.pages.debian.net/deps/dep3/
> 
> 
> Le 28 mars 2024 19:23:08 GMT+01:00, "Bastien Roucariès"  a 
> écrit :
> >Le jeudi 28 mars 2024, 18:16:09 UTC Fab Stz a écrit :
> >> Hello Bastien,
> >> 
> >> Iirc not so many packages depend on it and none seems to use the files 
> >> that are not shipped anymore in the binary package (the individual 
> >> 'rules').
> >> 
> >> Concerning the build maybe you could look at d/rules on the merge request. 
> >> It uses upstream's build script that builds the complete js.
> >
> >I do not understand:
> >- please document the patch using dep format
> >- explain how the build script do not ship in /usr/share 
> >debian/missingsources
> >
> >bastien
> >> 
> >> Regards
> >> Fab
> >> 
> >> Le 28 mars 2024 18:54:27 GMT+01:00, "Bastien Roucariès"  
> >> a écrit :
> >> >Le jeudi 28 mars 2024, 17:21:48 UTC Fab Stz a écrit :
> >> >> Dear Maintainers,
> >> >> 
> >> >> I'm thinking of doing an NMU for the package by updating it to 
> >> >> 3.13.0-0.1. The 
> >> >> MR is now open since July 2023 and this bug referencing it has been 
> >> >> existing 
> >> >> for about 10 days (in case the MR wouldn't have been noticed).
> >> >> 
> >> >> There is also bug 
> >> >> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001203 
> >> >> which request a newer version since 2021.
> >> >> 
> >> >> BTW, I would require a sponsor to upload the NMU.
> >> >> 
> >> >> Do you have advice or comment on this?*
> >> >
> >> >What is the state of reverse depends ?
> >> >
> >> >How does it build ?
> >> >
> >> >Bastien
> >> >> 
> >> >> Regards
> >> >> Fab
> >> >> 
> >> >>   On Tue, 19 Mar 2024 08:58:23 +0100 Fab Stz  wrote:
> >> >> > Source: modernizr
> >> >> > Version: update
> >> >> > Severity: wishlist
> >> >> > Tags: patch
> >> >> > 
> >> >> > Dear Maintainer,
> >> >> > 
> >> >> > Please update to latest upstream version 3.12 or 3.13
> >> >> > 
> >> >> > For 3.12 I created a merge request on the VCS at
> >> >> > 
> >> >> > https://salsa.debian.org/js-team/modernizr/-/merge_requests/2
> >> >> > 
> >> >> > There is also one for 2.* in
> >> >> > 
> >> >> > https://salsa.debian.org/js-team/modernizr/-/merge_requests/1
> >> >> > 
> >> >> > You just have to choose which you prefer or both one after the other.
> >> >> > 
> >> >> > 
> >> >> > 
> >> >> > -- System Information:
> >> >> > Debian Release: 12.5
> >> >> >   APT prefers stable-updates
> >> >> >   APT policy: (991, 'stable-updates'), (991, 'stable-security'), 
> >> >> > (991, 
> >> >> > 'stable'), (990, 'proposed-updates'), (390, 'oldstable-security'), 
> >> >> > (390, 
> >> >> > 'oldstable'), (389, 'oldstable-updates'), (380, 'oldoldstable'), 
> >> >> > (379, 
> >> >> > 'oldoldstable-updates'), (370, 'oldoldstable'), (95, 'testing'), (94, 
> >> >> > 'unstable'), (93, 'experimental')
> >> >> > Architecture: amd64 (x86_64)
> >> >> > Foreign Architectures: i386
> >> >> > 
> >> >> > Kernel: Linux 6.1.0-18-amd64 (SMP w/4 CPU threads; PREEMPT)
> >> >> > Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, 
> >> >> > TAINT_UNSIGNED_MODULE
> >> >> > Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
> >> >> > LANGUAGE=fr:en_US
> >> >> > Shell: /bin/sh linked to /usr/bin/dash
> >> >> > Init: systemd (via /run/systemd/system)
> >> >> > LSM: AppArmor: enabled
> >> >> > 
> >> >> > 
> >> >> > 
> >> >> > 
> >> >> > 
> >> >> =<3776087.mvXUDI8C0e.ref@debian>
> >> >>  <3776087.mvXUDI8C0e@debian>
> >> >> 
> >> >> 
> >> >> 
> >> >
> >> 
> >
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1067130: modernizr: NMU or update to latest upstream 3.12 or 3.13

2024-03-28 Thread Bastien Roucariès
Le jeudi 28 mars 2024, 18:16:09 UTC Fab Stz a écrit :
> Hello Bastien,
> 
> Iirc not so many packages depend on it and none seems to use the files that 
> are not shipped anymore in the binary package (the individual 'rules').
> 
> Concerning the build maybe you could look at d/rules on the merge request. It 
> uses upstream's build script that builds the complete js.

I do not understand:
- please document the patch using dep format
- explain how the build script do not ship in /usr/share debian/missingsources

bastien
> 
> Regards
> Fab
> 
> Le 28 mars 2024 18:54:27 GMT+01:00, "Bastien Roucariès"  a 
> écrit :
> >Le jeudi 28 mars 2024, 17:21:48 UTC Fab Stz a écrit :
> >> Dear Maintainers,
> >> 
> >> I'm thinking of doing an NMU for the package by updating it to 3.13.0-0.1. 
> >> The 
> >> MR is now open since July 2023 and this bug referencing it has been 
> >> existing 
> >> for about 10 days (in case the MR wouldn't have been noticed).
> >> 
> >> There is also bug 
> >> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001203 
> >> which request a newer version since 2021.
> >> 
> >> BTW, I would require a sponsor to upload the NMU.
> >> 
> >> Do you have advice or comment on this?*
> >
> >What is the state of reverse depends ?
> >
> >How does it build ?
> >
> >Bastien
> >> 
> >> Regards
> >> Fab
> >> 
> >>   On Tue, 19 Mar 2024 08:58:23 +0100 Fab Stz  wrote:
> >> > Source: modernizr
> >> > Version: update
> >> > Severity: wishlist
> >> > Tags: patch
> >> > 
> >> > Dear Maintainer,
> >> > 
> >> > Please update to latest upstream version 3.12 or 3.13
> >> > 
> >> > For 3.12 I created a merge request on the VCS at
> >> > 
> >> > https://salsa.debian.org/js-team/modernizr/-/merge_requests/2
> >> > 
> >> > There is also one for 2.* in
> >> > 
> >> > https://salsa.debian.org/js-team/modernizr/-/merge_requests/1
> >> > 
> >> > You just have to choose which you prefer or both one after the other.
> >> > 
> >> > 
> >> > 
> >> > -- System Information:
> >> > Debian Release: 12.5
> >> >   APT prefers stable-updates
> >> >   APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
> >> > 'stable'), (990, 'proposed-updates'), (390, 'oldstable-security'), (390, 
> >> > 'oldstable'), (389, 'oldstable-updates'), (380, 'oldoldstable'), (379, 
> >> > 'oldoldstable-updates'), (370, 'oldoldstable'), (95, 'testing'), (94, 
> >> > 'unstable'), (93, 'experimental')
> >> > Architecture: amd64 (x86_64)
> >> > Foreign Architectures: i386
> >> > 
> >> > Kernel: Linux 6.1.0-18-amd64 (SMP w/4 CPU threads; PREEMPT)
> >> > Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
> >> > Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
> >> > LANGUAGE=fr:en_US
> >> > Shell: /bin/sh linked to /usr/bin/dash
> >> > Init: systemd (via /run/systemd/system)
> >> > LSM: AppArmor: enabled
> >> > 
> >> > 
> >> > 
> >> > 
> >> > 
> >> =<3776087.mvXUDI8C0e.ref@debian>
> >>  <3776087.mvXUDI8C0e@debian>
> >> 
> >> 
> >> 
> >
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1067130: modernizr: NMU or update to latest upstream 3.12 or 3.13

2024-03-28 Thread Bastien Roucariès
Le jeudi 28 mars 2024, 17:21:48 UTC Fab Stz a écrit :
> Dear Maintainers,
> 
> I'm thinking of doing an NMU for the package by updating it to 3.13.0-0.1. 
> The 
> MR is now open since July 2023 and this bug referencing it has been existing 
> for about 10 days (in case the MR wouldn't have been noticed).
> 
> There is also bug https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001203 
> which request a newer version since 2021.
> 
> BTW, I would require a sponsor to upload the NMU.
> 
> Do you have advice or comment on this?*

What is the state of reverse depends ?

How does it build ?

Bastien
> 
> Regards
> Fab
> 
>   On Tue, 19 Mar 2024 08:58:23 +0100 Fab Stz  wrote:
> > Source: modernizr
> > Version: update
> > Severity: wishlist
> > Tags: patch
> > 
> > Dear Maintainer,
> > 
> > Please update to latest upstream version 3.12 or 3.13
> > 
> > For 3.12 I created a merge request on the VCS at
> > 
> > https://salsa.debian.org/js-team/modernizr/-/merge_requests/2
> > 
> > There is also one for 2.* in
> > 
> > https://salsa.debian.org/js-team/modernizr/-/merge_requests/1
> > 
> > You just have to choose which you prefer or both one after the other.
> > 
> > 
> > 
> > -- System Information:
> > Debian Release: 12.5
> >   APT prefers stable-updates
> >   APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
> > 'stable'), (990, 'proposed-updates'), (390, 'oldstable-security'), (390, 
> > 'oldstable'), (389, 'oldstable-updates'), (380, 'oldoldstable'), (379, 
> > 'oldoldstable-updates'), (370, 'oldoldstable'), (95, 'testing'), (94, 
> > 'unstable'), (93, 'experimental')
> > Architecture: amd64 (x86_64)
> > Foreign Architectures: i386
> > 
> > Kernel: Linux 6.1.0-18-amd64 (SMP w/4 CPU threads; PREEMPT)
> > Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
> > Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
> > LANGUAGE=fr:en_US
> > Shell: /bin/sh linked to /usr/bin/dash
> > Init: systemd (via /run/systemd/system)
> > LSM: AppArmor: enabled
> > 
> > 
> > 
> > 
> > 
> =<3776087.mvXUDI8C0e.ref@debian>
>  <3776087.mvXUDI8C0e@debian>
> 
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1067020: jupyterlab: please use node-get-intrinsic

2024-03-16 Thread Bastien Roucariès
Source: jupyterlab
Version: 4.0.11+ds1-1
Severity: important

Dear Maintainer,

Your package include files included elsewhere:
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/.eslintrc
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/.github/FUNDING.yml
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/.nycrc
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/CHANGELOG.md
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/LICENSE
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/README.md
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/index.js
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/package.json
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/get-
intrinsic/test/GetIntrinsic.js


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.6.15-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1067019: jupyterlab: use pacckaged node-call-bind (provided package)

2024-03-16 Thread Bastien Roucariès
Source: jupyterlab
Version: 4.0.11+ds1-1
Severity: important

Dear Maintainer,

node-call-bind provided virtual package provides these files
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/.eslintignore
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/.eslintrc
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/.github/FUNDING.yml
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/.nycrc
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/CHANGELOG.md
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/LICENSE
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/README.md
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/callBound.js
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/index.js
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/package.json
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/test/callBound.js
python3-jupyterlab: /usr/share/jupyter/lab/staging/node_modules/call-
bind/test/index.js


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.6.15-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1067017: jupyterlab: Use node-long package

2024-03-16 Thread Bastien Roucariès
Source: jupyterlab
Version: 4.0.11+ds1-1
Severity: serious
Justification: duplicate code source not build from source

Dear Maintainer,

Your package include the following file packaged elsewhere
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/LICENSE
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/README.md
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/dist/long.js
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/dist/long.js.map
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/index.d.ts
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/index.js
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/package.json
python3-jupyterlab:
/usr/share/jupyter/lab/staging/node_modules/@xtuc/long/src/long.js


Moreover, it was hard for debian to get this files builded and @xtuc ones does
not build from source

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.6.15-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1063508: ITP: node-long -- Class for representing 64-bit two's-complement integer value

2024-02-18 Thread Bastien Roucariès
control: tags -1 + pending

Uploaded waiting ftpmaster
Le vendredi 9 février 2024, 03:39:41 UTC Marco Trevisan a écrit :
> Package: wnpp
> Severity: wishlist
> Owner: Marco Trevisan (Treviño) 
> X-Debbugs-CC: debian-de...@lists.debian.org
> 
> * Package name: node-long
>   Version : 5.2.3
>   Upstream Author : Daniel Wirtz 
> * URL : https://github.com/dcodeIO/long.js#readme
> * License : Apache-2.0
>   Programming Lang: JavaScript
>   Description : Class for representing 64-bit two's-complement
> integer value
> 
>  A Long class for representing a 64 bit two's-complement integer value
>  derived from the Closure Library for stand-alone use and extended with
>  unsigned support.
>  .
>  This is a class used by various modules that does not use newer bigint.
>  .
>  Node.js is an event-based server-side JavaScript engine.
> 
> This is a tiny module that is needed for protobufjs (bug #977564),
> although being widely used according to npm stats, I feel it's better to
> package it as standalone and not as grouped package.
> 
> Salsa repository is at:
>  https://salsa.debian.org/3v1n0-guest/node-esm2umd/-/tree/debian/latest
> 
> Please mark the debian/latest as default branch since I can't change it 
> myself.
> 
> The package had a dependency on a very tiny project (esm2umd) that was
> just basically a tiny wrapper to babel. I've also prepared the packaging
> for it [1], but given that such project has not a clear license (I
> mailed the maintainer meanwhile), I preferred to avoid using it, also
> because it's really just a script using babel and I have been able to
> easily re-implement it, making the build process slightly bigger
> 
> The package needs sponsor, since I'm only a maintainer, but I'll be
> happy keeping the maintenance of it.
> 
> I've given access to the js salsa team.
> 
> [1] https://salsa.debian.org/3v1n0-guest/node-esm2umd/
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1019980: lintian: source-is-missing check for HTML is much too sensitive

2024-02-08 Thread Bastien Roucariès
Le jeudi 8 février 2024, 19:57:22 UTC Bill Allombert a écrit :
> On Thu, Feb 08, 2024 at 06:39:18PM +0000, Bastien Roucariès wrote:
> > Le jeudi 8 février 2024, 18:31:28 UTC Santiago Ruano Rincón a écrit :
> > > On Sat, 14 Oct 2023 20:23:18 +0200 Bill Allombert  
> > > wrote:
> > > > On Sun, Sep 18, 2022 at 12:14:07AM +0100, Colin Watson wrote:
> > > > > Package: lintian
> > > > > Version: 2.115.3
> > > > > Severity: normal
> > > > > 
> > > > > Lintian issues these errors for putty 0.77-1:
> > > > > 
> > > > >   E: putty source: source-is-missing [doc/html/AppendixA.html]
> > > > >   E: putty source: source-is-missing [doc/html/AppendixB.html]
> > > > >   E: putty source: source-is-missing [doc/html/AppendixE.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter10.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter2.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter3.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter4.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter5.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter7.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter8.html]
> > > > >   E: putty source: source-is-missing [doc/html/Chapter9.html]
> > > > >   E: putty source: source-is-missing [doc/html/IndexPage.html]
> > > > > 
> > > > > This is pretty oversensitive.  Firstly, it's HTML, which is still 
> > > > > often
> > > > > enough written by hand anyway.  As it happens, these particular HTML
> > > > > files are generated from halibut input that's also provided in the
> > > > > source package, though I can't see how Lintian could possibly expect 
> > > > > to
> > > > > know that.
> > 
> > Are you sure it is not embdeded base64 encoded png or minified javascript* ?
> > 
> > If not we could try to know why it choke ?  
> > 
> > In this particular case, it is the source package that choke. If halibut 
> > include the name of the source
> > in the html we could magically remove the source is missing warnings.
> > 
> > Another alternative if we could determine the file was compiled by halibut, 
> > we could demote to pedantic warning 
> > and ask to repack in order to be sure to recompile from source.
> 
> There are far too many different HTML generators out there to handle.

We have done this for doxyen and sphinx, so maybe not for more
> You would need to define a standard way to indicate the path to the source in
> the generated file.
> But some generator authors might consider this is an inacceptable data leak, 
> so
> this would only be done if some environment variable is defined.
for doxygen or sphinx we only detect some string in html file and whitelist

Generared by something will work

Moreover adding missing-source override like could be done be done by adding 
manualy a symlink debian/missing-sources/  fullname pointing to the righ 
location.

We also magically search know source by using some heurtistic in 
SourceMissing.pm

So the basic framework is here, we only need to add more rules

Bastien


> 
> In the short term, I suggest to disable it since there is no policy 
> requirement
> for the source code to be in a particular path, so it is not an error.
> 
> At the very least, it should not be generated more than once per package.
> 
> Cheers,
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1019980: lintian: source-is-missing check for HTML is much too sensitive

2024-02-08 Thread Bastien Roucariès
Le jeudi 8 février 2024, 18:31:28 UTC Santiago Ruano Rincón a écrit :
> On Sat, 14 Oct 2023 20:23:18 +0200 Bill Allombert  wrote:
> > On Sun, Sep 18, 2022 at 12:14:07AM +0100, Colin Watson wrote:
> > > Package: lintian
> > > Version: 2.115.3
> > > Severity: normal
> > > 
> > > Lintian issues these errors for putty 0.77-1:
> > > 
> > >   E: putty source: source-is-missing [doc/html/AppendixA.html]
> > >   E: putty source: source-is-missing [doc/html/AppendixB.html]
> > >   E: putty source: source-is-missing [doc/html/AppendixE.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter10.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter2.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter3.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter4.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter5.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter7.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter8.html]
> > >   E: putty source: source-is-missing [doc/html/Chapter9.html]
> > >   E: putty source: source-is-missing [doc/html/IndexPage.html]
> > > 
> > > This is pretty oversensitive.  Firstly, it's HTML, which is still often
> > > enough written by hand anyway.  As it happens, these particular HTML
> > > files are generated from halibut input that's also provided in the
> > > source package, though I can't see how Lintian could possibly expect to
> > > know that.

Are you sure it is not embdeded base64 encoded png or minified javascript* ?

If not we could try to know why it choke ?  

In this particular case, it is the source package that choke. If halibut 
include the name of the source
in the html we could magically remove the source is missing warnings.

Another alternative if we could determine the file was compiled by halibut, we 
could demote to pedantic warning 
and ask to repack in order to be sure to recompile from source.

Thanks
> > 
> > Dear Lintian maintainers,
> > 
> > This test is causing hundreds of false positive and should be disabled as
> > soon as possible. This is a huge waste of time for everybody.
> > 
> > If you need help with that, please tell me, I have worked on lintian in the 
> > past.
> 
> Dear Lintian maintainers,
> 
> I cannot offer the same help as ballombe, but I also find it would help
> to disable these errors. At least, could they be "demoted" to warnings?


> Thanks in advance,
> 
> Santiago
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1012289: RFH: lintian -- Debian package checker

2024-02-05 Thread Bastien Roucariès
Le lundi 5 février 2024, 12:42:04 UTC Bill Allombert a écrit :
> On Mon, Feb 05, 2024 at 12:28:02PM +0100, Axel Beckert wrote:
> > Hi Bill,
> > 
> > Bill Allombert wrote:
> > > By the way, what happened to lintian.debian.org ?
> > 
> > Seems as if someone (not me, just noticed it today when
> > "private/refresh-data" failed…) pulled the plug on at least the DNS
> > name. Probably because it hasn't been updated since Felix' try to
> > rewrite it, which AFAIK was never finished, but the old thing also no
> > more worked. (There's probably a lot of legacy code in
> > "lib/Lintian/Output" related to one of these two website generations,
> > maybe even both.)
> 
> I used to generate my own copy of it because the official one was
> out of date. 

Help here is welcome. I really like the l.d.o site particularly the graph
> 
> > IMHO it's generally a good thing, except that it would have been
> > better to redirect it to the according UDD pages instead.
> 
> Yes, because there are ton of places still linking to lintian.debian.org
> (e.g. wikipedia). We should ask DSA to redirect to salsa or UDD.
> 
> Cheers,
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1012289: RFH: lintian -- Debian package checker

2024-02-04 Thread Bastien Roucariès
Le dimanche 4 février 2024, 14:02:58 UTC Bill Allombert a écrit :
> On Tue, Aug 16, 2022 at 11:56:20AM +0000, Bastien Roucariès wrote:
> > Source: lintian
> > Version: 2.115.2
> > Followup-For: Bug #1012289
> > 
> > Dear Maintainer,
> > 
> > I will restep to be a lintian maint.Could you please prepare a list of 
> > urgent
> > action ?
> 
> Areyou still available as lintian maintainer ? It sure would need an upload.
I can

I am doing some pull request update

Bastien

> 
> Cheers,
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1060103: transition: imagemagick7

2024-02-02 Thread Bastien Roucariès
Le vendredi 2 février 2024, 16:53:10 UTC Sebastian Ramacher a écrit :
> Control: tags -1 moreinfo
> 
> Hi Bastien
> 
> On 2024-01-05 22:35:44 +, Bastien Roucariès wrote:
> > Package: release.debian.org
> > Severity: important
> > User: release.debian@packages.debian.org
> > Usertags: transition
> > X-Debbugs-CC: ftpmas...@debian.org
> > 
> > Imagemagick will need a new major bump
> > 
> > I achieved to get imagemagick 7 build for experimental (it is only on salsa 
> > not
> > uploaded yet).
> > 
> > Every package include a version in the package name (except legacy package 
> > name
> > and perl*) so I plan to do some step by step migration, because it is mainly
> > coinstallable with imagemagick 6.
> 
> Why does this migration require co-instabillity with the old version?
> This makes the transition overly complicated. Do you expect major
> changes required in reverse dependencies of imagemagick's shared
> library?

The problem is not the library but the command line interface that may need 
change.

Librarry will break (I think here about php module that will need a update), 
but it is treatable.

convert6 is not fully compatible with convert7

convert6 will be co installable with convert7 in order to test, and convert 
will be provided by alternative system.

We avoid a flag day, but we need co installable library.

Bastien

> 
> PS: Before the time_t transition is done, we will not process other
> transitions.

Not a problem, but I will like to upload work on experimental in order to test 
other arch than i386/amd64/arm that I could test

Bastien

> 
> Cheers
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1060103: Remainder of imagemagick7 transition plan

2024-02-02 Thread Bastien Roucariès
Hi,

A gentle remainder about imagemagick7 transition plan.

Many thanks for santiago to review partially it, but I need green light from 
release team.

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1062428: tinyxml: Swith to maintained fork

2024-02-01 Thread Bastien Roucariès
Source: tinyxml
Version: 2.6.2-6;1
Severity: important
Tags: security
Justification: security support
X-Debbugs-Cc: Debian Security Team 

Dear Maintainer,

It seems that a fork of tinyxml is well maintained here
https://github.com/leethomason/tinyxml2

Could be possible to evaluate the switch of fork ?

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.5.0-5-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1061272: sudo: Does not build from prefered source

2024-01-21 Thread Bastien Roucariès
Source: sudo
Severity: serious
Tags: ftbfs
Justification: yacc/lex are prefered source

Dear Maintainer,

You do not pass the --with-devel=yes configure flags thus you do not rebuild
from source autogenerated file like gram.c and gram.h from gram.y

Usually debian build from source grammar file particularly for sensitive
security components like sudo

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.5.0-5-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-- no debconf information



Bug#1059315: tinyxml: CVE-2023-34194 CVE-2023-40462 CVE-2023-40458

2024-01-14 Thread Bastien Roucariès
On Sun, 31 Dec 2023 07:14:26 +0100 Salvatore Bonaccorso  
wrote:
Hi Guilhem, hi Moritz,
> Hi Guilhem, hi Moritz,
> 
> On Sat, Dec 30, 2023 at 11:26:02PM +0100, Guilhem Moulin wrote:
> > On Sat, 30 Dec 2023 at 21:02:16 +0100, Felix Geyer wrote:
> > > There are some minor changes staged in the salsa git repo. It would be 
> > > good
> > > to include them as well. Feel free to push the patch to git and upload.
> > > Alternatively a merge request works as well of course.
> > 
> > Thanks for the fast response!  Tagged and uploaded.
> > 
> > Security team, if you agree with my assessment that CVE-2023-40462 is a
> > duplicate of CVE-2023-34194 (but for a separate project that embeds
> > libxml) and that CVE-2023-40458 is a duplicate of CVE-2021-42260 (but
> > for a separate project that embeds libxml), I can propose debdiffs for
> > bullseye and bookworm.
> 
> I think the former is correct but still bit biased. We initially had
> exactly CVE-2023-40462 as NFU and CVE-2023-34194 for tinyxml. I have
> now commmited
> https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e507c932b999df48f808969c00f07a638e3357b
> hich does match my understanding for this doubled CVE assignment. The
> document is actually not very very clear. It still metnions
> CVE-2023-40462 but does not consistently say "TinyXML as used in".
> Still hope we can agree the above matches our all udnerstanding.
> Moritz given you updated back then the entry from NFU and tinyxml, if
> you still strongly disagree I will revert the above, but I tried to
> explain my reasoning in the commit message.
> 
> Now for CVE-2023-40458 I'm  not sure. Looking back at the references
> for CVE-2021-42260 and the issue report at
> https://sourceforge.net/p/tinyxml/bugs/141/ this sensibly match the
> description for CVE-2023-40458, but will want to see if Moritz has an
> additional input here.
> 
> If this is the case we either have the otpion to mark it really as
> duplicate (and request a reject from MITRE) or it is again just a
> ALEOS issue "... tinyxml as used in". Again the table here is not very
> clear in the report, for the CVE-2023-34194 and CVE-2023-40462 there
> were explicitly listed the two CVEs with brackeds including the
> product in the the table, but this is not the case for CVE-2023-40458.
> 
> Moritz?

Any news of this triagging ?

Bastien
> 
> Regards,
> Salvatore
> 
> 


signature.asc
Description: This is a digitally signed message part.


Bug#1060103: transition: imagemagick7

2024-01-05 Thread Bastien Roucariès
Package: release.debian.org
Severity: important
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-CC: ftpmas...@debian.org

Imagemagick will need a new major bump

I achieved to get imagemagick 7 build for experimental (it is only on salsa not
uploaded yet).

Every package include a version in the package name (except legacy package name
and perl*) so I plan to do some step by step migration, because it is mainly
coinstallable with imagemagick 6.
- upload to experimental a version with perl and without legacy name
- migrate perl and versioned package
- add to experimental libmakickgwand-dev libmagick++-dev  libmagickcore-dev
- migrate package that depends on libmakickgwand-dev libmagick++-dev
libmagickcore-dev (every thing that build against imagemagick) to imagemagick7
- add to experimental imagemagick package
- migrate imagemagick package to unstable

What do you think of this plan ? From a security point of view it is better to
go to imagemagick7 (so important severity)

I expect breakage only on the last step. See
https://imagemagick.org/script/porting.php

ftpmaster it need more work because it will need three manual step.

Bastien

*  perlmagick, libmagickcore-dev, libmakickgwand-dev libmagick++-dev,
imagemagick, libimage-magick-perl libimage-magick-q16-perl libimage-
magick-q16hdri-perl


signature.asc
Description: This is a digitally signed message part.


Bug#989998: Fixed upstream: need help ?

2024-01-05 Thread Bastien Roucariès
Hi,

I have just fix this CVE for buster and I want to know if you need help to 
release a fix for unstable ?

The LTS fix are here https://salsa.debian.org/lts-team/packages/keystone/

Thanks

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1037219: Uploaded imagemagick/8:6.9.11.60+dfsg-1.3+deb11u2

2023-12-29 Thread Bastien Roucariès
Hi,

I have just uploaded

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1055300: Reopen + fix

2023-12-17 Thread Bastien Roucariès
control: reopen -1
control: found -1  5.4.0-1
control: forwarded -1 
https://github.com/ansible-collections/amazon.aws/pull/1704
control: tag -1 + fixed-upstream

Hi,

This bug lie in ansible...

Reopen this bug and use the patch as fwd field.

rouca

signature.asc
Description: This is a digitally signed message part.


Bug#975405: libwabt.js => sucess but need policy and help

2023-11-13 Thread Bastien Roucariès
Le lundi 13 novembre 2023, 11:18:42 UTC Markus Koschany a écrit :
> Hey,
> 
> Am Montag, dem 13.11.2023 um 09:19 + schrieb Bastien Roucariès:
> 
> [...]
> > Apo can I add myself to your package ? Do you care to comaintain with
> > javascript team ?
> 
> I assume you are referring to wabt and this bug report [1] ?
> 
> Do you have a solution for the circular dependency that building libwabt.js
> would create?
> 
> In general I would be totally fine if you or the Javascript team would
> completely take over wabt and binaryen because both of them and emscripten are
> closely related. See also #1052003; emscripten FTBFS with binaryen from
> experimental.
> 
> Personally I only need wabt and binaryen to build WebAssembly code from source
> for the ublock-origin Firefox/Chromium addon but I'm not really interested in
> becoming more involved in the Javascript ecosystem. So feel free to take over
> both packages and remove me as the maintainer.

I think the solution here is build profiles like we other package involving 
this kind of stuff.

Ok will take for it and add javascript team
> 
> Regards,
> 
> Markus
> 
> [1] https://bugs.debian.org/975405
>  
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1008017: audiofile: CVE-2022-24599/CVE-2019-13147 Fix

2023-11-12 Thread Bastien Roucariès
Le samedi 11 novembre 2023, 18:22:41 UTC Bastien Roucariès a écrit :
> control: tags -1 + patch
> 
> Hi,
> 
> Could you apply the merge request 
> https://salsa.debian.org/multimedia-team/audiofile/-/merge_requests/5 and 
> made a release ?
> 
> It fix the two CVE
> 
> Bastien
Send fix to DELAYED/7

Thanks

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1008017: audiofile: CVE-2022-24599/CVE-2019-13147 Fix

2023-11-11 Thread Bastien Roucariès
control: tags -1 + patch

Hi,

Could you apply the merge request 
https://salsa.debian.org/multimedia-team/audiofile/-/merge_requests/5 and made 
a release ?

It fix the two CVE

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1041112: Merge request

2023-11-11 Thread Bastien Roucariès
control: tags -1 + pending

I have a merge request waiting here

Plan a NMU/7

https://salsa.debian.org/multimedia-team/sox/-/merge_requests?scope=all=opened

rouca

signature.asc
Description: This is a digitally signed message part.


Bug#1055370: Important for a few package: add security support

2023-11-08 Thread Bastien Roucariès
Hi,

I have one package that fail actually due to this.

A CVE was fixed by coordinating a fix between rmagick and imagemagick and I 
test that the CVE is closed using an autopkgtest

I believe also it is important from a security point of view to add fix for 
security issue

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1055585: ITP: node-envinfo -- Generate reports of the common details used by Node.js packages

2023-11-08 Thread Bastien Roucariès
Package: wnpp
Severity: important
Owner: Bastien Roucariès 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-envinfo
  Version : 7.11.0+~cs13.4.1
  Upstream Contact: https://github.com/tabrindle/envinfo#readme
https://github.com/sindresorhus/os-name/tags
https://github.com/sindresorhus/macos-release/tags
https://github.com/sindresorhus/windows-release/tags
https://registry.npmjs.org/yamlify-object
* URL : https://github.com/tabrindle/envinfo#readme
https://github.com/sindresorhus/os-name/tags
https://github.com/sindresorhus/macos-release/tags
https://github.com/sindresorhus/windows-release/tags
https://registry.npmjs.org/yamlify-object
* License : Expat
  Programming Lang: Typescript/javascript
  Description : Generate reports of the common details used by Node.js
packages

Generate reports of the common details used by Node.js packages
 This package generate reports of common software installed on our computer,
 including browser version, Node.js version, Operating System and programming
 language support.
 .
 This is used by webpack a javascript module bundler, for generating build
 time report.
 .
 Node.js is an event-based server-side JavaScript engine.

This package is needed for rebuild from source webpack that is an essential
package of javascript team


Bug#1055346: dh-nodejs: should provide dh_nodejs_autodocs

2023-11-04 Thread Bastien Roucariès
Package: dh-nodejs
Version: 0.15.15
Severity: important

Dear Maintainer,

dh-nodejs should provide dh-nodejs-autodocs


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.5.0-3-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dh-nodejs depends on:
ii  debhelper 13.11.7
ii  libdebian-copyright-perl  0.2-6
ii  libdebian-source-perl 0.122
ii  libdpkg-perl  1.22.1
ii  libgraph-perl 1:0.9727-1
ii  libipc-run-perl   20231003.0-1
ii  libjson-perl  4.1-1
ii  libyaml-perl  1.30-2
ii  nodejs18.13.0+dfsg1-1
ii  perl  5.36.0-9

dh-nodejs recommends no packages.

Versions of packages dh-nodejs suggests:
ii  node-rollup-plugin-commonjs  25.0.4+ds1-1
ii  node-rollup-plugin-node-resolve  15.1.0+ds-1
ii  pkg-js-tools 0.15.15
ii  rollup   3.28.0-2

-- no debconf information



Bug#1055328: node-minimatch: could not build using webpack

2023-11-04 Thread Bastien Roucariès
Package: node-minimatch
Version: 9.0.3-4
Severity: serious
Justification: FTBFS other package

Dear Maintainer,

I could not build node-envinfo due to the trick done for default export only
for require. Webpack do a mix of two and do not find the import default...

Therefore it is required to export default for both

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1055172: python3 should recommend netbase

2023-11-01 Thread Bastien Roucariès
Package: python3
Version: 3.11.4-5+b1
Severity: important
Tags: newcomer

Dear Maintainer,

I order to avoid some strange error in autopkgtest of python related package,
could be possible to recommend netbase ? It is needed for acessing
/etc/services and well known port/host

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.5.0-2-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages python3 depends on:
ii  libpython3-stdlib  3.11.4-5+b1
ii  python3-minimal3.11.4-5+b1
ii  python3.11 3.11.6-3

python3 recommends no packages.

Versions of packages python3 suggests:
ii  python3-doc   3.11.4-5
ii  python3-tk3.11.5-1
ii  python3-venv  3.11.4-5+b1

-- no debconf information



Bug#1055103: webpack: split env

2023-10-31 Thread Bastien Roucariès
Package: webpack
Version: 5.76.1+dfsg1+~cs17.16.16-1
Severity: important

Dear Maintainer,

I think the way to go is to split env from webpack

env need webpack to build but need a few package


Yadd what do you think ?

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1055053: RM: {imagemagick-doc, imagemagick-common} [all] -- ROM; removed from source package

2023-10-30 Thread Bastien Roucariès
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
X-Debbugs-Cc: imagemag...@packages.debian.org
Control: affects -1 + src:imagemagick


Please remove this two transitionnal package

Thanks

Bastien



Bug#1054444: golang-github-facebook-ent: website is build with Docusaurus not packaged for debian

2023-10-24 Thread Bastien Roucariès
control: retitle -1 golang-github-facebook-ent: include non free font Calibre

Le mardi 24 octobre 2023, 06:13:41 UTC Cyril Brulebois a écrit :
> Hi Bastien,
> 
> Bastien Roucariès  (2023-10-23):
> > Source:  golang-github-facebook-ent
> > Version: 0.5.4-3 
> > Severity: serious
> > Tags: ftbfs
> > Justification: FTBFS
> > Control: block -1 by 1054426
> > 
> > Dear Maintainer,
> > 
> > The documentation is build with docusaurus.
> > 
> > See website directory
> > https://sources.debian.org/src/golang-github-facebook-ent/0.5.4-3/doc/website/
> > 
> > You should repack or package docusaurus and rebuild
> 
> Please describe the actual problem you're seeing.

I have just checked docusaurus build package, but here .js code is readable, 
except the woff file that are build from calibre without source and non-free

https://klim.co.nz/licences/#enterprise
> 
> Cheers,
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1054433: node-puppeteer: website is build with Docusaurus not packaged for debian

2023-10-24 Thread Bastien Roucariès
control:  retitle -1   fasttext: website is build with Docusaurus not packaged 
for debian
Le mardi 24 octobre 2023, 06:41:55 UTC Andrius Merkys a écrit :
> Hi,
> 
> On 2023-10-23 22:06, Bastien Roucariès wrote:
> > Source: fasttext
> 
> Source package names in Subject and Source do not match. Please retitle 
> if this is not intentional.
> 
> Best,
> Andrius
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1054432: [Pkg-javascript-devel] Bug#1054432: node-puppeteer: website is build with Docusaurus not packaged for debian

2023-10-24 Thread Bastien Roucariès
control: retitle -1 node-katex: website is build with Docusaurus not packaged 
for debian
Le mardi 24 octobre 2023, 06:40:59 UTC Andrius Merkys a écrit :
> Hi,
> 
> On 2023-10-23 22:04, Bastien Roucariès wrote:
> > Source:  node-katex
> 
> Source package names in Subject and Source do not match. Please retitle 
> if this is not intentional.
> 
> Best,
> Andrius
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1054444: golang-github-facebook-ent: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  golang-github-facebook-ent
Version: 0.5.4-3 
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/src/golang-github-facebook-ent/0.5.4-3/doc/website/

You should repack or package docusaurus and rebuild

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1054443: node-graphql: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  node-graphql
Version: 16.8.1-1 
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/src/node-graphql/16.8.1-1/website/src/pages/index.jsx/?hl=2#L2

You should repack or package docusaurus and rebuild

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1054440: reassign

2023-10-23 Thread Bastien Roucariès
control: reassign -1 ts-node


signature.asc
Description: This is a digitally signed message part.


Bug#1054441: node-ts-jest: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  node-ts-jest
Version: 29.1.1+~cs0.2.6-2
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/data/main/n/node-ts-jest/29.1.1%2B~cs0.2.6-2/website/

You should repack or package docusaurus and rebuild

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1054440: ts-node: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  ts-nod
Version: 10.9.1+~cs8.8.29-1 
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/src/ts-node/10.9.1%252B~cs8.8.29-1/website/

You should repack or package docusaurus and rebuild

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1054439: node-rjsf: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  node-rjsf
Version: 5.6.2+~5.0.1-1
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/src/node-rjsf/5.6.2+~5.0.1-1/packages/docs/docusaurus.config.js/?hl=54#L54

You should repack or package docusaurus and rebuild

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1054438: golang-entgo-ent: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  golang-entgo-ent
Version: 0.11.3-4
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/data/main/g/golang-entgo-ent/0.11.3-4/doc/website

You should repack or package docusaurus and rebuild

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1054437: golang-ariga-atlas: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  golang-ariga-atlas
Version: 0.7.2-2
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory
https://sources.debian.org/src/golang-ariga-atlas/0.7.2-2/doc/website/

You should repack or package docusaurus and rebuild

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1054435: node-react-redux: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  node-react-redux
Version: 8.1.2+dfsg1+~cs1.2.3-1
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory

You should repack or package docusaurus and rebuild

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1054434: node-redux: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  node-redux
Version: 4.2.1-1
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory

You should repack or package docusaurus and rebuild

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1054433: node-puppeteer: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  fasttext
Version: 0.9.2+ds-5
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See website directory

You should repack or package docusaurus and rebuild

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1054432: node-puppeteer: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source:  node-katex
Version: 0.16.4+~cs6.1.0-1
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See:
https://sources.debian.org/src/node-katex/0.16.4+~cs6.1.0-1/website/

You should repack or package docusaurus and rebuild

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1054431: node-puppeteer: website is build with Docusaurus not packaged for debian

2023-10-23 Thread Bastien Roucariès
Source: node-puppeteer
Version: 13.4.1+dfsg-2
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: block -1 by 1054426

Dear Maintainer,

The documentation is build with docusaurus.

See:
https://sources.debian.org/src/node-puppeteer/13.4.1+dfsg-2/website/

You should repack or package docusaurus and rebuild

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.5.0-2-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1054426: RFP: docusaurus -- Docusaurus is a project for building, deploying, and maintaining open source project websites easily

2023-10-23 Thread Bastien Roucariès
Package: wnpp
Severity: wishlist

* Package name: docusaurus
  Version : 1
  Upstream Contact: Facebook, Inc. and its affiliates. (Facebook, Inc. and its
affiliates.)
* URL : https://github.com/facebook/docusaurus
* License : expat
  Programming Lang: javascript
  Description : Docusaurus is a project for building, deploying, and
maintaining open source project websites easily

Docusaurus is a project for building, deploying, and maintaining open source
project websites easily.

Docusaurus is built in a way so that it can get running in as little time
as possible. We've built Docusaurus to handle the website build process so you
can focus on your project.

Docusaurus ships with localization support via CrowdIn. Empower and grow
your international community by translating your documentation.


While Docusaurus ships with the key pages and sections you need to get
started, including a home page, a docs section, a blog, and additional support
pages, it is also customizable as well to ensure you have a site that is
uniquely yours.

This is needed for:
node-puppeteer
ts-node
thunderbird
netdata
golang-github-facebook-ent
golang-entgo-ent
node-ts-jest
firefox-esr
mkdocs-material
firefox
fasttext
node-react-redux
gitlab
node-redux
node-rjsf
node-jest
node-webassemblyjs
golang-ariga-atlas
node-graphql
node-katex
gitaly



Bug#1054405: RM: libjs-punycode [all] -- NVIU; Provided now by nodejs-punycode

2023-10-23 Thread Bastien Roucariès
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
X-Debbugs-Cc: ruby-rails-assets-punyc...@packages.debian.org
Control: affects -1 + src:ruby-rails-assets-punycode
Control: block 1051089 by -1

Please remove libjs-punycode. It is now provide by nodejs-punycode

Thanks

bastien



Bug#994540: Go ahead with imagemagick/experimental ?

2023-10-22 Thread Bastien Roucariès
Le dimanche 22 octobre 2023, 15:03:50 UTC Sebastian Ramacher a écrit :
> Control: tags -1 confirmed
> 
> On 2023-10-22 14:51:42 +, Bastien Roucariès wrote:
> > Le dimanche 22 octobre 2023, 14:08:20 UTC Sebastian Ramacher a écrit :
> > > Hi Bastien
> > > 
> > > On 2023-10-21 20:10:47 +, Bastien Roucariès wrote:
> > > > Can I go ahead with imagemagick experimental ?
> > > 
> > > As a year has past since the last mail to the transition bug report: did
> > > any new build failures in reverse dependencies appear? What's the
> > > status?
> > 
> > Reverse build are ok (just tested in pbuilder), so for me it is a green 
> > light
> 
> Please go ahead.
Done
> 
> Cheers
> 



signature.asc
Description: This is a digitally signed message part.


Bug#994540: Go ahead with imagemagick/experimental ?

2023-10-22 Thread Bastien Roucariès
Le dimanche 22 octobre 2023, 14:08:20 UTC Sebastian Ramacher a écrit :
> Hi Bastien
> 
> On 2023-10-21 20:10:47 +, Bastien Roucariès wrote:
> > Can I go ahead with imagemagick experimental ?
> 
> As a year has past since the last mail to the transition bug report: did
> any new build failures in reverse dependencies appear? What's the
> status?

Reverse build are ok (just tested in pbuilder), so for me it is a green light
> 
> Cheers
> 



signature.asc
Description: This is a digitally signed message part.


Bug#994540: Go ahead with imagemagick/experimental ?

2023-10-21 Thread Bastien Roucariès
Hi,

Can I go ahead with imagemagick experimental ?

Thanks

Bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1051089: Fwd: Moreinformation

2023-10-21 Thread Bastien Roucariès
control: tags -1 + moreinfo

Hi,

>ruby-rails-assets-punycode depends on libjs-punycode but nothing
>builds that package. It used to be provided by the same source
>package.

I do not understand what break

libjs-punycode is provided by node-punycode

See
https://tracker.debian.org/media/packages/n/node-punycode/control-2.2.3-2

piupart is ok so it is normally ok

Could you restest ?

Bastien
-

signature.asc
Description: This is a digitally signed message part.


Bug#1053243: prometheus-alertmanager: Please package the gui

2023-09-29 Thread Bastien Roucariès
Source: prometheus-alertmanager
Severity: important

Dear Maintainer,

Could you package the GUI.

ELM is now under debian

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.4.0-4-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#941627: Take grub-btrfs

2023-09-27 Thread Bastien Roucariès
control: owner -1 !
Control: retitle -1 ITP: grub-btrfs -- provides grub entries for btrfs 
snapshots (boot environments/restore points)
Hi,

I need this package for day work (for teaching).

The kaisen linux is suitable for me to be imported and sponsored. Kaisen do you 
want some sponsoring and comaintain debian side this package ?

I only need that dracut is supported and tested.

Kaisen could you support dracut ?

Bastien





signature.asc
Description: This is a digitally signed message part.


Bug#991984: closed by Russ Allbery (Re: Bug#991984: Please document minimal environment variable needed for sensible-utils)

2023-09-10 Thread Bastien Roucariès
Le dimanche 10 septembre 2023, 04:33:06 UTC Debian Bug Tracking System a écrit :
> This is an automatic notification regarding your Bug report
> which was filed against the debian-policy package:
> 
> #991984: Please document minimal environment variable needed for 
> sensible-utils
> 
> It has been closed by Russ Allbery .
> 
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact Russ Allbery 
>  by
> replying to this email.
> 
Seems sensible note that linux manpages mandate now some behavior for EDITOR, 
PAGER and VISUAL

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1051474: libreoffice: Please add embeded code copies to embeded-code-copies on security tracker debian.tar.xz/tarballs

2023-09-10 Thread Bastien Roucariès
Le dimanche 10 septembre 2023, 05:44:02 UTC Rene Engelhard a écrit :
> severity 1051474 important
> 
> thanks
> 
> Hi,
> 
> Am 08.09.23 um 19:19 schrieb Bastien Roucariès:
> > Source: libreoffice
> > Severity: serious
> > Tags: security
> > Justification: Document embdeded code copy + copyright
> > X-Debbugs-Cc: Debian Security Team 
> 
> Since when is that serious? It isn't. There have been no complains from 
> anyone in the security team in any of the last security updates?

I have reason to complain security wise
> 
> (None of which affected any of the internal copies used,)
> 
> The policy says "should". And it it it followed.
> 
> The most stuff isn't used as internal code copies, only the unavoidable 
> ones is. And TTBOMK the security team DOES know it.

Yes I know
> 
>  > Could you document that you embded a few tar ball under the security 
> tracker ?
> 
> You mean I should send MRs to it?

Yes I think so
> 
>  >Moreover you do not document where you downloaded these file a comment 
> under
> > copyright will be helpful (README.source say how to retrieve it not the 
> > link to
> > get).
> 
> The fetch it manually and put it there.  (Which normally would be done 
> from upstreams build systeem for ALL tarballs, even those not used..)
> 
> (It basically always is https://dev-www.libreoffice.org/src/ (which 
> mirrors stuff they got from the website):

:S

I will really prefer that we download from upstream
> 
> Makefile:$(call 
> fetch_Download_item_unchecked,https://download.documentfoundation.org/libreoffice/src/$(shell
>  
> echo $(gb_LO_VER) | sed -e 
> "s/\([0-9]*\.[0-9]*\.[0-9]*\).*/\1/"),libreoffice-$(i)-$(gb_LO_VER).tar.xz))
> 
> 
> Regards,
> 
> 
> Rene
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1051474: libreoffice: Please add embeded code copies to embeded-code-copies on security tracker debian.tar.xz/tarballs

2023-09-08 Thread Bastien Roucariès
Source: libreoffice
Severity: serious
Tags: security
Justification: Document embdeded code copy + copyright
X-Debbugs-Cc: Debian Security Team 

Dear Maintainer,

Could you document that you embded a few tar ball under the security tracker ?
For oldstable/stable/unstable

Version should be documented.

Moreover you do not document where you downloaded these file a comment under
copyright will be helpful (README.source say how to retrieve it not the link to
get).

Thanks

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.4.0-3-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1042757: ublock-origin: embded javascript lib

2023-08-19 Thread Bastien Roucariès
Le vendredi 18 août 2023, 23:16:04 UTC Markus Koschany a écrit :
> Am Montag, dem 31.07.2023 um 11:56 + schrieb Bastien Roucariès:
> > Source: ublock-origin
> > Severity: serious
> > Justification: not prefered form of modification
> > 
> > Dear Maintainer,
> > 
> > src/lib include a few library that are already packaged for debian.
> > 
> > per se it is not a serious bug, but we should try if possible after testing
> > to
> > use packaged version
> > 
> > The serious bug is due that for instance punycode was not in prefered form 
> > of
> > modification due to being wepackaged (transpiled) in order to be an ES
> > module.
> > 
> > They may be other transpiled package in this subdirectory
> 
> Hello Bastien,
> 
> thanks for the report. I have reviewed the src/lib directory and replaced the
> embedded Javascript libraries of csstree and js-beautify with Debian's system
> libraries. I also added the source file of hsluv to debian/missing-sources and
> documented the licenses of these three Javascript libraries in
> debian/copyright.
> 
> I decided against replacing punycode because punycode.js in ublock-origin 
> looks
> like the preferred form for me.

No unfortunatly this is transpiled aka compiled by webpack
see the first line
export default (function() {

This is make by webpack or rollup that are automated tools. This means that 
this code is transpiled and I do not know the extend of transpiling.

it may be only the es6 upstream code:
https://sources.debian.org/src/node-punycode/2.2.3-2/scripts/prepublish.js/
or something worst that replace the constant by something else.

if you see the original code here:
https://sources.debian.org/src/node-punycode/2.2.3-2/punycode.js/

you do not see the export default (function() { 
line

Javascript is strange you could edit generated file and min.js is not the only 
problem

Thanks

Bastien

> The file is not minified and can be edited
> without problems. I believe you were referring to hsluv instead. I believe 
> this
> issue is fixed in version 1.51.0+dfsg-2 soon.
> 
> Regards,
> 
> Markus
> 
> 



signature.asc
Description: This is a digitally signed message part.


Bug#1041112: Patch

2023-08-13 Thread Bastien Roucariès
control: tags -1 + patch

Hi,

Find the patch hereFrom: =?utf-8?q?Bastien_Roucari=C3=A8s?= 
Date: Sun, 13 Aug 2023 14:14:09 +
Subject: CVE-2023-32627 Filter null sampling rate in VOC coder

Avoid a divide by zero and out of bound read by rejecting null sampling rate in VOC file

bug: https://sourceforge.net/p/sox/bugs/369/
bug-redhat: https://bugzilla.redhat.com/show_bug.cgi?id=2212282
bug-debian: https://bugs.debian.org/1041112
bug-debian-security: https://security-tracker.debian.org/tracker/CVE-2023-32627
---
 src/voc.c | 5 +
 1 file changed, 5 insertions(+)

diff --git a/src/voc.c b/src/voc.c
index f44933d..cad32fa 100644
--- a/src/voc.c
+++ b/src/voc.c
@@ -351,6 +351,11 @@ static size_t read_samples(sox_format_t * ft, sox_sample_t * buf,
 v->block_remaining = 0;
 return done;
   }
+  if(uc == 0) {
+lsx_fail_errno(ft, EINVAL, "invalid rate value");
+v->block_remaining = 0;
+return done;
+  }
   *buf = SOX_UNSIGNED_8BIT_TO_SAMPLE(uc,);
   lsx_adpcm_init(>adpcm, 6 - v->size, SOX_SAMPLE_TO_SIGNED_16BIT(*buf, ft->clips));
   ++buf;


signature.asc
Description: This is a digitally signed message part.


Bug#1041113: Fixed by CVE-2022-31650.patch fix

2023-08-13 Thread Bastien Roucariès
Hi,

This problem is fixed by CVE-2022-31650.patch 

Channel could not overflow



signature.asc
Description: This is a digitally signed message part.


Bug#1042970: zoneminder: Embded cakephp

2023-08-03 Thread Bastien Roucariès
Source: zoneminder
Severity: serious
Justification: embded code copy

Dear Maintainer,

Your package include a copy of cake php. Could you use the packaged one ?

Thanks



signature.asc
Description: This is a digitally signed message part.


Bug#976697: webext-umatrix: no longer developed upstream, remove or switch to LibreMatrix or?

2023-07-31 Thread Bastien Roucariès
Source: umatrix
Followup-For: Bug #976697
Forwarded: https://gitlab.com/vannilla/ematrix/

Dear Maintainer,

I have asked guidance to the last fork about firefox/chromium support. If not
RM is the wayto go

Bastien


-- System Information:
Debian Release: trixie/sid
  APT prefers testing-debug
  APT policy: (900, 'testing-debug'), (900, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armel

Kernel: Linux 6.3.0-1-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1042757: ublock-origin: embded javascript lib

2023-07-31 Thread Bastien Roucariès
Source: ublock-origin
Severity: serious
Justification: not prefered form of modification

Dear Maintainer,

src/lib include a few library that are already packaged for debian.

per se it is not a serious bug, but we should try if possible after testing to
use packaged version

The serious bug is due that for instance punycode was not in prefered form of
modification due to being wepackaged (transpiled) in order to be an ES module.

They may be other transpiled package in this subdirectory

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1042738: ruby-rails-assets-punycode: Do not ship libjs-punycode

2023-07-31 Thread Bastien Roucariès
Source: ruby-rails-assets-punycode
Severity: serious
Justification: source is missing

Dear Maintainer,

You package node-punycode without source...

I plan to fix this

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1042715: php-horde-editor: Please drop ckeditor3

2023-07-30 Thread Bastien Roucariès
Source: php-horde-editor
Severity: serious
Tags: security
Justification: security reason EOL
X-Debbugs-Cc: Debian Security Team 

Dear Maintainer,

ckeditor4 go to EOL since June by upstream.

You use ckeditor3. With my javascript hat maint of ckeditor I think we could
migrate your software to ckeditor4

I believe the first change is the following patch:
diff --git a/Horde_Editor-2.0.5/lib/Horde/Editor/Ckeditor.php
b/Horde_Editor-2.0.5/lib/Horde/Editor/Ckeditor.php
index 3a58ccd..33e8564 100644
--- a/Horde_Editor-2.0.5/lib/Horde/Editor/Ckeditor.php
+++ b/Horde_Editor-2.0.5/lib/Horde/Editor/Ckeditor.php
@@ -40,9 +40,7 @@ class Horde_Editor_Ckeditor extends Horde_Editor
 return;
 }

-$ck_file = empty($params['basic'])
-? 'ckeditor/ckeditor.js'
-: 'ckeditor/ckeditor_basic.js';
+$ck_file = 'ckeditor/ckeditor.js';

 if (isset($params['config'])) {
 if (is_array($params['config'])) {
@@ -84,6 +82,7 @@ class Horde_Editor_Ckeditor extends Horde_Editor
 case 'msie':
 case 'mozilla':
 case 'opera':
+case 'edge':
 // MSIE: 5.5+
 // Firefox: 1.5+
 // Opera: 9.5+


After it will need to change if needed the config here in order to remove
plugins
https://sources.debian.org/src/php-horde-
imp/6.2.27-3/imp-6.2.27/lib/Script/Package/Editor.php/?hl=33#L33

I could help if needed but I need a means to test the modification

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1042536: firefox-esr: Please allow a smooth upgrade from webext-https-everywhere by providing/breaking/replace

2023-07-29 Thread Bastien Roucariès
Package: firefox-esr
Version: 115.0.2esr-1
Severity: important
control: clone -1 src:firefox
control: clone -1 src:chromium

Dear Maintainer,

Could you allow by providing a webext-https-everywhere and correct break 
replace (versionned) a smooth upgrade for webext-https-everywhere

firefox/chromium include this functionnality so technically it is a replace



signature.asc
Description: This is a digitally signed message part.


Bug#1042533: netdata: Please use packaged pako

2023-07-29 Thread Bastien Roucariès
Source: netdata
Severity: serious

Dear Maintainer,

pako is packaged for debian as node-pako and minify now under
/usr/share/javascript/pako

Moreover the first line of your missing source show a webpack line so your
source are not on the prefered form and thus this is a serious bug

You should also review the other js file and ask if needed help from debian
javascript team to package

Thanks

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1042532: mediawiki: Vendoring a few javascript library without source

2023-07-29 Thread Bastien Roucariès
Source: mediawiki
Version: 1:1.39.4-2
Severity: serious
Justification: missing source

Dear Maintainer,

resources/lib/
(https://sources.debian.org/src/mediawiki/1:1.39.4-2/resources/lib/)

include a few library already packaged for debian.

Moreover some source are missing (I have only checked pako).

You could use the packaged library under debian

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1042531: novnc: Embded copy of node-pako

2023-07-29 Thread Bastien Roucariès
Source: novnc
Severity: serious
Justification: embed code copy

Dear Maintainer,

Your package include an embded code copy of node-pako (under vendor)

Could you please use the packaged node-pako ?

Thanks

bastien

signature.asc
Description: This is a digitally signed message part.


Bug#1042529: sogo: Multiple embdeded and minified javascript library

2023-07-29 Thread Bastien Roucariès
Source: sogo
Severity: serious
Tags: ftbfs security
Justification: FTBFS + security
X-Debbugs-Cc: Debian Security Team 

Dear Maintainer,

https://sources.debian.org/src/sogo/5.8.4-1/UI/WebServerResources/js/vendor/
inlclude a few library precompiled and that seems outdated (bad from a security
point of view due to recent CVE for ckeditor)

Could you deembed and use packaged library

Thanks

Bastien



signature.asc
Description: This is a digitally signed message part.


Bug#1042528: ldap-account-manager: Multiple embeded and minified javascript library

2023-07-29 Thread Bastien Roucariès
Source: ldap-account-manager
Severity: serious
Tags: ftbfs security
Justification: FTBFS + security

Dear Maintainer,

Ldap-account-manager include a few vendored and outdated (without security
support) javascript library

Could you remove this depends and use packaged library

Thanks



Bug#1042527: request-tracker5: Include ckeditor minimified

2023-07-29 Thread Bastien Roucariès
Source: request-tracker5
Severity: serious
Tags: ftbfs
Justification: FTBFS
Control: tags -1 + security

Dear Maintainer,

https://sources.debian.org/src/request-
tracker5/5.0.3+dfsg-3/share/static/RichText/

include ckeditor outdated (with CVE) and moreover minified

Could you use the packaged ckeditor.

Note also that I am going to package ckeditor5 (ckeditor 4 is EOL)

Bastien


signature.asc
Description: This is a digitally signed message part.


Bug#1042470: node-lodash: please add lodash-es

2023-07-28 Thread Bastien Roucariès
Package: node-lodash
Version: 4.17.21+dfsg+~cs8.31.198.20210220-9
Severity: important

Dear Maintainer,

Could you add lodash-es mini package to lodash

It is only running
lodash modularize exports=es -o ./
and installing to right part.

it is needed for ckeditor5

Thanks


signature.asc
Description: This is a digitally signed message part.


Bug#1041471: Reassign

2023-07-27 Thread Bastien Roucariès
control: reopen -1
control: notfound -1 19
control: reassign -1 qemu-user
control: found -1 1:8.0.2+dfsg-3
control: found -1 
control: forwarded -1 https://gitlab.com/qemu-project/qemu/-/issues/1776
control: affects -1 src:isa-support
control: severity -1 important

Hi,

THis is a qemu bug mark as qemu bug

Bastien


signature.asc
Description: This is a digitally signed message part.


  1   2   3   4   5   6   >