Bug#1067953: marked as done (transition: flint)

2024-05-02 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 07:37:34 +0200
with message-id 
and subject line Re: Bug#1067953: transition: flint
has caused the Debian Bug report #1067953,
regarding transition: flint
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1067953: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067953
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
Control: affects -1 + src:flint
X-Debbugs-Cc: fl...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: dtorra...@piedmont.edu
Severity: normal

Dear Release Team,

I would like to request a transition slot for flint.  The recent upstream
release 3.1.0 introduced the new soversion flint 19.  A new binary package,
libflint19, was introduced in the source package flint 3.1.2-1~exp1, which
cleared the NEW queue on March 28 and is now in experimental.

flint 3.1.1-1 already exists in unstable, which ships libflint.so.19 in
the libflint18t64 binary package.  However, flint 3.0.1-3.1 had been
previously uploaded for the t64 transition, shipping libflint.so.18 in
the same binary package.  This is RC bug #1067226 and has resulted in
several other RC bugs in reverse dependencies.

An auto-flint tracker already exists for the t64 transition, but it doesn't
take the new libflint19 package into account.  (Although perhaps this will
update automatically at some point?)

binNMU's should be sufficient for each of flint's reverse dependencies:

* e-antic
* gyoto
* macaulay2
* msolve
* normaliz
* polymake
* singular

Ben file:

title = "flint";
is_affected = (.build-depends ~ /\blibflint-dev\b/) | (.depends ~ 
/\blibflint(?:18|18t64|19)\b/);
is_good = .depends ~ /\blibflint19\b/;
is_bad = .depends ~ /\blibflint18(?:t64)?\b/;

Thank you!


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
On 2024-04-02 21:50:32 +0200, Sebastian Ramacher wrote:
> Control: tags -1 confirmed
> 
> On 2024-03-29 12:46:50 +, Torrance, Douglas wrote:
> > Package: release.debian.org
> > Control: affects -1 + src:flint
> > X-Debbugs-Cc: fl...@packages.debian.org
> > User: release.debian@packages.debian.org
> > Usertags: transition
> > X-Debbugs-Cc: dtorra...@piedmont.edu
> > Severity: normal
> > 
> > Dear Release Team,
> > 
> > I would like to request a transition slot for flint.  The recent upstream
> > release 3.1.0 introduced the new soversion flint 19.  A new binary package,
> > libflint19, was introduced in the source package flint 3.1.2-1~exp1, which
> > cleared the NEW queue on March 28 and is now in experimental.
> > 
> > flint 3.1.1-1 already exists in unstable, which ships libflint.so.19 in
> > the libflint18t64 binary package.  However, flint 3.0.1-3.1 had been
> > previously uploaded for the t64 transition, shipping libflint.so.18 in
> > the same binary package.  This is RC bug #1067226 and has resulted in
> > several other RC bugs in reverse dependencies.
> 
> Please go ahead so that reverse dpeendencies can actually build again.

The old binaries got removed. Closing.

Cheers
-- 
Sebastian Ramacher--- End Message ---


Bug#1056574: marked as done (transition: ppp)

2024-05-02 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 07:35:35 +0200
with message-id 
and subject line Re: Bug#1056574: transition: ppp
has caused the Debian Bug report #1056574,
regarding transition: ppp
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1056574: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056574
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: p...@packages.debian.org
Control: affects -1 + src:ppp

Hello Release Team friends,

I uploaded ppp-2.5.0-1+1 to experimental back in September, and I think
it's time to unleash it on unstable, ideally in the next few days. This
is an ABI break both due to the new upstream version but there are also
significant changes in this release that may break dependent packages.

The upload I'm planning, 2.5.0-1+2, only has a minor fix for loong64 and
a changelog fix.

As usual this isn't a traditional library package upload so the Ben file
looks a bit foreign. See #890204 for a previous time we did this.

Thanks,
Chris

Ben file:

title = "ppp";
is_affected = .build-depends ~ /ppp-dev/;
is_good = .depends ~ /ppp \(>= 2\.5\.0-1\+~\)/ | .breaks ~ /ppp \(<< 
2\.5\.0-1\+~\)/;
is_bad = .depends ~ /ppp \(>= 2\.4\.9-1\+~\)/ | .breaks ~ /ppp \(<< 
2\.4\.9-1\+~\)/;
--- End Message ---
--- Begin Message ---
On 2024-04-20 10:29:44 +0200, Sebastian Ramacher wrote:
> Control: tags -1 confirmed
> 
> On 2024-04-19 17:11:44 +0100, Chris Boot wrote:
> > On 26/11/2023 11:36, Chris Boot wrote:
> > > On 26/11/2023 10:56, Chris Boot wrote:
> > > > > Any way to reduce possible breakage, or to detect and fix it
> > > > > before the transition starts? Like rebuilding rdeps, or checking
> > > > > rdep autopkgtests?
> > > > 
> > > > I'll go an do some rebuilds now and see how they go. If any breakage
> > > > occurs it will be obvious at build time.
> > > 
> > > The status of the rdeps (list taken from the tracker):
> > > 
> > > connman: OK
> > > network-manager: OK
> > > pptpd: https://bugs.debian.org/1056898
> > > sstp-client: https://bugs.debian.org/1056900
> > > 
> > > network-manager-fortisslvpn: https://bugs.debian.org/1056901
> > > network-manager-l2tp: OK
> > > network-manager-pptp: OK
> > > network-manager-sstp: https://bugs.debian.org/1056903
> > 
> > All that's left now is pptpd (with an offer from Christoph to upload when
> > ready) and network-manager-fortisslvpn (with commits fixing the issues
> > upstream, but no upstream release).
> > 
> > In the mean time, #1065940 has become a blocker for the time_t transition. I
> > think I'd rather upload 2.5.0 and break network-manager-fortisslvpn than
> > just the patch to fix the breakage.
> > 
> > Would the release team be happy to continue with this transition?
> 
> Please go ahead with the upload to unsable.

ppp and reverse dependencies migrated. Closing

Cheers
-- 
Sebastian Ramacher--- End Message ---


Bug#1070271: marked as done (nmu: 64-bit time_t rebuilds for experimental)

2024-05-02 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 07:26:31 +0200
with message-id 
and subject line Re: Bug#1070271: nmu: 64-bit time_t rebuilds for experimental
has caused the Debian Bug report #1070271,
regarding nmu: 64-bit time_t rebuilds for experimental
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1070271: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070271
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

The package in sid had a renaming t64 transition, but experimental
already has a different SOVERSION, so only a binNMU is needed.

nmu openmm_8.1.0+dfsg-2 . ANY . experimental . -m "Rebuild for time_t"
nmu opensubdiv_3.6.0-1 . ANY . experimental . -m "Rebuild for time_t"
nmu protobuf_3.25.2-1 . ANY . experimental . -m "Rebuild for time_t"
nmu opencascade_7.7.1+dfsg1-1~exp2 . ANY . experimental . -m "Rebuild for 
time_t"


Andreas
--- End Message ---
--- Begin Message ---
On 2024-05-03 05:20:31 +0200, Andreas Beckmann wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: binnmu
> 
> The package in sid had a renaming t64 transition, but experimental
> already has a different SOVERSION, so only a binNMU is needed.
> 
> nmu openmm_8.1.0+dfsg-2 . ANY . experimental . -m "Rebuild for time_t"
> nmu opensubdiv_3.6.0-1 . ANY . experimental . -m "Rebuild for time_t"
> nmu protobuf_3.25.2-1 . ANY . experimental . -m "Rebuild for time_t"
> nmu opencascade_7.7.1+dfsg1-1~exp2 . ANY . experimental . -m "Rebuild for 
> time_t"

Scheduled

Cheers
-- 
Sebastian Ramacher--- End Message ---


Bug#1070266: marked as done (nmu: chromium_124.0.6367.118-1)

2024-05-02 Thread Debian Bug Tracking System
Your message dated Fri, 3 May 2024 07:26:19 +0200
with message-id 
and subject line Re: Bug#1070266: nmu: chromium_124.0.6367.118-1
has caused the Debian Bug report #1070266,
regarding nmu: chromium_124.0.6367.118-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1070266: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070266
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: binnmu
Severity: serious

Hello,

Snappy 1.2.0-1 was uploaded with broken symbols (see 
https://bugs.debian.org/1070217). This is fixed in snappy 1.2.0-2, but 
chromium in sid had already built against the broken version of snappy.


Please rebuild chromium against snappy 1.2.0-2 to fix its broken symbol 
dependencies. Because this chromium release has CVE fixes (and there's 
20-something pending CVEs in trixie already that would be fixed by 
chromium migration), I'm filing this with a higher severity than usual.


  nmu chromium_124.0.6367.118-1 . ANY . -m 'Rebuild against 
libsnappy1v5 to fix broken symbols (#1070217)'




OpenPGP_0x645D0247C36E7637.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
On 2024-05-02 18:54:20 -0400, Andres Salomon wrote:
> Package: release.debian.org
> User: release.debian@packages.debian.org
> Usertags: binnmu
> Severity: serious
> 
> Hello,
> 
> Snappy 1.2.0-1 was uploaded with broken symbols (see
> https://bugs.debian.org/1070217). This is fixed in snappy 1.2.0-2, but
> chromium in sid had already built against the broken version of snappy.
> 
> Please rebuild chromium against snappy 1.2.0-2 to fix its broken symbol
> dependencies. Because this chromium release has CVE fixes (and there's
> 20-something pending CVEs in trixie already that would be fixed by chromium
> migration), I'm filing this with a higher severity than usual.
> 
>   nmu chromium_124.0.6367.118-1 . ANY . -m 'Rebuild against libsnappy1v5 to
> fix broken symbols (#1070217)'

Scheduled.

Cheers
-- 
Sebastian Ramacher--- End Message ---


Processed: Re: Bug#1070266: nmu: chromium_124.0.6367.118-1

2024-05-02 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +moreinfo
Bug #1070266 [release.debian.org] nmu: chromium_124.0.6367.118-1
Added tag(s) moreinfo.

-- 
1070266: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070266
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1070266: nmu: chromium_124.0.6367.118-1

2024-05-02 Thread GCS
Control: tags -1 +moreinfo

On Fri, May 3, 2024 at 12:57 AM Andres Salomon  wrote:
> Snappy 1.2.0-1 was uploaded with broken symbols (see
> https://bugs.debian.org/1070217). This is fixed in snappy 1.2.0-2, but
> chromium in sid had already built against the broken version of snappy.
 Nope, the symbols were _not_ broken, some were missing as of the
1.1.10-1 version. I have added those back in the 1.2.0-2 package
version.

> Please rebuild chromium against snappy 1.2.0-2 to fix its broken symbol
> dependencies. Because this chromium release has CVE fixes (and there's
> 20-something pending CVEs in trixie already that would be fixed by
> chromium migration), I'm filing this with a higher severity than usual.
 It is _not_ needed. the ABI of 1.2.0-1 is not changed in 1.2.0-2,
I've even installed the new snappy library version and can still use
chromium without problems. Do you experience any odd behaviour?

Regards,
Laszlo/GCS



Bug#1070271: nmu: 64-bit time_t rebuilds for experimental

2024-05-02 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

The package in sid had a renaming t64 transition, but experimental
already has a different SOVERSION, so only a binNMU is needed.

nmu openmm_8.1.0+dfsg-2 . ANY . experimental . -m "Rebuild for time_t"
nmu opensubdiv_3.6.0-1 . ANY . experimental . -m "Rebuild for time_t"
nmu protobuf_3.25.2-1 . ANY . experimental . -m "Rebuild for time_t"
nmu opencascade_7.7.1+dfsg1-1~exp2 . ANY . experimental . -m "Rebuild for 
time_t"


Andreas



Bug#1070266: nmu: chromium_124.0.6367.118-1

2024-05-02 Thread Andres Salomon

Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: binnmu
Severity: serious

Hello,

Snappy 1.2.0-1 was uploaded with broken symbols (see 
https://bugs.debian.org/1070217). This is fixed in snappy 1.2.0-2, but 
chromium in sid had already built against the broken version of snappy.


Please rebuild chromium against snappy 1.2.0-2 to fix its broken symbol 
dependencies. Because this chromium release has CVE fixes (and there's 
20-something pending CVEs in trixie already that would be fixed by 
chromium migration), I'm filing this with a higher severity than usual.


  nmu chromium_124.0.6367.118-1 . ANY . -m 'Rebuild against 
libsnappy1v5 to fix broken symbols (#1070217)'




OpenPGP_0x645D0247C36E7637.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1061645: marked as done (transition: poco)

2024-05-02 Thread Debian Bug Tracking System
Your message dated Thu, 2 May 2024 23:39:05 +0200
with message-id 
and subject line Re: Bug#1061645: poco: NMU diff for 64-bit time_t transition
has caused the Debian Bug report #1061645,
regarding transition: poco
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1061645: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061645
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
Control: affects -1 poco
X-Debbugs-Cc: p...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: transition
Severity: normal
Control: forwarded -1 https://release.debian.org/transitions/html/auto-poco.html

poco is available in experimental with the libraries' SOVERSIONs at 100.
This transition is from SOVERSION 80.
The auto-generated Ben file is okay and all reverse dependencies build fine.
--- End Message ---
--- Begin Message ---
On 2024-05-02 22:45:57 +0200, Bastian Germann wrote:
> This has essentially happened because I have accidentally uploaded to 
> unstable.
> The only reverse dependency that still depends on the old SONAME is 
> clickhouse, which FTBFS due to unrelated issues.
> I think this can be closed.

It is not in testing anyway. Closing

Cheers
-- 
Sebastian Ramacher--- End Message ---


Bug#1061645: poco: NMU diff for 64-bit time_t transition

2024-05-02 Thread Bastian Germann

This has essentially happened because I have accidentally uploaded to unstable.
The only reverse dependency that still depends on the old SONAME is clickhouse, 
which FTBFS due to unrelated issues.
I think this can be closed.



Bug#1070249: bookworm-pu: package python-jwcrypto/1.1.0-1+deb12u1

2024-05-02 Thread Steve McIntyre
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: steve.mcint...@pexip.com, Timo Aaltonen 

Hi,

[ Reason ]
I've backported the upstream fix for CVE-2024-28102 (#1065688) to
bookworm. It's not considered critical as a security fix by the
security team, but would still be good to have in bookworm.

Ready to upload if you're happy.

Timo is happy for me to upload this - see the conversation in
#1065688.

[ Impact ]
Minor security issue.

[ Tests ]
The patch comes from upstream, and includes a unit test.

[ Risks ]
The changes are straightforward, cherry-picked from current upstream
and just massaged to fit the older version in bookworm.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

The debdiff here just contains trivial metadata changes from my
initial debdiff in #1065688

python-jwcrypto (1.1.0-1+deb12u1) bookworm; urgency=medium

  * Apply and tweak upstream security fix for CVE-2024-28102
Address potential DoS with high compression ratio
diff -Nru python-jwcrypto-1.1.0/debian/changelog 
python-jwcrypto-1.1.0/debian/changelog
--- python-jwcrypto-1.1.0/debian/changelog  2022-03-29 08:33:50.0 
+0100
+++ python-jwcrypto-1.1.0/debian/changelog  2024-04-26 17:18:31.0 
+0100
@@ -1,3 +1,10 @@
+python-jwcrypto (1.1.0-1+deb12u1) bookworm; urgency=medium
+
+  * Apply and tweak upstream security fix for CVE-2024-28102
+Address potential DoS with high compression ratio
+
+ -- Steve McIntyre <93...@debian.org>  Fri, 26 Apr 2024 17:18:31 +0100
+
 python-jwcrypto (1.1.0-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru python-jwcrypto-1.1.0/debian/patches/CVE-2024-28102.patch 
python-jwcrypto-1.1.0/debian/patches/CVE-2024-28102.patch
--- python-jwcrypto-1.1.0/debian/patches/CVE-2024-28102.patch   1970-01-01 
01:00:00.0 +0100
+++ python-jwcrypto-1.1.0/debian/patches/CVE-2024-28102.patch   2024-04-26 
17:18:31.0 +0100
@@ -0,0 +1,72 @@
+commit 90477a3b6e73da69740e00b8161f53fea19b831f
+Author: Simo Sorce 
+Date:   Tue Mar 5 16:57:17 2024 -0500
+
+Address potential DoS with high compression ratio
+
+Fixes CVE-2024-28102
+
+Signed-off-by: Simo Sorce 
+
+Index: os-python-jwcrypto/jwcrypto/jwe.py
+===
+--- os-python-jwcrypto.orig/jwcrypto/jwe.py
 os-python-jwcrypto/jwcrypto/jwe.py
+@@ -9,6 +9,9 @@ from jwcrypto.common import base64url_de
+ from jwcrypto.common import json_decode, json_encode
+ from jwcrypto.jwa import JWA
+ 
++# Limit the amount of data we are willing to decompress by default.
++default_max_compressed_size = 256 * 1024
++
+ 
+ # RFC 7516 - 4.1
+ # name: (description, supported?)
+@@ -387,6 +390,10 @@ class JWE:
+ 
+ compress = jh.get('zip', None)
+ if compress == 'DEF':
++if len(data) > default_max_compressed_size:
++raise InvalidJWEData(
++'Compressed data exceeds maximum allowed'
++'size' + f' ({default_max_compressed_size})')
+ self.plaintext = zlib.decompress(data, -zlib.MAX_WBITS)
+ elif compress is None:
+ self.plaintext = data
+Index: os-python-jwcrypto/jwcrypto/tests.py
+===
+--- os-python-jwcrypto.orig/jwcrypto/tests.py
 os-python-jwcrypto/jwcrypto/tests.py
+@@ -1716,6 +1716,32 @@ class ConformanceTests(unittest.TestCase
+ check.decrypt(key)
+ self.assertEqual(check.payload, b'plain')
+ 
++def test_jwe_decompression_max(self):
++key = jwk.JWK(kty='oct', k=base64url_encode(b'A' * (128 // 8)))
++payload = '{"u": "' + "u" * 4 + '", "uu":"' \
+++ "u" * 4 + '"}'
++protected_header = {
++"alg": "A128KW",
++"enc": "A128GCM",
++"typ": "JWE",
++"zip": "DEF",
++}
++enc = jwe.JWE(payload.encode('utf-8'),
++  recipient=key,
++  protected=protected_header).serialize(compact=True)
++with self.assertRaises(jwe.InvalidJWEData):
++check = jwe.JWE()
++check.deserialize(enc)
++check.decrypt(key)
++
++defmax = jwe.default_max_compressed_size
++jwe.default_max_compressed_size = 10
++# ensure we can eraise the limit and decrypt
++check = jwe.JWE()
++check.deserialize(enc)
++check.decrypt(key)
++jwe.default_max_compressed_size = defmax
++
+ 
+ class JWATests(unittest.TestCase):
+ def test_jwa_create(self):
diff -Nru python-jwcrypto-1.1.0/debian/patches/series 
python-jwcrypto-1.1.0/debian/patches/series
--- 

Bug#1068082: bullseye-pu: package intel-microcode/3.20240312.1~deb11u1

2024-05-02 Thread Henrique de Moraes Holschuh
On Mon, Apr 22, 2024, at 13:58, Jonathan Wiltshire wrote:
> Control: tag -1 confirmed
>
> On Sat, Mar 30, 2024 at 07:50:45AM -0300, Henrique de Moraes Holschuh wrote:
>> As requested by the security team, I would like to bring the microcode
>> update level for Intel processors in Bullseye and Bookworm to match what
>> we have in Sid and Trixie.  This is the bug report for Bullseye, a
>> separate one will be filled for Bookmorm.
>
> Please go ahead.

Uploaded!

Thank you!

-- 
  Henrique de Moraes Holschuh 



Re: Bug#1068633: bookworm-pu: package cjson/1.7.15-1+deb12u1

2024-05-02 Thread Maytham Alsudany
Ping! Could someone please have a look at and approve the bookworm-pu for cjson?
The debdiff was changed a while back, and it is attached in this mail.

Kind regards,
Maytham

On Mon, 2024-04-08 at 12:27 +0300, Maytham Alsudany wrote:
> Package: release.debian.org
> Severity: normal
> Tags: bookworm
> User: release.debian@packages.debian.org
> Usertags: pu
> X-Debbugs-Cc: cj...@packages.debian.org
> Control: affects -1 + src:cjson
> 
> [ Reason ]
> CVE-2023-50472, CVE-2023-50471
> 
> [ Impact ]
> Segmentation violation via the function cJSON_InsertItemInArray at cJSON.c
> 
> [ Tests ]
> Upstream's test continue to pass, and they have also added new tests to
> cover this security issue.
> 
> [ Risks ]
> Minimal, no change to API. Only minimal changes were made to fix this
> security issue.
> 
> [ Checklist ]
>   [x] *all* changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in (old)stable
>   [x] the issue is verified as fixed in unstable
> 
> [ Changes ]
> - Set myself as Maintainer (I am adopting the package, #1067510)
> - Bump Standards-Version to 4.6.2
> - Add Build-Depends-Package to symbools
> - Backport upstream's patch to 'add NULL checkings'.
>   Upstream adds a few more if statements to avoid the segmentation
>   fault, and thus resolve the security vulnerability.
> 
> [ Other info ]
> If you can spare the time, could you please upload this for me? (I need
> a sponsor, #1068624.) I'm also still waiting for someone to give me
> access to the Salsa repo.
> 
> Thanks,
> Maytham

diff -Nru cjson-1.7.15/debian/changelog cjson-1.7.15/debian/changelog
--- cjson-1.7.15/debian/changelog	2021-08-29 23:30:06.0 +0300
+++ cjson-1.7.15/debian/changelog	2024-04-09 04:30:29.0 +0300
@@ -1,3 +1,11 @@
+cjson (1.7.15-1+deb12u1) bookworm; urgency=medium
+
+  * Non-maintainer upload.
+  * Backport patch to add NULL checkings (CVE-2023-50472, CVE-2023-50471)
+(Closes: #1059287)
+
+ -- Maytham Alsudany   Tue, 09 Apr 2024 04:30:29 +0300
+
 cjson (1.7.15-1) unstable; urgency=medium
 
   * New upstream release 1.7.15.
diff -Nru cjson-1.7.15/debian/gbp.conf cjson-1.7.15/debian/gbp.conf
--- cjson-1.7.15/debian/gbp.conf	1970-01-01 03:00:00.0 +0300
+++ cjson-1.7.15/debian/gbp.conf	2024-04-09 04:29:47.0 +0300
@@ -0,0 +1,2 @@
+[DEFAULT]
+debian-branch = debian/bookworm
diff -Nru cjson-1.7.15/debian/patches/0001-add-null-checkings.patch cjson-1.7.15/debian/patches/0001-add-null-checkings.patch
--- cjson-1.7.15/debian/patches/0001-add-null-checkings.patch	1970-01-01 03:00:00.0 +0300
+++ cjson-1.7.15/debian/patches/0001-add-null-checkings.patch	2024-04-09 04:29:47.0 +0300
@@ -0,0 +1,101 @@
+Origin: backport, https://github.com/DaveGamble/cJSON/commit/60ff122ef5862d04b39b150541459e7f5e35add8
+From: Peter Alfred Lee 
+Bug: https://github.com/DaveGamble/cJSON/issues/803
+Bug: https://github.com/DaveGamble/cJSON/issues/802
+Bug-Debian: https://bugs.debian.org/1059287
+Acked-by: Maytham Alsudany 
+Subject: [PATCH] add NULL checkings (#809)
+ * add NULL checks in cJSON_SetValuestring
+ Fixes #803(CVE-2023-50472)
+ .
+ * add NULL check in cJSON_InsertItemInArray
+ Fixes #802(CVE-2023-50471)
+ .
+ * add tests for NULL checks
+ add tests for NULL checks in cJSON_InsertItemInArray and cJSON_SetValuestring
+
+--- a/cJSON.c
 b/cJSON.c
+@@ -401,7 +401,12 @@
+ {
+ char *copy = NULL;
+ /* if object's type is not cJSON_String or is cJSON_IsReference, it should not set valuestring */
+-if (!(object->type & cJSON_String) || (object->type & cJSON_IsReference))
++if ((object == NULL) || !(object->type & cJSON_String) || (object->type & cJSON_IsReference))
++{
++return NULL;
++}
++/* return NULL if the object is corrupted */
++if (object->valuestring == NULL)
+ {
+ return NULL;
+ }
+@@ -2260,7 +2265,7 @@
+ {
+ cJSON *after_inserted = NULL;
+ 
+-if (which < 0)
++if (which < 0 || newitem == NULL)
+ {
+ return false;
+ }
+@@ -2271,6 +2276,11 @@
+ return add_item_to_array(array, newitem);
+ }
+ 
++if (after_inserted != array->child && newitem->prev == NULL) {
++/* return false if after_inserted is a corrupted array item */
++return false;
++}
++
+ newitem->next = after_inserted;
+ newitem->prev = after_inserted->prev;
+ after_inserted->prev = newitem;
+--- a/tests/misc_tests.c
 b/tests/misc_tests.c
+@@ -353,6 +353,19 @@
+ {
+ char buffer[10];
+ cJSON *item = cJSON_CreateString("item");
++cJSON *array = cJSON_CreateArray();
++cJSON *item1 = cJSON_CreateString("item1");
++cJSON *item2 = cJSON_CreateString("corrupted array item3");
++cJSON *corruptedString = cJSON_CreateString("corrupted");
++struct cJSON *originalPrev;
++
++add_item_to_array(array, item1);
++add_item_to_array(array, item2);
++
++originalPrev = item2->prev;
++item2->prev = 

Bug#1070230: marked as done (nmu: osmo-msc_1.9.0+dfsg1-2 osmo-sgsn_1.9.0+dfsg1-3)

2024-05-02 Thread Debian Bug Tracking System
Your message dated Thu, 2 May 2024 14:18:14 +0200
with message-id 
and subject line Re: Bug#1070230: nmu: osmo-msc_1.9.0+dfsg1-2 
osmo-sgsn_1.9.0+dfsg1-3
has caused the Debian Bug report #1070230,
regarding nmu: osmo-msc_1.9.0+dfsg1-2 osmo-sgsn_1.9.0+dfsg1-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1070230: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070230
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu osmo-msc_1.9.0+dfsg1-2 . ANY . unstable . -m "Rebuild against libosmo-sccp 
with t64 renaming reverted."
nmu osmo-sgsn_1.9.0+dfsg1-3 . ANY . unstable . -m "Rebuild against libosmo-sccp 
with t64 renaming reverted."

libosmo-sccp has been restricted to 64-bit architectures and therefore
the t64 renaming has been reverted. The reverse dependencies (which have
been removed from the 32-bit architectures) now need another binNMU.


Andreas
--- End Message ---
--- Begin Message ---

On 02/05/2024 12:35, Andreas Beckmann wrote:

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu osmo-msc_1.9.0+dfsg1-2 . ANY . unstable . -m "Rebuild against libosmo-sccp with 
t64 renaming reverted."
nmu osmo-sgsn_1.9.0+dfsg1-3 . ANY . unstable . -m "Rebuild against libosmo-sccp with 
t64 renaming reverted."

libosmo-sccp has been restricted to 64-bit architectures and therefore
the t64 renaming has been reverted. The reverse dependencies (which have
been removed from the 32-bit architectures) now need another binNMU.


Scheduled. Though note there's a patch in #1065790 which seems sensible.

Cheers,
Emilio--- End Message ---


Processed: bookworm-pu: package python3.11/3.11.2-6+deb12u2

2024-05-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:python3.11
Bug #1070232 [release.debian.org] bookworm-pu: package 
python3.11/3.11.2-6+deb12u2
Added indication that 1070232 affects src:python3.11

-- 
1070232: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070232
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1070230: nmu: osmo-msc_1.9.0+dfsg1-2 osmo-sgsn_1.9.0+dfsg1-3

2024-05-02 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu osmo-msc_1.9.0+dfsg1-2 . ANY . unstable . -m "Rebuild against libosmo-sccp 
with t64 renaming reverted."
nmu osmo-sgsn_1.9.0+dfsg1-3 . ANY . unstable . -m "Rebuild against libosmo-sccp 
with t64 renaming reverted."

libosmo-sccp has been restricted to 64-bit architectures and therefore
the t64 renaming has been reverted. The reverse dependencies (which have
been removed from the 32-bit architectures) now need another binNMU.


Andreas