Processing of json-c_0.13.1+dfsg-8_source.changes

2020-06-16 Thread Debian FTP Masters
json-c_0.13.1+dfsg-8_source.changes uploaded successfully to localhost
along with the files:
  json-c_0.13.1+dfsg-8.dsc
  json-c_0.13.1+dfsg-8.debian.tar.xz
  json-c_0.13.1+dfsg-8_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#960326: marked as done (json-c: CVE-2020-12762)

2020-06-16 Thread Debian Bug Tracking System
Your message dated Tue, 16 Jun 2020 08:33:37 +
with message-id 
and subject line Bug#960326: fixed in json-c 0.13.1+dfsg-8
has caused the Debian Bug report #960326,
regarding json-c: CVE-2020-12762
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
960326: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960326
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: json-c
Version: 0.13.1+dfsg-7
Severity: important
Tags: security upstream
Forwarded: https://github.com/json-c/json-c/pull/592

Hi,

The following vulnerability was published for json-c.

CVE-2020-12762[0]:
| json-c through 0.14 has an integer overflow and out-of-bounds write
| via a large JSON file, as demonstrated by printbuf_memappend.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762
[1] https://github.com/json-c/json-c/pull/592

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: json-c
Source-Version: 0.13.1+dfsg-8
Done: Gianfranco Costamagna 

We believe that the bug you reported is fixed in the latest version of
json-c, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 960...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gianfranco Costamagna  (supplier of updated json-c 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 16 Jun 2020 09:45:32 +0200
Source: json-c
Binary: libjson-c4 libjson-c-dev libjson-c-doc libjson-c4-udeb
Architecture: source
Version: 0.13.1+dfsg-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Gianfranco Costamagna 
Description:
 libjson-c-dev - JSON manipulation library - development files
 libjson-c-doc - JSON manipulation library - documentation files
 libjson-c4 - JSON manipulation library - shared library
 libjson-c4-udeb - JSON manipulation library - shared library (udeb) (udeb)
Closes: 960326
Changes:
 json-c (0.13.1+dfsg-8) unstable; urgency=medium
 .
   [ Leonidas S. Barbosa ]
   * SECURITY UPDATE: Integer overflows
 - debian/patches/CVE-2020-12762-*.patch: fix a series of
   integer overflows adding checks in linkhash.c, printbuf.c, test4.c
   test4.expected.
 - CVE-2020-12762
 .
   [ Gianfranco Costamagna ]
   * QA upload
   * Import Ubuntu patch (Closes: #960326)
Checksums-Sha1:
 1cce30d4212b8e1185b44cf8d30d6aeda037e0d7 2072 json-c_0.13.1+dfsg-8.dsc
 bd1698ca95d41cef49875140c3ecb1ddf485876c 9980 
json-c_0.13.1+dfsg-8.debian.tar.xz
 deaa02f9c23b75c3965eaa3cb5ff540175c7bf58 7347 
json-c_0.13.1+dfsg-8_source.buildinfo
Checksums-Sha256:
 003cb09d1dc78e3b54f04245ff1ece878253b9c07234a8fa1dfc3c9857affeac 2072 
json-c_0.13.1+dfsg-8.dsc
 f3b53b1a1f9f22558d86ace861937cfad077507fafefdcb528ac5a8f8a829530 9980 
json-c_0.13.1+dfsg-8.debian.tar.xz
 18d4c7deda5faf7ab7910f09b90f9fce4db1058d44ab8fc67b6da9d2691750a2 7347 
json-c_0.13.1+dfsg-8_source.buildinfo
Files:
 3e6765ccebe115b177311faafac52196 2072 libs optional json-c_0.13.1+dfsg-8.dsc
 adec1a144234e57c59e66106dcb896ba 9980 libs optional 
json-c_0.13.1+dfsg-8.debian.tar.xz
 bc3d83fc4b87d18523ea21967ddbfaf8 7347 libs optional 
json-c_0.13.1+dfsg-8_source.buildinfo

-BEGIN PGP SIGNATURE-
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json-c_0.13.1+dfsg-8_source.changes ACCEPTED into unstable

2020-06-16 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 16 Jun 2020 09:45:32 +0200
Source: json-c
Binary: libjson-c4 libjson-c-dev libjson-c-doc libjson-c4-udeb
Architecture: source
Version: 0.13.1+dfsg-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Gianfranco Costamagna 
Description:
 libjson-c-dev - JSON manipulation library - development files
 libjson-c-doc - JSON manipulation library - documentation files
 libjson-c4 - JSON manipulation library - shared library
 libjson-c4-udeb - JSON manipulation library - shared library (udeb) (udeb)
Closes: 960326
Changes:
 json-c (0.13.1+dfsg-8) unstable; urgency=medium
 .
   [ Leonidas S. Barbosa ]
   * SECURITY UPDATE: Integer overflows
 - debian/patches/CVE-2020-12762-*.patch: fix a series of
   integer overflows adding checks in linkhash.c, printbuf.c, test4.c
   test4.expected.
 - CVE-2020-12762
 .
   [ Gianfranco Costamagna ]
   * QA upload
   * Import Ubuntu patch (Closes: #960326)
Checksums-Sha1:
 1cce30d4212b8e1185b44cf8d30d6aeda037e0d7 2072 json-c_0.13.1+dfsg-8.dsc
 bd1698ca95d41cef49875140c3ecb1ddf485876c 9980 
json-c_0.13.1+dfsg-8.debian.tar.xz
 deaa02f9c23b75c3965eaa3cb5ff540175c7bf58 7347 
json-c_0.13.1+dfsg-8_source.buildinfo
Checksums-Sha256:
 003cb09d1dc78e3b54f04245ff1ece878253b9c07234a8fa1dfc3c9857affeac 2072 
json-c_0.13.1+dfsg-8.dsc
 f3b53b1a1f9f22558d86ace861937cfad077507fafefdcb528ac5a8f8a829530 9980 
json-c_0.13.1+dfsg-8.debian.tar.xz
 18d4c7deda5faf7ab7910f09b90f9fce4db1058d44ab8fc67b6da9d2691750a2 7347 
json-c_0.13.1+dfsg-8_source.buildinfo
Files:
 3e6765ccebe115b177311faafac52196 2072 libs optional json-c_0.13.1+dfsg-8.dsc
 adec1a144234e57c59e66106dcb896ba 9980 libs optional 
json-c_0.13.1+dfsg-8.debian.tar.xz
 bc3d83fc4b87d18523ea21967ddbfaf8 7347 libs optional 
json-c_0.13.1+dfsg-8_source.buildinfo

-BEGIN PGP SIGNATURE-
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=t6cc
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#962946: mdadm: --name not valid in grow mode

2020-06-16 Thread Marc Lehmann
Package: mdadm
Version: 4.1-1
Severity: normal

Dear Maintainer,

The mdadm manpage lists --name under "For create, build, or grow". But
mdadm disagrees:

   # mdadm --grow /dev/md127 --name raid1
   mdadm: :option --name not valid in grow mode

-- Package-specific info:
--- mdadm.conf
CREATE owner=root group=disk mode=0660 auto=yes
HOMEHOST 
MAILADDR root

--- /etc/default/mdadm
AUTOCHECK=true
START_DAEMON=true
DAEMON_OPTIONS="--syslog"
VERBOSE=false

--- /proc/mdstat:
Personalities : [raid6] [raid5] [raid4] [linear] [multipath] [raid0] [raid1] 
[raid10] 
unused devices: 

--- /proc/partitions:
major minor  #blocks  name

   80 1953514584 sda
   81 262144 sda1
   82 1782579200 sda2
   83  170672199 sda3
   8   16  117220824 sdb
   8   17 102400 sdb1
   8   18  117117383 sdb2
   8   32  488386584 sdc
   8   48 2930266582 sdd
   8   49   1007 sdd1
   8   50 262143 sdd2
   8   51 2930002944 sdd3
   8   64 58595475456 sde
   8   65 58595474415 sde1
 2530  838860800 dm-0
 2531  536870912 dm-1
 2532 262144 dm-2
 2533 57756610560 dm-3
 2534 57756610560 dm-4
 2535  536870912 dm-5
 2536  536854528 dm-6
 2537  838844416 dm-7
 2538   25165824 dm-8
 25391048576 dm-9
 253   10  209715200 dm-10
 253   11   25165824 dm-11
 253   12 57756610560 dm-12
 253   13  209715200 dm-13

--- LVM physical volumes:
  PV VG Fmt  Attr PSize  PFree   
  /dev/sda2  vg_cerebro lvm2 a--   1.66t <450.50g
  /dev/sde1  vg_cerebro lvm2 a--  54.57t   0 
--- mount output
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs 
(rw,nosuid,relatime,size=8143448k,nr_inodes=2035862,mode=755)
devpts on /dev/pts type devpts 
(rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=1633596k,mode=755)
/dev/mapper/cryptroot on / type btrfs 
(rw,noatime,nossd,space_cache,subvolid=257,subvol=/rootfs)
securityfs on /sys/kernel/security type securityfs 
(rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup2 on /sys/fs/cgroup/unified type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate)
cgroup on /sys/fs/cgroup/systemd type cgroup 
(rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,relatime)
none on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
cgroup on /sys/fs/cgroup/freezer type cgroup 
(rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/devices type cgroup 
(rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/cpuset type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/hugetlb type cgroup 
(rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup 
(rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup 
(rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/perf_event type cgroup 
(rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/memory type cgroup 
(rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/blkio type cgroup 
(rw,nosuid,nodev,noexec,relatime,blkio)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs 
(rw,relatime,fd=44,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=21807)
mqueue on /dev/mqueue type mqueue (rw,relatime)
nfsd on /proc/fs/nfsd type nfsd (rw,relatime)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)
/dev/mapper/cryptroot on /cryptroot type btrfs 
(rw,noatime,nossd,space_cache,subvolid=5,subvol=/)
/dev/mapper/vg_cerebro-boot on /boot type ext4 (rw,noatime)
/dev/sda1 on /boot/efi type vfat 
(rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
/dev/mapper/cryptlocalvol on /cryptlocalvol type btrfs 
(rw,relatime,nossd,discard,space_cache,subvolid=5,subvol=/)
/dev/mapper/cryptlocalvol on /localvol type btrfs 
(rw,relatime,nossd,discard,space_cache,subvolid=257,subvol=/rootfs)
tracefs on /sys/kernel/debug/tracing type tracefs (rw,relatime)
/etc/auto.

Processing of meanwhile_1.0.2-10_source.changes

2020-06-16 Thread Debian FTP Masters
meanwhile_1.0.2-10_source.changes uploaded successfully to localhost
along with the files:
  meanwhile_1.0.2-10.dsc
  meanwhile_1.0.2-10.debian.tar.xz
  meanwhile_1.0.2-10_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



meanwhile_1.0.2-10_source.changes ACCEPTED into unstable

2020-06-16 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 16 Jun 2020 11:57:40 -0400
Source: meanwhile
Architecture: source
Version: 1.0.2-10
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Boyuan Yang 
Changes:
 meanwhile (1.0.2-10) unstable; urgency=medium
 .
   * QA upload.
   * debian/control:
 + Update Vcs-* fields to use git packaging repo under Salsa Debian
   Group.
 + Bump debhelper compat to v13.
 + Bump Standards-Version to 4.5.0.
 + Use new homepage on GitHub.
   * debian/watch: Monitor releases on GitHub.
Checksums-Sha1:
 ed3b6effebbf912a744d12188efdcd69f25c2634 1946 meanwhile_1.0.2-10.dsc
 dd5dc623ea6862bfbd463491623851381602b3ad 9284 meanwhile_1.0.2-10.debian.tar.xz
 170281f6ffd094f60240ae3914e73f83c57efa08 7151 
meanwhile_1.0.2-10_amd64.buildinfo
Checksums-Sha256:
 3a1ee3bd1e1bbba1bd260e7d0a5fa309109b6dea8fcbfbe671f0bcba43a976b0 1946 
meanwhile_1.0.2-10.dsc
 22a42f93cc037ee478e61995098b0710778f8ab81185e5193e8addeef4b1c680 9284 
meanwhile_1.0.2-10.debian.tar.xz
 8231fc4a708fbaee70c47457040bdc391f3e97a1fc28cd66c62f196e02355da2 7151 
meanwhile_1.0.2-10_amd64.buildinfo
Files:
 f0719954b13f34a3a0184bc73e9b08cd 1946 net optional meanwhile_1.0.2-10.dsc
 63add9704e4ec5c3f970c45f7c8e7ad2 9284 net optional 
meanwhile_1.0.2-10.debian.tar.xz
 ef6d60cf63ff489167ea8588d2971d00 7151 net optional 
meanwhile_1.0.2-10_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=WEtY
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of safelease_1.0-3_source.changes

2020-06-16 Thread Debian FTP Masters
safelease_1.0-3_source.changes uploaded successfully to localhost
along with the files:
  safelease_1.0-3.dsc
  safelease_1.0-3.debian.tar.xz
  safelease_1.0-3_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



safelease_1.0-3_source.changes ACCEPTED into unstable

2020-06-16 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 13 Jun 2020 22:17:06 +
Source: safelease
Architecture: source
Version: 1.0-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Francisco Vilmar Cardoso Ruviaro 
Changes:
 safelease (1.0-3) unstable; urgency=medium
 .
   * QA upload.
   * Using new DH level format. Consequently:
   - debian/compat: removed.
   - debian/control: changed from 'debhelper' to 'debhelper-compat' in
 Build-Depends field and bumped level to 13.
   * debian/control:
   - Added 'Rules-Requires-Root: no' to source stanza.
   - Added VCS fields to use Salsa.
   - Added Homepage field.
   - Bumped Standards Version to 4.5.0.
   - Changed the priority from extra to optional.
   - Removed 'dh-autoreconf, autotools-dev' from Build-Depends field.
   - Reorganized file content.
   * debian/copyright:
   - Updated links to use HTTPS protocol.
   - Updated packaging copyright.
   * debian/rules:
   - Added DEB_BUILD_MAINT_OPTIONS variable to improve GCC hardening.
   - Removed '--with autotools-dev,autoreconf'.
   * debian/salsa-ci.yml:
   - Added to provide CI tests for Salsa.
   * debian/watch: added.
Checksums-Sha1:
 7815edabc0248e115f066f788f3fd9b4d9d53e22 1853 safelease_1.0-3.dsc
 b01bc5221d94d82a84d1b07504ae25f230d78231 2344 safelease_1.0-3.debian.tar.xz
 1a1805ab405644d44ddf204e37cd1d636f7b38eb 5734 safelease_1.0-3_amd64.buildinfo
Checksums-Sha256:
 4361d131efb3127bcd3106c43cf614e44c351142a316d448e55908cf545a384a 1853 
safelease_1.0-3.dsc
 08b2ebde47ca9e900ad93e3dd882bb7f77b3d2e496471c68a9cd4e1b4253d417 2344 
safelease_1.0-3.debian.tar.xz
 f592c15ea6ad8c17302c331d459b4ab8cc1d4d31693fe09e51144240f0a42867 5734 
safelease_1.0-3_amd64.buildinfo
Files:
 f43bb594564a5bfa1789cca37de268bc 1853 misc optional safelease_1.0-3.dsc
 87287bf13af7afbe197d0922d4a272da 2344 misc optional 
safelease_1.0-3.debian.tar.xz
 e0cb2c47363c41de6f08245623ce7f1c 5734 misc optional 
safelease_1.0-3_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=ePFk
-END PGP SIGNATURE-


Thank you for your contribution to Debian.