Processing of libica_3.2.0-4_source.changes

2021-05-05 Thread Debian FTP Masters
libica_3.2.0-4_source.changes uploaded successfully to localhost
along with the files:
  libica_3.2.0-4.dsc
  libica_3.2.0-4.debian.tar.xz
  libica_3.2.0-4_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#987614: marked as done (libica FTBFS with gcc 10)

2021-05-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 May 2021 08:48:27 +
with message-id 
and subject line Bug#987614: fixed in libica 3.2.0-4
has caused the Debian Bug report #987614,
regarding libica FTBFS with gcc 10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
987614: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987614
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libica
Version: 3.2.0-3
Severity: serious
Tags: ftbfs

...
/usr/bin/ld: 
/tmp/ccGQQSb3.o:/home/bunk/build/libica-3.2.0/src/tests/libica_sha_test/./include/sha_tests.h:26:
 multiple definition of `silent'; 
/tmp/ccbkY0gZ.o:/home/bunk/build/libica-3.2.0/src/tests/libica_sha_test/./include/sha_tests.h:26:
 first defined here
/usr/bin/ld: 
/tmp/ccGQQSb3.o:/home/bunk/build/libica-3.2.0/src/tests/libica_sha_test/../testcase.h:17:
 multiple definition of `verbosity_'; 
/tmp/ccbkY0gZ.o:/home/bunk/build/libica-3.2.0/src/tests/libica_sha_test/../testcase.h:17:
 first defined here
collect2: error: ld returned 1 exit status
make[2]: *** [Makefile:523: all] Error 1
--- End Message ---
--- Begin Message ---
Source: libica
Source-Version: 3.2.0-4
Done: Jochen Sprickerhof 

We believe that the bug you reported is fixed in the latest version of
libica, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 987...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jochen Sprickerhof  (supplier of updated libica package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 05 May 2021 09:27:48 +0200
Source: libica
Architecture: source
Version: 3.2.0-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Jochen Sprickerhof 
Closes: 987614
Changes:
 libica (3.2.0-4) unstable; urgency=medium
 .
   * QA upload.
   * Add multiple_defines.patch, fixes a FTBFS with gcc 10 (Closes: 987614).
   * Update homepage field.
Checksums-Sha1:
 f16930be9243e2439cd59c6e8561c0e52e8f3c38 1914 libica_3.2.0-4.dsc
 0759a0b063cc22ec4905162e84f8df39a214b71f 8244 libica_3.2.0-4.debian.tar.xz
 2cd871f7dc221a650d0d5d3a115689559d8da79a 6027 libica_3.2.0-4_source.buildinfo
Checksums-Sha256:
 846b20270321e16b7812d359cbdbbebde6cb4e8bedf8826bf8b35b0cb33ef660 1914 
libica_3.2.0-4.dsc
 8a8200522f1440e0ef903d2211f8dd68b8cf26a252203b707d09a21d41726131 8244 
libica_3.2.0-4.debian.tar.xz
 3f786d2d416b34ca6d04ec31b8aafd6c784171bd1d18e90e9f8c4210e72f6f29 6027 
libica_3.2.0-4_source.buildinfo
Files:
 b9b7c79598a389e1d20b494b5f89a7b8 1914 libs optional libica_3.2.0-4.dsc
 e5a80500e3bc28bf5b53968cc4dbb396 8244 libs optional 
libica_3.2.0-4.debian.tar.xz
 68bd83dde94f076bdefb16acdd2f657f 6027 libs optional 
libica_3.2.0-4_source.buildinfo

-BEGIN PGP SIGNATURE-
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=YD7K
-END PGP SIGNATURE End Message ---


libica_3.2.0-4_source.changes ACCEPTED into unstable

2021-05-05 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 05 May 2021 09:27:48 +0200
Source: libica
Architecture: source
Version: 3.2.0-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Jochen Sprickerhof 
Closes: 987614
Changes:
 libica (3.2.0-4) unstable; urgency=medium
 .
   * QA upload.
   * Add multiple_defines.patch, fixes a FTBFS with gcc 10 (Closes: 987614).
   * Update homepage field.
Checksums-Sha1:
 f16930be9243e2439cd59c6e8561c0e52e8f3c38 1914 libica_3.2.0-4.dsc
 0759a0b063cc22ec4905162e84f8df39a214b71f 8244 libica_3.2.0-4.debian.tar.xz
 2cd871f7dc221a650d0d5d3a115689559d8da79a 6027 libica_3.2.0-4_source.buildinfo
Checksums-Sha256:
 846b20270321e16b7812d359cbdbbebde6cb4e8bedf8826bf8b35b0cb33ef660 1914 
libica_3.2.0-4.dsc
 8a8200522f1440e0ef903d2211f8dd68b8cf26a252203b707d09a21d41726131 8244 
libica_3.2.0-4.debian.tar.xz
 3f786d2d416b34ca6d04ec31b8aafd6c784171bd1d18e90e9f8c4210e72f6f29 6027 
libica_3.2.0-4_source.buildinfo
Files:
 b9b7c79598a389e1d20b494b5f89a7b8 1914 libs optional libica_3.2.0-4.dsc
 e5a80500e3bc28bf5b53968cc4dbb396 8244 libs optional 
libica_3.2.0-4.debian.tar.xz
 68bd83dde94f076bdefb16acdd2f657f 6027 libs optional 
libica_3.2.0-4_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJIBAEBCgAyFiEEc7KZy9TurdzAF+h6W//cwljmlDMFAmCSVPcUHGpzcHJpY2tl
QGRlYmlhbi5vcmcACgkQW//cwljmlDOfpxAAlFuxm20ghfVAhIZ5fLWLOP0Fga2W
b+8UT0N0gEji2Vh5f8hLCFCiknTH1FWFa6xsinVzC4DW0Vwf3I5R/ERH/wIJ3igB
uN7BbcC96J05K4CjM5rHNziFXkPW9XUQ+lEq7BfzkavkL9dnSF7YWnfyW8A8vr3q
qmj9KqpkdUbJQwVQcAecvzfXEWW3VjF8tjoLjzl8p+ku7938mD61gjsmUnxTQrik
ezGCu9yerrPxbWY/xA25BkrU6drEVDzxuyDTnoLGcKFUmW7V8Xg11pwA+77AmQvU
+iIomy5qoeXBhc9z00hxnUNrlVPyfxMfsWd7+FkrUVFjDHIAz7J7RidWyh6nLpMu
Y5WGSLOGKkQKLWKksrABd6eYi3Yp1aqzkMjpLzPQD0Gp9OL/9h95rDZyJhjsv2iz
JuCT0x0gfuydw7thXxJ8OOlPw5Bq7DheKP/3mIyUfVf0ICEmbBThLQcrN8GKIg7x
wjp/gS6CFt2dw/wQJ2Za4J/7vK0+NVZhUu8nY+hY5YcNUzP/3M/3GQ5uTO6EePDn
a/2ZXakZzcTBqbVNY0aB5xHSRGTf863WrGf+Hrt7dXrGUw4Kuq+heC8hHsV8nteo
R3oQuxRtx7pvD6Dvt+hLFG73obdL9nOMLranWxpNi5CVbV7NUFmSa98SIPt3E1MP
S4V/pVUjnmDGpUY=
=YD7K
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#988090: planned removal of db5.3 will break python's dbm.ndbm and therefore apt-listchanges

2021-05-05 Thread Matthias Klose
Package: src:apt-listchanges
Version: 3.24
Severity: important
Tags: sid bookworm

The planned removal of db5.3 will break python's dbm.ndbm and therefore
apt-listchanges.  So either use dbm directly, or use another database.  Note
that the next Debian release (bookworm) will not ship dbm.ndbm.  There won't be
a possibility to read that database anymore.



Processing of pev_0.81-3_source.changes

2021-05-05 Thread Debian FTP Masters
pev_0.81-3_source.changes uploaded successfully to localhost
along with the files:
  pev_0.81-3.dsc
  pev_0.81-3.debian.tar.xz
  pev_0.81-3_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#987959: marked as done (pev: peres affected by off-by-one error in libpe)

2021-05-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 May 2021 12:33:36 +
with message-id 
and subject line Bug#987959: fixed in pev 0.81-3
has caused the Debian Bug report #987959,
regarding pev: peres affected by off-by-one error in libpe
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
987959: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987959
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: pev
Version: 0.81-2
Severity: grave
Tags: patch security
Justification: user security hole
X-Debbugs-Cc: benoit.sev...@gmail.com, Debian Security Team 


Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***

libpe has an off-by-one error which is fixed upstream. libpe is included in the 
pev package. peres calls functions within libpe. Running peres on certain files 
triggers the off-by-one error. Applying the patch fixes the issue.

-- System Information:
Debian Release: rodete
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.26-1rodete1-amd64 (SMP w/6 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages pev depends on:
ii  libc6  2.31-11
ii  libssl1.1  1.1.1k-1

pev recommends no packages.

pev suggests no packages.

-- no debconf information
>From 5737a97c57be175333fc0c6f51bb2cdd7101c17e Mon Sep 17 00:00:00 2001
From: Jardel Weyrich 
Date: Mon, 18 Jan 2021 22:03:49 -0300
Subject: [PATCH] utils: Fix off-by-one error in pe_utils_str_widechar2ascii.

---
 utils.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/utils.c b/utils.c
index bd2da84..f05ba67 100644
--- a/utils.c
+++ b/utils.c
@@ -132,7 +132,7 @@ char *pe_utils_str_array_join(char *strings[], size_t 
count, char delimiter) {
 
 void pe_utils_str_widechar2ascii(char *output, const char *widechar, size_t 
length) {
// quick & dirty UFT16 to ASCII conversion
-   for (size_t p = 0; p <= length; p++) {
+   for (size_t p = 0; p < length; p++) {
memcpy(output + p, (uint16_t *)(widechar) + p, 1);
}
 }
>From 5737a97c57be175333fc0c6f51bb2cdd7101c17e Mon Sep 17 00:00:00 2001
From: Jardel Weyrich 
Date: Mon, 18 Jan 2021 22:03:49 -0300
Subject: [PATCH] utils: Fix off-by-one error in pe_utils_str_widechar2ascii.

---
 utils.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/utils.c b/utils.c
index bd2da84..f05ba67 100644
--- a/utils.c
+++ b/utils.c
@@ -132,7 +132,7 @@ char *pe_utils_str_array_join(char *strings[], size_t 
count, char delimiter) {
 
 void pe_utils_str_widechar2ascii(char *output, const char *widechar, size_t 
length) {
// quick & dirty UFT16 to ASCII conversion
-   for (size_t p = 0; p <= length; p++) {
+   for (size_t p = 0; p < length; p++) {
memcpy(output + p, (uint16_t *)(widechar) + p, 1);
}
 }
>From 5737a97c57be175333fc0c6f51bb2cdd7101c17e Mon Sep 17 00:00:00 2001
From: Jardel Weyrich 
Date: Mon, 18 Jan 2021 22:03:49 -0300
Subject: [PATCH] utils: Fix off-by-one error in pe_utils_str_widechar2ascii.

---
 utils.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/utils.c b/utils.c
index bd2da84..f05ba67 100644
--- a/utils.c
+++ b/utils.c
@@ -132,7 +132,7 @@ char *pe_utils_str_array_join(char *strings[], size_t 
count, char delimiter) {
 
 void pe_utils_str_widechar2ascii(char *output, const char *widechar, size_t 
length) {
// quick & dirty UFT16 to ASCII conversion
-   for (size_t p = 0; p <= length; p++) {
+   for (size_t p = 0; p < length; p++) {
memcpy(output + p, (uint16_t *)(widechar) + p, 1);
}
 }
--- End Message ---
--- Begin Message ---
Source: pev
Source-Version: 0.81-3
Done: Petter Reinholdtsen 

We believe that the bug you reported is fixed in the latest version of
pev, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 987...@bugs.debian.org,
and the maintainer will reopen the bug 

Bug#987959: pev: peres affected by off-by-one error in libpe

2021-05-05 Thread Petter Reinholdtsen
I've asked upstream if this is a security issue, and if so, what its CVE
is, in https://github.com/merces/libpe/issues/34 >.

As far as I can tell, it is writing past the assigned buffer, which
might be a security issue.

-- 
Happy hacking
Petter Reinholdtsen



pev_0.81-3_source.changes ACCEPTED into unstable

2021-05-05 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 05 May 2021 14:09:18 +0200
Source: pev
Architecture: source
Version: 0.81-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Petter Reinholdtsen 
Closes: 987959
Changes:
 pev (0.81-3) unstable; urgency=medium
 .
   * QA upload.
   * Avoid off-by-one error in libpe pe_utils_str_widechar2ascii()
 (Closes: #987959)
   * Extended autopkgtest to report if the Windows EXE file is missing.
Checksums-Sha1:
 37d3db1087419c0268bf35dc1cd81f84b6a50fc4 1829 pev_0.81-3.dsc
 c496b9c03609ab8c7eb93093aed6e0a864f6dcf8 4388 pev_0.81-3.debian.tar.xz
 58ed1750c4ac1a6451b24361c385e0a84e03db23 6442 pev_0.81-3_source.buildinfo
Checksums-Sha256:
 1c1a31d06efc9d3b991b0181deda31a434b10964b417cdbf47f733623df51585 1829 
pev_0.81-3.dsc
 94d7965d310ea7d993c73d17d041bbd5d517abd5b11caef45dd8be7204719835 4388 
pev_0.81-3.debian.tar.xz
 a390167ba5ab5bc7fc0782f0ce3ed79f03969c68ff1a497f3ddd286ca5a3e0a0 6442 
pev_0.81-3_source.buildinfo
Files:
 3e4da4a90cc1aa186d5a1b63b17f8767 1829 utils optional pev_0.81-3.dsc
 01f70866f9ad1863a805822dc210f77f 4388 utils optional pev_0.81-3.debian.tar.xz
 3ee2ad67acd6097653985ce67d512cf5 6442 utils optional 
pev_0.81-3_source.buildinfo

-BEGIN PGP SIGNATURE-
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=DXyX
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Can I ask you a question ?

2021-05-05 Thread Linda Taylor
Hey,



Hope I’m not bugging you. I just wanted to make sure my email doesn’t get
lost in your inbox.

Did you have a chance to check out my email before?



If you’re interested, just let me know.



Thanks so much,

Linda


click here to stop hearing from us



On Thu, Apr 8, 2021 10:38 AM, Linda Taylor 
wrote:

> Hey again
>
> I'd offer to help with your website...
>
>
>
> ...but it's not really my ‘domain’.
>
>
>
> Just checking to see if you’ve had a chance to read my message before. If
> you could let me know, it’d be most appreciated.
>
>
>
> Hope you’re doing good.
>
>
> Thanks in advance,
>
> Linda
>
>
> click here to stop hearing from us
> 
> On Tue, Mar 16, 2021 4:33 AM, Linda Taylor 
> wrote:
>
>> Hey there,
>>
>>
>>
>> My name’s Linda. Hope you’re doing well right now. I work with Spectral
>> Core and just wanted to ask you a quick question.
>>
>>
>>
>> I was browsing your site and noticed mentioned ORM at
>> https://qa.debian.org/cgi-bin/watch?pkg=doctrine
>>
>>
>>
>> I find it interesting because we actually have a similar guide on our
>> site.
>>
>>
>>
>> If you could just take a sec and check out our article about A Case for
>> ORM, a Case Against ORM, I was hoping you might be able to link to it?
>>
>>
>>
>> https://www.spectralcore.com/blog/a-case-for-orm-a-case-against-orm/
>>
>>
>>
>> In return, we can provide you a backlink from one of our partner sites.
>>
>>
>>
>> Thanks so much,
>>
>> Linda
>>
>> P.S. What's the most popular top-level domain in Mordor?
>>
>>
>>
>> .orc
>>
>>
>> click here to stop hearing from us
>> 
>>
> [image: picture] [image: logo]