Processing of gpac_2.2.1+dfsg1-2_source.changes

2023-09-13 Thread Debian FTP Masters
gpac_2.2.1+dfsg1-2_source.changes uploaded successfully to localhost
along with the files:
  gpac_2.2.1+dfsg1-2.dsc
  gpac_2.2.1+dfsg1-2.debian.tar.xz
  gpac_2.2.1+dfsg1-2_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



gpac_2.2.1+dfsg1-2_source.changes ACCEPTED into unstable

2023-09-13 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 13 Sep 2023 14:56:05 +0800
Source: gpac
Architecture: source
Version: 2.2.1+dfsg1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Shengjing Zhu 
Closes: 1033116 1034187 1034732 1034890 1036701 1041380
Changes:
 gpac (2.2.1+dfsg1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group  (See #1038784)
   * Upload to unstable.
   * Backport patch to build with ffmpeg 6.0 (Closes: #1041380)
 .
 gpac (2.2.1+dfsg1-1) experimental; urgency=medium
 .
   * New upstream version,
 closes: #1033116, #1034732, #1034187, #1036701, #1034890
   * soname bump libgpac11 -> libgpac12
Checksums-Sha1:
 515d078cd5d15d313aee64dbd9f4e67cf8f3cef7 1792 gpac_2.2.1+dfsg1-2.dsc
 9d039fa233084402316bd9cb408c07e638b9e1d0 37648 gpac_2.2.1+dfsg1-2.debian.tar.xz
 701e4931c4284d79759357714aec8292f05c1236 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Checksums-Sha256:
 fec96c4cc0e5b24291bd9c057959f945bd70f3eff64e19059cebee6f4c71b5cc 1792 
gpac_2.2.1+dfsg1-2.dsc
 af3728f8e7f919a92f63013a2b8c77143202f68d2320fb1c3bede45696cb133b 37648 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 e1f7d5b34b614d5575a1935c714b3deef8e6a3f752888a5e1e793d13c0e842fd 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Files:
 97d4a6d4b6b9495e9d629076fdc3f00a 1792 graphics optional gpac_2.2.1+dfsg1-2.dsc
 59c4c28301588d18b2772b4d7d2c01d1 37648 graphics optional 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 13e61d51c866f3a27f2b029ed6e9b2b4 5325 graphics optional 
gpac_2.2.1+dfsg1-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQSRhdT1d2eu7mxV1B5/RPol6lUUywUCZQFiHAAKCRB/RPol6lUU
y1LPAP46U6+EIJ9QVlkB7/alzOVjS8rwJtv3AXCP8hiN1MQmzwD/eA+xNfWYmjYC
ttFLF72wb/NNs+Jvc+UX71Z/j73NJwQ=
=4Rgn
-END PGP SIGNATURE-



Processed: reopening 1034890

2023-09-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reopen 1034890
Bug #1034890 {Done: Shengjing Zhu } [src:gpac] gpac: 
CVE-2023-0841
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions gpac/2.2.1+dfsg1-2.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1034890: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034890
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reopening 1036701

2023-09-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reopen 1036701
Bug #1036701 {Done: Shengjing Zhu } [src:gpac] gpac: 
CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions gpac/2.2.1+dfsg1-2.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1036701: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reopening 1036701

2023-09-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701#17
> reopen 1036701
Bug #1036701 [src:gpac] gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 
CVE-2023-2840
Bug 1036701 is not marked as done; doing nothing.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1036701: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1051865: override: python3-fswrap:python/optional

2023-09-13 Thread Boyuan Yang
Package: ftp.debian.org
Control: affects -1 + src:python-fswrap
X-Debbugs-Cc: python-fsw...@packages.debian.org
User: ftp.debian@packages.debian.org
Usertags: override
Severity: normal

Dear Debian FTP Masters,

Currently, binary package python3-fswrap is of Priority: extra.

==
-> % apt-cache show python3-fswrap
Package: python3-fswrap
Source: python-fswrap
Version: 1.0.1-3
Installed-Size: 40
Maintainer: Debian QA Group 
Architecture: all
Depends: python3:any, python3-distutils
Description-en: unified object oriented interface to file system objects 
(Python 3)
 File system operations in Python are distributed across modules: os,
 os.path, fnmatch, shutil and distutils. This module attempts to make the
 right choices for common operations to provide a single interface.
 .
 This package is for Python 3.
Description-md5: 0c8e04b86160f0dcf956bcc6e269c9ae
Homepage: https://github.com/hyde/fswrap
Section: python
Priority: extra
Filename: pool/main/p/python-fswrap/python3-fswrap_1.0.1-3_all.deb
Size: 8636
MD5sum: 8ccc2076919b8c091a211283568f3c2b
SHA256: 9b2f19e80ae1af9641ea56072f8a9cbfa6dad6d6b6dffd5620ee6b2770d8d225


As in https://www.debian.org/doc/debian-policy/ch-archive.html#priorities ,
Priority: extra is now deprecated. Such priority is also not explicitly
specified in its debian/control file. As a result, please revert such
deprecated priority back to python/optional.

Since this package is orphaned, I believe no confirmation from the package
maintainer will be needed.

Thanks,
Boyuan Yang


signature.asc
Description: This is a digitally signed message part


Bug#1051866: gpac: CVE-2023-0770 CVE-2023-0760 CVE-2023-0358 CVE-2023-23145 CVE-2023-23144 CVE-2023-23143 CVE-2022-4202 CVE-2022-45343 CVE-2022-45283 CVE-2022-45202 CVE-2022-43045 CVE-2022-43044 CVE-

2023-09-13 Thread Salvatore Bonaccorso
Source: gpac
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi

Some of the CVEs in #1033116 seems to not have been addressed (and in
part were addressed in a DSA already). Here a fresh bug for the
remaining ones.

Hi,

The following vulnerabilities were published for gpac.

CVE-2023-0770[0]:
| Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to
| 2.2.


CVE-2023-0760[1]:
| Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to
| V2.1.0-DEV.


CVE-2023-0358[2]:
| Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.


CVE-2023-23145[3]:
| GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a
| memory leak in lsr_read_rare_full function.


CVE-2023-23144[4]:
| Integer overflow vulnerability in function Q_DecCoordOnUnitSphere
| file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master.


CVE-2023-23143[5]:
| Buffer overflow vulnerability in function avc_parse_slice in file
| media_tools/av_parsers.c. GPAC version 2.3-DEV-
| rev1-g4669ba229-master.


CVE-2022-4202[6]:
| A vulnerability, which was classified as problematic, was found in
| GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function
| lsr_translate_coords of the file laser/lsr_dec.c. The manipulation
| leads to integer overflow. It is possible to launch the attack
| remotely. The exploit has been disclosed to the public and may be
| used. The name of the patch is
| b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply
| a patch to fix this issue. VDB-214518 is the identifier assigned to
| this vulnerability.


CVE-2022-45343[7]:
| GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a
| heap use-after-free via the Q_IsTypeOn function at
| /gpac/src/bifs/unquantize.c.


CVE-2022-45283[8]:
| GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the
| smil_parse_time_list parameter at /scenegraph/svg_attributes.c.


CVE-2022-45202[9]:
| GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a
| stack overflow via the function dimC_box_read at
| isomedia/box_code_3gpp.c.


CVE-2022-43045[10]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_dump_vrml_sffield at
| /scene_manager/scene_dump.c.


CVE-2022-43044[11]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_isom_get_meta_item_info
| at /isomedia/meta.c.


CVE-2022-43043[12]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function BD_CheckSFTimeOffset at
| /bifs/field_decode.c.


CVE-2022-43042[13]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| heap buffer overflow via the function FixSDTPInTRAF at
| isomedia/isom_intern.c.


CVE-2022-43040[14]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| heap buffer overflow via the function gf_isom_box_dump_start_ex at
| /isomedia/box_funcs.c.


CVE-2022-43039[15]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function
| gf_isom_meta_restore_items_ref at /isomedia/meta.c.


CVE-2022-3222[16]:
| Uncontrolled Recursion in GitHub repository gpac/gpac prior to
| 2.1.0-DEV.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-0770
https://www.cve.org/CVERecord?id=CVE-2023-0770
[1] https://security-tracker.debian.org/tracker/CVE-2023-0760
https://www.cve.org/CVERecord?id=CVE-2023-0760
[2] https://security-tracker.debian.org/tracker/CVE-2023-0358
https://www.cve.org/CVERecord?id=CVE-2023-0358
[3] https://security-tracker.debian.org/tracker/CVE-2023-23145
https://www.cve.org/CVERecord?id=CVE-2023-23145
[4] https://security-tracker.debian.org/tracker/CVE-2023-23144
https://www.cve.org/CVERecord?id=CVE-2023-23144
[5] https://security-tracker.debian.org/tracker/CVE-2023-23143
https://www.cve.org/CVERecord?id=CVE-2023-23143
[6] https://security-tracker.debian.org/tracker/CVE-2022-4202
https://www.cve.org/CVERecord?id=CVE-2022-4202
[7] https://security-tracker.debian.org/tracker/CVE-2022-45343
https://www.cve.org/CVERecord?id=CVE-2022-45343
[8] https://security-tracker.debian.org/tracker/CVE-2022-45283
https://www.cve.org/CVERecord?id=CVE-2022-45283
[9] https://security-tracker.debian.org/tracker/CVE-2022-45202
https://www.cve.org/CVERecord?id=CVE-2022-45202
[10] https://security-tracker.debian.org/tracker/CVE-2022-43045
https://www.cve.org/CVERecord?id=CVE-2022-43045
[11] https://security-tracker.debian.org/tracker/CVE-2022-43044
https://www.cve.org/CVERecord?id=CVE-2022-43044
[12] https://security-tracker.debian.org/tracker/CVE-2022-43043
https://www.cve.org/CVERecord?id=CVE

Processing of ghostscript_10.02.0~dfsg-1_source.changes

2023-09-13 Thread Debian FTP Masters
ghostscript_10.02.0~dfsg-1_source.changes uploaded successfully to localhost
along with the files:
  ghostscript_10.02.0~dfsg-1.dsc
  ghostscript_10.02.0~dfsg.orig.tar.xz
  ghostscript_10.02.0~dfsg-1.debian.tar.xz
  ghostscript_10.02.0~dfsg-1_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



ghostscript_10.02.0~dfsg-1_source.changes ACCEPTED into unstable

2023-09-13 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 20:18:16 +0200
Source: ghostscript
Architecture: source
Version: 10.02.0~dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Jonas Smedegaard 
Changes:
 ghostscript (10.02.0~dfsg-1) unstable; urgency=medium
 .
   * QA upload
 .
   [ upstream ]
   * new release(s)
 .
   [ Jonas Smedegaard ]
   * update copyright info: update coverage
   * refresh patches;
 update DEP-3 patch headers
   * drop obsolete binary packages ghostscript-x libgs9-common;
 have binary package ghostscript provide ghostscript-x
Checksums-Sha1:
 d33fc1dc2aee11ca7be4a30675b89d0138a89cf4 2715 ghostscript_10.02.0~dfsg-1.dsc
 d6b85ff5e0606fd225b4375fd18b4e0cc41d21d6 30068208 
ghostscript_10.02.0~dfsg.orig.tar.xz
 08ebb1c351b433c5799efa85ffe2ac3a0846720c 83288 
ghostscript_10.02.0~dfsg-1.debian.tar.xz
 8f5ad2a2616066eea44acd9fbd5f83015938ff56 14534 
ghostscript_10.02.0~dfsg-1_amd64.buildinfo
Checksums-Sha256:
 ef469f2c7aa395e99c1d27ec17923b384035d31e4d5faf1e4dbf4b807ec4c67d 2715 
ghostscript_10.02.0~dfsg-1.dsc
 f5f50b8791c864f659dffb5664d558d648dcd451866a575f9fe9809d3c46 30068208 
ghostscript_10.02.0~dfsg.orig.tar.xz
 220678495cce56776fc1acc8d75dc1650eb04c7e992b47432a83fd689ab0d8f0 83288 
ghostscript_10.02.0~dfsg-1.debian.tar.xz
 da94bbb42a062e48cf7f4822a4b12e3dc695e3a74dfb9bcc794d5aa50fd60eda 14534 
ghostscript_10.02.0~dfsg-1_amd64.buildinfo
Files:
 7c8dbedd6b6d8c3ca53688b7f4cf86ed 2715 text optional 
ghostscript_10.02.0~dfsg-1.dsc
 fa3591bdc3963957441b0d2aa0806478 30068208 text optional 
ghostscript_10.02.0~dfsg.orig.tar.xz
 25fed449aac908a93ada933ee0ebbfce 83288 text optional 
ghostscript_10.02.0~dfsg-1.debian.tar.xz
 9b3b253e47979b0feab1d91430b145f3 14534 text optional 
ghostscript_10.02.0~dfsg-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=TUxQ
-END PGP SIGNATURE-



Re: Accepted ghostscript 10.02.0~dfsg-1 (source) into unstable

2023-09-13 Thread Salvatore Bonaccorso
Source: ghostscript
Source-Version: 10.02.0~dfsg-1

On Wed, Sep 13, 2023 at 09:21:09PM +, Debian FTP Masters wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Format: 1.8
> Date: Wed, 13 Sep 2023 20:18:16 +0200
> Source: ghostscript
> Architecture: source
> Version: 10.02.0~dfsg-1
> Distribution: unstable
> Urgency: medium
> Maintainer: Debian QA Group 
> Changed-By: Jonas Smedegaard 
> Changes:
>  ghostscript (10.02.0~dfsg-1) unstable; urgency=medium
>  .
>* QA upload
>  .
>[ upstream ]
>* new release(s)

This should address as well CVE-2023-38559 / #1043033 . 

Closing with the fixed version accordingly.

Regards,
Salvatore



Processing of ghostscript_10.02.0~dfsg-2_source.changes

2023-09-13 Thread Debian FTP Masters
ghostscript_10.02.0~dfsg-2_source.changes uploaded successfully to localhost
along with the files:
  ghostscript_10.02.0~dfsg-2.dsc
  ghostscript_10.02.0~dfsg-2.debian.tar.xz
  ghostscript_10.02.0~dfsg-2_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1043033: marked as done (ghostscript: CVE-2023-38559)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 07:08:21 +0200
with message-id 
and subject line Re: Accepted ghostscript 10.02.0~dfsg-1 (source) into unstable
has caused the Debian Bug report #1043033,
regarding ghostscript: CVE-2023-38559
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1043033: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ghostscript
Version: 10.01.2~dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=706897
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 10.0.0~dfsg-11+deb12u1
Control: found -1 10.0.0~dfsg-11
Control: found -1 9.53.3~dfsg-7+deb11u5
Control: found -1 9.53.3~dfsg-7

Hi,

The following vulnerability was published for ghostscript.

CVE-2023-38559[0]:
| A buffer overflow flaw was found in base/gdevdevn.c:1973 in
| devn_pcx_write_rle() in ghostscript. This issue may allow a local
| attacker to cause a denial of service via outputting a crafted PDF
| file for a DEVN device with gs.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-38559
https://www.cve.org/CVERecord?id=CVE-2023-38559
[1] https://bugs.ghostscript.com/show_bug.cgi?id=706897 (private)
[2] 
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1fb9991bb95f1201abb5dea55f57f

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: ghostscript
Source-Version: 10.02.0~dfsg-1

On Wed, Sep 13, 2023 at 09:21:09PM +, Debian FTP Masters wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Format: 1.8
> Date: Wed, 13 Sep 2023 20:18:16 +0200
> Source: ghostscript
> Architecture: source
> Version: 10.02.0~dfsg-1
> Distribution: unstable
> Urgency: medium
> Maintainer: Debian QA Group 
> Changed-By: Jonas Smedegaard 
> Changes:
>  ghostscript (10.02.0~dfsg-1) unstable; urgency=medium
>  .
>* QA upload
>  .
>[ upstream ]
>* new release(s)

This should address as well CVE-2023-38559 / #1043033 . 

Closing with the fixed version accordingly.

Regards,
Salvatore--- End Message ---


ghostscript_10.02.0~dfsg-2_source.changes ACCEPTED into unstable

2023-09-13 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 14 Sep 2023 06:37:04 +0200
Source: ghostscript
Architecture: source
Version: 10.02.0~dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Jonas Smedegaard 
Changes:
 ghostscript (10.02.0~dfsg-2) unstable; urgency=medium
 .
   * QA upload
 .
   * declare that ghostscript replaces older ghostscript-x
Checksums-Sha1:
 9292e59e3a98932f22c62fa4267ba28cf902300b 2715 ghostscript_10.02.0~dfsg-2.dsc
 4ff3f1b1acfad3b048cf6824345222deea036c9a 83288 
ghostscript_10.02.0~dfsg-2.debian.tar.xz
 61982604f3b064b0b2da075f9f36cd824ac541c4 14542 
ghostscript_10.02.0~dfsg-2_amd64.buildinfo
Checksums-Sha256:
 032ce34e4900d0aa1896f60adfe97056ad8a627f531819348efb117b392508d3 2715 
ghostscript_10.02.0~dfsg-2.dsc
 8c91134507e488a3c52227e466f9858930f1f79e3747cd37d1d41ba341dd1739 83288 
ghostscript_10.02.0~dfsg-2.debian.tar.xz
 da0c8637c91a10a5461b072d6f162cf74cae38027453f06afce39a67b430fb5b 14542 
ghostscript_10.02.0~dfsg-2_amd64.buildinfo
Files:
 e76b31d9bd5ea583a00ab805de75737e 2715 text optional 
ghostscript_10.02.0~dfsg-2.dsc
 dd8d84272635474aaddb77e71a316e13 83288 text optional 
ghostscript_10.02.0~dfsg-2.debian.tar.xz
 7cdd4ab7b887f6018e772b29f43f6070 14542 text optional 
ghostscript_10.02.0~dfsg-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=/NmG
-END PGP SIGNATURE-