Processed: retitle 1053019 to coco-java: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-09-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 1053019 coco-java: FTBFS with OpenJDK 21 due to unsupported javac 
> source/target level 7
Bug #1053019 [src:coco-java] coco-java: FTBFS with default Java 21
Changed Bug title to 'coco-java: FTBFS with OpenJDK 21 due to unsupported javac 
source/target level 7' from 'coco-java: FTBFS with default Java 21'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1053019: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053019
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: retitle 1053018 to closure-compiler: FTBFS with OpenJDK 21 due to javadoc errors

2023-09-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 1053018 closure-compiler: FTBFS with OpenJDK 21 due to javadoc errors
Bug #1053018 [src:closure-compiler] closure-compiler: FTBFS with default Java 21
Changed Bug title to 'closure-compiler: FTBFS with OpenJDK 21 due to javadoc 
errors' from 'closure-compiler: FTBFS with default Java 21'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1053018: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053018
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of ghostscript_10.0.0~dfsg-11+deb12u2_source.changes

2023-09-29 Thread Debian FTP Masters
ghostscript_10.0.0~dfsg-11+deb12u2_source.changes uploaded successfully to 
localhost
along with the files:
  ghostscript_10.0.0~dfsg-11+deb12u2.dsc
  ghostscript_10.0.0~dfsg-11+deb12u2.debian.tar.xz
  ghostscript_10.0.0~dfsg-11+deb12u2_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



ghostscript_10.0.0~dfsg-11+deb12u2_source.changes ACCEPTED into proposed-updates->stable-new

2023-09-29 Thread Debian FTP Masters
Thank you for your contribution to Debian.

Mapping bookworm to stable.
Mapping stable to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 29 Sep 2023 14:33:30 +0200
Source: ghostscript
Architecture: source
Version: 10.0.0~dfsg-11+deb12u2
Distribution: bookworm
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Salvatore Bonaccorso 
Closes: 1043033
Changes:
 ghostscript (10.0.0~dfsg-11+deb12u2) bookworm; urgency=medium
 .
   * Non-maintainer upload.
   * Copy pcx buffer overrun fix from devices/gdevpcx.c (CVE-2023-38559)
 (Closes: #1043033)
   * IJS device - try and secure the IJS server startup (CVE-2023-43115)
Checksums-Sha1:
 a36dd604e265a585f35066817cd9fb6adb452ad8 3019 
ghostscript_10.0.0~dfsg-11+deb12u2.dsc
 7564abe828336f78229e65c2192fdfc71bb733a5 87996 
ghostscript_10.0.0~dfsg-11+deb12u2.debian.tar.xz
 28cc778cddc52864ce1475672159a88be1eccb12 7225 
ghostscript_10.0.0~dfsg-11+deb12u2_source.buildinfo
Checksums-Sha256:
 8a42d9e7c037612cd0079f5a3727a8f6bae9c797354046273d8d38b7aedee323 3019 
ghostscript_10.0.0~dfsg-11+deb12u2.dsc
 9e84aaa85d25dd525e70724554f68b37011e68c85c2e54119beb414dcce70bf5 87996 
ghostscript_10.0.0~dfsg-11+deb12u2.debian.tar.xz
 1b059057afd237a2473a833530223337069189393db0ad65212065657d1c4419 7225 
ghostscript_10.0.0~dfsg-11+deb12u2_source.buildinfo
Files:
 4c84a6f30c7c192c774312a9b4236108 3019 text optional 
ghostscript_10.0.0~dfsg-11+deb12u2.dsc
 a2b618cc53bdeef787d4c168fa764bb8 87996 text optional 
ghostscript_10.0.0~dfsg-11+deb12u2.debian.tar.xz
 62f2b9ac9de0320e8c89743fb6a41a02 7225 text optional 
ghostscript_10.0.0~dfsg-11+deb12u2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=syul
-END PGP SIGNATURE-



Bug#1053239: bookworm-pu: package ghostscript/10.0.0~dfsg-11+deb12u2

2023-09-29 Thread Salvatore Bonaccorso
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: ghostscr...@packages.debian.org, car...@debian.org
Control: affects -1 + src:ghostscript

Hi stable release managers,

[ Reason ]
Fix two CVEs which we did mark no-dsa (though one might after more
thinking be a candiate). Fix CVE-2023-38559 and CVE-2023-43115.

[ Impact ]
CVE-2023-38559 and CVE-2023-43115 would remain open so far.

[ Tests ]
Performed manual test for CVE-2023-43115.

[ Risks ]
Should be low, following the upstream commits to resolve the issues
which are very targeted.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Apply upstream fixes to address the CVEs. Adjust checks on input and
for the second issue, prevent PostScript programs switching to the IJS
device after SAFER has been activated (and prevent changes to the
IjsServer parameter after SAFER has been activated).

[ Other info ]
None.

Regards,
Salvatore
diff -Nru ghostscript-10.0.0~dfsg/debian/changelog 
ghostscript-10.0.0~dfsg/debian/changelog
--- ghostscript-10.0.0~dfsg/debian/changelog2023-07-02 10:50:27.0 
+0200
+++ ghostscript-10.0.0~dfsg/debian/changelog2023-09-29 14:33:30.0 
+0200
@@ -1,3 +1,12 @@
+ghostscript (10.0.0~dfsg-11+deb12u2) bookworm; urgency=medium
+
+  * Non-maintainer upload.
+  * Copy pcx buffer overrun fix from devices/gdevpcx.c (CVE-2023-38559)
+(Closes: #1043033)
+  * IJS device - try and secure the IJS server startup (CVE-2023-43115)
+
+ -- Salvatore Bonaccorso   Fri, 29 Sep 2023 14:33:30 +0200
+
 ghostscript (10.0.0~dfsg-11+deb12u1) bookworm-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru 
ghostscript-10.0.0~dfsg/debian/patches/0005-Bug-706897-Copy-pcx-buffer-overrun-fix-from-devices-.patch
 
ghostscript-10.0.0~dfsg/debian/patches/0005-Bug-706897-Copy-pcx-buffer-overrun-fix-from-devices-.patch
--- 
ghostscript-10.0.0~dfsg/debian/patches/0005-Bug-706897-Copy-pcx-buffer-overrun-fix-from-devices-.patch
  1970-01-01 01:00:00.0 +0100
+++ 
ghostscript-10.0.0~dfsg/debian/patches/0005-Bug-706897-Copy-pcx-buffer-overrun-fix-from-devices-.patch
  2023-09-29 14:17:17.0 +0200
@@ -0,0 +1,28 @@
+From: Chris Liddell 
+Date: Mon, 17 Jul 2023 14:06:37 +0100
+Subject: Bug 706897: Copy pcx buffer overrun fix from devices/gdevpcx.c
+Origin: 
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1fb9991bb95f1201abb5dea55f57f
+Bug-Debian: https://bugs.debian.org/1043033
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2023-38559
+
+Bounds check the buffer, before dereferencing the pointer.
+---
+ base/gdevdevn.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/base/gdevdevn.c b/base/gdevdevn.c
+index 7b14d9c712b4..6351fb77ac75 100644
+--- a/base/gdevdevn.c
 b/base/gdevdevn.c
+@@ -1983,7 +1983,7 @@ devn_pcx_write_rle(const byte * from, const byte * end, 
int step, gp_file * file
+ byte data = *from;
+ 
+ from += step;
+-if (data != *from || from == end) {
++if (from >= end || data != *from) {
+ if (data >= 0xc0)
+ gp_fputc(0xc1, file);
+ } else {
+-- 
+2.40.1
+
diff -Nru 
ghostscript-10.0.0~dfsg/debian/patches/0006-IJS-device-try-and-secure-the-IJS-server-startup.patch
 
ghostscript-10.0.0~dfsg/debian/patches/0006-IJS-device-try-and-secure-the-IJS-server-startup.patch
--- 
ghostscript-10.0.0~dfsg/debian/patches/0006-IJS-device-try-and-secure-the-IJS-server-startup.patch
  1970-01-01 01:00:00.0 +0100
+++ 
ghostscript-10.0.0~dfsg/debian/patches/0006-IJS-device-try-and-secure-the-IJS-server-startup.patch
  2023-09-29 14:22:09.0 +0200
@@ -0,0 +1,58 @@
+From: Ken Sharp 
+Date: Thu, 24 Aug 2023 15:24:35 +0100
+Subject: IJS device - try and secure the IJS server startup
+Origin: 
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8b0f20002536867bd73ff4552408a72597190cbe
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2023-43115
+
+Bug #707051 ""ijs" device can execute arbitrary commands"
+
+The problem is that the 'IJS' device needs to start the IJS server, and
+that is indeed an arbitrary command line. There is (apparently) no way
+to validate it. Indeed, this is covered quite clearly in the comments
+at the start of the source:
+
+ * WARNING: The ijs server can be selected on the gs command line
+ * which is a security risk, since any program can be run.
+
+Previously this used the awful LockSafetyParams hackery, which we
+abandoned some time ago because it simply couldn't be made secure (it
+was implemented in PostScript and was therefore vulnerable to PostScript
+programs).
+
+This commit prevents PostScript programs switching to the IJS device
+after SAFER has be

Bug#1053240: bullseye-pu: package ghostscript/9.53.3~dfsg-7+deb11u6

2023-09-29 Thread Salvatore Bonaccorso
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: ghostscr...@packages.debian.org, car...@debian.org
Control: affects -1 + src:ghostscript

Hi stable release managers,

[ Reason ]
Fix two CVEs which we did mark no-dsa (though one might after more
thinking be a candiate). Fix CVE-2023-38559 and CVE-2023-43115.

[ Impact ]
CVE-2023-38559 and CVE-2023-43115 would remain open so far.

[ Tests ]
Performed manual test for CVE-2023-43115.

[ Risks ]
Should be low, following the upstream commits to resolve the issues
which are very targeted.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
Apply upstream fixes to address the CVEs. Adjust checks on input and
for the second issue, prevent PostScript programs switching to the IJS
device after SAFER has been activated (and prevent changes to the
IjsServer parameter after SAFER has been activated).

[ Other info ]
None.

Regards,
Salvatore
diff -Nru ghostscript-9.53.3~dfsg/debian/changelog 
ghostscript-9.53.3~dfsg/debian/changelog
--- ghostscript-9.53.3~dfsg/debian/changelog2023-07-02 11:54:08.0 
+0200
+++ ghostscript-9.53.3~dfsg/debian/changelog2023-09-29 14:24:57.0 
+0200
@@ -1,3 +1,12 @@
+ghostscript (9.53.3~dfsg-7+deb11u6) bullseye; urgency=medium
+
+  * Non-maintainer upload.
+  * Copy pcx buffer overrun fix from devices/gdevpcx.c (CVE-2023-38559)
+(Closes: #1043033)
+  * IJS device - try and secure the IJS server startup (CVE-2023-43115)
+
+ -- Salvatore Bonaccorso   Fri, 29 Sep 2023 14:24:57 +0200
+
 ghostscript (9.53.3~dfsg-7+deb11u5) bullseye-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru ghostscript-9.53.3~dfsg/debian/patches/020230717~d81b82c.patch 
ghostscript-9.53.3~dfsg/debian/patches/020230717~d81b82c.patch
--- ghostscript-9.53.3~dfsg/debian/patches/020230717~d81b82c.patch  
1970-01-01 01:00:00.0 +0100
+++ ghostscript-9.53.3~dfsg/debian/patches/020230717~d81b82c.patch  
2023-09-29 14:24:57.0 +0200
@@ -0,0 +1,28 @@
+From: Chris Liddell 
+Date: Mon, 17 Jul 2023 14:06:37 +0100
+Subject: Bug 706897: Copy pcx buffer overrun fix from devices/gdevpcx.c
+Origin: 
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1fb9991bb95f1201abb5dea55f57f
+Bug-Debian: https://bugs.debian.org/1043033
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2023-38559
+
+Bounds check the buffer, before dereferencing the pointer.
+---
+ base/gdevdevn.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/base/gdevdevn.c b/base/gdevdevn.c
+index 7b14d9c712b4..6351fb77ac75 100644
+--- a/base/gdevdevn.c
 b/base/gdevdevn.c
+@@ -1983,7 +1983,7 @@ devn_pcx_write_rle(const byte * from, const byte * end, 
int step, gp_file * file
+ byte data = *from;
+ 
+ from += step;
+-if (data != *from || from == end) {
++if (from >= end || data != *from) {
+ if (data >= 0xc0)
+ gp_fputc(0xc1, file);
+ } else {
+-- 
+2.40.1
+
diff -Nru ghostscript-9.53.3~dfsg/debian/patches/020230824~8b0f200.patch 
ghostscript-9.53.3~dfsg/debian/patches/020230824~8b0f200.patch
--- ghostscript-9.53.3~dfsg/debian/patches/020230824~8b0f200.patch  
1970-01-01 01:00:00.0 +0100
+++ ghostscript-9.53.3~dfsg/debian/patches/020230824~8b0f200.patch  
2023-09-29 14:24:57.0 +0200
@@ -0,0 +1,53 @@
+From: Ken Sharp 
+Date: Thu, 24 Aug 2023 15:24:35 +0100
+Subject: IJS device - try and secure the IJS server startup
+Origin: 
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8b0f20002536867bd73ff4552408a72597190cbe
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2023-43115
+
+Bug #707051 ""ijs" device can execute arbitrary commands"
+
+The problem is that the 'IJS' device needs to start the IJS server, and
+that is indeed an arbitrary command line. There is (apparently) no way
+to validate it. Indeed, this is covered quite clearly in the comments
+at the start of the source:
+
+ * WARNING: The ijs server can be selected on the gs command line
+ * which is a security risk, since any program can be run.
+
+Previously this used the awful LockSafetyParams hackery, which we
+abandoned some time ago because it simply couldn't be made secure (it
+was implemented in PostScript and was therefore vulnerable to PostScript
+programs).
+
+This commit prevents PostScript programs switching to the IJS device
+after SAFER has been activated, and prevents changes to the IjsServer
+parameter after SAFER has been activated.
+
+SAFER is activated, unless explicitly disabled, before any user
+PostScript is executed which means that the device and the server
+invocation can only be configured on the command line. This does at
+least p

unadf is marked for autoremoval from testing

2023-09-29 Thread Debian testing autoremoval watch
unadf 0.7.11a-5 is marked for autoremoval from testing on 2023-10-13

It is affected by these RC bugs:
838248: unadf: CVE-2016-1243 and CVE-2016-1244
 https://bugs.debian.org/838248



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl