Bug#1074414: gpac: CVE-2024-6061 CVE-2024-6062 CVE-2024-6063 CVE-2024-6064

2024-06-28 Thread Moritz Mühlenhoff
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2024-6061[0]:
| A vulnerability has been found in GPAC 2.5-DEV-
| rev228-g11067ea92-master and classified as problematic. Affected by
| this vulnerability is the function isoffin_process of the file
| src/filters/isoffin_read.c of the component MP4Box. The manipulation
| leads to infinite loop. It is possible to launch the attack on the
| local host. The exploit has been disclosed to the public and may be
| used. The identifier of the patch is
| 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply
| a patch to fix this issue. The identifier VDB-268789 was assigned to
| this vulnerability.

https://github.com/gpac/gpac/issues/2871
https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c

CVE-2024-6062[1]:
| A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master
| and classified as problematic. Affected by this issue is the
| function swf_svg_add_iso_sample of the file src/filters/load_text.c
| of the component MP4Box. The manipulation leads to null pointer
| dereference. The attack needs to be approached locally. The exploit
| has been disclosed to the public and may be used. The patch is
| identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is
| recommended to apply a patch to fix this issue. VDB-268790 is the
| identifier assigned to this vulnerability.

https://github.com/gpac/gpac/issues/2872
https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd

CVE-2024-6063[2]:
| A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master.
| It has been classified as problematic. This affects the function
| m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component
| MP4Box. The manipulation leads to null pointer dereference. An
| attack has to be approached locally. The exploit has been disclosed
| to the public and may be used. The patch is named
| 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply
| a patch to fix this issue. The associated identifier of this
| vulnerability is VDB-268791.

https://github.com/gpac/gpac/issues/2873
https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5

CVE-2024-6064[3]:
| A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master.
| It has been declared as problematic. This vulnerability affects the
| function xmt_node_end of the file src/scene_manager/loader_xmt.c of
| the component MP4Box. The manipulation leads to use after free.
| Local access is required to approach this attack. The exploit has
| been disclosed to the public and may be used. The name of the patch
| is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf6
| 90567980d96662f5. It is recommended to apply a patch to fix this
| issue. The identifier of this vulnerability is VDB-268792.

https://github.com/gpac/gpac/issues/2874
https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6061
https://www.cve.org/CVERecord?id=CVE-2024-6061
[1] https://security-tracker.debian.org/tracker/CVE-2024-6062
https://www.cve.org/CVERecord?id=CVE-2024-6062
[2] https://security-tracker.debian.org/tracker/CVE-2024-6063
https://www.cve.org/CVERecord?id=CVE-2024-6063
[3] https://security-tracker.debian.org/tracker/CVE-2024-6064
https://www.cve.org/CVERecord?id=CVE-2024-6064

Please adjust the affected versions in the BTS as needed.



Bug#1064495: sitecopy FTBFS: incompatible neon version

2024-06-28 Thread Petter Reinholdtsen
Control: tags -1 + patch

[Helmut Grohne]
> Apparently, sitecopy is incompatible with neon >= 0.33. This quite
> definitely needs a sourceful upload of sitecopy.

This seem to be the fix, already applied several times for new versions
already:

diff --git a/debian/patches/31_Fix-various-issues.diff 
b/debian/patches/31_Fix-various-issues.diff
index 30cddf9..55932a2 100644
--- a/debian/patches/31_Fix-various-issues.diff
+++ b/debian/patches/31_Fix-various-issues.diff
@@ -849,8 +849,8 @@
  
 -# Support neon 0.24 through 0.30
 -NE_REQUIRE_VERSIONS([0], [24 25 26 27 28 29 30])
-+# Support neon 0.24 through 0.31
-+NE_REQUIRE_VERSIONS([0], [24 25 26 27 28 31 32])
++# Support neon 0.24 through 0.33
++NE_REQUIRE_VERSIONS([0], [24 25 26 27 28 31 32 33])
  
  dnl But we don't use zlib or ACL support
  NEON_WITHOUT_ZLIB


-- 
Happy hacking
Petter Reinholdtsen



Processed: Re: sitecopy FTBFS: incompatible neon version

2024-06-28 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + patch
Bug #1064495 [src:sitecopy] sitecopy FTBFS: incompatible neon version
Added tag(s) patch.

-- 
1064495: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064495
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



sitecopy_0.16.6-13_source.changes ACCEPTED into unstable

2024-06-28 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 28 Jun 2024 20:12:44 +0200
Source: sitecopy
Architecture: source
Version: 1:0.16.6-13
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Petter Reinholdtsen 
Closes: 1064495
Changes:
 sitecopy (1:0.16.6-13) unstable; urgency=medium
 .
   * QA upload.
 .
   * Updated 31_Fix-various-issues.diff to work with neon >= 0.33
 (Closes: #1064495).
Checksums-Sha1:
 6fe175471f77a7f58f33233f3ea1674b3e8ee42a 1906 sitecopy_0.16.6-13.dsc
 8870a8eb2953cf7b67c8ff5dbf7a0928471b394e 36788 sitecopy_0.16.6-13.debian.tar.xz
 b7e8e19881de87477905ad01ec28d40bba26fb2d 7488 
sitecopy_0.16.6-13_source.buildinfo
Checksums-Sha256:
 16aa7f7dd2b90d7340879e5a3f4872ed37d9dbc788baf05a90d4b04dfd228f13 1906 
sitecopy_0.16.6-13.dsc
 ad7e0264980624cf43c8bde55f91166aff3aa2ad07f907eea86760208104dba4 36788 
sitecopy_0.16.6-13.debian.tar.xz
 6b5d616c1bfede5254c6545e26455fc67cba6ff402d5320702ac74a32ecdbbfc 7488 
sitecopy_0.16.6-13_source.buildinfo
Files:
 48288d534db5ddfc5e5f74c6a64cd4cd 1906 web optional sitecopy_0.16.6-13.dsc
 207b5b115faa73c7400bfaa2eebbb705 36788 web optional 
sitecopy_0.16.6-13.debian.tar.xz
 eaa4df697891ec694653c40485352001 7488 web optional 
sitecopy_0.16.6-13_source.buildinfo

-BEGIN PGP SIGNATURE-
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=UpC/
-END PGP SIGNATURE-



pgpHIFiBThZGL.pgp
Description: PGP signature


Bug#1064495: marked as done (sitecopy FTBFS: incompatible neon version)

2024-06-28 Thread Debian Bug Tracking System
Your message dated Fri, 28 Jun 2024 18:37:51 +
with message-id 
and subject line Bug#1064495: fixed in sitecopy 1:0.16.6-13
has caused the Debian Bug report #1064495,
regarding sitecopy FTBFS: incompatible neon version
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1064495: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064495
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: sitecopy
Version: 1:0.16.6-11
Severity: serious
Tags: ftbfs

sitecopy fails to build from source in unstable. I think the relevant
part of the build log is:

| checking for neon-config... /usr/bin/neon-config
| checking linking against neon... yes
| configure: incompatible neon library version 0.33.0: wanted 0.24 25 26 27 28 
31 32
| configure: error: could not use external neon library
|   tail -v -n \+0 config.log

Apparently, sitecopy is incompatible with neon >= 0.33. This quite
definitely needs a sourceful upload of sitecopy.

Helmut
--- End Message ---
--- Begin Message ---
Source: sitecopy
Source-Version: 1:0.16.6-13
Done: Petter Reinholdtsen 

We believe that the bug you reported is fixed in the latest version of
sitecopy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1064...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Petter Reinholdtsen  (supplier of updated sitecopy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 28 Jun 2024 20:12:44 +0200
Source: sitecopy
Architecture: source
Version: 1:0.16.6-13
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Petter Reinholdtsen 
Closes: 1064495
Changes:
 sitecopy (1:0.16.6-13) unstable; urgency=medium
 .
   * QA upload.
 .
   * Updated 31_Fix-various-issues.diff to work with neon >= 0.33
 (Closes: #1064495).
Checksums-Sha1:
 6fe175471f77a7f58f33233f3ea1674b3e8ee42a 1906 sitecopy_0.16.6-13.dsc
 8870a8eb2953cf7b67c8ff5dbf7a0928471b394e 36788 sitecopy_0.16.6-13.debian.tar.xz
 b7e8e19881de87477905ad01ec28d40bba26fb2d 7488 
sitecopy_0.16.6-13_source.buildinfo
Checksums-Sha256:
 16aa7f7dd2b90d7340879e5a3f4872ed37d9dbc788baf05a90d4b04dfd228f13 1906 
sitecopy_0.16.6-13.dsc
 ad7e0264980624cf43c8bde55f91166aff3aa2ad07f907eea86760208104dba4 36788 
sitecopy_0.16.6-13.debian.tar.xz
 6b5d616c1bfede5254c6545e26455fc67cba6ff402d5320702ac74a32ecdbbfc 7488 
sitecopy_0.16.6-13_source.buildinfo
Files:
 48288d534db5ddfc5e5f74c6a64cd4cd 1906 web optional sitecopy_0.16.6-13.dsc
 207b5b115faa73c7400bfaa2eebbb705 36788 web optional 
sitecopy_0.16.6-13.debian.tar.xz
 eaa4df697891ec694653c40485352001 7488 web optional 
sitecopy_0.16.6-13_source.buildinfo

-BEGIN PGP SIGNATURE-
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=UpC/
-END PGP SIGNATURE-



pgpIRrvY0KKGe.pgp
Description: PGP signature
--- End Message ---


Processing of sitecopy_0.16.6-13_source.changes

2024-06-28 Thread Debian FTP Masters
sitecopy_0.16.6-13_source.changes uploaded successfully to localhost
along with the files:
  sitecopy_0.16.6-13.dsc
  sitecopy_0.16.6-13.debian.tar.xz
  sitecopy_0.16.6-13_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processed: tagging 1074431, tagging 1074430, tagging 1074429, tagging 1074426 ..., tagging 1074425 ...

2024-06-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1074431 + upstream
Bug #1074431 [src:arm-trusted-firmware] arm-trusted-firmware: CVE-2024-6287 
CVE-2024-6285
Added tag(s) upstream.
> tags 1074430 + upstream
Bug #1074430 [src:adminer] adminer: CVE-2023-45196 CVE-2023-45195
Added tag(s) upstream.
> tags 1074429 + upstream
Bug #1074429 [src:xml-security-c] xml-security-c: CVE-2024-34580
Added tag(s) upstream.
> tags 1074426 + upstream
Bug #1074426 [src:golang-golang-x-image] golang-golang-x-image: CVE-2024-24792
Ignoring request to alter tags of bug #1074426 to the same tags previously set
> forwarded 1074426 https://github.com/golang/go/issues/67624
Bug #1074426 [src:golang-golang-x-image] golang-golang-x-image: CVE-2024-24792
Ignoring request to change the forwarded-to-address of bug#1074426 to the same 
value
> tags 1074425 + upstream
Bug #1074425 [src:openvpn-auth-ldap] openvpn-auth-ldap: CVE-2024-28820
Ignoring request to alter tags of bug #1074425 to the same tags previously set
> forwarded 1074425 https://github.com/threerings/openvpn-auth-ldap/pull/92
Bug #1074425 [src:openvpn-auth-ldap] openvpn-auth-ldap: CVE-2024-28820
Ignoring request to change the forwarded-to-address of bug#1074425 to the same 
value
> tags 1074414 + upstream
Bug #1074414 [src:gpac] gpac: CVE-2024-6061 CVE-2024-6062 CVE-2024-6063 
CVE-2024-6064
Added tag(s) upstream.
> tags 1074415 + upstream
Bug #1074415 [src:slic3r-prusa] slic3r-prusa: CVE-2020-28594 CVE-2020-28595 
CVE-2020-28596 CVE-2020-28598
Added tag(s) upstream.
> tags 1074416 + upstream
Bug #1074416 [src:libde265] libde265: CVE-2024-38949 CVE-2024-38950
Added tag(s) upstream.
> forwarded 1074416 https://github.com/strukturag/libde265/issues/460
Bug #1074416 [src:libde265] libde265: CVE-2024-38949 CVE-2024-38950
Set Bug forwarded-to-address to 
'https://github.com/strukturag/libde265/issues/460'.
> tags 1074417 + upstream
Bug #1074417 [src:zziplib] zziplib: CVE-2024-39133
Ignoring request to alter tags of bug #1074417 to the same tags previously set
> forwarded 1074417 https://github.com/gdraheim/zziplib/issues/164
Bug #1074417 [src:zziplib] zziplib: CVE-2024-39133
Ignoring request to change the forwarded-to-address of bug#1074417 to the same 
value
> tags 1074418 + upstream
Bug #1074418 [src:libmodbus] libmodbus: CVE-2023-26793
Added tag(s) upstream.
> forwarded 1074418 https://github.com/stephane/libmodbus/issues/683
Bug #1074418 [src:libmodbus] libmodbus: CVE-2023-26793
Set Bug forwarded-to-address to 
'https://github.com/stephane/libmodbus/issues/683'.
> tags 1074419 + upstream
Bug #1074419 [src:bluez] bluez: CVE-2023-51596
Added tag(s) upstream.
> tags 1074421 + upstream
Bug #1074421 [src:grpc] grpc: CVE-2023-44487
Added tag(s) upstream.
> tags 1074422 + upstream
Bug #1074422 [src:libmodbus] libmodbus: CVE-2024-36843 CVE-2024-36844 
CVE-2024-36845
Added tag(s) upstream.
> tags 1074423 + upstream
Bug #1074423 [src:nltk] nltk: CVE-2024-39705
Ignoring request to alter tags of bug #1074423 to the same tags previously set
> tags 1074424 + upstream
Bug #1074424 [src:zziplib] zziplib: CVE-2024-39134
Ignoring request to alter tags of bug #1074424 to the same tags previously set
> forwarded 1074424 https://github.com/gdraheim/zziplib/issues/165
Bug #1074424 [src:zziplib] zziplib: CVE-2024-39134
Ignoring request to change the forwarded-to-address of bug#1074424 to the same 
value
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1074414: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074414
1074415: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074415
1074416: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074416
1074417: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074417
1074418: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074418
1074419: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074419
1074421: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421
1074422: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074422
1074423: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074423
1074424: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074424
1074425: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074425
1074426: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074426
1074429: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074429
1074430: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074430
1074431: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074431
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



nsync_1.29.1-1_source.changes ACCEPTED into unstable

2024-06-28 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 29 Jun 2024 08:27:44 +0200
Source: nsync
Architecture: source
Version: 1.29.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Dylan Aïssi 
Changes:
 nsync (1.29.1-1) unstable; urgency=medium
 .
   * QA upload.
   * New upstream version 1.29.1
   * Drop patch included in upstream release:
   - 521eb38: Add export targets for nsync and nsync_cpp in CMakeLists.txt
Checksums-Sha1:
 fd6e74ff886c7b941222ed03d809ded087b8d32d 1976 nsync_1.29.1-1.dsc
 89989062524f044a63eb9158c3ff33197321f02c 157168 nsync_1.29.1.orig.tar.gz
 186d8e12fc6930218303614f80018f52b557804d 4412 nsync_1.29.1-1.debian.tar.xz
 d11c5b509a225089e49fbf4dde4654b29a9d208d 8027 nsync_1.29.1-1_amd64.buildinfo
Checksums-Sha256:
 40578536a683b252253560fc7a19f36a770d737d29695e829b9765578d92d0fb 1976 
nsync_1.29.1-1.dsc
 3045a8922171430426b695edf794053182d245f6a382ddcc59ef4a6190848e98 157168 
nsync_1.29.1.orig.tar.gz
 08a9bc3eb8fb19b040a8ec538a287bfe84661f5cc46469f30ef05b4524e0fc8a 4412 
nsync_1.29.1-1.debian.tar.xz
 6b428ca15d522a79ec03b5030a9b8629998e997c42b37e2b50fbbafe4ba4b4c7 8027 
nsync_1.29.1-1_amd64.buildinfo
Files:
 ac6a5091c6b0f8c8001297534a1e0ee1 1976 science optional nsync_1.29.1-1.dsc
 f1035b942fa38b30fa71aa1a9a2ccabf 157168 science optional 
nsync_1.29.1.orig.tar.gz
 6dd7cb6ad8f610c9b1f7b9b10cfbfcdc 4412 science optional 
nsync_1.29.1-1.debian.tar.xz
 48216b73a88472e567b790a40aa3e708 8027 science optional 
nsync_1.29.1-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=Bvzh
-END PGP SIGNATURE-



pgpZbl4YAwvgX.pgp
Description: PGP signature