Bug#993588: wily: Potential Buffer Overflow in libmsg/connect.c

2021-09-03 Thread Potential Buffer Overflow vulnerability in xfig-3.2.7b
Package: wily Version: 0.13.41 Severity: normal Dear Maintainer, It seems that there exists a potential Buffer Overflow in libmsg/connect.c. In line 184, and 191, (184) if(!(disp = getenv("DISPLAY"))) { ... (191) sprintf(buf, "%s/wily%s%s", dir, pw->pw_name, disp); the variable disp is a previou

Bug#993373: Use-after-free bug in realpath()

2021-09-03 Thread Madie K. Mckeel
Dear Antonin Thanks for your replay. On Tuesday, August 31, 2021 4:04 PM, Antonin Décimo wrote: > Last year I wrote a lot of patches for pmount, amongst which two > remove the bundled implementation of realpath and switch to the > "modern" interface > > char *realpath(const char *restrict path

Processing of jimtcl_0.79+dfsg0-3_source.changes

2021-09-03 Thread Debian FTP Masters
jimtcl_0.79+dfsg0-3_source.changes uploaded successfully to localhost along with the files: jimtcl_0.79+dfsg0-3.dsc jimtcl_0.79+dfsg0-3.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processing of libopenaptx_0.2.0-6_source.changes

2021-09-03 Thread Debian FTP Masters
libopenaptx_0.2.0-6_source.changes uploaded successfully to localhost along with the files: libopenaptx_0.2.0-6.dsc libopenaptx_0.2.0-6.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

jimtcl_0.79+dfsg0-3_source.changes ACCEPTED into unstable

2021-09-03 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 03 Sep 2021 16:22:09 +0200 Source: jimtcl Architecture: source Version: 0.79+dfsg0-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Didier Raboud Changes: jimtcl (0.79+dfsg0-3) u

libopenaptx_0.2.0-6_source.changes ACCEPTED into unstable

2021-09-03 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 03 Sep 2021 16:35:07 +0200 Source: libopenaptx Architecture: source Version: 0.2.0-6 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Didier Raboud Changes: libopenaptx (0.2.0-6) u

Bug#993610: crafty: Potential Integer Overflow in tbdecode.h

2021-09-03 Thread Potential Buffer Overflow vulnerability in xfig-3.2.7b
Package: crafty Version: 23.4 Severity: normal Dear Maintainer, There seems to exist potential integer overflow in tbdecode.h . In line 647, (647) if (fread(temp, 1, HEADER_SIZE, fd) != HEADER_SIZE) ... (651) ptr = temp; (652) # define R4(i) \ (653) ((ptr[i] << 24) + (ptr[(i) + 1] << 16) + (pt

Processing of libquvi_0.9.3-2_source.changes

2021-09-03 Thread Debian FTP Masters
libquvi_0.9.3-2_source.changes uploaded successfully to localhost along with the files: libquvi_0.9.3-2.dsc libquvi_0.9.3.orig.tar.xz libquvi_0.9.3.orig.tar.xz.asc libquvi_0.9.3-2.debian.tar.xz libquvi_0.9.3-2_amd64.buildinfo Greetings, Your Debian queue daemon (running on host

libquvi_0.9.3-2_source.changes ACCEPTED into unstable

2021-09-03 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 03 Sep 2021 10:52:08 -0400 Source: libquvi Architecture: source Version: 0.9.3-2 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Boyuan Yang Closes: 978860 Changes: libquvi (0.9.3-2

Processing of libquvi-scripts_0.9.20131130-2_source.changes

2021-09-03 Thread Debian FTP Masters
libquvi-scripts_0.9.20131130-2_source.changes uploaded successfully to localhost along with the files: libquvi-scripts_0.9.20131130-2.dsc libquvi-scripts_0.9.20131130.orig.tar.xz libquvi-scripts_0.9.20131130-2.debian.tar.xz libquvi-scripts_0.9.20131130-2_amd64.buildinfo Greetings,

libquvi-scripts_0.9.20131130-2_source.changes ACCEPTED into unstable

2021-09-03 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 03 Sep 2021 18:18:40 -0400 Source: libquvi-scripts Architecture: source Version: 0.9.20131130-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Closes: 840717 Changes:

Processing of libquvi_0.9.4-1~exp1_amd64.changes

2021-09-03 Thread Debian FTP Masters
libquvi_0.9.4-1~exp1_amd64.changes uploaded successfully to localhost along with the files: libquvi_0.9.4-1~exp1.dsc libquvi_0.9.4.orig.tar.xz libquvi_0.9.4.orig.tar.xz.asc libquvi_0.9.4-1~exp1.debian.tar.xz libquvi-0.9-0.9.4-dbgsym_0.9.4-1~exp1_amd64.deb libquvi-0.9-0.9.4_0.9.4-1~exp1_

libquvi_0.9.4-1~exp1_amd64.changes is NEW

2021-09-03 Thread Debian FTP Masters
binary:libquvi-0.9-0.9.4 is NEW. binary:libquvi-0.9-0.9.4 is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are

Bug#834945: libquvi: please make the build reproducible

2021-09-03 Thread Chris Lamb
Hi Boyuan, > Looks like your patch is not enough. After merging the new patch, the updated > libquvi/0.9.3-2 still fails to build reproducibly. Can you take a look into > it? So this is because since I wrote this patch in 2016, Debian is injecting the build path into the CFLAGS variable. Here is

Processing of apvlv_0.3.0-1_source.changes

2021-09-03 Thread Debian FTP Masters
apvlv_0.3.0-1_source.changes uploaded successfully to localhost along with the files: apvlv_0.3.0-1.dsc apvlv_0.3.0.orig.tar.xz apvlv_0.3.0-1.debian.tar.xz apvlv_0.3.0-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

apvlv_0.3.0-1_source.changes ACCEPTED into unstable

2021-09-03 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 03 Sep 2021 19:19:18 -0400 Source: apvlv Architecture: source Version: 0.3.0-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Changes: apvlv (0.3.0-1) unstable; urgen

Bug#971559: marked as done (coinor-cgl FTCBFS: doesn't build shared libraries)

2021-09-03 Thread Debian Bug Tracking System
Your message dated Sat, 04 Sep 2021 03:03:28 + with message-id and subject line Bug#971559: fixed in coinor-cgl 0.60.3+repack1-3 has caused the Debian Bug report #971559, regarding coinor-cgl FTCBFS: doesn't build shared libraries to be marked as done. This means that you claim that the probl

Bug#978789: marked as done (coinor-cgl: ftbfs with autoconf 2.70)

2021-09-03 Thread Debian Bug Tracking System
Your message dated Sat, 04 Sep 2021 03:03:28 + with message-id and subject line Bug#978789: fixed in coinor-cgl 0.60.3+repack1-3 has caused the Debian Bug report #978789, regarding coinor-cgl: ftbfs with autoconf 2.70 to be marked as done. This means that you claim that the problem has been d

Processing of coinor-cgl_0.60.3+repack1-3_source.changes

2021-09-03 Thread Debian FTP Masters
coinor-cgl_0.60.3+repack1-3_source.changes uploaded successfully to localhost along with the files: coinor-cgl_0.60.3+repack1-3.dsc coinor-cgl_0.60.3+repack1.orig.tar.xz coinor-cgl_0.60.3+repack1-3.debian.tar.xz coinor-cgl_0.60.3+repack1-3_amd64.buildinfo Greetings, Your Debian qu

coinor-cgl_0.60.3+repack1-3_source.changes ACCEPTED into unstable

2021-09-03 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 03 Sep 2021 22:38:42 -0400 Source: coinor-cgl Architecture: source Version: 0.60.3+repack1-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Closes: 971559 978789 Chang