Processed: Proposed patch/debdiff

2021-07-06 Thread Debian Bug Tracking System
Processing control commands:

> tags 990748 + patch
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Ignoring request to alter tags of bug #990748 to the same tags previously set
> tags 990749 + patch
Bug #990749 [src:linuxptp] linuxptp: CVE-2021-3571
Ignoring request to alter tags of bug #990749 to the same tags previously set

-- 
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
990749: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990749
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Proposed patch/debdiff

2021-07-06 Thread Debian Bug Tracking System
Processing control commands:

> tags 990748 + patch
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Added tag(s) patch.
> tags 990749 + patch
Bug #990749 [src:linuxptp] linuxptp: CVE-2021-3571
Added tag(s) patch.

-- 
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
990749: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990749
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



kodi-pvr-iptvsimple_7.6.5+ds1-1_source.changes ACCEPTED into unstable

2021-07-06 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 06 Jul 2021 19:02:16 +0200
Source: kodi-pvr-iptvsimple
Architecture: source
Version: 7.6.5+ds1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers 
Changed-By: Vasyl Gello 
Changes:
 kodi-pvr-iptvsimple (7.6.5+ds1-1) unstable; urgency=medium
 .
   * New upstream version 7.6.5+ds1
   * Fix github links in d/watch
   * Add liblzma-dev as build-dep
Checksums-Sha1:
 6528fbc2b505eabe5b93ead4ee238fb3fbe6a6e0 2204 
kodi-pvr-iptvsimple_7.6.5+ds1-1.dsc
 a304ba10f328475f3f52bd3ee98e83264c196afb 163504 
kodi-pvr-iptvsimple_7.6.5+ds1.orig.tar.xz
 46c76a881726a3c44e50c5817651b36c09f07dde 3240 
kodi-pvr-iptvsimple_7.6.5+ds1-1.debian.tar.xz
 c86ac2fca88af4de16b7f12fd206c16556149fca 7075 
kodi-pvr-iptvsimple_7.6.5+ds1-1_amd64.buildinfo
Checksums-Sha256:
 3069efd968d921c9b01c623dc9a40062994115be2a788e6bdee83e5e22c63ad9 2204 
kodi-pvr-iptvsimple_7.6.5+ds1-1.dsc
 6ec47bbb752d23857946c16116482cb5f415863721a96deafe90bdf993f79ede 163504 
kodi-pvr-iptvsimple_7.6.5+ds1.orig.tar.xz
 c6cee52078f35748f0f00a905bb40957bfc23f17f232cc3319307d688b709a0d 3240 
kodi-pvr-iptvsimple_7.6.5+ds1-1.debian.tar.xz
 b8461b7e9a3ceea81f3a26cf97ff3d9b2c6db7452009bb3489cd9844200c3ee2 7075 
kodi-pvr-iptvsimple_7.6.5+ds1-1_amd64.buildinfo
Files:
 a0d6d0ebc2f9cd7661bf9773bd0551d9 2204 libs optional 
kodi-pvr-iptvsimple_7.6.5+ds1-1.dsc
 4fff48dda8a655c67e39bc9ff5085b7c 163504 libs optional 
kodi-pvr-iptvsimple_7.6.5+ds1.orig.tar.xz
 3ba8f42fbb851a2c80a4fd703544f179 3240 libs optional 
kodi-pvr-iptvsimple_7.6.5+ds1-1.debian.tar.xz
 077bf750a08c431b1fb1bf61bf1ea08e 7075 libs optional 
kodi-pvr-iptvsimple_7.6.5+ds1-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=AbCU
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_source.changes ACCEPTED into unstable

2021-07-06 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 06 Jul 2021 19:01:59 +0200
Source: kodi-inputstream-ffmpegdirect
Architecture: source
Version: 1.21.3+ds1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers 
Changed-By: Vasyl Gello 
Changes:
 kodi-inputstream-ffmpegdirect (1.21.3+ds1-1) unstable; urgency=medium
 .
   * New upstream version 1.21.3+ds1
   * Fix github ref
   * Downgrade ffmpeg required version to 4.1.6
Checksums-Sha1:
 d62cbe424534aef1fbdad0bdbf53fd444375a3b2 2553 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.dsc
 fd7ee7f28b347b03272d77c8ad98eec307807a3a 198736 
kodi-inputstream-ffmpegdirect_1.21.3+ds1.orig.tar.xz
 3e310895b2453eb7cebbc942f49d58abf479c9f5 2640 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.debian.tar.xz
 0802a47d3fbb2b0e64671235a5576fab647375e3 10919 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_amd64.buildinfo
Checksums-Sha256:
 6812dbd4ea11d009818b66ca6b718ef59cae02e3a3efb5cd2b7d347ce393b3e7 2553 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.dsc
 be86bd7acddc5aed277f3e5db767050a728f84117f67b96ce8ead1a200489fed 198736 
kodi-inputstream-ffmpegdirect_1.21.3+ds1.orig.tar.xz
 4b40ec020627d46d0b25d4650253c446436ec0ce1d0667b376a9c046d38f8dbe 2640 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.debian.tar.xz
 b2382fd903086579cb11d7d6b1ac68822451f918ecace8dcd2f6170def4709e8 10919 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_amd64.buildinfo
Files:
 988b94ec62f921b5ae31b8d8f53f1eba 2553 libs optional 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.dsc
 179a2966eb069c08123f49a0efb6f298 198736 libs optional 
kodi-inputstream-ffmpegdirect_1.21.3+ds1.orig.tar.xz
 236318d90f299e53f1f2b3dcac0745c9 2640 libs optional 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.debian.tar.xz
 069cabcce8021f190b14e64e2811932c 10919 libs optional 
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=+gH7
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_source.changes

2021-07-06 Thread Debian FTP Masters
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_source.changes uploaded successfully 
to localhost
along with the files:
  kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.dsc
  kodi-inputstream-ffmpegdirect_1.21.3+ds1.orig.tar.xz
  kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.debian.tar.xz
  kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processing of kodi-pvr-iptvsimple_7.6.5+ds1-1_source.changes

2021-07-06 Thread Debian FTP Masters
kodi-pvr-iptvsimple_7.6.5+ds1-1_source.changes uploaded successfully to 
localhost
along with the files:
  kodi-pvr-iptvsimple_7.6.5+ds1-1.dsc
  kodi-pvr-iptvsimple_7.6.5+ds1.orig.tar.xz
  kodi-pvr-iptvsimple_7.6.5+ds1-1.debian.tar.xz
  kodi-pvr-iptvsimple_7.6.5+ds1-1_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#990759: FW: [Linuxptp-devel] linuxptp: Fixes published for CVE-2021-3570 and CVE-2021-3571

2021-07-06 Thread Geva, Erez
Package: linuxptp
Version: 3.1-2

CVE-2021-3570
CVE-2021-3571

-Original Message-
From: Richard Cochran  
Sent: Tuesday, 6 July 2021 00:30
To: oss-secur...@lists.openwall.com
Cc: linuxptp-us...@lists.sourceforge.net; linuxptp-de...@lists.sourceforge.net
Subject: [Linuxptp-devel] linuxptp: Fixes published for CVE-2021-3570 and 
CVE-2021-3571

Dear list,

Now that the embargo period has expired, I published fixes for:

   CVE-2021-3570 linuxptp: missing length check of forwarded messages
   CVE-2021-3571 linuxptp: wrong length of one-step follow-up in transparent 
clock

The fixes have been published to SourceForge and to GitHub:
https://sourceforge.net/projects/linuxptp/
https://github.com/richardcochran/linuxptp

The tags with the fixes are as follows:

   v1.5.1
   v1.6.1
   v1.7.1
   v1.8.1
   v1.9.3
   v2.0.1
   v3.1.1

In addition, the head of the master branch (soon to be version 3.2) also 
includes the fixes.

Although it is possible to apply the fix to versions 1.2, 1.3, and 1.4, those 
versions are obsolete and do not pass our CI tests.  For this reason I decided 
to withdraw them instead.

Thanks,
Richard


___
Linuxptp-devel mailing list
linuxptp-de...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linuxptp-devel



Bug#990749: linuxptp: CVE-2021-3571

2021-07-06 Thread Salvatore Bonaccorso
Source: linuxptp
Version: 3.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for linuxptp.

CVE-2021-3571[0]:
| linuxptp: wrong length of one-step follow-up in transparent clock

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-3571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3571

Please adjust the affected versions in the BTS as needed.

Note, as for CVE-2021-3570 I set the severity here as well to RC
thinking the fix needs to go into bullseye before the release. Let me
know if I can help with a NMU.

Regards,
Salvatore



Processed: linuxptp: CVE-2021-3570

2021-07-06 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1.9.2-1
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Marked as found in versions linuxptp/1.9.2-1.

-- 
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990748: linuxptp: CVE-2021-3570

2021-07-06 Thread Salvatore Bonaccorso
Source: linuxptp
Version: 3.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 1.9.2-1

Hi,

The following vulnerability was published for linuxptp.

CVE-2021-3570[0]:
| linuxptp: missing length check of forwarded messages

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-3570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570

Please adjust the affected versions in the BTS as needed.

Note, I did set the severity here straight to RC as I think the fix
should go in bullseye. I can try to help with a NMU if needed.

Regards,
Salvatore



Bug#990737: Audacity's new privacy policy may need to be addressed

2021-07-06 Thread martin f krafft

Regarding the following, written by "Paul Wise" on 2021-07-06 at 11:30 Uhr 
+0800:
IIRC the telemetry is off by default when building from source and only 
the official upstream binaries are affected.


Can confirm. I should have been explicit: check that the telemetry 
code is DFSG, or if it's not, switch to the fork.


Thanks Paul,

--
 .''`.   martin f. krafft  @martinkrafft
: :'  :  proud Debian developer
`. `'`   http://people.debian.org/~madduck
  `-  Debian - when you have better things to do than fixing systems
 
"ah, but a man's reach should exceed his grasp,

 or what's a heaven for?"
  -- robert browning


digital_signature_gpg.asc
Description: Digital GPG signature (see http://martin-krafft.net/gpg/sig-policy/999bbcc4/current)