Bug#950123: virtualenvwrapper: Autocomplete not loaded in default install

2020-08-28 Thread David da Silva Polverari
Hi,

I can confirm that despite what is stated on
/usr/share/doc/virtualenvwrapper/README.Debian,
virtualenvwrapper_4.8.4-4, doesn't install
/etc/bash_completion.d/virtualenvwrapper, as it was the case in the
version found on Buster (4.3.1-2).

Regards,

David Polverari.



Bug#968751: ITP: firewalk -- active network reconnaissance security tool

2020-08-20 Thread David da Silva Polverari
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari 

* Package name: firewalk
  Version : 5.0
  Upstream Author : Mike D. Schiffman  
David E. Goldsmith 
* URL : http://packetfactory.openwall.net/projects/firewalk/
* License : BSD
  Programming Lang: C
  Description : active network reconnaissance security tool

Firewalk is an active reconnaissance network security tool that attempts
to determine what layer 4 protocols a  given IP forwarding device will
pass.

This package is relevant in network security assessments. It works in a
similar way to traceroute, but with extended functionality that helps in
assessing the configuration of package filtering devices.

I plan to maintain this package inside the Debian Security Tools
Packaging Team (pkg-security), and I will need a sponsor for my package.



Bug#744401: snowdrop: diff for NMU 0.02b-12.1

2020-08-12 Thread David da Silva Polverari
On Wed, Aug 12, 2020 at 07:11:35PM +0200, Andreas Metzler wrote:
> this bug tracks the fact that the changes in the NMU have NOT been
> integrated into a maintainer upload. So it should stay open until that
> has happened, afaik.
> 
Hi Andreas,

I'm not sure if I follow, but from what I see, you are worried that new
maintainers will not take these NMU changes into account on the next
revisions, right?

I have an ITA opened and I'm working on a Debian revision of the package
atm, and I have created a git repository (using gbp import-dscs
--debsnap), which contains your NMU.

Even if I weren't doing this revision, I think any other potential
Debian contributor would be basing their work on the latest Debian
revision found on the archives, which happen to be your NMU at this
point, as can be seen by fetching the package sources on sid with apt
source.

Thus I'm not sure what the benefits are of keeping this bug open. Of
course, I may be completely wrong :). So, do you think I should reopen
it until I (or anyone else, for that matter) release a new Debian
revision?

Regards,

David Polverari.



Bug#744401: snowdrop: diff for NMU 0.02b-12.1

2020-08-13 Thread David da Silva Polverari
On Thu, Aug 13, 2020 at 06:29:34PM +0200, Andreas Metzler wrote:

Hi Andreas,

> Reopening seems to be make-work if you are in the process of adopting
> anyway. ;-)

Ok! :)

> cu Andreas
> 
> 
> [1] Worried is too strong. But the rationale for closing made no sense. I
> submitted a bugreport with a diff for the NMU to make it available to
> the maintainer and track its integration. Closing it with "a package
> that contains the diff already entered the Debian archive" did not make
> sense, since the only package in the archive with the diff is still the
> NMU, so the status of the package had not changed at all since I had
> submitted the tracking bug report.

Sorry for "worried" lol. As English is not my first language, sometimes
I make a poor choice of words.

As for the rationale for closing, maybe I misinterpreted what was stated
on the Debian wiki about BTS usage [1] in this case, but I see your
point now. I should have deferred closing the bug after the new revision
I am working on was accepted on unstable. All those processes are still
new to me, so I'm unfortunately still making some mistakes along the
way. Sorry for the inconvenience and thanks for the explanation!

[1] https://www.debian.org/Bugs/Developer#closing

Regards,

David Polverari.



Bug#962939: RFS: pipewalker/1.0-3 [QA] -- combination puzzle game

2020-06-16 Thread David da Silva Polverari
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "pipewalker"

 * Package name: pipewalker
   Version : 0.9.4-3
   Upstream Author : Artem Senichev 
 * URL : http://pipewalker.sourceforge.net/
 * License : GPL-3+
 * Vcs : https://salsa.debian.org/debian/pipewalker
   Section : games

It builds those binary packages:

  pipewalker - combination puzzle game

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/pipewalker

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/p/pipewalker/pipewalker_0.9.4-3.dsc

Changes since the last upload:

   * QA upload.
   * Ran wrap-and-sort.
   * Set Debian QA Group as maintainer. (See #826925)
   * Using new DH level format. Consequently:
   - debian/compat: removed.
   - debian/control: changed from 'debhelper' to 'debhelper-compat' in
 Build-Depends field and bumped level to 13.
   * debian/control:
   - Added 'Rules-Requires-Root: no' to source stanza.
   - Added the Vcs-* fields.
   - Bumped Standards-Version to 4.5.0.
   - Changed package synopsis and long description.
   - Removed redundant build dependencies since DH compatibility level 10.
   * debian/copyright:
   - Added new rights in debian/* paragraph.
   - Migrated to 1.0 format.
   * debian/manpages: added to install a maintainer-provided manpage.
   * debian/menu: replaced a relative path reference to an icon with an absolute
 one, according to the "Debian Menu System" manual, section 3.2 (Syntax).
 Thanks to Markus Koschany . (Closes: #738006)
   * debian/patches/*:
   - 020_fix-fmt-string-vuln.patch: added to fix a format string
 vulnerability on upstream code.
   - 030_fix-xdg-dot-desktop.patch: added to make upstream provided .desktop
 file conform to XDG Desktop Entry Specification.
   - 040_fix-build-fhs-games.patch: added to make the build system conform 
to
 FHS regarding static data files for /usr/games.
   - datadir.diff: removed due to build system adjustments by other patches.
   - no-werror.diff: renamed to 010-configure-no-werror.patch and added
 DEP-3 header.
   * debian/pipewalker.1: added to provide a manpage to the game binary.
   * debian/rules:
   - Added DEB_BUILD_MAINT_OPTIONS variable to provide full GCC hardening.
   - Changed the '--data-dir' value to suit the modifications made to the
 build system.
   - Removed '--with autoreconf' because it is default since DH 10.
   * debian/salsa-ci.yml: added to provide CI tests for Salsa.
   * debian/tests/control: created to provide trivial CI tests.
   * debian/watch: bumped to version 4.

Regards,

--
  David da Silva Polverari



Bug#963019: RFS: pem/0.7.9-3 -- command line personal expense manager

2020-06-17 Thread David da Silva Polverari
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "pem"

 * Package name: pem
   Version : 0.7.9-3
   Upstream Author : Prasad J Pandit 
 * URL : https://www.gnu.org/software/pem/
 * License : GPL-3+
 * Vcs : https://salsa.debian.org/debian/pem
   Section : misc

It builds those binary packages:

  pem - command line personal expense manager

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/pem

Alternatively, one can download the package with dget using this command:

  dget -x https://mentors.debian.net/debian/pool/main/p/pem/pem_0.7.9-3.dsc

Changes since the last upload:

   * Using new DH level format. Consequently:
   - debian/compat: removed.
   - debian/control: changed from 'debhelper' to 'debhelper-compat' in
 Build-Depends field and bumped level to 13.
   * debian/control:
   - Added '${perl:Depends}' to Depends field.
   - Added 'Rules-Requires-Root: no' to source stanza.
   - Added Vcs-* fields.
   - Bumped Standards-Version to 4.5.0.
   - Marked pem as 'Multi-Arch: foreign'.
   - Removed redundant dh-autoreconf build dependency.
   * debian/copyright: updated copyright years.
   * debian/patches/010_use-usr-bin-perl.patch: added to use '/usr/bin/perl'
 instead of '/usr/bin/env perl' for interpreter invocation.
   * debian/rules: removed redundant '--with autoreconf' dh parameter.
   * debian/salsa-ci.yml: added to provide CI tests for Salsa.
   * debian/tests/control: added to perform a trivial CI test.
   * debian/upstream/metadata: created.
   * debian/watch: using a secure URI.

Regards,

--
  David da Silva Polverari



Bug#962939: RFS: pipewalker/0.9.4-3 [QA] -- combination puzzle game

2020-06-27 Thread David da Silva Polverari
Package: sponsorship-requests
Followup-For: Bug #962939

Dear mentors,

I am looking for a sponsor for my package "pipewalker"

 * Package name: pipewalker
   Version : 0.9.4-3
   Upstream Author : Artem Senichev 
 * URL : http://pipewalker.sourceforge.net/
 * License : GPL-3+
 * Vcs : https://salsa.debian.org/debian/pipewalker
   Section : games

It builds those binary packages:

  pipewalker - combination puzzle game

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/pipewalker

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/p/pipewalker/pipewalker_0.9.4-3.dsc

Changes since the last upload:

   * QA upload.
   * Included an additional theme and a theme template found on upstream site
 into package. Consequently:
   - debian/examples: created to install the template.
   - debian/extra/New Year.png: included to provide the additional theme.
   - debian/extra/scheme.png: included to provide the upstream theme
 template.
   - debian/install: created to install the additional theme.
   - debian/source/include-binaries: created to include both files in the
 source package.
   * Ran wrap-and-sort.
   * Set Debian QA Group as maintainer. (See #826925)
   * Using new DH level format. Consequently:
   - debian/compat: removed.
   - debian/control: changed from 'debhelper' to 'debhelper-compat' in
 Build-Depends field and bumped level to 13.
   * debian/control:
   - Added 'Rules-Requires-Root: no' to source stanza.
   - Added the Vcs-* fields.
   - Bumped Standards-Version to 4.5.0.
   - Changed package synopsis and long description.
   - Removed redundant build dependencies since DH compatibility level 10.
   * debian/copyright:
   - Added a Comment field to document the origin of debian/extra/* files.
   - Added debian/extra/* paragraph.
   - Added new rights in debian/* paragraph.
   - Migrated to 1.0 format.
   * debian/manpages: added to install a maintainer-provided manpage.
   * debian/menu: removed to comply with CTTE #741573. (Closes: #738006)
   * debian/patches/*:
   - 010_configure-no-werror.patch: renamed from no-werror.diff and added
 DEP-3 header.
   - 020_fix-fmt-string-vuln.patch: added to fix a format string
 vulnerability on upstream code.
   - 030_fix-xdg-dot-desktop.patch: added to make upstream provided .desktop
 file conform to XDG Desktop Entry Specification.
   - 040_fix-build-fhs-games.patch: added to make the build system conform 
to
 FHS regarding static data files for /usr/games.
   - 050_dont-install-menu.patch: added to comply with CTTE #741573.
   - datadir.diff: no longer needed due to build system adjustments by other
 patches. Removed.
   * debian/pipewalker.6: added to provide a manpage to the game binary.
   * debian/rules:
   - Added DEB_BUILD_MAINT_OPTIONS variable to provide full GCC hardening.
   - Changed the '--data-dir' value to suit the modifications made to the
 build system.
   - Removed '--with autoreconf' because it is default since DH 10.
   * debian/salsa-ci.yml: added to provide CI tests for Salsa.
   * debian/tests/control: created to provide trivial CI tests.
   * debian/upstream/metadata: created.
   * debian/watch: bumped to version 4.

Regards,

--
  David da Silva Polverari



Bug#963674: RFS: smbldap-tools/0.9.11-1 [QA] -- smbldap-tools - Scripts to manage Unix and Samba accounts stored on LDAP

2020-06-24 Thread David da Silva Polverari
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "smbldap-tools"

 * Package name: smbldap-tools
   Version : 0.9.11-1
   Upstream Author : SATOH Fumiyas 
 * URL : https://github.com/fumiyas/smbldap-tools
 * License : GPL-2+
 * Vcs : https://salsa.debian.org/debian/smbldap-tools
   Section : admin

It builds those binary packages:

  smbldap-tools - Scripts to manage Unix and Samba accounts stored on LDAP

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/smbldap-tools

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/s/smbldap-tools/smbldap-tools_0.9.11-1.dsc

Changes since the last upload:

   * QA upload.
   * New upstream release. (Closes: #692530, #906108, #906109)
   * debian/clean: created to clean build artifacts.
   * debian/control:
   - Added 'Rules-Requires-Root: no' to source stanza.
   - Added Homepage field.
   - Added Vcs-* fields.
   - Removed redundant 'quilt' dependency from Build-Depends field.
   - Removed unnecessary Build-Depends-Indep field.
   * debian/copyright:
   - Updated Source field to point to the repository of the last active
 maintainer. Thanks to Daniele Palumbo 
 and to SATOH Fumiyas . (Closes:
 #906106)
   - Updated upstream address.
   - Using GitHub repository issues in Upstream-Contact field.
   * debian/patches/0003_include_config_script.patch: no longer needed, as
 upstream solved the problem. Deleted.
   * debian/rules:
   - Added a dh_auto_configure override to run build/autogen.sh before
 dh_auto_configure.
   - Removed useless DEB_BUILD_MAINT_OPTIONS export.
   * debian/salsa-ci.yml: added to provide CI tests for Salsa.
   * debian/upstream/metadata: created.
   * debian/watch:
   - Bumped to version 4.
   - Updated the source address.

Regards,

--
  David da Silva Polverari



Bug#925672: efivar: diff for NMU version 37-2.1

2020-06-09 Thread David da Silva Polverari
Control: tags 925672 + pending

Dear maintainer,

I've prepared an NMU for efivar (versioned as 37-2.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer or cancel the NMU.

Regards,

David Polverari.
diff -Nru efivar-37/debian/changelog efivar-37/debian/changelog
--- efivar-37/debian/changelog	2019-03-01 12:55:07.0 -0500
+++ efivar-37/debian/changelog	2020-06-09 17:31:58.0 -0500
@@ -1,3 +1,12 @@
+efivar (37-2.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/patches: added upstream patches fix-gcc9-werror-format-guid.patch
+and fix-gcc9-werrors.patch to fix FTBFS with GCC 9. Thanks to Matthias
+Klose . (Closes: #925672)
+
+ -- David da Silva Polverari   Tue, 09 Jun 2020 17:31:58 -0500
+
 efivar (37-2) unstable; urgency=medium
 
   * Cherry-pick fix from upstream:
diff -Nru efivar-37/debian/patches/fix-gcc9-werror-format-guid.patch efivar-37/debian/patches/fix-gcc9-werror-format-guid.patch
--- efivar-37/debian/patches/fix-gcc9-werror-format-guid.patch	1969-12-31 19:00:00.0 -0500
+++ efivar-37/debian/patches/fix-gcc9-werror-format-guid.patch	2020-06-09 17:25:29.0 -0500
@@ -0,0 +1,28 @@
+Subject: dp.h: make format_guid() handle misaligned guid pointers safely.
+Author: Peter Jones 
+Bug: https://bugzilla.opensuse.org/show_bug.cgi?id=1120862
+Bug-Debian: https://bugs.debian.org/925672
+Origin: upstream, https://github.com/rhboot/efivar/commit/b98ba8921010d03f46704a476c69861515deb1ca
+Last-Update: 2019-01-07
+diff --git a/src/dp.h b/src/dp.h
+index aa4e390..20cb608 100644
+--- a/src/dp.h
 b/src/dp.h
+@@ -70,8 +70,15 @@
+ #define format_guid(buf, size, off, dp_type, guid) ({			\
+ 		int _rc;		\
+ 		char *_guidstr = NULL;	\
+-	\
+-		_rc = efi_guid_to_str(guid, &_guidstr);			\
++		efi_guid_t _guid;	\
++		const efi_guid_t * const _guid_p =			\
++			likely(__alignof__(guid) == sizeof(guid))	\
++? guid	\
++: &_guid;\
++\
++		if (unlikely(__alignof__(guid) == sizeof(guid)))	\
++			memmove(&_guid, guid, sizeof(_guid));		\
++		_rc = efi_guid_to_str(_guid_p, &_guidstr);		\
+ 		if (_rc < 0) {		\
+ 			efi_error("could not build %s GUID DP string",	\
+   dp_type);\
diff -Nru efivar-37/debian/patches/fix-gcc9-werrors.patch efivar-37/debian/patches/fix-gcc9-werrors.patch
--- efivar-37/debian/patches/fix-gcc9-werrors.patch	1969-12-31 19:00:00.0 -0500
+++ efivar-37/debian/patches/fix-gcc9-werrors.patch	2020-06-09 17:24:41.0 -0500
@@ -0,0 +1,145 @@
+Subject: Fix all the places -Werror=address-of-packed-member catches.
+Author: Peter Jones 
+Bug: https://github.com/rhboot/efivar/issues/123
+Bug-Debian: https://bugs.debian.org/925672
+Origin: upstream, https://github.com/rhboot/efivar/commit/c3c553db85ff10890209d0fe48fb4856ad68e4e0
+Last-Update: 2019-02-21
+--- a/src/dp-message.c
 b/src/dp-message.c
+@@ -620,11 +620,13 @@
+ 			  ) / sizeof(efi_ip_addr_t);
+ 		format(buf, size, off, "Dns", "Dns(");
+ 		for (int i=0; i < end; i++) {
+-			const efi_ip_addr_t *addr = >dns.addrs[i];
++			efi_ip_addr_t addr;
++
++			memcpy(, >dns.addrs[i], sizeof(addr));
+ 			if (i != 0)
+ format(buf, size, off, "Dns", ",");
+ 			format_ip_addr(buf, size, off, "Dns",
+-   dp->dns.is_ipv6, addr);
++   dp->dns.is_ipv6, );
+ 		}
+ 		format(buf, size, off, "Dns", ")");
+ 		break;
+--- a/src/dp.h
 b/src/dp.h
+@@ -71,13 +71,9 @@
+ 		int _rc;		\
+ 		char *_guidstr = NULL;	\
+ 		efi_guid_t _guid;	\
+-		const efi_guid_t * const _guid_p =			\
+-			likely(__alignof__(guid) == sizeof(guid))	\
+-? guid	\
+-: &_guid;\
+-\
+-		if (unlikely(__alignof__(guid) == sizeof(guid)))	\
+-			memmove(&_guid, guid, sizeof(_guid));		\
++		const efi_guid_t * const _guid_p = &_guid;		\
++	\
++		memmove(&_guid, guid, sizeof(_guid));			\
+ 		_rc = efi_guid_to_str(_guid_p, &_guidstr);		\
+ 		if (_rc < 0) {		\
+ 			efi_error("could not build %s GUID DP string",	\
+@@ -86,7 +82,7 @@
+ 			_guidstr = onstack(_guidstr,			\
+ 	   strlen(_guidstr)+1);		\
+ 			_rc = format(buf, size, off, dp_type, "%s",	\
+- _guidstr);	\
++ _guidstr);\
+ 		}			\
+ 		_rc;			\
+ 	})
+--- a/src/guid.c
 b/src/guid.c
+@@ -31,7 +31,7 @@
+ extern const efi_guid_t efi_guid_zero;
+ 
+ int NONNULL(1, 2) PUBLIC
+-efi_guid_cmp(const efi_guid_t *a, const efi_guid_t *b)
++efi_guid_cmp(const void * const a, const void * const b)
+ {
+ 	return memcmp(a, b, sizeof (efi_guid_t));
+ }
+--- a/src/include/efivar/efivar.h
 b/src/include/efivar/efivar.h
+@@ -128,7 +128,7 @@
+ 
+ extern int efi_guid_is_zero(const efi_guid_t *guid);
+ extern int efi_guid_is_empty(const efi_guid_t *guid);
+-extern int efi_guid_cmp(const efi_guid_t *a, const efi_guid_t *b);
++extern int efi_guid_cmp

Bug#925672: efivar: diff for NMU version 37-2.1

2020-06-10 Thread David da Silva Polverari
On Wed, Jun 10, 2020 at 07:32:36PM +, mario.limoncie...@dell.com wrote:
> I don't have a concern to this, but would you mind also submitting
> it to Salsa and linking back so we can get it into VCS?
> 
I have sent a merge request [1] on Salsa with the changes included on
the NMU. I branched it from cf16f73, as there was an unreleased
debian/changelog entry on a newer commit.

[1] https://salsa.debian.org/efi-team/efivar/-/merge_requests/2



Bug#925782: mp3check: diff for NMU version 0.8.7-3.1

2020-06-12 Thread David da Silva Polverari
Control: tags 925782 + pending

Dear maintainer,

I've prepared an NMU for mp3check (versioned as 0.8.7-3.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer or cancel the NMU.

Regards,

David Polverari.
diff -Nru mp3check-0.8.7/debian/changelog mp3check-0.8.7/debian/changelog
--- mp3check-0.8.7/debian/changelog	2018-12-22 18:33:01.0 -0500
+++ mp3check-0.8.7/debian/changelog	2020-06-11 00:33:53.0 -0500
@@ -1,3 +1,12 @@
+mp3check (0.8.7-3.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/patches/60_bts925782_ftbfs_with_gcc_9.patch: added to fix FTBFS
+with GCC-9. Thanks to Joachim Reichel . (Closes:
+#925782)
+
+ -- David da Silva Polverari   Thu, 11 Jun 2020 00:33:53 -0500
+
 mp3check (0.8.7-3) unstable; urgency=medium
 
   [ Helmut Grohne ]
diff -Nru mp3check-0.8.7/debian/patches/60_bts925782_ftbfs_with_gcc_9.patch mp3check-0.8.7/debian/patches/60_bts925782_ftbfs_with_gcc_9.patch
--- mp3check-0.8.7/debian/patches/60_bts925782_ftbfs_with_gcc_9.patch	1969-12-31 19:00:00.0 -0500
+++ mp3check-0.8.7/debian/patches/60_bts925782_ftbfs_with_gcc_9.patch	2020-06-11 00:33:53.0 -0500
@@ -0,0 +1,50 @@
+Description: fix FTBFS with GCC-9
+Author: Joachim Reichel 
+Bug-Debian: https://bugs.debian.org/925782
+Last-Update: 2019-09-01
+
+--- a/texception.h
 b/texception.h
+@@ -38,10 +38,10 @@
+ 
+ #define TExceptionN(n) public: virtual const char *name()  const { return #n; }
+ #define TExceptionM(m) public: virtual const char *message() const { return m; }
+-#define TExceptionM1(m,a) public: virtual const char *message() const { char *buf; asprintf(, m, a); return buf; }
+-#define TExceptionM2(m,a,b) public: virtual const char *message() const { char *buf; asprintf(, m, a,b); return buf; }
+-#define TExceptionM3(m,a,b,c) public: virtual const char *message() const { char *buf; asprintf(, m, a,b,c); return buf; }
+-#define TExceptionM4(m,a,b,c,d) public: virtual const char *message() const { char *buf; asprintf(, m, a,b,c,d); return buf; }
++#define TExceptionM1(m,a) public: virtual const char *message() const { char *buf; int result = asprintf(, m, a); return result != -1 ? buf : "asprintf failure"; }
++#define TExceptionM2(m,a,b) public: virtual const char *message() const { char *buf; int result = asprintf(, m, a,b); return result != -1 ? buf : "asprintf failure"; }
++#define TExceptionM3(m,a,b,c) public: virtual const char *message() const { char *buf; int result = asprintf(, m, a,b,c); return result != -1 ? buf : "asprintf failure"; }
++#define TExceptionM4(m,a,b,c,d) public: virtual const char *message() const { char *buf; int result = asprintf(, m, a,b,c,d); return result != -1 ? buf : "asprintf failure"; }
+ 
+ // base class of all exceptions 
+ class TException {
+--- a/tstring.cc
 b/tstring.cc
+@@ -111,7 +111,7 @@
+ tstring::Rep *tstring::Rep::create(size_t tmem) {
+size_t m = sizeof(Rep) << 1;
+while((m - 1 - sizeof(Rep)) < tmem) m <<= 1;
+-   Rep *p = new (m - 1 - sizeof(Rep)) Rep;
++   Rep *p = new (/*tag*/ true, m - 1 - sizeof(Rep)) Rep;
+p->mem = m - 1 - sizeof(Rep); p->ref = 1; p->vulnerable = false;
+return p;
+ }
+--- a/tstring.h
 b/tstring.h
+@@ -71,9 +71,12 @@
+   
+   // static methods
+   // operator new for this class
+-  static void * operator new (size_t size, size_t tmem) {
++  // add a tag parameter to ensure that the signature of the delete operator does not collide with the (void*,size_t) overload
++  static void * operator new (size_t size, bool /*tag*/, size_t tmem) {
+ 	 return ::operator new (size + tmem + 1);}
+-  static void operator delete (void *p, size_t) {
++  static void operator delete (void *p, bool /*tag*/, size_t) {
++	 ::operator delete (p); }
++  static void operator delete (void *p) {
+ 	 ::operator delete (p); }
+   
+   // create a new representation
diff -Nru mp3check-0.8.7/debian/patches/series mp3check-0.8.7/debian/patches/series
--- mp3check-0.8.7/debian/patches/series	2018-12-22 18:33:01.0 -0500
+++ mp3check-0.8.7/debian/patches/series	2020-06-11 00:12:11.0 -0500
@@ -4,3 +4,4 @@
 30_hardening.patch
 40_bts726068_remove_truncated_last_frame.patch
 nostrip.patch
+60_bts925782_ftbfs_with_gcc_9.patch


Bug#976423: buster-pu: package pngcheck/2.3.0-7

2020-12-04 Thread David da Silva Polverari
Package: release.debian.org
Severity: important
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Hi,

A global buffer overflow vulnerability was found by Red Hat on
pngcheck-2.4.0 [1]. It was found and reported by the Debian Security
Team that the vulnerability also affects the versions found on the
Debian archive [2].

The bug was already fixed on unstable [2]. I have prepared a revision
for buster-security for pngcheck/2.3.0-7 with the backported changes
from unstable. The proposed update builds correctly on a minimal
up-to-date buster chroot.

I didn't coordinate with the security team, as the vulnerability is
marked "no-dsa" in the Debian Security Tracker [3].

If the update is deemed correct, I can make it available on mentors, and
open an RFS as I don't have uploading rights.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1902011
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976350
[3] https://security-tracker.debian.org/tracker/CVE-2020-27818

Regards,
Polverari
diff -Nru pngcheck-2.3.0/debian/changelog pngcheck-2.3.0/debian/changelog
--- pngcheck-2.3.0/debian/changelog 2013-06-26 09:28:27.0 +
+++ pngcheck-2.3.0/debian/changelog 2020-12-04 21:22:18.0 +
@@ -1,3 +1,10 @@
+pngcheck (2.3.0-7+deb10u1) buster-security; urgency=high
+
+  * debian/patches/60-fix-buffer-overflow.patch: added to fix CVE-2020-27818.
+Thanks to Salvatore Bonaccorso . (Closes: #976350)
+
+ -- David da Silva Polverari   Fri, 04 Dec 2020 
21:22:18 +
+
 pngcheck (2.3.0-7) unstable; urgency=low
 
   * debian/control
diff -Nru pngcheck-2.3.0/debian/patches/60-fix-buffer-overflow.patch 
pngcheck-2.3.0/debian/patches/60-fix-buffer-overflow.patch
--- pngcheck-2.3.0/debian/patches/60-fix-buffer-overflow.patch  1970-01-01 
00:00:00.0 +
+++ pngcheck-2.3.0/debian/patches/60-fix-buffer-overflow.patch  2020-12-04 
21:22:18.0 +
@@ -0,0 +1,26 @@
+Description: Fix buffer overflow reported in RHBZ #1897485.
+ When char is signed, casting to a (signed) int directly could produce a
+ negative offset into the ASCII lookup table; adding an intermediate cast to
+ uch (a typedef for unsigned char) ensures a nonnegative offset no greater than
+ 255, which always corresponds to a valid table index.
+Origin: vendor, 
https://src.fedoraproject.org/rpms/pngcheck/blob/cc48791e34201caf7b686084b735d06cef66c974/f/pngcheck-2.4.0-overflow-bz1897485.patch
+Bug-Debian: https://bugs.debian.org/976350
+Forwarded: no
+Reviewed-By: David da Silva Polverari 
+Last-Update: 2020-12-04
+
+--- a/pngcheck.c
 b/pngcheck.c
+@@ -4895,8 +4895,10 @@
+ /* GRR 20061203:  now EBCDIC-safe */
+ int check_chunk_name(char *chunk_name, char *fname)
+ {
+-  if (isASCIIalpha((int)chunk_name[0]) && isASCIIalpha((int)chunk_name[1]) &&
+-  isASCIIalpha((int)chunk_name[2]) && isASCIIalpha((int)chunk_name[3]))
++  if (isASCIIalpha((int)(uch)chunk_name[0]) &&
++  isASCIIalpha((int)(uch)chunk_name[1]) &&
++  isASCIIalpha((int)(uch)chunk_name[2]) &&
++  isASCIIalpha((int)(uch)chunk_name[3]))
+ return 0;
+ 
+   printf("%s%s  invalid chunk name \"%.*s\" (%02x %02x %02x %02x)\n",
diff -Nru pngcheck-2.3.0/debian/patches/series 
pngcheck-2.3.0/debian/patches/series
--- pngcheck-2.3.0/debian/patches/series2013-06-26 09:28:27.0 
+
+++ pngcheck-2.3.0/debian/patches/series2020-12-04 21:22:18.0 
+
@@ -1,2 +1,3 @@
 10-pngsplit-format-strings.patch
 20-pngsplit-long-options.patch
+60-fix-buffer-overflow.patch


Bug#976371: RFS: pngcheck/2.3.0-13 -- print info and check PNG, JNG and MNG files

2020-12-04 Thread David da Silva Polverari
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "pngcheck":

 * Package name: pngcheck
   Version : 2.3.0-13
   Upstream Author : Greg Roelofs , 
 * URL : http://www.libpng.org/pub/png/apps/pngcheck.html
 * License : GPL-2+, GPL-3+ or CC-BY-SA-3, Custom-MIT-like
 * Vcs : https://salsa.debian.org/debian/pngcheck
   Section : graphics

It builds those binary packages:

  pngcheck - print info and check PNG, JNG and MNG files

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/pngcheck/

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/p/pngcheck/pngcheck_2.3.0-13.dsc

Changes since the last upload:

 pngcheck (2.3.0-13) unstable; urgency=medium
 .
   * debian/patches/60-fix-buffer-overflow.patch: added to fix CVE-2020-27818.
 Thanks to Salvatore Bonaccorso . (Closes: #976350)

Regards,
--
  David da Silva Polverari



Bug#976350: pngcheck: CVE-2020-27818

2020-12-04 Thread David da Silva Polverari
Hi,

I have prepared a new Debian revision for the package on unstable,
containing the fix for the vulnerability. I uploaded it to mentors [1],
as I have no uploading rights to the archive, and opened an RFS [2].

Should I wait until the bug is closed on unstable before I prepare a
revision to stable? Debian Developer's Reference says so [3], but I was
not sure whether it was valid to security fixes too.

[1] https://mentors.debian.net/debian/pool/main/p/pngcheck/pngcheck_2.3.0-13.dsc
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976371
[3] 
https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#special-case-uploads-to-the-stable-and-oldstable-distributions

Regards,
Polverari



Bug#1052063: regression: nvme drive not found after kernel upgrade from bookworm-security

2023-09-16 Thread David da Silva Polverari
Package: src:linux
Version: 6.1.52-1
Severity: important

Dear Maintainer(s),

After upgrading the kernel from linux-image-6.1.0-11-amd64 (6.1.38-4) to
linux-image-6.1.0-12-amd64 (6.1.52-1) from bookworm-security on my
laptop (a Dell XPS 9560), the kernel fails to find the nvme disk, making
it impossible for the initrd to decrypt the drive using LUKS, and as
such there are no boot messages. On the previous kernel it boots fine.
With tha 6.1.0-12 kernel, dmesg shows the following:

[   42.074878] nvme nvme0: Does your device have a faulty power saving mode 
enabled?
[   42.074879] nvme nvme0: Try "nvme_core.default_ps_max_latency_us=0 
pcie_aspm=off" and report a bug
[   42.120786] nvme :04:00.0: Unable to change power state from D3cold to 
D0, device inaccessible
[   42.121007] nvme nvme0: Removing after probe failure status: -19
[   42.136737] nvme0n1: detected capacity change from 1000215216 to 0

When I tried using the suggested parameters, I could boot, boot soon
afterwards the system hung. I also tried some variations, as trying
either only nvm_core.default_ps_max_latency_us=0 or pcie_aspm=off, but
neither one worked.

I attached the dmesg output from the laptop into this email.

Regards,
David
[0.00] microcode: microcode updated early to revision 0xf4, date = 
2023-02-23
[0.00] Linux version 6.1.0-12-amd64 (debian-ker...@lists.debian.org) 
(gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 
SMP PREEMPT_DYNAMIC Debian 6.1.52-1 (2023-09-07)
[0.00] Command line: BOOT_IMAGE=/vmlinuz-6.1.0-12-amd64 
root=/dev/mapper/mercurius--vg-root ro acpi_rev_override=1 mitigations=off quiet
[0.00] BIOS-provided physical RAM map:
[0.00] BIOS-e820: [mem 0x-0x00057fff] usable
[0.00] BIOS-e820: [mem 0x00058000-0x00058fff] reserved
[0.00] BIOS-e820: [mem 0x00059000-0x0009efff] usable
[0.00] BIOS-e820: [mem 0x0009f000-0x000f] reserved
[0.00] BIOS-e820: [mem 0x0010-0x6a305fff] usable
[0.00] BIOS-e820: [mem 0x6a306000-0x6a306fff] ACPI NVS
[0.00] BIOS-e820: [mem 0x6a307000-0x6a307fff] reserved
[0.00] BIOS-e820: [mem 0x6a308000-0x7838dfff] usable
[0.00] BIOS-e820: [mem 0x7838e000-0x7874afff] reserved
[0.00] BIOS-e820: [mem 0x7874b000-0x78791fff] ACPI data
[0.00] BIOS-e820: [mem 0x78792000-0x78e85fff] ACPI NVS
[0.00] BIOS-e820: [mem 0x78e86000-0x7951] reserved
[0.00] BIOS-e820: [mem 0x7952-0x795fefff] type 20
[0.00] BIOS-e820: [mem 0x795ff000-0x795f] usable
[0.00] BIOS-e820: [mem 0x7960-0x7f7f] reserved
[0.00] BIOS-e820: [mem 0xf000-0xf7ff] reserved
[0.00] BIOS-e820: [mem 0xfe00-0xfe010fff] reserved
[0.00] BIOS-e820: [mem 0xfec0-0xfec00fff] reserved
[0.00] BIOS-e820: [mem 0xfee0-0xfee00fff] reserved
[0.00] BIOS-e820: [mem 0xff00-0x] reserved
[0.00] BIOS-e820: [mem 0x0001-0x00047e7f] usable
[0.00] NX (Execute Disable) protection: active
[0.00] efi: EFI v2.40 by American Megatrends
[0.00] efi: ACPI=0x7875a000 ACPI 2.0=0x7875a000 SMBIOS=0x79367000 
SMBIOS 3.0=0x79366000 TPMFinalLog=0x78b27000 ESRT=0x792bd198 MEMATTR=0x75be0018 
MOKvar=0x79363000 
[0.00] secureboot: Secure boot disabled
[0.00] SMBIOS 3.0.0 present.
[0.00] DMI: Dell Inc. XPS 15 9560/05FFDN, BIOS 1.28.0 03/23/2022
[0.00] tsc: Detected 2800.000 MHz processor
[0.00] tsc: Detected 2799.927 MHz TSC
[0.000717] e820: update [mem 0x-0x0fff] usable ==> reserved
[0.000720] e820: remove [mem 0x000a-0x000f] usable
[0.000730] last_pfn = 0x47e800 max_arch_pfn = 0x4
[0.000844] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
[0.001398] last_pfn = 0x79600 max_arch_pfn = 0x4
[0.009942] found SMP MP-table at [mem 0x000fced0-0x000fcedf]
[0.009956] esrt: Reserving ESRT space from 0x792bd198 to 
0x792bd1d0.
[0.009966] Kernel/User page tables isolation: disabled on command line.
[0.009967] Using GB pages for direct mapping
[0.010344] RAMDISK: [mem 0x304b3000-0x34250fff]
[0.010349] ACPI: Early table checksum verification disabled
[0.010352] ACPI: RSDP 0x7875A000 24 (v02 DELL  )
[0.010356] ACPI: XSDT 0x7875A0D0 00011C (v01 DELL   CBX3 
01072009 AMI  00010013)
[0.010361] ACPI: FACP 0x7877FA78 00010C (v05 DELL   CBX3 
01072009 AMI  00010013)
[0.010366] ACPI: DSDT 0x7875A278 0257FF (v02 DELL   CBX3 
01072009 INTL 20160422)
[

Bug#1055261: ITP: openmrac-data -- split-screen multiplayer 3D racing game (data files)

2023-11-03 Thread David da Silva Polverari
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: openmrac-data
  Version : 1.1
  Upstream Contact: Vojtěch Salajka 
* URL : https://github.com/Franticware/OpenMRac-data
* License : CC0
  Programming Lang: none (data files for openmrac)
  Description : split-screen multiplayer 3D racing game (data files)

 OpenMRac is an open-source release of FranticWare's MultiRacer. It is a
 multiplayer racing game that runs on Linux and Microsoft Windows.
 .
 It can be played in single player mode, running against oneself's "ghost" from
 previous lap, or in multi-player mode, in a vertical split screen against up
 to 3 other opponents.
 .
 OpenMRac is simpler than TORCS, although it offers better model reflections
 than the latter.
 .
 This package contains the data files for openmrac.

This package is a dependency for openmrac [1]. I plan to maintain it by
myself initially, but I will propose maintaining it inside the games
team in the future, with me as uploader.

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017986



Bug#1052199: RM: pev -- ROM; renamed upstream; replaced by readpe

2023-09-18 Thread David da Silva Polverari
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
X-Debbugs-Cc: p...@packages.debian.org
Control: affects -1 + src:pev

Dear ftpmasters,

Please remove pev. It  was renamed to readpe upstream[1][2], and readpe
is already packaged and is present in unstable [3]. Bugs were opened
against packages that build-depends (libz-mingw-w64) [4] and depends
(forensics-extra) [5] on pev.

readpe builds a dummy 'pev' transitional package to provide an upgrade
path for existing users.

[1] https://github.com/merces/pev
[2] https://github.com/mentebinaria/readpe/issues/182
[3] https://tracker.debian.org/pkg/readpe
[4] https://bugs.debian.org/1050056
[5] https://bugs.debian.org/1050055

Regards,

-- 
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari 
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄


signature.asc
Description: PGP signature


Bug#1052063: regression: nvme drive not found after kernel upgrade from bookworm-security

2023-09-18 Thread David da Silva Polverari
On Sat, Sep 16, 2023 at 11:15:42PM +0200, Salvatore Bonaccorso wrote:
> 
> Can you verify if it's this issue known upstream?
> 
> https://lore.kernel.org/regressions/5dhv0s.d0f751zf65...@gmail.com/
> 
Yes, it is the same issue. Sorry for taking too long to reply. I was
juggling with low partition space on my /boot to install a upstream
kernel on my laptop.

> Does reverting the mentioned patch fix the issue?
>
Yes, I checked v6.1.46 out from linux stable, built it, and tried to
boot. It presented the same problem as Debian's 6.1.0-12 (6.1.52-1).
After reverting commit 8ee39ec479147e29af704639f8e55fce246ed2d9 and
building it again, booting went fine.  Hope it helps.

Regards,
David



Bug#1050055: forensics-extra depends on pev

2023-08-18 Thread David da Silva Polverari
Source: forensics-extra
Version: 2.44
Severity: normal

Dear Maintainer(s),

Your package depends on pev, but it has been renamed to readpe due to
upstream changes.

readpe is still in experimental. I will wait 15 days before uploading it
to unstable. If you need more time, please let me know.

Regards,

David.



Bug#1050056: libz-mingw-w64 build-depends on pev

2023-08-18 Thread David da Silva Polverari
Source: libz-mingw-w64
Version: 1.2.13+dfsg-1
Severity: normal

Dear Maintainer(s),

Your package build-depends on pev, but it has been renamed to readpe due
to upstream changes.

readpe is still in experimental. I will wait 15 days before uploading it
to unstable. Please let me know if you need more time, or if you had any
problems with it. Any feedback/testing is appreciated.

Regards,

David.



Bug#1021278: pngcheck: CVE-2020-35511

2022-10-20 Thread David da Silva Polverari
Hi,

I adjusted the affected versions in the BTS, but I couldn't find any
patch for it. The reference to buffer overflows seem related to
CVE-2020-27818, so I wonder whether it is a duplicate or not.

If it is, it was already closed in [1].

[1] CVE-2020-27818

Regards,
David



Bug#1021278: pngcheck: CVE-2020-35511

2022-10-20 Thread David da Silva Polverari
Sorry, I made a mistake when trying to send the link to the closed bug
[1]. You can find the right link below.

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976350

Regards,
David.



Bug#1021278: (no subject)

2022-12-15 Thread David da Silva Polverari
fixed 1021278 3.0.2-2
thanks



Bug#1034731: bullseye-pu: package pev/0.81-3

2023-04-22 Thread David da Silva Polverari
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: david.polver...@gmail.com

[ Reason ]
A Buffer Overflow vulnerability exists in Pev 0.81 via the pe_exports
function from exports.c.. The array offsets_to_Names is dynamically
allocated on the stack using exp->NumberOfFunctions as its size.
However, the loop uses exp->NumberOfNames to iterate over it and set its
components value. Therefore, the loop code assumes that
exp->NumberOfFunctions is greater than ordinal at each iteration. This
can lead to arbitrary code execution.

[ Impact ]
If the update isn't approved, users of pev in stable might have their
systems compromised by opening a maliciously-crafted PE file.

[ Tests ]
(What automated or manual tests cover the affected code?)

[ Risks ]
The fix is trivial and should not present any risks. Also, the fix was
already applied upstream.

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
The only change made to the package was the application of the existing
upstream patch.

[ Other info ]
No more info.
diff -Nru pev-0.81/debian/changelog pev-0.81/debian/changelog
--- pev-0.81/debian/changelog   2021-05-05 12:09:18.0 +
+++ pev-0.81/debian/changelog   2023-04-22 20:48:00.0 +
@@ -1,3 +1,11 @@
+pev (0.81-3+deb11u1) bullseye; urgency=medium
+
+  * debian/patches/0002-fix-bo-pe_exports.patch: created to fix a buffer
+overflow vulnerability present on libpe's pe_exports function
+(CVE-2021-45423). (Closes: #1034725)
+
+ -- David da Silva Polverari   Sat, 22 Apr 2023 
20:48:00 +
+
 pev (0.81-3) unstable; urgency=medium
 
   * QA upload.
diff -Nru pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch 
pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch
--- pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch1970-01-01 
00:00:00.0 +
+++ pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch2023-04-22 
20:48:00.0 +
@@ -0,0 +1,28 @@
+Description: fix a buffer overflow vulnerability (CVE-2021-45423)
+ A Buffer Overflow vulnerability exists in Pev 0.81 via the pe_exports function
+ from exports.c. The array offsets_to_Names is dynamically allocated on the
+ stack using exp->NumberOfFunctions as its size. However, the loop uses
+ exp->NumberOfNames to iterate over it and set its components value. Therefore,
+ the loop code assumes that exp->NumberOfFunctions is greater than ordinal at
+ each iteration. This can lead to arbitrary code execution.
+Author: Saullo Carvalho Castelo Branco 
+Origin: upstream, 
https://github.com/merces/libpe/commit/5f44724e8fcdebf8a6b9fd009543c9dcfae4ea32
+Bug: https://github.com/merces/libpe/issues/35
+Bug-Debian: https://bugs.debian.org/1034725
+Applied-Upstream: 
https://github.com/merces/libpe/commit/5f44724e8fcdebf8a6b9fd009543c9dcfae4ea32
+Last-Update: 2023-04-22
+
+--- a/lib/libpe/exports.c
 b/lib/libpe/exports.c
+@@ -130,7 +130,10 @@
+ 
+   const uint32_t entry_name_rva = *entry_name_list;
+   const uint64_t entry_name_ofs = pe_rva2ofs(ctx, entry_name_rva);
+-  offsets_to_Names[ordinal] = entry_name_ofs;
++
++if (ordinal < exp->NumberOfFunctions) {
++offsets_to_Names[ordinal] = entry_name_ofs;
++}
+   }
+ 
+   //
diff -Nru pev-0.81/debian/patches/series pev-0.81/debian/patches/series
--- pev-0.81/debian/patches/series  2021-05-05 12:09:18.0 +
+++ pev-0.81/debian/patches/series  2023-04-22 20:48:00.0 +
@@ -1 +1,2 @@
 0001-widechar-off-by-one.patch
+0002-fix-bo-pe_exports.patch


Bug#1034813: unblock: pev/0.81-9

2023-04-24 Thread David da Silva Polverari
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: p...@packages.debian.org, david.polver...@gmail.com
Control: affects -1 + src:pev

Please unblock package pev

[ Reason ]
As per https://udd.debian.org/cgi-bin/key_packages.yaml.cgi, pev is
considered a key package. The version in testing (0.81-8) suffers from
an important bug (#1034725). As such, it will not be removed if the
fixed version doesn't migrate to testing.

[ Impact ]
If pev/0.81-9 does not migrate to testing, bookworm users will likely
install and use an exploitable version of pev at release. If used to
open a maliciously-crafted PE file, it might result in the compromise of
the user's machine. There is a link for a PoC video of exploitability of
the bug at the closed upstream issue [1].

[1] (https://github.com/merces/libpe/issues/35)

[ Tests ]
No existing automated or manual tests exercise the affected code.

[ Risks ]
The changes made to the package are trivial. The applied patch
originated from upstream, and its changes are minimal. There is more
risk in not applying the patch than doing it.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock pev/0.81-9
diff -Nru pev-0.81/debian/changelog pev-0.81/debian/changelog
--- pev-0.81/debian/changelog   2022-11-07 17:46:55.0 +
+++ pev-0.81/debian/changelog   2023-04-22 19:41:47.0 +
@@ -1,3 +1,17 @@
+pev (0.81-9) unstable; urgency=medium
+
+  [ Debian Janitor ]
+  * Use secure URI in Homepage field.
+  * Update standards version to 4.6.2, no changes needed.
+
+  [ David da Silva Polverari ]
+  * debian/copyright: updated packaging copyright years.
+  * debian/patches/0006-fix-bo-pe_exports.patch: created to fix a buffer
+overflow vulnerability present on libpe's pe_exports function
+(CVE-2021-45423). (Closes: #1034725)
+
+ -- David da Silva Polverari   Sat, 22 Apr 2023 
19:41:47 +
+
 pev (0.81-8) unstable; urgency=medium
 
   * debian/control: bumped Standards-Version to 4.6.1.
diff -Nru pev-0.81/debian/control pev-0.81/debian/control
--- pev-0.81/debian/control 2022-11-07 17:46:55.0 +
+++ pev-0.81/debian/control 2023-04-22 19:41:47.0 +
@@ -1,9 +1,9 @@
 Source: pev
 Maintainer: David da Silva Polverari 
-Homepage: http://pev.sourceforge.net
+Homepage: https://pev.sourceforge.net
 Section: utils
 Priority: optional
-Standards-Version: 4.6.1
+Standards-Version: 4.6.2
 Build-Depends: debhelper-compat (= 13), libssl-dev
 Rules-Requires-Root: no
 Vcs-Browser: https://salsa.debian.org/debian/pev
diff -Nru pev-0.81/debian/copyright pev-0.81/debian/copyright
--- pev-0.81/debian/copyright   2022-11-07 17:46:55.0 +
+++ pev-0.81/debian/copyright   2023-04-22 19:41:47.0 +
@@ -59,7 +59,7 @@
2016-2021 Petter Reinholdtsen 
2017  Adam Borowski 
2020  Adrian Bunk 
-   2021-2022 David da Silva Polverari 
+   2021-2023 David da Silva Polverari 
2021  Jelmer Vernooij 
 License: BSD-3-Clause
 
diff -Nru pev-0.81/debian/patches/0006-fix-bo-pe_exports.patch 
pev-0.81/debian/patches/0006-fix-bo-pe_exports.patch
--- pev-0.81/debian/patches/0006-fix-bo-pe_exports.patch1970-01-01 
00:00:00.0 +
+++ pev-0.81/debian/patches/0006-fix-bo-pe_exports.patch2023-04-22 
19:41:47.0 +
@@ -0,0 +1,28 @@
+Description: fix a buffer overflow vulnerability (CVE-2021-45423)
+ A Buffer Overflow vulnerability exists in Pev 0.81 via the pe_exports function
+ from exports.c. The array offsets_to_Names is dynamically allocated on the
+ stack using exp->NumberOfFunctions as its size. However, the loop uses
+ exp->NumberOfNames to iterate over it and set its components value. Therefore,
+ the loop code assumes that exp->NumberOfFunctions is greater than ordinal at
+ each iteration. This can lead to arbitrary code execution.
+Author: Saullo Carvalho Castelo Branco 
+Origin: upstream, 
https://github.com/merces/libpe/commit/5f44724e8fcdebf8a6b9fd009543c9dcfae4ea32
+Bug: https://github.com/merces/libpe/issues/35
+Bug-Debian: https://bugs.debian.org/1034725
+Applied-Upstream: 
https://github.com/merces/libpe/commit/5f44724e8fcdebf8a6b9fd009543c9dcfae4ea32
+Last-Update: 2023-04-22
+
+--- pev-0.81.orig/lib/libpe/exports.c
 pev-0.81/lib/libpe/exports.c
+@@ -130,7 +130,10 @@ pe_exports_t *pe_exports(pe_ctx_t *ctx)
+ 
+   const uint32_t entry_name_rva = *entry_name_list;
+   const uint64_t entry_name_ofs = pe_rva2ofs(ctx, entry_name_rva);
+-  offsets_to_Names[ordinal] = entry_name_ofs;
++
++if (ordinal < exp->NumberOfFunctions) {
++offsets_to_Names[ordinal] = entry_name_ofs;
++}
+   }
+ 
+   //
diff -Nru pev-0.81/debian/patches/series pev-0.81/debian/patches/series
--- 

Bug#1034736: bullseye-pu: package pev/0.81-3+deb11u1

2023-04-22 Thread David da Silva Polverari
Package: release.debian.org
Severity: important
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: david.polver...@gmail.com

[ Reason ]
A buffer overflow vulnerability exists in Pev 0.81 via the pe_exports
function from exports.c. The array offsets_to_Names is dynamically
allocated on the stack using exp->NumberOfFunctions as its size.
However, the loop uses exp->NumberOfNames to iterate over it and set its
components value. Therefore, the loop code assumes that
exp->NumberOfFunctions is greater than ordinal at each iteration. This
can lead to arbitrary code execution.

[ Impact ]
If the update isn't approved, users of pev in stable might have their
systems compromised by opening a maliciously-crafted PE file.

[ Tests ]
None of the existing autopkgtests fail.

[ Risks ]
The fix is trivial and should not present any risks. Also, the fix was
already applied upstream.

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
The only change made to the package was the application of the existing
upstream patch.

[ Other info ]
No other information.
diff -Nru pev-0.81/debian/changelog pev-0.81/debian/changelog
--- pev-0.81/debian/changelog   2021-05-05 12:09:18.0 +
+++ pev-0.81/debian/changelog   2023-04-22 20:48:00.0 +
@@ -1,3 +1,12 @@
+pev (0.81-3+deb11u1) bullseye; urgency=medium
+
+  * debian/patches/0002-fix-bo-pe_exports.patch: created to fix a buffer
+overflow vulnerability present on libpe's pe_exports function from 
exports.c
+(CVE-2021-45423). Without this patch, a maliciously-crafted PE file opened
+by pev utilities can trigger arbitrary code execution. (Closes: #1034725)
+
+ -- David da Silva Polverari   Sat, 22 Apr 2023 
20:48:00 +
+
 pev (0.81-3) unstable; urgency=medium
 
   * QA upload.
diff -Nru pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch 
pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch
--- pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch1970-01-01 
00:00:00.0 +
+++ pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch2023-04-22 
20:48:00.0 +
@@ -0,0 +1,28 @@
+Description: fix a buffer overflow vulnerability (CVE-2021-45423)
+ A Buffer Overflow vulnerability exists in Pev 0.81 via the pe_exports function
+ from exports.c. The array offsets_to_Names is dynamically allocated on the
+ stack using exp->NumberOfFunctions as its size. However, the loop uses
+ exp->NumberOfNames to iterate over it and set its components value. Therefore,
+ the loop code assumes that exp->NumberOfFunctions is greater than ordinal at
+ each iteration. This can lead to arbitrary code execution.
+Author: Saullo Carvalho Castelo Branco 
+Origin: upstream, 
https://github.com/merces/libpe/commit/5f44724e8fcdebf8a6b9fd009543c9dcfae4ea32
+Bug: https://github.com/merces/libpe/issues/35
+Bug-Debian: https://bugs.debian.org/1034725
+Applied-Upstream: 
https://github.com/merces/libpe/commit/5f44724e8fcdebf8a6b9fd009543c9dcfae4ea32
+Last-Update: 2023-04-22
+
+--- a/lib/libpe/exports.c
 b/lib/libpe/exports.c
+@@ -130,7 +130,10 @@
+ 
+   const uint32_t entry_name_rva = *entry_name_list;
+   const uint64_t entry_name_ofs = pe_rva2ofs(ctx, entry_name_rva);
+-  offsets_to_Names[ordinal] = entry_name_ofs;
++
++if (ordinal < exp->NumberOfFunctions) {
++offsets_to_Names[ordinal] = entry_name_ofs;
++}
+   }
+ 
+   //
diff -Nru pev-0.81/debian/patches/series pev-0.81/debian/patches/series
--- pev-0.81/debian/patches/series  2021-05-05 12:09:18.0 +
+++ pev-0.81/debian/patches/series  2023-04-22 20:48:00.0 +
@@ -1 +1,2 @@
 0001-widechar-off-by-one.patch
+0002-fix-bo-pe_exports.patch


Bug#1040810: ITP: readpe -- command-line tools to manipulate Windows PE files

2023-07-10 Thread David da Silva Polverari
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: readpe
  Version : 0.82
  Upstream Contact: https://github.com/mentebinaria/readpe/issues
* URL : https://github.com/mentebinaria/readpe
* License : GPL-2+ with OpenSSL Exception
  Programming Lang: C
  Description : command-line tools to manipulate Windows PE files

readpe is a toolkit designed to analyze Microsoft Windows PE (Portable
Executable) binary files.  Its tools can parse and compare PE32/PE32+
executable files (EXE, DLL, OCX, etc), and analyze them in search of
suspicious characteristics.

It can be used to get information from those executable files, such as
headers, sections, resources and more. It also provides tools to disassemble
PE files and determine their security mitigations.  It is useful for
application security research, digital forensics and incident response, and
malware analysis.

It is similar to elftools, only designed for PE files. It has more features
than other more specific PE tools, such as icoextract or ntldd.

This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres,
pescan, pesec, pestr, readpe and rva2ofs commands.

This package is a newer version of the pev package (already maintained
in Debian by me), as upstream renamed it to readpe. I plan to maintain
it inside the pkg-security team umbrella.



Bug#1043043: UDD patches: marks Forwarded as invalid if not 'no', 'not-needed', 'yes' or URL

2023-08-04 Thread David da Silva Polverari
Package: qa.debian.org
Severity: normal
User: qa.debian@packages.debian.org
Usertags: udd

Hi,

When using https://udd.debian.org/patches.cgi, I notice that whenever
the Forwarded field contains anything other than "no", "not-needed",
"yes" or an URL, it gets marked as invalid.

That includes cases where it begins with "yes", but is complemented with
other data, as can be seen by contrasting a search on Debian Sources
about those packages [1] with their respective patch metadata status on
UDD.

In its current form, patches.cgi marks as invalid patches that include
useful information on the Forwarded field, such as the mail address to
which the patch was forwarded, when upstream doesn't have a public
mailing list archive or a web pull/merge request tracker, for example.

According to DEP-3 [2], if the Forwarded field is present, any other
value other than "no" or "not-needed" should be considered valid:

  Any value other than "no" or "not-needed" means that the patch has
  been forwarded upstream. Ideally the value is an URL proving that it
  has been forwarded and where one can find more information about its
  inclusion status.

As such, I think it would be interesting to either propose changes to
DEP-3 or to adhere more closely to it.

Thanks,
David

[1] 
https://codesearch.debian.net/search?q=file%3Adebian%2Fpatches%2F*.patch+Forwarded%3A+yes+.%2B=0
[2] https://dep-team.pages.debian.net/deps/dep3/



Bug#244289: xball: Package includes non-free source code.

2023-07-26 Thread David da Silva Polverari
I unarchived this bug as the package still contains the source file
act_area.c with the same non-free license.

I marked it as found in xball/3.0-12 because it was the earliest version
I was able to dig on debsnaps. As such, I couldn't pinpoint the exact
version between that and 3.0-5 in which the file was reintroduced.

-- 
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari 
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄



Bug#1063185: readpe: NMU diff for 64-bit time_t transition

2024-02-10 Thread David da Silva Polverari
Dear Steve,

First of all, thanks for your report and for the work on the transition!

After having a look at [1] and [2], I found the only reported problem
was due to the usage of a pointer to the pe_ctx structure (typedef'ed as
pe_ctx_t) [3] as the first parameter of the exported functions from
libpe, as its map_size field is of type off_t ("Base type has been
changed from long to long long. Recompilation of a client program may be
broken.").

The output of `apt rdepends libpe1` shows that only the binaries built
by readpe depend on it. Besides, within readpe itself, there is only one
mention to accessing the map_size field directly outside of libpe, and
it is commented out [4].

That said, I am not sure that including readpe in the transition will be
necessary, but maybe I have overlooked something. But I thought I should
add this information here.

[1] 
https://adrien.dcln.fr/misc/armhf-time_t/2024-02-01T09:53:00/compat_reports/libpe-dev/base_to_lfs/compat_report.html
[2] 
https://adrien.dcln.fr/misc/armhf-time_t/2024-02-01T09:53:00/compat_reports/libpe-dev/lfs_to_time_t/compat_report.html
[3] 
https://salsa.debian.org/pkg-security-team/readpe/-/blob/debian/master/lib/libpe/include/libpe/context.h?ref_type=heads#L72
[4] 
https://salsa.debian.org/pkg-security-team/readpe/-/blob/debian/master/src/pescan.c?ref_type=heads#L372

Regards,

-- 
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari 
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄



Bug#1063747: ITP: voacapl -- HF circuit prediction engine

2024-02-11 Thread David da Silva Polverari
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: voacapl
  Version : 0.7.6
  Upstream Contact: James Watson 
* URL : https://github.com/jawatson/voacapl
* License : special (public domain), CC0-1.0 and GPL-3+ parts
  Programming Lang: Fortran
  Description : HF circuit prediction engine
   voacapl is an implementation of VOACAP, the NTIA/ITS professional HF (high
   frequency) propagation prediction program, originally developed for Voice of
   America (VOA). It reads input files in the standard VOACAP format and writes
   point-to-point or area prediction data to an output file (or files).
   .
   voacapl helps amateur radio operators ("hams") predict point-to-point path
   loss and coverage of a given transceiver if given as inputs the transmitting
   and receiving antennas, solar weather, and time/date.
   .
   The suggested pythonprop package provides a graphical interface for voacapl,
   accepting inputs as fields and plotting the results as graphics.

VOACAP (Voice of America Coverage Analysis Program) is a modified
version of IONCAP (Ionospheric Communication Analysis and Prediction
Program), developed for use by Voice Of America (VOA).

Originally, IONCAP was developed by the National Telecommunications and
Information Administration (NTIA), being a model that has been under
development by the U.S. Government since 1942. The strength of the model
is that it uses world maps of ionospheric parameters to construct the
ionospheric path and uses path-specific statistics to evaluate the
system performance factors.

IONCAP was selected by the VOA in 1985 because it provided the system
performance analysis capability they needed for design specifications
and it had a proven track record.

VOACAP's enhanced model is used worldwide to predict HF point-to-point
or area data. It is often used on Microsoft Windows, distributed inside
the HFWIN32 suite [1], where it is called VOACAPW.

There is a shortage of HF prediction packages on Debian. In the past, I
had to resort to using Windows machines to make HF predictions. Thus, I
intend to package voacapl, along with its companion GUI, pythonprop,
which depends on it.

Initially, I plan to package it by myself, and I will propose including
it in the Debian Hamradio Team. I don't need a sponsor. I have already
packaged them both, and just need to make some minor adjustments.

[1] http://www.greg-hand.com/hfwin32.html

-- 
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari 
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄



Bug#1063748: ITP: pythonprop -- graphical interface to the VOACAP HF propagation engine

2024-02-11 Thread David da Silva Polverari
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: pythonprop
  Version : 0.30.1
  Upstream Contact: James Watson 
* URL : https://github.com/jawatson/pythonprop
* License : GPL-2+
  Programming Lang: Python3
  Description : graphical interface to the VOACAP HF propagation engine
   pythonprop is a collection of Python 3 scripts designed to create VOACAP
   input (.dat) files and plot the resulting predictions.
   .
   It can be used either in point-to-point (P2P) mode, to produce HF (High
   Frequency) propagation predictions between two fixed locations, or in area
   mode, to produce HF propagation plots over a user-defined area from a fixed
   transmit site.
   .
   This package provides the voacapgui, voaP2PPlot and voaAreaPlot scripts. It 
is
   useful for making HF (High Frequency) circuit prediction for amateur radio
   ("ham radio") operators.

This package provides a GUI for the voacapl package [1]. I plan to
maintain it by myself initially, later proposing to include it on the
Debian Hamradio Team. I don't need a sponsor.

[1] https://bugs.debian.org/1063747

-- 
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari 
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄



Bug#1061774: nmu: pngcheck_3.0.3-1

2024-01-29 Thread David da Silva Polverari
On Mon, Jan 29, 2024 at 04:45:59PM +0100, Filip Hroch wrote:
> Dear Release Team,
> 
> may I ask you to rebuild pngcheck package against to
> the current version of zlib?
> 
> I'm maintainer of fitspng package having bug #1059970,
> and I found that the bug is not related on fitspng itself.
> Actually, it is caused by pngcheck during CI tests
> verification. The current binary of pngcheck is compiled
> against an old zlib yet, and needs a recompilation.
> 
In my opinion, there is no need for a rebuild. This is just a warning
that upstream deemed useful to include on the program. If tests are
failing because of that, I believe that fitspng tests are the ones that
should be updated to take that behaviour into account (using
allow-stderr and grepping for the 'OK', for example). If zlib's SONAME
hasn't changed, there's not need to link against a newer version.

Regards,
David