Bug#890723: RFS: slick-greeter/1.1.4-1

2018-02-17 Thread foss.freedom
Package: sponsorship-requests
Severity: normal

Dear mentors,

  I am looking for a sponsor for my package "slick-greeter"

 * Package name: slick-greeter
   Version : 1.1.4-1
  Upstream Author :  Clement Lefebvre 
 * URL : https://github.com/linuxmint/slick-greeter/
 * License : GPL-3+
  Section : x11

  It builds those binary packages:

slick-greeter - Slick-looking LightDM greeter

  To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/slick-greeter

  Alternatively, one can download the package with dget using this command:

dget -x 
https://mentors.debian.net/debian/pool/main/s/slick-greeter/slick-greeter_1.1.4-1.dsc

Notes:

check-all-the-things has been run on the source. This time around on
the latest debian unstable it found an issue with
debian/upstream/metadata and this was resolved (see the changelog)

lintian -i -I --pedantic run on the built source.  It is lintian free
with the exception of the
following information/pedantic issues;

testsuite-autopkgtest-missing - I don't believe a autopkgtest is
required for a greeter

no-upstream-changelog - upstream does not supply a changelog so I have
summarised the changes in the debian/changelog

debian-watch-does-not-check-gpg-signature - upstream do not sign their
release tarballs

built source compiles via pbuilder-dist on unstable - it has been
installed on unstable as well.

  Changes since the last upload:

* New upstream release
- Build correctly with vala > 0.39
- Latest translations
- Reset config keys if not in slick config file
- Add multimonitor support when used with docking stations
- Fix failure to connect to user-session components
- Slick config component file changes
  * Packaging Changes:
- Drop existing patches except for sans-schema-font.patch
- Add patch mint-master-unstable-19.patch
- debian/copyright 2018 year change and http --> https
- debian/{compat/control} debhelper v11
- debian/control Bump Standards-Version (no changes required)
- debian/upstream/metadata fix check-all-the-things warning
  for missing document-start
- debian/rules remove override to remove broken symlink since this
  symlink has now been removed in the source

  Regards,
   David Mohammed



Bug#890461: marked as done (RFS: igmpproxy/0.2.1-1)

2018-02-17 Thread Debian Bug Tracking System
Your message dated Sat, 17 Feb 2018 23:18:39 +0200
with message-id <20180217211839.GA14956@localhost>
and subject line Re: Bug#890461: RFS: igmpproxy/0.2.1-1
has caused the Debian Bug report #890461,
regarding RFS: igmpproxy/0.2.1-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
890461: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890461
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "igmpproxy"

 * Package name: igmpproxy
   Version : 0.2.1-1
   Upstream Author : Pali Rohár 
 * URL : https://github.com/pali/igmpproxy
 * License : BSD-3-clause and GPL-2+
   Section : net

It builds those binary packages:

  igmpproxy  - IGMP multicast routing daemon

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/igmpproxy


Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/i/igmpproxy/igmpproxy_0.2.1-1.dsc

More information about igmpproxy can be obtained from 
https://github.com/pali/igmpproxy.

Changes since the last upload:

  * New upstream release
  * Update Standards-Version to 4.1.3
  * Update to debhelper 10
  * Use https links in copyright

Regards,
 Pali Rohár


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
On Wed, Feb 14, 2018 at 11:04:40PM +0100, Pali Rohár wrote:
>...
> Changes since the last upload:
> 
>   * New upstream release
>   * Update Standards-Version to 4.1.3
>   * Update to debhelper 10
>   * Use https links in copyright

Thanks, uploaded.

> Regards,
>  Pali Rohár

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed--- End Message ---


Bug#890712: Subject: RFS: wxmaxima/18.02.0-1

2018-02-17 Thread Gunter Königsmann
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "wxmaxima"

* Package name: wxmaxima
  Version : 18.02.0-1
  Upstream Author : [fill in name and email of upstream]
* URL : [fill in URL of upstreams web site]
* License : [fill in]
  Section : math

It builds those binary packages:

  wxmaxima   - GUI for the computer algebra system Maxima

wxMaxima is a powerful GUI for Maxima, a program that is specialised in
symbolic computing, but has powerful methods for numeric calculations,
as well.

One sample maxima session would read:

(%i1)   a^3+b^2+c=5;
(%o1)   c+b^2+a^3=5

(%i2)   solve(%,a);
(%o2)
[a=((sqrt(3)*%i-1)*(-c-b^2+5)^(1/3))/2,a=-((sqrt(3)*%i+1)*(-c-b^2+5)^(1/3))/2,a=(-c-b^2+5)^(1/3)]

(%i3)   subst([b=3,c=2],%);
(%o3)
[a=-(6^(1/3)*(sqrt(3)*%i-1))/2,a=(6^(1/3)*(sqrt(3)*%i+1))/2,a=-6^(1/3)]

(%i4)   float(%);
(%o4)
[a=-0.9085602964160698*(1.732050807568877*%i-1.0),a=0.9085602964160698*(1.732050807568877*%i+1.0),a=-1.81712059283214]


To access further information about this package, please visit the
following URL:

https://mentors.debian.net/package/wxmaxima


Alternatively, one can download the package with dget using this command:

dget -x
https://mentors.debian.net/debian/pool/main/w/wxmaxima/wxmaxima_18.02.0-1.dsc

More information about wxMaxima can be obtained from
https://mentors.debian.net/package/wxmaxima.

Changes since the last upload:

 * New upstream Version that tries to improve usability and speed of the
program and contains many code simplification that try to reduce the
number of places bugs can reside in, as well as > 100 bug fixes.


Regards,
   Gunter Königsmann



Bug#890458: marked as done (RFS: udftools/2.0-2)

2018-02-17 Thread Debian Bug Tracking System
Your message dated Sat, 17 Feb 2018 22:57:32 +0200
with message-id <20180217205732.GA10530@localhost>
and subject line Re: Bug#890458: RFS: udftools/2.0-1
has caused the Debian Bug report #890458,
regarding RFS: udftools/2.0-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
890458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890458
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "udftools"

 * Package name: udftools
   Version : 2.0-2
   Upstream Author : Pali Rohár 
 * URL : https://github.com/pali/udftools
 * License : GPL-2+
   Section : otherosfs

It builds those binary packages:

  udftools   - tools for UDF filesystems and DVD/CD-R(W) drives

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/udftools


Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/u/udftools/udftools_2.0-2.dsc

More information about udftools can be obtained from 
https://github.com/pali/udftools.

Changes since the last upload:

 * Fix installation in chroot (Closes: #890224)

Regards,
 Pali Rohár


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
On Wed, Feb 14, 2018 at 11:00:06PM +0100, Pali Rohár wrote:
>...
> Changes since the last upload:
> 
>  * Fix installation in chroot (Closes: #890224)

Thanks, uploaded.

> Regards,
>  Pali Rohár

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed--- End Message ---


Bug#890681: RFS: gexiv2/0.10.8-1 -- GObject-based wrapper around the Exiv2 library

2018-02-17 Thread Jason Crain
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "gexiv2"

* Package name: gexiv2
  Version : 0.10.8-1
  Upstream Author : Jens Georg 
* URL : https://wiki.gnome.org/Projects/gexiv2
* License : GPL-2+
  Section : libs

It builds those binary packages:

gir1.2-gexiv2-0.10 - GObject-based wrapper around the Exiv2 library - 
introspection data
libgexiv2-2 - GObject-based wrapper around the Exiv2 library
libgexiv2-dev - GObject-based wrapper around the Exiv2 library - development 
files
libgexiv2-doc - GObject-based wrapper around the Exiv2 library - documentation

To access further information about this package, please visit the following 
URL:

https://mentors.debian.net/package/gexiv2


Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/g/gexiv2/gexiv2_0.10.8-1.dsc

More information about gexiv2 can be obtained from
https://wiki.gnome.org/Projects/gexiv2.

Changes since the last upload:

  * New upstream version 0.10.8
  * Drop Fix-documentation-typos.patch: applied upstream
  * Bump debhelper compat to 11
  * Bump Standards-Version to 4.1.3. No changes needed.
  * Update symbols file
  * Build with meson. Static library is no longer built.
  * Update d/watch URL
  * Update Vcs fields for migration to https://salsa.debian.org/
  * Add lintian override for python-package-missing-depends-on-python.  The
gir1.2-gexiv2-0.10 package contains gobject-introspection files and
includes overrides for both Python 2 and 3.  It cannot declare a
dependency on Python because it's possible to use the introspection files
from Python 2, or 3, or many other languages.


Regards,
  Jason Crain



Bug#884816: Bug#890604: Can't reproduce vulnerability on latest packaged FA version

2018-02-17 Thread Janusz Dobrowolski
control: tags -1 +moreinfo +unreproducible

Hi,

As far a I know all the old vulnerabilities reported on debian
bugtracker has been fixed in the package made available on
mentors.debian.org page. Anyway, to be sure I have tried to reproduce
this bug mentioned on new installation version to no avail. CSRF
countermeasures implemented long time ago in response also to CVE cited
seems to work as expected, so exploit code available (e.g. here:
https://securitywarrior9.blogspot.fr/2018/02/cross-site-request-forgery-front.html)
does not work, returning 'Request from outside of this page is
forbidden.' in the json payload returned, with no changes in application
data.

Saying that, maybe still there are some additional conditions, which
allow attacker to omit csrf token checks, not stated in the
vulnerabilities reports, so I decied just to add moreinfo tag. I'm eager
to fix the issue as soon as I can reproduce it.

Janusz



On 16.02.2018 17:22, Antoine Beaupre wrote:
> Hi,
>
> I haven't reveiewed the package in details, but before this is accepted
> into Debian, care should be taken to review the existing security
> vulnerabilities that affect this package.
>
> For example, CVE-2018-7176 (bug #890604) currently affects the package
> you are proposing to upload (2.4.3). It the package is uploaded as such,
> you should clarify what the way forward is to fix that package. Either
> it will be fixed in a subsequent release, or the package will have to be
> marked as unsupported in Debian.
>
> https://security-tracker.debian.org/tracker/CVE-2018-7176
>
> Thank you for your attention.
>
> A.



Bug#884816: RFS: frontaccounting/2.4.3-1 [ITA]

2018-02-17 Thread Antoine Beaupré
Control: tags -1 -moreinfo -unreproducible

Could you please followup on the security issue in the actual bug report
(#890604)? This is the RFS, and I doubt you meant to mark the
sponsorship request as "unreproducible". :)

That said, I'm just a messenger: I wanted to make sure you were aware of
the security issues and considered it seriously. You might want to send
the same message to the bug report, and CC secur...@debian.org to make
sure the security issue is filed properly.

Thanks!

A.

On 2018-02-17 11:59:51, Janusz Dobrowolski wrote:
> control: tags -1 +moreinfo +unreproducible
>
> Hi,
>
> As far a I know all the old vulnerabilities reported on debian
> bugtracker has been fixed in the package made available on
> mentors.debian.org page. Anyway, to be sure I have tried to reproduce
> the bug mentioned on new installation version to no avail. CSRF
> countermeasures implemented long time ago in response also to CVE cited
> seems to work as expected, so exploit code available (e.g. here:
> https://securitywarrior9.blogspot.fr/2018/02/cross-site-request-forgery-front.html)
> does not work, returning 'Request from outside of this page is
> forbidden.' in the json payload returned, with no changes in application
> data.
>
> Saying that, maybe still there are some additional conditions, which
> allow attacker to omit csrf token checks, not stated in the
> vulnerabilities reports, so  moreinfo tag added.
>
> Janusz
>
>
>
> On 16.02.2018 17:22, Antoine Beaupre wrote:
>> Hi,
>>
>> I haven't reveiewed the package in details, but before this is accepted
>> into Debian, care should be taken to review the existing security
>> vulnerabilities that affect this package.
>>
>> For example, CVE-2018-7176 (bug #890604) currently affects the package
>> you are proposing to upload (2.4.3). It the package is uploaded as such,
>> you should clarify what the way forward is to fix that package. Either
>> it will be fixed in a subsequent release, or the package will have to be
>> marked as unsupported in Debian.
>>
>> https://security-tracker.debian.org/tracker/CVE-2018-7176
>>
>> Thank you for your attention.
>>
>> A.

-- 
Drowning people
Sometimes die
Fighting their rescuers.
- Octavia Butler



Bug#890666: RFS: mmh/0.3-3

2018-02-17 Thread Dmitry Bogatov

Package: sponsorship-requests
Severity: wishlist

Dear mentors,

I am looking for a sponsor for my package "mmh"

* Package name : mmh
  Version  : 0.3-3
  Upstream Author  : markus schnalke 
* Url  : http://marmaro.de/prog/mmh/
* Licenses : BSD-3-clause
  Programming Lang : C
  Section  : mail

 This is the mmh mail user agent (reader/sender), a command-line based mail
 reader that is powerful and extensible.  mmh is an excellent choice for
 people who receive and process a lot of mail.
 .
 Unlike most mail user agents, mmh is not a single program, rather it is a
 set of programs that are run from the shell.  This allows the user to
 utilize the full power of the Unix shell in coordination with mmh.
 .
 Mmh is a modified version of the electronic mail handling system nmh.
 Nmh (new MH) itself was originally based on the package MH-6.8.3, and
 was intended to be a (mostly) compatible drop-in replacement for MH.
 In contrast, mmh is not intended to be a drop-in replacement for nmh,
 rather mmh breaks compatibility to nmh in order to modernize and
 simplify it.

It builds those binary packages:

  * mmh

This package succesfully builds on debomatic machine:

  https://debomatic-i386.debian.net/distribution#unstable/mmh/0.3-3
 
Please note, that package is maintained with dgit(1) tool
using dgit-maint-merge(7) workflow. For more information about how to
sponsor this package, see dgit-sponsorship(7).

  Git repository: https://salsa.debian.org/iu-guest/mmh.git
  Git branch: master

With /bin/sh following commands should suffice:

  $ git clone https://salsa.debian.org/iu-guest/mmh.git mmh
  $ cd mmh
  $ make -f debian/rules get-orig-source # 'gbp buildpackage' is fine
  $ dgit sbuild


Changes since last upload:

  * Update Vcs-* fields in debian/control.
  * Compile with large file support
  * Update standards version to 4.1.3 (no changes needed)
  * Bump compat version to 11 (added explicit --no-parallel, since upstream
build system does not use Automake and is not parallel-safe)
  * Remove useless build-dependency on dh-autoreconf, which is implied by
debhelper (>= 10)
  * Fix incorrect reference to nmh in description
  * Replace generic BSD-3-clause with specific version from COPYRIGHT file in
debian/copyright due request of upstream author.
  * Patch config/version.sh to not insert non-reproducible data into binaries

Regards,
  Dmitry Bogatov



Bug#884816: RFS: frontaccounting/2.4.3-1 [ITA]

2018-02-17 Thread Janusz Dobrowolski
control: tags -1 +moreinfo +unreproducible

Hi,

As far a I know all the old vulnerabilities reported on debian
bugtracker has been fixed in the package made available on
mentors.debian.org page. Anyway, to be sure I have tried to reproduce
the bug mentioned on new installation version to no avail. CSRF
countermeasures implemented long time ago in response also to CVE cited
seems to work as expected, so exploit code available (e.g. here:
https://securitywarrior9.blogspot.fr/2018/02/cross-site-request-forgery-front.html)
does not work, returning 'Request from outside of this page is
forbidden.' in the json payload returned, with no changes in application
data.

Saying that, maybe still there are some additional conditions, which
allow attacker to omit csrf token checks, not stated in the
vulnerabilities reports, so  moreinfo tag added.

Janusz



On 16.02.2018 17:22, Antoine Beaupre wrote:
> Hi,
>
> I haven't reveiewed the package in details, but before this is accepted
> into Debian, care should be taken to review the existing security
> vulnerabilities that affect this package.
>
> For example, CVE-2018-7176 (bug #890604) currently affects the package
> you are proposing to upload (2.4.3). It the package is uploaded as such,
> you should clarify what the way forward is to fix that package. Either
> it will be fixed in a subsequent release, or the package will have to be
> marked as unsupported in Debian.
>
> https://security-tracker.debian.org/tracker/CVE-2018-7176
>
> Thank you for your attention.
>
> A.



Bug#890648: RFS: fcitx-imlist/0.5.1-2

2018-02-17 Thread Kentaro Hayashi
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "fcitx-imlist"

 Package name: fcitx-imlist
 Version : 0.5.1-2
 Upstream Author : Kentaro Hayashi 
 URL : https://github.com/kenhys/fcitx-imlist
 License : GPL-2+
 Section : utils

It builds those binary packages:

  fcitx-imlist - Command-line utility to switch list of Fcitx IM

To access further information about this package, please visit the following 
URL:

http://mentors.debian.net/package/fcitx-imlist

Alternatively, one can download the package with dget using this command:

  dget -x 
http://mentors.debian.net/debian/pool/main/f/fcitx-imlist/fcitx-imlist_0.5.1-2.dsc

More information about hello can be obtained from 
https://github.com/kenhys/fcitx-imlist

Changes since the last upload:

fcitx-imlist (0.5.1-2) unstable; urgency=medium

  * debian/control
- Bump debhelper version to 11.
- Remove useless autoreconf build dependency to autotools-dev.
- Bump Standards version to 4.1.3. no other changes are required.
  * debian/rules
- Remove needless --with autotools_dev since debhelper 9.20160115.
  * debian/compat
- Bump debhelper version to 11.

Regards,


pgpG1iGTYS8_h.pgp
Description: PGP signature