Bug#1074439: bookworm-pu: cups/2.4.2-3+deb12u7

2024-06-28 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


I know, I am rather late, but while preparing a new version of cups for
unstable, I found an upstream regression for the latest fix of
CVE-2024-35235. Four other commits are needed as well when cups only uses
a domain socket for communication.
In unstable I got #1073852 and #1074074, so this seems to be a valid use
case.


  Thorsten

PS. to maybe quicken things, I already uploaded the package
diff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2024-06-11 19:32:57.0 +0200
+++ cups-2.4.2/debian/changelog 2024-06-27 23:16:49.0 +0200
@@ -1,3 +1,10 @@
+cups (2.4.2-3+deb12u7) bookworm; urgency=medium
+
+  * fix regression of CVE-2024-35235 in case only domain sockets
+are used
+
+ -- Thorsten Alteholz   Thu, 27 Jun 2024 23:16:49 +0200
+
 cups (2.4.2-3+deb12u6) bookworm; urgency=medium
 
   * CVE-2024-35235 (Closes: #1073002)
diff -Nru cups-2.4.2/debian/patches/0020-CVE-2024-35235-regression1.patch 
cups-2.4.2/debian/patches/0020-CVE-2024-35235-regression1.patch
--- cups-2.4.2/debian/patches/0020-CVE-2024-35235-regression1.patch 
1970-01-01 01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0020-CVE-2024-35235-regression1.patch 
2024-06-27 23:16:49.0 +0200
@@ -0,0 +1,47 @@
+commit 7adb50839710f908af11a2f0a7d4b7aa506af2b8
+Author: Michael R Sweet 
+Date:   Fri Jun 14 15:09:41 2024 -0400
+
+Don't abort early if there are no listen sockets after loading cupsd.conf 
(Issue #985)
+
+Index: cups-2.4.2/scheduler/conf.c
+===
+--- cups-2.4.2.orig/scheduler/conf.c   2024-06-26 16:06:39.865759162 +0200
 cups-2.4.2/scheduler/conf.c2024-06-26 16:06:39.865759162 +0200
+@@ -1052,7 +1052,7 @@
+   * as an error and exit!
+   */
+ 
+-  if (cupsArrayCount(Listeners) == 0)
++  if (cupsArrayCount(Listeners) == 0 && !OnDemand)
+   {
+/*
+ * No listeners!
+Index: cups-2.4.2/scheduler/main.c
+===
+--- cups-2.4.2.orig/scheduler/main.c   2024-06-26 16:06:39.865759162 +0200
 cups-2.4.2/scheduler/main.c2024-06-26 16:06:39.865759162 +0200
+@@ -2037,6 +2037,23 @@
+ service_add_listener(fd, 0);
+   }
+ #endif /* HAVE_LAUNCHD */
++
++  if (cupsArrayCount(Listeners) == 0)
++  {
++   /*
++* No listeners!
++*/
++
++cupsdLogMessage(CUPSD_LOG_EMERG,
++"No valid Listen or Port lines were found in the "
++  "configuration file.");
++
++   /*
++* Commit suicide...
++*/
++
++cupsdEndProcess(getpid(), 0);
++  }
+ }
+ 
+ 
diff -Nru cups-2.4.2/debian/patches/0021-CVE-2024-35235-regression2.patch 
cups-2.4.2/debian/patches/0021-CVE-2024-35235-regression2.patch
--- cups-2.4.2/debian/patches/0021-CVE-2024-35235-regression2.patch 
1970-01-01 01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0021-CVE-2024-35235-regression2.patch 
2024-06-27 23:16:49.0 +0200
@@ -0,0 +1,22 @@
+commit 824f49f24d6babc2c02215ee6303fee7ce6a553a
+Author: Michael R Sweet 
+Date:   Fri Jun 14 15:16:11 2024 -0400
+
+Fix builds without on-demand support.
+
+Index: cups-2.4.2/scheduler/conf.c
+===
+--- cups-2.4.2.orig/scheduler/conf.c   2024-06-26 16:07:35.737840279 +0200
 cups-2.4.2/scheduler/conf.c2024-06-26 16:07:35.737840279 +0200
+@@ -1052,7 +1052,11 @@
+   * as an error and exit!
+   */
+ 
++#ifdef HAVE_ONDEMAND
+   if (cupsArrayCount(Listeners) == 0 && !OnDemand)
++#else
++  if (cupsArrayCount(Listeners) == 0)
++#endif // HAVE_ONDEMAND
+   {
+/*
+ * No listeners!
diff -Nru cups-2.4.2/debian/patches/0022-CVE-2024-35235-regression3.patch 
cups-2.4.2/debian/patches/0022-CVE-2024-35235-regression3.patch
--- cups-2.4.2/debian/patches/0022-CVE-2024-35235-regression3.patch 
1970-01-01 01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0022-CVE-2024-35235-regression3.patch 
2024-06-27 23:16:49.0 +0200
@@ -0,0 +1,102 @@
+commit 74f437b7d20be44bacbbbc792da69ff9c82dfe8f
+Author: Zdenek Dohnal 
+Date:   Tue Jun 18 10:43:30 2024 +0200
+
+scheduler: Fix cupsd activated on-demand via socket
+
+If only the expected cups.sock is set as listener in cupsd.conf, the
+array Listeners was NULL. To prevent copying the code, do the array
+allocation earlier and have only one check for Listeners, in
+service_checkin() which is run every time cupsd starts.
+
+Fixes #985
+
+Index: cups-2.4.2/scheduler/conf.c
+===
+--- cups-2.4.2.orig/scheduler/conf.c   2024-06-28 11:44:05.099633082 +0200
 cups-2.4.2/scheduler/conf.c2024-06-28 11:44:05.095633082 +0200
+@@ -558,6 +558,18 @@
+ 
+   cupsdDeleteAllListeners();
+ 

Bug#1074438: bullseye-pu: cups/2.3.3op2-3+deb11u8

2024-06-28 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


I know, I am rather late, but while preparing a new version of cups for 
unstable, I found an upstream regression for the latest fix of 
CVE-2024-35235. Four other commits are needed as well when cups only uses 
a domain socket for communication.
In unstable I got #1073852 and #1074074, so this seems to be a valid use 
case.



  Thorsten

PS. to maybe quicken things, I already uploaded the package

diff -Nru cups-2.3.3op2/debian/changelog cups-2.3.3op2/debian/changelog
--- cups-2.3.3op2/debian/changelog  2024-06-11 19:33:32.0 +0200
+++ cups-2.3.3op2/debian/changelog  2024-06-25 22:16:49.0 +0200
@@ -1,3 +1,10 @@
+cups (2.3.3op2-3+deb11u8) bullseye; urgency=medium
+
+  * fix regression of CVE-2024-35235 in case only domain sockets
+are used
+
+ -- Thorsten Alteholz   Tue, 25 Jun 2024 22:16:49 +0200
+
 cups (2.3.3op2-3+deb11u7) bullseye; urgency=medium
 
   * CVE-2024-35235 (Closes: #1073002)
diff -Nru cups-2.3.3op2/debian/patches/0022-CVE-2024-35235-regression1.patch 
cups-2.3.3op2/debian/patches/0022-CVE-2024-35235-regression1.patch
--- cups-2.3.3op2/debian/patches/0022-CVE-2024-35235-regression1.patch  
1970-01-01 01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0022-CVE-2024-35235-regression1.patch  
2024-06-25 22:16:49.0 +0200
@@ -0,0 +1,47 @@
+commit 7adb50839710f908af11a2f0a7d4b7aa506af2b8
+Author: Michael R Sweet 
+Date:   Fri Jun 14 15:09:41 2024 -0400
+
+Don't abort early if there are no listen sockets after loading cupsd.conf 
(Issue #985)
+
+Index: cups-2.3.3op2/scheduler/conf.c
+===
+--- cups-2.3.3op2.orig/scheduler/conf.c2024-06-26 14:29:33.834864098 
+0200
 cups-2.3.3op2/scheduler/conf.c 2024-06-26 14:29:33.834864098 +0200
+@@ -1063,7 +1063,7 @@
+   * as an error and exit!
+   */
+ 
+-  if (cupsArrayCount(Listeners) == 0)
++  if (cupsArrayCount(Listeners) == 0 && !OnDemand)
+   {
+/*
+ * No listeners!
+Index: cups-2.3.3op2/scheduler/main.c
+===
+--- cups-2.3.3op2.orig/scheduler/main.c2024-06-26 14:29:33.834864098 
+0200
 cups-2.3.3op2/scheduler/main.c 2024-06-26 14:29:33.834864098 +0200
+@@ -2040,6 +2040,23 @@
+ service_add_listener(fd, 0);
+   }
+ #endif /* HAVE_LAUNCHD */
++
++  if (cupsArrayCount(Listeners) == 0)
++  {
++   /*
++* No listeners!
++*/
++
++cupsdLogMessage(CUPSD_LOG_EMERG,
++"No valid Listen or Port lines were found in the "
++  "configuration file.");
++
++   /*
++* Commit suicide...
++*/
++
++cupsdEndProcess(getpid(), 0);
++  }
+ }
+ 
+ 
diff -Nru cups-2.3.3op2/debian/patches/0023-CVE-2024-35235-regression2.patch 
cups-2.3.3op2/debian/patches/0023-CVE-2024-35235-regression2.patch
--- cups-2.3.3op2/debian/patches/0023-CVE-2024-35235-regression2.patch  
1970-01-01 01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0023-CVE-2024-35235-regression2.patch  
2024-06-25 22:16:49.0 +0200
@@ -0,0 +1,22 @@
+commit 824f49f24d6babc2c02215ee6303fee7ce6a553a
+Author: Michael R Sweet 
+Date:   Fri Jun 14 15:16:11 2024 -0400
+
+Fix builds without on-demand support.
+
+Index: cups-2.3.3op2/scheduler/conf.c
+===
+--- cups-2.3.3op2.orig/scheduler/conf.c2024-06-26 16:08:52.549951772 
+0200
 cups-2.3.3op2/scheduler/conf.c 2024-06-26 16:08:52.545951766 +0200
+@@ -1063,7 +1063,11 @@
+   * as an error and exit!
+   */
+ 
++#ifdef HAVE_ONDEMAND
+   if (cupsArrayCount(Listeners) == 0 && !OnDemand)
++#else
++  if (cupsArrayCount(Listeners) == 0)
++#endif // HAVE_ONDEMAND
+   {
+/*
+ * No listeners!
diff -Nru cups-2.3.3op2/debian/patches/0024-CVE-2024-35235-regression3.patch 
cups-2.3.3op2/debian/patches/0024-CVE-2024-35235-regression3.patch
--- cups-2.3.3op2/debian/patches/0024-CVE-2024-35235-regression3.patch  
1970-01-01 01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0024-CVE-2024-35235-regression3.patch  
2024-06-25 22:16:49.0 +0200
@@ -0,0 +1,102 @@
+commit 74f437b7d20be44bacbbbc792da69ff9c82dfe8f
+Author: Zdenek Dohnal 
+Date:   Tue Jun 18 10:43:30 2024 +0200
+
+scheduler: Fix cupsd activated on-demand via socket
+
+If only the expected cups.sock is set as listener in cupsd.conf, the
+array Listeners was NULL. To prevent copying the code, do the array
+allocation earlier and have only one check for Listeners, in
+service_checkin() which is run every time cupsd starts.
+
+Fixes #985
+
+Index: cups-2.3.3op2/scheduler/conf.c
+===
+--- cups-2.3.3op2.orig/scheduler/conf.c2024-06-28 16:22:55.876537369 
+0200
 cups-2.3.3op2/scheduler/conf.c

Bug#1073519: bullseye-pu: cups/2.3.3op2-3+deb11u7

2024-06-21 Thread Thorsten Alteholz




On Mon, 17 Jun 2024, Adam D. Barratt wrote:

Please go ahead.


Great, thanks ...

... and uploaded.

  Thorsten



Bug#1073518: bookworm-pu: cups/2.4.2-3+deb12u6

2024-06-21 Thread Thorsten Alteholz




On Mon, 17 Jun 2024, Adam D. Barratt wrote:

Please go ahead.


great, thanks ...

... and uploaded.

  Thorsten



Re: Requesting for the loong64 port could be included in the Official ports

2024-06-18 Thread Thorsten Alteholz

Hi Dandan,

On Mon, 17 Jun 2024, zhangdandan wrote:
I hope you don't mind if I already make use of the Loongson team. Do you 
have any idea why package cups does occasionally fail to build on loong64?

(-> https://buildd.debian.org/status/logs.php?pkg=cups=loong64)


Thanks for your reply and help.
There is no additional need for architectural support for cups.
Currently, the cups package has been built and installed.
Please view 
http://ftp.ports.debian.org/debian-ports/pool-loong64/main/c/cups/.
Sometimes fail to build in Debian Package Auto-Building ENV due to source 
package version upgrades, but are quickly fixed by the cups maintainers.


when you look at the link I provided:
  https://buildd.debian.org/status/logs.php?pkg=cups=loong64
you can see that building cups failed several times. It even failed twice 
for version 2.4.7-1.2+b1 and once for 2.4.7-3. Those failures have nothing 
to do with source package version upgrades and please be assured that the 
maintainer didn't fix anything but just gave back the package to the 
buildd. Such unreliable builds might be fine with the ports architectures, 
but not really acceptable for release architectures (I am not part of the 
release team, so I hope nobody disagrees with this statement).
This issue looks like a typical task for the porters of an architecture, 
so I have a favour to ask you. Could the Loongson team please have a look 
at it and maybe provide a patch to make the build more reliable?


  Thorsten



Re: Requesting for the loong64 port could be included in the Official ports

2024-06-16 Thread Thorsten Alteholz

Hi Dandan,

On Fri, 14 Jun 2024, zhangdandan wrote:

In this email, I have added partners and products information for LoongArch.
There are also download links under some of the partner and product links.
(...)


thanks a lot for all the information. That list is really helpful.

Loongson team will always maintain the LoongArch architecture with Debian 
Community.


I hope you don't mind if I already make use of the Loongson team. Do you 
have any idea why package cups does occasionally fail to build on 
loong64?

(-> https://buildd.debian.org/status/logs.php?pkg=cups=loong64)



- How to buy LoongArch hardware in Europe?
Which of the international buying channels, such as Amazon, eBay, Ozon, etc., 
is preferred in Europe?


This is only my opinion, but I would prefer to buy at Amazon.

Best regards
Thorsten



Bug#1073519: bullseye-pu: cups/2.3.3op2-3+deb11u7

2024-06-16 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2024-35235 in Bullseye. The CVE 
has been marked as no-dsa by the security team. The same patch has been 
already uploaded to unstable.


  Thorsten
diff -Nru cups-2.3.3op2/debian/changelog cups-2.3.3op2/debian/changelog
--- cups-2.3.3op2/debian/changelog  2023-10-05 16:35:27.0 +0200
+++ cups-2.3.3op2/debian/changelog  2024-06-11 19:33:32.0 +0200
@@ -1,3 +1,10 @@
+cups (2.3.3op2-3+deb11u7) bullseye; urgency=medium
+
+  * CVE-2024-35235 (Closes: #1073002)
+fix domain socket handling
+
+ -- Thorsten Alteholz   Tue, 11 Jun 2024 22:16:49 +0200
+
 cups (2.3.3op2-3+deb11u6) bullseye; urgency=medium
 
   * remove debian/NEWS again to avoid too much information when only
diff -Nru cups-2.3.3op2/debian/patches/0021-CVE-2024-35235.patch 
cups-2.3.3op2/debian/patches/0021-CVE-2024-35235.patch
--- cups-2.3.3op2/debian/patches/0021-CVE-2024-35235.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0021-CVE-2024-35235.patch  2024-06-11 
13:16:28.0 +0200
@@ -0,0 +1,108 @@
+commit 2f87c46b719e6edf0b6900e5eb307b7154e183e8
+Author: Zdenek Dohnal 
+Date:   Mon Jun 3 18:53:58 2024 +0200
+
+Fix domain socket handling
+
+- Check status of unlink and bind system calls.
+- Don't allow extra domain sockets when running from launchd/systemd.
+- Validate length of domain socket path (< sizeof(sun_path))
+
+Fixes CVE-2024-35235, written by Mike Sweet
+
+Index: cups-2.3.3op2/cups/http-addr.c
+===
+--- cups-2.3.3op2.orig/cups/http-addr.c2024-06-11 13:15:45.109860935 
+0200
 cups-2.3.3op2/cups/http-addr.c 2024-06-11 13:16:25.961881895 +0200
+@@ -1,6 +1,7 @@
+ /*
+  * HTTP address routines for CUPS.
+  *
++ * Copyright 2024 by OpenPrinting
+  * Copyright 2007-2019 by Apple Inc.
+  * Copyright 1997-2006 by Easy Software Products, all rights reserved.
+  *
+@@ -200,27 +201,31 @@
+ * Remove any existing domain socket file...
+ */
+ 
+-unlink(addr->un.sun_path);
+-
+-   /*
+-* Save the current umask and set it to 0 so that all users can access
+-* the domain socket...
+-*/
+-
+-mask = umask(0);
+-
+-   /*
+-* Bind the domain socket...
+-*/
+-
+-status = bind(fd, (struct sockaddr *)addr, 
(socklen_t)httpAddrLength(addr));
+-
+-   /*
+-* Restore the umask and fix permissions...
+-*/
+-
+-umask(mask);
+-chmod(addr->un.sun_path, 0140777);
++if ((status = unlink(addr->un.sun_path)) < 0)
++{
++  DEBUG_printf(("1httpAddrListen: Unable to unlink \"%s\": %s", 
addr->un.sun_path, strerror(errno)));
++
++  if (errno == ENOENT)
++   status = 0;
++}
++
++
++if (!status)
++{
++  // Save the current umask and set it to 0 so that all users can access
++  // the domain socket...
++  mask = umask(0);
++
++
++  // Bind the domain socket...
++  if ((status = bind(fd, (struct sockaddr *)addr, 
(socklen_t)httpAddrLength(addr))) < 0)
++  {
++   DEBUG_printf(("1httpAddrListen: Unable to bind domain socket \"%s\": 
%s", addr->un.sun_path, strerror(errno)));
++  }
++
++  // Restore the umask...
++  umask(mask);
++}
+   }
+   else
+ #endif /* AF_LOCAL */
+Index: cups-2.3.3op2/scheduler/conf.c
+===
+--- cups-2.3.3op2.orig/scheduler/conf.c2024-06-11 13:15:45.109860935 
+0200
 cups-2.3.3op2/scheduler/conf.c 2024-06-11 13:15:45.109860935 +0200
+@@ -3074,6 +3074,26 @@
+ 
+ 
+  /*
++  * If we are launched on-demand, do not use domain sockets from the 
config
++  * file.  Also check that the domain socket path is not too long...
++  */
++
++#ifdef HAVE_ONDEMAND
++  if (*value == '/' && OnDemand)
++  {
++if (strcmp(value, CUPS_DEFAULT_DOMAINSOCKET))
++  cupsdLogMessage(CUPSD_LOG_INFO, "Ignoring %s address %s at line %d 
- only using domain socket from launchd/systemd.", line, value, linenum);
++continue;
++  }
++#endif // HAVE_ONDEMAND
++
++  if (*value == '/' && strlen(value) > (sizeof(addr->addr.un.sun_path) - 
1))
++  {
++cupsdLogMessage(CUPSD_LOG_INFO, "Ignoring %s address %s at line %d - 
too long.", line, value, linenum);
++continue;
++  }
++
++ /*
+   * Get the address list...
+   */
+ 
diff -Nru cups-2.3.3op2/debian/patches/series 
cups-2.3.3op2/debian/patches/series
--- cups-2.3.3op2/debian/patches/series 2023-10-05 16:35:27.0 +0200
+++ cups-2.3.3op2/debian/patches/series 2024-06-11 13:15:04.0 +0200
@@ -18,3 +18,4 @@
 0018-CVE-2023-34241.patch
 0019-CVE-2023-32360.patch
 0020-CVE-2023-4504.patch
+0021-CVE-2024-35235.patch


Bug#1073518: bookworm-pu: cups/2.4.2-3+deb12u6

2024-06-16 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2024-35235 in Bookworm. The CVE 
has been marked as no-dsa by the security team. The same patch has been 
already uploaded to unstable.


  Thorstendiff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2023-12-01 20:35:27.0 +0100
+++ cups-2.4.2/debian/changelog 2024-06-11 19:32:57.0 +0200
@@ -1,3 +1,10 @@
+cups (2.4.2-3+deb12u6) bookworm; urgency=medium
+
+  * CVE-2024-35235 (Closes: #1073002)
+fix domain socket handling
+
+ -- Thorsten Alteholz   Tue, 11 Jun 2024 22:16:49 +0200
+
 cups (2.4.2-3+deb12u5) bookworm; urgency=medium
 
   * 0017-check-colormodel-also-for-CMYK.patch
diff -Nru cups-2.4.2/debian/patches/0019-CVE-2024-35235.patch 
cups-2.4.2/debian/patches/0019-CVE-2024-35235.patch
--- cups-2.4.2/debian/patches/0019-CVE-2024-35235.patch 1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0019-CVE-2024-35235.patch 2024-06-11 
13:11:25.0 +0200
@@ -0,0 +1,108 @@
+commit 2f87c46b719e6edf0b6900e5eb307b7154e183e8
+Author: Zdenek Dohnal 
+Date:   Mon Jun 3 18:53:58 2024 +0200
+
+Fix domain socket handling
+
+- Check status of unlink and bind system calls.
+- Don't allow extra domain sockets when running from launchd/systemd.
+- Validate length of domain socket path (< sizeof(sun_path))
+
+Fixes CVE-2024-35235, written by Mike Sweet
+
+Index: cups-2.4.2/cups/http-addr.c
+===
+--- cups-2.4.2.orig/cups/http-addr.c   2024-06-11 13:11:20.465733904 +0200
 cups-2.4.2/cups/http-addr.c2024-06-11 13:11:20.465733904 +0200
+@@ -1,6 +1,7 @@
+ /*
+  * HTTP address routines for CUPS.
+  *
++ * Copyright © 2023-2024 by OpenPrinting
+  * Copyright © 2007-2021 by Apple Inc.
+  * Copyright © 1997-2006 by Easy Software Products, all rights reserved.
+  *
+@@ -206,27 +207,31 @@
+ * Remove any existing domain socket file...
+ */
+ 
+-unlink(addr->un.sun_path);
+-
+-   /*
+-* Save the current umask and set it to 0 so that all users can access
+-* the domain socket...
+-*/
+-
+-mask = umask(0);
+-
+-   /*
+-* Bind the domain socket...
+-*/
+-
+-status = bind(fd, (struct sockaddr *)addr, 
(socklen_t)httpAddrLength(addr));
+-
+-   /*
+-* Restore the umask and fix permissions...
+-*/
+-
+-umask(mask);
+-chmod(addr->un.sun_path, 0140777);
++if ((status = unlink(addr->un.sun_path)) < 0)
++{
++  DEBUG_printf(("1httpAddrListen: Unable to unlink \"%s\": %s", 
addr->un.sun_path, strerror(errno)));
++
++  if (errno == ENOENT)
++   status = 0;
++}
++
++
++if (!status)
++{
++  // Save the current umask and set it to 0 so that all users can access
++  // the domain socket...
++  mask = umask(0);
++
++
++  // Bind the domain socket...
++  if ((status = bind(fd, (struct sockaddr *)addr, 
(socklen_t)httpAddrLength(addr))) < 0)
++  {
++   DEBUG_printf(("1httpAddrListen: Unable to bind domain socket \"%s\": 
%s", addr->un.sun_path, strerror(errno)));
++  }
++
++  // Restore the umask...
++  umask(mask);
++}
+   }
+   else
+ #endif /* AF_LOCAL */
+Index: cups-2.4.2/scheduler/conf.c
+===
+--- cups-2.4.2.orig/scheduler/conf.c   2024-06-11 13:11:20.465733904 +0200
 cups-2.4.2/scheduler/conf.c2024-06-11 13:11:20.465733904 +0200
+@@ -3077,6 +3077,26 @@
+ 
+ 
+  /*
++  * If we are launched on-demand, do not use domain sockets from the 
config
++  * file.  Also check that the domain socket path is not too long...
++  */
++
++#ifdef HAVE_ONDEMAND
++  if (*value == '/' && OnDemand)
++  {
++if (strcmp(value, CUPS_DEFAULT_DOMAINSOCKET))
++  cupsdLogMessage(CUPSD_LOG_INFO, "Ignoring %s address %s at line %d 
- only using domain socket from launchd/systemd.", line, value, linenum);
++continue;
++  }
++#endif // HAVE_ONDEMAND
++
++  if (*value == '/' && strlen(value) > (sizeof(addr->addr.un.sun_path) - 
1))
++  {
++cupsdLogMessage(CUPSD_LOG_INFO, "Ignoring %s address %s at line %d - 
too long.", line, value, linenum);
++continue;
++  }
++
++ /*
+   * Get the address list...
+   */
+ 
diff -Nru cups-2.4.2/debian/patches/series cups-2.4.2/debian/patches/series
--- cups-2.4.2/debian/patches/series2023-12-01 20:35:27.0 +0100
+++ cups-2.4.2/debian/patches/series2024-06-11 13:11:18.0 +0200
@@ -16,3 +16,4 @@
 0016-CVE-2023-32360.patch
 0017-check-colormodel-also-for-CMYK.patch
 0018-dont-override-color-settings-from-print-dialoag.patch
+0019-CVE-2024-35235.patch


Bug#1070153: bookworm-pu: qtbase-opensource-src/5.15.8+dfsg-11+deb12u2

2024-06-16 Thread Thorsten Alteholz




On 15.06.24 17:06, Adam D. Barratt wrote:


Please go ahead.


great, thanks ...

... and uploaded.

  Thorsten



Re: Requesting for the loong64 port could be included in the Official ports

2024-06-13 Thread Thorsten Alteholz

Hi Dandan,

On 12.06.24 11:28, zhangdandan wrote:


2. Answer the questions included in the archive criteria.
I have created a ArchiveQualification page for loong64 and answered 
the questions. I will update continuously.

Please check https://wiki.debian.org/ArchiveQualification/loong64.



from my point of view you didn't answer question 6. Can you please 
provide an English version of the link about the information partners?
Adding a new architecture to Debian increases the burden of every 
package maintainer and of course of all teams dealing with the 
infrastructure as well. So the effort in doing so must be worth it. 
Please be more verbose about the number of users that are already using 
your architecture.


On IRC (nick: ta) you wanted to give me some links where I could buy 
your hardware in Europe. I don't think you will attract enough 
developers as porters if nobody can buy your hardware, not to mention 
the non existing user base. No, I don't see Aliexpress as a suitable 
source for expensive stuff.

So how do you want to attract more people as porters?

  Thorsten



Bug#1070154: bullseye-pu: qtbase-opensource-src/5.15.2+dfsg-9+deb11u1

2024-05-12 Thread Thorsten Alteholz

Hi Jonathan,

On 12.05.24 13:13, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and done.

  Thorsten


Bug#1070154: bullseye-pu: qtbase-opensource-src/5.15.2+dfsg-9+deb11u1

2024-04-30 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for qtbase-opensource-src fixes several CVEs in 
Bullseye. All CVEs are marked as no-dsa by the security team.


  Thorstendiff -Nru qtbase-opensource-src-5.15.2+dfsg/debian/changelog 
qtbase-opensource-src-5.15.2+dfsg/debian/changelog
--- qtbase-opensource-src-5.15.2+dfsg/debian/changelog  2021-07-02 
17:58:04.0 +0200
+++ qtbase-opensource-src-5.15.2+dfsg/debian/changelog  2024-04-28 
22:48:02.0 +0200
@@ -1,3 +1,33 @@
+qtbase-opensource-src (5.15.2+dfsg-9+deb11u1) bullseye; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2024-25580 (Closes: #1064053)
+fix buffer overflow due to crafted KTX image file
+  * CVE-2023-32763 (Closes: #1036702)
+fix QTextLayout buffer overflow due to crafted SVG file
+  * CVE-2022-25255
+prevent QProcess from execution of a binary from the current working
+directory when not found in the PATH
+  * CVE-2023-24607 (Closes: #1031872)
+fix denial of service via a crafted string when the SQL ODBC driver
+plugin is used
+  * fix regression caused by patch for CVE-2023-24607
+  * CVE-2023-32762
+prevent incorrect parsing of the strict-transport-security (HSTS) header
+  * CVE-2023-51714 (Closes: #1060694)
+fix incorrect HPack integer overflow check.
+  * CVE-2023-38197 (Closes: #1041105)
+fix infinite loop in recursive entity expansion
+  * CVE-2023-37369 (Closes: #1059302)
+fix crash of application in QXmlStreamReader due to crafted XML string
+  * CVE-2023-34410 (Closes: #1037210)
+fix checking during TLS whether root of the chain really is a
+configured CA certificate
+  * CVE-2023-33285 (Closes: #1036848)
+fix buffer overflow in QDnsLookup
+
+ -- Thorsten Alteholz   Sun, 28 Apr 2024 22:48:02 +0200
+
 qtbase-opensource-src (5.15.2+dfsg-9) unstable; urgency=medium
 
   * Revert adding fix-misplacement-of-placeholder-text-in-QLineEdit.diff.
diff -Nru qtbase-opensource-src-5.15.2+dfsg/debian/patches/CVE-2022-25255.diff 
qtbase-opensource-src-5.15.2+dfsg/debian/patches/CVE-2022-25255.diff
--- qtbase-opensource-src-5.15.2+dfsg/debian/patches/CVE-2022-25255.diff
1970-01-01 01:00:00.0 +0100
+++ qtbase-opensource-src-5.15.2+dfsg/debian/patches/CVE-2022-25255.diff
2024-03-05 13:22:01.0 +0100
@@ -0,0 +1,96 @@
+Description: QProcess: ensure we don't accidentally execute something from CWD
+ Unless "." (or the empty string) is in $PATH, we're not supposed to find
+ executables in the current directory. This is how the Unix shells behave
+ and we match their behavior. It's also the behavior Qt had prior to 5.9
+ (commit 28666d167aa8e602c0bea25ebc4d51b55005db13). On Windows, searching
+ the current directory is the norm, so we keep that behavior.
+ .
+ This commit does not add an explicit check for an empty return from
+ QStandardPaths::findExecutable(). Instead, we allow that empty string to
+ go all the way to execve(2), which will fail with ENOENT. We could catch
+ it early, before fork(2), but why add code for the error case?
+ .
+ See https://kde.org/info/security/advisory-20220131-1.txt
+Origin: upstream, 
https://download.qt.io/official_releases/qt/5.15/CVE-2022-25255-qprocess5-15.diff
+Last-Update: 2022-02-21
+
+Index: qtbase-opensource-src-5.15.2+dfsg/src/corelib/io/qprocess_unix.cpp
+===
+--- qtbase-opensource-src-5.15.2+dfsg.orig/src/corelib/io/qprocess_unix.cpp
2024-03-05 13:21:06.432881985 +0100
 qtbase-opensource-src-5.15.2+dfsg/src/corelib/io/qprocess_unix.cpp 
2024-03-05 13:21:06.428881981 +0100
+@@ -1,7 +1,7 @@
+ /
+ **
+ ** Copyright (C) 2016 The Qt Company Ltd.
+-** Copyright (C) 2016 Intel Corporation.
++** Copyright (C) 2022 Intel Corporation.
+ ** Contact: https://www.qt.io/licensing/
+ **
+ ** This file is part of the QtCore module of the Qt Toolkit.
+@@ -422,14 +422,15 @@
+ // Add the program name to the argument list.
+ argv[0] = nullptr;
+ if (!program.contains(QLatin1Char('/'))) {
++// findExecutable() returns its argument if it's an absolute path,
++// otherwise it searches $PATH; returns empty if not found (we handle
++// that case much later)
+ const QString  = QStandardPaths::findExecutable(program);
+-if (!exeFilePath.isEmpty()) {
+-const QByteArray  = QFile::encodeName(exeFilePath);
+-argv[0] = ::strdup(tmp.constData());
+-}
+-}
+-if (!argv[0])
++const QByteArray  = QFile::encodeName(exeFilePath);
++argv[0] = ::strdup(tmp.constData());
++} else {
+ argv[0] = ::strdup(encodedProgramName.constData());
++}
+ 
+ // Add every argument to the list
+ for (int i = 0; i < arguments.count(); ++i)
+@@ -9

Bug#1070153: bookworm-pu: qtbase-opensource-src/5.15.8+dfsg-11+deb12u2

2024-04-30 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for qtbase-opensource-src fixes several CVEs in 
Bookworm. All CVEs are marked as no-dsa by the security team.


The debdiff is based on version 5.15.8+dfsg-11+deb12u1, which is already 
in s-p-u.


  Thorstendiff -Nru qtbase-opensource-src-5.15.8+dfsg/debian/changelog 
qtbase-opensource-src-5.15.8+dfsg/debian/changelog
--- qtbase-opensource-src-5.15.8+dfsg/debian/changelog  2024-04-07 
11:45:51.0 +0200
+++ qtbase-opensource-src-5.15.8+dfsg/debian/changelog  2024-04-28 
20:48:02.0 +0200
@@ -1,3 +1,13 @@
+qtbase-opensource-src (5.15.8+dfsg-11+deb12u2) bookworm; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2024-25580 (Closes: #1064053)
+fix buffer overflow due to crafted KTX image file
+  * CVE-2023-51714 (Closes: #1060694)
+fix incorrect HPack integer overflow check.
+
+ -- Thorsten Alteholz   Sun, 28 Apr 2024 20:48:02 +0200
+
 qtbase-opensource-src (5.15.8+dfsg-11+deb12u1) bookworm; urgency=medium
 
   [ Alexander Volkov ]
diff -Nru qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2023-51714.diff 
qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2023-51714.diff
--- qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2023-51714.diff
1970-01-01 01:00:00.0 +0100
+++ qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2023-51714.diff
2024-04-28 20:48:02.0 +0200
@@ -0,0 +1,61 @@
+From 23c3fc483e8b6e21012a61f0bea884446f727776 Mon Sep 17 00:00:00 2001
+From: Marc Mutz 
+Date: Tue, 12 Dec 2023 22:08:07 +0100
+Subject: [PATCH] HPack: fix incorrect integer overflow check
+
+This code never worked:
+
+For the comparison with max() - 32 to trigger, on 32-bit platforms (or
+Qt 5) signed interger overflow would have had to happen in the
+addition of the two sizes. The compiler can therefore remove the
+overflow check as dead code.
+
+On Qt 6 and 64-bit platforms, the signed integer addition would be
+very unlikely to overflow, but the following truncation to uint32
+would yield the correct result only in a narrow 32-value window just
+below UINT_MAX, if even that.
+
+Fix by using the proper tool, qAddOverflow.
+
+Manual conflict resolutions:
+ - qAddOverflow doesn't exist in Qt 5, use private add_overflow
+   predecessor API instead
+
+Change-Id: I7599f2e75ff7f488077b0c60b81022591005661c
+Reviewed-by: Allan Sandfeld Jensen 
+(cherry picked from commit ee5da1f2eaf8932aeca02ffea6e4c618585e29e3)
+Reviewed-by: Qt Cherry-pick Bot 
+(cherry picked from commit debeb8878da2dc706ead04b6072ecbe7e5313860)
+Reviewed-by: Thiago Macieira 
+Reviewed-by: Marc Mutz 
+(cherry picked from commit 811b9eef6d08d929af8708adbf2a5effb0eb62d7)
+(cherry picked from commit f931facd077ce945f1e42eaa3bead208822d3e00)
+(cherry picked from commit 9ef4ca5ecfed771dab890856130e93ef5ceabef5)
+Reviewed-by: Mårten Nordheim 
+---
+
+Index: 
qtbase-opensource-src-5.15.8+dfsg/src/network/access/http2/hpacktable.cpp
+===
+--- 
qtbase-opensource-src-5.15.8+dfsg.orig/src/network/access/http2/hpacktable.cpp  
   2024-04-24 16:08:28.259865332 +0200
 qtbase-opensource-src-5.15.8+dfsg/src/network/access/http2/hpacktable.cpp  
2024-04-24 16:09:16.163853040 +0200
+@@ -40,6 +40,7 @@
+ #include "hpacktable_p.h"
+ 
+ #include 
++#include 
+ 
+ #include 
+ #include 
+@@ -62,8 +63,10 @@
+ // for counting the number of references to the name and value would have
+ // 32 octets of overhead."
+ 
+-const unsigned sum = unsigned(name.size() + value.size());
+-if (std::numeric_limits::max() - 32 < sum)
++size_t sum;
++if (add_overflow(size_t(name.size()), size_t(value.size()), ))
++return HeaderSize();
++if (sum > (std::numeric_limits::max() - 32))
+ return HeaderSize();
+ return HeaderSize(true, quint32(sum + 32));
+ }
diff -Nru qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2024-25580.diff 
qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2024-25580.diff
--- qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2024-25580.diff
1970-01-01 01:00:00.0 +0100
+++ qtbase-opensource-src-5.15.8+dfsg/debian/patches/CVE-2024-25580.diff
2024-04-28 20:48:02.0 +0200
@@ -0,0 +1,197 @@
+diff --git a/src/gui/util/qktxhandler.cpp b/src/gui/util/qktxhandler.cpp
+index 0d98e97453..6a79e55109 100644
+--- a/src/gui/util/qktxhandler.cpp
 b/src/gui/util/qktxhandler.cpp
+@@ -73,7 +73,7 @@ struct KTXHeader {
+ quint32 bytesOfKeyValueData;
+ };
+ 
+-static const quint32 headerSize = sizeof(KTXHeader);
++static constexpr quint32 qktxh_headerSize = sizeof(KTXHeader);
+ 
+ // Currently unused, declared for future reference
+ struct KTXKeyValuePairItem {
+@@ -103,11 +103,36 @@ struct KTXMipmapLevel {
+ */
+ };
+ 
+-bool QKtxHandler::canRead(const QByteArray , const QByteArray )
++static bool

Bug#1067544: bullseye-pu: libmicrohttpd/0.9.72-2+deb11u1.debdiff

2024-04-27 Thread Thorsten Alteholz

Hi Jonathan,

On 22.04.24 18:59, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and uploaded.

  Thorsten


Bug#1064550: bullseye-pu: libjwt/1.10.2-1+deb11u1

2024-04-27 Thread Thorsten Alteholz

Hi Jonathan,

On 22.04.24 19:10, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and uploaded.

  Thorsten


Bug#1067544: bullseye-pu: libmicrohttpd/0.9.72-2+deb11u1.debdiff

2024-03-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libmicrohttpd fixes CVE-2023-27371 in Bullseye. 
It is marked as no-dsa by the security team.


The fix was uploaded to Buster about a year ago and nobody complained yet.
For whatever reason, the upload to Bullseye was forgotten back then, so I 
catch up on this now.


  Thorsten
diff -Nru libmicrohttpd-0.9.72/debian/changelog 
libmicrohttpd-0.9.72/debian/changelog
--- libmicrohttpd-0.9.72/debian/changelog   2021-02-27 06:47:48.0 
+0100
+++ libmicrohttpd-0.9.72/debian/changelog   2024-03-23 12:03:02.0 
+0100
@@ -1,3 +1,12 @@
+libmicrohttpd (0.9.72-2+deb11u1) bullseye; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2023-27371
+parsing crafted POST requests result in an out of bounds read, which
+might cause a DoS (Denial of Service)
+
+ -- Thorsten Alteholz   Sat, 23 Mar 2024 12:03:02 +0100
+
 libmicrohttpd (0.9.72-2) sid; urgency=medium
 
   * Uploading to sid.
diff -Nru libmicrohttpd-0.9.72/debian/patches/CVE-2023-27371.patch 
libmicrohttpd-0.9.72/debian/patches/CVE-2023-27371.patch
--- libmicrohttpd-0.9.72/debian/patches/CVE-2023-27371.patch1970-01-01 
01:00:00.0 +0100
+++ libmicrohttpd-0.9.72/debian/patches/CVE-2023-27371.patch2023-03-29 
19:22:12.0 +0200
@@ -0,0 +1,23 @@
+From e0754d1638c602382384f1eface30854b1defeec Mon Sep 17 00:00:00 2001
+From: Christian Grothoff 
+Date: Sun, 26 Feb 2023 17:51:24 +0100
+Subject: fix parser bug that could be used to crash servers using the
+ MHD_PostProcessor
+
+---
+ src/microhttpd/postprocessor.c |  2 +-
+ 1 file changed, 1 insertions(+), 1 deletions(-)
+
+Index: libmicrohttpd-0.9.72/src/microhttpd/postprocessor.c
+===
+--- libmicrohttpd-0.9.72.orig/src/microhttpd/postprocessor.c   2023-03-29 
19:22:08.888629726 +0200
 libmicrohttpd-0.9.72/src/microhttpd/postprocessor.c2023-03-29 
19:22:08.884629728 +0200
+@@ -321,7 +321,7 @@
+   return NULL; /* failed to determine boundary */
+ boundary += MHD_STATICSTR_LEN_ ("boundary=");
+ blen = strlen (boundary);
+-if ( (blen == 0) ||
++if ( (blen < 2) ||
+  (blen * 2 + 2 > buffer_size) )
+   return NULL;  /* (will be) out of memory or invalid 
boundary */
+ if ( (boundary[0] == '"') &&
diff -Nru libmicrohttpd-0.9.72/debian/patches/series 
libmicrohttpd-0.9.72/debian/patches/series
--- libmicrohttpd-0.9.72/debian/patches/series  1970-01-01 01:00:00.0 
+0100
+++ libmicrohttpd-0.9.72/debian/patches/series  2023-03-29 19:21:28.0 
+0200
@@ -0,0 +1 @@
+CVE-2023-27371.patch


Re: Security releases for ecosystems that use static linking

2024-03-18 Thread Thorsten Alteholz




On Mon, 18 Mar 2024, Emilio Pozuelo Monfort wrote:

One solution which has been discussed in the past is to import a full copy
of stable towards stable-security at the beginning of each release cycle,
but that is currently not possible since security-master is a Ganeti VM
and the disk requirements for a full archive copy would rather require
a baremetal host.



(... suggestion of Emilio ...)


Thoughts?


The idea is nice, but needs someone to implement it.

Anyway, the problem is not really new. Since many years, not to say 
decades, I hear that there is not enough space on security-master.

I also hear that Debian has so much money and problems to spend it.
So why not solve this problem by buying new hardware? This can not be that 
difficult. Is there any reason why security-master needs to be a Ganeti 
VM?


  Thorsten



Bug#1064551: bookworm-pu: libjwt/1.10.2-1+deb11u1

2024-03-02 Thread Thorsten Alteholz




On Sun, 25 Feb 2024, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and uploaded.


 Thorsten



Bug#1064551: bookworm-pu: libjwt/1.10.2-1+deb11u1

2024-02-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libjwt fixes CVE-2024-25189 in Bookworm. It is 
marked as no-dsa by the security team.

The fix is straightfoward and should not make any problems.

  Thorsten
diff -Nru libjwt-1.10.2/debian/changelog libjwt-1.10.2/debian/changelog
--- libjwt-1.10.2/debian/changelog  2019-07-14 19:03:00.0 +0200
+++ libjwt-1.10.2/debian/changelog  2024-02-19 22:03:02.0 +0100
@@ -1,3 +1,10 @@
+libjwt (1.10.2-1+deb12u1) bookworm; urgency=medium
+
+  * CVE-2024-25189 (Closes: #1063534)
+fix a timing side channel via strcmp()
+
+ -- Thorsten Alteholz   Mon, 19 Feb 2024 22:03:02 +0100
+
 libjwt (1.10.2-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru libjwt-1.10.2/debian/libjwt0.symbols 
libjwt-1.10.2/debian/libjwt0.symbols
--- libjwt-1.10.2/debian/libjwt0.symbols2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt0.symbols2024-02-19 22:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/libjwt-gnutls0.symbols 
libjwt-1.10.2/debian/libjwt-gnutls0.symbols
--- libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2024-02-19 22:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 
libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch
--- libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 1970-01-01 
01:00:00.0 +0100
+++ libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 2024-02-19 
22:03:02.0 +0100
@@ -0,0 +1,130 @@
+commit f73bac57c5bece16ac24f1a70022aa34355fc1bf
+Author: Ben Collins 
+Date:   Fri Feb 9 09:03:35 2024 -0500
+
+Implement a safer strcmp() function
+
+As noted, the strcmp() function can be used for time-based side attacks.
+
+I tried to test this and could not find a reasonable way to implement
+this attack for several reasons:
+
+1) strcmp() is optimized to compare 4 and 8 bytes at a time when possible
+   on almost every modern system, making the attack almost impossible.
+2) Running 128 million iterations of strcmp() for a single byte attack
+   gave sub-nanosecond average differences (locally on same excution stack)
+   and almost as often as the comparison was correct, it was also wrong in
+   the reverse sense (i.e. two byte strcmp() took less time than single
+   byte).
+3) Adding noise from network, application stack, web server, etc. would
+   only add to the failure rate of guessing the differences above.
+
+Erwan noted that there are proofs out there showing that signal noise
+reduction can make this guessing more "accurate", but this proof also
+noted it would take up to 4 billion guesses to completely cover this
+attack surface. The claim was that 50k attempts per second would break
+a 256-bit hmac in 22 hours. While this isn't impossible, it's very
+implausible.
+
+However, for the sake of cryptographic correctness, I implemented
+jwt_strcmp() which always compares all bytes, and does so up to the
+longest string in the 2-string set, without passing string boundaries.
+
+This makes it time-consistent for len(max(a,b)) comparisons. I proofed
+this using a 128 million interation average for various scenarious.
+
+Reported-by: Erwan Legrand 
+Signed-off-by: Ben Collins 
+
+Index: libjwt-1.10.2/libjwt/jwt-gnutls.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-gnutls.c  2024-02-19 22:38:58.571655984 +0100
+@@ -90,7 +90,7 @@
+   jwt_Base64encode(buf, sig_check, len);
+   jwt_base64uri_encode(buf);
+ 
+-  if (!strcmp(sig, buf))
++  if (!jwt_strcmp(sig, buf))
+   ret = 0;
+ 
+   free(sig_check);
+Index: libjwt-1.10.2/libjwt/jwt-openssl.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-openssl.c2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-openssl.c 2024-02-19 22:38:58.571655984 +0100
+@@ -140,7 +140,7 @@
+   jwt_base64uri_encode(buf);
+ 
+   /* And now... */
+-  ret = strcmp(buf, sig) ? EINVAL : 0;
++  ret = jwt_strcmp(buf, sig) ? EINVAL : 0;
+ 
+ jwt_verify_hmac_done:
+   BIO_free_all(b64);
+Index: libjwt-1.10.2/libjwt/jwt

Bug#1064550: bullseye-pu: libjwt/1.10.2-1+deb11u1

2024-02-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libjwt fixes CVE-2024-25189 in Bullseye. It is 
marked as no-dsa by the security team.

The fix is straightfoward and should not make any problems.

  Thorsten
diff -Nru libjwt-1.10.2/debian/changelog libjwt-1.10.2/debian/changelog
--- libjwt-1.10.2/debian/changelog  2019-07-14 19:03:00.0 +0200
+++ libjwt-1.10.2/debian/changelog  2024-02-20 23:03:02.0 +0100
@@ -1,3 +1,10 @@
+libjwt (1.10.2-1+deb11u1) bullseye; urgency=medium
+
+  * CVE-2024-25189 (Closes: #1063534)
+fix a timing side channel via strcmp()
+
+ -- Thorsten Alteholz   Tue, 20 Feb 2024 23:03:02 +0100
+
 libjwt (1.10.2-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru libjwt-1.10.2/debian/libjwt0.symbols 
libjwt-1.10.2/debian/libjwt0.symbols
--- libjwt-1.10.2/debian/libjwt0.symbols2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt0.symbols2024-02-20 23:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/libjwt-gnutls0.symbols 
libjwt-1.10.2/debian/libjwt-gnutls0.symbols
--- libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2024-02-20 23:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 
libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch
--- libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 1970-01-01 
01:00:00.0 +0100
+++ libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 2024-02-20 
23:03:02.0 +0100
@@ -0,0 +1,130 @@
+commit f73bac57c5bece16ac24f1a70022aa34355fc1bf
+Author: Ben Collins 
+Date:   Fri Feb 9 09:03:35 2024 -0500
+
+Implement a safer strcmp() function
+
+As noted, the strcmp() function can be used for time-based side attacks.
+
+I tried to test this and could not find a reasonable way to implement
+this attack for several reasons:
+
+1) strcmp() is optimized to compare 4 and 8 bytes at a time when possible
+   on almost every modern system, making the attack almost impossible.
+2) Running 128 million iterations of strcmp() for a single byte attack
+   gave sub-nanosecond average differences (locally on same excution stack)
+   and almost as often as the comparison was correct, it was also wrong in
+   the reverse sense (i.e. two byte strcmp() took less time than single
+   byte).
+3) Adding noise from network, application stack, web server, etc. would
+   only add to the failure rate of guessing the differences above.
+
+Erwan noted that there are proofs out there showing that signal noise
+reduction can make this guessing more "accurate", but this proof also
+noted it would take up to 4 billion guesses to completely cover this
+attack surface. The claim was that 50k attempts per second would break
+a 256-bit hmac in 22 hours. While this isn't impossible, it's very
+implausible.
+
+However, for the sake of cryptographic correctness, I implemented
+jwt_strcmp() which always compares all bytes, and does so up to the
+longest string in the 2-string set, without passing string boundaries.
+
+This makes it time-consistent for len(max(a,b)) comparisons. I proofed
+this using a 128 million interation average for various scenarious.
+
+Reported-by: Erwan Legrand 
+Signed-off-by: Ben Collins 
+
+Index: libjwt-1.10.2/libjwt/jwt-gnutls.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-gnutls.c  2024-02-19 22:38:58.571655984 +0100
+@@ -90,7 +90,7 @@
+   jwt_Base64encode(buf, sig_check, len);
+   jwt_base64uri_encode(buf);
+ 
+-  if (!strcmp(sig, buf))
++  if (!jwt_strcmp(sig, buf))
+   ret = 0;
+ 
+   free(sig_check);
+Index: libjwt-1.10.2/libjwt/jwt-openssl.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-openssl.c2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-openssl.c 2024-02-19 22:38:58.571655984 +0100
+@@ -140,7 +140,7 @@
+   jwt_base64uri_encode(buf);
+ 
+   /* And now... */
+-  ret = strcmp(buf, sig) ? EINVAL : 0;
++  ret = jwt_strcmp(buf, sig) ? EINVAL : 0;
+ 
+ jwt_verify_hmac_done:
+   BIO_free_all(b64);
+Index: libjwt-1.10.2/libjwt/jwt

Bug#1060186: bookworm-pu: libde265/1.0.11-1+deb12u2

2024-02-01 Thread Thorsten Alteholz




On 29.01.24 23:02, Adam D. Barratt wrote:

Please go ahead.


great, thanks ...

... and done.

  Thorsten



Bug#1060185: bullseye-pu: libde265/1.0.11-0+deb11u3

2024-02-01 Thread Thorsten Alteholz




On 01.02.24 07:37, Adam D. Barratt wrote:


Please go ahead.


great, thanks ...

... and done.

  Thorsten



Bug#1060186: bookworm-pu: libde265/1.0.11-1+deb12u2

2024-01-06 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libde265 fixes CVE-2023-49468, CVE-2023-49467 and
CVE-2023-49465 in Bookworm. All CVEs are marked as no-dsa by the security
team.

The fix was already uploaded to Stretch and nobody complained up to now.

  Thorsten
diff -Nru libde265-1.0.11/debian/changelog libde265-1.0.11/debian/changelog
--- libde265-1.0.11/debian/changelog2023-11-26 13:03:02.0 +0100
+++ libde265-1.0.11/debian/changelog2023-12-29 23:03:02.0 +0100
@@ -1,3 +1,16 @@
+libde265 (1.0.11-1+deb12u2) bookworm; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+(Closes: #1059275)
+  * CVE-2023-49465
+heap-buffer-overflow in derive_spatial_luma_vector_prediction()
+  * CVE-2023-49467
+heap-buffer-overflow in derive_combined_bipredictive_merging_candidates()
+  * CVE-2023-49468
+global buffer overflow in read_coding_unit()
+
+ -- Thorsten Alteholz   Fri, 29 Dec 2023 23:03:02 +0100
+
 libde265 (1.0.11-1+deb12u1) bookworm; urgency=medium
 
   * Non-maintainer upload by the LTS Team.
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-49465.patch 
libde265-1.0.11/debian/patches/CVE-2023-49465.patch
--- libde265-1.0.11/debian/patches/CVE-2023-49465.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-49465.patch 2023-12-26 
00:54:10.0 +0100
@@ -0,0 +1,26 @@
+commit 1475c7d2f0a6dc35c27e18abc4db9679bfd32568
+Author: Dirk Farin 
+Date:   Thu Nov 23 19:43:55 2023 +0100
+
+possible fix for #435
+
+Index: libde265-1.0.11/libde265/motion.cc
+===
+--- libde265-1.0.11.orig/libde265/motion.cc2023-12-26 00:54:05.172996659 
+0100
 libde265-1.0.11/libde265/motion.cc 2023-12-26 00:54:05.168996661 +0100
+@@ -1859,7 +1859,14 @@
+   logmvcand(vi);
+ 
+   const de265_image* imgX = NULL;
+-  if (vi.predFlag[X]) imgX = ctx->get_image(shdr->RefPicList[X][ 
vi.refIdx[X] ]);
++  if (vi.predFlag[X]) {
++if (vi.refIdx[X] < 0 || vi.refIdx[X] >= MAX_NUM_REF_PICS) {
++  return;
++}
++
++imgX = ctx->get_image(shdr->RefPicList[X][ vi.refIdx[X] ]);
++  }
++
+   const de265_image* imgY = NULL;
+   if (vi.predFlag[Y]) imgY = ctx->get_image(shdr->RefPicList[Y][ 
vi.refIdx[Y] ]);
+ 
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-49467.patch 
libde265-1.0.11/debian/patches/CVE-2023-49467.patch
--- libde265-1.0.11/debian/patches/CVE-2023-49467.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-49467.patch 2023-12-26 
00:53:43.0 +0100
@@ -0,0 +1,22 @@
+commit 7e4faf254bbd2e52b0f216cb987573a2cce97b54
+Author: Dirk Farin 
+Date:   Thu Nov 23 19:38:34 2023 +0100
+
+prevent endless loop for #434 input
+
+diff --git a/libde265/slice.cc b/libde265/slice.cc
+index 435123dc..3a8a8de1 100644
+--- a/libde265/slice.cc
 b/libde265/slice.cc
+@@ -2582,6 +2582,11 @@ static int decode_rqt_root_cbf(thread_context* tctx)
+ 
+ static int decode_ref_idx_lX(thread_context* tctx, int numRefIdxLXActive)
+ {
++  // prevent endless loop when 'numRefIdxLXActive' is invalid
++  if (numRefIdxLXActive <= 1) {
++return 0;
++  }
++
+   logtrace(LogSlice,"# ref_idx_lX\n");
+ 
+   int cMax = numRefIdxLXActive-1;
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-49468.patch 
libde265-1.0.11/debian/patches/CVE-2023-49468.patch
--- libde265-1.0.11/debian/patches/CVE-2023-49468.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-49468.patch 2023-12-26 
00:53:43.0 +0100
@@ -0,0 +1,26 @@
+commit 3e822a3ccf88df1380b165d6ce5a00494a27ceeb
+Author: Dirk Farin 
+Date:   Thu Nov 23 19:11:34 2023 +0100
+
+fix #432 (undefined IPM)
+
+diff --git a/libde265/image.h b/libde265/image.h
+index 0b536054..0a0c0e32 100644
+--- a/libde265/image.h
 b/libde265/image.h
+@@ -624,7 +624,14 @@ public:
+ 
+   enum IntraPredMode get_IntraPredMode(int x,int y) const
+   {
+-return (enum IntraPredMode)intraPredMode.get(x,y);
++uint8_t ipm = intraPredMode.get(x,y);
++
++// sanitize values if IPM is uninitialized (because of earlier read error)
++if (ipm > 34) {
++  ipm = 0;
++}
++
++return static_cast(ipm);
+   }
+ 
+   enum IntraPredMode get_IntraPredMode_atIndex(int idx) const
diff -Nru libde265-1.0.11/debian/patches/series 
libde265-1.0.11/debian/patches/series
--- libde265-1.0.11/debian/patches/series   2023-11-21 19:08:07.0 
+0100
+++ libde265-1.0.11/debian/patches/series   2023-12-26 00:54:03.0 
+0100
@@ -9,3 +9,6 @@
 CVE-2023-43887.patch
 CVE-2023-47471.patch
 
+CVE-2023-49465.patch
+CVE-2023-49467.patch
+CVE-2023-49468.patch


Bug#1060185: bullseye-pu: libde265/1.0.11-0+deb11u3

2024-01-06 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libde265 fixes CVE-2023-49468, CVE-2023-49467 and 
CVE-2023-49465 in Bullseye. All CVEs are marked as no-dsa by the security 
team.


The fix was already uploaded to Stretch and nobody complained up to now.

  Thorsten
diff -Nru libde265-1.0.11/debian/changelog libde265-1.0.11/debian/changelog
--- libde265-1.0.11/debian/changelog2023-11-26 13:03:02.0 +0100
+++ libde265-1.0.11/debian/changelog2023-12-29 23:03:02.0 +0100
@@ -1,3 +1,16 @@
+libde265 (1.0.11-0+deb11u3) bullseye; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+(Closes: #1059275)
+  * CVE-2023-49465
+heap-buffer-overflow in derive_spatial_luma_vector_prediction()
+  * CVE-2023-49467
+heap-buffer-overflow in derive_combined_bipredictive_merging_candidates()
+  * CVE-2023-49468
+global buffer overflow in read_coding_unit()
+
+ -- Thorsten Alteholz   Fri, 29 Dec 2023 23:03:02 +0100
+
 libde265 (1.0.11-0+deb11u2) bullseye; urgency=high
 
   * Non-maintainer upload by the LTS Team.
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-49465.patch 
libde265-1.0.11/debian/patches/CVE-2023-49465.patch
--- libde265-1.0.11/debian/patches/CVE-2023-49465.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-49465.patch 2023-12-29 
23:03:02.0 +0100
@@ -0,0 +1,26 @@
+commit 1475c7d2f0a6dc35c27e18abc4db9679bfd32568
+Author: Dirk Farin 
+Date:   Thu Nov 23 19:43:55 2023 +0100
+
+possible fix for #435
+
+Index: libde265-1.0.11/libde265/motion.cc
+===
+--- libde265-1.0.11.orig/libde265/motion.cc2023-12-26 00:54:05.172996659 
+0100
 libde265-1.0.11/libde265/motion.cc 2023-12-26 00:54:05.168996661 +0100
+@@ -1859,7 +1859,14 @@
+   logmvcand(vi);
+ 
+   const de265_image* imgX = NULL;
+-  if (vi.predFlag[X]) imgX = ctx->get_image(shdr->RefPicList[X][ 
vi.refIdx[X] ]);
++  if (vi.predFlag[X]) {
++if (vi.refIdx[X] < 0 || vi.refIdx[X] >= MAX_NUM_REF_PICS) {
++  return;
++}
++
++imgX = ctx->get_image(shdr->RefPicList[X][ vi.refIdx[X] ]);
++  }
++
+   const de265_image* imgY = NULL;
+   if (vi.predFlag[Y]) imgY = ctx->get_image(shdr->RefPicList[Y][ 
vi.refIdx[Y] ]);
+ 
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-49467.patch 
libde265-1.0.11/debian/patches/CVE-2023-49467.patch
--- libde265-1.0.11/debian/patches/CVE-2023-49467.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-49467.patch 2023-12-29 
23:03:02.0 +0100
@@ -0,0 +1,22 @@
+commit 7e4faf254bbd2e52b0f216cb987573a2cce97b54
+Author: Dirk Farin 
+Date:   Thu Nov 23 19:38:34 2023 +0100
+
+prevent endless loop for #434 input
+
+diff --git a/libde265/slice.cc b/libde265/slice.cc
+index 435123dc..3a8a8de1 100644
+--- a/libde265/slice.cc
 b/libde265/slice.cc
+@@ -2582,6 +2582,11 @@ static int decode_rqt_root_cbf(thread_context* tctx)
+ 
+ static int decode_ref_idx_lX(thread_context* tctx, int numRefIdxLXActive)
+ {
++  // prevent endless loop when 'numRefIdxLXActive' is invalid
++  if (numRefIdxLXActive <= 1) {
++return 0;
++  }
++
+   logtrace(LogSlice,"# ref_idx_lX\n");
+ 
+   int cMax = numRefIdxLXActive-1;
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-49468.patch 
libde265-1.0.11/debian/patches/CVE-2023-49468.patch
--- libde265-1.0.11/debian/patches/CVE-2023-49468.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-49468.patch 2023-12-29 
23:03:02.0 +0100
@@ -0,0 +1,26 @@
+commit 3e822a3ccf88df1380b165d6ce5a00494a27ceeb
+Author: Dirk Farin 
+Date:   Thu Nov 23 19:11:34 2023 +0100
+
+fix #432 (undefined IPM)
+
+diff --git a/libde265/image.h b/libde265/image.h
+index 0b536054..0a0c0e32 100644
+--- a/libde265/image.h
 b/libde265/image.h
+@@ -624,7 +624,14 @@ public:
+ 
+   enum IntraPredMode get_IntraPredMode(int x,int y) const
+   {
+-return (enum IntraPredMode)intraPredMode.get(x,y);
++uint8_t ipm = intraPredMode.get(x,y);
++
++// sanitize values if IPM is uninitialized (because of earlier read error)
++if (ipm > 34) {
++  ipm = 0;
++}
++
++return static_cast(ipm);
+   }
+ 
+   enum IntraPredMode get_IntraPredMode_atIndex(int idx) const
diff -Nru libde265-1.0.11/debian/patches/series 
libde265-1.0.11/debian/patches/series
--- libde265-1.0.11/debian/patches/series   2023-11-21 19:01:52.0 
+0100
+++ libde265-1.0.11/debian/patches/series   2023-12-29 23:03:02.0 
+0100
@@ -8,3 +8,7 @@
 CVE-2023-27103.patch
 CVE-2023-43887.patch
 CVE-2023-47471.patch
+
+CVE-2023-49465.patch
+CVE-2023-49467.patch
+CVE-2023-49468.patch


Bug#1056935: bullseye-pu: libde265/1.0.11-0+deb11u2

2023-12-27 Thread Thorsten Alteholz




On Tue, 19 Dec 2023, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and uploaded.

  Thorsten



Bug#1056738: bullseye-pu: minizip/1.1-8+deb11u1

2023-12-27 Thread Thorsten Alteholz




On Tue, 19 Dec 2023, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and uploaded.

  Thorsten



Bug#1057239: bookworm-pu: cups/2.4.2-3+deb12u5

2023-12-02 Thread Thorsten Alteholz




On Sat, 2 Dec 2023, Adam D. Barratt wrote:

Please go ahead.


Great, thanks ...

... and uploaded

  Thorsten



Bug#1056934: bookworm-pu: libde265/1.0.11-1+deb12u1

2023-12-02 Thread Thorsten Alteholz




On Sat, 2 Dec 2023, Adam D. Barratt wrote:

Please go ahead.


Great, thanks ...

... and uploaded

  Thorsten



Bug#1056737: bookworm-pu: minizip/1.1-8+deb12u1

2023-12-02 Thread Thorsten Alteholz




On Sat, 2 Dec 2023, Adam D. Barratt wrote:

Please go ahead.


Great, thanks ...

... and uploaded

  Thorsten



Bug#1057239: bookworm-pu: cups/2.4.2-3+deb12u5

2023-12-01 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes a nasty bug in Bookworm.
If the PPD file for a printer has a ColorModel option and the only choice 
for printing in color is not named RGB but CMYK instead, the printer 
cannot be made printing in color with intuitive methods, usually 
by selecting the color choice in the print dialog.


The fix was already applied in Unstable/Testing and also uploaded 
to Ubuntu-Lunar and seems to work as expected.


  Thorsten
diff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2023-10-05 16:35:27.0 +0200
+++ cups-2.4.2/debian/changelog 2023-12-01 20:35:27.0 +0100
@@ -1,3 +1,15 @@
+cups (2.4.2-3+deb12u5) bookworm; urgency=medium
+
+  * 0017-check-colormodel-also-for-CMYK.patch
+Take into account that on some printers the ColorModel option's
+choice for color printing is CMYK and not RGB.
+  * 0018-dont-override-color-settings-from-print-dialoag.patch
+Prioritize the ColorModel PPD file option over the print-color-mode
+IPP attribute. (Closes: #1056581)
+(Thanks a lot to Till Kamppeter for the patches)
+
+ -- Thorsten Alteholz   Fri, 01 Dec 2023 20:35:27 +0100
+
 cups (2.4.2-3+deb12u4) bookworm; urgency=medium
 
   * remove debian/NEWS again to avoid too much information when only
diff -Nru cups-2.4.2/debian/patches/0017-check-colormodel-also-for-CMYK.patch 
cups-2.4.2/debian/patches/0017-check-colormodel-also-for-CMYK.patch
--- cups-2.4.2/debian/patches/0017-check-colormodel-also-for-CMYK.patch 
1970-01-01 01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0017-check-colormodel-also-for-CMYK.patch 
2023-12-01 20:35:27.0 +0100
@@ -0,0 +1,21 @@
+From: Thorsten Alteholz 
+Date: Sat, 2 Dec 2023 00:00:38 +0100
+Subject: check colormodel also for CMYK
+
+---
+ scheduler/printers.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/scheduler/printers.c b/scheduler/printers.c
+index 4efa613..2fbdaad 100644
+--- a/scheduler/printers.c
 b/scheduler/printers.c
+@@ -4509,7 +4509,7 @@ load_ppd(cupsd_printer_t *p) /* I - Printer 
*/
+ ppd_option_t *color_model = ppdFindOption(ppd, "ColorModel");
+   // ColorModel PPD option
+ 
+-if (color_model && strcmp(color_model->defchoice, "RGB"))
++if (color_model && strcmp(color_model->defchoice, "RGB") && 
strcmp(color_model->defchoice, "CMYK"))
+   p->num_options = cupsAddOption("print-color-mode", "monochrome", 
p->num_options, >options);
+   }
+ }
diff -Nru 
cups-2.4.2/debian/patches/0018-dont-override-color-settings-from-print-dialoag.patch
 
cups-2.4.2/debian/patches/0018-dont-override-color-settings-from-print-dialoag.patch
--- 
cups-2.4.2/debian/patches/0018-dont-override-color-settings-from-print-dialoag.patch
1970-01-01 01:00:00.0 +0100
+++ 
cups-2.4.2/debian/patches/0018-dont-override-color-settings-from-print-dialoag.patch
2023-12-01 20:35:27.0 +0100
@@ -0,0 +1,78 @@
+From: Thorsten Alteholz 
+Date: Sat, 2 Dec 2023 00:01:23 +0100
+Subject: dont override color settings from print dialoag
+
+---
+ cups/ppd-cache.c | 39 +++
+ scheduler/ipp.c  |  3 +++
+ 2 files changed, 38 insertions(+), 4 deletions(-)
+
+diff --git a/cups/ppd-cache.c b/cups/ppd-cache.c
+index 8861813..f72d834 100644
+--- a/cups/ppd-cache.c
 b/cups/ppd-cache.c
+@@ -259,15 +259,46 @@ _cupsConvertOptions(
+ 
+   color_attr_name = print_color_mode_sup ? "print-color-mode" : "output-mode";
+ 
+-  if ((keyword = cupsGetOption("print-color-mode", num_options, options)) == 
NULL)
++ /*
++  * If we use PPD with standardized PPD option for color support - ColorModel,
++  * prefer it to don't break color/grayscale support for PPDs, either classic
++  * or the ones generated from IPP Get-Printer-Attributes response.
++  */
++
++  if ((keyword = cupsGetOption("ColorModel", num_options, options)) == NULL)
+   {
++   /*
++* No ColorModel in options...
++*/
++
+ if ((choice = ppdFindMarkedChoice(ppd, "ColorModel")) != NULL)
+ {
+-  if (!_cups_strcasecmp(choice->choice, "Gray"))
+-  keyword = "monochrome";
++ /*
++  * ColorModel is taken from PPD as its default option.
++  */
++
++  if (!strcmp(choice->choice, "Gray") || !strcmp(choice->choice, 
"FastGray") || !strcmp(choice->choice, "DeviceGray"))
++keyword = "monochrome";
+   else
+-  keyword = "color";
++keyword = "color";
+ }
++else
++ /*
++  * print-color-mode is a default option since 2.4.1, use it as a 
fallback if there is

Bug#1056935: bullseye-pu: libde265/1.0.11-0+deb11u2

2023-11-26 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libde265 fixes CVE-2023-27102, CVE-2023-27103, 
CVE-2023-43887 and CVE-2023-47471 in Bullseye.
Except CVE-2023-43887 all others are marked as no-dsa by the security 
team (CVE-2023-43887 appeared recently and was not evaluated yet).


The fix was already uploaded to Stretch and nobody complained up to now.

  Thorsten
diff -Nru libde265-1.0.11/debian/changelog libde265-1.0.11/debian/changelog
--- libde265-1.0.11/debian/changelog2023-02-04 17:18:48.0 +0100
+++ libde265-1.0.11/debian/changelog2023-11-26 13:03:02.0 +0100
@@ -1,3 +1,19 @@
+libde265 (1.0.11-0+deb11u2) bullseye; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2023-27102 (Closes: #1033257)
+fix segmentation violation in the
+function decoder_context::process_slice_segment_header
+  * CVE-2023-27103
+fix heap buffer overflow in the
+function derive_collocated_motion_vectors
+  * CVE-2023-43887
+fix buffer over-read in pic_parameter_set::dump
+  * CVE-2023-47471 (Closes: #1056187)
+fix buffer overflow in the slice_segment_header function
+
+ -- Thorsten Alteholz   Sun, 26 Nov 2023 13:03:02 +0100
+
 libde265 (1.0.11-0+deb11u1) bullseye-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-27102.patch 
libde265-1.0.11/debian/patches/CVE-2023-27102.patch
--- libde265-1.0.11/debian/patches/CVE-2023-27102.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-27102.patch 2023-11-21 
14:07:48.0 +0100
@@ -0,0 +1,23 @@
+commit 0b1752abff97cb542941d317a0d18aa50cb199b1
+Author: Dirk Farin 
+Date:   Sat Mar 4 10:32:43 2023 +0100
+
+check whether referenced PPS exists (fixes #393)
+
+Index: libde265-1.0.11/libde265/decctx.cc
+===
+--- libde265-1.0.11.orig/libde265/decctx.cc2023-11-19 19:08:18.703219858 
+0100
 libde265-1.0.11/libde265/decctx.cc 2023-11-19 19:08:18.703219858 +0100
+@@ -2276,9 +2276,10 @@
+   // get PPS and SPS for this slice
+ 
+   int pps_id = hdr->slice_pic_parameter_set_id;
+-  if (pps[pps_id]->pps_read==false) {
++  if (pps[pps_id]==nullptr || pps[pps_id]->pps_read==false) {
+ logerror(LogHeaders, "PPS %d has not been read\n", pps_id);
+-assert(false); // TODO
++img->decctx->add_warning(DE265_WARNING_NONEXISTING_PPS_REFERENCED, false);
++return false;
+   }
+ 
+   current_pps = pps[pps_id];
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-27103.patch 
libde265-1.0.11/debian/patches/CVE-2023-27103.patch
--- libde265-1.0.11/debian/patches/CVE-2023-27103.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-27103.patch 2023-11-21 
14:07:48.0 +0100
@@ -0,0 +1,54 @@
+commit d6bf73e765b7a23627bfd7a8645c143fd9097995
+Author: Dirk Farin 
+Date:   Sat Mar 4 10:27:59 2023 +0100
+
+check for valid slice header index access (fixes #394)
+
+Index: libde265-1.0.11/libde265/de265.cc
+===
+--- libde265-1.0.11.orig/libde265/de265.cc 2023-11-19 19:08:22.851224558 
+0100
 libde265-1.0.11/libde265/de265.cc  2023-11-19 19:08:22.847224554 +0100
+@@ -174,6 +174,8 @@
+ return "Bit-depth of current image does not match SPS";
+   case DE265_WARNING_REFERENCE_IMAGE_CHROMA_FORMAT_DOES_NOT_MATCH:
+ return "Chroma format of reference image does not match current image";
++  case DE265_WARNING_INVALID_SLICE_HEADER_INDEX_ACCESS:
++return "Access with invalid slice header index";
+ 
+   default: return "unknown error";
+   }
+Index: libde265-1.0.11/libde265/de265.h
+===
+--- libde265-1.0.11.orig/libde265/de265.h  2023-11-19 19:08:22.851224558 
+0100
 libde265-1.0.11/libde265/de265.h   2023-11-19 19:08:22.847224554 +0100
+@@ -145,7 +145,8 @@
+   DE265_WARNING_REFERENCE_IMAGE_SIZE_DOES_NOT_MATCH_SPS=1029,
+   DE265_WARNING_CHROMA_OF_CURRENT_IMAGE_DOES_NOT_MATCH_SPS=1030,
+   DE265_WARNING_BIT_DEPTH_OF_CURRENT_IMAGE_DOES_NOT_MATCH_SPS=1031,
+-  DE265_WARNING_REFERENCE_IMAGE_CHROMA_FORMAT_DOES_NOT_MATCH=1032
++  DE265_WARNING_REFERENCE_IMAGE_CHROMA_FORMAT_DOES_NOT_MATCH=1032,
++  DE265_WARNING_INVALID_SLICE_HEADER_INDEX_ACCESS=1033
+ } de265_error;
+ 
+ LIBDE265_API const char* de265_get_error_text(de265_error err);
+Index: libde265-1.0.11/libde265/motion.cc
+===
+--- libde265-1.0.11.orig/libde265/motion.cc2023-11-19 19:08:22.851224558 
+0100
 libde265-1.0.11/libde265/motion.cc 2023-11-19 19:08:22.847224554 +0100
+@@ -1266,6 +1266,16 @@
+ 
+ 
+ 
++  int slice_hdr_idx = colImg->get_SliceHeaderIndex(xColPb,yColPb);
++  

Bug#1056934: bookworm-pu: libde265/1.0.11-1+deb12u1

2023-11-26 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libde265 fixes CVE-2023-27102, CVE-2023-27103, 
CVE-2023-43887 and CVE-2023-47471 in Bookworm.
Except CVE-2023-43887 all others are marked as no-dsa by the security team 
(CVE-2023-43887 appeared recently and was not evaluated yet).


The fix was already uploaded to Stretch and nobody complained up to now.

  Thorsten
diff -Nru libde265-1.0.11/debian/changelog libde265-1.0.11/debian/changelog
--- libde265-1.0.11/debian/changelog2023-02-02 16:06:20.0 +0100
+++ libde265-1.0.11/debian/changelog2023-11-26 13:03:02.0 +0100
@@ -1,3 +1,19 @@
+libde265 (1.0.11-1+deb12u1) bookworm; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2023-27102 (Closes: #1033257)
+fix segmentation violation in the
+function decoder_context::process_slice_segment_header
+  * CVE-2023-27103
+fix heap buffer overflow in the
+function derive_collocated_motion_vectors
+  * CVE-2023-43887
+fix buffer over-read in pic_parameter_set::dump
+  * CVE-2023-47471 (Closes: #1056187)
+fix buffer overflow in the slice_segment_header function
+
+ -- Thorsten Alteholz   Sun, 26 Nov 2023 13:03:02 +0100
+
 libde265 (1.0.11-1) unstable; urgency=medium
 
   [ Tobias Frost ]
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-27102.patch 
libde265-1.0.11/debian/patches/CVE-2023-27102.patch
--- libde265-1.0.11/debian/patches/CVE-2023-27102.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-27102.patch 2023-11-21 
14:10:17.0 +0100
@@ -0,0 +1,23 @@
+commit 0b1752abff97cb542941d317a0d18aa50cb199b1
+Author: Dirk Farin 
+Date:   Sat Mar 4 10:32:43 2023 +0100
+
+check whether referenced PPS exists (fixes #393)
+
+Index: libde265-1.0.11/libde265/decctx.cc
+===
+--- libde265-1.0.11.orig/libde265/decctx.cc2023-11-19 19:08:18.703219858 
+0100
 libde265-1.0.11/libde265/decctx.cc 2023-11-19 19:08:18.703219858 +0100
+@@ -2276,9 +2276,10 @@
+   // get PPS and SPS for this slice
+ 
+   int pps_id = hdr->slice_pic_parameter_set_id;
+-  if (pps[pps_id]->pps_read==false) {
++  if (pps[pps_id]==nullptr || pps[pps_id]->pps_read==false) {
+ logerror(LogHeaders, "PPS %d has not been read\n", pps_id);
+-assert(false); // TODO
++img->decctx->add_warning(DE265_WARNING_NONEXISTING_PPS_REFERENCED, false);
++return false;
+   }
+ 
+   current_pps = pps[pps_id];
diff -Nru libde265-1.0.11/debian/patches/CVE-2023-27103.patch 
libde265-1.0.11/debian/patches/CVE-2023-27103.patch
--- libde265-1.0.11/debian/patches/CVE-2023-27103.patch 1970-01-01 
01:00:00.0 +0100
+++ libde265-1.0.11/debian/patches/CVE-2023-27103.patch 2023-11-21 
14:10:17.0 +0100
@@ -0,0 +1,54 @@
+commit d6bf73e765b7a23627bfd7a8645c143fd9097995
+Author: Dirk Farin 
+Date:   Sat Mar 4 10:27:59 2023 +0100
+
+check for valid slice header index access (fixes #394)
+
+Index: libde265-1.0.11/libde265/de265.cc
+===
+--- libde265-1.0.11.orig/libde265/de265.cc 2023-11-19 19:08:22.851224558 
+0100
 libde265-1.0.11/libde265/de265.cc  2023-11-19 19:08:22.847224554 +0100
+@@ -174,6 +174,8 @@
+ return "Bit-depth of current image does not match SPS";
+   case DE265_WARNING_REFERENCE_IMAGE_CHROMA_FORMAT_DOES_NOT_MATCH:
+ return "Chroma format of reference image does not match current image";
++  case DE265_WARNING_INVALID_SLICE_HEADER_INDEX_ACCESS:
++return "Access with invalid slice header index";
+ 
+   default: return "unknown error";
+   }
+Index: libde265-1.0.11/libde265/de265.h
+===
+--- libde265-1.0.11.orig/libde265/de265.h  2023-11-19 19:08:22.851224558 
+0100
 libde265-1.0.11/libde265/de265.h   2023-11-19 19:08:22.847224554 +0100
+@@ -145,7 +145,8 @@
+   DE265_WARNING_REFERENCE_IMAGE_SIZE_DOES_NOT_MATCH_SPS=1029,
+   DE265_WARNING_CHROMA_OF_CURRENT_IMAGE_DOES_NOT_MATCH_SPS=1030,
+   DE265_WARNING_BIT_DEPTH_OF_CURRENT_IMAGE_DOES_NOT_MATCH_SPS=1031,
+-  DE265_WARNING_REFERENCE_IMAGE_CHROMA_FORMAT_DOES_NOT_MATCH=1032
++  DE265_WARNING_REFERENCE_IMAGE_CHROMA_FORMAT_DOES_NOT_MATCH=1032,
++  DE265_WARNING_INVALID_SLICE_HEADER_INDEX_ACCESS=1033
+ } de265_error;
+ 
+ LIBDE265_API const char* de265_get_error_text(de265_error err);
+Index: libde265-1.0.11/libde265/motion.cc
+===
+--- libde265-1.0.11.orig/libde265/motion.cc2023-11-19 19:08:22.851224558 
+0100
 libde265-1.0.11/libde265/motion.cc 2023-11-19 19:08:22.847224554 +0100
+@@ -1266,6 +1266,16 @@
+ 
+ 
+ 
++  int slice_hdr_idx = colImg->get_SliceHeaderIndex(xColPb,yColPb);
++  if (slice_hdr_idx >= colImg->slices.size()) {
++ 

Bug#1056737: bookworm-pu: minizip/1.1-8+deb12u1

2023-11-25 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for minizip fixes CVE-2023-45853 in Bookworm. This 
CVE has been marked as no-dsa by the security team.


Chrome upstream added a test for their internal copy of minizip. Running 
this test against libminizip1 of this package worked as well, so I don't 
expect any problems.


  Thorsten
diff -Nru minizip-1.1/debian/changelog minizip-1.1/debian/changelog
--- minizip-1.1/debian/changelog2016-01-03 04:24:26.0 +0100
+++ minizip-1.1/debian/changelog2023-11-25 13:03:02.0 +0100
@@ -1,3 +1,11 @@
+minizip (1.1-8+deb12u1) bookworm; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2023-45853 (Closes: #1056719)
+Reject overflows of zip header fields in minizip.
+
+ -- Thorsten Alteholz   Sat, 25 Nov 2023 13:03:02 +0100
+
 minizip (1.1-8) unstable; urgency=medium
 
   * Fix implicit function declaration.
diff -Nru minizip-1.1/debian/patches/CVE-2023-45853.patch 
minizip-1.1/debian/patches/CVE-2023-45853.patch
--- minizip-1.1/debian/patches/CVE-2023-45853.patch 1970-01-01 
01:00:00.0 +0100
+++ minizip-1.1/debian/patches/CVE-2023-45853.patch 2023-11-18 
17:51:11.0 +0100
@@ -0,0 +1,34 @@
+commit 73331a6a0481067628f065ffe87bb1d8f787d10c
+Author: Hans Wennborg 
+Date:   Fri Aug 18 11:05:33 2023 +0200
+
+Reject overflows of zip header fields in minizip.
+
+This checks the lengths of the file name, extra field, and comment
+that would be put in the zip headers, and rejects them if they are
+too long. They are each limited to 65535 bytes in length by the zip
+format. This also avoids possible buffer overflows if the provided
+fields are too long.
+
+Index: minizip-1.1/zip.c
+===
+--- minizip-1.1.orig/zip.c 2023-11-18 17:51:05.539763813 +0100
 minizip-1.1/zip.c  2023-11-18 17:51:05.539763813 +0100
+@@ -1082,6 +1082,17 @@
+   return ZIP_PARAMERROR;
+ #endif
+ 
++// The filename and comment length must fit in 16 bits.
++if ((filename!=NULL) && (strlen(filename)>0x))
++return ZIP_PARAMERROR;
++if ((comment!=NULL) && (strlen(comment)>0x))
++return ZIP_PARAMERROR;
++// The extra field length must fit in 16 bits. If the member also requires
++// a Zip64 extra block, that will also need to fit within that 16-bit
++// length, but that will be checked for later.
++if ((size_extrafield_local>0x) || (size_extrafield_global>0x))
++return ZIP_PARAMERROR;
++
+ zi = (zip64_internal*)file;
+ 
+ if (zi->in_opened_file_inzip == 1)
diff -Nru minizip-1.1/debian/patches/series minizip-1.1/debian/patches/series
--- minizip-1.1/debian/patches/series   2016-01-03 04:14:08.0 +0100
+++ minizip-1.1/debian/patches/series   2023-11-18 17:50:30.0 +0100
@@ -1,3 +1,5 @@
 include.patch
 automake.patch
 traversal.patch
+
+CVE-2023-45853.patch


Bug#1056738: bullseye-pu: minizip/1.1-8+deb11u1

2023-11-25 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for minizip fixes CVE-2023-45853 in Bullseye. This
CVE has been marked as no-dsa by the security team.

As this is the same version as in Bookworm, I don't expect any problems in 
Bullseye as well.


  Thorsten
diff -Nru minizip-1.1/debian/changelog minizip-1.1/debian/changelog
--- minizip-1.1/debian/changelog2016-01-03 04:24:26.0 +0100
+++ minizip-1.1/debian/changelog2023-11-25 13:03:02.0 +0100
@@ -1,3 +1,11 @@
+minizip (1.1-8+deb11u1) bullseye; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2023-45853 (Closes: #1056719)
+Reject overflows of zip header fields in minizip.
+
+ -- Thorsten Alteholz   Sat, 25 Nov 2023 13:03:02 +0100
+
 minizip (1.1-8) unstable; urgency=medium
 
   * Fix implicit function declaration.
diff -Nru minizip-1.1/debian/patches/CVE-2023-45853.patch 
minizip-1.1/debian/patches/CVE-2023-45853.patch
--- minizip-1.1/debian/patches/CVE-2023-45853.patch 1970-01-01 
01:00:00.0 +0100
+++ minizip-1.1/debian/patches/CVE-2023-45853.patch 2023-11-18 
17:54:41.0 +0100
@@ -0,0 +1,34 @@
+commit 73331a6a0481067628f065ffe87bb1d8f787d10c
+Author: Hans Wennborg 
+Date:   Fri Aug 18 11:05:33 2023 +0200
+
+Reject overflows of zip header fields in minizip.
+
+This checks the lengths of the file name, extra field, and comment
+that would be put in the zip headers, and rejects them if they are
+too long. They are each limited to 65535 bytes in length by the zip
+format. This also avoids possible buffer overflows if the provided
+fields are too long.
+
+Index: minizip-1.1/zip.c
+===
+--- minizip-1.1.orig/zip.c 2023-11-18 17:51:05.539763813 +0100
 minizip-1.1/zip.c  2023-11-18 17:51:05.539763813 +0100
+@@ -1082,6 +1082,17 @@
+   return ZIP_PARAMERROR;
+ #endif
+ 
++// The filename and comment length must fit in 16 bits.
++if ((filename!=NULL) && (strlen(filename)>0x))
++return ZIP_PARAMERROR;
++if ((comment!=NULL) && (strlen(comment)>0x))
++return ZIP_PARAMERROR;
++// The extra field length must fit in 16 bits. If the member also requires
++// a Zip64 extra block, that will also need to fit within that 16-bit
++// length, but that will be checked for later.
++if ((size_extrafield_local>0x) || (size_extrafield_global>0x))
++return ZIP_PARAMERROR;
++
+ zi = (zip64_internal*)file;
+ 
+ if (zi->in_opened_file_inzip == 1)
diff -Nru minizip-1.1/debian/patches/series minizip-1.1/debian/patches/series
--- minizip-1.1/debian/patches/series   2016-01-03 04:14:08.0 +0100
+++ minizip-1.1/debian/patches/series   2023-11-18 17:54:50.0 +0100
@@ -1,3 +1,5 @@
 include.patch
 automake.patch
 traversal.patch
+
+CVE-2023-45853.patch


Bug#1053523: bookworm-pu: cups/2.4.2-3+deb12u4

2023-10-05 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


After uploading the fix for CVE-2023-4504 and CVE-2023-32360 to Buster I 
got some complaints:

 - the mentioned filename of the cupsd configuration contained a typo
   and several users were unsure what to do now ...
 - ... especially as the contents of debian/NEWS was also shown on
   computers where only cups client was installed.

So this upload fixes the typo and removes debian/NEWS again, so that the 
text is only shown when cups-daemon will be updated.


I know it is rather late for this, but maybe this makes things easier for 
our users.


  Thorsten
diff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2023-09-29 21:20:27.0 +0200
+++ cups-2.4.2/debian/changelog 2023-10-05 16:35:27.0 +0200
@@ -1,3 +1,11 @@
+cups (2.4.2-3+deb12u4) bookworm; urgency=medium
+
+  * remove debian/NEWS again to avoid too much information when only
+the client part is installed
+  * fix typo in config filename
+
+ -- Thorsten Alteholz   Thu, 05 Oct 2023 16:35:27 +0200
+
 cups (2.4.2-3+deb12u3) bookworm; urgency=medium
 
   * move debian/NEWS.Debian to debian/NEWS
diff -Nru cups-2.4.2/debian/cups-daemon.NEWS cups-2.4.2/debian/cups-daemon.NEWS
--- cups-2.4.2/debian/cups-daemon.NEWS  2023-09-29 21:20:27.0 +0200
+++ cups-2.4.2/debian/cups-daemon.NEWS  2023-10-05 16:35:27.0 +0200
@@ -4,7 +4,7 @@
   unauthorized users to fetch documents over local or remote networks.
   Since this is a configuration fix, it might be that it does not reach you if 
you
   are updating 'cups-daemon' (rather than doing a fresh installation).
-  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
+  Please double check your /etc/cups/cupsd.conf file, whether it limits the 
access
   to CUPS-Get-Document with something like the following
   >  
   >AuthType Default
diff -Nru cups-2.4.2/debian/NEWS cups-2.4.2/debian/NEWS
--- cups-2.4.2/debian/NEWS  2023-09-29 21:20:27.0 +0200
+++ cups-2.4.2/debian/NEWS  1970-01-01 01:00:00.0 +0100
@@ -1,16 +0,0 @@
-cups (2.4.2-3+deb12u3) bookworm; urgency=medium
-
-  This release addresses a security issue (CVE-2023-32360) which allows
-  unauthorized users to fetch documents over local or remote networks.
-  Since this is a configuration fix, it might be that it does not reach you if 
you
-  are updating 'cups-daemon' (rather than doing a fresh installation).
-  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
-  to CUPS-Get-Document with something like the following
-  >  
-  >AuthType Default
-  >Require user @OWNER @SYSTEM
-  >Order deny,allow
-  >   
-  (The important line is the 'AuthType Default' in this section)
-
- -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200


Bug#1053522: bullseye-pu: cups/2.3.3op2-3+deb11u6

2023-10-05 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


After uploading the fix for CVE-2023-4504 and CVE-2023-32360 to Buster I
got some complaints:
 - the mentioned filename of the cupsd configuration contained a typo
   and several users were unsure what to do now ...
 - ... especially as the contents of debian/NEWS was also shown on
   computers where only cups client was installed.

So this upload fixes the typo and removes debian/NEWS again, so that the
text is only shown when cups-daemon will be updated.

I know it is rather late for this, but maybe this makes things easier for
our users.

  Thorsten
diff -Nru cups-2.3.3op2/debian/changelog cups-2.3.3op2/debian/changelog
--- cups-2.3.3op2/debian/changelog  2023-09-29 21:20:27.0 +0200
+++ cups-2.3.3op2/debian/changelog  2023-10-05 16:35:27.0 +0200
@@ -1,3 +1,11 @@
+cups (2.3.3op2-3+deb11u6) bullseye; urgency=medium
+
+  * remove debian/NEWS again to avoid too much information when only
+the client part is installed
+  * fix typo in config filename
+
+ -- Thorsten Alteholz   Thu, 05 Oct 2023 16:35:27 +0200
+
 cups (2.3.3op2-3+deb11u5) bullseye; urgency=medium
 
   * move debian/NEWS.Debian to debian/NEWS
diff -Nru cups-2.3.3op2/debian/cups-daemon.NEWS 
cups-2.3.3op2/debian/cups-daemon.NEWS
--- cups-2.3.3op2/debian/cups-daemon.NEWS   2023-09-29 21:20:27.0 
+0200
+++ cups-2.3.3op2/debian/cups-daemon.NEWS   2023-10-05 16:35:27.0 
+0200
@@ -4,7 +4,7 @@
   unauthorized users to fetch documents over local or remote networks.
   Since this is a configuration fix, it might be that it does not reach you if 
you
   are updating 'cups-daemon' (rather than doing a fresh installation).
-  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
+  Please double check your /etc/cups/cupsd.conf file, whether it limits the 
access
   to CUPS-Get-Document with something like the following
   >  
   >AuthType Default
diff -Nru cups-2.3.3op2/debian/NEWS cups-2.3.3op2/debian/NEWS
--- cups-2.3.3op2/debian/NEWS   2023-09-29 21:20:27.0 +0200
+++ cups-2.3.3op2/debian/NEWS   1970-01-01 01:00:00.0 +0100
@@ -1,16 +0,0 @@
-cups (2.3.3op2-3+deb11u5) bullseye; urgency=medium
-
-  This release addresses a security issue (CVE-2023-32360) which allows
-  unauthorized users to fetch documents over local or remote networks.
-  Since this is a configuration fix, it might be that it does not reach you if 
you
-  are updating 'cups-daemon' (rather than doing a fresh installation).
-  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
-  to CUPS-Get-Document with something like the following
-  >  
-  >AuthType Default
-  >Require user @OWNER @SYSTEM
-  >Order deny,allow
-  >   
-  (The important line is the 'AuthType Default' in this section)
-
- -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200


Bug#1052361: bookworm-pu: cups/2.4.2-3+deb12u2

2023-09-29 Thread Thorsten Alteholz




On Fri, 29 Sep 2023, Adam D. Barratt wrote:

I should have spotted this before (particularly as we recently had the
same issue with another package) but debian/NEWS.Debian should simply
be debian/NEWS. dh_installchangelogs then renames it to NEWS.Debian in
the binary package.


ok, uploaded, I keep my fingers crossed.

  Thorsten



Bug#1052363: bullseye-pu: cups/2.3.3op2-3+deb11u4

2023-09-29 Thread Thorsten Alteholz




On Fri, 29 Sep 2023, Adam D. Barratt wrote:

I should have spotted this before (particularly as we recently had the
same issue with another package) but debian/NEWS.Debian should simply
be debian/NEWS. dh_installchangelogs then renames it to NEWS.Debian in
the binary package.


ok, uploaded, I keep my fingers crossed.

  Thorsten



Bug#1052363: bullseye-pu: cups/2.3.3op2-3+deb11u4

2023-09-28 Thread Thorsten Alteholz




On 27.09.23 20:33, Adam D. Barratt wrote:


Thanks; please go ahead.


great, thanks, ...

... and uploaded.

  Thorsten



Bug#1052361: bookworm-pu: cups/2.4.2-3+deb12u2

2023-09-28 Thread Thorsten Alteholz




On 27.09.23 20:32, Adam D. Barratt wrote:


Please go ahead.


great, thanks, ...

... and uploaded.

  Thorsten



Bug#1052363: bullseye-pu: cups/2.3.3op2-3+deb11u4

2023-09-27 Thread Thorsten Alteholz

Control: tags 1052363 - moreinfo


On Sat, 23 Sep 2023, Adam D. Barratt wrote:

The same query as for bookworm applies here - do we expect users to
know how to find the patch?


... and the same new text for Bullseye.

  Thorstendiff -Nru cups-2.3.3op2/debian/changelog cups-2.3.3op2/debian/changelog
--- cups-2.3.3op2/debian/changelog  2023-06-24 10:54:05.0 +0200
+++ cups-2.3.3op2/debian/changelog  2023-09-19 21:20:27.0 +0200
@@ -1,3 +1,12 @@
+cups (2.3.3op2-3+deb11u4) bullseye; urgency=medium
+
+  * CVE-2023-4504
+Postscript parsing heap-based buffer overflow
+  * CVE-2023-32360 (Closes: #1051953)
+authentication issue
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.3.3op2-3+deb11u3) bullseye; urgency=medium
 
   * CVE-2023-34241 (Closes: #1038885)
diff -Nru cups-2.3.3op2/debian/cups-daemon.NEWS 
cups-2.3.3op2/debian/cups-daemon.NEWS
--- cups-2.3.3op2/debian/cups-daemon.NEWS   2023-06-22 23:22:40.0 
+0200
+++ cups-2.3.3op2/debian/cups-daemon.NEWS   2023-09-19 21:20:27.0 
+0200
@@ -1,3 +1,20 @@
+cups (2.3.3op2-3+deb11u4) bullseye; urgency=medium
+
+  This release addresses a security issue (CVE-2023-32360) which allows
+  unauthorized users to fetch documents over local or remote networks.
+  Since this is a configuration fix, it might be that it does not reach you if 
you
+  are updating 'cups-daemon' (rather than doing a fresh installation).
+  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
+  to CUPS-Get-Document with something like the following
+  >  
+  >AuthType Default
+  >Require user @OWNER @SYSTEM
+  >Order deny,allow
+  >   
+  (The important line is the 'AuthType Default' in this section)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.1.4-3) unstable; urgency=low
 
   The default ErrorPolicy is changed from 'stop-printer' to 'retry-job',
diff -Nru cups-2.3.3op2/debian/NEWS.Debian cups-2.3.3op2/debian/NEWS.Debian
--- cups-2.3.3op2/debian/NEWS.Debian1970-01-01 01:00:00.0 +0100
+++ cups-2.3.3op2/debian/NEWS.Debian2023-09-19 21:20:27.0 +0200
@@ -0,0 +1,16 @@
+cups (2.3.3op2-3+deb11u4) bullseye; urgency=medium
+
+  This release addresses a security issue (CVE-2023-32360) which allows
+  unauthorized users to fetch documents over local or remote networks.
+  Since this is a configuration fix, it might be that it does not reach you if 
you
+  are updating 'cups-daemon' (rather than doing a fresh installation).
+  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
+  to CUPS-Get-Document with something like the following
+  >  
+  >AuthType Default
+  >Require user @OWNER @SYSTEM
+  >Order deny,allow
+  >   
+  (The important line is the 'AuthType Default' in this section)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
diff -Nru cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch 
cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch
--- cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch  2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,27 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 23:21:42 +0200
+Subject: CVE-2023-32360
+
+---
+ conf/cupsd.conf.in | 8 +++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/conf/cupsd.conf.in b/conf/cupsd.conf.in
+index 09059dc..67d1c8b 100644
+--- a/conf/cupsd.conf.in
 b/conf/cupsd.conf.in
+@@ -65,7 +65,13 @@ WebInterface @CUPS_WEBIF@
+ Order deny,allow
+   
+ 
+-  
++  
++Require user @OWNER @SYSTEM
++Order deny,allow
++  
++
++  
++AuthType Default
+ Require user @OWNER @SYSTEM
+ Order deny,allow
+   
diff -Nru cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch 
cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch
--- cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch   1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch   2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,33 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 23:22:44 +0200
+Subject: CVE-2023-4504
+
+---
+ cups/raster-interpret.c | 14 +-
+ 1 file changed, 13 insertions(+), 1 deletion(-)
+
+diff --git a/cups/raster-interpret.c b/cups/raster-interpret.c
+index fbe52f3..89ef158 100644
+--- a/cups/raster-interpret.c
 b/cups/raster-interpret.c
+@@ -1113,7 +1113,19 @@ scan_ps(_cups_ps_stack_t *st,   /* I  - Stack */
+ 
+   cur ++;
+ 
+-if (*cur == 'b')
++ /*
++  * Return NULL if we reached NULL terminator, a lone backslash
++* is not a valid character in PostScript.
++  */
++
++  if (!*cur)
++  {
++*ptr = NULL;
++
++return (NULL);
++  }
++
++  if (*cur == 'b')
+ *valptr++ = '\b';
+

Bug#1052361: bookworm-pu: cups/2.4.2-3+deb12u2

2023-09-27 Thread Thorsten Alteholz

Control: tags 1052361 - moreinfo

Hi Adam,

On Sat, 23 Sep 2023, Adam D. Barratt wrote:

Hmm. Is there a better way we can point users to the required change
here that doesn't require them knowing how to find patches applied to
the source package?


yes, *sigh* the wording was bad and I also mangled the version numbers, 
sorry.
What do you think of this version, which was thankfully provided by 
IOhannes?


  Thorstendiff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2023-06-24 10:54:05.0 +0200
+++ cups-2.4.2/debian/changelog 2023-09-19 21:20:27.0 +0200
@@ -1,3 +1,12 @@
+cups (2.4.2-3+deb12u2) bookworm; urgency=medium
+
+  * CVE-2023-4504
+Postscript parsing heap-based buffer overflow
+  * CVE-2023-32360 (Closes: #1051953)
+authentication issue
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.4.2-3+deb12u1) bookworm; urgency=medium
 
   * CVE-2023-34241 (Closes: #1038885)
diff -Nru cups-2.4.2/debian/cups-daemon.NEWS cups-2.4.2/debian/cups-daemon.NEWS
--- cups-2.4.2/debian/cups-daemon.NEWS  2023-06-22 23:22:40.0 +0200
+++ cups-2.4.2/debian/cups-daemon.NEWS  2023-09-19 21:20:27.0 +0200
@@ -1,3 +1,20 @@
+cups (2.4.2-3+deb12u2) bookworm; urgency=medium
+
+  This release addresses a security issue (CVE-2023-32360) which allows
+  unauthorized users to fetch documents over local or remote networks.
+  Since this is a configuration fix, it might be that it does not reach you if 
you
+  are updating 'cups-daemon' (rather than doing a fresh installation).
+  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
+  to CUPS-Get-Document with something like the following
+  >  
+  >AuthType Default
+  >Require user @OWNER @SYSTEM
+  >Order deny,allow
+  >   
+  (The important line is the 'AuthType Default' in this section)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.1.4-3) unstable; urgency=low
 
   The default ErrorPolicy is changed from 'stop-printer' to 'retry-job',
diff -Nru cups-2.4.2/debian/NEWS.Debian cups-2.4.2/debian/NEWS.Debian
--- cups-2.4.2/debian/NEWS.Debian   1970-01-01 01:00:00.0 +0100
+++ cups-2.4.2/debian/NEWS.Debian   2023-09-19 21:20:27.0 +0200
@@ -0,0 +1,16 @@
+cups (2.4.2-3+deb12u2) bookworm; urgency=medium
+
+  This release addresses a security issue (CVE-2023-32360) which allows
+  unauthorized users to fetch documents over local or remote networks.
+  Since this is a configuration fix, it might be that it does not reach you if 
you
+  are updating 'cups-daemon' (rather than doing a fresh installation).
+  Please double check your /etc/cups/cupds.conf file, whether it limits the 
access
+  to CUPS-Get-Document with something like the following
+  >  
+  >AuthType Default
+  >Require user @OWNER @SYSTEM
+  >Order deny,allow
+  >   
+  (The important line is the 'AuthType Default' in this section)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
diff -Nru cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch 
cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch
--- cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch  2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,33 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 04:55:44 +0200
+Subject: CVE-2023-4504
+
+---
+ cups/raster-interpret.c | 14 +-
+ 1 file changed, 13 insertions(+), 1 deletion(-)
+
+diff --git a/cups/raster-interpret.c b/cups/raster-interpret.c
+index fbe52f3..89ef158 100644
+--- a/cups/raster-interpret.c
 b/cups/raster-interpret.c
+@@ -1113,7 +1113,19 @@ scan_ps(_cups_ps_stack_t *st,   /* I  - Stack */
+ 
+   cur ++;
+ 
+-if (*cur == 'b')
++ /*
++  * Return NULL if we reached NULL terminator, a lone backslash
++* is not a valid character in PostScript.
++  */
++
++  if (!*cur)
++  {
++*ptr = NULL;
++
++return (NULL);
++  }
++
++  if (*cur == 'b')
+ *valptr++ = '\b';
+   else if (*cur == 'f')
+ *valptr++ = '\f';
diff -Nru cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch 
cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch
--- cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch 1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch 2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,27 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 04:56:47 +0200
+Subject: CVE-2023-32360
+
+---
+ conf/cupsd.conf.in | 8 +++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/conf/cupsd.conf.in b/conf/cupsd.conf.in
+index b258849..a07536f 100644
+--- a/conf/cupsd.conf.in
 b/conf/cupsd.conf.in
+@@ -68,7 +68,13 @@ IdleExitTimeout @EXIT_TIMEOUT@
+ Order deny,allow
+   
+ 
+-  
++  
++ 

Bug#1052363: bullseye-pu: cups/2.3.3op2-3+deb11u4

2023-09-20 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2023-4504 and CVE-2023-32360 in 
Bullseye. These CVEs have been marked as no-dsa by the security team, but 
at least CVE-2023-32360 got anRC bug (#1051953).


  Thorsten

PS: There already is 2.3.3op2-3+deb11u3 in P-Udiff -Nru cups-2.3.3op2/debian/changelog cups-2.3.3op2/debian/changelog
--- cups-2.3.3op2/debian/changelog  2023-06-24 10:54:05.0 +0200
+++ cups-2.3.3op2/debian/changelog  2023-09-19 21:20:27.0 +0200
@@ -1,3 +1,12 @@
+cups (2.3.3op2-3+deb11u4) bullseye; urgency=medium
+
+  * CVE-2023-4504
+Postscript parsing heap-based buffer overflow
+  * CVE-2023-32360 (Closes: #1051953)
+authentication issue
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.3.3op2-3+deb11u3) bullseye; urgency=medium
 
   * CVE-2023-34241 (Closes: #1038885)
diff -Nru cups-2.3.3op2/debian/cups-daemon.NEWS 
cups-2.3.3op2/debian/cups-daemon.NEWS
--- cups-2.3.3op2/debian/cups-daemon.NEWS   2023-06-22 23:22:40.0 
+0200
+++ cups-2.3.3op2/debian/cups-daemon.NEWS   2023-09-19 21:20:27.0 
+0200
@@ -1,3 +1,11 @@
+cups (2.4.2-6) unstable; urgency=low
+
+  In case this is not a fresh installation of cups, please double check
+  whether your cupsd.conf really does contain the limitiation for
+  "CUPS-Get-Document" (see patch 0019-CVE-2023-32360.patch)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.1.4-3) unstable; urgency=low
 
   The default ErrorPolicy is changed from 'stop-printer' to 'retry-job',
diff -Nru cups-2.3.3op2/debian/NEWS.Debian cups-2.3.3op2/debian/NEWS.Debian
--- cups-2.3.3op2/debian/NEWS.Debian1970-01-01 01:00:00.0 +0100
+++ cups-2.3.3op2/debian/NEWS.Debian2023-09-19 21:20:27.0 +0200
@@ -0,0 +1,7 @@
+cups (2.4.2-6) unstable; urgency=low
+
+  In case this is not a fresh installation of cups, please double check
+  whether your cupsd.conf really does contain the limitiation for
+  "CUPS-Get-Document" (see patch 0019-CVE-2023-32360.patch)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
diff -Nru cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch 
cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch
--- cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0019-CVE-2023-32360.patch  2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,27 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 23:21:42 +0200
+Subject: CVE-2023-32360
+
+---
+ conf/cupsd.conf.in | 8 +++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/conf/cupsd.conf.in b/conf/cupsd.conf.in
+index 09059dc..67d1c8b 100644
+--- a/conf/cupsd.conf.in
 b/conf/cupsd.conf.in
+@@ -65,7 +65,13 @@ WebInterface @CUPS_WEBIF@
+ Order deny,allow
+   
+ 
+-  
++  
++Require user @OWNER @SYSTEM
++Order deny,allow
++  
++
++  
++AuthType Default
+ Require user @OWNER @SYSTEM
+ Order deny,allow
+   
diff -Nru cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch 
cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch
--- cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch   1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0020-CVE-2023-4504.patch   2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,33 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 23:22:44 +0200
+Subject: CVE-2023-4504
+
+---
+ cups/raster-interpret.c | 14 +-
+ 1 file changed, 13 insertions(+), 1 deletion(-)
+
+diff --git a/cups/raster-interpret.c b/cups/raster-interpret.c
+index fbe52f3..89ef158 100644
+--- a/cups/raster-interpret.c
 b/cups/raster-interpret.c
+@@ -1113,7 +1113,19 @@ scan_ps(_cups_ps_stack_t *st,   /* I  - Stack */
+ 
+   cur ++;
+ 
+-if (*cur == 'b')
++ /*
++  * Return NULL if we reached NULL terminator, a lone backslash
++* is not a valid character in PostScript.
++  */
++
++  if (!*cur)
++  {
++*ptr = NULL;
++
++return (NULL);
++  }
++
++  if (*cur == 'b')
+ *valptr++ = '\b';
+   else if (*cur == 'f')
+ *valptr++ = '\f';
diff -Nru cups-2.3.3op2/debian/patches/series 
cups-2.3.3op2/debian/patches/series
--- cups-2.3.3op2/debian/patches/series 2023-06-24 10:54:05.0 +0200
+++ cups-2.3.3op2/debian/patches/series 2023-09-19 21:20:27.0 +0200
@@ -16,3 +16,5 @@
 0016-Fix-certificate-comparison-CVE-2022-26691.patch
 0017-CVE-2023-32324.patch
 0018-CVE-2023-34241.patch
+0019-CVE-2023-32360.patch
+0020-CVE-2023-4504.patch


Bug#1052361: bookworm-pu: cups/2.4.2-3+deb12u2

2023-09-20 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2023-4504 and CVE-2023-32360 in 
Bookworm. These CVEs have been marked as no-dsa by the security team, 
but at least CVE-2023-32360 got an RC bug (#1051953).


  Thorstendiff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2023-06-24 10:54:05.0 +0200
+++ cups-2.4.2/debian/changelog 2023-09-19 21:20:27.0 +0200
@@ -1,3 +1,12 @@
+cups (2.4.2-3+deb12u2) bookworm; urgency=medium
+
+  * CVE-2023-4504
+Postscript parsing heap-based buffer overflow
+  * CVE-2023-32360 (Closes: #1051953)
+authentication issue
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.4.2-3+deb12u1) bookworm; urgency=medium
 
   * CVE-2023-34241 (Closes: #1038885)
diff -Nru cups-2.4.2/debian/cups-daemon.NEWS cups-2.4.2/debian/cups-daemon.NEWS
--- cups-2.4.2/debian/cups-daemon.NEWS  2023-06-22 23:22:40.0 +0200
+++ cups-2.4.2/debian/cups-daemon.NEWS  2023-09-19 21:20:27.0 +0200
@@ -1,3 +1,11 @@
+cups (2.4.2-6) unstable; urgency=low
+
+  In case this is not a fresh installation of cups, please double check
+  whether your cupsd.conf really does contain the limitiation for
+  "CUPS-Get-Document" (see patch 0015-CVE-2023-32360.patch)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
+
 cups (2.1.4-3) unstable; urgency=low
 
   The default ErrorPolicy is changed from 'stop-printer' to 'retry-job',
diff -Nru cups-2.4.2/debian/NEWS.Debian cups-2.4.2/debian/NEWS.Debian
--- cups-2.4.2/debian/NEWS.Debian   1970-01-01 01:00:00.0 +0100
+++ cups-2.4.2/debian/NEWS.Debian   2023-09-19 21:20:27.0 +0200
@@ -0,0 +1,7 @@
+cups (2.4.2-6) unstable; urgency=low
+
+  In case this is not a fresh installation of cups, please double check
+  whether your cupsd.conf really does contain the limitiation for
+  "CUPS-Get-Document" (see patch 0015-CVE-2023-32360.patch)
+
+ -- Thorsten Alteholz   Tue, 19 Sep 2023 21:20:27 +0200
diff -Nru cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch 
cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch
--- cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0015-CVE-2023-4504.patch  2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,33 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 04:55:44 +0200
+Subject: CVE-2023-4504
+
+---
+ cups/raster-interpret.c | 14 +-
+ 1 file changed, 13 insertions(+), 1 deletion(-)
+
+diff --git a/cups/raster-interpret.c b/cups/raster-interpret.c
+index fbe52f3..89ef158 100644
+--- a/cups/raster-interpret.c
 b/cups/raster-interpret.c
+@@ -1113,7 +1113,19 @@ scan_ps(_cups_ps_stack_t *st,   /* I  - Stack */
+ 
+   cur ++;
+ 
+-if (*cur == 'b')
++ /*
++  * Return NULL if we reached NULL terminator, a lone backslash
++* is not a valid character in PostScript.
++  */
++
++  if (!*cur)
++  {
++*ptr = NULL;
++
++return (NULL);
++  }
++
++  if (*cur == 'b')
+ *valptr++ = '\b';
+   else if (*cur == 'f')
+ *valptr++ = '\f';
diff -Nru cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch 
cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch
--- cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch 1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0016-CVE-2023-32360.patch 2023-09-19 
21:20:27.0 +0200
@@ -0,0 +1,27 @@
+From: Thorsten Alteholz 
+Date: Wed, 20 Sep 2023 04:56:47 +0200
+Subject: CVE-2023-32360
+
+---
+ conf/cupsd.conf.in | 8 +++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/conf/cupsd.conf.in b/conf/cupsd.conf.in
+index b258849..a07536f 100644
+--- a/conf/cupsd.conf.in
 b/conf/cupsd.conf.in
+@@ -68,7 +68,13 @@ IdleExitTimeout @EXIT_TIMEOUT@
+ Order deny,allow
+   
+ 
+-  
++  
++Require user @OWNER @SYSTEM
++Order deny,allow
++  
++
++  
++AuthType Default
+ Require user @OWNER @SYSTEM
+ Order deny,allow
+   
diff -Nru cups-2.4.2/debian/patches/series cups-2.4.2/debian/patches/series
--- cups-2.4.2/debian/patches/series2023-06-24 10:54:05.0 +0200
+++ cups-2.4.2/debian/patches/series2023-09-19 21:20:27.0 +0200
@@ -12,3 +12,5 @@
 0012-add-pt.patch
 0013-CVE-2023-32324.patch
 0014-CVE-2023-34241.patch
+0015-CVE-2023-4504.patch
+0016-CVE-2023-32360.patch


Bug#1039862: bookworm-pu: cpdb-libs/1.2.0-2+deb12u1

2023-06-30 Thread Thorsten Alteholz




On Thu, 29 Jun 2023, Jonathan Wiltshire wrote:


Please go ahead.


Great, thanks ...

... and uploaded.

  Thorsten



Bug#1039040: bullseye-pu: cups/2.3.3op2-3+deb11u3

2023-06-28 Thread Thorsten Alteholz




On Mon, 26 Jun 2023, Jonathan Wiltshire wrote:

Please go ahead.


Great, thanks ...

... and uploaded.

  Thorsten



Bug#1039862: bookworm-pu: cpdb-libs/1.2.0-2+deb12u1

2023-06-28 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cpdb-libs fixes CVE-2023-34095 Bookworm. This CVE 
has been marked as no-dsa by the security team.


The fix just restricts the usable buffer and should have no side effects.

  Thorsten
diff -Nru cpdb-libs-1.2.0/debian/changelog cpdb-libs-1.2.0/debian/changelog
--- cpdb-libs-1.2.0/debian/changelog2023-01-12 22:03:02.0 +0100
+++ cpdb-libs-1.2.0/debian/changelog2023-06-27 22:03:02.0 +0200
@@ -1,3 +1,10 @@
+cpdb-libs (1.2.0-2+deb12u1) bookworm; urgency=medium
+
+  * CVE-2023-34095 (Closes: #1038253)
+buffer overflow via improper use of scanf()/fscanf()
+
+ -- Thorsten Alteholz   Tue, 27 Jun 2023 22:03:02 +0200
+
 cpdb-libs (1.2.0-2) unstable; urgency=medium
 
   * source upload
diff -Nru cpdb-libs-1.2.0/debian/patches/CVE-2023-34095.patch 
cpdb-libs-1.2.0/debian/patches/CVE-2023-34095.patch
--- cpdb-libs-1.2.0/debian/patches/CVE-2023-34095.patch 1970-01-01 
01:00:00.0 +0100
+++ cpdb-libs-1.2.0/debian/patches/CVE-2023-34095.patch 2023-06-27 
22:03:02.0 +0200
@@ -0,0 +1,161 @@
+Description: backported fix for CVE-2023-34095
+Index: cpdb-libs/demo/print_frontend.c
+===
+--- cpdb-libs.orig/demo/print_frontend.c   2023-06-28 06:57:31.699739106 
+0200
 cpdb-libs/demo/print_frontend.c2023-06-28 08:01:19.416613086 +0200
+@@ -48,7 +48,7 @@
+ {
+ printf("> ");
+ fflush(stdout);
+-scanf("%s", buf);
++scanf("%99s", buf);
+ if (strcmp(buf, "stop") == 0)
+ {
+ disconnect_from_dbus(f);
+@@ -84,7 +84,7 @@
+ {
+ char printer_id[100];
+ char backend_name[100];
+-scanf("%s%s", printer_id, backend_name);
++scanf("%99s%99s", printer_id, backend_name);
+ g_message("Getting all attributes ..\n");
+ PrinterObj *p = find_PrinterObj(f, printer_id, backend_name);
+ 
+@@ -106,7 +106,7 @@
+ else if (strcmp(buf, "get-default") == 0)
+ {
+ char printer_id[100], backend_name[100], option_name[100];
+-scanf("%s%s%s", option_name, printer_id, backend_name);
++scanf("%99s%99s%99s", option_name, printer_id, backend_name);
+ PrinterObj *p = find_PrinterObj(f, printer_id, backend_name);
+ char *ans = get_default(p, option_name);
+ if (!ans)
+@@ -117,7 +117,7 @@
+ else if (strcmp(buf, "get-setting") == 0)
+ {
+ char printer_id[100], backend_name[100], setting_name[100];
+-scanf("%s%s%s", setting_name, printer_id, backend_name);
++scanf("%99s%99s%99s", setting_name, printer_id, backend_name);
+ PrinterObj *p = find_PrinterObj(f, printer_id, backend_name);
+ char *ans = get_setting(p, setting_name);
+ if (!ans)
+@@ -128,7 +128,7 @@
+ else if (strcmp(buf, "get-current") == 0)
+ {
+ char printer_id[100], backend_name[100], option_name[100];
+-scanf("%s%s%s", option_name, printer_id, backend_name);
++scanf("%99s%99s%99s", option_name, printer_id, backend_name);
+ PrinterObj *p = find_PrinterObj(f, printer_id, backend_name);
+ char *ans = get_current(p, option_name);
+ if (!ans)
+@@ -139,7 +139,7 @@
+ else if (strcmp(buf, "add-setting") == 0)
+ {
+ char printer_id[100], backend_name[100], option_name[100], 
option_val[100];
+-scanf("%s %s %s %s", option_name, option_val, printer_id, 
backend_name);
++scanf("%99s %99s %99s %99s", option_name, option_val, printer_id, 
backend_name);
+ PrinterObj *p = find_PrinterObj(f, printer_id, backend_name);
+ printf("%s : %s\n", option_name, option_val);
+ add_setting_to_printer(p, get_string_copy(option_name), 
get_string_copy(option_val));
+@@ -147,7 +147,7 @@
+ else if (strcmp(buf, "clear-setting") == 0)
+ {
+ char printer_id[100], backend_name[100], option_name[100];
+-scanf("%s%s%s", option_name, printer_id, backend_name);
++scanf("%99s%99s%99s", option_name, printer_id, backend_name);
+ PrinterObj *p = find_PrinterObj(f, printer_id, backend_name);
+ clear_setting_from_printer(p, option_name);
+ }
+@@ -155,7 +155,7 @@
+ {
+ char printer_id[100];
+ char backend_name[100];
+-scanf("%s%s", printer_id, backend_name);
++scanf("%99s%99s", printer_id, backend_name);
+  

Bug#1039026: bookworm-pu: cups/2.4.2-3+deb12u1

2023-06-28 Thread Thorsten Alteholz




On Sun, 25 Jun 2023, Jonathan Wiltshire wrote:


Please go ahead.


Great, thanks ...

... and uploaded.

  Thorsten



Bug#1039040: bullseye-pu: cups/2.3.3op2-3+deb11u3

2023-06-24 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2023-32324 and CVE-2023-34241 in 
Bullseye. Both CVE have been marked as no-dsa by the security team.


The same fixes have been already uploaded to Unstable and nobody 
complained yet.


  Thorsten
diff -Nru cups-2.3.3op2/debian/changelog cups-2.3.3op2/debian/changelog
--- cups-2.3.3op2/debian/changelog  2022-05-23 22:03:02.0 +0200
+++ cups-2.3.3op2/debian/changelog  2023-06-24 10:54:05.0 +0200
@@ -1,3 +1,14 @@
+cups (2.3.3op2-3+deb11u3) bullseye; urgency=medium
+
+  * CVE-2023-34241 (Closes: #1038885)
+use-after-free in cupsdAcceptClient()
+
+  * CVE-2023-32324
+A heap buffer overflow vulnerability would allow a remote attacker to 
+lauch a dos attack.
+
+ -- Thorsten Alteholz   Sat, 24 Jun 2023 10:54:05 +0200
+
 cups (2.3.3op2-3+deb11u2) bullseye-security; urgency=high
 
   * CVE-2022-26691
diff -Nru cups-2.3.3op2/debian/patches/0017-CVE-2023-32324.patch 
cups-2.3.3op2/debian/patches/0017-CVE-2023-32324.patch
--- cups-2.3.3op2/debian/patches/0017-CVE-2023-32324.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0017-CVE-2023-32324.patch  2023-06-24 
10:54:05.0 +0200
@@ -0,0 +1,29 @@
+From: Thorsten Alteholz 
+Date: Wed, 31 May 2023 23:20:58 +0200
+Subject: CVE-2023-32324
+
+---
+ cups/string.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/cups/string.c b/cups/string.c
+index 93cdad1..1f81d60 100644
+--- a/cups/string.c
 b/cups/string.c
+@@ -1,6 +1,7 @@
+ /*
+  * String functions for CUPS.
+  *
++ * Copyright © 2023 by OpenPrinting.
+  * Copyright © 2007-2019 by Apple Inc.
+  * Copyright © 1997-2007 by Easy Software Products.
+  *
+@@ -729,6 +730,8 @@ _cups_strlcpy(char   *dst, /* O - 
Destination string */
+ {
+   size_t  srclen; /* Length of source string */
+ 
++  if (size == 0)
++return (0);
+ 
+  /*
+   * Figure out how much room is needed...
diff -Nru cups-2.3.3op2/debian/patches/0018-CVE-2023-34241.patch 
cups-2.3.3op2/debian/patches/0018-CVE-2023-34241.patch
--- cups-2.3.3op2/debian/patches/0018-CVE-2023-34241.patch  1970-01-01 
01:00:00.0 +0100
+++ cups-2.3.3op2/debian/patches/0018-CVE-2023-34241.patch  2023-06-24 
10:54:05.0 +0200
@@ -0,0 +1,57 @@
+From: Thorsten Alteholz 
+Date: Sat, 24 Jun 2023 19:51:21 +0200
+Subject: CVE-2023-34241
+
+---
+ scheduler/client.c | 16 +++-
+ 1 file changed, 7 insertions(+), 9 deletions(-)
+
+diff --git a/scheduler/client.c b/scheduler/client.c
+index 9730eea..48e19b9 100644
+--- a/scheduler/client.c
 b/scheduler/client.c
+@@ -192,13 +192,11 @@ cupsdAcceptClient(cupsd_listener_t *lis)/* I - Listener 
socket */
+/*
+ * Can't have an unresolved IP address with double-lookups enabled...
+ */
+-
+-httpClose(con->http);
+-
+ cupsdLogClient(con, CUPSD_LOG_WARN,
+-"Name lookup failed - connection from %s closed!",
++"Name lookup failed - closing connection from %s!",
+ httpGetHostname(con->http, NULL, 0));
+ 
++httpClose(con->http);
+ free(con);
+ return;
+   }
+@@ -234,11 +232,11 @@ cupsdAcceptClient(cupsd_listener_t *lis)/* I - Listener 
socket */
+   * with double-lookups enabled...
+   */
+ 
+-  httpClose(con->http);
+-
+   cupsdLogClient(con, CUPSD_LOG_WARN,
+-  "IP lookup failed - connection from %s closed!",
++  "IP lookup failed - closing connection from %s!",
+   httpGetHostname(con->http, NULL, 0));
++
++  httpClose(con->http);
+   free(con);
+   return;
+ }
+@@ -255,11 +253,11 @@ cupsdAcceptClient(cupsd_listener_t *lis)/* I - Listener 
socket */
+ 
+   if (!hosts_access(_req))
+   {
+-httpClose(con->http);
+-
+ cupsdLogClient(con, CUPSD_LOG_WARN,
+ "Connection from %s refused by /etc/hosts.allow and "
+   "/etc/hosts.deny rules.", httpGetHostname(con->http, NULL, 
0));
++
++httpClose(con->http);
+ free(con);
+ return;
+   }
diff -Nru cups-2.3.3op2/debian/patches/series 
cups-2.3.3op2/debian/patches/series
--- cups-2.3.3op2/debian/patches/series 2022-05-23 22:03:02.0 +0200
+++ cups-2.3.3op2/debian/patches/series 2023-06-24 10:54:05.0 +0200
@@ -14,3 +14,5 @@
 0014-Debian-Reproducibility-Run-testlang-for-each-provide.patch
 0015-Debian-po4a-infrastructure-and-translations-for-manp.patch
 0016-Fix-certificate-comparison-CVE-2022-26691.patch
+0017-CVE-2023-32324.patch
+0018-CVE-2023-34241.patch


Bug#1039026: bookworm-pu: cups/2.4.2-3+deb12u1

2023-06-24 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2023-32324 and CVE-2023-34241 in 
Bookworm. Both CVE have been marked as no-dsa by the security team.


The same fixes have been already uploaded to Unstable and nobody 
complained yet.


  Thorsten
diff -Nru cups-2.4.2/debian/changelog cups-2.4.2/debian/changelog
--- cups-2.4.2/debian/changelog 2023-03-26 10:54:05.0 +0200
+++ cups-2.4.2/debian/changelog 2023-06-24 10:54:05.0 +0200
@@ -1,3 +1,14 @@
+cups (2.4.2-3+deb12u1) bookworm; urgency=medium
+
+  * CVE-2023-34241 (Closes: #1038885)
+use-after-free in cupsdAcceptClient()
+
+  * CVE-2023-32324
+A heap buffer overflow vulnerability would allow a remote attacker to 
+lauch a dos attack.
+
+ -- Thorsten Alteholz   Sat, 24 Jun 2023 10:54:05 +0200
+
 cups (2.4.2-3) unstable; urgency=medium
 
   [ Helge Kreutzmann ]
diff -Nru cups-2.4.2/debian/patches/0013-CVE-2023-32324.patch 
cups-2.4.2/debian/patches/0013-CVE-2023-32324.patch
--- cups-2.4.2/debian/patches/0013-CVE-2023-32324.patch 1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0013-CVE-2023-32324.patch 2023-06-24 
10:54:05.0 +0200
@@ -0,0 +1,29 @@
+From: Thorsten Alteholz 
+Date: Sat, 24 Jun 2023 11:06:49 +0200
+Subject: CVE-2023-32324
+
+---
+ cups/string.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/cups/string.c b/cups/string.c
+index 93cdad1..1f81d60 100644
+--- a/cups/string.c
 b/cups/string.c
+@@ -1,6 +1,7 @@
+ /*
+  * String functions for CUPS.
+  *
++ * Copyright © 2023 by OpenPrinting.
+  * Copyright © 2007-2019 by Apple Inc.
+  * Copyright © 1997-2007 by Easy Software Products.
+  *
+@@ -729,6 +730,8 @@ _cups_strlcpy(char   *dst, /* O - 
Destination string */
+ {
+   size_t  srclen; /* Length of source string */
+ 
++  if (size == 0)
++return (0);
+ 
+  /*
+   * Figure out how much room is needed...
diff -Nru cups-2.4.2/debian/patches/0014-CVE-2023-34241.patch 
cups-2.4.2/debian/patches/0014-CVE-2023-34241.patch
--- cups-2.4.2/debian/patches/0014-CVE-2023-34241.patch 1970-01-01 
01:00:00.0 +0100
+++ cups-2.4.2/debian/patches/0014-CVE-2023-34241.patch 2023-06-24 
10:54:05.0 +0200
@@ -0,0 +1,57 @@
+From: Thorsten Alteholz 
+Date: Sat, 24 Jun 2023 11:07:10 +0200
+Subject: CVE-2023-34241
+
+---
+ scheduler/client.c | 16 +++-
+ 1 file changed, 7 insertions(+), 9 deletions(-)
+
+diff --git a/scheduler/client.c b/scheduler/client.c
+index e7e419f..441c1d7 100644
+--- a/scheduler/client.c
 b/scheduler/client.c
+@@ -193,13 +193,11 @@ cupsdAcceptClient(cupsd_listener_t *lis)/* I - Listener 
socket */
+/*
+ * Can't have an unresolved IP address with double-lookups enabled...
+ */
+-
+-httpClose(con->http);
+-
+ cupsdLogClient(con, CUPSD_LOG_WARN,
+-"Name lookup failed - connection from %s closed!",
++"Name lookup failed - closing connection from %s!",
+ httpGetHostname(con->http, NULL, 0));
+ 
++httpClose(con->http);
+ free(con);
+ return;
+   }
+@@ -235,11 +233,11 @@ cupsdAcceptClient(cupsd_listener_t *lis)/* I - Listener 
socket */
+   * with double-lookups enabled...
+   */
+ 
+-  httpClose(con->http);
+-
+   cupsdLogClient(con, CUPSD_LOG_WARN,
+-  "IP lookup failed - connection from %s closed!",
++  "IP lookup failed - closing connection from %s!",
+   httpGetHostname(con->http, NULL, 0));
++
++  httpClose(con->http);
+   free(con);
+   return;
+ }
+@@ -256,11 +254,11 @@ cupsdAcceptClient(cupsd_listener_t *lis)/* I - Listener 
socket */
+ 
+   if (!hosts_access(_req))
+   {
+-httpClose(con->http);
+-
+ cupsdLogClient(con, CUPSD_LOG_WARN,
+ "Connection from %s refused by /etc/hosts.allow and "
+   "/etc/hosts.deny rules.", httpGetHostname(con->http, NULL, 
0));
++
++httpClose(con->http);
+ free(con);
+ return;
+   }
diff -Nru cups-2.4.2/debian/patches/series cups-2.4.2/debian/patches/series
--- cups-2.4.2/debian/patches/series2023-03-26 10:54:05.0 +0200
+++ cups-2.4.2/debian/patches/series2023-06-24 10:54:05.0 +0200
@@ -10,3 +10,5 @@
 0015-Debian-Reproducibility-Do-not-run-stp-tests-as-root.patch
 0016-Debian-po4a-infrastructure-and-translations-for-manp.patch
 0012-add-pt.patch
+0013-CVE-2023-32324.patch
+0014-CVE-2023-34241.patch


Bug#1036749: unblock: udm/1.0.0.322-4

2023-05-25 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package udm

[ Reason ]
Due to a recent change in lazarus, the package could no longer be built.

[ Impact ]
The user would not be able to build the package.

[ Tests ]
As there is no code change but only a changed debian/rules file, no new 
tests are added.


[ Risks ]
As there is no code change, the risk should be low for this leaf package.


[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock udm/1.0.0.322-4
diff -Nru udm-1.0.0.322/debian/changelog udm-1.0.0.322/debian/changelog
--- udm-1.0.0.322/debian/changelog  2023-02-06 22:43:07.0 +0100
+++ udm-1.0.0.322/debian/changelog  2023-05-23 17:43:07.0 +0200
@@ -1,3 +1,11 @@
+udm (1.0.0.322-4) unstable; urgency=medium
+
+  * fix FTBFS (due to upload of new version of lazarus)
+(the solution leaves room for improvement)
+(Closes: #1036257)
+
+ -- Thorsten Alteholz   Tue, 23 May 2023 17:43:07 +0200
+
 udm (1.0.0.322-3) unstable; urgency=medium
 
   * add patch to use correct path for file installation
diff -Nru udm-1.0.0.322/debian/rules udm-1.0.0.322/debian/rules
--- udm-1.0.0.322/debian/rules  2023-02-06 12:27:35.0 +0100
+++ udm-1.0.0.322/debian/rules  2023-05-23 13:48:12.0 +0200
@@ -15,56 +15,56 @@
mkdir $(HOME)
echo "#INCLUDE /etc/fpc.cfg" > $(HOME)/.fpc.cfg
echo "-dLCLGTK2" >> $(HOME)/.fpc.cfg
-   echo "-Fu/usr/lib/lazarus/2.2.4/components/lazutils/lib/x86_64-linux" 
>> $(HOME)/.fpc.cfg
-   echo "-Fu/usr/lib/lazarus/2.2.4/packager/units/x86_64-linux" >> 
$(HOME)/.fpc.cfg
-   echo "-Fu/usr/lib/lazarus/2.2.4/lcl/units/x86_64-linux" >> 
$(HOME)/.fpc.cfg
-   echo 
"-Fu/usr/lib/lazarus/2.2.4/components/ideintf/units/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
-   echo 
"-Fu/usr/lib/lazarus/2.2.4/components/lazcontrols/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
-   echo 
"-Fu/usr/lib/lazarus/2.2.4/components/synedit/units/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
-   echo 
"-Fu/usr/lib/lazarus/2.2.4/components/tachart/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
-   echo 
"-Fu/usr/lib/lazarus/2.2.4/components/printers/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
-   echo 
"-Fu/usr/lib/lazarus/2.2.4/components/cairocanvas/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
-   echo "-Fu/usr/lib/lazarus/2.2.4/lcl/units/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo "-Fu/usr/lib/lazarus/2.2.6/components/lazutils/lib/x86_64-linux" 
>> $(HOME)/.fpc.cfg
+   echo "-Fu/usr/lib/lazarus/2.2.6/packager/units/x86_64-linux" >> 
$(HOME)/.fpc.cfg
+   echo "-Fu/usr/lib/lazarus/2.2.6/lcl/units/x86_64-linux" >> 
$(HOME)/.fpc.cfg
+   echo 
"-Fu/usr/lib/lazarus/2.2.6/components/ideintf/units/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo 
"-Fu/usr/lib/lazarus/2.2.6/components/lazcontrols/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo 
"-Fu/usr/lib/lazarus/2.2.6/components/synedit/units/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo 
"-Fu/usr/lib/lazarus/2.2.6/components/tachart/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo 
"-Fu/usr/lib/lazarus/2.2.6/components/printers/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo 
"-Fu/usr/lib/lazarus/2.2.6/components/cairocanvas/lib/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg
+   echo "-Fu/usr/lib/lazarus/2.2.6/lcl/units/x86_64-linux/gtk2/" >> 
$(HOME)/.fpc.cfg

-   ln -s /usr/lib/lazarus/2.2.4/components/freetype/ttcalc4.inc
-   ln -s /usr/lib/lazarus/2.2.4/components/freetype/ttconfig.inc
-   ln -s /usr/lib/lazarus/2.2.4/components/freetype/ttraster_sweep.inc
+   ln -s /usr/lib/lazarus/2.2.6/components/freetype/ttcalc4.inc
+   ln -s /usr/lib/lazarus/2.2.6/components/freetype/ttconfig.inc
+   ln -s /usr/lib/lazarus/2.2.6/components/freetype/ttraster_sweep.inc

-   ln -s /usr/lib/lazarus/2.2.4/components/opengl/openglcontext.res
+   ln -s /usr/lib/lazarus/2.2.6/components/opengl/openglcontext.res

-   ln -s /usr/lib/lazarus/2.2.4/components/buildintf/ideoptionsintf.pas
-   ln -s /usr/lib/lazarus/2.2.4/components/buildintf/baseideintf.pas
-   ln -s /usr/lib/lazarus/2.2.4/components/buildintf/macrointf.pas
-   ln -s /usr/lib/lazarus/2.2.4/components/buildintf/macrodefintf.pas
-   ln -s /usr/lib/lazarus/2.2.4/components/buildintf/compoptsintf.pas
-   ln -s /usr/lib/lazarus/2.2.4/components/buildintf/projectin

Bug#1036748: unblock: libricohcamerasdk/1.1.0-4

2023-05-25 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libricohcamerasdk

[ Reason ]
Due to some magic in debhelper/ldconfig a link to nowhere remained on the 
computer.

This link will be removed in postinst/postrm now.

[ Impact ]
The user will keep a link to a non existing file on his computer.

[ Tests ]
As there is no code change, no new test was added.

[ Risks ]
There should be no risks for this leaf package in non-free.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock libricohcamerasdk/1.1.0-4
diff -Nru libricohcamerasdk-1.1.0/debian/changelog 
libricohcamerasdk-1.1.0/debian/changelog
--- libricohcamerasdk-1.1.0/debian/changelog2022-05-18 23:30:36.0 
+0200
+++ libricohcamerasdk-1.1.0/debian/changelog2023-05-18 11:30:36.0 
+0200
@@ -1,3 +1,10 @@
+libricohcamerasdk (1.1.0-4) unstable; urgency=medium
+
+  * add postrm/postinst script to remove bad link
+(Closes: #1035795)
+
+ -- Thorsten Alteholz   Thu, 18 May 2023 11:30:36 +0200
+
 libricohcamerasdk (1.1.0-3) unstable; urgency=medium
 
   * manual build on: amd64 armhf
diff -Nru libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postinst 
libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postinst
--- libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postinst   1970-01-01 
01:00:00.0 +0100
+++ libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postinst   2023-05-18 
11:30:36.0 +0200
@@ -0,0 +1,33 @@
+#!/bin/sh
+
+set +e
+
+linkfile=$(ls -1 /usr/lib/*/libRicohCameraSDKCpp.so 2> /dev/null)
+readlinkfile=""
+if [ ! -z "$linkfile" ]; then
+  readlinkfile=$(readlink $linkfile 2> /dev/null)
+fi
+
+set -e
+
+case "$1" in
+configure)
+   # we shall not have a link from libRicohCameraSDKCpp.so to 
libRicohCameraSDKCpp.so.1.1.0
+   if [ -L "$linkfile" ]; then
+   if [ "$readlinkfile" = "libRicohCameraSDKCpp.so.1.1.0" ]; then
+   echo "D: wrong link detected, remove it again"
+   rm $linkfile
+   fi
+   fi
+   ;;
+abort-upgrade|abort-remove|abort-deconfigure)
+   ;;
+*)
+echo "postinst called with unknown argument \`$1'" >&2
+exit 1
+;;
+esac
+
+#DEBHELPER#
+
+exit 0
diff -Nru libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postrm 
libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postrm
--- libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postrm 1970-01-01 
01:00:00.0 +0100
+++ libricohcamerasdk-1.1.0/debian/libricohcamerasdk.postrm 2023-05-18 
11:30:36.0 +0200
@@ -0,0 +1,34 @@
+#!/bin/sh
+
+set +e
+
+linkfile=$(ls -1 /usr/lib/*/libRicohCameraSDKCpp.so 2> /dev/null)
+readlinkfile="" 
+if [ ! -z "$linkfile" ]; then
+  readlinkfile=$(readlink $linkfile 2> /dev/null)
+fi
+
+set -e
+
+
+case "$1" in
+purge|remove)
+   # we shall not have a link from libRicohCameraSDKCpp.so to 
libRicohCameraSDKCpp.so.1.1.0
+   if [ -L "$linkfile" ]; then
+   if [ "$readlinkfile" = "libRicohCameraSDKCpp.so.1.1.0" ]; then
+   echo "D: wrong link detected, remove it again"
+   rm $linkfile
+   fi
+   fi
+   ;;
+upgrade|failed-upgrade)
+   ;;
+*)
+   echo "postrm called with unknown argument \`$1'" >&2
+exit 1
+   ;;
+esac
+
+#DEBHELPER#
+
+exit 0


Bug#1036747: unblock: osmo-iuh/1.3.0+dfsg1-5

2023-05-25 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package osmo-iuh

[ Reason ]
The current version has a superficial autopkgtest that failed.
The new version still has a superficial autopkgtest but this
no longer fails.

[ Impact ]
Everywhere a autopkgtest of the package is required, a failure would be 
shown for this package.


[ Tests ]
This is only a change in the autopkgtests.

[ Risks ]
As there is no code change, there should be no risk.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock osmo-iuh/1.3.0+dfsg1-5
diff -Nru osmo-iuh-1.3.0+dfsg1/debian/changelog 
osmo-iuh-1.3.0+dfsg1/debian/changelog
--- osmo-iuh-1.3.0+dfsg1/debian/changelog   2022-10-13 22:23:21.0 
+0200
+++ osmo-iuh-1.3.0+dfsg1/debian/changelog   2023-05-22 23:23:21.0 
+0200
@@ -1,3 +1,20 @@
+osmo-iuh (1.3.0+dfsg1-5) unstable; urgency=medium
+
+  * really "fix" autopkgtest
+at the moment there is no binary in the binary packages available
+so make the superficial test a bit more superficial
+
+ -- Thorsten Alteholz   Mon, 22 May 2023 23:23:21 +0200
+
+osmo-iuh (1.3.0+dfsg1-4) unstable; urgency=medium
+
+  * "fix" autopkgtest
+at the moment there is no binary in the binary packages available
+so make the superficial test a bit more superficial
+(Closes: #1033823)
+
+ -- Thorsten Alteholz   Thu, 18 May 2023 13:23:21 +0200
+
 osmo-iuh (1.3.0+dfsg1-3) unstable; urgency=medium
 
   * upload to unstable
diff -Nru osmo-iuh-1.3.0+dfsg1/debian/tests/can-show-help 
osmo-iuh-1.3.0+dfsg1/debian/tests/can-show-help
--- osmo-iuh-1.3.0+dfsg1/debian/tests/can-show-help 2022-10-13 
22:23:21.0 +0200
+++ osmo-iuh-1.3.0+dfsg1/debian/tests/can-show-help 2023-05-22 
23:23:21.0 +0200
@@ -2,5 +2,7 @@
 
 set -e
 
-osmo-hnbgw -h
+# at the moment there is no binary in the binary packages available
+# so make the superficial test a bit more superficial
+#osmo-hnbgw -h
 echo "run: OK"
diff -Nru osmo-iuh-1.3.0+dfsg1/debian/tests/control 
osmo-iuh-1.3.0+dfsg1/debian/tests/control
--- osmo-iuh-1.3.0+dfsg1/debian/tests/control   2022-10-13 22:23:21.0 
+0200
+++ osmo-iuh-1.3.0+dfsg1/debian/tests/control   2023-05-22 23:23:21.0 
+0200
@@ -1,4 +1,4 @@
 Tests: can-show-help
-Depends: osmo-hnbgw
+#Depends: osmo-hnbgw
 Restrictions: superficial
 


Bug#1036595: unblock: lprint/1.1.0-3

2023-05-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package lprint

[ Reason ]
The service file was installed to the wrong directory.

[ Impact ]
The service now is at a location that it can not be used by systemd.

[ Tests ]
There was no code change, so no test was done.

[ Risks ]
The package is a leaf package and the risk should be low.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock lprint/1.1.0-3
diff -Nru lprint-1.1.0/debian/changelog lprint-1.1.0/debian/changelog
--- lprint-1.1.0/debian/changelog   2023-02-24 22:17:35.0 +0100
+++ lprint-1.1.0/debian/changelog   2023-03-22 18:17:35.0 +0100
@@ -1,3 +1,10 @@
+lprint (1.1.0-3) unstable; urgency=medium
+
+  * move service file to correct dir
+(Closes: #1036022, #1036178, #1035601)
+
+ -- Thorsten Alteholz   Mon, 22 Mar 2023 19:17:35 +0200
+
 lprint (1.1.0-2) unstable; urgency=medium
 
   * add patch to use /usr/bin instead of /usr/local/bin in service file
diff -Nru 
lprint-1.1.0/debian/patches/0004-move-service-file-to-better-directory.patch 
lprint-1.1.0/debian/patches/0004-move-service-file-to-better-directory.patch
--- 
lprint-1.1.0/debian/patches/0004-move-service-file-to-better-directory.patch
1970-01-01 01:00:00.0 +0100
+++ 
lprint-1.1.0/debian/patches/0004-move-service-file-to-better-directory.patch
2023-03-22 18:17:35.0 +0100
@@ -0,0 +1,25 @@
+From: Thorsten Alteholz 
+Date: Mon, 22 May 2023 23:59:38 +0200
+Subject: move service file to better directory
+
+---
+ Makefile.in | 6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/Makefile.in b/Makefile.in
+index f5108e0..965253a 100644
+--- a/Makefile.in
 b/Makefile.in
+@@ -130,9 +130,9 @@ install:   all
+   $(INSTALL) -d -m 755 $(BUILDROOT)/Library/LaunchDaemons; \
+   $(INSTALL) -c -m 644 org.msweet.lprint.plist 
$(BUILDROOT)/Library/LaunchDaemons; \
+   else \
+-  echo "Installing systemd service to 
$(BUILDROOT)$(sysconfdir)/systemd/system..."; \
+-  $(INSTALL) -d -m 755 $(BUILDROOT)$(sysconfdir)/systemd/system; \
+-  $(INSTALL) -c -m 644 lprint.service 
$(BUILDROOT)$(libdir)/systemd/system; \
++  echo "Installing systemd service to 
$(BUILDROOT)/lib/systemd/system..."; \
++  $(INSTALL) -d -m 755 $(BUILDROOT)/lib/systemd/system; \
++  $(INSTALL) -c -m 644 lprint.service 
$(BUILDROOT)/lib/systemd/system; \
+   fi
+ 
+ 
diff -Nru lprint-1.1.0/debian/patches/series lprint-1.1.0/debian/patches/series
--- lprint-1.1.0/debian/patches/series  2023-02-24 22:17:35.0 +0100
+++ lprint-1.1.0/debian/patches/series  2023-03-22 18:17:35.0 +0100
@@ -1,3 +1,4 @@
 0001-Let-compilation-be-verbose-not-silent.patch
 0002-let-service-file-point-to-usr-bin-instead-of-usr-loc.patch
 0003-put-service-file-into-libdir.patch
+0004-move-service-file-to-better-directory.patch


Bug#1036548: unblock: cups-filters/1.28.17-3

2023-05-22 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock and age package cups-filters

[ Reason ]
CVE-2023-24805 (RCE due to missing input sanitising)

[ Impact ]
The user would be vulnerable to remote code execution.

[ Tests ]
There is no special test for this patch, only a POC that no
longer worked after applying the patch.

[ Risks ]
The patch was provided by upstream and approved by the security team
(upload to Bullseye already done).

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock cups-filters/1.28.17-3diff -Nru cups-filters-1.28.17/debian/changelog 
cups-filters-1.28.17/debian/changelog
--- cups-filters-1.28.17/debian/changelog   2023-03-10 19:25:20.0 
+0100
+++ cups-filters-1.28.17/debian/changelog   2023-05-19 18:25:20.0 
+0200
@@ -1,3 +1,14 @@
+cups-filters (1.28.17-3) unstable; urgency=medium
+
+  * CVE-2023-24805 
+prevent arbitrary command execution by escaping the quoting
+of the arguments in a job with a forged job title
+more information are available in the commit message at:
+https://github.com/OpenPrinting/cups-filters/commit/93e60d3df35
+(Closes: #1036224)
+
+ -- Thorsten Alteholz   Fri, 19 May 2023 18:25:20 +0200
+
 cups-filters (1.28.17-2) unstable; urgency=medium
 
   * qpdf needs at least c++17
diff -Nru cups-filters-1.28.17/debian/patches/0003-fix-CVE-2023-24805.patch 
cups-filters-1.28.17/debian/patches/0003-fix-CVE-2023-24805.patch
--- cups-filters-1.28.17/debian/patches/0003-fix-CVE-2023-24805.patch   
1970-01-01 01:00:00.0 +0100
+++ cups-filters-1.28.17/debian/patches/0003-fix-CVE-2023-24805.patch   
2023-05-19 10:50:03.0 +0200
@@ -0,0 +1,176 @@
+From: Thorsten Alteholz 
+Date: Fri, 19 May 2023 10:49:35 +0200
+Subject: fix CVE-2023-24805
+
+---
+ backend/beh.c | 107 +-
+ 1 file changed, 84 insertions(+), 23 deletions(-)
+
+diff --git a/backend/beh.c b/backend/beh.c
+index 225fd27..8d51235 100644
+--- a/backend/beh.c
 b/backend/beh.c
+@@ -22,12 +22,13 @@
+ #include "backend-private.h"
+ #include 
+ #include 
++#include 
+ 
+ /*
+  * Local globals...
+  */
+ 
+-static intjob_canceled = 0; /* Set to 1 on SIGTERM */
++static volatile int   job_canceled = 0; /* Set to 1 on SIGTERM */
+ 
+ /*
+  * Local functions...
+@@ -213,21 +214,40 @@ call_backend(char *uri, /* I - URI of 
final destination */
+char **argv,   /* I - Command-line arguments */
+char *filename) {  /* I - File name of input data */
+   const char  *cups_serverbin;/* Location of programs */
++  char  *backend_argv[8]; /* Arguments for backend */
+   charscheme[1024],   /* Scheme from URI */
+ *ptr, /* Pointer into scheme */
+-  cmdline[65536]; /* Backend command line */
+-  int   retval;
++  backend_path[2048]; /* Backend path */
++  int   pid = 0,  /* Process ID of backend */
++wait_pid, /* Process ID from wait() */
++wait_status,  /* Status from child */
++retval = 0;
++  int   bytes;
+ 
+  /*
+   * Build the backend command line...
+   */
+ 
+-  strncpy(scheme, uri, sizeof(scheme) - 1);
+-  if (strlen(uri) > 1023)
+-scheme[1023] = '\0';
++  scheme[0] = '\0';
++  strncat(scheme, uri, sizeof(scheme) - 1);
+   if ((ptr = strchr(scheme, ':')) != NULL)
+ *ptr = '\0';
+-
++  else {
++fprintf(stderr,
++  "ERROR: beh: Invalid URI, no colon (':') to mark end of scheme 
part.\n");
++exit (CUPS_BACKEND_FAILED);
++  }
++  if (strchr(scheme, '/')) {
++fprintf(stderr,
++  "ERROR: beh: Invalid URI, scheme contains a slash ('/').\n");
++exit (CUPS_BACKEND_FAILED);
++  }
++  if (!strcmp(scheme, ".") || !strcmp(scheme, "..")) {
++fprintf(stderr,
++  "ERROR: beh: Invalid URI, scheme (\"%s\") is a directory.\n",
++  scheme);
++exit (CUPS_BACKEND_FAILED);
++  }
+   if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
+ cups_serverbin = CUPS_SERVERBIN;
+ 
+@@ -235,16 +255,29 @@ call_backend(char *uri, /* I - URI of 
final destination */
+ fprintf(stderr,
+   "ERROR: beh: Direct output into a file not supported.\n");
+ exit (CUPS_BACKEND_FAILED);
+-  } else
+-snprintf(cmdline, sizeof(cmdline),
+-   "%s/backend/%s '%s' '%s' '%s' '%s' '%s' %s",
+-   cups_serverbin, scheme, argv[1], argv[2], argv[3],
+-   /* Apply number of copies only if beh was called with a
+-  file name and not

Bug#1036119: unblock: meep-mpi-default/1.25.0-2

2023-05-15 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package meep-mpi-default

[ Reason ]
There was a Conflict: missing for the python3-meep-mpi-default package.

[ Impact ]
The user gets an error message when trying to switch from meep-mpi-default 
to for example meep-openmpi.


[ Tests ]
none

[ Risks ]
There is no code change but only a change in the Debian metadata.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock meep-mpi-default/1.25.0-2
diff -Nru meep-mpi-default-1.25.0/debian/changelog 
meep-mpi-default-1.25.0/debian/changelog
--- meep-mpi-default-1.25.0/debian/changelog2022-12-07 08:49:17.0 
+0100
+++ meep-mpi-default-1.25.0/debian/changelog2023-05-09 22:49:17.0 
+0200
@@ -1,9 +1,9 @@
-meep-mpi-default (1.25.0-1) unstable; urgency=medium
+meep-mpi-default (1.25.0-2) unstable; urgency=medium
 
-  * New upstream release.
-  * debian/watch: update github watch file
+  * debian/control: also add Conflicts: for python3 packages
+(Closes: #1034954)
 
- -- Thorsten Alteholz   Wed, 07 Dec 2022 08:49:17 +0100
+ -- Thorsten Alteholz   Tue, 09 May 2023 22:49:17 +0200
 
 meep-mpi-default (1.24.0-1) unstable; urgency=medium
 
diff -Nru meep-mpi-default-1.25.0/debian/control 
meep-mpi-default-1.25.0/debian/control
--- meep-mpi-default-1.25.0/debian/control  2022-12-07 08:49:17.0 
+0100
+++ meep-mpi-default-1.25.0/debian/control  2023-05-09 22:49:17.0 
+0200
@@ -197,6 +197,7 @@
 , ${shlibs:Depends}
 , python3-numpy
 , python3
+Conflicts: python3-meep-openmpi, python3-meep
 Description: software package for FDTD simulation with Python
  Meep is a free and open-source software package for electromagnetics
  simulation via the finite-difference time-domain (FDTD) method.


Bug#1036117: unblock: meep/1.25.0-2

2023-05-15 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package meep

[ Reason ]
There was a Conflict: missing for the python3-meep package.

[ Impact ]
The user gets an error message when trying to switch from meep to for 
example meep-openmpi.


[ Tests ]
none

[ Risks ]
There is no code change but only a change in the Debian metadata.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock meep/1.25.0-2
diff -Nru meep-1.25.0/debian/changelog meep-1.25.0/debian/changelog
--- meep-1.25.0/debian/changelog2022-12-07 00:04:02.0 +0100
+++ meep-1.25.0/debian/changelog2023-05-09 22:49:17.0 +0200
@@ -1,3 +1,10 @@
+meep (1.25.0-2) unstable; urgency=medium
+
+  * debian/control: also add Conflicts: for python3 packages
+(Closes: #1034988)
+
+ -- Thorsten Alteholz   Tue, 09 May 2023 22:49:17 +0200
+
 meep (1.25.0-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru meep-1.25.0/debian/control meep-1.25.0/debian/control
--- meep-1.25.0/debian/control  2022-12-07 00:04:02.0 +0100
+++ meep-1.25.0/debian/control  2023-05-09 22:49:17.0 +0200
@@ -203,6 +203,7 @@
, ${shlibs:Depends}
, python3-numpy
, python3
+Conflicts: python3-meep-openmpi, python3-meep-mpi-default
 Description: software package for FDTD simulation with Python
  Meep is a free and open-source software package for electromagnetics
  simulation via the finite-difference time-domain (FDTD) method.


Bug#1036118: unblock: libahp-gt/1.6.1-2

2023-05-15 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libahp-gt

[ Reason ]
There was a missing dependency to the library package within the -dev 
package.


[ Impact ]
There might be a broken symlink on the users system.

[ Tests ]
none

[ Risks ]
There is no code change but only a change in the Debian metadata.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock libahp-gt/1.6.1-2
diff -Nru libahp-gt-1.6.1/debian/changelog libahp-gt-1.6.1/debian/changelog
--- libahp-gt-1.6.1/debian/changelog2023-01-21 12:35:04.0 +0100
+++ libahp-gt-1.6.1/debian/changelog2023-05-08 22:35:04.0 +0200
@@ -1,3 +1,10 @@
+libahp-gt (1.6.1-2) unstable; urgency=medium
+
+  * debian/control: add correct dependencies
+(Closes. #1035448
+
+ -- Thorsten Alteholz   Mon, 08 May 2023 22:35:04 +0200
+
 libahp-gt (1.6.1-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru libahp-gt-1.6.1/debian/control libahp-gt-1.6.1/debian/control
--- libahp-gt-1.6.1/debian/control  2023-01-21 12:34:45.0 +0100
+++ libahp-gt-1.6.1/debian/control  2023-05-08 22:35:04.0 +0200
@@ -25,7 +25,8 @@
 Section: libdevel
 Architecture: any
 Multi-Arch: same
-Depends: ${shlibs:Depends}, ${misc:Depends},
+Depends: ${shlibs:Depends}, ${misc:Depends}
+   , libahp-gt1 (= ${binary:Version})
 Pre-Depends: ${misc:Pre-Depends}
 Description: AHP GT telescope mount controllers programming - development files
  This package contains a library to program the AHP GT telescope mount


Bug#1036116: unblock: meep-openmpi/1.25.0-2

2023-05-15 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package meep-openmpi

[ Reason ]
There was a Conflict: missing for the python3-meep-openmpi package.

[ Impact ]
The user gets an error message when trying to switch from meep-openmpi to 
for example meep-mpi-default.


[ Tests ]
none

[ Risks ]
There is no code change but only a change in the Debian metadata.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock meep-openmpi/1.25.0-2
diff -Nru meep-openmpi-1.25.0/debian/changelog 
meep-openmpi-1.25.0/debian/changelog
--- meep-openmpi-1.25.0/debian/changelog2022-12-07 08:45:00.0 
+0100
+++ meep-openmpi-1.25.0/debian/changelog2023-05-09 22:49:17.0 
+0200
@@ -1,3 +1,10 @@
+meep-openmpi (1.25.0-2) unstable; urgency=medium
+
+  * debian/control: also add Conflicts: for python3 packages
+(Closes: #1035003)
+
+ -- Thorsten Alteholz   Tue, 09 May 2023 22:49:17 +0200
+
 meep-openmpi (1.25.0-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru meep-openmpi-1.25.0/debian/control meep-openmpi-1.25.0/debian/control
--- meep-openmpi-1.25.0/debian/control  2022-12-07 08:45:00.0 +0100
+++ meep-openmpi-1.25.0/debian/control  2023-05-09 22:49:17.0 +0200
@@ -199,6 +199,7 @@
 , ${shlibs:Depends}
 , python3-numpy
 , python3
+Conflicts: python3-meep-mpi-default, python3-meep
 Description: software package for FDTD simulation with Python
  Meep is a free and open-source software package for electromagnetics
  simulation via the finite-difference time-domain (FDTD) method.


Bug#1035084: unblock: planetary-system-stacker/0.8.32~git20221019.66d7558-2

2023-04-29 Thread Thorsten Alteholz

Subject: unblock: planetary-system-stacker/0.8.32~git20221019.66d7558-2
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package planetary-system-stacker

[ Reason ]
Due to a change in numpy, the current version in testing does no longer 
work.

(-> #1034748)

[ Impact ]
The software does not work.

[ Tests ]
After applying the patch, the software starts again and analyses data 
like before.


[ Risks ]
The change is trivial and it is a leaf package without alternatives.

[ Checklist ]
 [x] all changes are documented in the d/changelog
 [x] I reviewed all changes and I approve them
 [x] attach debdiff against the package in testing


unblock planetary-system-stacker/0.8.32~git20221019.66d7558-2

diff -Nru planetary-system-stacker-0.8.32~git20221019.66d7558/debian/changelog 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/changelog
--- planetary-system-stacker-0.8.32~git20221019.66d7558/debian/changelog
2022-12-15 00:35:45.0 +0100
+++ planetary-system-stacker-0.8.32~git20221019.66d7558/debian/changelog
2023-04-23 09:35:45.0 +0200
@@ -1,3 +1,9 @@
+planetary-system-stacker (0.8.32~git20221019.66d7558-2) unstable; 
urgency=medium
+
+  * adapt to new version of numpy (Closes: #1034748)
+
+ -- Thorsten Alteholz   Sun, 23 Apr 2023 09:35:45 +0200
+
 planetary-system-stacker (0.8.32~git20221019.66d7558-1) unstable; 
urgency=medium
 
   * New upstream release.
diff -Nru 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/new-numpy-version.patch
 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/new-numpy-version.patch
--- 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/new-numpy-version.patch
  1970-01-01 01:00:00.0 +0100
+++ 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/new-numpy-version.patch
  2023-04-23 09:35:45.0 +0200
@@ -0,0 +1,17 @@
+Description: due to a recent change in numpy planetary-system-stacker does not 
start anylonger
+ upstream fixes this with versions in setup.py :-(
+Author: Thorsten Alteholz 
+Forwarded: not-needed
+Index: 
planetary-system-stacker-0.8.32~git20221019.66d7558/planetary_system_stacker/stack_frames.py
+===
+--- 
planetary-system-stacker-0.8.32~git20221019.66d7558.orig/planetary_system_stacker/stack_frames.py
  2022-10-19 15:10:13.0 +0200
 
planetary-system-stacker-0.8.32~git20221019.66d7558/planetary_system_stacker/stack_frames.py
   2023-04-22 10:34:56.216304551 +0200
+@@ -30,7 +30,7 @@
+ matplotlib.use('Agg')
+ import matplotlib.pyplot as plt
+ from cv2 import FONT_HERSHEY_SIMPLEX, putText, resize, INTER_CUBIC, 
INTER_LINEAR
+-from numpy import int as np_int
++from numpy import integer as np_int
+ from numpy import ma as np_ma
+ from numpy import zeros, full, empty, float32, newaxis, arange, 
count_nonzero, \
+ sqrt, uint16, clip, minimum, mean
diff -Nru 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/series 
planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/series
--- planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/series   
1970-01-01 01:00:00.0 +0100
+++ planetary-system-stacker-0.8.32~git20221019.66d7558/debian/patches/series   
2023-04-22 10:34:39.0 +0200
@@ -0,0 +1 @@
+new-numpy-version.patch


Bug#1029976: bullseye-pu: libzen/0.4.38-1+deb11u1

2023-04-22 Thread Thorsten Alteholz




On 19.04.23 19:00, Adam D. Barratt wrote:


This got missed for a while due to the typoed suite tag (since fixed).


Oh, thanks for still finding it. I totally forgot this ...


Please go ahead.


... and uploaded.

  Thorsten



Bug#1033759: bullseye-pu: duktape/2.5.0-2+deb11u1

2023-04-16 Thread Thorsten Alteholz




On 01.04.23 20:51, Adam D. Barratt wrote:


Please go ahead.


Great, thanks, ... and done.

   Thorsten



Bug#1033759: bullseye-pu: duktape/2.5.0-2+deb11u1

2023-03-31 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for duktape fixes CVE-2021-46322 in Bullseye. This 
CVE has been marked as no-dsa by thesecurity team.


The same fixes have been already uploaded to Unstable.

  Thorsten
diff -Nru duktape-2.5.0/debian/changelog duktape-2.5.0/debian/changelog
--- duktape-2.5.0/debian/changelog  2020-03-14 16:44:16.0 +0100
+++ duktape-2.5.0/debian/changelog  2023-03-26 14:03:02.0 +0200
@@ -1,3 +1,11 @@
+duktape (2.5.0-2+deb11u1) bullseye; urgency=medium
+
+  * upload by the LTS Team.
+  * CVE-2021-46322
+a SEGV issue was discovered when some stack limits are reached
+
+ -- Thorsten Alteholz   Sun, 26 Mar 2023 14:03:02 +0200
+
 duktape (2.5.0-2) unstable; urgency=medium
 
   * debian/copyright: update file (Closes: #951903)
diff -Nru duktape-2.5.0/debian/patches/CVE-2021-46322.patch 
duktape-2.5.0/debian/patches/CVE-2021-46322.patch
--- duktape-2.5.0/debian/patches/CVE-2021-46322.patch   1970-01-01 
01:00:00.0 +0100
+++ duktape-2.5.0/debian/patches/CVE-2021-46322.patch   2023-03-26 
14:03:02.0 +0200
@@ -0,0 +1,80 @@
+commit a851d8a5687356b1d6ad0f8f39d6226947f17b27
+Author: Sami Vaarala 
+Date:   Tue Jan 11 01:34:02 2022 +0200
+
+Fix segfault in call setup when valstack limit hit
+
+Index: duktape-2.5.0/src-input/duk_js_call.c
+===
+--- duktape-2.5.0.orig/src-input/duk_js_call.c 2023-03-27 19:32:09.275869100 
+0200
 duktape-2.5.0/src-input/duk_js_call.c  2023-03-27 19:32:09.275869100 
+0200
+@@ -2151,6 +2151,15 @@
+   /* [ ... func this arg1 ... argN ] */
+ 
+   /*
++   *  Grow value stack to required size before env setup.  This
++   *  must happen before env setup to handle some corner cases
++   *  correctly, e.g. test-bug-scope-segv-gh2448.js.
++   */
++
++  duk_valstack_grow_check_throw(thr, vs_min_bytes);
++  act->reserve_byteoff = (duk_size_t) ((duk_uint8_t *) thr->valstack_end 
- (duk_uint8_t *) thr->valstack);
++
++  /*
+*  Environment record creation and 'arguments' object creation.
+*  Named function expression name binding is handled by the
+*  compiler; the compiled function's parent env will contain
+@@ -2171,13 +2180,8 @@
+*  Setup value stack: clamp to 'nargs', fill up to 'nregs',
+*  ensure value stack size matches target requirements, and
+*  switch value stack bottom.  Valstack top is kept.
+-   *
+-   *  Value stack can only grow here.
+*/
+ 
+-  duk_valstack_grow_check_throw(thr, vs_min_bytes);
+-  act->reserve_byteoff = (duk_size_t) ((duk_uint8_t *) thr->valstack_end 
- (duk_uint8_t *) thr->valstack);
+-
+   if (use_tailcall) {
+   DUK_ASSERT(nregs >= 0);
+   DUK_ASSERT(nregs >= nargs);
+Index: duktape-2.5.0/tests/ecmascript/test-bug-scope-segv-gh2448.js
+===
+--- /dev/null  1970-01-01 00:00:00.0 +
 duktape-2.5.0/tests/ecmascript/test-bug-scope-segv-gh2448.js   
2023-03-27 19:32:09.275869100 +0200
+@@ -0,0 +1,35 @@
++// https://github.com/svaarala/duktape/issues/2448
++
++/*===
++RangeError
++===*/
++
++function JSEtest() {
++var src = [];
++var i;
++
++src.push('(function test() {');
++for (i = 0; i < 1e4; i++) {
++src.push('var x' + i + ' = ' + i + ';');
++}
++src.push('var arguments = test(); return "dummy"; })');
++src = src.join('');
++//print(src);
++
++var f = eval(src)(src);
++
++try {
++f();
++} catch (e) {
++print(e.name + ': ' + e.message);
++}
++
++print('still here');
++}
++
++try {
++JSEtest();
++} catch (e) {
++//print(e.stack || e);
++print(e.name);
++}
diff -Nru duktape-2.5.0/debian/patches/series 
duktape-2.5.0/debian/patches/series
--- duktape-2.5.0/debian/patches/series 2020-03-13 21:44:00.0 +0100
+++ duktape-2.5.0/debian/patches/series 2023-03-26 14:03:02.0 +0200
@@ -1,3 +1,5 @@
 #XXX hardening.patch
 hardening.patch
 debug-symbols.patch
+
+CVE-2021-46322.patch


Bug#1032961: debdiff now attached

2023-03-14 Thread Thorsten Alteholz

... and now even with the debdiff attached.

  Thorstendiff -Nru cups-filters-1.28.17/debian/changelog 
cups-filters-1.28.17/debian/changelog
--- cups-filters-1.28.17/debian/changelog   2023-02-05 00:25:20.0 
+0100
+++ cups-filters-1.28.17/debian/changelog   2023-03-10 19:25:20.0 
+0100
@@ -1,3 +1,11 @@
+cups-filters (1.28.17-2) unstable; urgency=medium
+
+  * qpdf needs at least c++17
+(Closes: #1032546)
+  * update lintian-overrides to really see what is wrong
+
+ -- Thorsten Alteholz   Fri, 10 Mar 2023 19:25:20 +0100
+
 cups-filters (1.28.17-1) unstable; urgency=medium
 
   * Update to new upstream version 1.28.17.
diff -Nru cups-filters-1.28.17/debian/cups-browsed.lintian-overrides 
cups-filters-1.28.17/debian/cups-browsed.lintian-overrides
--- cups-filters-1.28.17/debian/cups-browsed.lintian-overrides  2023-02-05 
00:17:45.0 +0100
+++ cups-filters-1.28.17/debian/cups-browsed.lintian-overrides  2023-03-10 
19:25:20.0 +0100
@@ -1,4 +1,5 @@
 # Upstream choices; they need to be run as root
-cups-browsed: executable-is-not-world-readable 
usr/lib/cups/backend/implicitclass 0700
+cups-browsed: executable-is-not-world-readable 0700 
[usr/lib/cups/backend/implicitclass]
 # That's how CUPS does it
-cups-browsed: executable-in-usr-lib usr/lib/cups/backend/implicitclass
+cups-browsed: executable-in-usr-lib [usr/lib/cups/backend/implicitclass]
+cups-browsed: non-standard-executable-perm 0700 != 0755 
[usr/lib/cups/backend/implicitclass]
diff -Nru 
cups-filters-1.28.17/debian/cups-filters-core-drivers.lintian-overrides 
cups-filters-1.28.17/debian/cups-filters-core-drivers.lintian-overrides
--- cups-filters-1.28.17/debian/cups-filters-core-drivers.lintian-overrides 
2023-02-05 00:17:45.0 +0100
+++ cups-filters-1.28.17/debian/cups-filters-core-drivers.lintian-overrides 
2023-03-10 19:25:20.0 +0100
@@ -1,11 +1,11 @@
 # That's how CUPS does it
-cups-filters-core-drivers: executable-in-usr-lib usr/lib/cups/driver/driverless
-cups-filters-core-drivers: executable-in-usr-lib usr/lib/cups/filter/imagetopdf
-cups-filters-core-drivers: executable-in-usr-lib usr/lib/cups/filter/pdftopdf
-cups-filters-core-drivers: executable-in-usr-lib usr/lib/cups/filter/pdftops
-cups-filters-core-drivers: executable-in-usr-lib 
usr/lib/cups/filter/pdftoraster
-cups-filters-core-drivers: executable-in-usr-lib 
usr/lib/cups/filter/rastertopclm
-cups-filters-core-drivers: executable-in-usr-lib 
usr/lib/cups/filter/rastertopclx
-cups-filters-core-drivers: executable-in-usr-lib 
usr/lib/cups/filter/rastertopdf
-cups-filters-core-drivers: executable-in-usr-lib usr/lib/cups/filter/rastertops
-cups-filters-core-drivers: executable-in-usr-lib 
usr/lib/cups/filter/sys5ippprinter
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/driver/driverless]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/imagetopdf]
+cups-filters-core-drivers: executable-in-usr-lib [usr/lib/cups/filter/pdftopdf]
+cups-filters-core-drivers: executable-in-usr-lib [usr/lib/cups/filter/pdftops]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/pdftoraster]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/rastertopclm]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/rastertopclx]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/rastertopdf]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/rastertops]
+cups-filters-core-drivers: executable-in-usr-lib 
[usr/lib/cups/filter/sys5ippprinter]
diff -Nru cups-filters-1.28.17/debian/cups-filters.lintian-overrides 
cups-filters-1.28.17/debian/cups-filters.lintian-overrides
--- cups-filters-1.28.17/debian/cups-filters.lintian-overrides  2023-02-05 
00:17:45.0 +0100
+++ cups-filters-1.28.17/debian/cups-filters.lintian-overrides  2023-03-10 
19:25:20.0 +0100
@@ -1,39 +1,39 @@
 # Upstream choices; they need to be run as root
-cups-filters: executable-is-not-world-readable usr/lib/cups/backend/cups-brf 
0700
+executable-is-not-world-readable 0700 [usr/lib/cups/backend/cups-brf]
 # Upstream choices; they need to be run as root
-cups-filters: non-standard-executable-perm usr/lib/cups/backend/serial 0744 != 
0755
+cups-filters: non-standard-executable-perm 0744 != 0755 
[usr/lib/cups/backend/serial]
 # Historical reasons
-cups-filters: executable-not-elf-or-script 
usr/share/cups/braille/cups-braille.sh
-cups-filters: executable-not-elf-or-script usr/share/cups/braille/index.sh
-cups-filters: executable-not-elf-or-script usr/share/cups/braille/indexv3.sh
-cups-filters: executable-not-elf-or-script usr/share/cups/braille/indexv4.sh
+cups-filters: executable-not-elf-or-script 
[usr/share/cups/braille/cups-braille.sh]
+cups-filters: executable-not-elf-or-script [usr/share/cups/braille/index.sh]
+cups-filters: executable-not-elf-or-script [usr/share/cups/braille/indexv3.sh]
+cups-filters: executable-not-elf-or-script

Bug#1032961: unblock: cups-filters/1.28.17-2

2023-03-14 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package cups-filters

[ Reason ]
After the upload of qpdf (11.3.0-1), cups-filters started to FTBFS (-> #1032546)
This is due to qpdf now requiring C++17.

[ Impact ]
cups-filters can no longer be built.

[ Tests ]
The package has a small testsuite that passes.

[ Risks ]
There is no code change but "only" a removal of -std=c++0x from the 
CXXFLAGS. So there seems to be just a low risk.

cups-filters is a key package with no alternatives.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
In order to not being swamped by lintian messages, I also had to update 
some lintian-overrides.

(yes timing of lintian update could have been better)

unblock cups-filters/1.28.17-2



Bug#1029976: bullseye-pu: libzen/0.4.38-1+deb11u1

2023-01-29 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bulleye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libzen fixes CVE-2020-36646 in Bullseye.
It has been already uploaded to all releases from Jessie to Buster.

This CVE has been marked as no-dsa by the security team.

  Thorsten
diff -Nru libzen-0.4.38/debian/changelog libzen-0.4.38/debian/changelog
--- libzen-0.4.38/debian/changelog  2020-04-10 17:32:09.0 +0200
+++ libzen-0.4.38/debian/changelog  2023-01-28 13:03:02.0 +0100
@@ -1,3 +1,11 @@
+libzen (0.4.38-1+deb11u1) bullseye; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-36646
+fix for possible null pointer dereference
+
+ -- Thorsten Alteholz   Sat, 28 Jan 2023 13:03:02 +0100
+
 libzen (0.4.38-1) unstable; urgency=medium
 
   * [7cc8350] New upstream version 0.4.38
diff -Nru libzen-0.4.38/debian/patches/CVE-2020-36646.patch 
libzen-0.4.38/debian/patches/CVE-2020-36646.patch
--- libzen-0.4.38/debian/patches/CVE-2020-36646.patch   1970-01-01 
01:00:00.0 +0100
+++ libzen-0.4.38/debian/patches/CVE-2020-36646.patch   2023-01-28 
13:03:02.0 +0100
@@ -0,0 +1,27 @@
+commit 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408
+Author: Pave Pimenov 
+Date:   Sat Sep 12 07:46:47 2020 +0300
+
+fix V522 [CWE-690] There might be dereferencing of a potential null 
pointer 'Gmt'.
+
+diff --git a/Source/ZenLib/Ztring.cpp b/Source/ZenLib/Ztring.cpp
+index bc38fe4..21bbc58 100644
+--- a/Source/ZenLib/Ztring.cpp
 b/Source/ZenLib/Ztring.cpp
+@@ -1364,6 +1364,8 @@ Ztring& Ztring::Date_From_Seconds_1970_Local (const 
int32u Value)
+ #endif
+ Ztring DateT;
+ Ztring Date;
++if (Gmt)
++{
+ Date+=Ztring::ToZtring((Gmt->tm_year+1900));
+ Date+=__T("-");
+ DateT.From_Number(Gmt->tm_mon+1); if 
(DateT.size()<2){DateT=Ztring(__T("0"))+Ztring::ToZtring(Gmt->tm_mon+1);}
+@@ -1381,6 +1383,7 @@ Ztring& Ztring::Date_From_Seconds_1970_Local (const 
int32u Value)
+ DateT.From_Number(Gmt->tm_sec); if 
(DateT.size()<2){DateT=Ztring(__T("0"))+Ztring::ToZtring(Gmt->tm_sec);}
+ Date+=DateT;
+ assign (Date.c_str());
++}
+ return *this;
+ }
+ 
diff -Nru libzen-0.4.38/debian/patches/series 
libzen-0.4.38/debian/patches/series
--- libzen-0.4.38/debian/patches/series 1970-01-01 01:00:00.0 +0100
+++ libzen-0.4.38/debian/patches/series 2023-01-28 13:03:02.0 +0100
@@ -0,0 +1 @@
+CVE-2020-36646.patch


Bug#1020596: bullseye-pu: mod-wsgi/4.7.1-3+deb11u1

2022-10-22 Thread Thorsten Alteholz




On Fri, 14 Oct 2022, Adam D. Barratt wrote:

Please go ahead.


Great, thanks ... and uploaded.

  Thorsten



Bug#1020596: bullseye-pu: mod-wsgi/4.7.1-3+deb11u1

2022-09-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for mod-wsgi fixes CVE-2022-2255 in Bullseye. This 
CVE has been marked as no-dsa by the security team.


The same fix has already been uploaded to Unstable/Testing, Stretch, 
Jessie and Buster and nobody complained yet.


  Thorsten
diff -Nru mod-wsgi-4.7.1/debian/changelog mod-wsgi-4.7.1/debian/changelog
--- mod-wsgi-4.7.1/debian/changelog 2020-10-15 21:48:24.0 +0200
+++ mod-wsgi-4.7.1/debian/changelog 2022-09-12 23:03:02.0 +0200
@@ -1,3 +1,11 @@
+mod-wsgi (4.7.1-3+deb11u1) bullseye; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2022-2255 (Closes: #1016476)
+drop X-Client-IP header when is not a trusted header
+
+ -- Thorsten Alteholz   Mon, 12 Sep 2022 23:03:02 +0200
+
 mod-wsgi (4.7.1-3) unstable; urgency=medium
 
   [ Stefano Rivera ]
diff -Nru mod-wsgi-4.7.1/debian/patches/CVE-2022-2255.patch 
mod-wsgi-4.7.1/debian/patches/CVE-2022-2255.patch
--- mod-wsgi-4.7.1/debian/patches/CVE-2022-2255.patch   1970-01-01 
01:00:00.0 +0100
+++ mod-wsgi-4.7.1/debian/patches/CVE-2022-2255.patch   2022-07-31 
02:01:02.0 +0200
@@ -0,0 +1,18 @@
+commit af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751
+Author: Graham Dumpleton 
+Date:   Mon Jul 18 12:29:38 2022 +1000
+
+Add fix to ensure that X-Client-IP header is dropped when is not a trusted 
header.
+
+Index: mod-wsgi-4.7.1/src/server/mod_wsgi.c
+===
+--- mod-wsgi-4.7.1.orig/src/server/mod_wsgi.c  2022-07-31 02:00:58.799486663 
+0200
 mod-wsgi-4.7.1/src/server/mod_wsgi.c   2022-07-31 02:00:58.795486661 
+0200
+@@ -13942,6 +13942,7 @@
+ name = ((const char**)trusted_proxy_headers->elts)[i];
+ 
+ if (!strcmp(name, "HTTP_X_FORWARDED_FOR") ||
++ !strcmp(name, "HTTP_X_CLIENT_IP") ||
+  !strcmp(name, "HTTP_X_REAL_IP")) {
+ 
+ match_client_header = 1;
diff -Nru mod-wsgi-4.7.1/debian/patches/series 
mod-wsgi-4.7.1/debian/patches/series
--- mod-wsgi-4.7.1/debian/patches/series1970-01-01 01:00:00.0 
+0100
+++ mod-wsgi-4.7.1/debian/patches/series2022-07-31 02:00:46.0 
+0200
@@ -0,0 +1 @@
+CVE-2022-2255.patch


Bug#1016391: bullseye-pu: libhttp-daemon-perl/6.12-1+deb11u1

2022-08-06 Thread Thorsten Alteholz




On Sat, 6 Aug 2022, Adam D. Barratt wrote:

Please go ahead.


... and uploaded.

Thanks!
 Thorsten



Bug#1008578: buster-pu: golang-github-russellhaering-goxmldsig/0.0~git20170911.b7efc62-1+deb10u1

2022-08-05 Thread Thorsten Alteholz




On Fri, 5 Aug 2022, Adam D. Barratt wrote:

Please go ahead.


... and uploaded.

Thanks!
 Thorsten



Bug#1010380: buster-pu: flac/1.3.2-3+deb10u2

2022-08-05 Thread Thorsten Alteholz




On Fri, 5 Aug 2022, Adam D. Barratt wrote:


Please go ahead; sorry for the delay.


... and uploaded.

Thanks!
 Thorsten



Bug#1009251: buster-pu: fribidi/1.0.5-3.1+deb10u2

2022-08-05 Thread Thorsten Alteholz




On Fri, 5 Aug 2022, Adam D. Barratt wrote:

Please go ahead; sorry for the delay.


... and uploaded.

Thanks!
 Thorsten



Bug#1009076: buster-pu: minidlna/1.2.1+dfsg-2+deb10u3

2022-08-05 Thread Thorsten Alteholz




On Fri, 5 Aug 2022, Adam D. Barratt wrote:

Please go ahead; sorry for the delay.


... and uploaded.

Thanks!
 Thorsten



Bug#1016391: bullseye-pu: libhttp-daemon-perl/6.12-1+deb11u1

2022-07-30 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bulleye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libhttp-daemon-perl fixes CVE-2022-31081 in 
Bullseye. This CVE has been marked as no-dsa by the security team.


The patch is accompanied by a new test and should not create any issue.
It had been used to fix unstable and will be used for Buster, Jessie as well.


  Thorstendiff -Nru libhttp-daemon-perl-6.12/debian/changelog 
libhttp-daemon-perl-6.12/debian/changelog
--- libhttp-daemon-perl-6.12/debian/changelog   2020-06-06 03:12:55.0 
+0200
+++ libhttp-daemon-perl-6.12/debian/changelog   2022-07-26 20:08:59.0 
+0200
@@ -1,3 +1,11 @@
+libhttp-daemon-perl (6.12-1+deb11u1) bullseye; urgency=high
+
+  * Non-maintainer upload by the ELTS Team.
+  * CVE-2022-31081 (Closes: #1014808)
+improved Content-Length: handling in HTTP-header
+
+ -- Thorsten Alteholz   Tue, 26 Jul 2022 20:08:59 +0200
+
 libhttp-daemon-perl (6.12-1) unstable; urgency=medium
 
   * Import upstream version 6.12.
diff -Nru libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-1.patch 
libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-1.patch
--- libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-1.patch  
1970-01-01 01:00:00.0 +0100
+++ libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-1.patch  
2022-07-26 20:08:59.0 +0200
@@ -0,0 +1,48 @@
+commit e84475de51d6fd7b29354a997413472a99db70b2
+Author: Theo van Hoesel 
+Date:   Thu Jun 16 08:28:30 2022 +
+
+Fix Content-Length ', '-separated string issues
+
+After a security issue, we ensure we comply to
+RFC-7230 -- HTTP/1.1 Message Syntax and Routing
+- section 3.3.2 -- Content-Length
+- section 3.3.3 -- Message Body Length
+
+diff --git a/lib/HTTP/Daemon.pm b/lib/HTTP/Daemon.pm
+index c0cdf76..a5112b3 100644
+--- a/lib/HTTP/Daemon.pm
 b/lib/HTTP/Daemon.pm
+@@ -288,6 +288,32 @@ READ_HEADER:
+ }
+ elsif ($ct_len) {
+ 
++# After a security issue, we ensure we comply to
++# RFC-7230 -- HTTP/1.1 Message Syntax and Routing
++# section 3.3.2 -- Content-Length
++# section 3.3.3 -- Message Body Length
++
++# split and clean up Content-Length ', ' separated string
++my @vals = map {my $str = $_; $str =~ s/^\s+//; $str =~ s/\s+$//; 
$str }
++split ',', $ct_len;
++# check that they are all numbers (RFC: Content-Length = 1*DIGIT)
++my @nums = grep { /^[0-9]+$/} @vals;
++unless (@vals == @nums) {
++$self->send_error(400);
++$self->reason("Content-Length value must be a unsigned integer");
++return;
++}
++# check they are all the same
++my $ct_len = shift @nums;
++foreach (@nums) {
++next if $_ == $ct_len;
++$self->send_error(400);
++$self->reason("Content-Length values are not the same");
++return;
++}
++# ensure we have now a fixed header, with only 1 value
++$r->header('Content-Length' => $ct_len);
++
+ # Plain body specified by "Content-Length"
+ my $missing = $ct_len - length($buf);
+ while ($missing > 0) {
diff -Nru libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-2.patch 
libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-2.patch
--- libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-2.patch  
1970-01-01 01:00:00.0 +0100
+++ libhttp-daemon-perl-6.12/debian/patches/CVE-2022-31081-2.patch  
2022-07-26 20:08:59.0 +0200
@@ -0,0 +1,33 @@
+commit 8dc5269d59e2d5d9eb1647d82c449ccd880f7fd0
+Author: Theo van Hoesel 
+Date:   Tue Jun 21 20:00:47 2022 +
+
+Include reason in response body content
+
+diff --git a/lib/HTTP/Daemon.pm b/lib/HTTP/Daemon.pm
+index a5112b3..2d022ae 100644
+--- a/lib/HTTP/Daemon.pm
 b/lib/HTTP/Daemon.pm
+@@ -299,16 +299,18 @@ READ_HEADER:
+ # check that they are all numbers (RFC: Content-Length = 1*DIGIT)
+ my @nums = grep { /^[0-9]+$/} @vals;
+ unless (@vals == @nums) {
+-$self->send_error(400);
+-$self->reason("Content-Length value must be a unsigned integer");
++my $reason = "Content-Length value must be an unsigned integer";
++$self->send_error(400, $reason);
++$self->reason($reason);
+ return;
+ }
+ # check they are all the same
+ my $ct_len = shift @nums;
+ foreach (@nums) {
+ next if $_ == $ct_len;
+-$self->send_error(400);
+-$self->reason("Content-Length values are not the same");
++my $reason = "Content-Length values are not the same";
++$self->send_error(400, $reason);
++$self->reason($reason);
+ return;
+ }
+   

Bug#1009250: bullseye-pu: fribidi/1.0.8-2+deb11u1

2022-05-30 Thread Thorsten Alteholz




On Sat, 28 May 2022, Adam D. Barratt wrote:

This looks OK to me, thanks, but will need a KiBi-ack as fribidi
produces a udeb; CCing and tagging accordingly.


... and uploaded.

  Thorsten



Bug#1008577: bullseye-pu: golang-github-russellhaering-goxmldsig/1.1.0-1+deb11u1

2022-05-30 Thread Thorsten Alteholz




On Sat, 28 May 2022, Adam D. Barratt wrote:

Please go ahead.


Great, thanks ... and uploaded.

 Thorsten



Bug#1009077: bullseye-pu: minidlna/1.3.0+dfsg-2+deb11u1

2022-05-30 Thread Thorsten Alteholz




On Sat, 28 May 2022, Adam D. Barratt wrote:

Please go ahead, thanks.


Great, thanks, ... and uploaded.

  Thorsten



Bug#1010380: buster-pu: flac/1.3.2-3+deb10u2

2022-04-29 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for flac fixes CVE-2021-0561 in Buster. This CVE 
has been marked as no-dsa by the security team.


The same patch has been already uploaded to all other releases.

  Thorsten
diff -Nru flac-1.3.2/debian/changelog flac-1.3.2/debian/changelog
--- flac-1.3.2/debian/changelog 2022-01-16 19:54:01.0 +0100
+++ flac-1.3.2/debian/changelog 2022-04-27 22:03:02.0 +0200
@@ -1,3 +1,11 @@
+flac (1.3.2-3+deb10u2) buster; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2021-0561 (Closes: #1006339)
+Add patch to exit at EOS in verify mode.
+
+ -- Thorsten Alteholz   Wed, 27 Apr 2022 22:03:02 +0200
+
 flac (1.3.2-3+deb10u1) buster; urgency=medium
 
   * Non-maintainer upload.
diff -Nru flac-1.3.2/debian/patches/CVE-2021-0561.patch 
flac-1.3.2/debian/patches/CVE-2021-0561.patch
--- flac-1.3.2/debian/patches/CVE-2021-0561.patch   1970-01-01 
01:00:00.0 +0100
+++ flac-1.3.2/debian/patches/CVE-2021-0561.patch   2022-04-27 
22:03:02.0 +0200
@@ -0,0 +1,30 @@
+From e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be Mon Sep 17 00:00:00 2001
+From: Neelkamal Semwal 
+Date: Fri, 18 Dec 2020 22:28:36 +0530
+Subject: [PATCH] libFlac: Exit at EOS in verify mode
+
+When verify mode is enabled, once decoder flags end of stream,
+encode processing is considered complete.
+
+CVE-2021-0561
+
+Signed-off-by: Ralph Giles 
+---
+ src/libFLAC/stream_encoder.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+Index: flac-1.3.2/src/libFLAC/stream_encoder.c
+===
+--- flac-1.3.2.orig/src/libFLAC/stream_encoder.c   2022-04-27 
23:58:24.569563774 +0200
 flac-1.3.2/src/libFLAC/stream_encoder.c2022-04-27 23:58:24.569563774 
+0200
+@@ -2578,7 +2578,9 @@
+   encoder->private_->verify.needs_magic_hack = true;
+   }
+   else {
+-  
if(!FLAC__stream_decoder_process_single(encoder->private_->verify.decoder)) {
++  
if(!FLAC__stream_decoder_process_single(encoder->private_->verify.decoder)
++  || (!is_last_block
++  && 
(FLAC__stream_encoder_get_verify_decoder_state(encoder) == 
FLAC__STREAM_DECODER_END_OF_STREAM))) {
+   
FLAC__bitwriter_release_buffer(encoder->private_->frame);
+   FLAC__bitwriter_clear(encoder->private_->frame);
+   if(encoder->protected_->state != 
FLAC__STREAM_ENCODER_VERIFY_MISMATCH_IN_AUDIO_DATA)
diff -Nru flac-1.3.2/debian/patches/series flac-1.3.2/debian/patches/series
--- flac-1.3.2/debian/patches/series2022-01-16 19:53:49.0 +0100
+++ flac-1.3.2/debian/patches/series2022-04-27 22:03:02.0 +0200
@@ -5,3 +5,5 @@
 0051-metaflac-Fix-a-memory-leak.patch
 0001-remove-build-path-from-generated-FLAC.tag-file.patch
 0001-libFLAC-bitreader.c-Fix-out-of-bounds-read.patch
+
+CVE-2021-0561.patch


Re: security updates of Golang packages

2022-04-26 Thread Thorsten Alteholz

Hi Paul,

On Tue, 26 Apr 2022, Paul Gevers wrote:
But if you have the tooling to create such versioned dependencies (and you'd 
need those to get everything right), than we could use the same tools to add 
Depwait on the binNMUs and the build order would be correct again.


hmm, Depwaits are new to me. If I have package A with version 1-1 that 
gets a fix in version 1-2, than I can add:

 dw B . amd64 . bullseye . -m "A (>=1-2)"
But what do I need to write to let package C wait for the rebuilt of B?

Sure tooling is a big problem, but on top of that a big problem with the 
security archive is that it doesn't have the sources for packages that have 
never seen a security upload. Which means we can't even binNMU there in those 
cases.


Until the space problem on seger is fixed, the tooling could also create a 
script that copies all packages. This would be a manual ftpmaster-step 
before the binNMU, but at least this is better than no fix at all.


  Thorsten



Re: security updates of Golang packages

2022-04-25 Thread Thorsten Alteholz

Hi Paul,

On Sun, 24 Apr 2022, Paul Gevers wrote:
If I understand correctly, if this is only about rebuilds, just request an 
binNMU with the usual process (reportbug recommended).


from my point of view binNMUs are not the right way here.
Due to possibly long dependency chains of golang packages, the order of 
uploads would be important. Trying to keep this order with binNMU bugs 
seems to be rather error-prone. Especially as the buildds on different 
architectures work at different rates.
What I had in mind was to change the dependencies of all affected 
packages to versioned dependencies with (>= the new version). So the 
uploads are not only rebuilds but really new verions of a package.


Your link [1] points 
at the issues we have with security support *via the security archive*.


Yes, but those updates would have the same problem, right? And both have 
in common that currently there is no tooling available ...


 Thorsten



security updates of Golang packages

2022-04-24 Thread Thorsten Alteholz

Hi everybody,

I would like to improve the situation of security support for Golang 
packages (as already criticised long time ago[1]).


Uploads to Unstable should be no problem, but how would you like to handle 
stable/oldstable updates for CVEs that are marked as no-dsa from the 
security team?


For example the fix of CVE-2021-42836 in golang-github-tidwall-gjson for 
Bullseye requires eight uploads of reverse dependencies. Do you want to 
handle each of them with different PU-bugs?


  Thorsten

[1] https://lists.debian.org/debian-release/2018/06/msg00725.html




Bug#1009250: bullseye-pu: fribidi/1.0.8-2+deb11u1

2022-04-09 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for fribidi fixes CVE-2022-25308, CVE-2022-25309 and
CVE-2022-25310 in Bullseye. These CVEs have been marked as no-dsa by the
security team.

The same fixes have been already uploaded to Unstable.

  Thorsten
diff -Nru fribidi-1.0.8/debian/changelog fribidi-1.0.8/debian/changelog
--- fribidi-1.0.8/debian/changelog  2019-12-21 03:11:40.0 +0100
+++ fribidi-1.0.8/debian/changelog  2022-04-05 22:03:02.0 +0200
@@ -1,3 +1,16 @@
+fribidi (1.0.8-2+deb11u1) bullseye; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2022-25308
+stack-buffer-overflow issue in main()
+  * CVE-2022-25309
+heap-buffer-overflow issue in fribidi_cap_rtl_to_unicode()
+  * CVE-2022-25310
+SEGV issue in fribidi_remove_bidi_marks()
+(Closes: #1008793)
+
+ -- Thorsten Alteholz   Tue, 05 Apr 2022 22:03:02 +0200
+
 fribidi (1.0.8-2) unstable; urgency=medium
 
   * Add  revert_log2vis_get_embedding_levels.diff patch to revert back 
diff -Nru fribidi-1.0.8/debian/patches/CVE-2022-25308.patch 
fribidi-1.0.8/debian/patches/CVE-2022-25308.patch
--- fribidi-1.0.8/debian/patches/CVE-2022-25308.patch   1970-01-01 
01:00:00.0 +0100
+++ fribidi-1.0.8/debian/patches/CVE-2022-25308.patch   2022-03-31 
10:31:22.0 +0200
@@ -0,0 +1,43 @@
+commit ad3a19e6372b1e667128ed1ea2f49919884587e1
+Author: Akira TAGOH 
+Date:   Thu Feb 17 17:30:12 2022 +0900
+
+Fix the stack buffer overflow issue
+
+strlen() could returns 0. Without a conditional check for len,
+accessing S_ pointer with len - 1 may causes a stack buffer overflow.
+
+AddressSanitizer reports this like:
+==1219243==ERROR: AddressSanitizer: stack-buffer-overflow on address 
0x7ffdce043c1f at pc 0x00403547 bp 0x7ffdce0
+43b30 sp 0x7ffdce043b28
+READ of size 1 at 0x7ffdce043c1f thread T0
+#0 0x403546 in main ../bin/fribidi-main.c:393
+#1 0x7f226804e58f in __libc_start_call_main (/lib64/libc.so.6+0x2d58f)
+#2 0x7f226804e648 in __libc_start_main_impl (/lib64/libc.so.6+0x2d648)
+#3 0x4036f4 in _start (/tmp/fribidi/build/bin/fribidi+0x4036f4)
+
+Address 0x7ffdce043c1f is located in stack of thread T0 at offset 63 in 
frame
+#0 0x4022bf in main ../bin/fribidi-main.c:193
+
+  This frame has 5 object(s):
+[32, 36) 'option_index' (line 233)
+[48, 52) 'base' (line 386)
+[64, 65064) 'S_' (line 375) <== Memory access at offset 63 underflows 
this variable
+[65328, 130328) 'outstring' (line 385)
+[130592, 390592) 'logical' (line 384)
+
+This fixes https://github.com/fribidi/fribidi/issues/181
+
+diff --git a/bin/fribidi-main.c b/bin/fribidi-main.c
+index 3cf9fe1..3ae4fb6 100644
+--- a/bin/fribidi-main.c
 b/bin/fribidi-main.c
+@@ -390,7 +390,7 @@ FRIBIDI_END_IGNORE_DEPRECATIONS
+   S_[sizeof (S_) - 1] = 0;
+   len = strlen (S_);
+   /* chop */
+-  if (S_[len - 1] == '\n')
++  if (len > 0 && S_[len - 1] == '\n')
+ {
+   len--;
+   S_[len] = '\0';
diff -Nru fribidi-1.0.8/debian/patches/CVE-2022-25309.patch 
fribidi-1.0.8/debian/patches/CVE-2022-25309.patch
--- fribidi-1.0.8/debian/patches/CVE-2022-25309.patch   1970-01-01 
01:00:00.0 +0100
+++ fribidi-1.0.8/debian/patches/CVE-2022-25309.patch   2022-03-31 
10:31:22.0 +0200
@@ -0,0 +1,24 @@
+commit f22593b82b5d1668d1997dbccd10a9c31ffea3b3
+Author: Dov Grobgeld 
+Date:   Fri Mar 25 09:09:49 2022 +0300
+
+Protected against garbage in the CapRTL encoder
+
+diff --git a/lib/fribidi-char-sets-cap-rtl.c b/lib/fribidi-char-sets-cap-rtl.c
+index b0c0e4a..f74e010 100644
+--- a/lib/fribidi-char-sets-cap-rtl.c
 b/lib/fribidi-char-sets-cap-rtl.c
+@@ -232,7 +232,12 @@ fribidi_cap_rtl_to_unicode (
+   }
+   }
+   else
+-  us[j++] = caprtl_to_unicode[(int) s[i]];
++  {
++if ((int)s[i] < 0)
++  us[j++] = '?';
++else
++  us[j++] = caprtl_to_unicode[(int) s[i]];
++  }
+ }
+ 
+   return j;
diff -Nru fribidi-1.0.8/debian/patches/CVE-2022-25310.patch 
fribidi-1.0.8/debian/patches/CVE-2022-25310.patch
--- fribidi-1.0.8/debian/patches/CVE-2022-25310.patch   1970-01-01 
01:00:00.0 +0100
+++ fribidi-1.0.8/debian/patches/CVE-2022-25310.patch   2022-03-31 
10:31:22.0 +0200
@@ -0,0 +1,23 @@
+commit 175850b03e1af251d705c1d04b2b9b3c1c06e48f
+Author: Akira TAGOH 
+Date:   Thu Feb 17 19:06:10 2022 +0900
+
+Fix SEGV issue in fribidi_remove_bidi_marks
+
+Escape from fribidi_remove_bidi_marks() immediately if str is null.
+
+This fixes https://github.com/fribidi/fribidi/issues/183
+
+diff --git a/lib/fribidi.c b/lib/fribidi.c
+index f5da0da..70bdab2 100644
+--- a/lib/fribidi.c
 b/lib/fribidi.c
+@@ -74,7 +74,7 @@ fribidi_

Bug#1009251: buster-pu: fribidi/1.0.5-3.1+deb10u2

2022-04-09 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for fribidi fixes CVE-2022-25308, CVE-2022-25309 and
CVE-2022-25310 in Buster. These CVEs have been marked as no-dsa by the
security team.

The same fixes have been already uploaded to Unstable.

  Thorsten
diff -Nru fribidi-1.0.5/debian/changelog fribidi-1.0.5/debian/changelog
--- fribidi-1.0.5/debian/changelog  2019-11-06 07:48:41.0 +0100
+++ fribidi-1.0.5/debian/changelog  2022-04-05 22:03:02.0 +0200
@@ -1,3 +1,16 @@
+fribidi (1.0.5-3.1+deb10u2) buster; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2022-25308
+stack-buffer-overflow issue in main()
+  * CVE-2022-25309
+heap-buffer-overflow issue in fribidi_cap_rtl_to_unicode()
+  * CVE-2022-25310
+SEGV issue in fribidi_remove_bidi_marks()
+(Closes: #1008793)
+
+ -- Thorsten Alteholz   Tue, 05 Apr 2022 22:03:02 +0200
+
 fribidi (1.0.5-3.1+deb10u1) buster-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru fribidi-1.0.5/debian/patches/CVE-2022-25308.patch 
fribidi-1.0.5/debian/patches/CVE-2022-25308.patch
--- fribidi-1.0.5/debian/patches/CVE-2022-25308.patch   1970-01-01 
01:00:00.0 +0100
+++ fribidi-1.0.5/debian/patches/CVE-2022-25308.patch   2022-03-31 
10:33:34.0 +0200
@@ -0,0 +1,43 @@
+commit ad3a19e6372b1e667128ed1ea2f49919884587e1
+Author: Akira TAGOH 
+Date:   Thu Feb 17 17:30:12 2022 +0900
+
+Fix the stack buffer overflow issue
+
+strlen() could returns 0. Without a conditional check for len,
+accessing S_ pointer with len - 1 may causes a stack buffer overflow.
+
+AddressSanitizer reports this like:
+==1219243==ERROR: AddressSanitizer: stack-buffer-overflow on address 
0x7ffdce043c1f at pc 0x00403547 bp 0x7ffdce0
+43b30 sp 0x7ffdce043b28
+READ of size 1 at 0x7ffdce043c1f thread T0
+#0 0x403546 in main ../bin/fribidi-main.c:393
+#1 0x7f226804e58f in __libc_start_call_main (/lib64/libc.so.6+0x2d58f)
+#2 0x7f226804e648 in __libc_start_main_impl (/lib64/libc.so.6+0x2d648)
+#3 0x4036f4 in _start (/tmp/fribidi/build/bin/fribidi+0x4036f4)
+
+Address 0x7ffdce043c1f is located in stack of thread T0 at offset 63 in 
frame
+#0 0x4022bf in main ../bin/fribidi-main.c:193
+
+  This frame has 5 object(s):
+[32, 36) 'option_index' (line 233)
+[48, 52) 'base' (line 386)
+[64, 65064) 'S_' (line 375) <== Memory access at offset 63 underflows 
this variable
+[65328, 130328) 'outstring' (line 385)
+[130592, 390592) 'logical' (line 384)
+
+This fixes https://github.com/fribidi/fribidi/issues/181
+
+diff --git a/bin/fribidi-main.c b/bin/fribidi-main.c
+index 3cf9fe1..3ae4fb6 100644
+--- a/bin/fribidi-main.c
 b/bin/fribidi-main.c
+@@ -390,7 +390,7 @@ FRIBIDI_END_IGNORE_DEPRECATIONS
+   S_[sizeof (S_) - 1] = 0;
+   len = strlen (S_);
+   /* chop */
+-  if (S_[len - 1] == '\n')
++  if (len > 0 && S_[len - 1] == '\n')
+ {
+   len--;
+   S_[len] = '\0';
diff -Nru fribidi-1.0.5/debian/patches/CVE-2022-25309.patch 
fribidi-1.0.5/debian/patches/CVE-2022-25309.patch
--- fribidi-1.0.5/debian/patches/CVE-2022-25309.patch   1970-01-01 
01:00:00.0 +0100
+++ fribidi-1.0.5/debian/patches/CVE-2022-25309.patch   2022-03-31 
10:33:34.0 +0200
@@ -0,0 +1,24 @@
+commit f22593b82b5d1668d1997dbccd10a9c31ffea3b3
+Author: Dov Grobgeld 
+Date:   Fri Mar 25 09:09:49 2022 +0300
+
+Protected against garbage in the CapRTL encoder
+
+diff --git a/lib/fribidi-char-sets-cap-rtl.c b/lib/fribidi-char-sets-cap-rtl.c
+index b0c0e4a..f74e010 100644
+--- a/lib/fribidi-char-sets-cap-rtl.c
 b/lib/fribidi-char-sets-cap-rtl.c
+@@ -232,7 +232,12 @@ fribidi_cap_rtl_to_unicode (
+   }
+   }
+   else
+-  us[j++] = caprtl_to_unicode[(int) s[i]];
++  {
++if ((int)s[i] < 0)
++  us[j++] = '?';
++else
++  us[j++] = caprtl_to_unicode[(int) s[i]];
++  }
+ }
+ 
+   return j;
diff -Nru fribidi-1.0.5/debian/patches/CVE-2022-25310.patch 
fribidi-1.0.5/debian/patches/CVE-2022-25310.patch
--- fribidi-1.0.5/debian/patches/CVE-2022-25310.patch   1970-01-01 
01:00:00.0 +0100
+++ fribidi-1.0.5/debian/patches/CVE-2022-25310.patch   2022-03-31 
10:54:43.0 +0200
@@ -0,0 +1,23 @@
+commit 175850b03e1af251d705c1d04b2b9b3c1c06e48f
+Author: Akira TAGOH 
+Date:   Thu Feb 17 19:06:10 2022 +0900
+
+Fix SEGV issue in fribidi_remove_bidi_marks
+
+Escape from fribidi_remove_bidi_marks() immediately if str is null.
+
+This fixes https://github.com/fribidi/fribidi/issues/183
+
+Index: fribidi-1.0.5/lib/fribidi-deprecated.c
+===
+--- fribidi-1.0.5.orig/lib/fribidi-deprecated.c 

Bug#1009077: bullseye-pu: minidlna/1.3.0+dfsg-2+deb11u1

2022-04-06 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for minidlna fixes CVE-2022-26505 in Bullseye. This 
CVE has been marked as no-dsa by the security team.


The same fix has been already uploaded to Unstable.

  Thorsten
diff -Nru minidlna-1.3.0+dfsg/debian/changelog 
minidlna-1.3.0+dfsg/debian/changelog
--- minidlna-1.3.0+dfsg/debian/changelog2021-01-31 16:56:14.0 
+0100
+++ minidlna-1.3.0+dfsg/debian/changelog2022-03-24 22:03:02.0 
+0100
@@ -1,3 +1,13 @@
+minidlna (1.3.0+dfsg-2+deb11u1) bullseye; urgency=medium
+
+  * Non-maintainer upload.
+  * CVE-2022-26505
+Validate HTTP requests to protect against DNS rebinding, thus forbid
+a remote web server to exfiltrate media files.
+(Closes: #1006798)
+
+ -- Thorsten Alteholz   Thu, 24 Mar 2022 22:03:02 +0100
+
 minidlna (1.3.0+dfsg-2) unstable; urgency=medium
 
   [ Debian Janitor ]
diff -Nru minidlna-1.3.0+dfsg/debian/patches/CVE-2022-26505.patch 
minidlna-1.3.0+dfsg/debian/patches/CVE-2022-26505.patch
--- minidlna-1.3.0+dfsg/debian/patches/CVE-2022-26505.patch 1970-01-01 
01:00:00.0 +0100
+++ minidlna-1.3.0+dfsg/debian/patches/CVE-2022-26505.patch 2022-03-24 
22:03:02.0 +0100
@@ -0,0 +1,56 @@
+commit c21208508dbc131712281ec5340687e5ae89e940
+Author: Justin Maggard 
+Date:   Wed Feb 9 18:32:50 2022 -0800
+
+upnphttp: Protect against DNS rebinding attacks
+
+Validate HTTP requests to protect against DNS rebinding.
+
+diff --git a/upnphttp.c b/upnphttp.c
+index c8b5e99..62db89a 100644
+--- a/upnphttp.c
 b/upnphttp.c
+@@ -273,6 +273,11 @@ ParseHttpHeaders(struct upnphttp * h)
+   p = colon + 1;
+   while(isspace(*p))
+   p++;
++  n = 0;
++  while(p[n] >= ' ')
++  n++;
++  h->req_Host = p;
++  h->req_HostLen = n;
+   for(n = 0; n < n_lan_addr; n++)
+   {
+   for(i = 0; lan_addr[n].str[i]; i++)
+@@ -909,6 +914,18 @@ ProcessHttpQuery_upnphttp(struct upnphttp * h)
+   }
+ 
+   DPRINTF(E_DEBUG, L_HTTP, "HTTP REQUEST: %.*s\n", h->req_buflen, 
h->req_buf);
++  if(h->req_Host && h->req_HostLen > 0) {
++  const char *ptr = h->req_Host;
++  DPRINTF(E_MAXDEBUG, L_HTTP, "Host: %.*s\n", h->req_HostLen, 
h->req_Host);
++  for(i = 0; i < h->req_HostLen; i++) {
++  if(*ptr != ':' && *ptr != '.' && (*ptr > '9' || *ptr < 
'0')) {
++  DPRINTF(E_ERROR, L_HTTP, "DNS rebinding attack 
suspected (Host: %.*s)", h->req_HostLen, h->req_Host);
++  Send404(h);/* 403 */
++  return;
++  }
++  ptr++;
++  }
++  }
+   if(strcmp("POST", HttpCommand) == 0)
+   {
+   h->req_command = EPost;
+diff --git a/upnphttp.h b/upnphttp.h
+index e28a943..57eb2bb 100644
+--- a/upnphttp.h
 b/upnphttp.h
+@@ -89,6 +89,8 @@ struct upnphttp {
+   struct client_cache_s * req_client;
+   const char * req_soapAction;
+   int req_soapActionLen;
++  const char * req_Host;/* Host: header */
++  int req_HostLen;
+   const char * req_Callback;  /* For SUBSCRIBE */
+   int req_CallbackLen;
+   const char * req_NT;
diff -Nru minidlna-1.3.0+dfsg/debian/patches/series 
minidlna-1.3.0+dfsg/debian/patches/series
--- minidlna-1.3.0+dfsg/debian/patches/series   2021-01-31 16:53:51.0 
+0100
+++ minidlna-1.3.0+dfsg/debian/patches/series   2022-03-24 22:03:02.0 
+0100
@@ -5,3 +5,5 @@
 08-Fix-testupnpdescgen-build.patch
 09-do-not-disable-logs-with-systemd.patch
 10-do-not-close-socket-on-sighup.patch
+
+CVE-2022-26505.patch


Bug#1009076: buster-pu: minidlna/1.2.1+dfsg-2+deb10u3

2022-04-06 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for minidlna fixes CVE-2022-26505 in Buster. This
CVE has been marked as no-dsa by the security team.

The same fix has been already uploaded to Unstable.

  Thorsten

diff -Nru minidlna-1.2.1+dfsg/debian/changelog 
minidlna-1.2.1+dfsg/debian/changelog
--- minidlna-1.2.1+dfsg/debian/changelog2021-01-03 17:16:43.0 
+0100
+++ minidlna-1.2.1+dfsg/debian/changelog2022-03-24 22:03:02.0 
+0100
@@ -1,3 +1,13 @@
+minidlna (1.2.1+dfsg-2+deb10u3) buster; urgency=medium
+
+  * Non-maintainer upload.
+  * CVE-2022-26505
+Validate HTTP requests to protect against DNS rebinding, thus forbid
+a remote web server to exfiltrate media files.
+(Closes: #1006798)
+
+ -- Thorsten Alteholz   Thu, 24 Mar 2022 22:03:02 +0100
+
 minidlna (1.2.1+dfsg-2+deb10u2) buster-security; urgency=medium
 
   * d/minidlna.postrm: Do not fail on purge (Closes: #975372). This fixes the
diff -Nru minidlna-1.2.1+dfsg/debian/patches/CVE-2022-26505.patch 
minidlna-1.2.1+dfsg/debian/patches/CVE-2022-26505.patch
--- minidlna-1.2.1+dfsg/debian/patches/CVE-2022-26505.patch 1970-01-01 
01:00:00.0 +0100
+++ minidlna-1.2.1+dfsg/debian/patches/CVE-2022-26505.patch 2022-03-24 
22:03:02.0 +0100
@@ -0,0 +1,56 @@
+commit c21208508dbc131712281ec5340687e5ae89e940
+Author: Justin Maggard 
+Date:   Wed Feb 9 18:32:50 2022 -0800
+
+upnphttp: Protect against DNS rebinding attacks
+
+Validate HTTP requests to protect against DNS rebinding.
+
+Index: minidlna-1.2.1+dfsg/upnphttp.c
+===
+--- minidlna-1.2.1+dfsg.orig/upnphttp.c2022-03-25 00:26:07.789929728 
+0100
 minidlna-1.2.1+dfsg/upnphttp.c 2022-03-25 00:28:13.477909761 +0100
+@@ -268,6 +268,11 @@
+   p = colon + 1;
+   while(isspace(*p))
+   p++;
++n = 0;
++while(p[n] >= ' ')
++n++;
++h->req_Host = p;
++h->req_HostLen = n;
+   for(n = 0; nreq_buflen, 
h->req_buf);
++  if(h->req_Host && h->req_HostLen > 0) {
++  const char *ptr = h->req_Host;
++  DPRINTF(E_MAXDEBUG, L_HTTP, "Host: %.*s\n", h->req_HostLen, 
h->req_Host);
++  for(i = 0; i < h->req_HostLen; i++) {
++  if(*ptr != ':' && *ptr != '.' && (*ptr > '9' || *ptr < 
'0')) {
++  DPRINTF(E_ERROR, L_HTTP, "DNS rebinding attack 
suspected (Host: %.*s)", h->req_HostLen, h->req_Host);
++  Send404(h);/* 403 */
++  return;
++  }
++  ptr++;
++  }
++  }
+   if(strcmp("POST", HttpCommand) == 0)
+   {
+   h->req_command = EPost;
+Index: minidlna-1.2.1+dfsg/upnphttp.h
+===
+--- minidlna-1.2.1+dfsg.orig/upnphttp.h2022-03-25 00:26:07.789929728 
+0100
 minidlna-1.2.1+dfsg/upnphttp.h 2022-03-25 00:26:07.789929728 +0100
+@@ -89,6 +89,8 @@
+   struct client_cache_s * req_client;
+   const char * req_soapAction;
+   int req_soapActionLen;
++  const char * req_Host;/* Host: header */
++  int req_HostLen;
+   const char * req_Callback;  /* For SUBSCRIBE */
+   int req_CallbackLen;
+   const char * req_NT;
diff -Nru minidlna-1.2.1+dfsg/debian/patches/series 
minidlna-1.2.1+dfsg/debian/patches/series
--- minidlna-1.2.1+dfsg/debian/patches/series   2020-12-22 08:53:42.0 
+0100
+++ minidlna-1.2.1+dfsg/debian/patches/series   2022-03-24 22:03:02.0 
+0100
@@ -10,3 +10,5 @@
 15-use-newer-ip_multicast_if-api.patch
 0011-upnphttp-Disallow-negative-HTTP-chunk-lengths.patch
 0012-upnphttp-Validate-SUBSCRIBE-callback-URL.patch
+
+CVE-2022-26505.patch


Bug#1008578: buster-pu: golang-github-russellhaering-goxmldsig/0.0~git20170911.b7efc62-1+deb10u1

2022-03-28 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for golang-github-russellhaering-goxmldsig fixes 
CVE-2020-7711 in Buster. This CVE has been marked as no-dsa by the 
security team.


  Thorsten


golang-github-russellhaering-goxmldsig_0.0~git20170911.b7efc62-1+deb10u1.debdiff
Description: Binary data


Bug#1008577: bullseye-pu: golang-github-russellhaering-goxmldsig/1.1.0-1+deb11u1

2022-03-28 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for golang-github-russellhaering-goxmldsig fixes
CVE-2020-7711 in Bullseye. This CVE has been marked as no-dsa by the
security team.

  Thorsten
diff -Nru golang-github-russellhaering-goxmldsig-1.1.0/debian/changelog 
golang-github-russellhaering-goxmldsig-1.1.0/debian/changelog
--- golang-github-russellhaering-goxmldsig-1.1.0/debian/changelog   
2021-01-08 00:13:56.0 +0100
+++ golang-github-russellhaering-goxmldsig-1.1.0/debian/changelog   
2022-03-28 22:32:49.0 +0200
@@ -1,3 +1,12 @@
+golang-github-russellhaering-goxmldsig (1.1.0-1+deb11u1) bullseye; 
urgency=medium
+
+  * CVE-2020-7711
+null pointer dereference caused by crafted XML signatures
+(Closes: #968928)
+  * according to ratt, nothing else has to be built
+
+ -- Thorsten Alteholz   Mon, 28 Mar 2022 22:32:49 +0200
+
 golang-github-russellhaering-goxmldsig (1.1.0-1) unstable; urgency=medium
 
   * New upstream release (Closes: #971615)
diff -Nru 
golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/CVE-2020-7711.patch 
golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/CVE-2020-7711.patch
--- 
golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/CVE-2020-7711.patch 
1970-01-01 01:00:00.0 +0100
+++ 
golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/CVE-2020-7711.patch 
2022-03-24 02:38:42.0 +0100
@@ -0,0 +1,23 @@
+commit fb23e0af61c023e3a6dae8ad30dbd0f04d8a4d8f
+Merge: 3541f5e ca2b448
+Author: Russell Haering 
+Date:   Fri Aug 27 20:19:01 2021 -0700
+
+Merge pull request #71 from aporcupine/patch-1
+
+Explicitly check for case where SignatureValue is nil
+
+Index: golang-github-russellhaering-goxmldsig-1.1.0/validate.go
+===
+--- golang-github-russellhaering-goxmldsig-1.1.0.orig/validate.go  
2022-03-24 02:38:38.797524728 +0100
 golang-github-russellhaering-goxmldsig-1.1.0/validate.go   2022-03-24 
02:38:38.797524728 +0100
+@@ -271,6 +271,9 @@
+   if !bytes.Equal(digest, decodedDigestValue) {
+   return nil, errors.New("Signature could not be verified")
+   }
++  if sig.SignatureValue == nil {
++  return nil, errors.New("Signature could not be verified")
++  }
+ 
+   // Decode the 'SignatureValue' so we can compare against it
+   decodedSignature, err := 
base64.StdEncoding.DecodeString(sig.SignatureValue.Data)
diff -Nru golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/series 
golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/series
--- golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/series  
1970-01-01 01:00:00.0 +0100
+++ golang-github-russellhaering-goxmldsig-1.1.0/debian/patches/series  
2022-03-24 02:39:15.0 +0100
@@ -0,0 +1 @@
+CVE-2020-7711.patch


Bug#1007938: buster-pu: package cups/2.2.10-6+deb10u5

2022-03-19 Thread Thorsten Alteholz




On Sat, 19 Mar 2022, Adam D. Barratt wrote:

Please go ahead.


Great, thanks, ... and uploaded.

  Thorsten



Bug#1007262: bullseye-pu: package cups-filters/1.28.7-1+deb11u1

2022-03-19 Thread Thorsten Alteholz




On Sat, 19 Mar 2022, Adam D. Barratt wrote:

Please go ahead.


Great, thanks, ... and uploaded.

  Thorsten



Bug#1006494: buster-pu: htmldoc/1.9.3-1+deb10u3

2022-03-18 Thread Thorsten Alteholz




On Fri, 18 Mar 2022, Adam D. Barratt wrote:

Please go ahead.


Great, thanks, ... and uploaded.

  Thorsten



Bug#1006493: bullseye-pu: htmldoc/1.9.11-4+deb11u2

2022-03-18 Thread Thorsten Alteholz




On Tue, 15 Mar 2022, Adam D. Barratt wrote:


Control: tags -1 + confirmed

On Sat, 2022-02-26 at 10:55 +, Thorsten Alteholz wrote:

The attached debdiff for htmldoc fixes CVE-2022-0534 in Bullseye.



Please go ahead.


Great, thanks, ... and uploaded.

  Thorsten



Bug#1007938: buster-pu: package cups/2.2.10-6+deb10u5

2022-03-18 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for cups fixes CVE-2020-10001 in Buster. This CVE has 
been marked as no-dsa by the security team.


The same patch has been uploaded to Stretch already and nobody complained 
yet.


  Thorsten

diff -Nru cups-2.2.10/debian/changelog cups-2.2.10/debian/changelog
--- cups-2.2.10/debian/changelog2020-11-28 12:09:48.0 +0100
+++ cups-2.2.10/debian/changelog2022-02-23 22:03:02.0 +0100
@@ -1,3 +1,12 @@
+cups (2.2.10-6+deb10u5) buster; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-10001.patch
+An input validation issue might allow a malicious application
+to read restricted memory.
+
+ -- Thorsten Alteholz   Wed, 23 Feb 2022 22:03:02 +0100
+
 cups (2.2.10-6+deb10u4) buster; urgency=medium
 
   * Backport upstream fix:
diff -Nru cups-2.2.10/debian/.git-dpm cups-2.2.10/debian/.git-dpm
--- cups-2.2.10/debian/.git-dpm 2020-11-28 12:09:48.0 +0100
+++ cups-2.2.10/debian/.git-dpm 2022-02-23 22:03:02.0 +0100
@@ -1,6 +1,6 @@
 # see git-dpm(1) from git-dpm package
-e512765460ec633ad43872436b243021f252a69a
-e512765460ec633ad43872436b243021f252a69a
+cd650ee595b7905afba01cfe9c4479823f22704d
+cd650ee595b7905afba01cfe9c4479823f22704d
 25b2338346ef3abbb93ea88476887cba7b2b86f8
 25b2338346ef3abbb93ea88476887cba7b2b86f8
 cups_2.2.10.orig.tar.gz
diff -Nru cups-2.2.10/debian/patches/0053-CVE-2020-10001.patch 
cups-2.2.10/debian/patches/0053-CVE-2020-10001.patch
--- cups-2.2.10/debian/patches/0053-CVE-2020-10001.patch1970-01-01 
01:00:00.0 +0100
+++ cups-2.2.10/debian/patches/0053-CVE-2020-10001.patch2022-02-23 
22:03:02.0 +0100
@@ -0,0 +1,49 @@
+From cd650ee595b7905afba01cfe9c4479823f22704d Mon Sep 17 00:00:00 2001
+From: Thorsten Alteholz 
+Date: Sat, 26 Feb 2022 02:20:21 +0100
+Subject: CVE-2020-10001
+
+---
+ cups/ipp.c | 8 +---
+ 1 file changed, 5 insertions(+), 3 deletions(-)
+
+diff --git a/cups/ipp.c b/cups/ipp.c
+index 4ebb1da9c..ead8856c5 100644
+--- a/cups/ipp.c
 b/cups/ipp.c
+@@ -2870,7 +2870,8 @@ ippReadIO(void   *src,   /* I - Data 
source */
+   unsigned char   *buffer,/* Data buffer */
+   string[IPP_MAX_TEXT],
+   /* Small string buffer */
+-  *bufptr;/* Pointer into buffer */
++  *bufptr,/* Pointer into buffer */
++  *bufend;/* End of buffer */
+   ipp_attribute_t *attr;  /* Current attribute */
+   ipp_tag_t   tag;/* Current tag */
+   ipp_tag_t   value_tag;  /* Current value tag */
+@@ -3440,6 +3441,7 @@ ippReadIO(void   *src,   /* I - Data 
source */
+   }
+ 
+ bufptr = buffer;
++bufend = buffer + n;
+ 
+  /*
+   * text-with-language and name-with-language are composite
+@@ -3453,7 +3455,7 @@ ippReadIO(void   *src,   /* I - Data 
source */
+ 
+   n = (bufptr[0] << 8) | bufptr[1];
+ 
+-  if ((bufptr + 2 + n) >= (buffer + IPP_BUF_SIZE) || n >= 
(int)sizeof(string))
++  if ((bufptr + 2 + n + 2) > bufend || n >= (int)sizeof(string))
+   {
+ _cupsSetError(IPP_STATUS_ERROR_INTERNAL,
+   _("IPP language length overflows value."), 1);
+@@ -3480,7 +3482,7 @@ ippReadIO(void   *src,   /* I - Data 
source */
+ bufptr += 2 + n;
+   n = (bufptr[0] << 8) | bufptr[1];
+ 
+-  if ((bufptr + 2 + n) >= (buffer + IPP_BUF_SIZE))
++  if ((bufptr + 2 + n) > bufend)
+   {
+ _cupsSetError(IPP_STATUS_ERROR_INTERNAL,
+   _("IPP string length overflows value."), 1);
diff -Nru cups-2.2.10/debian/patches/series cups-2.2.10/debian/patches/series
--- cups-2.2.10/debian/patches/series   2020-11-28 12:09:48.0 +0100
+++ cups-2.2.10/debian/patches/series   2022-02-23 22:03:02.0 +0100
@@ -50,3 +50,4 @@
 0050-CVE-2020-3898-heap-buffer-overflow-in-libcups-s-ppdF.patch
 0051-CVE-2019-8842-The-ippReadIO-function-may-under-read-.patch
 0052-backend-scheduler-ipp.c-Fix-printer-alert-invalid-fr.patch
+0053-CVE-2020-10001.patch


Bug#1007262: bullseye-pu: package cups-filters/1.28.7-1+deb11u1

2022-03-14 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


As written in #1006183 [1] and #1005813 [2], the Debian Edu team has a 
somewhat strange handling of config files. In order to make their life a 
bit easier, they asked to add another file entry to the apparmor 
configuration of  cups-filters.

Do you mind allowing this change for Bullseye as well?

The same patch was already uploaded to Testing/Unstable and nobody 
complained yet.


  Thorsten


[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006183
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005813diff -Nru cups-filters-1.28.7/debian/apparmor/usr.sbin.cups-browsed 
cups-filters-1.28.7/debian/apparmor/usr.sbin.cups-browsed
--- cups-filters-1.28.7/debian/apparmor/usr.sbin.cups-browsed   2021-01-08 
10:40:57.0 +0100
+++ cups-filters-1.28.7/debian/apparmor/usr.sbin.cups-browsed   2022-03-14 
22:03:02.0 +0100
@@ -15,6 +15,9 @@
   /var/log/cups/* rw,
   /tmp/** rw,
 
+  # Courtesy to the Debian Edu team...
+  /etc/cups/cups-browsed-debian-edu.conf r,
+
   # Site-specific additions and overrides. See local/README for details.
   #include 
 }
diff -Nru cups-filters-1.28.7/debian/changelog 
cups-filters-1.28.7/debian/changelog
--- cups-filters-1.28.7/debian/changelog2021-01-08 10:40:57.0 
+0100
+++ cups-filters-1.28.7/debian/changelog2022-03-14 22:03:02.0 
+0100
@@ -1,3 +1,12 @@
+cups-filters (1.28.7-1+deb11u1) bullseye; urgency=medium
+
+  * debian/apparmor/usr.sbin.cups-browsed: Allow reading from Debian Edu's
+cups-browsed config file (/etc/cups/cups-browsed-debian-edu.conf).
+(Closes: #1006183). (patch provided by Mike Gabriel)
+  * debian/control: add myself to Uploaders:
+
+ -- Thorsten Alteholz   Mon, 14 Mar 2022 22:03:02 +0100
+
 cups-filters (1.28.7-1) unstable; urgency=medium
 
   * 1.28.7 upstream release
diff -Nru cups-filters-1.28.7/debian/control cups-filters-1.28.7/debian/control
--- cups-filters-1.28.7/debian/control  2021-01-08 10:40:57.0 +0100
+++ cups-filters-1.28.7/debian/control  2022-03-14 22:03:02.0 +0100
@@ -1,7 +1,8 @@
 Source: cups-filters
 Maintainer: Debian Printing Team 
 Uploaders: Till Kamppeter ,
-   Didier Raboud 
+   Didier Raboud ,
+   Thorsten Alteholz 
 Section: net
 Priority: optional
 Build-Depends: autoconf,


Bug#1006494: buster-pu: htmldoc/1.9.3-1+deb10u3

2022-02-26 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for htmldoc fixes CVE-2022-0534, CVE-2021-43579 and 
CVE-2021-40985 in Buster. These CVEs are marked as uninportant by the 
security team, yet they are bugs. CVE-2021-43579 even has the possibility 
of remote code execution.


  Thorsten

diff -Nru htmldoc-1.9.3/debian/changelog htmldoc-1.9.3/debian/changelog
--- htmldoc-1.9.3/debian/changelog  2021-06-07 16:25:54.0 +0200
+++ htmldoc-1.9.3/debian/changelog  2022-02-25 22:03:02.0 +0100
@@ -1,3 +1,19 @@
+htmldoc (1.9.3-1+deb10u3) buster; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2022-0534
+A crafted GIF file could lead to a stack out-of-bounds read,
+which could result in a crash (segmentation fault).
+  * CVE-2021-43579
+Converting an HTML document, which links to a crafted BMP file,
+could lead to a stack-based buffer overflow, which could result
+in remote code execution.
+  * CVE-2021-40985
+A crafted BMP image could lead to a buffer overflow, which could
+cause a denial of service.
+
+ -- Thorsten Alteholz   Fri, 25 Feb 2022 22:03:02 +0100
+
 htmldoc (1.9.3-1+deb10u2) buster-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru htmldoc-1.9.3/debian/patches/CVE-2021-40985.patch 
htmldoc-1.9.3/debian/patches/CVE-2021-40985.patch
--- htmldoc-1.9.3/debian/patches/CVE-2021-40985.patch   1970-01-01 
01:00:00.0 +0100
+++ htmldoc-1.9.3/debian/patches/CVE-2021-40985.patch   2022-02-25 
22:03:02.0 +0100
@@ -0,0 +1,38 @@
+commit f12b9666e582a8e7b70f11b28e5ffc49ad625d43
+Author: Michael R Sweet 
+Date:   Sat Sep 11 18:12:33 2021 -0400
+
+Fix BMP crash bug (Issue #444)
+
+Index: htmldoc-1.9.3/htmldoc/image.cxx
+===
+--- htmldoc-1.9.3.orig/htmldoc/image.cxx   2022-02-26 01:01:53.117543638 
+0100
 htmldoc-1.9.3/htmldoc/image.cxx2022-02-26 01:01:53.117543638 +0100
+@@ -900,6 +900,9 @@
+   colors_used  = (int)read_dword(fp);
+   read_dword(fp);
+ 
++  if (img->width <= 0 || img->width > 8192 || img->height <= 0 || img->height 
> 8192)
++return (-1);
++
+   if (info_size > 40)
+ for (info_size -= 40; info_size > 0; info_size --)
+   getc(fp);
+@@ -911,7 +914,7 @@
+   fread(colormap, (size_t)colors_used, 4, fp);
+ 
+   // Setup image and buffers...
+-  img->depth  = gray ? 1 : 3;
++  img->depth = gray ? 1 : 3;
+ 
+   // If this image is indexed and we are writing an encrypted PDF file, bump 
the use count so
+   // we create an image object (Acrobat 6 bug workaround)
+@@ -1061,7 +1064,7 @@
+ if (bit == 0xf0)
+   {
+   if (color < 0)
+-  temp = getc(fp);
++  temp = getc(fp) & 255;
+ else
+   temp = color;
+ 
diff -Nru htmldoc-1.9.3/debian/patches/CVE-2021-43579.patch 
htmldoc-1.9.3/debian/patches/CVE-2021-43579.patch
--- htmldoc-1.9.3/debian/patches/CVE-2021-43579.patch   1970-01-01 
01:00:00.0 +0100
+++ htmldoc-1.9.3/debian/patches/CVE-2021-43579.patch   2022-02-25 
22:03:02.0 +0100
@@ -0,0 +1,27 @@
+commit 27d08989a5a567155d506ac870ae7d8cc88fa58b
+Author: Michael R Sweet 
+Date:   Fri Nov 5 09:35:10 2021 -0400
+
+Fix potential BMP stack overflow (Issue #453)
+
+Index: htmldoc-1.9.3/htmldoc/image.cxx
+===
+--- htmldoc-1.9.3.orig/htmldoc/image.cxx   2022-02-26 01:02:38.045520508 
+0100
 htmldoc-1.9.3/htmldoc/image.cxx2022-02-26 01:02:38.045520508 +0100
+@@ -904,12 +904,16 @@
+ return (-1);
+ 
+   if (info_size > 40)
++  {
+ for (info_size -= 40; info_size > 0; info_size --)
+   getc(fp);
++  }
+ 
+   // Get colormap...
+   if (colors_used == 0 && depth <= 8)
+ colors_used = 1 << depth;
++  else if (colors_used > 256)
++return (-1);
+ 
+   fread(colormap, (size_t)colors_used, 4, fp);
+ 
diff -Nru htmldoc-1.9.3/debian/patches/CVE-2022-0534-1.patch 
htmldoc-1.9.3/debian/patches/CVE-2022-0534-1.patch
--- htmldoc-1.9.3/debian/patches/CVE-2022-0534-1.patch  1970-01-01 
01:00:00.0 +0100
+++ htmldoc-1.9.3/debian/patches/CVE-2022-0534-1.patch  2022-02-25 
22:03:02.0 +0100
@@ -0,0 +1,38 @@
+commit 776cf0fc4c760f1fb7b966ce28dc92dd7d44ed50
+Author: Michael R Sweet 
+Date:   Fri Jan 7 10:21:58 2022 -0500
+
+Fix potential stack overflow with GIF images (Issue #463)
+
+Index: htmldoc-1.9.3/htmldoc/image.cxx
+===
+--- htmldoc-1.9.3.orig/htmldoc/image.cxx   2022-02-26 01:03:05.161506575 
+0100
 htmldoc-1.9.3/htmldoc/image.cxx2022-02-26 01:03:05.161506575 +0100
+@@ -213,8 +213,7 @@
+ 
+ if (done)
+ {
+-  progress_error(HD_ERROR_READ_ERROR,
+- "No

Bug#1006493: bullseye-pu: htmldoc/1.9.11-4+deb11u2

2022-02-26 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bulleye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for htmldoc fixes CVE-2022-0534 in Bullseye. This
CVE has been marked as uninportant by the security team, yet it is a bug.

  Thorsten
diff -Nru htmldoc-1.9.11/debian/changelog htmldoc-1.9.11/debian/changelog
--- htmldoc-1.9.11/debian/changelog 2021-11-15 17:13:36.0 +0100
+++ htmldoc-1.9.11/debian/changelog 2022-02-25 22:03:02.0 +0100
@@ -1,3 +1,12 @@
+htmldoc (1.9.11-4+deb11u2) bullseye; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2022-0534
+A crafted GIF file could lead to a stack out-of-bounds read,
+which could result in a crash (segmentation fault).
+
+ -- Thorsten Alteholz   Fri, 25 Feb 2022 22:03:02 +0100
+
 htmldoc (1.9.11-4+deb11u1) bullseye; urgency=medium
 
   * Add patch from upstream to fix CVEs:
diff -Nru htmldoc-1.9.11/debian/patches/CVE-2022-0534-1.patch 
htmldoc-1.9.11/debian/patches/CVE-2022-0534-1.patch
--- htmldoc-1.9.11/debian/patches/CVE-2022-0534-1.patch 1970-01-01 
01:00:00.0 +0100
+++ htmldoc-1.9.11/debian/patches/CVE-2022-0534-1.patch 2022-02-25 
22:03:02.0 +0100
@@ -0,0 +1,38 @@
+commit 776cf0fc4c760f1fb7b966ce28dc92dd7d44ed50
+Author: Michael R Sweet 
+Date:   Fri Jan 7 10:21:58 2022 -0500
+
+Fix potential stack overflow with GIF images (Issue #463)
+
+Index: htmldoc-1.9.11/htmldoc/image.cxx
+===
+--- htmldoc-1.9.11.orig/htmldoc/image.cxx  2022-02-26 01:11:08.773261658 
+0100
 htmldoc-1.9.11/htmldoc/image.cxx   2022-02-26 01:11:08.773261658 +0100
+@@ -213,8 +213,7 @@
+ 
+ if (done)
+ {
+-  progress_error(HD_ERROR_READ_ERROR,
+- "Not enough data left to read GIF compression code.");
++  progress_error(HD_ERROR_READ_ERROR, "Not enough data left to read GIF 
compression code.");
+   return (-1);/* Sorry, no more... */
+ }
+ 
+@@ -238,7 +237,7 @@
+ * Read in another buffer...
+ */
+ 
+-if ((count = gif_get_block (fp, buf + last_byte)) <= 0)
++if ((count = gif_get_block(fp, buf + last_byte)) <= 0)
+ {
+  /*
+   * Whoops, no more data!
+@@ -252,7 +251,7 @@
+ * Update buffer state...
+ */
+ 
+-curbit= (curbit - lastbit) + 8 * last_byte;
++curbit= curbit + 8 * last_byte - lastbit;
+ last_byte += (unsigned)count;
+ lastbit   = last_byte * 8;
+   }
diff -Nru htmldoc-1.9.11/debian/patches/CVE-2022-0534-2.patch 
htmldoc-1.9.11/debian/patches/CVE-2022-0534-2.patch
--- htmldoc-1.9.11/debian/patches/CVE-2022-0534-2.patch 1970-01-01 
01:00:00.0 +0100
+++ htmldoc-1.9.11/debian/patches/CVE-2022-0534-2.patch 2022-02-25 
22:03:02.0 +0100
@@ -0,0 +1,32 @@
+commit 312f0f9c12f26fbe015cd0e6cefa40e4b99017d9
+Author: Michael R Sweet 
+Date:   Fri Jan 7 18:21:53 2022 -0500
+
+Block GIF images with a code size > 12 (Issue #463)
+
+Index: htmldoc-1.9.11/htmldoc/image.cxx
+===
+--- htmldoc-1.9.11.orig/htmldoc/image.cxx  2022-02-26 01:11:13.177259451 
+0100
 htmldoc-1.9.11/htmldoc/image.cxx   2022-02-26 01:11:13.173259454 +0100
+@@ -293,6 +293,12 @@
+   pass  = 0;
+   code_size = (uchar)getc(fp);
+ 
++  if (code_size > 12)
++  {
++progress_error(HD_ERROR_READ_ERROR, "Bad GIF file \"%s\" - invalid code 
size %d.", img->filename, code_size);
++return (-1);
++  }
++
+   if (gif_read_lzw(fp, 1, code_size) < 0)
+ return (-1);
+ 
+@@ -420,7 +426,7 @@
+   if (sp > stack)
+ return (*--sp);
+ 
+-  while ((code = gif_get_code (fp, code_size, 0)) >= 0)
++  while ((code = gif_get_code(fp, code_size, 0)) >= 0)
+   {
+ if (code == clear_code)
+ {
diff -Nru htmldoc-1.9.11/debian/patches/series 
htmldoc-1.9.11/debian/patches/series
--- htmldoc-1.9.11/debian/patches/series2021-11-15 17:13:36.0 
+0100
+++ htmldoc-1.9.11/debian/patches/series2022-02-25 22:03:02.0 
+0100
@@ -14,3 +14,7 @@
 CVE-2021-26948.patch
 CVE-2021-40985.patch
 CVE-2021-43579.patch
+
+CVE-2022-0534-1.patch
+CVE-2022-0534-2.patch
+


Bug#1004049: Bug#1004050: bullseye-pu: package zziplib/0.13.62-3.3+deb11u1.debdiff

2022-02-20 Thread Thorsten Alteholz

Hi Adam,

On 19.02.22 20:11, Adam D. Barratt wrote:


Please go ahead.


ok, thanks, uploaded.
While being at it, I also uploaded zziplib/0.13.62-3.2+deb10u1 which is 
handled by #1004049.

I hope you don't mind.

  Thorsten



Bug#1004055: buster-pu: package raptor2/2.0.14-1.1~deb10u2

2022-02-20 Thread Thorsten Alteholz

ok, thanks, uploaded.

  Thorsten



Bug#1004056: buster-pu: package libsdl1.2/1.2.15+dfsg2-4+deb10u1

2022-01-19 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libsdl1.2 fixes lots of CVEs in Buster. These 
CVEs are marked as no-dsa by the security team.


The same patches are uploaded to Stretch already and nobody complained 
yet.


  Thorstendiff -Nru libsdl1.2-1.2.15+dfsg2/debian/changelog 
libsdl1.2-1.2.15+dfsg2/debian/changelog
--- libsdl1.2-1.2.15+dfsg2/debian/changelog 2018-10-25 01:47:02.0 
+0200
+++ libsdl1.2-1.2.15+dfsg2/debian/changelog 2022-01-19 23:03:02.0 
+0100
@@ -1,3 +1,34 @@
+libsdl1.2 (1.2.15+dfsg2-4+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2019-7572: Buffer over-read in IMA_ADPCM_nibble
+in audio/SDL_wave.c.
+  * CVE-2019-7573: Heap-based buffer over-read in InitMS_ADPCM
+in audio/SDL_wave.c.
+  * CVE-2019-7574: Heap-based buffer over-read in IMA_ADPCM_decode
+in audio/SDL_wave.c.
+  * CVE-2019-7575: Heap-based buffer overflow in MS_ADPCM_decode
+in audio/SDL_wave.c.
+  * CVE-2019-7576: Heap-based buffer over-read in InitMS_ADPCM
+in audio/SDL_wave.c.
+  * CVE-2019-7577: Buffer over-read in SDL_LoadWAV_RW
+in audio/SDL_wave.c.
+  * CVE-2019-7578: Heap-based buffer over-read in InitIMA_ADPCM
+in audio/SDL_wave.c.
+  * CVE-2019-7635: Heap-based buffer over-read in Blit1to4
+in video/SDL_blit_1.c.
+  * CVE-2019-7636: Heap-based buffer over-read in SDL_GetRGB
+in video/SDL_pixels.c.
+  * CVE-2019-7637: Heap-based buffer overflow in SDL_FillRect
+in video/SDL_surface.c.
+  * CVE-2019-7638: Heap-based buffer over-read in Map1toN
+in video/SDL_pixels.c.
+  * CVE-2019-13616: Heap-based buffer over-read in BlitNtoN
+in video/SDL_blit_N.c.
+(patches prepared for LTS by Adrian Bunk)
+
+ -- Thorsten Alteholz   Wed, 19 Jan 2022 23:03:02 +0100
+
 libsdl1.2 (1.2.15+dfsg2-4) unstable; urgency=medium
 
   * d/rules: Add @ in 'tar --mtime="@$(SOURCE_DATE_EPOCH)"', otherwise the
diff -Nru libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-13616.patch 
libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-13616.patch
--- libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-13616.patch  1970-01-01 
01:00:00.0 +0100
+++ libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-13616.patch  2021-11-21 
11:28:17.0 +0100
@@ -0,0 +1,22 @@
+# HG changeset patch
+# User Ozkan Sezer 
+# Date 1564511424 -10800
+# Node ID ad1bbfbca760cbf5bf8131580b24637e5e7d9411
+# Parent  87d60cae0273307b2721685daf3265de5dfda634
+Fixed bug 4538 - validate image size when loading BMP files
+
+diff -r 87d60cae0273 -r ad1bbfbca760 src/video/SDL_bmp.c
+--- a/src/video/SDL_bmp.c  Tue Jun 18 23:31:40 2019 +0100
 b/src/video/SDL_bmp.c  Tue Jul 30 21:30:24 2019 +0300
+@@ -143,6 +143,11 @@
+   (void) biYPelsPerMeter;
+   (void) biClrImportant;
+ 
++  if (biWidth <= 0 || biHeight == 0) {
++  SDL_SetError("BMP file with bad dimensions (%dx%d)", biWidth, 
biHeight);
++  was_error = SDL_TRUE;
++  goto done;
++  }
+   if (biHeight < 0) {
+   topDown = SDL_TRUE;
+   biHeight = -biHeight;
diff -Nru 
libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-7572_CVE-2019-7574.patch 
libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-7572_CVE-2019-7574.patch
--- libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-7572_CVE-2019-7574.patch 
1970-01-01 01:00:00.0 +0100
+++ libsdl1.2-1.2.15+dfsg2/debian/patches/CVE-2019-7572_CVE-2019-7574.patch 
2021-11-21 11:28:17.0 +0100
@@ -0,0 +1,105 @@
+Description: CVE-2019-7572, CVE-2019-7574
+ CVE-2019-7572: a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.
+ CVE-2019-7574: a heap-based buffer over-read in IMA_ADPCM_decode in 
audio/SDL_wave.c.
+
+---
+Author: Abhijith PA 
+Origin: https://bugzilla-attachments.libsdl.org/attachment.cgi?id=3610
+https://bugzilla.libsdl.org/attachment.cgi?id=3612
+https://bugzilla.libsdl.org/attachment.cgi?id=3618
+Bug: https://bugzilla.libsdl.org/show_bug.cgi?id=4496
+ https://bugzilla.libsdl.org/show_bug.cgi?id=4495
+Last-Update: <2018-03-05>
+
+Index: libsdl1.2-1.2.15/src/audio/SDL_wave.c
+===
+--- libsdl1.2-1.2.15.orig/src/audio/SDL_wave.c
 libsdl1.2-1.2.15/src/audio/SDL_wave.c
+@@ -264,6 +264,14 @@ static Sint32 IMA_ADPCM_nibble(struct IM
+   };
+   Sint32 delta, step;
+ 
++  /* Clamp index value. The inital value can be invalid. */
++  if ( state->index > 88 ) {
++  state->index = 88;
++  } else
++  if ( state->index < 0 ) {
++  state->index = 0;
++  }
++
+   /* Compute difference and new sample value */
+   step = step_table[state->index];
+   delta = step >> 3;
+@@ -275,12 +283,6 @@ static Sint32 IMA_ADPCM_nibble(struct IM
+ 
+   /* Update index value */
+   sta

Bug#1004055: buster-pu: package raptor2/2.0.14-1.1~deb10u2

2022-01-19 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for raptor2 fixes CVE-2020-25713 in Buster. This CVE 
is marked as no-dsa by the security team.


The same patch is uploaded to Stretch already and nobody complained yet.

  Thorstendiff -Nru raptor2-2.0.14/debian/changelog raptor2-2.0.14/debian/changelog
--- raptor2-2.0.14/debian/changelog 2020-11-06 22:46:38.0 +0100
+++ raptor2-2.0.14/debian/changelog 2021-12-27 22:03:02.0 +0100
@@ -1,3 +1,11 @@
+raptor2 (2.0.14-1.1~deb10u2) buster; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-25713
+Malformed input file can lead to a segfault.
+
+ -- Thorsten Alteholz   Mon, 27 Dec 2021 22:03:02 +0100
+
 raptor2 (2.0.14-1.1~deb10u1) buster-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru 
raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch
 
raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch
--- 
raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch
1970-01-01 01:00:00.0 +0100
+++ 
raptor2-2.0.14/debian/patches/CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch
2021-12-27 22:03:02.0 +0100
@@ -0,0 +1,30 @@
+From a549457461874157c8c8e8e8a6e0eec06da4fbd0 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= 
+Date: Tue, 24 Nov 2020 10:30:20 +
+Subject: [PATCH] CVE-2020-25713 raptor2: malformed input file can lead to a
+ segfault
+
+due to an out of bounds array access in
+raptor_xml_writer_start_element_common
+
+See:
+https://bugs.mageia.org/show_bug.cgi?id=27605
+https://www.openwall.com/lists/oss-security/2020/11/13/1
+https://gerrit.libreoffice.org/c/core/+/106249
+---
+ src/raptor_xml_writer.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+Index: raptor2-2.0.14/src/raptor_xml_writer.c
+===
+--- raptor2-2.0.14.orig/src/raptor_xml_writer.c2021-12-29 
23:35:29.272438731 +0100
 raptor2-2.0.14/src/raptor_xml_writer.c 2021-12-29 23:35:29.272438731 
+0100
+@@ -221,7 +221,7 @@
+   
+   /* check it wasn't an earlier declaration too */
+   for(j = 0; j < nspace_declarations_count; j++)
+-if(nspace_declarations[j].nspace == 
element->attributes[j]->nspace) {
++if(nspace_declarations[j].nspace == 
element->attributes[i]->nspace) {
+   declare_me = 0;
+   break;
+ }
diff -Nru raptor2-2.0.14/debian/patches/series 
raptor2-2.0.14/debian/patches/series
--- raptor2-2.0.14/debian/patches/series2020-11-06 22:46:38.0 
+0100
+++ raptor2-2.0.14/debian/patches/series2021-12-27 22:03:02.0 
+0100
@@ -1 +1,2 @@
 Calcualte-max-nspace-declarations-correctly-for-XML-.patch
+CVE-2020-25713-raptor2-malformed-input-file-can-lead.patch


Bug#1004049: buster-pu: package zziplib/0.13.62-3.2+deb10u1

2022-01-19 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for zziplib fixes CVE-2020-18442 in Buster. This CVE 
is marked as no-dsa by the security team.


The same patch is uploaded to Stretch already and nobody complained yet.

  Thorsten
diff -Nru zziplib-0.13.62/debian/changelog zziplib-0.13.62/debian/changelog
--- zziplib-0.13.62/debian/changelog2019-03-04 22:43:14.0 +0100
+++ zziplib-0.13.62/debian/changelog2021-12-26 00:03:02.0 +0100
@@ -1,3 +1,12 @@
+zziplib (0.13.62-3.2+deb10u1) buster; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2020-18442
+Because of mishandling a return value, an attacker might cause a
+denial of service due to an infinite loop.
+
+ -- Thorsten Alteholz   Sun, 26 Dec 2021 00:03:02 +0100
+
 zziplib (0.13.62-3.2) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru zziplib-0.13.62/debian/patches/CVE-2020-18442-2.patch 
zziplib-0.13.62/debian/patches/CVE-2020-18442-2.patch
--- zziplib-0.13.62/debian/patches/CVE-2020-18442-2.patch   1970-01-01 
01:00:00.0 +0100
+++ zziplib-0.13.62/debian/patches/CVE-2020-18442-2.patch   2021-12-26 
00:03:02.0 +0100
@@ -0,0 +1,28 @@
+commit 7e786544084548da7fcfcd9090d3c4e7f5777f7e
+Author: Guido Draheim 
+Date:   Mon Jan 4 21:50:26 2021 +0100
+
+#68 return value of zzip_mem_disk_fread is signed
+
+Index: zziplib-0.13.62/bins/unzip-mem.c
+===
+--- zziplib-0.13.62.orig/bins/unzip-mem.c  2021-12-26 00:59:28.017867652 
+0100
 zziplib-0.13.62/bins/unzip-mem.c   2021-12-26 00:59:28.013867656 +0100
+@@ -90,7 +90,7 @@
+ if (file) 
+ {
+   char buffer[1024]; int len;
+-  while ((len = zzip_mem_disk_fread (buffer, 1024, 1, file)))
++  while (0 < (len = zzip_mem_disk_fread (buffer, 1024, 1, file)))
+   fwrite (buffer, len, 1, out);
+   
+   zzip_mem_disk_fclose (file);
+@@ -124,7 +124,7 @@
+ {
+   unsigned long crc = crc32 (0L, NULL, 0);
+   unsigned char buffer[1024]; int len; 
+-  while ((len = zzip_mem_disk_fread (buffer, 1024, 1, file))) {
++  while (0 < (len = zzip_mem_disk_fread (buffer, 1024, 1, file))) {
+   crc = crc32 (crc, buffer, len);
+   }
+   
diff -Nru zziplib-0.13.62/debian/patches/CVE-2020-18442-4.patch 
zziplib-0.13.62/debian/patches/CVE-2020-18442-4.patch
--- zziplib-0.13.62/debian/patches/CVE-2020-18442-4.patch   1970-01-01 
01:00:00.0 +0100
+++ zziplib-0.13.62/debian/patches/CVE-2020-18442-4.patch   2021-12-26 
00:03:02.0 +0100
@@ -0,0 +1,28 @@
+commit 0a9db9ded9d15fbdb63bf5cf451920d0a368c00e
+Author: Guido Draheim 
+Date:   Mon Jan 4 21:51:56 2021 +0100
+
+#68 return value of zzip_mem_disk_fread is signed
+
+Index: zziplib-0.13.62/bins/unzzipcat-mem.c
+===
+--- zziplib-0.13.62.orig/bins/unzzipcat-mem.c  2021-12-26 00:59:59.133843763 
+0100
 zziplib-0.13.62/bins/unzzipcat-mem.c   2021-12-26 00:59:59.129843767 
+0100
+@@ -40,7 +40,7 @@
+ if (file) 
+ {
+   char buffer[1024]; int len;
+-  while ((len = zzip_mem_disk_fread (buffer, 1024, 1, file)))
++  while (0 < (len = zzip_mem_disk_fread (buffer, 1024, 1, file)))
+   fwrite (buffer, len, 1, out);
+   
+   zzip_mem_disk_fclose (file);
+@@ -53,7 +53,7 @@
+ if (file) 
+ {
+   char buffer[1024]; int len;
+-  while ((len = zzip_mem_disk_fread (buffer, 1, 1024, file))) 
++  while (0 < (len = zzip_mem_disk_fread (buffer, 1, 1024, file))) 
+   {
+   fwrite (buffer, 1, len, out);
+   }
diff -Nru zziplib-0.13.62/debian/patches/series 
zziplib-0.13.62/debian/patches/series
--- zziplib-0.13.62/debian/patches/series   2019-03-04 22:43:14.0 
+0100
+++ zziplib-0.13.62/debian/patches/series   2021-12-26 00:03:02.0 
+0100
@@ -17,3 +17,8 @@
 Avoid-memory-leak-from-__zzip_parse_root_directory-1.patch
 Avoid-memory-leak-from-__zzip_parse_root_directory-2.patch
 One-more-free-to-avoid-memory-leak.patch
+
+# not all of the seven patches mentioned in the security tracker
+# for this CVE are needed in every release
+CVE-2020-18442-2.patch
+CVE-2020-18442-4.patch


  1   2   >