Your message dated Sun, 06 Apr 2025 00:00:11 +0000
with message-id <e1u1dqp-00azs2...@fasolo.debian.org>
and subject line Bug#1101318: fixed in golang-github-awnumar-memguard 0.22.5-1
has caused the Debian Bug report #1101318,
regarding ITP: golang-github-awnumar-memguard -- Secure software enclave for 
storage of sensitive information in memory.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1101318: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101318
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Simon Josefsson <si...@josefsson.org>

* Package name    : golang-github-awnumar-memguard
  Version         : 0.22.5-1
  Upstream Author : Awn
* URL             : https://github.com/awnumar/memguard
* License         : Apache-2.0
  Programming Lang: Go
  Description     : Secure software enclave for storage of sensitive 
information in memory.

 This package attempts to reduce the likelihood of sensitive data being
 exposed when in memory. It aims to support all major operating systems
 and is written in pure Go.
 .
 Features
 .
  * Sensitive data is encrypted and authenticated in memory with
    XSalsa20Poly1305. The scheme (https://spacetime.dev/encrypting-secrets-in-
    memory) used also defends against cold-boot attacks
    (https://spacetime.dev/memory-retention-attacks).
  * Memory allocation bypasses the language runtime by using system calls
    (https://github.com/awnumar/memcall) to query the kernel for resources
    directly. This avoids interference from the garbage-collector.
  * Buffers that store plaintext data are fortified with guard pages and
    canary values to detect spurious accesses and overflows.
  * Effort is taken to prevent sensitive data from touching the disk.
    This includes locking memory to prevent swapping and handling core
    dumps.
  * Kernel-level immutability is implemented so that attempted
    modification of protected regions results in an access violation.
  * Multiple endpoints provide session purging and safe termination
    capabilities as well as signal handling to prevent remnant data being
    left behind.
  * Side-channel attacks are mitigated against by making sure that the
    copying and comparison of data is done in constant-time.

https://salsa.debian.org/go-team/packages/golang-github-awnumar-memguard
https://salsa.debian.org/jas/golang-github-awnumar-memcall/-/pipelines

/Simon

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: golang-github-awnumar-memguard
Source-Version: 0.22.5-1
Done: Simon Josefsson <si...@josefsson.org>

We believe that the bug you reported is fixed in the latest version of
golang-github-awnumar-memguard, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1101...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon Josefsson <si...@josefsson.org> (supplier of updated 
golang-github-awnumar-memguard package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 31 Mar 2025 14:19:37 +0200
Source: golang-github-awnumar-memguard
Binary: golang-github-awnumar-memguard-dev
Architecture: source all
Version: 0.22.5-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team <team+pkg...@tracker.debian.org>
Changed-By: Simon Josefsson <si...@josefsson.org>
Description:
 golang-github-awnumar-memguard-dev - secure enclave for storage of sensitive 
information (library)
Closes: 1101318
Changes:
 golang-github-awnumar-memguard (0.22.5-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1101318)
Checksums-Sha1:
 3dba545567a39999eae4ce3046a3cf267e5b2432 2786 
golang-github-awnumar-memguard_0.22.5-1.dsc
 416a18173778accdb08534b312f194e5698a0bad 75201 
golang-github-awnumar-memguard_0.22.5.orig.tar.gz
 32de0fa3c16d22dcc1cdb97eb3342a63189db528 3964 
golang-github-awnumar-memguard_0.22.5-1.debian.tar.xz
 52d9f1786307ebce2fdd8d30456ddb5ae91ba626 24960 
golang-github-awnumar-memguard-dev_0.22.5-1_all.deb
 78d2368fedf981c329fed6aa70c2d9f66afe05e7 6576 
golang-github-awnumar-memguard_0.22.5-1_amd64.buildinfo
Checksums-Sha256:
 a29a0750d59580320e92008005f2ad491ee66fece2479609f2f0eb74b046e319 2786 
golang-github-awnumar-memguard_0.22.5-1.dsc
 ce8e1f1138add095a4f2f4e210de4bfaa30a58f599d9638bea7ef0019b1735a2 75201 
golang-github-awnumar-memguard_0.22.5.orig.tar.gz
 7d9ef73ce9b6a027e7f38069649feb9f974f1dd1540bfb32e9d442a44a171d32 3964 
golang-github-awnumar-memguard_0.22.5-1.debian.tar.xz
 09a3ed73ecd8b24e9c17dbd8f6280d265c1faaaa1fdcde17b289bed6745d5826 24960 
golang-github-awnumar-memguard-dev_0.22.5-1_all.deb
 b75b5f3f80259b3b9798ef46fbcb1e9c38c2fa92ee3ca6a371a4c8f669210649 6576 
golang-github-awnumar-memguard_0.22.5-1_amd64.buildinfo
Files:
 cf917a91ef5e5de1b2fed14f2433c243 2786 golang optional 
golang-github-awnumar-memguard_0.22.5-1.dsc
 d26662a27a9538d793c694f35f727567 75201 golang optional 
golang-github-awnumar-memguard_0.22.5.orig.tar.gz
 c8b4514da648a5dc46a1cd36f4dd8ffb 3964 golang optional 
golang-github-awnumar-memguard_0.22.5-1.debian.tar.xz
 a7c11fb66438720d08cbb3424fdd119b 24960 golang optional 
golang-github-awnumar-memguard-dev_0.22.5-1_all.deb
 7c6ef9f9ddee8666ff83b27659aac0ed 6576 golang optional 
golang-github-awnumar-memguard_0.22.5-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQNoBAEWCgMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmfqij4UHHNpbW9uQGpv
c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f
V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z
ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh
BLHSvRN1vst4TPT4xNc89jjFPAa+BQJn0XQkBQkNZGbwAAoJENc89jjFPAa+BtIA
/iR73CfBurG9y8pASh3cbGOMHpDZfMAtosu6jbpO69GHAP4p7l57d+iVty2VQMsx
+3TCSAvZkpr4P/FuTzZ8JZe8BrgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx
I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0
+MTXPPY4xTwGvgUCZ9F0SgUJDWRmSQCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R
cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE
8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J
ENc89jjFPAa+wUUBAO64fbZek6FPlRK0DrlWsrjCXuLi6PUxyzCAY6lG2nhUAQC6
qobB9mkZlZ0qihy1x4JRtflqFcqqT9n7iUZkCDIiDbg4BFySz2oSCisGAQQBl1UB
BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA
JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJn0XTSBQkNZGboAAoJENc89jjF
PAa+0M0BAPPRq73kLnHYNDMniVBOzUdi2XeF32idjEWWfjvyIJUOAP4wZ+ALxIeh
is3Uw2BzGZE6ttXQ2Q+DeCJO3TPpIqaXDAAKCRBRcisI/kdFomOkAQDjnzmc/Fps
Uy3VhdsaCzULW22YFiLXTiwUZX1QWmDawgEAvMG3cPCln7zTCB/+xruYoohpsA0G
gvYc+5x/kewrWQw=
=prSW
-----END PGP SIGNATURE-----

Attachment: pgpn3KQ4qldvV.pgp
Description: PGP signature


--- End Message ---

Reply via email to