Bug#950816: mpv: unintended code execution vulnerability

2020-02-14 Thread astian
Control: tags -1 + patch
Control: found -1 mpv/0.29.1-1

FYI, the patch below works for me.

Also, I think the version in stable is also affected.  The code differs
slightly so the patch will need a little tweak.

Cheers.

-- 

>From 937749b545407aa68b1d15ea5e19a6c23d62da42 Mon Sep 17 00:00:00 2001
From: astian 
Date: Mon, 11 Feb 2020 21:08:51 +
Subject: [PATCH] lua: fix unintended code execution vulnerability

Backport of upstream commit cce7062a8a6b6a3b3666aea3ff86db879cba67b6
("lua: fix highly security relevant arbitrary code execution") to
release 0.32.0.

Note:  Before release 0.32.0, it used to be that mpv-related scripts
directories where added to Lua's module-loaders search path.  This
behaviour was dropped in 0.32.0 (bc1c024ae032).  Later, a similar but
stricter behaviour was introduced (see da38caff9c0b and b86bfc907f9c).
The original commit on which this patch is based depended on the new
behaviour.  This backport retains the 0.32.0 behaviour; all it does is
filter out relative paths from "package.path" and "package.cpath" for
all Lua scripts.
---
 player/lua.c | 34 ++
 1 file changed, 34 insertions(+)

diff --git a/player/lua.c b/player/lua.c
index 6423861..172ab4e 100644
--- a/player/lua.c
+++ b/player/lua.c
@@ -273,6 +273,36 @@ static int load_scripts(lua_State *L)
 return 0;
 }
 
+static void fuck_lua(lua_State *L, const char *search_path)
+{
+void *tmp = talloc_new(NULL);
+
+lua_getglobal(L, "package"); // package
+lua_getfield(L, -1, search_path); // package search_path
+bstr path = bstr0(lua_tostring(L, -1));
+char *newpath = talloc_strdup(tmp, "");
+
+// Unbelievable but true: Lua loads .lua files AND dynamic libraries from
+// the working directory. This is highly security relevant.
+// Lua scripts are still supposed to load globally installed libraries, so
+// try to get by by filtering out any relative paths.
+while (path.len) {
+bstr item;
+bstr_split_tok(path, ";", , );
+if (bstr_startswith0(item, "/")) {
+newpath = talloc_asprintf_append(newpath, "%s%.*s",
+ newpath[0] ? ";" : "",
+ BSTR_P(item));
+}
+}
+
+lua_pushstring(L, newpath);  // package search_path newpath
+lua_setfield(L, -3, search_path); // package search_path
+lua_pop(L, 2);  // -
+
+talloc_free(tmp);
+}
+
 static int run_lua(lua_State *L)
 {
 struct script_ctx *ctx = lua_touserdata(L, -1);
@@ -326,6 +356,10 @@ static int run_lua(lua_State *L)
 
 assert(lua_gettop(L) == 0);
 
+fuck_lua(L, "path");
+fuck_lua(L, "cpath");
+assert(lua_gettop(L) == 0);
+
 // run this under an error handler that can do backtraces
 lua_pushcfunction(L, error_handler); // errf
 lua_pushcfunction(L, load_scripts); // errf fn
-- 
2.25.0



Bug#951236: osmnx fails the remote autopkg test (access blocked)

2020-02-14 Thread Jerome BENOIT
Dear Matthias, thanks for your report.
I have just send an email to the Nominatim system administrator
to see what we can do.
Best,
Jerome

-- 
Jerome BENOIT | calculus+at-rezozer^dot*net
https://qa.debian.org/developer.php?login=calcu...@rezozer.net
AE28 AE15 710D FF1D 87E5  A762 3F92 19A6 7F36 C68B



signature.asc
Description: OpenPGP digital signature


Bug#951344: qemu-system-x86: booting Debian server on qemu + 5.5.x kernel crashes

2020-02-14 Thread Michael Tokarev
Control: tag -1 + moreinfo unreproducible

14.02.2020 23:23, Antonio wrote:
> Package: qemu-system-x86
> Version: 1:4.2-3
> Severity: normal
> 
> Dear Maintainer,
> I would like to report that using qemu to boot a Debian server crashes with 
> the
> latest versions of the 5.5.x kernel.
> I also reported this problem on Bugzilla at the following link:
> https://bugzilla.kernel.org/show_bug.cgi?id=206405

First of all, on that picture there's no first line of the OOPs
which is the most significant, unfortunately.
You can capture it as text using serial console, eg:

 -append ".. console=ttyS0" -serial file:/some/where/file

And for the most important, I can't reproduce it using Debian
kernel in experimental (5.5.0-rc5-amd64 aka 5.5~rc5-1~exp1) -
the only available 5.5 kernel on Debian so far.

So you might want to provide some instructions on how to reproduce
the issue. Also it might be helpful for you to figure out where it
fails, what it tries to do at this time (eg loading modules or applies
CPU firmware update).

Thanks,

/mjt



Bug#942989: dblatex: Python2 removal in sid/bullseye

2020-02-14 Thread Sandro Tosi
On Wed, 23 Oct 2019 02:33:21 + mo...@debian.org wrote:
> Source: dblatex
> Version: 0.3.10-2
> Severity: normal
> Tags: sid bullseye
> User: debian-pyt...@lists.debian.org
> Usertags: py2removal

looks like upstream release a py3k compatible version, so i'm gonna
try and package it; i've also pushed the previous packages to
https://salsa.debian.org/debian/dblatex



Bug#951355: rspamd: Bayesian filters should not cause mails to be rejected

2020-02-14 Thread Julien Muchembled
Package: rspamd
Version: 1.9.4-2~bpo10+1
Severity: important
Tags: upstream

Yesterday, I got a mail from the Listmaster Team because my server
rejected the following debian-user-french mail:

  
https://lists.debian.org/msgid-search/94de34b7-3d83-ba9d-49a4-254bcf3a4...@visionduweb.com

After a quick investigation, I understand that was because of bayesian
filters. If you think it's not possible with default configuration,
I can provide more information and you can stop reading here.

Else, I am horrified by such behaviour from rspamd. I consider that a mail
shall only be rejected if it is indubitably spam (e.g. SPF test failure).
But with Bayesian filters, it's impossible to be absolutely sure and the
only valid option is to accept it.

In fact, I don't expect much from this bug report. I am already quite unhappy
of rspamd for other reasons, mainly because it's too slow at learning ham/spam
(I configured dovecot to trigger that when I move mails from/to the Spam
folder). Configuring rspamd also looks horribly complicated and my only
settings are:

# head local.d/*
==> local.d/rbl.conf <==
enabled = false;

==> local.d/surbl.conf <==
enabled = false;

==> local.d/worker-normal.inc <==
enabled = false;

==> local.d/worker-proxy.inc <==
bind_socket = "localhost:11332";
upstream "local" {
  default = yes;
  self_scan = yes;
}

(no greylisting)

Whitelisting bendel.debian.org should be something doable easily
but I don't know how. 

With this incident, I am now decided to try bogofilter.

I tagged upstream because I doubt that Debian ships with different settings
than upstream about this issue.

-- System Information:
Debian Release: 10.0
  APT prefers proposed-updates
  APT policy: (900, 'proposed-updates'), (900, 'stable'), (500, 
'stable-debug'), (500, 'proposed-updates-debug')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages rspamd depends on:
ii  adduser  3.118
ii  ca-certificates  20190110
ii  libc62.28-10
ii  libevent-2.1-6   2.1.8-stable-4
ii  libglib2.0-0 2.58.3-2+deb10u1
ii  libicu63 63.1-6
ii  libjs-bootstrap  3.4.1+dfsg-1
ii  libjs-jquery 3.3.1~dfsg-3
ii  libjs-requirejs  2.3.6-1
ii  libluajit-5.1-2  2.1.0~beta3+dfsg-5.1
ii  libmagic11:5.35-4
ii  libpcre2-8-0 10.32-5
ii  libsqlite3-0 3.27.2-3
ii  libssl1.11.1.1c-1
ii  libunwind8   1.2.1-9
ii  lsb-base 10.2019051400
ii  zlib1g   1:1.2.11.dfsg-1

rspamd recommends no packages.

rspamd suggests no packages.

-- no debconf information



Bug#951335: procps: top: window entry #1 corrupt, please delete '/home/tglase/.toprc'

2020-02-14 Thread Craig Small
Hi Thorsten,
  I am pretty sure it's the fieldscur validation having a bad day. I've
emailed the author and will let you know what happens.

 - Craig


On Sat, 15 Feb 2020 at 04:24, Thorsten Glaser  wrote:

> Package: procps
> Version: 2:3.3.16-1
> Severity: important
>
> After an upgrade, my .toprc can no longer be read.
> This might be related to the discussions we had
> around #784740 where this happened again, and we,
> in addition, found that those files are locale-
> dependent, but it also happens in the C locale,
> for which my /etc/skel/.toprc was written:
>
> tglase@tglase-nb:~ $ LC_ALL=C top
> top: window entry #1 corrupt, please delete '/home/tglase/.toprc'
>
> On another system which still has 2:3.3.15-2 the
> exact same file works, so this is a recent regression.
>
> -- System Information:
> Debian Release: bullseye/sid
>   APT prefers buildd-unstable
>   APT policy: (500, 'buildd-unstable'), (500, 'unstable'), (1,
> 'experimental')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
>
> Kernel: Linux 5.4.0-3-amd64 (SMP w/2 CPU cores)
> Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C
> (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/lksh
> Init: sysvinit (via /sbin/init)
>
> Versions of packages procps depends on:
> ii  init-system-helpers  1.57
> ii  libc62.29-10
> ii  libncurses6  6.1+20191019-1
> ii  libncursesw6 6.1+20191019-1
> ii  libprocps8   2:3.3.16-1
> ii  libtinfo66.1+20191019-1
> ii  lsb-base 11.1.0
>
> Versions of packages procps recommends:
> ii  psmisc  23.3-1
>
> procps suggests no packages.
>
> -- no debconf information
>


Bug#930292: texlive-luatex: lualatex uses huge memory for Noto CJK fonts

2020-02-14 Thread Norbert Preining
On Sat, 15 Feb 2020, Ryutaroh Matsumoto wrote:
> This is LuaHBTeX, Version 1.11.2 (TeX Live 2020/dev)

There is no luahbtex in Debian.

Norbert

--
PREINING Norbert   http://www.preining.info
Accelia Inc. + IFMGA ProGuide + TU Wien + JAIST + TeX Live + Debian Dev
GPG: 0x860CDC13   fp: F7D8 A928 26E3 16A1 9FA0 ACF0 6CAC A448 860C DC13



Bug#951354: wget2: Please package new version (1.99.2)

2020-02-14 Thread Boyuan Yang
Source: wget2
Version: 1.99.1-2.1
Severity: normal

Dear wget2 maintainer,

A new release of wget2 (wget2 1.99.1) is now available. Please consider
packaging it in Debian. Thanks!

-- 
Regards,
Boyuan Yang


signature.asc
Description: This is a digitally signed message part


Bug#951353: syncthing: new upstream 1.3.4

2020-02-14 Thread Jonatan Nyberg
Package: syncthing
Version: 1.3.4Severity: Normal

Please consider to upgrade to the current upstream version (1.3.4).

RegardsJonatan




Bug#930292: texlive-luatex: lualatex uses huge memory for Noto CJK fonts

2020-02-14 Thread Ryutaroh Matsumoto
By luaotfload 3.12 and
This is LuaHBTeX, Version 1.11.2 (TeX Live 2020/dev)
the memory consumption is 2 GB,
by texlive 15 February 2020.

Ryutaroh



Bug#951352: xcffib: diff for NMU version 0.8.1-0.7

2020-02-14 Thread Sandro Tosi
Package: xcffib
Version: 0.8.1-0.6
Severity: normal
Tags: patch  pending


Dear maintainer,

I've prepared an NMU for xcffib (versioned as 0.8.1-0.7). The diff
is attached to this message.

Consider maintaining this package with the DPMT

Regards.

diff -Nru xcffib-0.8.1/debian/changelog xcffib-0.8.1/debian/changelog
--- xcffib-0.8.1/debian/changelog	2019-12-21 20:57:12.0 -0500
+++ xcffib-0.8.1/debian/changelog	2020-02-14 21:31:52.0 -0500
@@ -1,3 +1,11 @@
+xcffib (0.8.1-0.7) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/control
+- remove python-flake8 from b-d, no longer needed
+
+ -- Sandro Tosi   Fri, 14 Feb 2020 21:31:52 -0500
+
 xcffib (0.8.1-0.6) unstable; urgency=medium
 
   * Non-maintainer upload.


Bug#950589: lintian: collection/src-orig-index mishandles tarballs with whitespace in owner field

2020-02-14 Thread Felix Lechner
Hi Niko,

On Mon, Feb 3, 2020 at 1:54 PM Niko Tyni  wrote:
>
> It looks like this confuses the common prefix removal

Thank you for the diagnosis. You were entirely correct.

> Lintian reports false warnings for src:libcryptx-perl_0.067-1

With a development version of Lintian that includes this commit:


https://salsa.debian.org/lintian/lintian/commit/bf0f7cb1539d08ebc6fe7caa5d09fcf7e2df3015

the output looks like that:

$ frontend/lintian ../bugs/ownership/libcryptx-perl_0.067-1.dsc
P: libcryptx-perl source: rules-requires-root-missing

As Chris said, the fix required some non-trivial changes. Further
breakage is possible. Please keep reporting bugs.

Kind regards
Felix Lechner



Bug#854490: retitle 854490 ITP: xva-img -- Citrix XenServer .xva disk extraction tool

2020-02-14 Thread Francisco
Hi,
a few days have passed, the package is ready and sent to the mentors,
https://mentors.debian.net/package/xva-img. I wish to keep it.
I changed the bug from RFP to ITP.

Regards

-- 
Francisco Vilmar Cardoso Ruviaro 
4096R: 1B8C F656 EF3B 8447 2F48 F0E7 82FB F706 0B2F 7D00



Bug#592124: Director

2020-02-14 Thread wwwunitedban...@gmail.com



Bug#866613: cloud-init: Adding Apache v2 license to debian/copyright

2020-02-14 Thread Noah Meyerhans
On Fri, Jun 30, 2017 at 02:14:00PM +, Joonas Kylmälä wrote:
> We need to also take care of asking permission from the authors of
> Debian patches if they can be used under Apache v2 license.

I don't think there's anything copyrightable in any of those
contributions.  Note that none of the debian-specific changes include
any license information as it is.  I'm going to make the change to
debian/copyright to reflect upstream's license.

noah



Bug#951350: RFP: offroad -- offline vector map display ported from OsmAnd

2020-02-14 Thread Martin
Package: wnpp
Severity: wishlist

* Package name: offroad
  Version : 0.5
  Upstream Author : Christian Foltin, Reimar Döffinger
* URL : https://sourceforge.net/projects/offroadosm/
* License : GPL
  Programming Lang: Java
  Description : offline vector map display ported from OsmAnd

Features:
 * Offline Maps
 * Offline Navigation
 * GPX Tracks Management
 * Rendering Engine
 * OSM Vector Data
 * Elevation/Contour lines



Bug#951338: libkeyutils1: rkhunter warns that libkeyutils.so.1.9 may contain a possible rootkit

2020-02-14 Thread Christian Kastner
Hi Axel,

thank you for your effort in locating the cause of this!

On 14.02.20 20:21, Axel Beckert wrote:
> c459dfa4 (Francois Marier 2014-10-14 23:24:53 +1300  9958)
>\[pdflush\]:IRC bot
> eca1837f (Francois Marier 2017-07-01 20:33:17 -0700  9959)
>libkeyutils.so.1.9:Spam tool component
> eca1837f (Francois Marier 2017-07-01 20:33:17 -0700  9960)
>.IptabLex:malware component
> 
> So it's solely the filename and it's in there since at least 2017.


> And the change which triggered this warning is this commit:
> 
> commit 0f70f77491bb6976a2bf761224fec1a9cc6cfb87
> Author: David Howells 
> Date:   Wed May 29 23:37:15 2019 +0100
> 
> Add support for KEYCTL_MOVE
> 
> Signed-off-by: David Howells 
> 
> diff --git a/version.lds b/version.lds
> index 9317222..9e78ea2 100644
> --- a/version.lds
> +++ b/version.lds
> @@ -91,3 +91,9 @@ KEYUTILS_1.8 {
> keyctl_pkey_verify;
> 
>  } KEYUTILS_1.7;
>  +
>  +KEYUTILS_1.9 {
>  +   /* Management functions */
>  +   keyctl_move;
>  +
>  +} KEYUTILS_1.8;
> 
> Doesn't look like a rootkit addition to me, just bumping the SONAME.
> (And the adding of KEYCTL_MOVE neither.) Lowering the severity to
> default ("normal")...
>
> IMHO this is a bug in rkhunter, but it could also be solved in
> keyutils by bumping the SONAME again, i.e. skipping this SONAME
> version explicitly. But feel free to reassign.

The SONAME wasn't changed. keyutils used versioned symbols, so that file
above actually generates a symbol keyctl_move@KEYUTILS_1.9 (you can see
it in libkeyutils1.symbols).

The only way I can see this changing properly is when a new symbol gets
added. I could maybe hack around this now, but I am not sure that doing
so would be the right solution, if the problem is rkhunter only matching
on a filename (not size, content, etc.). Because what would rkhunter do
when somewhat starts calling a malware file "grep" or something...

I'll have to think about this...



Bug#951348: RFP: scalene -- high-performance, high-precision CPU and memory profiler for Python

2020-02-14 Thread Sandro Tosi
Package: wnpp
Severity: wishlist

* Package name: scalene
  Version : 0.7.5
  Upstream Author : Emery Berger
* URL : https://github.com/emeryberger/scalene
* License : Apache
  Programming Lang: Python
  Description : high-performance, high-precision CPU and memory profiler 
for Python

Scalene is a high-performance CPU and memory profiler for Python that does a few
things that other Python profilers do not and cannot do. It runs orders of
magnitude faster than other profilers while delivering far more detailed
information

 * Scalene is fast. It uses sampling instead of instrumentation or relying on
   Python's tracing facilities. Its overhead is typically no more than 10-20%
   (and often less).
 * Scalene is precise. Unlike most other Python profilers, Scalene performs CPU
   profiling at the line level, pointing to the specific lines of code that are
   responsible for the execution time in your program. This level of detail can
   be much more useful than the function-level profiles returned by most
   profilers.
 * Scalene separates out time spent running in Python from time spent in native
   code (including libraries). Most Python programmers aren't going to optimize
   the performance of native code (which is usually either in the Python
   implementation or external libraries), so this helps developers focus their
   optimization efforts on the code they can actually improve.
 * Scalene profiles memory usage. In addition to tracking CPU usage, Scalene
   also points to the specific lines of code responsible for memory growth. It
   accomplishes this via an included specialized memory allocator.



Bug#525315: connect/disconnect loops with ifupdown and wpa_supplicant in roaming mode

2020-02-14 Thread Hagen Fuchs
Package: ifupdown
Version: 0.8.35+b1
Followup-For: Bug #525315

Hey,

I'm pretty sure this should be filed as a bug to wpasupplicant.
In my case (same phenomena on display as OP reported), increasing the
hysteresis timeout to 10 seconds was enough to stop the cycling reliably.

For the record that would be 10 seconds (instead of 4) in
wpa_hysteresis_check() in /etc/wpa_supplicant/functions.sh (a
pro-forma patch is attached).

The actual question here is: how do I debug this cycle properly?
--- a/wpa_supplicant/functions.sh
+++ b/wpa_supplicant/functions.sh
@@ -847,9 +847,10 @@ wpa_hysteresis_check () {
local TIME
local TIMESTAMP
local TIMEWAIT
+   local TIMEDELTA=10
TIME=$(date +%s)
-   # current time minus 4 second event buffer
-   TIMEWAIT=$(($TIME-4))
+   # current time minus TIMEDELTA second event buffer
+   TIMEWAIT=$((TIME-TIMEDELTA))
# get time of last event
TIMESTAMP=$(cat $WPA_CLI_TIMESTAMP)
# compare values, allowing new action to be processed


Bug#951347: cloud.debian.org: Cannot start vagrant LXC box 'debian/buster64

2020-02-14 Thread Reto Kaiser
Package: cloud.debian.org
Severity: normal

Dear Maintainer,

I cannot start a vagrant LXC-box for 'debian/buster64', but succeed to
start the 'debian/stretch64' box. The error message leads me to believe
there is something wrong in the LXC config of the buster box.

Vagrant box: debian/buster64 (version 10.1.0)

I'm trying to start a vagrant LXC-box with this config:
-
Vagrant.configure("2") do |config|
  config.vm.box = "debian/buster64"
end
-

Trying to start the vagrant box fails like this:
-
$ VAGRANT_LOG=DEBUG vagrant up --provider=lxc
[...]
There was an error executing ["sudo", "/usr/bin/env", "lxc-start", "-d", 
"--name", "test-buster_default_1581713879231_84397"]
[...]
-

Manually trying to start the LXC container fails like this:
-
$ sudo lxc-start -F --name test-buster_default_1581713879231_84397
lxc-start: test-buster_default_1581713879231_84397: storage/dir.c: dir_mount: 
198 No such file or directory - Failed to mount 
"/var/lib/lxc/buster-base/rootfs" on "/usr/lib/lxc/rootfs"
  lxc-start: test-buster_default_1581713879231_84397: conf.c: lxc_mount_rootfs: 
1351 Failed to mount rootfs "/var/lib/lxc/buster-base/rootfs" onto 
"/usr/lib/lxc/rootfs" with options "(null)"
  lxc-start: test-buster_default_1581713879231_84397: conf.c: 
lxc_setup_rootfs_prepare_root: 3447 Failed to setup rootfs for
lxc-start: test-buster_default_1581713879231_84397: conf.c: lxc_setup: 3550 
Failed to setup rootfs
[...]
-

I don't have a folder "/var/lib/lxc/buster-base" that is mentioned in
the error message.
The corresponding LXC config option is not present for the stretch box,
but only for the buster box:
-
$ diff ~/.vagrant.d/boxes/debian-VAGRANTSLASH-stretch64/9.1.0/lxc/lxc-config 
~/.vagrant.d/boxes/debian-VAGRANTSLASH-buster64/10.1.0/lxc/lxc-config  
[...]
9a10,13
> lxc.net.0.type = empty
> lxc.apparmor.profile = generated
> lxc.apparmor.allow_nesting = 1
> lxc.rootfs.path = dir:/var/lib/lxc/buster-base/rootfs
16c20
< lxc.uts.name = stretch-base
---
> lxc.uts.name = buster-base
[...]
-


Is this 'lxc.rootfs.path' pointing to '/var/lib/lxc/buster-base' expected to be 
in the config?

Kind regards
Reto 



-- System Information:
Debian Release: 10.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.5.3-arch1-1 (SMP w/12 CPU cores; PREEMPT)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: unable to detect



Bug#951346: ITP: paraglob -- library for matching strings against a large list of patterns (Zeek)

2020-02-14 Thread Hilko Bengen
Package: wnpp
Owner: Hilko Bengen 
Severity: wishlist

* Package name: paraglob
  Version : 0.4
  Upstream Author : Corelight Inc.
* URL or Web page : https://github.com/zeek/paraglob
* License : BSD-3-clause, LGPL-3+
  Description : library for matching strings against a large list of 
patterns (Zeek)

This package is needed for pacakging Zeek 3.x (formerly known as Bro).



Bug#951345: RFS: git-revise/0.5.1-1 -- handy git tool for doing efficient in-memory commit rebases & fixups

2020-02-14 Thread Nicolas Schier
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "git-revise"

 * Package name: git-revise
   Version : 0.5.1-1
   Upstream Author : Nika Layzell 
 * URL : https://mystor.github.io/git-revise.html
 * License : MIT
 * Vcs : https://salsa.debian.org/debian/git-revise
   Section : devel

It builds those binary packages:

  git-revise - handy git tool for doing efficient in-memory commit rebases & 
fixups

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/git-revise

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/g/git-revise/git-revise_0.5.1-1.dsc

Changes since the last upload:

   * New upstream version 0.5.1

Kind regards,
Nicolas



Bug#916260: gparted mounts partition without protection

2020-02-14 Thread Marc Lehmann
On Fri, Feb 14, 2020 at 02:52:59PM -0500, Phillip Susi  
wrote:
> > You keep making this false claim, but that doesn't lend it more
> > credence.  POSIX permissions work the way they work, and if you think some
> > combination of permissions are wrong, what are the rules to determine
> > right and wrong and what is your source for this repeated statement?
> 
> Simple... right doesn't allow access to the people you don't want to
> have it.  Wrong permissions do allow access to those you don't intend to
> have it.  Working around that by other means ( to deny access to the
> entire filesystem ) does not change the fact that the permissions on the
> file are not configured correctly to carry out your intent.

No, it just means gparted has a security bug, because the permissions
did work as the user intended before gparted changed them without the
users knowledge, and they would have worked if gparted wasn't insecurely
exposing the files.

gparted *changed* the effective permissions of files by mounting the fs in
an insecure location.

The reason why your logic doesn't work is that you claim *every* debian
root fs has the wrong permissions, because some directories might be
world-writable (such as /tmp) which might not be what the user intended
by not having the fs mounted in an insecure location (and thus allowing a
DoS attack). It would also mean filesystems such as fat, without intrinsic
permissions, would somehow have "wrong" permissions.

I really don't understand why it is so difficult to simply accept that
gparted has a security bug. It happens. It should be fixed. It's not the
most dangerous security bug, after all...

Fact is, gparted exposes files because it changes effective permissions.
Whether you all these permissions right or wrong, green or blue, ethical
or satanistic doesn't have any influence on this fact - all these
classifications are your own personal opinions and don't have any merit in
objectively analying this bug.

> > Ah, maybe I see where you are copming from - gparted changes effective
> > permissions, so they are wrong.
> 
> No, I didn't say anything about gparted.

Well, then you missed the topic - this bug report is about discussing a
specific gparted security bug, if you want to discuss something else, you
can try to engange me somewhere else or privately.

> When gparted mounts it somewhere that isn't traverse proof, yes, that
> does allow access where it was not previously, but that's really only
> exposing the underlying bug that was always there: that the permissions
> on the files are too loose.

Well, I have asked you for the source of this claim, but you haven't given
one - and I claim you just made it up, because I can't believe you have a
source.

If you could point out where, in the SuS, it says which permissions are wrong
and which are right, then you might have something to discuss.

But SuS only documents how permissions work, how they effectively apply,
and according to the cold hard facts, gparted exposes files that weren't
exposed before. It's that simple.

Anyways, I am out of here, have a good one!

-- 
The choice of a   Deliantra, the free code+content MORPG
  -==- _GNU_  http://www.deliantra.net
  ==-- _   generation
  ---==---(_)__  __   __  Marc Lehmann
  --==---/ / _ \/ // /\ \/ /  schm...@schmorp.de
  -=/_/_//_/\_,_/ /_/\_\



Bug#951344: qemu-system-x86: booting Debian server on qemu + 5.5.x kernel crashes

2020-02-14 Thread Antonio
Package: qemu-system-x86
Version: 1:4.2-3
Severity: normal

Dear Maintainer,
I would like to report that using qemu to boot a Debian server crashes with the
latest versions of the 5.5.x kernel.
I also reported this problem on Bugzilla at the following link:
https://bugzilla.kernel.org/show_bug.cgi?id=206405
Thank you,
Antonio


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (700, 'unstable'), (500, 'stable-updates'), (500,
'stable'), (100, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.5.3-custom (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=ISO-8859-1)
(ignored: LC_ALL set to it_IT), LANGUAGE=it (charmap=ISO-8859-1)
(ignored: LC_ALL set to it_IT)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages qemu-system-x86 depends on:
ii  ipxe-qemu 1.0.0+git-20190125.36a4c85-4
ii  libaio1   0.3.112-5
ii  libasound21.2.1.2-2
ii  libbrlapi0.7  6.0+dfsg-4+b1
ii  libc6 2.29-10
ii  libcacard01:2.6.1-1
ii  libcapstone3  4.0.1+really+3.0.5-1+b1
ii  libepoxy0 1.5.4-1
ii  libfdt1   1.5.1-1
ii  libgbm1   19.3.3-1
ii  libgcc-s1 [libgcc1]   10-20200211-1
ii  libgcc1   1:10-20200211-1
ii  libglib2.0-0  2.62.4-2
ii  libgnutls30   3.6.11.1-2
ii  libibverbs1   28.0-1
ii  libjpeg62-turbo   1:1.5.2-2+b1
ii  libncursesw6  6.1+20191019-1
ii  libnettle73.5.1+really3.5.1-2
ii  libnuma1  2.0.12-1+b1
ii  libpixman-1-0 0.36.0-1
ii  libpmem1  1.8-1
ii  libpng16-16   1.6.37-2
ii  librdmacm128.0-1
ii  libsasl2-22.1.27+dfsg-2
ii  libseccomp2   2.4.2-2
ii  libslirp0 4.1.0-2
ii  libspice-server1  0.14.2-4
ii  libtinfo6 6.1+20191019-1
ii  libusb-1.0-0  2:1.0.23-2
ii  libusbredirparser10.8.0-1+b1
ii  libvdeplug2   2.3.2+r586-2.2+b1
ii  libvirglrenderer1 0.8.2-1
ii  libxendevicemodel14.11.3+24-g14b62ab3e5-1
ii  libxenevtchn1 4.11.3+24-g14b62ab3e5-1
ii  libxenforeignmemory1  4.11.3+24-g14b62ab3e5-1
ii  libxengnttab1 4.11.3+24-g14b62ab3e5-1
ii  libxenmisc4.114.11.3+24-g14b62ab3e5-1
ii  libxenstore3.04.11.3+24-g14b62ab3e5-1
ii  libxentoolcore1   4.11.3+24-g14b62ab3e5-1
ii  qemu-system-common1:4.2-3
ii  qemu-system-data  1:4.2-3
ii  seabios   1.13.0-1
ii  zlib1g1:1.2.11.dfsg-1.2

Versions of packages qemu-system-x86 recommends:
ii  ovmf 0~20191122.bd85bf54-1
ii  qemu-system-gui  1:4.2-3
ii  qemu-utils   1:4.2-3

Versions of packages qemu-system-x86 suggests:
ii  qemu-block-extra1:4.2-3
ii  qemu-system-data [sgabios]  1:4.2-3
ii  samba   2:4.11.5+dfsg-1
pn  vde2



Bug#951343: kid3-core: Missing man page /usr/share/man/man1/kid3-core.1

2020-02-14 Thread Ben Goodwin
Package: kid3-core
Version: 3.8.2-1
Severity: normal

When trying to read the man page for kid3-cli (man kid3-cli) or kid3-qt
(man kid3-qt) I get the following message from man:

man: can't open /usr/share/man/man1/kid3-core.1: No such file or
directory

I verified that the file is missing. I tried reinstalling the packages
kid3-core, kid3-cli, and kid3-qt, but that did not resolve the issue.

dpkg-query -L shows that /usr/share/man/man1/kid3-core.1 is not included
in kid3-core, kid3-cli, or kid3-qt. I am assuming from the name of the
file that it should be included in the kid3-core package.


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-3-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages kid3-core depends on:
ii  libavcodec58   7:4.2.2-1
ii  libavformat58  7:4.2.2-1
ii  libavutil567:4.2.2-1
ii  libc6  2.29-10
ii  libchromaprint11.4.3-3
ii  libflac++6v5   1.3.3-1
ii  libflac8   1.3.3-1
ii  libgcc11:9.2.1-25
ii  libid3-3.8.3v5 3.8.3-16.2+b1
ii  libogg01.3.2-1+b1
ii  libqt5core5a   5.12.5+dfsg-8
ii  libqt5dbus55.12.5+dfsg-8
ii  libqt5gui5 5.12.5+dfsg-8
ii  libqt5multimedia5  5.12.5-1+b1
ii  libqt5network5 5.12.5+dfsg-8
ii  libqt5qml5 5.12.5-5
ii  libqt5quick5   5.12.5-5
ii  libqt5widgets5 5.12.5+dfsg-8
ii  libqt5xml5 5.12.5+dfsg-8
ii  libstdc++6 9.2.1-25
ii  libswresample3 7:4.2.2-1
ii  libtag1v5  1.11.1+dfsg.1-0.3+b1
ii  libvorbis0a1.3.6-2
ii  libvorbisfile3 1.3.6-2

kid3-core recommends no packages.

kid3-core suggests no packages.

-- no debconf information



Bug#916260: gparted mounts partition without protection

2020-02-14 Thread Phillip Susi


Marc Lehmann writes:

> Maybe it helps when you realise thta chown can also modify a file...

Only root can do that.  In any case, I was ceeding the point that it is
essentially the same thing.

> You yourself mentioned some - in any case, does this lead somewhere?

I was just curious if there were some that I didn't know about.

>> In both cases the permissions on the file itself are wrong,
>
> You keep making this false claim, but that doesn't lend it more
> credence.  POSIX permissions work the way they work, and if you think some
> combination of permissions are wrong, what are the rules to determine
> right and wrong and what is your source for this repeated statement?

Simple... right doesn't allow access to the people you don't want to
have it.  Wrong permissions do allow access to those you don't intend to
have it.  Working around that by other means ( to deny access to the
entire filesystem ) does not change the fact that the permissions on the
file are not configured correctly to carry out your intent.

>> 
>> The permissions allow access that you do not wish it to.  Ipso facto,
>> the permissions are incorrect.
>
> Ah, maybe I see where you are copming from - gparted changes effective
> permissions, so they are wrong.

No, I didn't say anything about gparted.

When gparted mounts it somewhere that isn't traverse proof, yes, that
does allow access where it was not previously, but that's really only
exposing the underlying bug that was always there: that the permissions
on the files are too loose.

If you are running an unpatched kernel that is vulnerable to a remote
exploit and aren't connected to the network, then you don't have to
worry about it, but if I plug in an Ethernet cable, it doesn't mean that
the breach of security is my fault.



Bug#951342: jove: [INTL:fr] French debconf templates translation

2020-02-14 Thread Jean-Pierre Giraud
Package: jove
Severity: wishlist
Tags: patch l10n

Hi!

Please find attached the french debconf templates translation, proofread
by the debian-l10n-french mailing list contributors.

This file should be put as debian/po/fr.po in your package build tree.

Kind Regards

jipege



fr.po.gz
Description: application/gzip


Bug#888670: gnome-system-tools: has been unmaintained upstream for a long time

2020-02-14 Thread Andreas Henriksson
Control: reopen -1
Control: severity -1 important

Hello,

The new repository[1] that was supposedly fixing this bug report
doesn't even include the upstream sources (or their git history).
It's a plain packaging repo with only the debian/ directory.
I don't see how that's supposed to fulfil the need for you to
become your own uptream. You most likely want to create a fork
from the archived gnome repo[2].

Also please pick a (new) name for your fork as it's *not* THE
gnome-system-tools (anymore), unless you actually talk to the gnome
project to officially pick up as the gnome maintainer (but I suspect
at this point there's absolutely no interest from the gnome project to
have gnome-system-tools revived).

(Once a proper upstream fork exists, packaging that under the new name
and providing a transitional gnome-system-tools meta-package will give
current users a seemless upgrade experience.)

(Please also make sure to look into all the deprecated notices that is
being spit out during build. Those will likely become an issue in the
not too distant future. But first you might want to reconsider if you
really have the resources for taking on the task of becoming your own
upstream.)

Regards,
Andreas Henriksson

[1]: https://github.com/LStranger/gnome-system-tools-debian
[2]: https://gitlab.gnome.org/Archive/gnome-system-tools



Bug#950994: Discourage package in contrib to install the real program via another package manager

2020-02-14 Thread Shengjing Zhu
On Sun, Feb 09, 2020 at 11:47:18PM -0500, Olek Wojnar wrote:
> 1) Perhaps surprisingly, I agree in principle that installing from an
> external source should not be "encouraged" under normal circumstances.
> 
> 2) However, this illustrates a use case that perhaps has not come up in
> the past. As I explained in one of the bug reports against my packages,
> the rationale for this was to provide a temporary alternate
> functionality for end users while upstream goes through a period of
> instability.
> 
>     2a) Ideally, I would have preferred to remove the packages in
> question from Debian and have a system that would have presented users
> with options for alternate sources of that package. I may try to hack
> something together for my packages because I agree with a comment on one
> of those bugs that transitioning to an alternate package source should
> not be done without explicit user action.
> 
>     2b) In a general sense though, this seems like a mechanism that may
> have value beyond these two packages. For example, would it be possible
> for maintainers to list alternate sources of a package in a new field in
> d/control? Then, if a package must be removed from Debian either
> temporarily or permanently, users could be presented with alternate
> options for that package. Or if certain users want the bleeding-edge
> version they can easily get to it instead of pestering a maintainer to
> package something that is not stable enough for Debian.
> 
>     2c) The problem with saying a user could just install from
> snap/flatpak/etc is that a user may not know what other options are out
> there and may not know if they are authoritative (e.g. many but not all
> packages are created by the upstream authors). What I am proposing
> (well, more like thinking about at the moment, and looking for feedback)
> is a system to create an equivalence between the official Debian package
> and the same package in other systems. Does anyone else see value in
> such a construct?
> 
> > Another package manager in subject could be snap, flatpak, pip, nix, etc.
> >
> > [1] https://tracker.debian.org/pkg/cyphesis-cpp
> >     https://tracker.debian.org/pkg/ember
> > [2] https://tracker.debian.org/pkg/snapd
> 
> In summary, as snap/flatpak/etc increase in popularity I think it may be
> a good idea to have a formalized method for Debian package maintainers
> to designate authoritative equivalent sources for their packages, if
> they wish to do so.

May not answer you question directly.

There's something called software center. Like discover[1] for KDE plasma,
gnome-software[2] for GNOME.

Users can install either debian package, or flatpak, or snap apps.

[1] https://tracker.debian.org/pkg/plasma-discover
[2] https://tracker.debian.org/pkg/gnome-software



Bug#947530: gnome-system-tools: build-depends on deprecated gnome-doc-utils

2020-02-14 Thread Andreas Henriksson
Control: reopen -1

On Sat, Feb 01, 2020 at 03:25:11PM +0200, Andriy Grytsenko wrote:
> Hello Andreas!
> 
> Thank you very much for the patch. It appears you've done all the
> work and it worked like a charm. All porting guide steps are handled,
> I've rechecked that. Thank you very much.

Apparently you forgot to actually run the application, click the help
button and see what happens.

I've attached a patch which makes a few additional changes that avoids
completely breaking the help system.

To switch away from ghelp: URIs to help: URIs I've found out that it's
apparently needed to do a full docbook to mallard conversion. The URI
scheme is also different where ghelp: is followed by a full path to
an xml file while help: is followed by id, e.g.
help:users-admin or help:users-admin/chapter.

Regards,
Andreas Henriksson

PS. nitpick: The package also ships help for alot more applications than
it installs executables for.
diff -Nru gnome-system-tools-3.0.0/debian/changelog 
gnome-system-tools-3.0.0/debian/changelog
--- gnome-system-tools-3.0.0/debian/changelog   2020-02-01 14:10:47.0 
+0100
+++ gnome-system-tools-3.0.0/debian/changelog   2020-02-14 20:11:18.0 
+0100
@@ -1,3 +1,13 @@
+gnome-system-tools (3.0.0-9.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix up debian/patches/70_gst-yelp.patch to not completely break help.
+- revert to using ghelp: URIs.
+- fix up help file available detection logic for new file location.
+  * Recommend yelp instead of xdg-utils (use gnome-help, not xdg-open).
+
+ -- Andreas Henriksson   Fri, 14 Feb 2020 20:11:18 +0100
+
 gnome-system-tools (3.0.0-9) unstable; urgency=medium
 
   * Bump Standards-Version to 4.5.0.
diff -Nru gnome-system-tools-3.0.0/debian/control 
gnome-system-tools-3.0.0/debian/control
--- gnome-system-tools-3.0.0/debian/control 2020-02-01 14:02:37.0 
+0100
+++ gnome-system-tools-3.0.0/debian/control 2020-02-14 20:11:18.0 
+0100
@@ -14,7 +14,6 @@
gettext,
libxml-parser-perl,
gnome-pkg-tools,
-   yelp,
yelp-tools,
pkg-config
 Standards-Version: 4.5.0
@@ -27,7 +26,7 @@
 Depends: ${misc:Depends},
  ${shlibs:Depends},
  policykit-1-gnome | mate-polkit
-Recommends: xdg-utils
+Recommends: yelp
 Suggests: ntp
 Replaces: ximian-setup-tools, gnome-network-admin
 Conflicts: gnome-network-admin
diff -Nru gnome-system-tools-3.0.0/debian/patches/70_gst-yelp.patch 
gnome-system-tools-3.0.0/debian/patches/70_gst-yelp.patch
--- gnome-system-tools-3.0.0/debian/patches/70_gst-yelp.patch   2020-02-01 
14:00:24.0 +0100
+++ gnome-system-tools-3.0.0/debian/patches/70_gst-yelp.patch   2020-02-14 
20:11:18.0 +0100
@@ -43,7 +43,7 @@
 -DOC_INCLUDES =
 -DOC_FIGURES = figures/network-tool.png
 +HELP_ID = network-admin
-+HELP_FILES = legal.xml
++HELP_FILES = network-admin.xml legal.xml
 +HELP_MEDIA = figures/network-tool.png
  
 -DOC_LINGUAS = ca cs de el en_GB es fr oc pt_BR sl sv it zh_CN
@@ -63,7 +63,7 @@
 -DOC_INCLUDES = 
 -DOC_FIGURES = \
 +HELP_ID = services-admin
-+HELP_FILES = legal.xml
++HELP_FILES = services-admin.xml legal.xml
 +HELP_MEDIA = \
figures/services-tool.png
  
@@ -84,7 +84,7 @@
 -DOC_FIGURES = figures/shares-tool.png
 -DOC_LINGUAS = ca cs de el en_GB es fr gl it oc pt_BR sl sv zh_CN
 +HELP_ID = shares-admin
-+HELP_FILES = legal.xml
++HELP_FILES = shares-admin.xml legal.xml
 +HELP_MEDIA = figures/shares-tool.png
 +HELP_LINGUAS = ca cs de el en_GB es fr gl it oc pt_BR sl sv zh_CN
  
@@ -101,7 +101,7 @@
 -DOC_INCLUDES = 
 -DOC_FIGURES = \
 +HELP_ID = time-admin
-+HELP_FILES = legal.xml
++HELP_FILES = time-admin.xml legal.xml
 +HELP_MEDIA = \
figures/time-map.png\
figures/time-servers.png\
@@ -124,7 +124,7 @@
 -DOC_INCLUDES = 
 -DOC_FIGURES = figures/users-tool.png  \
 +HELP_ID = users-admin
-+HELP_FILES = legal.xml
++HELP_FILES = users-admin.xml legal.xml
 +HELP_MEDIA = figures/users-tool.png   \
   figures/groups.png
  
@@ -792,15 +792,15 @@
 -  done
 --- a/src/common/gst-tool.c
 +++ b/src/common/gst-tool.c
-@@ -412,9 +412,9 @@
-   }
- 
-   if (section) {
--  command = g_strconcat ("gnome-help ghelp://", uri, "?", 
section, NULL);
-+  command = g_strconcat ("xdg-open help://", uri, "?", section, 
NULL);
-   } else {
--  command = g_strconcat ("gnome-help ghelp://", uri, NULL);
-+  command = g_strconcat ("xdg-open help://", uri, NULL);
-   }
+@@ -400,9 +400,9 @@
+   }
  
+   uri = g_build_filename(DATADIR,
+- "/gnome/help/",
+- help_file,
++ "/help/",
+  lang,
++ help_file,
+  help_file_xml,
+  

Bug#951338: libkeyutils1: rkhunter warns that libkeyutils.so.1.9 may contain a possible rootkit

2020-02-14 Thread Axel Beckert
Control: severity -1 normal

Hi,

Francesco Poli (wintermute) wrote:
> After upgrading
> 
>   [UPGRADE] libkeyutils1:amd64 1.6-6 -> 1.6.1-2
> 
> I get the following warning with
> 
>   # rkhunter --sk -c 
> 
> in /var/log/rkhunter.log:
> 
>   Info: Starting test name 'running_procs'
> Checking running processes for suspicious files [ Warning ]
>   Warning: The following processes are using suspicious files:
>Command: sshd
>  UID: 0PID: 7331
>  Pathname: /lib/x86_64-linux-gnu/libkeyutils.so.1.9
>  Possible Rootkit: Spam tool component
[...]
> Does libkeyutils1/1.6.1-2 ship a rootkit?

Likely not. I looked through the whole diff between 1.6 and 1.6.1. At
least nothing suspicious like obfuscated code.

> Or is it a false positive from rkhunter?

Likely, because what triggers this is not the content of the file, but
the filename itself:

From "git blame files/rkhunter" in
https://salsa.debian.org/pkg-security-team/rkhunter:

c459dfa4 (Francois Marier 2014-10-14 23:24:53 +1300  9958)  
 \[pdflush\]:IRC bot
eca1837f (Francois Marier 2017-07-01 20:33:17 -0700  9959)  
 libkeyutils.so.1.9:Spam tool component
eca1837f (Francois Marier 2017-07-01 20:33:17 -0700  9960)  
 .IptabLex:malware component

So it's solely the filename and it's in there since at least 2017.

And the change which triggered this warning is this commit:

commit 0f70f77491bb6976a2bf761224fec1a9cc6cfb87
Author: David Howells 
Date:   Wed May 29 23:37:15 2019 +0100

Add support for KEYCTL_MOVE

Signed-off-by: David Howells 

diff --git a/version.lds b/version.lds
index 9317222..9e78ea2 100644
--- a/version.lds
+++ b/version.lds
@@ -91,3 +91,9 @@ KEYUTILS_1.8 {
keyctl_pkey_verify;

 } KEYUTILS_1.7;
 +
 +KEYUTILS_1.9 {
 +   /* Management functions */
 +   keyctl_move;
 +
 +} KEYUTILS_1.8;

Doesn't look like a rootkit addition to me, just bumping the SONAME.
(And the adding of KEYCTL_MOVE neither.) Lowering the severity to
default ("normal")...

IMHO this is a bug in rkhunter, but it could also be solved in
keyutils by bumping the SONAME again, i.e. skipping this SONAME
version explicitly. But feel free to reassign.

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE


signature.asc
Description: PGP signature


Bug#947518: casparcg-server: FTBFS: xf86vmode library not found - required for GLFW

2020-02-14 Thread Petter Reinholdtsen
[Dimitri John Ledkov]
> Anyway, I hacked up something that works, albeit looks ugly.

Thank you very much.  I hope upstream will accept the fix or some
variant of it. :)

-- 
Happy hacking
Petter Reinholdtsen



Bug#950994: Discourage package in contrib to install the real program via another package manager

2020-02-14 Thread Shengjing Zhu
On Mon, Feb 10, 2020 at 05:48:42AM -0500, Sam Hartman wrote:
> I'll note there's another case where this could be valuable.
> If there is an installer in contrib, you can express dependencies on the
> package being available in Debian.
> Depending on how that installer works, you may not be able to express
> dependencies on the installed version in Debian.
> 

I agree with this argument when you using the word "installer". We have a lot
of installers in contrib. Though a package manager is another kind of
"installer", but the situation is different.

Says I'm a user of pip. I install a python library using pip, and pin it at
version A. Now a package in contrib try to use pip to install this library with
version B. This becomes conflict. If another package declares dependencies with
this package, the version management becomes mess. So technically this doesn't
work, only causing problem for end users.



Bug#951340: forkstat: Provide means to filter, output column with UID

2020-02-14 Thread Witold Baryluk
Package: forkstat
Version: 0.02.11-1
Severity: wishlist

Dear Maintainer,

This is a really excellent program, but when running as root, it will
show me a lot of activity, which I usually then need to filter with
stdbuf and grep/awk, usually by name. It would be extremaly helpful to
output a column with UID / EUID of the processes, so one can filter on it
without looking this things manually in `/proc` (doing this using
scripting in bash usually will lead to infinite recursion, it is
solvable, just awkward and hacky).


Thanks!





-- System Information:
Debian Release: bullseye/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-3-amd64 (SMP w/32 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages forkstat depends on:
ii  libc6  2.29-10

forkstat recommends no packages.

forkstat suggests no packages.

-- no debconf information



Bug#951339: Debian changes to InspIRCd causes errors when loading the httpd module

2020-02-14 Thread Sadie Powell
Package: inspircd
Version: 3.4.0-2

Hello,

We have received reports that users of your package are experiencing errors  
caused by Debian patching the httpd module to not use the vendored version of 
the http_parser library.

Having had a look at the patch (debian.use-http-parser-lib.patch) it seems like 
your patch is forgetting to link against the library so the module is compiling 
but failing at runtime.

Ideally the fix for this should be to just remove this patch. We only test 
against the vendored version and there's no guarantee we won't make changes to 
the vendored libraries which make them incompatible with the mainline version. 
It's only a tiny library with no external dependencies so this isn't harmful at 
all.

Regards,

~ Sadie



Bug#951338: libkeyutils1: rkhunter warns that libkeyutils.so.1.9 may contain a possible rootkit

2020-02-14 Thread Francesco Poli (wintermute)
Package: libkeyutils1
Version: 1.6.1-2
Severity: grave
Tags: security
Justification: user security hole

Hello!

After upgrading

  [UPGRADE] libkeyutils1:amd64 1.6-6 -> 1.6.1-2

I get the following warning with

  # rkhunter --sk -c 

in /var/log/rkhunter.log:

  Info: Starting test name 'running_procs'
Checking running processes for suspicious files [ Warning ]
  Warning: The following processes are using suspicious files:
   Command: sshd
 UID: 0PID: 7331
 Pathname: /lib/x86_64-linux-gnu/libkeyutils.so.1.9
 Possible Rootkit: Spam tool component

I tried to reinstall libkeyutils1/1.6.1-2, after checking the SHA256
checksum of the .deb file. The warning was issued again.

On the other hand, after downgrading to libkeyutils1/1.6-6
and restarting ssh

  # service ssh restart

the warning vanishes.


Does libkeyutils1/1.6.1-2 ship a rootkit?
Or is it a false positive from rkhunter?

Please investigate.
Thanks for your time!



-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (800, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libkeyutils1 depends on:
ii  libc6  2.29-10

libkeyutils1 recommends no packages.

libkeyutils1 suggests no packages.

-- no debconf information



Bug#951139: Can someone please have a look (Was: Bug#951139: toil fails it's autopkg tests)

2020-02-14 Thread Michael Crusoe
I've uploaded new packages of toil, cwltool, and python-schema-salad that
should fix this


Bug#947518: casparcg-server: FTBFS: xf86vmode library not found - required for GLFW

2020-02-14 Thread Dimitri John Ledkov
On Fri, 27 Dec 2019 23:14:46 +0100 Andreas Beckmann  wrote:
> Package: casparcg-server
> Version: 2.2.0+dfsg-2
> Severity: serious
> Tags: ftbfs
> Justification: fails to build from source
>
> Hi,
>
> casparcg-server FTBFS in a current sid pbuilder environment:
>
> CMake Error at CMakeModules/FindGLFW.cmake:150 (message):
>   xf86vmode library not found - required for GLFW
> Call Stack (most recent call first):
>   CMakeModules/Bootstrap_Linux.cmake:44 (FIND_PACKAGE)
>   CMakeLists.txt:18 (INCLUDE)
>

What is odd however is that GLFW is not actually used or linked to the
final binaries, only a subset of X libraries are.

I've tried to clean it up a bit, but it seems to me that many cmake
stanzas are quite bogus. And for example, instead of including a
custom GLFW module, an upstream one could be used with
find_package(glfw3 REQUIRED) for example.

Anyway, I hacked up something that works, albeit looks ugly.

Regards,

Dimitri.



Bug#951337: lintian-brush: dh_clideps fails when debian/compat is removed

2020-02-14 Thread Andreas Henriksson
Control: retitle -1 lintian-brush: dh_clideps fails with compat bumped

On Fri, Feb 14, 2020 at 06:23:53PM +0100, Andreas Henriksson wrote:
> Package: lintian-brush
> Version: 0.57
> Severity: wishlist
> 
> Dear Maintainer,
> 
> It seems running lintian-brush on a .NET package (like pdfmod) will
> cause it to FTBFS. AFAICT this is caused by the switching of
> debian/compat -> debhelper-compat (= ...) change, as the dh_clideps
> helper has not been updated to support the new syntax.

And with some more testing, even with debian/compat restored the same
failure still happens. Apparently bumping compat to 12 (or even 10)
will cause the same problem to happen.

> 
> Please consider detecting .NET packages and skipping the
> debhelper-compat change for now (until someone volunteers to
> fix up dh_clideps).

... and the debhelper compat bump.

BTW. If this turns out to be a pdfmod specific problem (and not a
generic .Net packaging problem) feel free to just close this issue.

Regards,
Andreas Henriksson



Bug#951336: Update python3-lmdb to >= 0.92

2020-02-14 Thread Michal Nowak

Package: python3-lmdb
Version: 0.86-1.2

python3-lmdb-0.86-1.2 is a 5 years old release and my project requires 
version >= 0.92 
(https://gitlab.labs.nic.cz/knot/respdiff/blob/master/requirements.txt#L4). 
Please, update python3-lmdb in sid.




Bug#951335: procps: top: window entry #1 corrupt, please delete '/home/tglase/.toprc'

2020-02-14 Thread Thorsten Glaser
On Fri, 14 Feb 2020, Thorsten Glaser wrote:

> After an upgrade, my .toprc can no longer be read.

Oops, forgot the attachment.

bye,
//mirabilos
-- 
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-235
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander SteegRCfile for "top with windows"   # shameless braggin'
Id:a, Mode_altscr=0, Mode_irixps=1, Delay_time=3.000, Curwin=0
Def fieldscur=AEhIOQTrspvuWbcdfgjyzlKNMX
winflags=65208, sortindx=10, maxtasks=0
summclr=6, msgsclr=6, headclr=7, taskclr=7
Job fieldscur=ABcefgjlrstuvyzMKNHIWOPQDX
winflags=62776, sortindx=0, maxtasks=0
summclr=6, msgsclr=6, headclr=7, taskclr=6
Mem fieldscur=ANOPQRSTUVbcdefgjlmyzWHIKX
winflags=62776, sortindx=13, maxtasks=0
summclr=5, msgsclr=5, headclr=4, taskclr=5
Usr fieldscur=ABDECGfhijlopqrstuvyzMKNWX
winflags=62776, sortindx=4, maxtasks=0
summclr=3, msgsclr=3, headclr=2, taskclr=3


Bug#951337: lintian-brush: dh_clideps fails when debian/compat is removed

2020-02-14 Thread Andreas Henriksson
Package: lintian-brush
Version: 0.57
Severity: wishlist

Dear Maintainer,

It seems running lintian-brush on a .NET package (like pdfmod) will
cause it to FTBFS. AFAICT this is caused by the switching of
debian/compat -> debhelper-compat (= ...) change, as the dh_clideps
helper has not been updated to support the new syntax.

Please consider detecting .NET packages and skipping the
debhelper-compat change for now (until someone volunteers to
fix up dh_clideps).

Regards,
Andreas Henriksson



Bug#951335: procps: top: window entry #1 corrupt, please delete '/home/tglase/.toprc'

2020-02-14 Thread Thorsten Glaser
Package: procps
Version: 2:3.3.16-1
Severity: important

After an upgrade, my .toprc can no longer be read.
This might be related to the discussions we had
around #784740 where this happened again, and we,
in addition, found that those files are locale-
dependent, but it also happens in the C locale,
for which my /etc/skel/.toprc was written:

tglase@tglase-nb:~ $ LC_ALL=C top
top: window entry #1 corrupt, please delete '/home/tglase/.toprc'

On another system which still has 2:3.3.15-2 the
exact same file works, so this is a recent regression.

-- System Information:
Debian Release: bullseye/sid
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/lksh
Init: sysvinit (via /sbin/init)

Versions of packages procps depends on:
ii  init-system-helpers  1.57
ii  libc62.29-10
ii  libncurses6  6.1+20191019-1
ii  libncursesw6 6.1+20191019-1
ii  libprocps8   2:3.3.16-1
ii  libtinfo66.1+20191019-1
ii  lsb-base 11.1.0

Versions of packages procps recommends:
ii  psmisc  23.3-1

procps suggests no packages.

-- no debconf information



Bug#940461: [PATCH v2] Add imap-dl, a simple imap downloader

2020-02-14 Thread Sean Whitton
control: tag -1 +pending

Hello dkg,

On Fri 31 Jan 2020 at 05:43PM -05, Daniel Kahn Gillmor wrote:

> Thanks for the extensive review.  I've revised imap-dl, taking it into
> account, and have attached the revised version here.  You can also find
> it on my imap-dl-v2 branch on salsa.

Very nice.  Applied :)  Thank you.

> I've dug further into imaplib, and i've pushed the typeshed folks toward
> annotating imaplib further based on those findings.  We now expect the
> response to the uids() call to be a list of items that alternates
> between Tuple[bytes,bytes] and b')'.

This is definitely more maintainable.

>>> +fname = mdst.add(f[1].replace(b'\r\n', b'\n'))
>>
>> Could a message contain a mixture of UNIX and Windows line endings, such
>> that this line corrupts the message?  If not, please write a comment
>> saying why it is always safe to perform this replacement.
>
> I know of no way to have this create an actual corruption, unless the
> message itself doesn't actually have line endings at all (e.g. an 8-bit
> attachment in a MIME message) but i don't have anything like that handy
> and i've never seen it in practice.

Okay, cool.

>> Not a blocker, but it would be nice if the user could request that the
>> expunge step be skipped.
>
> this is a pretty subtle distinction -- you want to set the Deleted flag
> but not expunge?  can you describe the use case?
>
>> Also, will imap-dl skip messages with the deleted flag?  Do you think it
>> should?
>
> I don't think it should -- the use case at the moment is just to fetch
> all messages that exist in the inbox.  Why should it treat any flag
> differently?

What I was thinking was that the user might want imap-dl to set the
delete flag and not expunge, and then skip deleted messages on future
runs.  Then they'd expunge themselves from time-to-time.

This way, if imap-dl makes any mistakes, there is a sort of backup.

I was particularly thinking that someone might want to use this at
first, until they could feel sure that imap-dl doesn't have any bugs
with their particular IMAP server.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#940461: [PATCH v2] Add imap-dl, a simple imap downloader

2020-02-14 Thread Sean Whitton
Hello,

On Sat 08 Feb 2020 at 12:37PM -05, Daniel Kahn Gillmor wrote:

> I don't understand what sort of rebase you are asking for -- the
> imap-dl-v2 branch on https://salsa.debian.org/dkg/mailscripts.git is
> (and been) based directly atop the imap-dl-squashed branch, so it's
> accessible with piecewise commits, with explanatory comments.
>
> But i'll send a squashed v3 patch as well :)

I looked at your branch but couldn't figure out how to get a diff of
your v2 patch against your v3 patch, which I wanted to compare against
my review comments.  Otherwise, it would definitely have been useful to
see the piecewise commits.

I'd like to suggest using branch names which correspond to versions of
the patch in the bug -- if I had seen imap-dl-v2 and imap-dl-v3 I would
have known immediately what to do.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#951334: does not support current lts versions

2020-02-14 Thread Joey Hess
Package: haskell-stack
Version: 1.7.1-3
Severity: normal

The last version of LTS that this build of stack can handle seems to be
13.29. Trying to build any stack.yaml that uses a newer LTS results in
parse failures.

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.0-2-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_USER, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages haskell-stack depends on:
ii  ca-certificates  20190110
ii  gcc  4:9.2.1-3.1
ii  libatomic1   9.2.1-24
ii  libc62.29-9
ii  libffi6  3.2.1-9
ii  libgmp-dev   2:6.1.2+dfsg-4
ii  libgmp10 2:6.1.2+dfsg-4
ii  libsqlite3-0 3.30.1+fossil191229-1
ii  libyaml-0-2  0.2.2-1
ii  make 4.2.1-1.2
ii  xz-utils 5.2.4-1+b1
ii  zlib1g   1:1.2.11.dfsg-1+b1

haskell-stack recommends no packages.

haskell-stack suggests no packages.

-- no debconf information

-- 
see shy jo


signature.asc
Description: PGP signature


Bug#951333: telegram-purple: Logs error "Query Failed - 71: RPC_CALL_FAIL 400: CHANNEL_INVALID", lost posting functionality

2020-02-14 Thread Gunnar Wolf
Package: telegram-purple
Version: 1.4.1-1+b1
Severity: important

After several months of using telegram-purple (thanks for it!) via
bitlbee, I started receiving the following message in thelog, with
frequencies that go from every ten seconds to every ten minutes:

10:33:27 @root | purple - Error: Query Failed - 71: RPC_CALL_FAIL 400: 
CHANNEL_INVALID
10:38:52 @root | purple - Error: Query Failed - 71: RPC_CALL_FAIL 400: 
CHANNEL_INVALID
10:46:48 @root | purple - Error: Query Failed - 71: RPC_CALL_FAIL 400: 
CHANNEL_INVALID
10:50:53 @root | purple - Error: Query Failed - 71: RPC_CALL_FAIL 400: 
CHANNEL_INVALID

I am not sure on the exact impact this has, bu I can at least say:

- One particular channel I subscribe to (https://t.me/sysarmymx) no
  longer marks messages as read

- I receive the messages, but cannot post to the group (my messages
  are silently dropped)

- A couple of days ago, _all_ of my posting and personal messaging
  ability failed (could only read what was being posted)

I have tried unsubscribing and subscribing again, to no avail.

Thank you very much,

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.3.0-2-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages telegram-purple depends on:
ii  libc6 2.29-3
ii  libgcrypt20   1.8.5-3
ii  libglib2.0-0  2.62.2-3
ii  libpng16-16   1.6.37-1
ii  libpurple02.13.0-2.2+b1
ii  libwebp6  0.6.1-2+b1
ii  zlib1g1:1.2.11.dfsg-1+b1

telegram-purple recommends no packages.

telegram-purple suggests no packages.

-- no debconf information



Bug#951306: snek: unsatisfiable b-d on picolibc-arm-none-eabi

2020-02-14 Thread Keith Packard
Ralf Treinen  writes:

> snek build-depends on picolibc-arm-none-eabi which does not exist (yet)
> in sid.

Yup. It's been stuck in the 'new' queue for several months now.

-- 
-keith


signature.asc
Description: PGP signature


Bug#949751: debian-installer does not create efiboot record

2020-02-14 Thread Leonid Khorolets
пʼятниця, 7 лютого 2020 р. Steve McIntyre  пише:

> Hi again,
>
> Please accept my apologies for the very long delay in responding to
> you. I've had a really busy time with 3 back-to-back conferences and
> I'm just catching up on mail now. :-/
> [...]


thanks for your reply, waiting for Colin :)



-- 
WBR,
Leonid Khorolets


Bug#945442: Re Bug#945442: Possible to backspace past beginning of string...

2020-02-14 Thread Marvin Renich
Control: -1 severity grave

I'm increasing the severity of this bug, as it can cause unintended
behavior of which the user is unaware, in a manner that is close enough
to data loss that it should be considered grave.

One example is when saving a bunch of tagged messages, and backspacing
too far when attempting to change the destination folder, the messages
will be saved to the default (save-hook) folder for the first tagged
message.  If the user is unaware of this bug, the user may not know what
has happened or where the messages have gone.

...Marvin



Bug#950578: (no subject)

2020-02-14 Thread Pete Batard
Just gonna add that the latest UEFI Firmware, released today at 
https://github.com/pftf/RPi4/releases, now contains all the elements 
needed (ACPI binding and UMAC initialization) for the above patch to work.


Which means that, the only limiting factor for UEFI Debian 10.x netinst 
on a Raspberry Pi 4 is that the kernel is missing the patch above.


Thanks,

/Pete



Bug#916260: gparted mounts partition without protection

2020-02-14 Thread Marc Lehmann
On Fri, Feb 14, 2020 at 10:11:13AM -0500, Phillip Susi  
wrote:
> > doesn't matter how exactly I change a file, as long as I can change it
> > when I shouldn't be, it is a security bug.
> 
> True, you can delete the file and replace it, but then it is now owned
> by you instead of the original owner.  It's a fair argument that it
> amounts mostly to the same thing.

Maybe it helps when you realise thta chown can also modify a file...

> > No, there are other possibilities, but that is one way, yes.
> 
> Other possibilities like what?

You yourself mentioned some - in any case, does this lead somewhere?

> >> looser permissions, and that amounts to the same thing as just not
> >> keeping it mounted most of the time.
> >
> > No, these are very different things.
> 
> How so?

If you can't see how not mounting a filesystem and having ti accessible
by various means are very different, I am afraid I don't see how I can
explain it to you.

> In both cases the permissions on the file itself are wrong,

You keep making this false claim, but that doesn't lend it more
credence.  POSIX permissions work the way they work, and if you think some
combination of permissions are wrong, what are the rules to determine
right and wrong and what is your source for this repeated statement?

It seems to me your claim of "wrongess" is a value statement only - do you
have any objective arguments, too?

> > Your question is loaded, because it presumes that the correct permissions
> > are somehow incorrect (a contradiction that any answer would have to
> > accept, which makes it impossible to answer your question). That is
> 
> The permissions allow access that you do not wish it to.  Ipso facto,
> the permissions are incorrect.

Ah, maybe I see where you are copming from - gparted changes effective
permissions, so they are wrong.

Well, congratulations, that's exactly why this is a security bug in
gparted - the user doesn't wish file access and configures the permissions
accordingly, but gparted circumvents this user configuration, and this is
unexpected, and incorrect behaviour.

-- 
The choice of a   Deliantra, the free code+content MORPG
  -==- _GNU_  http://www.deliantra.net
  ==-- _   generation
  ---==---(_)__  __   __  Marc Lehmann
  --==---/ / _ \/ // /\ \/ /  schm...@schmorp.de
  -=/_/_//_/\_,_/ /_/\_\



Bug#951330: keyboard connected to an USB hub does not work in X11 but on console

2020-02-14 Thread Michael Biebl
Am 14.02.2020 um 15:50 schrieb Marc Haber:
> Package: systemd
> Version: 244.2-1
> Severity: normal
> 
> Hi,
> 
> I have a rather complex setup on my desktop.
> 
> - Keyboard A is an ancient IBM keyboard from the 1980ies
> - Keyboard A is connected via an PS/2 to USB adaptor

The only thing that rings a bell is
https://github.com/systemd/systemd/issues/14822

You might try reverting that change as in
https://github.com/systemd/systemd-stable/commit/c4280c342bbf4fa8da833103482362236c18f835

If that doesn't help, you'll probably need to run git bisect on the
systemd-stable branch to find the faulty commit.
https://github.com/systemd/systemd-stable/commits/v244-stable

Regards,
Michael


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#950720: FTBFS: error: conflicting declaration ‘typedef long long unsigned int __u64’

2020-02-14 Thread Hilmar Preuße
Control: tags 950720 - patch + pending

Am 05.02.2020 um 12:11 teilte Hilmar Preusse mit:

> the package FTBFS on s390x & arm64.
> 
> ./atoms/include/typedfs.h:73:14: note: previous declaration as ‘typedef long 
> int __s64’
>73 |  typedef int __s64 __attribute__((mode(DI)));
>   |  ^
> ./atoms/include/typedfs.h:77:16: error: conflicting declaration ‘typedef long 
> long unsigned int __u64’
>77 |  #define __u64 __u64
>   |^
> ./atoms/include/typedfs.h:74:23: note: previous declaration as ‘typedef long 
> unsigned int __u64’
>74 |  typedef unsigned int __u64 __attribute__((mode(DI)));
>   |   ^
> make[2]: *** [makefile:151: wp2latex.o] Error 1
> make[2]: Leaving directory '/<>/sources.cc'
> 
The issue is solved in upstreams repository, but there is no easy patch
I could apply. (Un)tagging.

H.
-- 
sigfault
#206401 http://counter.li.org



signature.asc
Description: OpenPGP digital signature


Bug#916260: gparted mounts partition without protection

2020-02-14 Thread Phillip Susi


Marc Lehmann writes:

> When you recreate a file with different contents you have modified it.
> Anything else is weird word twisting, and not useful in this context - it
> doesn't matter how exactly I change a file, as long as I can change it
> when I shouldn't be, it is a security bug.

True, you can delete the file and replace it, but then it is now owned
by you instead of the original owner.  It's a fair argument that it
amounts mostly to the same thing.

> No, there are other possibilities, but that is one way, yes.

Other possibilities like what?

>> looser permissions, and that amounts to the same thing as just not
>> keeping it mounted most of the time.
>
> No, these are very different things.

How so?  In both cases the permissions on the file itself are wrong,
and you are relying other mechanisms to stop access before it gets to
checking the wrong permissions.

> Your question is loaded, because it presumes that the correct permissions
> are somehow incorrect (a contradiction that any answer would have to
> accept, which makes it impossible to answer your question). That is
> not

The permissions allow access that you do not wish it to.  Ipso facto,
the permissions are incorrect.



Bug#951332: ITP: restfuldb -- Web frontend for SQL databases

2020-02-14 Thread merkys
Package: wnpp
Owner: Andrius Merkys 
Severity: wishlist
Control: block -1 by 951190 950611

* Package name    : restfuldb
  Version : 0.13.1
  Upstream Author : Saulius Gražulis 
* URL : https://projects.ibt.lt/repositories/projects/restfuldb
* License : GPL-2
  Programming Lang: Perl
  Description : Web frontend for SQL databases

RestfulDB is a Web frontend for SQL databases. It provides both a Web GUI
and a RESTful API for interaction with any MySQL/MariaDB or SQLite database.
RestfulDB is developed with off-the-shelf usage in mind, but nevertheless
it provides the means to override the default interpretations of underlying
database's schema and data.

Declaration of interests: I am one of the upstream developers of this
project.



Bug#951331: merge HexChat AppArmor profile

2020-02-14 Thread Patrick Schleizer
Package: hexchat
Severity: normal
X-Debbugs-CC: whonix-de...@whonix.org

Dear maintainer,

could you please review and merge the following AppArmor profile?

Called "XChat" but the package name was just not renamed to "HexChat".
The profile is tested with HexChat.

https://github.com/Whonix/apparmor-profile-xchat

Direct links to relevant files:

https://github.com/Whonix/apparmor-profile-xchat/blob/master/etc/apparmor.d/usr.bin.hexchat

https://github.com/Whonix/apparmor-profile-xchat/blob/master/etc/apparmor.d/abstractions/xchat-based

Cheers,
Patrick



Bug#951329: FTBFS in buster with linux-source-4.19 4.19.98-1

2020-02-14 Thread Santiago R.R.
Package: user-mode-linux
Version: 4.19-1um-1
Severity: serious
Tags: patch

Dear maintainer,

The current user-mode-linux package in buster fails to build the latest
linux kernel in buster due to the fix-port-helper-path.patch:

Applying patch 
/build/user-mode-linux-4.19-1um/debian/patches/fix-port-helper-path.patch
patching file arch/um/drivers/port_user.c
Hunk #1 FAILED at 168.
1 out of 1 hunk FAILED -- rejects in file arch/um/drivers/port_user.c
Patch /build/user-mode-linux-4.19-1um/debian/patches/fix-port-helper-path.patch 
can be reverse-applied
make: *** [debian/rules:54: patch-stamp] Error 1
dpkg-buildpackage: error: debian/rules build subprocess returned exit status 2
I: copying local configuration
E: Failed autobuilding of package

Removing it solves the issue:

diff --git a/debian/patches/series b/debian/patches/series
index 5f98481..29faa0f 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -3,4 +3,3 @@
 05_fix_static_build.patch
 06-fix-linkage-on-386-arch.patch
 07-remove-rpath.patch
-fix-port-helper-path.patch

BTW, I will prepare a git branch in my personal salsa namespace. But I
am not sure against which branch should I propose a MR.

Cheers,

 -- Santiago


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 
'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-3-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=es_CO.UTF-8, LC_CTYPE=es_CO.UTF-8 (charmap=UTF-8), 
LANGUAGE=es_CO.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages user-mode-linux depends on:
ii  libc6  2.29-10

Versions of packages user-mode-linux recommends:
ii  uml-utilities  20070815.3-1

Versions of packages user-mode-linux suggests:
ii  rootstrap 0.3.25-1
ii  rxvt-unicode [x-terminal-emulator]9.22-6+b2
pn  slirp 
ii  terminator [x-terminal-emulator]  1.91-4
ii  user-mode-linux-doc   20060501-3
pn  vde2  
ii  xfce4-terminal [x-terminal-emulator]  0.8.9.1-1
ii  xterm [x-terminal-emulator]   353-1

-- no debconf information



Bug#779077: apache2-bin: crash with segmentation fault if gracefully reloaded twice too quickly

2020-02-14 Thread Harri Suutari
This bug did not go away by updating from Stretch to Buster.

A quick fix seems to be changing 'reload' to 'restart' in the
logrotate conf file /etc/logrotate.d/apache2.

--


  Harri



Bug#951328: jove: [INTL:nl] Dutch translation of debconf messages

2020-02-14 Thread Frans Spiesschaert
 
 
Package: jove 
Severity: wishlist 
Tags: l10n patch 
 
 
 
Dear Maintainer, 
 
 
Please find attached the updated Dutch translation of jove debconf
messages. 
It has been submitted for review to the debian-l10n-dutch mailing list. 
Please add it to your next package revision. 
It should be put as debian/po/nl.po in your package build tree. 
 

-- 
Met vriendelijke groet,
Frans Spiesschaert



nl.po.gz
Description: application/gzip


Bug#951305: r-cran-rockchalk: unsatisfiable build-dependency on r-cran-kutils

2020-02-14 Thread Andreas Tille
Hi Ralf,

I would have bet I have uploaded r-cran-kutils together with
r-cran-rockchalk to new - but it does not seem to be the case.

@Thorsten:  If you have time could you please have a look at the
just uploaded r-cran-kutils?

Thanks a lot

  Andreas.

On Fri, Feb 14, 2020 at 08:57:41AM +0100, Ralf Treinen wrote:
> Source: r-cran-rockchalk
> Version: 1.8.144+dfsg-1
> Severity: serious
> User: trei...@debian.org
> Usertags: edos-uninstallable
> 
> Hi,
> 
> r-cran-rockchalk build-depends on r-cran-kutils which does not exist in
> sid.
> 
> -Ralf
> 
> ___
> R-pkg-team mailing list
> r-pkg-t...@alioth-lists.debian.net
> https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/r-pkg-team

-- 
http://fam-tille.de



Bug#951327: thunar: Does not respect DISPLAY variable. Always opens on the primary X screen.

2020-02-14 Thread Harri Suutari
Package: thunar
Version: 1.8.4-1
Severity: important

Hi,

I have four monitors as separate X screens. So on each screen I get a different
value for the DISPLAY environment variable:
DISPLAY=:0.0
DISPLAY=:0.1
DISPLAY=:0.2
DISPLAY=:0.3

But in Buster on Xfce desktop now Thunar window now always opens up on the
primary :0.0 monitor. Like if it didn't realize the existence of several
monitors. No matter how it's started: either from the desktop icons or from the
applications menu. This was not the case with Stretch and earlier releases.

Xfce is now quite awkward to use, as the file manager can be used on only one
of the monitors.

Regards,
Harri



-- System Information:
Debian Release: 10.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.utf8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_DK.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages thunar depends on:
ii  desktop-file-utils  0.23-4
ii  exo-utils   0.12.4-1
ii  libatk1.0-0 2.30.0-2
ii  libc6   2.28-10
ii  libcairo2   1.16.0-4
ii  libexo-2-0  0.12.4-1
ii  libgdk-pixbuf2.0-0  2.38.1+dfsg-1
ii  libglib2.0-02.58.3-2+deb10u2
ii  libgtk-3-0  3.24.5-1
ii  libgudev-1.0-0  232-2
ii  libice6 2:1.0.9-2
ii  libnotify4  0.7.7-4
ii  libpango-1.0-0  1.42.4-7~deb10u1
ii  libsm6  2:1.2.3-1
ii  libthunarx-3-0  1.8.4-1
ii  libxfce4ui-2-0  4.12.1-3
ii  libxfce4util7   4.12.1-3
ii  libxfconf-0-2   4.12.1-1
ii  shared-mime-info1.10-1
ii  thunar-data 1.8.4-1

Versions of packages thunar recommends:
ii  dbus-x11 [dbus-session-bus]  1.12.16-1
ii  gvfs 1.38.1-5
ii  libcairo-gobject21.16.0-4
ii  libpangocairo-1.0-0  1.42.4-7~deb10u1
ii  libxfce4panel-2.0-4  4.12.2-1
pn  policykit-1-gnome | polkit-1-auth-agent  
ii  thunar-volman0.9.1-1
ii  tumbler  0.2.3-1
ii  udisks2  2.8.1-4
ii  xdg-user-dirs0.17-2

Versions of packages thunar suggests:
ii  thunar-archive-plugin 0.4.0-2
ii  thunar-media-tags-plugin  0.3.0-2

-- no debconf information



Bug#951310: Delaying transition

2020-02-14 Thread Alastair McKinstry
Hi,


The SOVERSION revision in 3.1.5rc1 was an error; its not bumping the
soversion until the 4.x releas, expected Q2 this year.

I am postponing any changes on pmix until then as reverting (renaming
libpmix3->libpmix2) for a minor bugfix release in the interim

seems  suboptimal.

Regards

Alastair

-- 
Alastair McKinstry, , , 
https://diaspora.sceal.ie/u/amckinstry
Misentropy: doubting that the Universe is becoming more disordered. 



Bug#937870: Bug#947296: mercurial-keyring: Python2 removal in sid/bullseye

2020-02-14 Thread Andrej Shadura
On Thu, 30 Jan 2020 12:08:33 +0300 Dmitry Shachnev 
wrote:
> setuptools-scm has removed Python 2 support (see #938470), so python-keyring
> build-dependencies are no longer satisfiable.

It has since been reintroduced.

> Thus I am going to remove Python 2 support from python-keyring, so I am
> bumping severity of this bug. That support will be removed in 10 days from
> now, on some day after 2020-02-09.
> 
> I am also CCing the maintainers of packages which are listed as blockers of
> this bug (mercurial and mercurial-extension-utils).

Well, it would break this package, so you need to wait until Mercurial
switches to Python 3.

-- 
Cheers,
  Andrej



Bug#663763: nouveau: Another case of freezing

2020-02-14 Thread Nicola
Package: xserver-xorg-video-nouveau
Version: 1:1.0.16-1
Followup-For: Bug #663763

Dear Maintainer,

when system starts using the GeForce card the X server freeze or crash.

-- Package-specific info:
/etc/X11/X does not exist.
/etc/X11/X is not a symlink.
/etc/X11/X is not executable.

VGA-compatible devices on PCI bus:
--
00:02.0 VGA compatible controller [0300]: Intel Corporation UHD Graphics 620 
[8086:5917] (rev 07)

/etc/X11/xorg.conf does not exist.

Contents of /etc/X11/xorg.conf.d:
-
total 20
-rw-r--r-- 1 root root 1350 Sep 10  2018 10-quirks.conf
-rw-r--r-- 1 root root  267 Sep 10  2018 30-gpu.conf
-rw-r--r-- 1 root root  584 Sep 10  2018 40-libinput.conf
-rw-r--r-- 1 root root  113 Sep 10  2018 50-multitouch.conf
-rw-r--r-- 1 root root 1608 Sep 10  2018 70-synaptics.conf

/etc/modprobe.d contains no KMS configuration files.

Kernel version (/proc/version):
---
Linux version 5.4.0-3-amd64 (debian-ker...@lists.debian.org) (gcc version 9.2.1 
20200117 (Debian 9.2.1-24)) #1 SMP Debian 5.4.13-1 (2020-01-19)

Xorg X server log files on system:
--
-rw-r--r-- 1 root libvirtdbus  7250 Sep 10  2018 /var/log/Xorg.8.log
-rw-r--r-- 1 root root 5827 Apr  2  2019 /var/log/Xorg.1.log
-rw-r--r-- 1 root root35452 Feb 14 14:57 /var/log/Xorg.0.log

Contents of most recent Xorg X server log file (/var/log/Xorg.0.log):
-
[ 7.031] 
X.Org X Server 1.20.7
X Protocol Version 11, Revision 0
[ 7.031] Build Operating System: Linux 4.19.0-6-amd64 x86_64 Debian
[ 7.031] Current Operating System: Linux lenovo 5.4.0-3-amd64 #1 SMP Debian 
5.4.13-1 (2020-01-19) x86_64
[ 7.031] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-5.4.0-3-amd64 
root=UUID=370651b9-1f6d-4559-9316-cbeea8815771 ro quiet acpi_osi=Linux
[ 7.031] Build Date: 14 January 2020  10:13:49AM
[ 7.031] xorg-server 2:1.20.7-2 (https://www.debian.org/support) 
[ 7.031] Current version of pixman: 0.36.0
[ 7.031]Before reporting problems, check http://wiki.x.org
to make sure that you have the latest version.
[ 7.031] Markers: (--) probed, (**) from config file, (==) default setting,
(++) from command line, (!!) notice, (II) informational,
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[ 7.031] (==) Log file: "/var/log/Xorg.0.log", Time: Fri Feb 14 11:15:02 
2020
[ 7.032] (==) Using config directory: "/etc/X11/xorg.conf.d"
[ 7.032] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[ 7.033] (==) No Layout section.  Using the first Screen section.
[ 7.033] (==) No screen section available. Using defaults.
[ 7.033] (**) |-->Screen "Default Screen Section" (0)
[ 7.033] (**) |   |-->Monitor ""
[ 7.034] (==) No device specified for screen "Default Screen Section".
Using the first device section listed.
[ 7.034] (**) |   |-->Device "Intel Graphics"
[ 7.034] (**) |   |-->GPUDevice "GeForce MX130"
[ 7.034] (==) No monitor specified for screen "Default Screen Section".
Using a default monitor configuration.
[ 7.034] (==) Automatically adding devices
[ 7.034] (==) Automatically enabling devices
[ 7.034] (==) Automatically adding GPU devices
[ 7.034] (==) Max clients allowed: 256, resource mask: 0x1f
[ 7.035] (WW) The directory "/usr/share/fonts/X11/cyrillic" does not exist.
[ 7.035]Entry deleted from font path.
[ 7.036] (==) FontPath set to:
/usr/share/fonts/X11/misc,
/usr/share/fonts/X11/100dpi/:unscaled,
/usr/share/fonts/X11/75dpi/:unscaled,
/usr/share/fonts/X11/Type1,
/usr/share/fonts/X11/100dpi,
/usr/share/fonts/X11/75dpi,
built-ins
[ 7.036] (==) ModulePath set to "/usr/lib/xorg/modules"
[ 7.036] (II) The server relies on udev to provide the list of input 
devices.
If no devices become available, reconfigure udev or disable 
AutoAddDevices.
[ 7.036] (II) Loader magic: 0x562024663e40
[ 7.036] (II) Module ABI versions:
[ 7.036]X.Org ANSI C Emulation: 0.4
[ 7.036]X.Org Video Driver: 24.1
[ 7.036]X.Org XInput driver : 24.1
[ 7.036]X.Org Server Extension : 10.0
[ 7.036] (++) using VT number 7

[ 7.036] (II) systemd-logind: logind integration requires -keeptty and 
-keeptty was not provided, disabling logind integration
[ 7.037] (II) xfree86: Adding drm device (/dev/dri/card0)
[ 7.045] (II) xfree86: Adding drm device (/dev/dri/card1)
[ 7.048] (--) PCI:*(0@0:2:0) 8086:5917:17aa:39cc rev 7, Mem @ 
0xa200/16777216, 0xb000/268435456, I/O @ 0x4000/64, BIOS @ 
0x/131072
[ 7.048] (--) PCI: (1@0:0:0) 10de:174d:17aa:39cc rev 162, Mem @ 
0xa300/16777216, 0x9000/268435456, 0xa000/33554432, I/O @ 
0x3000/128
[ 7.049] (II) LoadModule: 

Bug#951326: ITP: libobject-lazy-perl -- create objects late from non-owned classes

2020-02-14 Thread merkys
Package: wnpp
Owner: Andrius Merkys 
Severity: wishlist

* Package name    : libobject-lazy-perl
  Version : 0.15
  Upstream Author : Steffen Winkler 
* URL : https://metacpan.org/release/Object-Lazy
* License : Artistic
  Programming Lang: Perl
  Description : create objects late from non-owned classes
 Object::Lazy implements lazy evaluation and can create lazy objects from
 every class.
 .
 Creates a dummy object including a subroutine which knows how to build the
 real object.
 .
 Later, if a method of the object is called, the real object will be built.
 .
 Inherited methods from UNIVERSAL.pm are implemented and so overwritten.
This
 are isa, DOES, can and VERSION.

Remark: This package is to be maintained with Debian Perl Group at
   https://salsa.debian.org/perl-team/modules/packages/libobject-lazy-perl



Bug#951325: rr: Changed path for librrpreload{,_32}.so causes problems

2020-02-14 Thread Michael Weghorn
Package: rr
Version: 5.3.0-1
Severity: normal
Tags: patch

Dear Maintainer,

while trying to use 'rr' for debugging LibreOffice, it turned out that
this no longer works with rr version 5.3.0-1, while it did with the
previous version 5.2.0-5 and with a local build of rr.

As turned out, the cause seems to be that the libraries 'librrpreload.so' and
'librrpreload_32.so' are now located in /usr/lib/x86_64-linux-gnu/rr/
while rr expects them in /usr/lib/rr/ .

Building the package with the attached patch made things work again for
me, but there might be a better way to address the issue.

Details on the issue I saw with LibreOffice below, but I suppose that
other use cases needing those libraries may be affected as well.

Regards,
Michael

To reproduce (with package libreoffice 1:6.4.0-1 installed):

record a session (just close the LibreOffice window once it appears):


$ rr record /usr/lib/libreoffice/program/soffice.bin --writer
rr: Saving execution to trace directory 
`/home/michi/.local/share/rr/soffice.bin-77'.

Replay:


$ rr replay -s 50505 -k
Launch gdb with
  gdb '-l' '1' '-ex' 'set sysroot /' '-ex' 'target extended-remote 
127.0.0.1:50505' /usr/lib/libreoffice/program/soffice.bin

Then attach from another terminal using the above command and keep an
eye on the output of the 'rr replay -s 50505 -k' command to see it fails as 
follows:

[FATAL /build/rr-XWGEix/rr-5.3.0/src/Task.cc:2218:read_bytes_helper() 
errno: EIO]
 (task 671896 (rec:671731) at time 83127)
 -> Assertion `false' failed to hold. Should have read 40 bytes from 
0x7fac6e6e6000, but only read -1
Tail of trace dump:
{
  real_time:28495.885633 global_time:83107, event:`SYSCALL: rt_sigaction' 
(state:EXITING_SYSCALL) tid:671731, ticks:825
rax:0x0 rbx:0x7ffd2f9da450 rcx:0x rdx:0x7fac6e6e6dd0 
rsi:0x0 rdi:0x40 rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6d30 r8:0x7fac6e6e6f20 r9:0x0 
r10:0x8 r11:0x246 r12:0x7fac6e6e6f20 r13:0x1 r14:0x7ffd2f9da6a0 r15:0x40 
rip:0x7facb58940b2 eflags:0x246 cs:0x33 ss:0x2b ds:0x0 es:0x0 fs:0x0 gs:0x0 
orig_rax:0xd fs_base:0x7facb018ad00 gs_base:0x0
  { tid:671731, addr:0x7fac6e6e6dd0, length:0x20 }
}
{
  real_time:28495.885673 global_time:83108, event:`SYSCALL: rt_sigaction' 
(state:ENTERING_SYSCALL) tid:671731, ticks:831
rax:0xffda rbx:0x7ffd2f9da450 rcx:0x rdx:0x0 
rsi:0x7fac6e6e6d30 rdi:0x40 rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6d30 r8:0x0 r9:0x0 
r10:0x8 r11:0x246 r12:0x7fac6e6e6f20 r13:0x1 r14:0x7ffd2f9da6a0 r15:0x40 
rip:0x7facb58940b2 eflags:0x246 cs:0x33 ss:0x2b ds:0x0 es:0x0 fs:0x0 gs:0x0 
orig_rax:0xd fs_base:0x7facb018ad00 gs_base:0x0
}
{
  real_time:28495.885703 global_time:83109, event:`SYSCALL: rt_sigaction' 
(state:EXITING_SYSCALL) tid:671731, ticks:831
rax:0x0 rbx:0x7ffd2f9da450 rcx:0x rdx:0x0 
rsi:0x7fac6e6e6d30 rdi:0x40 rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6d30 r8:0x0 r9:0x0 
r10:0x8 r11:0x246 r12:0x7fac6e6e6f20 r13:0x1 r14:0x7ffd2f9da6a0 r15:0x40 
rip:0x7facb58940b2 eflags:0x246 cs:0x33 ss:0x2b ds:0x0 es:0x0 fs:0x0 gs:0x0 
orig_rax:0xd fs_base:0x7facb018ad00 gs_base:0x0
  { tid:671731, addr:0x7fac6e6e6d30, length:0x20 }
}
{
  real_time:28495.885743 global_time:83110, event:`SYSCALL: dup2' 
(state:ENTERING_SYSCALL) tid:671731, ticks:844
rax:0xffda rbx:0x7ffd2f9da450 rcx:0x rdx:0x0 
rsi:0x1 rdi:0xf rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6e78 r8:0x0 r9:0x0 r10:0x8 
r11:0x246 r12:0x7facb59dbb24 r13:0x0 r14:0x7ffd2f9da6a0 r15:0x559ff8d70400 
rip:0x7facb5945f07 eflags:0x246 cs:0x33 ss:0x2b ds:0x0 es:0x0 fs:0x0 gs:0x0 
orig_rax:0x21 fs_base:0x7facb018ad00 gs_base:0x0
}
{
  real_time:28495.885772 global_time:83111, event:`SYSCALL: dup2' 
(state:EXITING_SYSCALL) tid:671731, ticks:844
rax:0x1 rbx:0x7ffd2f9da450 rcx:0x rdx:0x0 rsi:0x1 rdi:0xf 
rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6e78 r8:0x0 r9:0x0 r10:0x8 r11:0x246 
r12:0x7facb59dbb24 r13:0x0 r14:0x7ffd2f9da6a0 r15:0x559ff8d70400 
rip:0x7facb5945f07 eflags:0x246 cs:0x33 ss:0x2b ds:0x0 es:0x0 fs:0x0 gs:0x0 
orig_rax:0x21 fs_base:0x7facb018ad00 gs_base:0x0
}
{
  real_time:28495.885869 global_time:83112, event:`SYSCALL: rt_sigprocmask' 
(state:ENTERING_SYSCALL) tid:671731, ticks:848
rax:0xffda rbx:0x7ffd2f9da450 rcx:0x rdx:0x0 
rsi:0x7ffd2f9da390 rdi:0x2 rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6e78 r8:0x0 r9:0x0 
r10:0x8 r11:0x246 r12:0x7facb59dbb24 r13:0x1 r14:0x7ffd2f9da6a0 
r15:0x559ff8d70400 rip:0x7facb589420d eflags:0x246 cs:0x33 ss:0x2b ds:0x0 
es:0x0 fs:0x0 gs:0x0 orig_rax:0xe fs_base:0x7facb018ad00 gs_base:0x0
}
{
  real_time:28495.885899 global_time:83113, event:`SYSCALL: rt_sigprocmask' 
(state:EXITING_SYSCALL) tid:671731, ticks:848
rax:0x0 rbx:0x7ffd2f9da450 rcx:0x rdx:0x0 
rsi:0x7ffd2f9da390 rdi:0x2 rbp:0x7fac6e6e6ff0 rsp:0x7fac6e6e6e78 r8:0x0 r9:0x0 
r10:0x8 r11:0x246 

Bug#951323: emacs stop working when using xterm-mouse-mode in st

2020-02-14 Thread Ronald Chavez
Package: emacs
Version: 1:26.1+1-3.2+deb10u1
Severity: normal

Dear Maintainer,

   * What led up to the situation?
 1. using "emacs -nw" in stterm
 2. xterm-mouse-mode
 3. M-x customize-variable
 4. Info-default-directory-list
 5. click with mouse, first button, on "[INS]" (try add new entry)
   * What was the outcome of this action?
 emacs "freezes" no reaction to keys or mouse, have to kill it.
 emacs prints code in the echo area like:
 down-mouse-1 ESC [ < 0 ; 3 ; 1 5 m ESC ...
   * What outcome did you expect instead?
 adding new info default directory path.

-- System Information:
Distributor ID: Debian
Architecture: x86_64

Versions of packages emacs depends on:
ii  emacs-gtk  1:26.1+1-3.2+deb10u1
ii  stterm 0.8.2-1


signature.asc
Description: PGP signature


Bug#951324: CTest does not detect NUMA correctly

2020-02-14 Thread Simon Richter
Package: cmake
Version: 3.15.4-1
Severity: minor
Tags: upstream

Hi,

I've run ctest on a dual-socket machine, and the generated report contains

NumberOfLogicalCPU="64"
NumberOfPhysicalCPU="1"

That is wrong. numastat shows two nodes, node 0 and node 8.

   Simon

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: ppc64el (ppc64le)

Kernel: Linux 5.3.0-3-powerpc64le (SMP w/64 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages cmake depends on:
ii  cmake-data3.15.4-1
ii  libarchive13  3.4.0-1+b1
ii  libc6 2.29-10
ii  libcurl4  7.67.0-2
ii  libexpat1 2.2.9-1
ii  libgcc1   1:9.2.1-25
ii  libjsoncpp1   1.7.4-3.1
ii  librhash0 1.3.9-1
ii  libstdc++69.2.1-25
ii  libuv11.34.2-1
ii  procps2:3.3.15-2+b1
ii  zlib1g1:1.2.11.dfsg-1.2

Versions of packages cmake recommends:
ii  gcc   4:9.2.1-3.1
ii  make  4.2.1-1.2

Versions of packages cmake suggests:
pn  cmake-doc
ii  ninja-build  1.10.0-1

-- no debconf information



Bug#951143: Committed to SVN

2020-02-14 Thread Jonathan Carter
Upstream have committed a fix for this to SVN, so it enchant-2 should be
supported in the next upstream release.

https://sourceforge.net/p/bluefish/tickets/16/



Bug#898159: openntpd: ifup is blocked for 15 sec by openntpd restart if ntpserver is not reachable

2020-02-14 Thread Fabrice Meyer
Dear Maintainer,

This issue is still present in buster. It would be create if it could be
fixed. In the meantime a workaround is to delete
/etc/network/if-up.d/openntpd (which is quite dirty).

Best regards,

On Tue, 08 May 2018 10:29:46 +0200 Daniel Krambrock  wrote:

> Package: openntpd
> Version: 1:6.0p1-2
> Severity: important
> Tags: patch
>
> Dear Maintainer,
>
> on stretch openntpd restarts every time a new interface is added. On boot,
> without the interface that provides network and many bridge
interfaces, this
> leeds to a timeout of networking.service and failed ntp.service.
>
> For example starting br_vlan1040:
>
> May 07 15:56:17 node16 kernel: br_vlan1040: port 1(vlan1040) entered
blocking
> state
> May 07 15:56:17 node16 kernel: br_vlan1040: port 1(vlan1040) entered
disabled
> state
> May 07 15:56:17 node16 kernel: device vlan1040 entered promiscuous mode
> May 07 15:56:17 node16 kernel: br_vlan1040: port 1(vlan1040) entered
blocking
> state
> May 07 15:56:17 node16 kernel: br_vlan1040: port 1(vlan1040) entered
forwarding
> state
> May 07 15:56:17 node16 kernel: IPv6: ADDRCONF(NETDEV_UP): br_vlan1040:
link is
> not ready
> May 07 15:56:17 node16 ntpd[1333]: ntp engine exiting
> May 07 15:56:17 node16 systemd[1]: Stopping OpenNTPd Network Time
Protocol...
> May 07 15:56:17 node16 ntpd[1336]: Terminating
> May 07 15:56:17 node16 systemd[1]: Stopped OpenNTPd Network Time Protocol.
> May 07 15:56:17 node16 systemd[1]: Starting OpenNTPd Network Time
Protocol...
> May 07 15:56:18 node16 ntpd[1756]: configuration OK
> May 07 15:56:18 node16 ntpd[2173]: ntpd: can't set priority:
Permission denied
> May 07 15:56:18 node16 ntpd[2266]: ntp engine ready
> May 07 15:56:18 node16 kernel: IPv6: ADDRCONF(NETDEV_CHANGE):
br_vlan1040: link
> becomes ready
> May 07 15:56:33 node16 ntpd[2173]: no reply received in time, skipping
initial
> time setting
> May 07 15:56:33 node16 systemd[1]: Started OpenNTPd Network Time Protocol.
> May 07 15:56:33 node16 systemd[1]: Reloading OpenBSD Secure Shell server.
> May 07 15:56:33 node16 sshd[18649]: Received SIGHUP; restarting.
> May 07 15:56:33 node16 systemd[1]: Reloaded OpenBSD Secure Shell server.
> May 07 15:56:33 node16 sshd[18649]: Server listening on 0.0.0.0 port 22.
> May 07 15:56:33 node16 sshd[18649]: Server listening on :: port 22.
>
> I found a fix here:
>
https://github.com/debops/debops/pull/325/commits/648434f7fc87b3e0764c9635a5c4b0ee2161925f
> witch leeds to the patch:
>
> ~# diff -u openntpd_orig/etc/network/if-up.d/openntpd /etc/network/if-
> up.d/openntpd
> --- openntpd_orig/etc/network/if-up.d/openntpd 2016-11-11
22:47:56.0
> +0100
> +++ /etc/network/if-up.d/openntpd 2018-05-08 10:16:42.885001246 +0200
> @@ -7,4 +7,14 @@
> exit 0
> fi
>
> -invoke-rc.d openntpd force-reload || true
> +if [ "$MODE" != start ]; then
> + exit 0
> +fi
-- 
**Fabrice MEYER*
Software and System Engineer*

EDF Store & Forecast
13 Avenue Albert Einstein
69100 Villeurbanne
France

*fabrice.me...@edf-sf.com*
*www.edf-sf.com*



Bug#951322: ITP: terminews -- Manage RSS sources and display news feed in terminal

2020-02-14 Thread Alois Micard
Package: wnpp
Severity: wishlist
Owner: Alois Micard 

* Package name: terminews
  Version : 1.2.0-1
  Upstream Author : Alex Ntavelos
* URL : https://github.com/antavelos/terminews
* License : GPL-3.0
  Programming Lang: Go
  Description : Manage RSS sources and display news feed in terminal

 terminews is a terminal based application (TUI) which makes use
 of the gocui (https://github.com/jroimartin/gocui) and gofeed
 (https://github.com/mmcdole/gofeed) libraries and allows you to manage
 RSS resources and display their news feed. Currently it is only compatible
 with Linux environments.

-
Aloïs Micard 

GPG: rsa4096/A5999EBDFC063F1F



Bug#951320: closed by Michael Biebl (Re: Bug#951320: systemd: network-online.target exits too early -> autofs with ldap fails)

2020-02-14 Thread Michael Prokop
* Henrik Schmidt [Fri Feb 14, 2020 at 01:49:26PM +0100]:
> Debian Bug Tracking System schrieb am 14.02.20 um 13:45:

> > This is an automatic notification regarding your Bug report
> > which was filed against the systemd package:

> > #951320: systemd: network-online.target exits too early -> autofs with ldap 
> > fails

> > It has been closed by Michael Biebl .

> > Their explanation is attached below along with your original report.
> > If this explanation is unsatisfactory and you have not received a
> > better one in a separate message then please contact Michael Biebl 
> >  by
> > replying to this email.

> since this seems to be a debain bug where to I report it to get a better
> answer than an immediate bug report closure?

Michael closed the bug report while providing details and reasoning
about it (which you seemed to have snipped in your reply, see "Their
explanation is attached below" from above).

See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951320#10

regards
-mika-


signature.asc
Description: Digital signature


Bug#951321: liblog4cplus-dev: Library metadata file is missing

2020-02-14 Thread Nikolov Alexey EXT
Package: liblog4cplus-dev
Version: 1.1.2-3.2
Severity: important
Tags: patch

Dear Maintainer,

While trying to link up a CMake project with this library, an error occured:

```
-- Checking for module 'log4cplus'
--   No package 'log4cplus' found
CMake Error at /usr/share/cmake-3.13/Modules/FindPkgConfig.cmake:452 (message):
  A required package was not found
Call Stack (most recent call first):
  /usr/share/cmake-3.13/Modules/FindPkgConfig.cmake:622 
(_pkg_check_modules_internal)
  src/CMakeLists.txt:9 (pkg_check_modules)
```

This is because the *log4cplus.pc* file is not packaged.

-- System Information:
Debian Release: 10.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), 
LANGUAGE=ru_RU:ru (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages liblog4cplus-dev depends on:
ii  liblog4cplus-1.1-9  1.1.2-3.2

liblog4cplus-dev recommends no packages.

liblog4cplus-dev suggests no packages.

-- no debconf information

--- log4cplus-1.1.2/debian/liblog4cplus-dev.install	2016-08-08 14:02:11.0 +0300
+++ log4cplus-1.1.2-new/debian/liblog4cplus-dev.install	2020-02-14 14:36:16.973646620 +0200
@@ -2,3 +2,4 @@
 usr/include/log4cplus/*
 usr/lib/*/liblog4cplus.a
 usr/lib/*/liblog4cplus.la
+usr/lib/*/pkgconfig/*


Bug#951320: closed by Michael Biebl (Re: Bug#951320: systemd: network-online.target exits too early -> autofs with ldap fails)

2020-02-14 Thread Henrik Schmidt
Debian Bug Tracking System schrieb am 14.02.20 um 13:45:
> This is an automatic notification regarding your Bug report
> which was filed against the systemd package:
>
> #951320: systemd: network-online.target exits too early -> autofs with ldap 
> fails
>
> It has been closed by Michael Biebl .
>
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact Michael Biebl 
>  by
> replying to this email.
>
>
Hi,

since this seems to be a debain bug where to I report it to get a better
answer than an immediate bug report closure?

Best

Henrik Schmidt



Bug#951070: debian-edu-config: make Debian-Edu_rootCA available via /etc/ssl/certs/ca-certificates.crt

2020-02-14 Thread Mike Gabriel

Hi Wolfgang,

On  Fr 14 Feb 2020 11:52:44 CET, Wolfgang Schweer wrote:


On Thu, Feb 13, 2020 at 08:21:27PM +0100, Wolfgang Schweer wrote:

On Wed, Feb 12, 2020 at 08:20:08PM +0100, Wolfgang Schweer wrote:
> On Wed, Feb 12, 2020 at 07:09:21PM +, Mike Gabriel wrote:
> > The simpleness of the fetch-ldap-cert version you propose is
> > tempting. But this version will only work against TJENERs that have
> > a Debian-Edu_rootCA.crt exported via www.intern.

Considering...

[Mike]

> This assures that Debian-Edu_rootCA is available in the system-wide CA
> bundle in /etc/ssl/certs/ca-certificates.crt.

> This issue relates to #926388 (let Firefox trust
> /etc/ssl/certs/ca-certificates.crt)

...let's me think, that this bug is only fixable for Debian Edu 10 and
higher anyway.


Some more thoughts:

My proposed script could be added as fetch-rootca-cert because that's
what it's all about. The fetch-ldap-cert script would be kept in
bullseye (and retired in bullseye+1 aka bookworm).


Yes. That sounds good.


fetch-rootca- could then go into buster-pu, I guess.


Yes. And it should ignore missing Debian-Edu_rootCA.crt on TJENER  
(i.e. a TJENER from Debian 10.0 or earlier).



Also, the firefox-esr policies file (already in the master branch)
should be shipped for buster-pu.


Yes.


The policies file makes shure that FF-ESR shows the green padlock also
in case a user changes the password using gosa-desktop (which is the
recommended way to do that). It is actually quite bad to be warned about
a certificate issue and an insecure connection just in this case.


Indeed.


Reason for the gosa-desktop issue: On first call, a new FF profile is
created on the fly.

IMO the additional profile issue can't be solved with the
p11-kit-trust.so method, which is now deprecated in favour of the
pocicies one, see e.g.:

https://wiki.mozilla.org/CA/AddRootToFirefox

I've tested an appropiately updated d-e-config package both on a buster
10.3 main server and on a buster 10.3 roaming workstation (w/ your fixes
present for that one). Works ok in both cases, green padlocks in all
cases mentioned above.


Great. Please go ahead and push and I will review from there on.

Mike

--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpkmOs0O7_Zw.pgp
Description: Digitale PGP-Signatur


Bug#931173: Configuring static networking via NoCloud with Network Config Version 2 does not work

2020-02-14 Thread Thomas Goirand
On 2/13/20 12:44 PM, Christian Tramnitz wrote:
> Is there any progress in getting 19.3 into stable? I can see it was not
> part of the Buster 10.3 release.
> If this takes any longer I'd suggest to backport the initially mentioned
> patch.
> 
> 
> BR,
>    Christian

We currently don't have any answer from the release team, so we can't
tell, really. Opening a new big will not help.

Cheers,

Thomas Goirand (zigo)



Bug#951319: libapache2-mod-perl: reduce Build-Depends

2020-02-14 Thread Helmut Grohne
Source: libapache2-mod-perl2
Version: 2.0.11-1
Tags: patch
User: debian-cr...@lists.debian.org
Usertags: cross-satisfiability

libapache2-mod-perl2 cannot be cross built, because a number of build
dependencies are not cross-satisfiable. There are two major techniques
to reduce dependencies that are easily applicable here:
 * Move from Build-Depends to Build-Depends-Indep.
 * Annotate with .
Both techniques render the affected dependencies irrelevant to cross
building. I've taken the time to figure out which dependencies can be
reduced and verified that doing so results in bit-identical .deb files
(if you fix the build path). As such I'm quite confident that these
annotations are correct. Please consider applying the attached patch.
After applying it, the size of the dependency problem for cross
compilation should be significantly reduced.

Helmut
diff --minimal -Nru libapache2-mod-perl2-2.0.11/debian/changelog 
libapache2-mod-perl2-2.0.11/debian/changelog
--- libapache2-mod-perl2-2.0.11/debian/changelog2019-10-13 
18:06:30.0 +0200
+++ libapache2-mod-perl2-2.0.11/debian/changelog2020-02-14 
06:17:04.0 +0100
@@ -1,3 +1,10 @@
+libapache2-mod-perl2 (2.0.11-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Reduce Build-Depends using  and B-D-I. (Closes: #-1)
+
+ -- Helmut Grohne   Fri, 14 Feb 2020 06:17:04 +0100
+
 libapache2-mod-perl2 (2.0.11-1) unstable; urgency=medium
 
   [ gregor herrmann ]
diff --minimal -Nru libapache2-mod-perl2-2.0.11/debian/control 
libapache2-mod-perl2-2.0.11/debian/control
--- libapache2-mod-perl2-2.0.11/debian/control  2019-10-13 16:18:00.0 
+0200
+++ libapache2-mod-perl2-2.0.11/debian/control  2020-02-14 06:17:04.0 
+0100
@@ -10,19 +10,19 @@
 Priority: optional
 Build-Depends: perl,
apache2-dev,
-   apache2 (>= 2.4~),
+   apache2 (>= 2.4~) ,
debhelper (>= 10),
-   libbsd-resource-perl,
-   libcgi-pm-perl,
-   libdevel-symdump-perl,
-   libhtml-parser-perl,
+   libbsd-resource-perl ,
+   libcgi-pm-perl ,
+   libdevel-symdump-perl ,
+   libhtml-parser-perl ,
libhtml-template-perl,
libperl-dev,
libreadonly-perl,
-   libwww-perl,
-   locales-all,
-   netbase,
-   rename
+   libwww-perl ,
+   locales-all ,
+   netbase ,
+Build-Depends-Indep: rename
 Build-Conflicts: apache2-mpm-event
 Standards-Version: 4.4.1
 Vcs-Browser: 
https://salsa.debian.org/perl-team/modules/packages/libapache2-mod-perl2


Bug#951317: www.debian.org: make favicon the same an the all debian websites

2020-02-14 Thread sergio
Package: www.debian.org
Severity: normal

Dear Maintainer,

at least packages.debian.org and snapshot.debian.org use old favicon.

It should be the same on the all debian sites as on www.debian.org,
bugs.debian.org, tracker.debian.org and other. See screenshot attached.


Bug#951257: udevadm: please exit nonzero with "Running in chroot, ignoring request." when /proc is not mounted

2020-02-14 Thread Michael Biebl
Am 14.02.20 um 12:05 schrieb Andreas Henriksson:
> Hello,
> 
> On Thu, Feb 13, 2020 at 02:21:00PM +0100, Michael Biebl wrote:
>> Am 13.02.20 um 14:03 schrieb Trent W. Buck:
> [...]
>>> 78root@DESKTOP-P00TKMM:/# udevadm trigger
>>> Failed to scan devices: No such file or directory
>>
>> You should only get this error message if /sys is not mounted.
>> I assume your chroot has neither /sys nor /proc mounted.
>>
>>
>> systemd-udevd.service has
>> ConditionPathIsReadWrite=/sys
>>
>> You could try to convince upstream to add a similar check to "udevadm
>> trigger"
>>
> 
> Just wanted to chime in here and say that another way at looking at this
> is to say that calling udevadm (and expecting it to exit with success)
> when udev is not running could possibly be considered the bug.
> 
> (Or in other words, it feels wrong to me to expect udevadm to exit with
> success when it's failing to do the job it was asked to do.)
> 
> From a simple codesearch.debian.net search I can see there are atleast
> some packages which tries to only conditionally run udevadm, eg. via
> 'pidof udevd && udevadm ...' and similar in their maintainer scripts.

The question is, whether such a check should be centralized or not.
systemd-udev-trigger.service also has
ConditionPathIsReadWrite=/sys

We could update all maintainer scripts to wrap that udevadm call into a
if [ -w /sys ]; then ... fi
but it doesn't appear to me as the worst idea to move this check
directly into udevadm and let "udevadm trigger" log a warning/notice and
exit 0 if /sys is not writeable.

Michael
So






signature.asc
Description: OpenPGP digital signature


Bug#951316: snapshot.debian.org: favicon update

2020-02-14 Thread sergio
Package: snapshot.debian.org
Severity: normal

Dear Maintainer,

please updade favicon for snapshot.debian.org. It should be the same as
on www.debian.org, bugs.debian.org, tracker.debian.org and other. See
screenshot attached.


Bug#951257: udevadm: please exit nonzero with "Running in chroot, ignoring request." when /proc is not mounted

2020-02-14 Thread Andreas Henriksson
Hello,

On Thu, Feb 13, 2020 at 02:21:00PM +0100, Michael Biebl wrote:
> Am 13.02.20 um 14:03 schrieb Trent W. Buck:
[...]
> > 78root@DESKTOP-P00TKMM:/# udevadm trigger
> > Failed to scan devices: No such file or directory
> 
> You should only get this error message if /sys is not mounted.
> I assume your chroot has neither /sys nor /proc mounted.
> 
> 
> systemd-udevd.service has
> ConditionPathIsReadWrite=/sys
> 
> You could try to convince upstream to add a similar check to "udevadm
> trigger"
> 

Just wanted to chime in here and say that another way at looking at this
is to say that calling udevadm (and expecting it to exit with success)
when udev is not running could possibly be considered the bug.

(Or in other words, it feels wrong to me to expect udevadm to exit with
success when it's failing to do the job it was asked to do.)

From a simple codesearch.debian.net search I can see there are atleast
some packages which tries to only conditionally run udevadm, eg. via
'pidof udevd && udevadm ...' and similar in their maintainer scripts.

(Note: this particular check might not be considered perfect, just one
example. This check will still fail if udevd is running in the host
and you're working in a chroot. That might be considered your fault
for not using a separate namespace though, ie. via systemd-nspawn.)

Regards,
Andreas Henriksson



Bug#951315: linux-image-amd64 vs linux-headers-amd64 Debian buster-backports version mismatch bpo.2 vs bpo.3

2020-02-14 Thread Patrick Schleizer
Package: linux-image-amd64
Severity: normal
X-Debbugs-CC: whonix-de...@whonix.org

Dear maintainer,

package linux-image-amd64 seems to have an outdated dependency.

https://packages.debian.org/buster-backports/linux-image-amd64 shows

dep: linux-image-5.4.0-0.bpo.2-amd64 (= 5.4.8-1~bpo10+1)

https://packages.debian.org/buster-backports/linux-headers-amd64 shows

dep: linux-headers-5.4.0-0.bpo.3-amd64 (= 5.4.13-1~bpo10+1)

bpo.2 vs bpo.3

I am under the assumption that dependency version of linux-image-amd64
should match dependency version of linux-headers-amd64. In comparsion to
buster (non-backports) the version matches. Kindly let me know if that
is an unreasonable assumption.

Bumped into this issue by running:

sudo apt-get -t buster-backports install linux-image-$(dpkg
--print-architecture) linux-headers-$(dpkg --print-architecture)

and then having DKMS report:

/etc/kernel/postinst.d/dkms:
Error! Your kernel headers for kernel 5.4.0-0.bpo.2-amd64 cannot be found.
Please install the linux-headers-5.4.0-0.bpo.2-amd64 package,
or use the --kernelsourcedir option to tell DKMS where it's located

Which was unexpected.

Cheers,
Patrick



Bug#951314: bugs.debian.org: Laptop does not resume when undocked while suspended.

2020-02-14 Thread Robin de Silva Jayasinghe
Package: bugs.debian.org
Severity: normal

Dear Maintainer,

   * What led up to the situation?
Undocking my suspended Laptop and resumed it in the train.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?
Suspended the laptop the night before (via the sleep button). Opened the lid a
day later after I unplugged it from the dock.
   * What was the outcome of this action?
Screen was blank. Switching to other virtual consoles did not work. No reaction
to alt+ctrl+del shortcut. Only reboot by pressing the power button for several
seconds worked for me.
   * What outcome did you expect instead?
Open the lid, see the lock screen, log in.



-- System Information:
Debian Release: 10.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set 
to en_US.UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#951070: debian-edu-config: make Debian-Edu_rootCA available via /etc/ssl/certs/ca-certificates.crt

2020-02-14 Thread Wolfgang Schweer
On Thu, Feb 13, 2020 at 08:21:27PM +0100, Wolfgang Schweer wrote:
> On Wed, Feb 12, 2020 at 08:20:08PM +0100, Wolfgang Schweer wrote:
> > On Wed, Feb 12, 2020 at 07:09:21PM +, Mike Gabriel wrote:
> > > The simpleness of the fetch-ldap-cert version you propose is 
> > > tempting. But this version will only work against TJENERs that have 
> > > a Debian-Edu_rootCA.crt exported via www.intern.
> 
> Considering...
> 
> [Mike]
> 
> > This assures that Debian-Edu_rootCA is available in the system-wide CA 
> > bundle in /etc/ssl/certs/ca-certificates.crt.
> 
> > This issue relates to #926388 (let Firefox trust
> > /etc/ssl/certs/ca-certificates.crt)
> 
> ...let's me think, that this bug is only fixable for Debian Edu 10 and 
> higher anyway.

Some more thoughts: 

My proposed script could be added as fetch-rootca-cert because that's 
what it's all about. The fetch-ldap-cert script would be kept in 
bullseye (and retired in bullseye+1 aka bookworm).

fetch-rootca- could then go into buster-pu, I guess.

Also, the firefox-esr policies file (already in the master branch) 
should be shipped for buster-pu.

The policies file makes shure that FF-ESR shows the green padlock also 
in case a user changes the password using gosa-desktop (which is the 
recommended way to do that). It is actually quite bad to be warned about 
a certificate issue and an insecure connection just in this case.

Reason for the gosa-desktop issue: On first call, a new FF profile is 
created on the fly.

IMO the additional profile issue can't be solved with the 
p11-kit-trust.so method, which is now deprecated in favour of the 
pocicies one, see e.g.:

https://wiki.mozilla.org/CA/AddRootToFirefox

I've tested an appropiately updated d-e-config package both on a buster 
10.3 main server and on a buster 10.3 roaming workstation (w/ your fixes 
present for that one). Works ok in both cases, green padlocks in all 
cases mentioned above.

Wolfgang


signature.asc
Description: PGP signature


Bug#951313: openprinting-ppds: MemoryError

2020-02-14 Thread sergio
Package: openprinting-ppds
Version: 20181217-2
Severity: normal

Dear Maintainer,

openprinting-ppds requires too much memory, and doesn't handle this case
correctly:

% /usr/lib/cups/driver/openprinting-ppds cat 
openprinting-ppds:0/ppd/openprinting/Samsung/PXL/Samsung_M262x_282x_Series_PXL.ppd
Traceback (most recent call last):
  File "/usr/lib/cups/driver/openprinting-ppds", line 119, in 
main()
  File "/usr/lib/cups/driver/openprinting-ppds", line 95, in main
ppd = cat(args[1])
  File "/usr/lib/cups/driver/openprinting-ppds", line 67, in cat
ppds['ARCHIVE'] = 
BytesIO(decompress(base64.b64decode(ppds['ARCHIVE'].encode('ASCII'
  File "/usr/lib/cups/driver/openprinting-ppds", line 17, in decompress
return process.communicate(value)[0]
  File "/usr/lib/python3.7/subprocess.py", line 939, in communicate
stdout, stderr = self._communicate(input, endtime, timeout)
  File "/usr/lib/python3.7/subprocess.py", line 1711, in _communicate
stdout = b''.join(stdout)
MemoryError
zsh: exit 1 /usr/lib/cups/driver/openprinting-ppds cat

% free
  totalusedfree  shared  buff/cache   available
Mem:  986Mi55Mi   698Mi   0.0Ki   233Mi   762Mi
Swap:0B  0B  0B



Bug#951312: networking: unsetting ipv6 brings many problems

2020-02-14 Thread Cosimo Simeone
Package: networking
Severity: grave
Justification: causes non-serious data loss

Dear Maintainer,

   * What led up to the situation? lost of networking, caused by dhcp not 
renewing IP address
   * What exactly did you do (or not do) that was effective (or
 ineffective)? disabled ipv6
   * What was the outcome of this action? dhcp 3442 non zero exit error
   * What outcome did you expect instead? well... Networking to work :-)

Longer description:
unsetting ipv6 (/etc/sysctl.conf -> net.ipv6.conf.all.disable_ipv6 = 0 
net.ipv6.conf.default.disable_ipv6 = 0 net.ipv6.conf.lo.disable_ipv6 = 0) 
generates dhcp 3442 non zero error. Disabling 3442 (dhclient.conf, removing 
request rfc3442-classless-static-routes) raises RTNETLINK answers: Permission 
denied


-- System Information:
Debian Release: 10.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-8-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)



Bug#951253: FTBFS with Boost 1.71

2020-02-14 Thread Giovanni Mascellani
Hi,

Il 13/02/20 13:56, Bas Couwenberg ha scritto:
>> Er, no actual reason. This setup works for me and nobody ever asked me
>> to upload to experimental. I can do that anyway, if that's better for
>> you.
> 
> Yes, please.

Done.

Giovanni.
-- 
Giovanni Mascellani 
Postdoc researcher - Université Libre de Bruxelles



Bug#951310: transition: pmix

2020-02-14 Thread Alastair McKinstry
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

This is a mini-transition for pmix.
The new pmix (pmix3) is in experimental; one further change is needed to add 
Breaks/Replaces before an unstable upload,
(as libpmix2 and libpmix3 unfortunately conflict in one lib they both provide 
internally).

There is one reverse dependency - openmpi - which needs changes to work with 
pmix3.
This is done and ready to go in Git.


Ben file:

title = "pmix";
is_affected = ;
is_good = ;
is_bad = ;


-- System Information:
Debian Release: 10.2
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_IE.UTF-8), LANGUAGE=en_IE:en (charmap=UTF-8) (ignored: LC_ALL set to 
en_IE.UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#951309: Please update tesseract-lang to the latest git packaging

2020-02-14 Thread Amr Ibrahim
Package: tesseract-lang

Please update tesseract-lang to the latest git packaging:
https://github.com/AlexanderP/tesseract-lang-debian



Bug#936806: koji: Python2 removal in sid/bullseye

2020-02-14 Thread Thomas Goirand
On 2/14/20 2:30 AM, Holger Levsen wrote:
> On Thu, Feb 13, 2020 at 08:14:11PM -0500, Sandro Tosi wrote:
>> thanks! I'm gonna go ahead and file an RM bug for the following pkgs
>> too: yum createrepo python-lzma yum-metadata-parser mock yum-utils
>> dtc-xen deltarpm
>>
>> they are a closed set
> 
> thank you for cleaning up after all of us, now that we reached containers.
> (which used to be called virtualisation mainframes before... ;) 
> 
> I mean, rpm is definitly still useful to have on Debian, but yum and 
> friends???

I am the one that maintained yum for about a decade in Debian. Yum is
(was?) useful because it does the same thing as debootstrap. Ie: with
it, you can bootstrap a CentOS chroot from a Debian host, which may be
useful for example if using Xen (or other virtualization systems). That
was in fact my use case.

Anyway, yum is kind of dead, as distros have been moving to dnf. I see
therefore no reason to keep it.

Cheers,

Thomas Goirand (zigo)



Bug#949468: satpy: autopkgtest regression due to new pygac

2020-02-14 Thread Gianfranco Costamagna
control: forwarded -1 https://github.com/pytroll/satpy/pull/1045
control: tags -1 fixed-upstream
Hello


https://github.com/pytroll/satpy/pull/1045

Here you can find the discussion related

and here a build log of a failure:
https://launchpadlibrarian.net/464927743/buildlog_ubuntu-focal-amd64.satpy_0.19.1-2_BUILDING.txt.gz

INFO:satpy.readers:Cannot use 
['/<>/satpy/etc/readers/avhrr_l1b_hrpt.yaml']
DEBUG:satpy.readers:while constructing a Python object
cannot find module 'satpy.readers.hrpt' (No module named 
'pygac.gac_calibration')
  in "", line 93, column 22:
file_reader: !!python/name:satpy.readers.hrpt ... 
 ^
DEBUG:satpy.readers:Reading ['/<>/satpy/etc/readers/ami_l1b.yaml']

(note: Ubuntu default to python3.8, so this might be a reason for you not yet 
failing the build process)

Looks like there is a new build error today, funny

G.

On Wed, 22 Jan 2020 08:41:33 +0100 Antonio Valentino 
 wrote:
> Dear Gianfranco,
> 
> On Tue, 21 Jan 2020 18:03:01 +0100 Gianfranco Costamagna
>  wrote:
> > control: severity -1 important
> > 
> > On Tue, 21 Jan 2020 09:28:40 +0100 Gianfranco Costamagna 
> >  wrote:
> > > Source: satpy
> > > Version: 0.19.1-1
> > > Severity: serious
> > > 
> > > Hello, looks like pygac update regressed the testsuite.
> > > I requested a new run in Debian, but in the meanwhile you can see a run 
> > > here:
> > > https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal/focal/amd64/s/satpy/20200120_195040_eac9b@/log.gz
> > > 
> > > or here:
> > > http://debomatic-amd64.debian.net/distribution#unstable/satpy/0.19.1-1/autopkgtest
> > > 
> > > (and even inside the build process itself the error is thrown out, but 
> > > for some reasons the testsuite errors are somewhat ignored at least in 
> > > that part)
> > > 
> > 
> > looks like the debian autopkgtest is green, and the "killed" is an 
> > ubuntu-only thing.
> > 
> > However, my patch has been merged upstream, so the gac issue is fixed.
> > 
> > G.
> 
> 
> Sorry Gianfranco but the problem is not clear to me.
> 
> Apart for the killed test run, satpy is failing in testing due to a
> missing dependency (behave) which has been removed form testing.
> 
> I don't see any issue related to pygac, am I missing something?
> 
> Also can you please give me a pointer to the patch that has been merged
> upstream?
> 
> 
> kind regards
> 
> -- 
> Antonio Valentino
> 
> 



Bug#951308: alot: needs versioned dependency on a higher python3-gpg version

2020-02-14 Thread Johannes 'josch' Schauer
Package: alot
Version: 0.9-1
Severity: normal

Hi,

with python3-gpg 1.12.0-4 I get the following error when opening alot:

Traceback (most recent call last):
  File "/usr/share/alot/alot/crypto.py", line 261, in 
_decrypt_verify_with_context
encrypted, verify=True)
  File "/usr/lib/python3/dist-packages/gpg/core.py", line 432, in decrypt
raise errors.BadSignatures(verify_result, results=results)
gpg.errors.BadSignatures: C91B325B77F252FB: No public key

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/bin/alot", line 11, in 
load_entry_point('alot==0.9', 'console_scripts', 'alot')()
  File "/usr/share/alot/alot/__main__.py", line 137, in main
UI(dbman, cmdstring)
  File "/usr/share/alot/alot/ui.py", line 141, in __init__
self.mainloop.run()
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 286, in run
self._run()
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 384, in _run
self.event_loop.run()
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 1340, in run
reraise(*exc_info)
  File "/usr/lib/python3/dist-packages/urwid/compat.py", line 58, in reraise
raise value
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 1354, in 
wrapper
rval = f(*args,**kargs)
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 1313, in 
_twisted_idle_callback
callback()
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 572, in 
entering_idle
self.draw_screen()
  File "/usr/lib/python3/dist-packages/urwid/main_loop.py", line 586, in 
draw_screen
canvas = self._topmost_widget.render(self.screen_size, focus=True)
  File "/usr/lib/python3/dist-packages/urwid/widget.py", line 144, in 
cached_render
canv = fn(self, size, focus=focus)
  File "/usr/lib/python3/dist-packages/urwid/decoration.py", line 226, in render
canv = self._original_widget.render(size, focus=focus)
  File "/usr/lib/python3/dist-packages/urwid/widget.py", line 144, in 
cached_render
canv = fn(self, size, focus=focus)
  File "/usr/lib/python3/dist-packages/urwid/container.py", line 1086, in render
focus and self.focus_part == 'body')
  File "/usr/share/alot/alot/buffers/buffer.py", line 19, in render
return self.body.render(size, focus)
  File "/usr/lib/python3/dist-packages/urwid/widget.py", line 144, in 
cached_render
canv = fn(self, size, focus=focus)
  File "/usr/lib/python3/dist-packages/urwid/listbox.py", line 471, in render
(maxcol, maxrow), focus=focus)
  File "/usr/lib/python3/dist-packages/urwid/listbox.py", line 416, in 
calculate_visible
next, pos = self._body.get_next( pos )
  File "/usr/share/alot/alot/walker.py", line 46, in get_next
return self._get_at_pos(start_from + self.direction)
  File "/usr/share/alot/alot/walker.py", line 72, in _get_at_pos
widget = self._get_next_item()
  File "/usr/share/alot/alot/walker.py", line 85, in _get_next_item
next_widget = self.containerclass(next_obj, **self.kwargs)
  File "/usr/share/alot/alot/widgets/search.py", line 26, in __init__
self.rebuild()
  File "/usr/share/alot/alot/widgets/search.py", line 61, in rebuild
self.structure[partname])
  File "/usr/share/alot/alot/widgets/search.py", line 145, in build_text_part
content = prepare_string(name, thread, maxw)
  File "/usr/share/alot/alot/widgets/search.py", line 213, in prepare_string
s = content(thread)
  File "/usr/share/alot/alot/widgets/search.py", line 188, in 
prepare_content_string
lastcontent = ' '.join(m.get_body_text() for m in msgs)
  File "/usr/share/alot/alot/widgets/search.py", line 188, in 
lastcontent = ' '.join(m.get_body_text() for m in msgs)
  File "/usr/share/alot/alot/db/message.py", line 266, in get_body_text
return extract_body(self.get_email())
  File "/usr/share/alot/alot/db/message.py", line 105, in get_email
f.read(), self._session_keys)
  File "/usr/share/alot/alot/db/utils.py", line 306, in 
decrypted_message_from_bytes
session_keys)
  File "/usr/share/alot/alot/db/utils.py", line 263, in 
decrypted_message_from_message
_handle_encrypted(m, m, session_keys)
  File "/usr/share/alot/alot/db/utils.py", line 176, in _handle_encrypted
sigs, d = crypto.decrypt_verify(payload, session_keys)
  File "/usr/share/alot/alot/crypto.py", line 226, in decrypt_verify
return _decrypt_verify_with_context(ctx, encrypted)
  File "/usr/share/alot/alot/crypto.py", line 266, in 
_decrypt_verify_with_context
(plaintext, _, _) = ctx.decrypt(encrypted, verify=False)
  File "/usr/lib/python3/dist-packages/gpg/core.py", line 431, in decrypt
for s in verify_result.signatures):
AttributeError: 'NoneType' object has no attribute 'signatures'


The problem is solved by upgrading python3-gpg to 1.13.1-6. Thus, alot
should gain a versioned dependency.

Thanks!

cheers, josch



Bug#951307: ITP: smartdns -- local DNS server to obtain the fastest IP for the best experience

2020-02-14 Thread Mo Zhou
Package: wnpp
Severity: wishlist
Owner: Mo Zhou 

* Package name: smartdns
* URL : https://github.com/pymumu/smartdns/releases
* License : GPL-3+
  Programming Lang: C 
  Description : local DNS server to obtain the fastest IP for the best 
experience

The package is already usable here:
(I've not done the the code check and license check yet)
https://salsa.debian.org/debian/smartdns

I'll upload to to NEW after finishing the remaining checks
and my local assessment.



Bug#949834: (no subject)

2020-02-14 Thread pioruns
Cant' reproduce, I was using 68.4.1esr-1~deb10u1, today I upgraded to
68.5.0esr-1~deb10u1, everything works fine.

System is Debian Buster 10 on AMD64.



Bug#951216: poppler-utils: pdfinfo incorrectly reports date metadata under reprotest

2020-02-14 Thread Jeff
> Can I suggest two things at this point? First, could you attach your
> generated test.pdf to this bug so that we are completely on the same
> page and using the exactly the same file? Secondly, perhaps you could
> systematically alter the settings of reprotest in order to identify
> which is the variation employed that is causing this to happen?

I've attached test.pdf as requested.

I've also tried to create a dummy package (attached) to reproduce the
problem. Unfortunately

reprotest .

fails with:

unshare: echec de unshare:  �� �
Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 843,
in run
return 0 if check_func(*check_args) else 1
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 369,
in check
local_dists += [proc.send(nv) for nv in zip(bnames[1:],
build_variations[1:])]
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 369,
in 
local_dists += [proc.send(nv) for nv in zip(bnames[1:],
build_variations[1:])]
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 329,
in corun_builds
bctx.run_build(testbed, build, os.environ, artifact_pattern,
testbed_build_pre, no_clean_on_error)
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 220,
in run_build
kind='build')
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 64,
in check_exec2
adtlog.AutopkgtestError)
  File "/usr/lib/python3/dist-packages/reprotest/__init__.py", line 70,
in bomb
raise _type(m)
reprotest.lib.adtlog.AutopkgtestError: "sh -ec run_build() {
mkdir -p /tmp/reprotest.pyacok/build-experiment-1-aux && \
SETARCH_ARCH=$(setarch --list | grep -vF "$(uname -m)" | shuf | head
-n1) && \
KERNEL_VERSION=$(uname -r) && \
if [ ${KERNEL_VERSION#2.6} = $KERNEL_VERSION ]; then
SETARCH_OPTS=--uname-2.6; fi && \
CPU_MAX=$(nproc) && \
CPU_MIN=$({ echo $CPU_MAX; echo 1; } | sort -n | head -n1) && \
CPU_NUM=$(if [ $CPU_MIN = $CPU_MAX ]; then echo
$CPU_MIN; echo >&2 "only 1 CPU is available; num_cpus is ineffective";
   else shuf -i$((CPU_MIN + 1))-$CPU_MAX -n1; fi) && \
mv /tmp/reprotest.pyacok/build-experiment-1/
/tmp/reprotest.pyacok/build-experiment-1-before-disorderfs/ && \
mkdir -p /tmp/reprotest.pyacok/build-experiment-1/ && \
disorderfs -q --shuffle-dirents=yes
/tmp/reprotest.pyacok/build-experiment-1-before-disorderfs/
/tmp/reprotest.pyacok/build-experiment-1/ && \
umask 0002 && \
export
REPROTEST_BUILD_PATH=/tmp/reprotest.pyacok/build-experiment-1/ && \
export REPROTEST_UMASK=$(umask) && \
unshare -r --uts sh -ec '
hostname reprotest-capture-hostname
domainname "reprotest-capture-domainname"
"$@"' - \
faketime +294days+15hours+41minutes \
taskset -a -c $(echo $(shuf -i0-$((CPU_MAX - 1)) -n$CPU_NUM) | tr '
' ,) \
setarch $SETARCH_ARCH $SETARCH_OPTS \
sh -ec 'cd "$REPROTEST_BUILD_PATH"; unset REPROTEST_BUILD_PATH;
umask "$REPROTEST_UMASK"; unset REPROTEST_UMASK; dpkg-buildpackage
--no-sign -b'
}

cleanup() {
__c=0; \
export PATH="/tmp/reprotest.pyacok/bin:$PATH" || __c=$?; \
fusermount -u /tmp/reprotest.pyacok/build-experiment-1/ || __c=$?; \
rmdir /tmp/reprotest.pyacok/build-experiment-1/ || __c=$?; \
mv /tmp/reprotest.pyacok/build-experiment-1-before-disorderfs/
/tmp/reprotest.pyacok/build-experiment-1/ || __c=$?; \
rm -rf /tmp/reprotest.pyacok/build-experiment-1-aux || __c=$?; \
exit $__c
}

trap '( cleanup )' HUP INT QUIT ABRT TERM PIPE # FIXME doesn't quite
work reliably yet

if ( run_build ); then ( cleanup ); else
__x=$?; # save the exit code of run_build
if ( ! false ); then
if ( cleanup ); then :; else echo >&2 "cleanup failed with exit
code $?"; fi;
fi
exit $__x
fi" failed with status 1


test.pdf
Description: Adobe PDF document
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.0
Source: reprotest-pdfinfo
Binary: reprotest-pdfinfo
Architecture: all
Version: 1-1
Maintainer: Jeffrey Ratcliffe 
Standards-Version: 4.5.0
Build-Depends: debhelper-compat (= 12)
Build-Depends-Indep: imagemagick, poppler-utils
Package-List:
 reprotest-pdfinfo deb utils optional arch=all
Checksums-Sha1:
 4f89e6a7ebc24a7ae440282c146459cf1dffc8ed 902 reprotest-pdfinfo_1-1.tar.gz
Checksums-Sha256:
 d359d5e8f7f30fd540e7b475c47964604dda2a0d178187c14655da6183028316 902 
reprotest-pdfinfo_1-1.tar.gz
Files:
 ac3e1938ec1d9ffc701983e11d534aae 902 reprotest-pdfinfo_1-1.tar.gz

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEERjKT5K4zhxhG8wInsyHyAxEPyvMFAl5GWtkACgkQsyHyAxEP
yvMm5Q/+O+Pcq+M0VEDeqKFfBVlPmZwNHo1O46BCLBzEwlJM4VmXE0vAUWUXLBCn
YYL+dmCD3+DlHZ8+xqmHnvLGQYgEXU9pW61EwdJH09SC5EoiMjpXGjIJE8S+VQqM
8lyugLXY/ttCB3sOKPYgAoLPj19LN/WLjTTyDoG2QSa+Yl38U9CVohiwTxb8crnw
fXHTn2Pkju1kwwRgDaKhmEhCCKwAITsToba3i0iLTHobVK2HXbRp4FCxlg8jqAFJ
YTuZRHHFHEkJJ32zssryFA69RA5wlEWbXFUWfUJKwUPp9vhvu/Pm/KLYXZ1Ga6GP

Bug#693587: bind9: stop resolving

2020-02-14 Thread Marco d'Itri
On Jan 16, Marco d'Itri  wrote:

> > Since we finally have 9.15 in experimental, could you please try this
> > and give feedback?
> Testing.
Confirmed: 9.15 fixed this.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#951306: snek: unsatisfiable b-d on picolibc-arm-none-eabi

2020-02-14 Thread Ralf Treinen
Source: snek
Version: 1.3-1
Severity: serious
User: trei...@debian.org
Usertags: edos-uninstallable

Hi,

snek build-depends on picolibc-arm-none-eabi which does not exist (yet)
in sid.

-Ralf.



Bug#951305: r-cran-rockchalk: unsatisfiable build-dependency on r-cran-kutils

2020-02-14 Thread Ralf Treinen
Source: r-cran-rockchalk
Version: 1.8.144+dfsg-1
Severity: serious
User: trei...@debian.org
Usertags: edos-uninstallable

Hi,

r-cran-rockchalk build-depends on r-cran-kutils which does not exist in
sid.

-Ralf