Bug#992081: RFP: elpa-persistent-scratch -- preserve scratch buffers across Emacs sessions

2021-08-10 Thread intrigeri
Package: wnpp
Severity: wishlist
X-Debbugs-Cc: debian-emac...@lists.debian.org

* Package name: elpa-persistent-scratch
  Version : 0.3.5
  Upstream Author : Fanael Linithien 
* URL or Web page : https://github.com/Fanael/persistent-scratch
* License : BSD 2-clause "Simplified" License
  Description : preserve the state of scratch buffers across Emacs sessions



Bug#992073: shim-signed: restore arm64 support

2021-08-10 Thread Paul Gevers
Hi,

On 10-08-2021 19:02, Antonio Terceiro wrote:
> As a data point, the Huawei cloud infra where ci.debian.net runs arm64
> workers (for arm*) does use Secure Boot on arm64, and applying security
> updates broke our machines there.

Just a proper follow-up. It seems we were hit by the inappropriate
1.36~1+deb10u1+15.4-5~deb10u1. This was possible because we used
APT::Default-Release "buster" ; which *doesn't* include buster-updates,
so the fixed package was prioritized *below* the broken one by APT.

Upgrading a fresh VM with a fixed APT::Default-Release pulled in the
fixed package from buster-updates and enabled the VM to reboot afterwards.

So, Huawei doesn't seem to force Secure Boot on armd64 after all.

Paul




OpenPGP_signature
Description: OpenPGP digital signature


Bug#992075: gitlab: download button for 2fa recovery codes does not work (coping works)

2021-08-10 Thread Akshay S Dinesh
Upstream issue: 
https://gitlab.com/gitlab-org/gitlab-ui/-/merge_requests/2271


Can be fixed with this commit: 
https://gitlab.com/gitlab-org/gitlab-ui/-/commit/3a4de98fecfe8e7808e3e83cd84a0639c1e6f33b




Bug#991104: antlr: reproducible-builds: Example Makefiles embed build paths and binary paths

2021-08-10 Thread tony mancill
Hi Vagrant!

On Wed, Jul 14, 2021 at 07:37:58AM -0700, Vagrant Cascadian wrote:
> Source: antlr
> Severity: normal
> Tags: patch
> User: reproducible-bui...@lists.alioth.debian.org
> Usertags: buildpath usrmerge
> X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org
> 
> The build path and several binary paths are embedded in example Makefiles
> shipped in the package:

Right... I can't imagine why a user would want to have these in
installed as examples.  They seem more like build artifacts.  Thanks for
the patch.

I will prepare a new upload of antlr real soon now.

> If removing the Makefiles is somehow not an option, an alternate option
> would be to sanitize the Makefiles stripping the build path, and
> possibly passing various variables to configure (e.g. GREP=/bin/grep,
> SHELL=/bin/sh, ...).

Sanitization sounds like a good plan, if there ends up being a use case.

Cheers,
tony


signature.asc
Description: PGP signature


Bug#992052: [Debian-med-packaging] Bug#992052: cd-hit: autopkgtest fails on very powerful CI workers

2021-08-10 Thread Étienne Mollier
Hi Paul,

Paul Gevers, on 2021-08-10:
> I copied some of the output at the bottom of this report. It's ironical
> that cd-hit complains about not enough memory when the worker this test
> runs on has the biggest amount of memory we have in the ci.d.n worker
> park: 250GB. If I read the output correctly, you assign the amount of
> memory cd-hit is allowed to use and the required amount of memory also
> depends on the amount of cores. This machine has 160 cores. I wonder if
> the value for -M needs to be calculated instead of hard coded or that
> you should limit the maximum amount of cores used or... But I leave it
> up to you to find the appropriate solution.

Looking up the cd-hit(1) manual, it seems possible to disable
the memory limit by specifying -M 0.  At least it seems to do
the expected thing on my end.  I will adjust the autopkgtest
accordingly, and maybe upload at some point after the bullseye
release.

Thank you for your analysis!

Have a nice day,  :)
-- 
Étienne Mollier 
Fingerprint:  8f91 b227 c7d6 f2b1 948c  8236 793c f67e 8f0d 11da
Sent from /dev/pts/2, please excuse my verbosity.


signature.asc
Description: PGP signature


Bug#992067: ITP: powder-toy -- A free physics sandbox game

2021-08-10 Thread Paul Wise
On Tue, Aug 10, 2021 at 3:27 PM clay stan wrote:

> * Package name: powder-toy

Some earlier related bugs:

https://bugs.debian.org/673087
https://bugs.debian.org/671595

Some prior packaging:

https://alioth-archive.debian.org/git/pkg-games/powder.git.tar.xz

--
bye,
pabs

https://wiki.debian.org/PaulWise



Bug#992080: (no subject)

2021-08-10 Thread Nolan
It may be obvious, but I forgot to mention that this is on Bullseye, up 
to date as of today (Aug 10th).


This bug is likely related to #991552.



Bug#757882: pkgsel: [text frontend] No feedback right after selecting the software tasks

2021-08-10 Thread Samuel Thibault
Control: reassign -1 cdebconf
Control: done -1 0.255

Samuel Thibault, le lun. 11 août 2014 23:53:02 +0200, a ecrit:
> Right after answering the "Software selection" tasksel question, one
> does not get any feedback, so the user is wondering whether it's
> installing anything.

I fixed this within cdebconf, forcing progress feedback after questions.

Samuel



Bug#992080: udiskie: "udiskie --appindicator" fails to start due to missing Typelib

2021-08-10 Thread nolan
Package: udiskie
Version: 2.3.2-2
Severity: important

Dear Maintainer,

udiskie fails in sway (or any other situation that only supports SNI tray icons)
due to missing Typelib:

$ udiskie --appindicator

Typelib for 'AppIndicator3 0.1' is not available. Possible causes include:
- libappindicator is not installed
- the typelib is provided by a separate package
- it was built with introspection disabled
Starting udiskie without appindicator icon.

I suspect the solution is to move udiskie to ayatanaappindicator, and make it
depend on gir1.2-ayatanaappindicator3-0.1. I haven't tried installing
gir1.2-appindicator3-0.1 from sid, which I suspect might work. I will report
back when I try that out.

-- System Information:
Debian Release: 11.0
  APT prefers testing-security
  APT policy: (500, 'testing-security'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages udiskie depends on:
ii  python33.9.2-3
ii  python3-distutils  3.9.2-1
ii  python3-docopt 0.6.2-3
ii  python3-gi 3.38.0-2
ii  python3-pkg-resources  52.0.0-4
ii  python3-yaml   5.3.1-5
ii  udisks22.9.2-2

Versions of packages udiskie recommends:
ii  dunst [notification-daemon]  1.5.0-1
ii  gir1.2-gtk-3.0   3.24.24-4
ii  gir1.2-notify-0.70.7.9-3
ii  gobject-introspection1.66.1-1+b1
ii  notification-daemon  3.20.0-4
ii  python3-keyutils 0.6-2+b4

udiskie suggests no packages.

-- no debconf information



Bug#992079: salt-master should have write access to /etc/salt

2021-08-10 Thread Jonas Maurus

Package: salt-master
Version: 3002.6+dfsg1-4
Severity: Normal

While the official packages run salt-master as root, the Debian packages 
run salt-master under the user "salt". I have written a plug-in for Salt 
that provides dynamically generated pillars for encryption keys, 
passwords, and other useful features (shameless plug: 
https://github.com/jdelic/dynamicsecrets). However, dynamicsecrets needs 
to save data to a permanent location in the form of a sqlite database.


The default path for that is /etc/salt/dynamicsecrets.sqlite. Of the 
folders owned by the salt-master package, this is the logical choice 
since /var/cache/salt and /var/run/salt are ephemeral locations. 
Unfortunately on the Debian packages the "salt" user has no write access 
to /etc/salt.


Salt's own documentation 
(https://docs.saltproject.io/en/latest/ref/configuration/nonroot.html) 
under "Running the Salt Master/Minion as an Unprivileged User" states


"""
In order to allow Salt to successfully run as a non-root user, 
ownership, and permissions need to be set such that the desired user can 
read from and write to the following directories (and their 
subdirectories, where applicable):


/etc/salt
/var/cache/salt
/var/log/salt
/var/run/salt
"""

Unfortunately there is no way to fix this from within dynamicsecrets as 
the "salt" user doesn't have write access to any location amenable to 
long-term storage.


So I would ask the package to be updated to change the owner of 
/etc/salt to be owned by the "salt" user.




Bug#627653: Please don't use obsolete libsysfs-dev any more

2021-08-10 Thread Guillem Jover
Hi!

On Mon, 2011-05-23 at 09:44:04 +0200, Martin Pitt wrote:
> Package: edac-utils
> Version: 0.16-1
> User: mp...@debian.org
> Usertags: libsysfs-deprecation

> Some years ago libsysfs (source package: sysfsutils) was written as an
> abstraction layer for accessing /sys/. However, this turned out to be
> a historical error and evolutionary dead end: It does not actually
> abstract anything (it's just as specific to the Linux kernel and a
> particular version thereof as /sys itself), and just adds unnecessary
> complexity, RAM overhead, and bugs. Thus its development has ceased
> years ago, in favor of programs just using /sys as it is.

I have to disagree with the above. It abstracts the access to /sys in
a more natural form than directly having to do so. Development is also
still going, and upstream has recently released a new version merging
all Debian patches plus other cleanup and fixes sent by me and others.

> In fact, most applications probably don't want to access /sys at all,
> but use libudev [1] or gudev [2] instead. These provide a better API
> for device enumeration, properties, and callbacks for hardware
> changes.

If this project would be better suited with some other library, then
sure go ahead, but please take into account that as the current
sysfsutils maintainer in Debian, I consider the library supported and
definitely not obsolete, so if you'd like you keep using it, please
feel free to do so (and to close this report :).

> This package is one of the few which still use the old libsysfs. Can
> you please check with upstream to prepare a migration away from
> libsysfs to using plain /sys or libudev? I hope that we can drop the
> old libsysfs entirely for wheezy.

I have no plans for this.

On Tue, 2012-05-22 at 08:57:36 -0700, Mark A. Grondona wrote:
> It is on the TODO list to remove the dependency on libsysfs going
> forward. It is just a matter of time. Edac-utils has gotten very little
> development time over the past few years.
> 
> Going forward there is a push to rearchitect edac core[1] and so I think
> when that makes it upstream, there should be a complete rewrite of
> edac-utils or a replacement of something providing similar functionality
> (command line tool and library for monitoring tools)
> 
> So does it still make sense to do the work of removing libsysfs from
> edac-utils, or should we work on a new utility?

See above, if you think another library would suit the project better,
then sure, otherwise please feel free to keep relying on the libsysfs
library.

Thanks,
Guillem



Bug#627649: Please don't use obsolete libsysfs-dev any more

2021-08-10 Thread Guillem Jover
Hi!

On Mon, 2011-05-23 at 09:44:21 +0200, Martin Pitt wrote:
> Package: cpufreqd
> Version: 2.4.2-1
> User: mp...@debian.org
> Usertags: libsysfs-deprecation

> Some years ago libsysfs (source package: sysfsutils) was written as an
> abstraction layer for accessing /sys/. However, this turned out to be
> a historical error and evolutionary dead end: It does not actually
> abstract anything (it's just as specific to the Linux kernel and a
> particular version thereof as /sys itself), and just adds unnecessary
> complexity, RAM overhead, and bugs. Thus its development has ceased
> years ago, in favor of programs just using /sys as it is.

I have to disagree with the above. It abstracts the access to /sys in
a more natural form than directly having to do so. Development is also
still going, and upstream has recently released a new version merging
all Debian patches plus other cleanup and fixes sent by me and others.

> In fact, most applications probably don't want to access /sys at all,
> but use libudev [1] or gudev [2] instead. These provide a better API
> for device enumeration, properties, and callbacks for hardware
> changes.

If this project would be better suited with some other library, then
sure go ahead, but please take into account that as the current
sysfsutils maintainer in Debian, I consider the library supported and
definitely not obsolete, so if you'd like you keep using it, please
feel free to do so (and to close this report :).

> This package is one of the few which still use the old libsysfs. Can
> you please check with upstream to prepare a migration away from
> libsysfs to using plain /sys or libudev? I hope that we can drop the
> old libsysfs entirely for wheezy.

I have no plans for this.

Thanks,
Guillem



Bug#627647: Please don't use obsolete libsysfs-dev any more

2021-08-10 Thread Guillem Jover
Hi!

On Mon, 2011-05-23 at 09:43:23 +0200, Martin Pitt wrote:
> Package: openhpi
> Version: 2.14.1-1
> User: mp...@debian.org
> Usertags: libsysfs-deprecation

> Some years ago libsysfs (source package: sysfsutils) was written as an
> abstraction layer for accessing /sys/. However, this turned out to be
> a historical error and evolutionary dead end: It does not actually
> abstract anything (it's just as specific to the Linux kernel and a
> particular version thereof as /sys itself), and just adds unnecessary
> complexity, RAM overhead, and bugs. Thus its development has ceased
> years ago, in favor of programs just using /sys as it is.

I have to disagree with the above. It abstracts the access to /sys in
a more natural form than directly having to do so. Development is also
still going, and upstream has recently released a new version merging
all Debian patches plus other cleanup and fixes sent by me and others.

> In fact, most applications probably don't want to access /sys at all,
> but use libudev [1] or gudev [2] instead. These provide a better API
> for device enumeration, properties, and callbacks for hardware
> changes.

If this project would be better suited with some other library, then
sure go ahead, but please take into account that as the current
sysfsutils maintainer in Debian, I consider the library supported and
definitely not obsolete, so if you'd like you keep using it, please
feel free to do so (and to close this report :).

> This package is one of the few which still use the old libsysfs. Can
> you please check with upstream to prepare a migration away from
> libsysfs to using plain /sys or libudev? I hope that we can drop the
> old libsysfs entirely for wheezy.

I have no plans for this.

Thanks,
Guillem



Bug#992078: bullseye-pu: package libbluray/1:1.2.1-4+deb11u1

2021-08-10 Thread Sebastian Ramacher
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: sramac...@debian.org

[ Reason ]
The BDJ features of libbluray are currently broken due to an
incompatibility with libasm-java from bullseye. This issue was reported
as #991991 and is easily fixed by reverting to using the embedded copy
of libasm.

[ Impact ]
Users will be unable to play Blurays with BDJ.

[ Tests ]
None, as I don't own a Bluray with BDJ.

[ Risks ]
None, as far as I can tell. libbluray-bdj is known to work with the
embedded copy of libasm.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in bullseye
  [ ] the issue is verified as fixed in unstable

The issue is currently fixed in experimental and the fix will be
available in unstable once bullseye is released.

[ Changes ]
Besides changing gbp's branch, the new version unapplies a
Debian-specific patch and removes libasm-java from Build-Depends.
Depends is automatically handled by javahelper.

Cheers
-- 
Sebastian Ramacher
diff --git a/debian/changelog b/debian/changelog
index 6ea2b74..40e3021 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+libbluray (1:1.2.1-4+deb11u1) bullseye; urgency=medium
+
+  * debian/gbp.conf: Switch to bullseye branch
+  * debian/: Switch to embedded libasm. The version from libasm-java is too
+new. (Closes: #991991)
+
+ -- Sebastian Ramacher   Sun, 08 Aug 2021 23:27:53 +0200
+
 libbluray (1:1.2.1-4) unstable; urgency=medium
 
   * debian/patches:
diff --git a/debian/control b/debian/control
index 11142ed..1a885ba 100644
--- a/debian/control
+++ b/debian/control
@@ -18,8 +18,7 @@ Build-Depends-Indep:
  ant,
  doxygen,
  graphviz,
- javahelper,
- libasm-java
+ javahelper
 Standards-Version: 4.5.1
 Homepage: http://www.videolan.org/developers/libbluray.html
 Vcs-Git: https://salsa.debian.org/multimedia-team/libbluray.git
diff --git a/debian/gbp.conf b/debian/gbp.conf
index 4f24002..e0f993f 100644
--- a/debian/gbp.conf
+++ b/debian/gbp.conf
@@ -1,3 +1,4 @@
 [DEFAULT]
 pristine-tar = True
 compression = bzip2
+debian-branch = bullseye
diff --git a/debian/patches/0002-Use-system-asm-instead-of-embedded-copy.patch 
b/debian/patches/0002-Use-system-asm-instead-of-embedded-copy.patch
deleted file mode 100644
index 54ad932..000
--- a/debian/patches/0002-Use-system-asm-instead-of-embedded-copy.patch
+++ /dev/null
@@ -1,45 +0,0 @@
-From: Sebastian Ramacher 
-Date: Wed, 14 Jun 2017 20:22:27 +0200
-Subject: Use system asm instead of embedded copy
-

- src/libbluray/bdj/build.xml | 14 --
- 1 file changed, 8 insertions(+), 6 deletions(-)
-
-diff --git a/src/libbluray/bdj/build.xml b/src/libbluray/bdj/build.xml
-index 1753779..19163d1 100644
 a/src/libbluray/bdj/build.xml
-+++ b/src/libbluray/bdj/build.xml
-@@ -21,17 +21,15 @@
- 
- 
--
--   
--   
--
- 
-
-
-+   
-+   
-+   
-+   
- 
- 
- 
- 
- 
-+
-+
-+
-+
- 
- 
-   
diff --git a/debian/patches/series b/debian/patches/series
index 89954be..16342b0 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,3 +1,2 @@
 0001-Do-not-download-image-from-the-web.patch
-0002-Use-system-asm-instead-of-embedded-copy.patch
 0003-Update-check-for-new-libudfread-pkg-config-file-name.patch


signature.asc
Description: PGP signature


Bug#992027: ITP: openqa-client -- Python API to access openQA server

2021-08-10 Thread Philip Hands
Sudip Mukherjee  writes:

> Package: wnpp
> Severity: wishlist
> Owner: Sudip Mukherjee 
> X-Debbugs-Cc: debian-de...@lists.debian.org, sudipm.mukher...@gmail.com, 
> Philip Hands 
>
> * Package name: openqa-client
>   Version : 4.1.2
> * URL : https://github.com/os-autoinst/openQA-python-client
> * License : GPL-2.0
>   Programming Lang: Python
>   Description : Python API to access openQA server
>
> This is a client for the openQA API, based on requests.
> The API always returns JSON responses; this client's
> request functions parse the response before returning it.
>
> There is already another RFP for openqa server and the client,
> #840253 and I think Philip Hands is already working on that and
> has made a great job at openqa.debian.net. This package is only
> the python api to communicate with the openqa server. I do use
> it as part of my role in https://openqa.qa.codethink.co.uk/.
>
> Added Cc to Philip Hands also and if he is planning to add Python API
> as part of his implementation then I can close this and wait for him.

At present my packaging of openqa (which I hope to get into a state fit
to upload very soon -- a few lintian warnings need addressing) already
produces a package called openqa-client, which includes the scripts such
as openqa-cli and openqa-client.

BTW You can see the current state of play here:

  https://salsa.debian.org/philh/openqa

The openqa-client script is obsolescent, so renaming that package to
be openqa-cli would make sense anyway, since that is the script to use
these days, but I think calling what seems to be a python library simply
'openqa-client' would be a bit confusing.

Wouldn't it make sense to put a 'python' in the package name?

I'm not really a python programmer, so probably not the person to
package this, but would be pleased to see it available in Debian, and am
very happy help where I can.

Cheers, Phil.
-- 
|)|  Philip Hands  [+44 (0)20 8530 9560]  HANDS.COM Ltd.
|-|  http://www.hands.com/http://ftp.uk.debian.org/
|(|  Hugo-Klemm-Strasse 34,   21075 Hamburg,GERMANY



Bug#856060: Please don't use obsolete libsysfs-dev any more

2021-08-10 Thread Guillem Jover
Hi!

On Sun, 2017-04-09 at 10:17:41 +0200, Philipp Kern wrote:
> On 02/24/2017 11:05 PM, Michael Biebl wrote:
> > Some years ago libsysfs (source package: sysfsutils) was written as an
> > abstraction layer for accessing /sys/. However, this turned out to be
> > a historical error and evolutionary dead end: It does not actually
> > abstract anything (it's just as specific to the Linux kernel and a
> > particular version thereof as /sys itself), and just adds unnecessary
> > complexity, RAM overhead, and bugs. Thus its development has ceased
> > years ago, in favor of programs just using /sys as it is.

Upstream development for sysfsutils is still going, they have f.ex.
merged all patches Debian was carrying, plus several cleanup patch
series I've sent, and have done new upstream releases. As the current
maintainer in Debian I do not consider it obsolete, and would
encourage anyone to use it, in preference of having to manually parse
stuff from /sys.

> > In fact, most applications probably don't want to access /sys at all,
> > but use libudev [1] or gudev [2] instead. These provide a better API
> > for device enumeration, properties, and callbacks for hardware
> > changes.
> 
> I can see how we ended up here, but it still does abstract something
> away: access to sysfs, avoiding bugs in accessing it from C in the process.

Indeed.

So from my side, if you'd like to switch to something else, for
whatever reason, that's fine, but if you'd rather keep using libsysfs,
then that should also be fine.

Thanks,
Guillem



Bug#905793:

2021-08-10 Thread David Prisca
Please check your email and reply to my previous email thanks.


Bug#970836: kino: diff for NMU version 1.3.4+dfsg0-1.1

2021-08-10 Thread Sebastian Ramacher
Control: tags 970836 + pending

Dear maintainer,

I've prepared an NMU for kino (versioned as 1.3.4+dfsg0-1.1) and
uploaded it to DELAYED/7. Please feel free to tell me if I
should delay it longer.

Cheers
-- 
Sebastian Ramacher
diff -Nru kino-1.3.4+dfsg0/debian/changelog kino-1.3.4+dfsg0/debian/changelog
--- kino-1.3.4+dfsg0/debian/changelog	2018-09-03 23:26:57.0 +0200
+++ kino-1.3.4+dfsg0/debian/changelog	2021-08-10 22:44:49.0 +0200
@@ -1,3 +1,10 @@
+kino (1.3.4+dfsg0-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/control: Switch to libdc1394-dev (Closes: #970836)
+
+ -- Sebastian Ramacher   Tue, 10 Aug 2021 22:44:49 +0200
+
 kino (1.3.4+dfsg0-1) unstable; urgency=medium
 
   * Acknowledge non-maintainer uploads, thanks to Reinhard Tartler, Andreas
diff -Nru kino-1.3.4+dfsg0/debian/control kino-1.3.4+dfsg0/debian/control
--- kino-1.3.4+dfsg0/debian/control	2018-09-03 23:26:57.0 +0200
+++ kino-1.3.4+dfsg0/debian/control	2021-08-10 22:44:05.0 +0200
@@ -29,7 +29,7 @@
libgsm1-dev,
intltool,
libiec61883-dev,
-   libdc1394-22-dev,
+   libdc1394-dev,
libvorbis-dev,
libgl1-mesa-dev | libgl-dev,
libswscale-dev,


signature.asc
Description: PGP signature


Bug#990340: glances: contains prebuilt javascript without source

2021-08-10 Thread Alexis Murzeau
Control: tag -1 + patch

On Tue, 29 Jun 2021 01:44:06 +0530 Pirate Praveen  
wrote:
> It uses webpack to build.
> 
> https://github.com/nicolargo/glances/blob/develop/glances/outputs/static/package.json#L28
> 
> cd glances/outputs/static && webpack 
> 
> in debian/rules with required build dependencies added should work. Most 
> build dependencies are already packaged.
> -- 
> Sent from my p≡p for Android.

Most (non-dev) dependencies are not in Debian [0] (like angular) so
I've made a MR [1] that simply remove pre-built files.

This makes the remote web interface probably useless, but the package
can still be used for most usages (I guess, in standalone mode for
example, which is the only mode I use).

[1] npm2deb output on package.json (modified to add required "name" key):
Dependencies:
NPM   Debian
glances-web-ui (FIX_ME version)   None
├─ angular (^1.7.9)   None
├─ angular-hotkeys (^1.7.0)   None
├─ bootstrap (^3.4.1) None
├─ favico.js (^0.3.10)None
└─ lodash (^4.17.15)  node-lodash 
(4.17.21+dfsg+~cs8.31.189.20210220-1)

Build dependencies:
NPM   Debian
clean-webpack-plugin (^0.1.19)None
copy-webpack-plugin (^4.6.0)  node-copy-webpack-plugin 
(5.1.2+~cs9.0.2-4)
css-loader (^0.28.11) node-css-loader 
(5.0.1+~cs14.0.5-2)
del (^2.2.1)  node-del (5.1.0-2)
exports-loader (^0.7.0)   node-exports-loader (1.1.1-2)
file-loader (^1.1.11) node-file-loader (6.2.0-2)
html-loader (^0.5.5)  None
less (^3.10.3)less.js (3.13.0+dfsg-5)
less-loader (^4.1.0)  node-less-loader (5.0.1-2)
ngtemplate-loader (^2.0.1)None
node-sass (^4.14.0)   node-node-sass 
(4.14.1+git20200512.e1fc158+dfsg-4)
sass-loader (^6.0.7)  None
style-loader (^0.20.3)node-style-loader (2.0.0-2)
url-loader (^0.6.2)   node-url-loader (4.1.1-3)
webpack (^3.12.0) node-webpack 
(5.6.0+~cs6.4.0-1~exp2)


[0] https://salsa.debian.org/debian/glances/-/merge_requests/2

-- 
Alexis Murzeau
PGP: B7E6 0EBB 9293 7B06 BDBC  2787 E7BD 1904 F480 937F|



signature.asc
Description: OpenPGP digital signature


Bug#992077: [INTL:sv] Swedish strings for iperf3 debconf

2021-08-10 Thread Martin Bagge / brother

package: iperf3
severity: wishlist
tags: patch l10n

Please consider to add this file to translation of debconf.

--
brother
http://sis.bthstudent.se
# Translation of iperf3 debconf template to Swedish
# Copyright (C) 2021 Martin Bagge 
# This file is distributed under the same license as the iperf3 package.
#
# Martin Bagge , 2021
msgid ""
msgstr ""
"Project-Id-Version: iperf3\n"
"Report-Msgid-Bugs-To: ipe...@packages.debian.org\n"
"POT-Creation-Date: 2021-06-27 19:24+0200\n"
"PO-Revision-Date: 2021-08-10 21:13+0200\n"
"Last-Translator: Martin Bagge \n"
"Language-Team: Swedish \n"
"Language: sv\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"

#. Type: boolean
#. Description
#: ../templates:1001
msgid "Start Iperf3 as a daemon automatically?"
msgstr "Ska Iperf3 starta som en tjänst automatiskt?"

#. Type: boolean
#. Description
#: ../templates:1001
msgid ""
"Choose this option if Iperf3 should start automatically as a daemon, now and "
"at boot time."
msgstr ""
"Ange detta alternativ om tjänsten iperf3 ska starta automatiskt vid "
"systemets start."


Bug#984397: caused by DWARF5

2021-08-10 Thread Adam Borowski
Control: block -1 by 984397

This is caused by gcc-11 emitting DWARF5 debug info by default, and valgrind
not understanding it yet.

I can hack this away, but it's much better to fix the cause not a symptom.


Meow!
-- 
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ in the beginning was the boot and root floppies and they were good.
⢿⡄⠘⠷⠚⠋⠀   --  on #linux-sunxi
⠈⠳⣄



Bug#992075: gitlab: download button for 2fa recovery codes does not work (coping works)

2021-08-10 Thread Pirate Praveen

Package: gitlab
Version: 13.12.9+ds1-2
Severity: important

The same feature works fine on gitlab.com so this looks something 
specific to the native package.




Bug#992074: libvpd: FTBFS with GCC 11

2021-08-10 Thread Graham Inggs
source: libvpd
Version: 2.2.7-1
Severity: normal
Tags: sid bookworm
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-11
Forwarded: https://github.com/power-ras/libvpd/pull/5

[This bug is not targeted to the upcoming bullseye release]

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-11/g++-11, but succeeds to build with gcc-10/g++-10. The
severity of this report will be raised before the bookworm release,
so nothing has to be done for the bullseye release.

To build with GCC 11, either set CC=gcc-11 CXX=g++-11 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-11/porting_to.html

GCC 11 defaults to the GNU++17 standard.  If your package installs
header files in /usr/include, please don't work around C++17 issues
by choosing a lower C++ standard for the package build, but fix these
issues to build with the C++17 standard.

I've copied what I hope is the relevant part of the log below:

libtool: compile:  g++ -DHAVE_CONFIG_H -I. -I./config -I./src/ -Wall
-fstack-protector-all -Wstack-protector -Wdate-time
-D_FORTIFY_SOURCE=2 -DDEST_DIR=\"/usr\" -g -O3
-ffile-prefix-map=/<>=. -flto=auto -ffat-lto-objects
-fstack-protector-strong -Wformat -Werror=format-security -c
src/logger.cpp -fPIE -o src/logger.o >/dev/null 2>&1
In file included from src/vpdretriever.cpp:25:
./src/libvpd-2/vpdretriever.hpp:62:33: error: ISO C++17 does not allow
dynamic exception specifications
   62 | throw( VpdException& );
  | ^
./src/libvpd-2/vpdretriever.hpp:74:33: error: ISO C++17 does not allow
dynamic exception specifications
   74 | throw( VpdException& );
  | ^
src/vpdretriever.cpp:50:37: error: ISO C++17 does not allow dynamic
exception specifications
   50 | string dbFileName ) throw( VpdException& )
  | ^
src/vpdretriever.cpp:62:39: error: ISO C++17 does not allow dynamic
exception specifications
   62 | VpdRetriever::VpdRetriever( ) throw( VpdException& )
  |   ^
make[1]: *** [Makefile:671: src/vpdretriever.lo] Error 1
make[1]: *** Waiting for unfinished jobs



Bug#991478: [shim-signed] RFE: do not brick users' systems in the stable distribution

2021-08-10 Thread Paul Gevers
Hi,

On Sun, 25 Jul 2021 16:52:27 +0100 Steve McIntyre  wrote:
> When we found that problem, as an immediate workaround I released a
> newer shim-signed package into the buster-updates repo which solves
> it: version 1.36~1+deb10u2+15.4-5~deb10u1 (note the
> deb10u1->deb10u2). I can see that your system is showing
> buster-updates in its list of package sources, so I'm very confused as
> to what's happened there and why your system did not pick up the later
> version. Argh!

I learned yesterday that people that use APT pinning or
APT::Default-Release may be missing out -updates if they pin to buster
only. See the latest entry to the release notes [1, last paragraph] to
cover the issue for bullseye-security. I'm obviously not sure if that
happened here, but if the issue is the same on ci.d.n infrastructure, it
would explain the failure there (the logs from yesterday there mention
"Setting up shim-signed:arm64 (1.36~1+deb10u1+15.4-5~deb10u1)".

Paul

[1]
https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#security-archive



OpenPGP_signature
Description: OpenPGP digital signature


Bug#984363: therion: ftbfs with GCC-11

2021-08-10 Thread Martin Budaj
On Wed, 03 Mar 2021 16:17:55 + Matthias Klose  wrote:

> Package: src:therion

> Version: 5.5.7ds1-1

> Severity: normal

> Tags: sid bookworm

> User: debian-...@lists.debian.org

> Usertags: ftbfs-gcc-11


> The package fails to build in a test rebuild on at least amd64 with

> gcc-11/g++-11, but succeeds to build with gcc-10/g++-10. The

> severity of this report will be raised before the bookworm release,

> so nothing has to be done for the bullseye release.

>

> The full build log can be found at:

>
http://people.debian.org/~doko/logs/20210228/filtered/gcc11/therion_5.5.7ds1-1_unstable_gcc11.log


This is actually an issue caused by libvtk9-dev, as noted here:
https://gitlab.kitware.com/vtk/vtk/-/issues/18194


Martin


Bug#992073: shim-signed: restore arm64 support

2021-08-10 Thread Antonio Terceiro
Package: shim-signed
Version: 1.38+15.4-7
Severity: normal
X-Debbugs-CC: debian...@lists.debian.org

Hi,

Thanks for you work on shim-signed.

I have read both the package changelog and the NEWS file, and I
understand the reason for dropping the signed shim support for arm64.
I'm opening this bug to have a user-visible tracking of this issue.

Quoting NEWS for the benefit of others find this bug:

shim-signed (1.34) unstable; urgency=medium

  Debian no longer supports UEFI Secure Boot on arm64 systems

  Shim and other EFI programs have always been difficult to build on
  arm64, compared to x86 platforms. Binutils for amd64 and i386
  includes explicit support for creating programs in the PE/COFF
  binary format that EFI uses, but this has never been added for
  arm64.

  In the past, shim developers added some local hacks into the shim
  package to generate a *mostly*-compliant PE/COFF EFI binary without
  this toolchain support, and that seemed to be sufficient for
  use. Everything seemed to work. *However*, during the development
  and testing phase of shim 15.3 and 15.4, we found significant
  issues with this approach. New security features needed in shim
  (SBAT) showed up severe problems with the lack of proper toolchain
  support. See https://github.com/rhboot/shim/issues/366 for more
  details. The old hacks around binutils are no longer sustainable.

  Statistics tell us that very few people have attempted to use arm64
  Secure Boot with Debian so far. In the interests of releasing needed
  updates in a timely manner, we have decided *for the time being* to
  disable signed shim support for Debian arm64.

  We hope to re-introduce arm64 Secure Boot support as soon as
  possible in the future.

As a data point, the Huawei cloud infra where ci.debian.net runs arm64
workers (for arm*) does use Secure Boot on arm64, and applying security
updates broke our machines there.


signature.asc
Description: PGP signature


Bug#992072: ITP: click-help-colors -- color messages in click

2021-08-10 Thread Sakirnth Nagarasa
Package: wnpp
Severity: wishlist
Owner: Sakirnth Nagarasa 

* Package name: click-help-colors
Upstream Author   : None
* URL : https://github.com/r-m-n/click-help-colors
* License : MIT
Description   : color help messages in click

 Colorization of help messages in Click. To improve the readability of
the help messages.

Greetings
Sakirnth



Bug#992071: ITP: click-completion -- fish bash zsh and powershell completion for click

2021-08-10 Thread Sakirnth Nagarasa
Package: wnpp
Severity: wishlist
Owner: Sakirnth Nagarasa 

* Package name: click-completion
Upstream Author   : Gaëtan Lehmann
* URL : https://github.com/click-contrib/click-completion
* License : MIT
Description   : fish bash zsh and powershell completion for click

 Automatic completion support for different type of shells for Click.
All the supported shells are able to complete all the command line
arguments and options defined with click.

Greetings
Sakirnth



Bug#992070: keystone: CVE-2021-38155: Account name and UUID oracles in account locking

2021-08-10 Thread Salvatore Bonaccorso
Source: keystone
Version: 2:18.0.0-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for keystone.

CVE-2021-38155[0]:
| OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before
| 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information
| disclosure during account locking (related to PCI DSS features). By
| guessing the name of an account and failing to authenticate multiple
| times, any unauthenticated actor could both confirm the account exists
| and obtain that account's corresponding UUID, which might be leveraged
| for other unrelated attacks. All deployments enabling
| security_compliance.lockout_failure_attempts are affected.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-38155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38155
[1] https://www.openwall.com/lists/oss-security/2021/08/10/5

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#992034: init choice in Debian installation instructions

2021-08-10 Thread Thorsten Glaser
Hi,

as the content for the release notes was suggested to be put into the
Wiki (instead?) anyway, how about, to lower translator burden, there
*will* be put a section about this into the installation guide, but one
that is mostly comprised of a link to the Wiki, with a short intro.

@Matthew: that’s most certainly an em dash there; normally, you render
an em dash as U+2014 surrounded by U+200A (hair space) on both sides
(some US-american publishers seem to omit the hair spaces; in Tₑχ/LᴬTᴇΧ
I personally realise them as ⅙em which may be slightly wider than the
hair spaces of some publishers but find this makes it easier to read).
Now I have no idea how this is best done in the sources for the Debian
installation guide…

bye,
//mirabilos
-- 
Gestern Nacht ist mein IRC-Netzwerk explodiert. Ich hatte nicht damit
gerechnet, darum bin ich blutverschmiert… wer konnte ahnen, daß SIE so
reagier’n… gestern Nacht ist mein IRC-Netzwerk explodiert~~~
(as of 2021-06-15 The MirOS Project temporarily reconvenes on OFTC)



Bug#992069: libvkd3d-doc is not installable besides libvkd3d-dev

2021-08-10 Thread Floris Renaud

Package: libvkd3d-doc
Version: 1.2-5
Severity: important

Dear Maintainer,

sudo apt install libvkd3d-doc
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following NEW packages will be installed:
libvkd3d-doc
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 0 B/788 kB of archives.
After this operation, 2154 kB of additional disk space will be used.
(Reading database ... 365748 files and directories currently installed.)
Preparing to unpack .../libvkd3d-doc_1.2-5_all.deb ...
Unpacking libvkd3d-doc (1.2-5) ...
dpkg: error processing archive
/var/cache/apt/archives/libvkd3d-doc_1.2-5_all.deb (--unpack):
trying to overwrite '/usr/share/doc/libvkd3d-dev/ANNOUNCE.gz', which is 
also

in package libvkd3d-dev:i386 1.2-5
dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
Errors were encountered while processing:
/var/cache/apt/archives/libvkd3d-doc_1.2-5_all.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)



-- System Information:
Debian Release: 11.0
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=nl_NL.utf8, LC_CTYPE=nl_NL.utf8 (charmap=UTF-8), LANGUAGE not 
set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#992068: libhdf5-mpich-dev: please bump libmpich-dev dependency to (>= 3.3-3~)

2021-08-10 Thread Andreas Beckmann
Package: libhdf5-mpich-dev
Version: 1.10.6+repack-4
Severity: serious
Tags: patch
User: debian...@lists.debian.org
Usertags: piuparts

During an piuparts upgrade test of libhdf5-mpich-dev on the upgrade path
  squeeze -> wheezy -> jessie -> stretch -> buster -> bullseye
I observed this failure:

  Setting up libhdf5-mpich-dev (1.10.6+repack-4) ...
  update-alternatives: priority must be an integer

  Use 'update-alternatives --help' for program usage information.
  dpkg: error processing package libhdf5-mpich-dev (--configure):
   installed libhdf5-mpich-dev package post-installation script subprocess 
returned error exit status 2

At the time of the failure the libmpich1.0-dev package which
  Provides: libmpich-dev 
was still installed, but that uses an ancient mpi alternative scheme
the postinst cannot parse.
Making the libmpich-dev versioned (buster shipped with 3.3-3 which uses
the new alternatives scheme) ensures that libmpich-dev gets upgraded
(or rather installed, kicking out the ancient libmpich1.0-dev from
squeeze).

This fix needs to get backported to bullseye-pu.

This needs an update of mpich as well, since there is an unhandled
file conflict between libmpich1.0-dev and mpich, #992065.

I've verified that using the two updated packages fixes the problematic
upgrade path.

Andreas

PS: it took me quite some time to understand what was going on here
so the fix wasn't ready before the bullseye deadline.
diff -Nru hdf5-1.10.6+repack/debian/changelog 
hdf5-1.10.6+repack/debian/changelog
--- hdf5-1.10.6+repack/debian/changelog 2021-06-16 23:57:23.0 +0200
+++ hdf5-1.10.6+repack/debian/changelog 2021-08-10 16:54:23.0 +0200
@@ -1,3 +1,10 @@
+hdf5 (1.10.6+repack-5) UNRELEASED; urgency=medium
+
+  * libhdf5-mpich-dev: Bump libmpich-dev dependency to (>= 3.3-3~) to ensure
+the postinst is able to parse the mpi alternative.  (Closes: #-1)
+
+ -- Andreas Beckmann   Tue, 10 Aug 2021 16:54:23 +0200
+
 hdf5 (1.10.6+repack-4) unstable; urgency=medium
 
   * Revert support for read-only S3 virtual file driver, as it introduced
diff -Nru hdf5-1.10.6+repack/debian/control hdf5-1.10.6+repack/debian/control
--- hdf5-1.10.6+repack/debian/control   2021-06-16 23:57:23.0 +0200
+++ hdf5-1.10.6+repack/debian/control   2021-08-10 16:54:23.0 +0200
@@ -480,7 +480,7 @@
  zlib1g-dev,
  libaec-dev,
  libjpeg-dev,
- libmpich-dev,
+ libmpich-dev (>= 3.3-3~),
  ${misc:Depends}
 Suggests: libhdf5-doc
 Breaks: libhdf5-mpi-dev (= 1.10.6+repack-1~exp4)
diff -Nru hdf5-1.10.6+repack/debian/control.in 
hdf5-1.10.6+repack/debian/control.in
--- hdf5-1.10.6+repack/debian/control.in2021-06-16 23:57:23.0 
+0200
+++ hdf5-1.10.6+repack/debian/control.in2021-08-10 16:54:23.0 
+0200
@@ -480,7 +480,7 @@
  zlib1g-dev,
  libaec-dev,
  libjpeg-dev,
- libmpich-dev,
+ libmpich-dev (>= 3.3-3~),
  ${misc:Depends}
 Suggests: libhdf5-doc
 Breaks: libhdf5-mpi-dev (= 1.10.6+repack-1~exp4)


libhdf5-mpich-dev_1.10.6+repack-4.log.gz
Description: application/gzip


Bug#992067: ITP: powder-toy -- A free physics sandbox game

2021-08-10 Thread clay stan
Package: wnpp
Severity: wishlist
Owner: clay stan 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: powder-toy
  Version : 96.1.349
  Upstream Author : The-Powder-Toy
* URL :  https://github.com/The-Powder-Toy/The-Powder-Toy
  License : GPL-3.0


Bug#992066: libvkd3d-headers: Package doesn't contain header files

2021-08-10 Thread Floris Renaud

Package: libvkd3d-headers
Version: 1.2-5
Severity: important

Dear Maintainer,

The libvkd3d-headers package does not contain any header files (for 
example,

vkd3d.h).

$ apt policy libvkd3d-headers
libvkd3d-headers:
Installed: 1.2-5
Candidate: 1.2-5
Version table:
*** 1.2-5 100
1 http://ftp.nl.debian.org/debian experimental/main amd64 Packages
1 http://ftp.nl.debian.org/debian experimental/main i386 Packages
100 /var/lib/dpkg/status
$ dpkg-query -L libvkd3d-headers
/.
/usr
/usr/share
/usr/share/doc
/usr/share/doc/libvkd3d-headers
/usr/share/doc/libvkd3d-headers/ANNOUNCE.gz
/usr/share/doc/libvkd3d-headers/AUTHORS
/usr/share/doc/libvkd3d-headers/README
/usr/share/doc/libvkd3d-headers/changelog.Debian.gz
/usr/share/doc/libvkd3d-headers/copyright



-- System Information:
Debian Release: 11.0
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=nl_NL.utf8, LC_CTYPE=nl_NL.utf8 (charmap=UTF-8), LANGUAGE not 
set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

libvkd3d-headers depends on no packages.

Versions of packages libvkd3d-headers recommends:
ii libvkd3d-dev 1.2-5

libvkd3d-headers suggests no packages.



Bug#837093: edk2: Please build an EFI shell package

2021-08-10 Thread Bastien Roucariès
Source: edk2
Followup-For: Bug #837093
Control: tags -1 + patch

Dear Maintainer,

Please find a patch here
https://salsa.debian.org/qemu-team/edk2/-/merge_requests/3

Note that I have just posted a mail to debian-devel requesting an arch triplet.

BTW I think we should compile the dynamic command initrd.

Documentation is left in your side

shell-basic is pretty basic and does not include network neither dump/write
disk
shell is the full package

Please apply

Bastien



Bug#983960: abiword: ftbfs with GCC-11

2021-08-10 Thread Lukas Märdian
Package: abiword
Version: 3.0.4~dfsg-3
Followup-For: Bug #983960
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu impish ubuntu-patch
X-Debbugs-Cc: sl...@ubuntu.com
Control: tags -1 patch

Hi Jonas,

C++17 does not allow dynamic exception specifications anymore, therefore we need
to remove/replace the relevant throw() statements, as done upstream in 2017:
https://github.com/AbiWord/abiword/commit/ef29fc9

I'm not sure why this commit isn't part of the 3.0.4 release – from 2019 – 
already...

In Ubuntu, the attached (upstream) patch was applied cleanly to make it build 
again.

Thanks for considering the patch.


-- System Information:
Debian Release: bullseye/sid
  APT prefers hirsute-updates
  APT policy: (500, 'hirsute-updates'), (500, 'hirsute-security'), (500, 
'hirsute'), (100, 'hirsute-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.11.0-25-generic (SMP w/4 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE:en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru 
abiword-3.0.4~dfsg/debian/patches/0014-Remove-deprecated-throw-specifiers.patch 
abiword-3.0.4~dfsg/debian/patches/0014-Remove-deprecated-throw-specifiers.patch
--- 
abiword-3.0.4~dfsg/debian/patches/0014-Remove-deprecated-throw-specifiers.patch 
1970-01-01 01:00:00.0 +0100
+++ 
abiword-3.0.4~dfsg/debian/patches/0014-Remove-deprecated-throw-specifiers.patch 
2021-08-10 16:25:27.0 +0200
@@ -0,0 +1,849 @@
+From: Hubert Figuiere 
+Date: Wed, 22 Nov 2017 06:01:56 +
+Subject: Remove deprecated throw specifiers
+
+git-svn-id: svn+ssh://svn.abisource.com/svnroot/abiword/trunk@35445 
bcba8976-2d24-0410-9c9c-aab3bd5fdfd6
+---
+ plugins/aiksaurus/aiksaurusgtk3/AiksaurusGTK.cpp | 34 ++---
+ plugins/aiksaurus/aiksaurusgtk3/DialogMediator.h |  8 ++---
+ plugins/aiksaurus/aiksaurusgtk3/Display.cpp  | 28 -
+ plugins/aiksaurus/aiksaurusgtk3/Display.h| 28 -
+ plugins/aiksaurus/aiksaurusgtk3/Meaning.cpp  | 12 
+ plugins/aiksaurus/aiksaurusgtk3/Meaning.h| 10 +++
+ plugins/aiksaurus/aiksaurusgtk3/Toolbar.cpp  | 32 ++--
+ plugins/aiksaurus/aiksaurusgtk3/Toolbar.h| 34 ++---
+ plugins/sdw/xp/docinfo.cpp   |  4 +--
+ plugins/sdw/xp/docinfo.h |  2 +-
+ plugins/sdw/xp/ie_imp_StarOffice.cpp | 12 
+ plugins/sdw/xp/ie_imp_StarOffice.h   | 38 
+ src/af/util/xp/ut_iconv.cpp  |  2 +-
+ src/af/util/xp/ut_iconv.h|  3 +-
+ 14 files changed, 123 insertions(+), 124 deletions(-)
+
+diff --git a/plugins/aiksaurus/aiksaurusgtk3/AiksaurusGTK.cpp 
b/plugins/aiksaurus/aiksaurusgtk3/AiksaurusGTK.cpp
+index 61cd640..15f2721 100644
+--- a/plugins/aiksaurus/aiksaurusgtk3/AiksaurusGTK.cpp
 b/plugins/aiksaurus/aiksaurusgtk3/AiksaurusGTK.cpp
+@@ -51,15 +51,15 @@ namespace AiksaurusGTK_impl
+ DialogImpl();
+ virtual ~DialogImpl();
+ 
+-const char* runThesaurus(const char* word) throw();
+-void setTitle(const char* title) throw();
+-void setReplacebar(bool replacebar) throw();
+-void setInitialMessage(const char* message) throw(std::bad_alloc);
+-
+-void eventCancel() throw();
+-void eventReplace(const char* replacement) throw();
+-void eventSelectWord(const char* word) throw();
+-void eventSearch(const char* word) throw();
++const char* runThesaurus(const char* word) noexcept(false);
++void setTitle(const char* title) noexcept(false);
++void setReplacebar(bool replacebar) noexcept(false);
++void setInitialMessage(const char* message) noexcept(false);
++
++void eventCancel() noexcept(false);
++void eventReplace(const char* replacement) noexcept(false);
++void eventSelectWord(const char* word) noexcept(false);
++void eventSearch(const char* word) noexcept(false);
+ };
+ 
+ 
+@@ -78,13 +78,13 @@ namespace AiksaurusGTK_impl
+ }
+ 
+ 
+-void DialogImpl::setReplacebar(bool replacebar) throw()
++void DialogImpl::setReplacebar(bool replacebar) noexcept(false)
+ {
+ d_showreplacebar = replacebar;
+ }
+ 
+ 
+-void DialogImpl::setInitialMessage(const char* message) 
throw(std::bad_alloc)
++void DialogImpl::setInitialMessage(const char* message) noexcept(false)
+ {
+ d_initialMessage = message;
+ }
+@@ -149,7 +149,7 @@ namespace AiksaurusGTK_impl
+ }
+ 
+ 
+-const char* DialogImpl::runThesaurus(const char* word) throw()
++const char* DialogImpl::runThesaurus(const char* word) noexcept(false)
+ {

Bug#992065: mpich: libhdf5-mpich-dev upgrade problems if libmpich1.0-dev is still installed

2021-08-10 Thread Andreas Beckmann
Package: mpich
Version: 3.4.1-4
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Control: affects -1 + libhdf5-mpich-dev

During an piuparts upgrade test of libhdf5-mpich-dev on the upgrade path
  squeeze -> wheezy -> jessie -> stretch -> buster -> bullseye
I observed this failure:

  Setting up libhdf5-mpich-dev (1.10.6+repack-4) ...
  update-alternatives: priority must be an integer

  Use 'update-alternatives --help' for program usage information.
  dpkg: error processing package libhdf5-mpich-dev (--configure):
   installed libhdf5-mpich-dev package post-installation script subprocess 
returned error exit status 2


mpi alternative setting after the failure
(after upgrade squeeze...bullseye):

# update-alternatives --query mpi
Name: mpi
Link: /usr/include/mpi
Slaves:
 libmpi++.a /usr/lib/libmpi++.a
 libmpi++.so /usr/lib/libmpi++.so
 libmpi.a /usr/lib/libmpi.a
 libmpi.so /usr/lib/libmpi.so
 mpiCC /usr/bin/mpiCC
 mpiCC.1.gz /usr/share/man/man1/mpiCC.1.gz
 mpicc /usr/bin/mpicc
 mpicc.1.gz /usr/share/man/man1/mpicc.1.gz
 mpicxx /usr/bin/mpicxx
 mpicxx.1.gz /usr/share/man/man1/mpicxx.1.gz
 mpif77 /usr/bin/mpif77
 mpif77.1.gz /usr/share/man/man1/mpif77.1.gz
 mpif90 /usr/bin/mpif90
 mpif90.1.gz /usr/share/man/man1/mpif90.1.gz
 mpireconfig /usr/bin/mpireconfig
 mpireconfig.1.gz /usr/share/man/man1/mpireconfig.1.gz
Status: auto
Best: /usr/lib/mpich/include
Value: /usr/lib/mpich/include

Alternative: /usr/lib/mpich/include
Priority: 10
Slaves:
 libmpi++.a /usr/lib/mpich/lib/libpmpich++.a
 libmpi++.so /usr/lib/mpich/lib/shared/libpmpich++.so
 libmpi.a /usr/lib/mpich/lib/libmpich.a
 libmpi.so /usr/lib/mpich/lib/shared/libmpich.so
 mpiCC /usr/bin/mpiCC.mpich
 mpiCC.1.gz /usr/share/man/man1/mpiCC.mpich.1.gz
 mpicc /usr/bin/mpicc.mpich
 mpicc.1.gz /usr/share/man/man1/mpicc.mpich.1.gz
 mpicxx /usr/bin/mpicxx.mpich
 mpicxx.1.gz /usr/share/man/man1/mpicxx.mpich.1.gz
 mpif77 /usr/bin/mpif77.mpich
 mpif77.1.gz /usr/share/man/man1/mpif77.mpich.1.gz
 mpif90 /usr/bin/mpif90.mpich
 mpif90.1.gz /usr/share/man/man1/mpif90.mpich.1.gz
 mpireconfig /usr/bin/mpireconfig.mpich
 mpireconfig.1.gz /usr/share/man/man1/mpireconfig.mpich.1.gz


and after fresh installation in bullseye:

# update-alternatives --query mpi
Name: mpi
Link: /usr/bin/mpicc
Slaves:
 hdf5-mpi.pc /usr/lib/x86_64-linux-gnu/pkgconfig/hdf5-mpi.pc
 mpiCC /usr/bin/mpiCC
 mpic++ /usr/bin/mpic++
 mpicxx /usr/bin/mpicxx
 mpif77 /usr/bin/mpif77
 mpif90 /usr/bin/mpif90
 mpifort /usr/bin/mpifort
Status: auto
Best: /usr/bin/mpicc.mpich
Value: /usr/bin/mpicc.mpich

Alternative: /usr/bin/mpicc.mpich
Priority: 40
Slaves:
 hdf5-mpi.pc /usr/lib/x86_64-linux-gnu/pkgconfig/hdf5-mpich.pc
 mpiCC /usr/bin/mpicxx.mpich
 mpic++ /usr/bin/mpicxx.mpich
 mpicxx /usr/bin/mpicxx.mpich
 mpif77 /usr/bin/mpifort.mpich
 mpif90 /usr/bin/mpifort.mpich
 mpifort /usr/bin/mpifort.mpich


OK, that is still an ancient mpi alternative at the time
libhdf5-mpich-dev.postinst runs ...

Probably caused by libmpich1.0-dev providing libmpich-dev and therefore
no newer libmpich-dev getting installed.

Trying to add some Breaks/Replaces ... tests running ...

BTW, installing libmpich-dev in the failure state causes

Selecting previously unselected package mpich.
Preparing to unpack .../31-mpich_3.4.1-4_amd64.deb ...
Unpacking mpich (3.4.1-4) ...
dpkg: error processing archive 
/tmp/apt-dpkg-install-S2t7dN/31-mpich_3.4.1-4_amd64.deb (--unpack):
 trying to overwrite '/usr/bin/mpicc.mpich', which is also in package 
libmpich1.0-dev 1.2.7-9.1


Andreas


libhdf5-mpich-dev_1.10.6+repack-4.log.gz
Description: application/gzip


Bug#992064: greylistd should not recommend installation of exim4

2021-08-10 Thread Jonas Maurus

Package: greylistd
Version: 0.9.0
Severity: Normal

The greylistd package currently recommends exim4. I wrote a filter for 
OpenSMTPD that uses greylistd for providing greylisting services 
(shameless plug: https://github.com/jdelic/opensmtpd-filter-greylistd/). 
With the current package, if the user tries to install greylistd without 
--no-install-recommends, apt will happily uninstall OpenSMTPD to install 
exim4. This is not ideal from a user-experience point of view.


I think the best solution is for greylistd to merely _suggest_ exim4. If 
we want to keep the recommendation, an alternative solution would be to 
recommend the "mail-transport-agent" meta package. This way OpenSMTPD 
would also fulfill the recommendation.


What do y'all think?



Bug#992063: bullseye-pu: package fetchmail/6.4.16-4+deb11u1

2021-08-10 Thread GCS
Package: release.debian.org
User: release.debian@packages.debian.org
Tags: bullseye
Severity: normal

Hi RMs,

Asking for a fetchmail package update, fixing a regression in its last
security fix. This is a one liner, moving down an 'endif'.
The reason is, partial_message_size_used was double incremented and
messages got truncated (the size limit reached much sooner). Updated
package is already in Sid, I would like to get it for Bullseye too.

Debdiff is attached.

Thanks for consideration,
Laszlo/GCS
diff -Nru fetchmail-6.4.16/debian/changelog fetchmail-6.4.16/debian/changelog
--- fetchmail-6.4.16/debian/changelog	2021-07-29 00:18:56.0 +0200
+++ fetchmail-6.4.16/debian/changelog	2021-08-09 20:06:48.0 +0200
@@ -1,3 +1,10 @@
+fetchmail (6.4.16-4+deb11u1) bullseye; urgency=medium
+
+  * Backport upstream regression fix for 6.4.20's security (CVE-2021-36386)
+fix.
+
+ -- Laszlo Boszormenyi (GCS)   Mon, 09 Aug 2021 20:06:48 +0200
+
 fetchmail (6.4.16-4) unstable; urgency=high
 
   * Backport upstream security fix for CVE-2021-36386: denial of service or
diff -Nru fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch
--- fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch	1970-01-01 01:00:00.0 +0100
+++ fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch	2021-08-09 20:06:48.0 +0200
@@ -0,0 +1,76 @@
+From d3db2da1d13bd2419370ad96defb92eecb17064c Mon Sep 17 00:00:00 2001
+From: Matthias Andree 
+Date: Mon, 9 Aug 2021 17:42:29 +0200
+Subject: [PATCH] Fix --logfile and message truncation issue.
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Regression in 6.4.20's security fix (Git commit c546c829).
+
+We doubly incremented partial_message_size_used on modern systems
+(stdard.h/vsnprintf), once in report_vbuild() and then again in
+report_build(), so the 2nd and subsequent report_build() fragments
+landed too late in the buffer.  This will not cause overruns due to the
+reallocation prior to the vsnprintf/sprintf, but it write starts behind
+the '\0' byte, instead of right over it, so the string also gets
+truncated to the first fragment written with report_vbuild().
+
+Fix by moving the increment back into the #else...#endif part that does
+not use report_vbuild().
+
+Reported by: Jürgen Edner, Erik Christiansen
+---
+ NEWS | 18 ++
+ report.c |  3 ++-
+ 2 files changed, 20 insertions(+), 1 deletion(-)
+
+diff --git a/NEWS b/NEWS
+index 0cd3f968..b98f15d2 100644
+--- a/NEWS
 b/NEWS
+@@ -64,6 +64,24 @@ removed from a 6.5.0 or newer release.)
+   for end-of-life OpenSSL versions may be removed even from patchlevel releases.
+ 
+ 
++fetchmail-6.4.21 (released 2021-08-09, 30042 LoC):
++
++# REGRESSION FIX:
++* The new security fix in 6.4.20 for CVE-2021-36386 caused truncation of
++  messages logged to buffered outputs, predominantly --logfile.
++
++  This also caused lines in the logfile to run into one another because
++  the fragment containing the '\n' line-end character was usually lost.
++
++  Reason is that on all modern systems (with  header and vsnprintf()
++  interface), the length of log message fragments was added up twice, so
++  that these ended too deep into a freshly allocated buffer, after the '\0'
++  byte.  Unbuffered outputs flushed the fragments right away, which masked the
++  bug.
++
++  Reported by: Jürgen Edner, Erik Christiansen.
++
++
+ fetchmail-6.4.20 (not yet released):
+ 
+ # SECURITY FIX:
+diff --git a/report.c b/report.c
+index aea6b3ea..2db7d0a9 100644
+--- a/report.c
 b/report.c
+@@ -286,10 +286,11 @@ report_build (FILE *errfp, message, va_alist)
+ n = snprintf (partial_message + partial_message_size_used,
+ 		partial_message_size - partial_message_size_used,
+ 		message, a1, a2, a3, a4, a5, a6, a7, a8);
+-#endif
+ 
+ if (n > 0) partial_message_size_used += n;
+ 
++#endif
++
+ if (unbuffered && partial_message_size_used != 0)
+ {
+ 	partial_message_size_used = 0;
+-- 
+GitLab
+
diff -Nru fetchmail-6.4.16/debian/patches/series fetchmail-6.4.16/debian/patches/series
--- fetchmail-6.4.16/debian/patches/series	2021-07-29 00:18:56.0 +0200
+++ fetchmail-6.4.16/debian/patches/series	2021-08-09 20:06:48.0 +0200
@@ -5,3 +5,4 @@
 09_fix_memory_leak_in_timeout_situation.patch
 10_update_manpage.patch
 11_fix_CVE-2021-38386.patch
+12_fix_logfile_and_message_truncation_issue.patch


Bug#992002: [PATCH][Debian#992002] tbl: allow two-character fonts and format fonts in -Thtml

2021-08-10 Thread Ingo Schwarze
Hi Nab,

Nab wrote on Tue, Aug 10, 2021 at 01:08:31AM +0200:
> On Mon, Aug 09, 2021 at 10:58:19AM +0200, Ingo Schwarze wrote:
>> Nab wrote on Sun, Aug 08, 2021 at 03:24:53PM +0200:

>>> tbl's -Thtml ignores font requests;

>> Not in CVS HEAD; see https://cvsweb.bsd.lv/mandoc/tbl_html.c revision 1.34,
>> committed on May 16 earlier this year.

> Oh, indeed. I tested and based my patch on 1.14.5 from Debian,
> didn't realise that's almost two years old by now.
> Will use the CVS next time.

Note that so far, everybody who contributed code to mandoc provided
their first and last names.  I'm not sure it is strictly required in
the legal sense, but i do consider it beneficial both for authors
and for users.  The benefit for authors is that it makes it easier
for them to exercise their rights under the Berne Convention, in
particular their moral rights under that Convention, for example
to protect themselves if somebody abuses their contribution for
slander.  The benefit for users of knowing who the Copyright holders
are is also obvious, even if the code is BSD or ISC licensed:
It makes Copyright and license audits easier and reduces the risk
of suddenly being sued by parties the users didn't even know existed.

In this case, it isn't needed because by mere chance, even though
several of your ideas remained in the committed patch, none of your
code did, because i switched from TBL_CELL_BOLD and TBL_CELL_ITALIC
to ESCAPE_FONT*.  Ideas aren't subject to Copyright, only text is,
and for crediting a person who provided bug reports, feature requests,
and ideas, a pseudonym is sufficient.

>>> text
>>> text
>>> text

>> These become:
>>   text
>>   text

> This is great news! A bunch of my pages use C[BI] and the HTML renders
> look much better, thanks!

Note that i don't recommend using these fonts in manual pages.
Even with groff, typical installations don't prodide CB and CI
fonts for terminal output, which typically results in warnings
being thrown.  The details may vary among operating systems and
package managers even for the same version of groff.  Portability
to other formatters (like Heirloom, Plan 9, DWB, Solaris, neatroff)
is even more doubtful, but i don't know any details about that.

But as a rule, mandoc(1) even supports features if using them is
unwise, as long as that doesn't cause an undue burden.  One reason
to do so is making existing pages look better, no matter how good
or bad the style is that they are using.  Not supporting a feature
hurts end users - who aren't responsible for author's choices which
features to use.  But that a feature is supported by mandoc(1)
should not be misinterpreted by authors as a free pass to go on a
rampage and employ the most arcane and brittle features they manage
to find.

>>  * GNU tbl(1) appears to ignore space characters between the f
>>modifier and the font name, so "lf   B" is the same as "lfB".

> Huh, so it does! That's not explicitly mentioned by the manual and so
> I didn't think to test it.

No, i'm not even convinced it is intentional, and relying on it in
any document would be a thoroughly bad idea.  But mandoc(1) aims to
be bug-compatible with groff unless there is a good reason to differ.

>   Now, tbl(1) says
>   Key characters can be separated by spaces or tabs.
> so consider the following document:
> -- >8 --
> .TS
> lfBI  lf BI   lf  BI  .
> a b   c
> .TE
> -- >8 --
> (In order, none, space, tab follow 'f';
>  base64: LlRTCmxmQkkJbGYgQkkJbGYJQkkJLgphCWIJYwouVEUK)
> 
> groff renders it with a, b, and c as BI,
> but mandoc with your patch with a+b as BI and c as R, with -Tlint:
>   mandoc: ./q.1:2:14: WARNING: unknown font, \
>   skipping request: TS f  BI  .
> 
> If you change tbl_layout.c L171 to match L75:
> -- >8 --
> - while (p[*pos] == ' ')
> + while (p[*pos] == ' ' || p[*pos] == '\t')
> -- >8 --
> and L187:
> -- >8 --
> - if (strchr(" .", p[*pos + isz]) == NULL)
> + if (strchr(" \t.", p[*pos + isz]) == NULL)
> -- >8 --
> The document renders correctly.

Done in the commit cited below, thanks for pointing out that quirk.

>> Could you please check out from CVS (instead of the last release),
>> apply the following patch, and tell me whether it looks reasonable
>> and works for you?

> Yeah, save for the tab thing above, I haven't managed to fault it,
> in tests or real pages.

Thank you very much for testing.  That patch ended up growing
tentacles into quite a number of files, so the additional testing
is highly appreciated.

Here is the committed patch:

https://inbox.vuxu.org/mandoc-source/c2aa6365c21bf...@mandoc.bsd.lv/

Yours,
  Ingo



Bug#992051: security archive layout change needs more configuration changes

2021-08-10 Thread Justin B Rye
Paul Gevers wrote:
> Do you agree with the attached patch?

Yes, looks good to me!
-- 
JBR with qualifications in linguistics, experience as a Debian
sysadmin, and probably no clue about this particular package



Bug#608121: Helo

2021-08-10 Thread E E
Pershendetje

Ju lutemi kontrolloni mesazhin tim të hershëm dhe kthehuni tek unë, ju lutem.

Faleminderit.
të fala.
Elimond Emeh

Greeting

Kindly check my early message and get back to me please.

Thanks.
regards.
Elimond Eme



Bug#992051: security archive layout change needs more configuration changes

2021-08-10 Thread Paul Gevers
Hi Justin, all,

On 10-08-2021 14:29, Justin B Rye wrote:
> (I'm assuming APT::Default-Release users will be aware they're doing
> it, presumably because they've got sources defined for more than one
> release and need to specify which one is "primary")

I'm assuming the same.

> Do we need to mention fnmatch patterns (AKA globs) when the example
> doesn't use them?

I guess not. We don't need to write APT's documentation here.

Do you agree with the attached patch?

Paul
From ff677aa0be71b9a27d4d6d343f9ed1b14bcc086f Mon Sep 17 00:00:00 2001
From: Paul Gevers 
Date: Tue, 10 Aug 2021 13:03:30 +0200
Subject: [PATCH] issues.dbk: security archive requires update to pinning and
 Default-Release

Closes: #992051
---
 en/issues.dbk | 11 +++
 1 file changed, 11 insertions(+)

diff --git a/en/issues.dbk b/en/issues.dbk
index 1fbba7a3..d3321953 100644
--- a/en/issues.dbk
+++ b/en/issues.dbk
@@ -81,6 +81,17 @@
 	The security line in your APT configuration may look like:
 	deb https://deb.debian.org/debian-security bullseye-security main contrib
   
+  
+If your APT configuration also involves pinning or
+APT::Default-Release, it is likely to
+require adjustments as the codename of the security archive no
+longer matches that of the regular archive. An example of a
+working APT::Default-Release line for
+bullseye looks like:
+APT::Default-Release "/^bullseye(|-security|-upgrades)$/";
+which takes advantage of the undocumented feature of APT that
+it supports regular expressions (inside /).
+  
 
 
 
-- 
2.30.2



OpenPGP_signature
Description: OpenPGP digital signature


Bug#991982: nano does not work with TERM unset

2021-08-10 Thread Bastien Roucariès
Le mardi 10 août 2021, 08:05:00 UTC Benno Schulenberg a écrit :
> Op 09-08-2021 om 15:08 schreef Bastien Roucariès:
> > nano work with TERM=dumb (but is strange but it work),
> 
> For me, 'TERM=dumb nano somefile' does not work, not on a console, not
> on an xterm, not on Xfce Terminal -- it shows something, but is totally
> unusable: the user cannot see what he or she is doing.  What terminal
> are you using?

Yes but it run, it is unusable but it run. The problem is the behvior is not 
consistant. You have only two sane choice:
1 allow to run in every terminal. It is user choice and it could shot it own 
foot
2 filter the bad terminal and return with an unambigous error code because I 
could not initialize(like 156 faking could not execute due to library not here 
or even 155 is it is documented)

You do not implement a consistant behavior.
> 
> > so safer will be to
> > consider as best effort TERM="" , TERM not set, equivalent to dumb.
> 
> May I ask what the scenario is?  How can it happen that TERM is unset?
> What disaster can leave TERM unset?  When the user starts a shell with
> 'env -i' and does not know how to get out?
> 
> I think it is okay when nano works around an unset TERM, simply because
> nano /needs/ a terminal.  But if TERM is set to anything that is invalid
> (even the empty string), then the user is responsible and they should get
> what they asked for -- that is: a non-functioning nano.

No posix said about vi that the behavior for empty term should be consistant 
and documented. If nano want to be a vi replacement it should be consistant.

You could implement 2 (fine) but please be consistant refuse dumb, vt52 and 
other impossible terminal with error code that say nano could not initialize 
(thus allowing to test if they are an error during reading/writting a file and 
nano could not run, please try another editor)

Bastien

> 
> Benno



signature.asc
Description: This is a digitally signed message part.


Bug#992008: ruby-google-protobuf: Missing lib/google/protobuf directory and fails require

2021-08-10 Thread Pirate Praveen



2021, ഓഗസ്റ്റ് 10 5:44:35 PM IST, Pirate Praveen ൽ 
എഴുതി
>
>
>2021, ഓഗസ്റ്റ് 10 12:44:39 PM IST, "László Böszörményi (GCS)" 
>ൽ എഴുതി
>>Control: tags -1 +pending
>>
>>Hi Pirate,
>>
>>On Mon, Aug 9, 2021 at 8:51 PM Pirate Praveen  
>>wrote:
>>> Can you upload this change? Or if you are okay with this change, I can
>>> upload it as well. Once this is fixed, I can switch back to the
>>> packaged version (currently using gem install google-protobuf as work
>>> around).
>> Sure, I can. Will do it soon.

Thanks.

>>> I had seen this bug earlier
>>> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989774 but I thought
>>> it was something similar/related to
>>> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966653 (between, this
>>> bug also seems to be fixed with newer protobuf/grpc versions in
>>> experimental).
>> You know, my question is, how and why it was and still working for
>>3.12.4 but nor for 3.17.3?

One change that I can think of is adding noruby build profile between these two 
versions.

>>Regards,
>>Laszlo/GCS

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.



Bug#992051: security archive layout change needs more configuration changes

2021-08-10 Thread Justin B Rye
Paul Gevers wrote:
>   The security line in your APT configuration may look like:
>   deb https://deb.debian.org/debian-security 
> bullseye-security main contrib
>
> +  
> + If APT is configured using APT pinning or
> + APT::Default-Release,

"Configured using" is a bit unclear; I think you mean

If your APT configuration also involves pinning or 
APT::Default-Release,

(I'm assuming APT::Default-Release users will be aware they're doing
it, presumably because they've got sources defined for more than one
release and need to specify which one is "primary")

>the configuration
> + most likely need updating as the codename of the security

"is likely to need updating", or:

 it is likely to
require adjustments as the codename of the security

> + archive no longer matches that of the regular archive. An
> + example of a working APT::Default-Release
> + line for bullseye looks:

line for bullseye looks like:

> + APT::Default-Release 
> "/^bullseye(|-security|-upgrades)$/";
> + which takes advantage of the undocumented feature of APT that
> + it supports POSIX fnmatch patterns and regular expressions
> + (inside /).
> +  

Do we need to mention fnmatch patterns (AKA globs) when the example
doesn't use them?  Even if we do, we should make it clearer that
"inside /" only means regexps:

it supports regular expressions (inside /)
as well as glob patterns.

(Or should "glob" be in quotes, or s?)
-- 
JBR with qualifications in linguistics, experience as a Debian
sysadmin, and probably no clue about this particular package



Bug#991811: unblock: libapache2-mod-auth-openidc/2.4.9-1

2021-08-10 Thread Christoph Martin
Dear Security Team,

the fixed version is now in bullseye. Thanks for that.

What is the plan for buster and stretch? Do you prepare fixes?

Greetings
Christoph

Am 06.08.21 um 11:46 schrieb Christoph Martin:
> Hi Paul,
> hi Salvatore,
> 
> Am 06.08.21 um 09:32 schrieb Salvatore Bonaccorso:
>>>
>>> It's *very* late in the freeze so I need an answer *real soon*. You
>>> didn't tell us how you tested the package, how upstream tested the
>>> changes and how you *judge* the changes between bullseye and sid. I
>>> can't estimate the risk by myself.
>>
>> From security team perspective, we could tend to confirm to be good
>> option to actually go to 2.4.9 based version, if Christoph can confirm
>> the above questions on testing. Was it tested in production
>> environment as well?
>>
> 
> I have tested it in a production environment.
> The package installs correctly on a bullseye system.
> Upgrade of the package also works.
> Login via our idp ist working as expected.
> All expected env variables in phpinfo have the expected values.
> 
> Regards
> 
> Christoph
> 



OpenPGP_signature
Description: OpenPGP digital signature


Bug#992053: c-ares: diff for NMU version 1.17.1-1.1

2021-08-10 Thread Gregor Jasny
Hello,

Thank you for handling this issue so quickly. I'm travelling for the next
week and won't be able to work on anything Debian related.

If you feel comfortable, you could also upload the fixed package without
any delay.

Thanks,
Gregor


Bug#991997: new upstream (0.31)

2021-08-10 Thread Martijn van Brummelen

Hi,
On 2021-08-08 10:32, Daniel Baumann wrote:

Package: nwipe

Hi Martijn,

thank you so much for nwipe.

Given the isaac issue, it would be nice if you could upload nwipe 0.31
anytime soon to Debian (experimental) and consider a bugfix for 
bullseye.


Thanks!
Will try too upload a new version soon and consider what else would be 
possible.


Kind regards,
Martijn



Bug#992051: security archive layout change needs more configuration changes

2021-08-10 Thread Paul Gevers
Control: tags -1 patch

Hi all,

On 10-08-2021 07:55, Paul Gevers wrote:
> Yesterday I noticed that the layout change of the security impacts more
> than just the apt *sources* as my system wasn't updating perl,
> libencode-perl and exiv2. I already enabled the new security archive
> layout a long time ago (and apt will complain when the sources are not
> found). I discussed the issue on IRC on #d-release with juliank (apt
> upstream). What users *need* to be aware of is that apt pinning (pabs
> told me) and APT::Default-Release (found myself) may need adjustments
> too, otherwise security updates are not installed.
> 
> I'm working on text for the release notes, but I fear a lot of users
> will not be reading those and when they upgrade their secure buster
> systems and only fix their apt sources, depending on how they configure
> their system to follow bullseye, they may easily miss out on security
> updates.

Please find attached my proposal, ready to push.

Paul
From 3e106d7ef0412530a0a9643032edb7bd4b453d74 Mon Sep 17 00:00:00 2001
From: Paul Gevers 
Date: Tue, 10 Aug 2021 13:03:30 +0200
Subject: [PATCH] issues.dbk: security archive requires update to pinning and
 Default-Release

Closes: #992051
---
 en/issues.dbk | 12 
 1 file changed, 12 insertions(+)

diff --git a/en/issues.dbk b/en/issues.dbk
index 1fbba7a3..e0d5fb11 100644
--- a/en/issues.dbk
+++ b/en/issues.dbk
@@ -81,6 +81,18 @@
 	The security line in your APT configuration may look like:
 	deb https://deb.debian.org/debian-security bullseye-security main contrib
   
+  
+	If APT is configured using APT pinning or
+	APT::Default-Release, the configuration
+	most likely need updating as the codename of the security
+	archive no longer matches that of the regular archive. An
+	example of a working APT::Default-Release
+	line for bullseye looks:
+	APT::Default-Release "/^bullseye(|-security|-upgrades)$/";
+	which takes advantage of the undocumented feature of APT that
+	it supports POSIX fnmatch patterns and regular expressions
+	(inside /).
+  
 
 
 
-- 
2.30.2



OpenPGP_signature
Description: OpenPGP digital signature


Bug#992062: ITP: libxcvt -- VESA CVT standard timing modelines generator

2021-08-10 Thread Timo Aaltonen
Package: wnpp
Severity: wishlist
Owner: Timo Aaltonen 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: libxcvt
  Version : 0.1.0
  Upstream Author : X.Org
* URL : https://gitlab.freedesktop.org/xorg/lib/libxcvt
* License : MIT, NTP
  Programming Lang: C
  Description : libxcvt

libxcvt is a library providing a standalone version of the X server
implementation of the VESA CVT standard timing modelines generator.

This used to be part of xorg-server, and got split off as a shared library
so that other projects can use it.



Bug#992060: pytsk: please make the build reproducible

2021-08-10 Thread Chris Lamb
forwarded 992060 https://github.com/py4n6/pytsk/pull/81
thanks

I've forwarded this upstream here:

  https://github.com/py4n6/pytsk/pull/81


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Bug#992061: surgescript: please make the build reproducible

2021-08-10 Thread Chris Lamb
Source: surgescript
Version: 0.5.4.4-1
Severity: wishlist
Tags: patch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: buildpath
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Hi,

Whilst working on the Reproducible Builds effort [0] we noticed that
surgescript could not be built reproducibly.

This is because CMake's RPATH is not stripped, needing us to avoid
it being set with -DCMAKE_SKIP_RPATH=ON.

Patch attached.

 [0] https://reproducible-builds.org/


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-
--- a/debian/rules  2021-08-10 11:44:23.417015261 +0100
--- b/debian/rules  2021-08-10 11:47:44.882173416 +0100
@@ -15,7 +15,8 @@
 
 override_dh_auto_configure:
dh_auto_configure -- \
-   -DLIB_SUFFIX=/$(DEB_HOST_MULTIARCH)
+   -DLIB_SUFFIX=/$(DEB_HOST_MULTIARCH) \
+   -DCMAKE_SKIP_RPATH=ON
 
 override_dh_compress:
dh_compress -X.ss


Bug#992060: pytsk: please make the build reproducible

2021-08-10 Thread Chris Lamb
Source: pytsk
Version: 20200117-3
Severity: wishlist
Tags: patch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: randomness
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Hi,

Whilst working on the Reproducible Builds effort [0] we noticed that
pytsk could not be built reproducibly.

This is because it generated a pytsk3.c file in a nondeterministic
manner, specifically by naively iterating over a Python set()
structure.

Patch attached.

 [0] https://reproducible-builds.org/


Regards,

--
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-
--- a/debian/patches/0002-Reproducible-build.patch  1970-01-01 
01:00:00.0 +0100
--- b/debian/patches/0002-Reproducible-build.patch  2021-08-10 
11:33:28.947652513 +0100
@@ -0,0 +1,15 @@
+Description: Make the build reproducible
+Author: Chris Lamb 
+Last-Update: 2021-08-10
+
+--- pytsk-20200117.orig/class_parser.py
 pytsk-20200117/class_parser.py
+@@ -914,7 +914,7 @@ uint64_t integer_object_copy_to_uint64(P
+ self.initialise_class(class_name, out, done)
+ 
+ # Add the constants in here
+-for constant, type in self.constants:
++for constant, type in sorted(self.constants):
+ if type == "integer":
+ out.write(
+ "tmp = PyLong_FromUnsignedLongLong((uint64_t) 
{0:s});\n".format(constant))
--- a/debian/patches/series 2021-08-10 11:29:42.852085888 +0100
--- b/debian/patches/series 2021-08-10 11:33:28.139656520 +0100
@@ -1,2 +1,3 @@
 0001-Link-system-tsk-statically-talloc-dynamically-instea.patch
 change-lexer.patch
+0002-Reproducible-build.patch


Bug#992059: spatialindex: please make the build reproducible

2021-08-10 Thread Sebastiaan Couwenberg
Control: tags -1 pending

Hi Chris,

Thanks for the patch, it's applied in git and will be included in the
next upload.

Kind Regards,

Bas

-- 
 GPG Key ID: 4096R/6750F10AE88D4AF1
Fingerprint: 8182 DE41 7056 408D 6146  50D1 6750 F10A E88D 4AF1



Bug#992059: spatialindex: please make the build reproducible

2021-08-10 Thread Chris Lamb
Source: spatialindex
Version: 1.9.3-2
Severity: wishlist
Tags: patch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: buildpath
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Hi,

Whilst working on the Reproducible Builds effort [0] we noticed that
spatialindex could not be built reproducibly.

This is because CMake's RPATH is not stripped, needing us to avoid
it being set with -DCMAKE_SKIP_RPATH=ON.

Patch attached.

 [0] https://reproducible-builds.org/


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-
--- a/debian/rules  2021-08-10 10:48:25.404043494 +0100
--- b/debian/rules  2021-08-10 10:51:29.773864458 +0100
@@ -20,7 +20,7 @@
dh $@ --with pkgkde_symbolshelper
 
 override_dh_auto_configure:
-   dh_auto_configure -- -DSIDX_LIB_SUBDIR=lib/$(DEB_HOST_MULTIARCH)
+   dh_auto_configure -- -DSIDX_LIB_SUBDIR=lib/$(DEB_HOST_MULTIARCH) 
-DCMAKE_SKIP_RPATH=ON
 
 override_dh_install:
$(RM) $(CURDIR)/debian/tmp/usr/lib/*/*.la


Bug#891083: remmina: Fails to save connection details

2021-08-10 Thread anten...@simbiosi.org
I Think this is not relevant anymore and can be closed



Bug#959395: remmina: Grab all keyboard events not working after upgrade

2021-08-10 Thread anten...@simbiosi.org
Do you still have the same problem with Remmina v1.4.20?



Bug#981153: cargo: Please package new upstream

2021-08-10 Thread Sjoerd Simons
On Wed, Jan 27, 2021 at 10:52:17AM +0900, Mike Hommey wrote:
> Source: cargo
> Version: 0.47.0-3
> Severity: wishlist
> 
> Firefox now requires version 0.48, latest upstream is 0.50, and unstable
> is on 0.47.

Fwiw; with Cargo 0.51 the new resolver feature has been stablelized [0]. I'm
starting to hit issues when building with various crates from the ecosystem as
that's starting to be adopted now.

0: 
https://blog.rust-lang.org/2021/03/25/Rust-1.51.0.html#cargos-new-feature-resolver



Bug#970665: Doesn't save any preferences (not even within the session)

2021-08-10 Thread anten...@simbiosi.org
Hi Daniel,

Do you still have the same problem with Remmina v1.4.20?



Bug#985353:

2021-08-10 Thread Claudio Saavedra
And again:

Mon 2021-08-09 12:03:34 EEST 675300  1000  1000  11 present   /usr/bin/evolution



Bug#992058: opensysusers: uses `eval` on data that is not supposed to be safe to eval

2021-08-10 Thread Ansgar
Package: opensysusers
Version: 0.6-2
Severity: serious
Tags: security upstream
X-Debbugs-Cc: Debian Security Team 

opensysusers uses the shell's `eval` on everything in sysusers.d like
there is no tomorrow. These files can contain shell meta-characters
that should not result in code execution, e.g., in the GECOS field.

+---
| # mkdir /etc/sysusers.d
| # echo 'u test-user - "Do not $(rm /etc/bash.bashrc)" /var/lib/test-users 
/bin/sh' > /etc/sysusers.d/test.conf
| # ls -l /etc/bash.bashrc
| -rw-r--r-- 1 root root 1994 Jun 22 02:26 /etc/bash.bashrc
| # systemd-sysusers # this is opensysusers
| # ls -l /etc/bash*
| ls: cannot access '/etc/bash*': No such file or directory
+---[ opensysusers 0.6-2 ]

systemd's systemd-sysuser behaves differently:

+---
| # mkdir /etc/sysusers.d
| # echo 'u test-user - "Do not $(rm /etc/bash.bashrc)" /var/lib/test-users 
/bin/sh' > /etc/sysusers.d/test.conf
| # ls -l /etc/bash.bashrc
| -rw-r--r-- 1 root root 1994 Jun 22 02:26 /etc/bash.bashrc
| # systemd-sysusers
| Creating group systemd-coredump with gid 999.
| Creating user systemd-coredump (systemd Core Dumper) with uid 999 and gid 999.
| Creating group test-user with gid 998.
| Creating user test-user (Do not $(rm /etc/bash.bashrc)) with uid 998 and gid 
998.
| # ls -l /etc/bash.bashrc
| -rw-r--r-- 1 root root 1994 Jun 22 02:26 /etc/bash.bashrc
| # getent passwd test-user
| test-user:x:998:998:Do not $(rm /etc/bash.bashrc):/var/lib/test-users:/bin/sh
+---[ systemd 247.3-6 ]

As opensysusers is supposed to be a drop-in requirement for
systemd-sysusers it *must* behave as systemd does and not execute
data.

Ansgar



Bug#991136: fetch-crl: Install fails on update-rc.d

2021-08-10 Thread Mattias Ellert
Hi!

The SysV init script should not be used on a system that is running
systemd. It is there to be used on non-systemd Debian installations
only (kfreebsd, hurd). If you have enabled this on a systemd based
system, please disable it.

On systemd based systems the proper way is to use the fetch-crl systemd
timer unit. This is activated using:

systemctl enable fetch-crl.timer
systemctl start fetch-crl.timer

There is also a fetch-crl systemd service unit. This is only intended
to be run when the timer unit is triggered, and can not be enabled on
its own - the unit files does not have an install section by design.

The issue with missing certificates would better be addressed by
updating the igtf-policy packages (if you are using them).
Unfortunately, due to the freeze for the upcoming release, this package
is not up to date in Debian and still contains references to an old
discontinued CA that was removed from later upstream releases.

If the discontinued CA (INFN-CA-2015) causes issued for you, you can
reconfigure igtf-policy-classic to exclude it.

See /usr/share/doc/igtf-policy-classic/README.Debian

Let me know if this addresses your issues.

Mattias Ellert


tor 2021-07-15 klockan 13:22 +0200 skrev Carl-Fredrik Enell:
> Package: fetch-crl
> Version: 3.0.19-2
> Severity: important
> 
> Dear Maintainer,
> 
> 
>    * I tried to uninstall and reinstall fetch-crl because of error
>    * messages regarding a non-existing certificate.
> 
>    * Packet configuration fails on update-rc.d: No default runlevel.
>    This is expected on a systemd based release as far as I can
>    understand.
>    init-system-helpers is installed.
> 
>    * I would expect fetch-crl to run from cron or a systemd timer, not
>    * to install anything in rcN.d.
> 
> Best regards,
> Carl-Fredrik Enell
> 
> 
> -- System Information:
> Debian Release: 10.10
>   APT prefers stable
>   APT policy: (990, 'stable'), (500, 'stable-updates'), (500,
> 'proposed-updates')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 5.10.0-0.bpo.7-amd64 (SMP w/64 CPU cores)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
> LANGUAGE=en_US:en (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
> 
> Versions of packages fetch-crl depends on:
> ii  init-system-helpers  1.56+nmu1
> ii  libwww-perl  6.36-2
> ii  lsb-base 10.2019051400
> ii  openssl  1.1.1d-0+deb10u6
> ii  perl 5.28.1-6+deb10u1
> 
> fetch-crl recommends no packages.
> 
> fetch-crl suggests no packages.
> 
> -- no debconf information



smime.p7s
Description: S/MIME cryptographic signature


Bug#992038: systemd: regression with systemd-networkd + dropbear initramfs and kernel ip autoconfig(?)

2021-08-10 Thread Michael Biebl

Control: tags -1 + moreinfo

Am 09.08.21 um 19:12 schrieb Michael Biebl:

Am 09.08.21 um 18:03 schrieb Axel Scheepers:

Package: systemd
Version: 247.3-6
Severity: normal

Dear Maintainer,

    * What led up to the situation?

Testing bullseye rc-3 install on remote server.



    * What exactly did you do (or not do) that was effective (or
  ineffective)?

I used encrypted root and dropbear initramfs to remote unlock, also 
setup systemd-networkd for

both wireless and wired interfaces:


How exactly do you configure your network in the initramfs?
systemd-networkd does not ship any hooks for that.


Aside from that:
Could you also try with v249 from experimental if the problem is 
reproducible with this version.


If it's not fixed there, it would be best to take it upstream and file a 
bug report at https://github.com/systemd/systemd/issues


If it's fixed with v249, you could try git bisect to find the commit 
which fixes the issue. If it's not too invasive we might then consider 
backporting this for the first bullseye stable release.


Regards,
Michael



OpenPGP_signature
Description: OpenPGP digital signature


Bug#992056: htpdate: systemd service won't start because htpdate writes the wrong PID to the PID file

2021-08-10 Thread Lars Luthman
Package: htpdate
Version: 1.2.2-4
Severity: normal
X-Debbugs-Cc: deb-b...@larsluthman.net

The systemd service that comes with this package won't start because
htpdate writes the wrong PID to the PID file. The service is stuck
'activating' until it times out and kills the htpdate process.

When I run the following command:

  systemctl start htpdate

I get the following in the log:

  Aug 10 09:47:10 sirion systemd[1]: Starting HTTP based time synchronization 
tool...
  Aug 10 09:47:10 sirion htpdate[143803]: htpdate version 1.2.2 started
  Aug 10 09:47:10 sirion systemd[1]: htpdate.service: New main PID 12732 does 
not exist or is a zombie.
  Aug 10 09:48:40 sirion systemd[1]: htpdate.service: start operation timed 
out. Terminating.
  Aug 10 09:48:40 sirion systemd[1]: htpdate.service: Failed with result 
'timeout'.
  Aug 10 09:48:40 sirion systemd[1]: Failed to start HTTP based time 
synchronization tool.

To confirm that the wrong PID is written, I run the following commands
in another terminal after 'systemctl start htpdate' and before it
times out:

  $ cat /run/htpdate.pid 
  12732

  $ systemctl status htpdate
  ● htpdate.service - HTTP based time synchronization tool
   Loaded: loaded (/lib/systemd/system/htpdate.service; enabled; vendor 
preset: enabled)
   Active: activating (start) since Tue 2021-08-10 09:47:10 CEST; 29s ago
 Docs: man:htpdate
  Process: 143799 ExecStart=/usr/sbin/htpdate $HTP_OPTIONS $HTP_PROXY -i 
/run/htpdate.pid $HTP_SERVERS
Tasks: 1 (limit: 16609)
   Memory: 216.0K
  CPU: 21ms
   CGroup: /system.slice/htpdate.service
   └─143804 /usr/sbin/htpdate -D -s -i /run/htpdate.pid 
www.pool.ntp.org www.ntp.br www.wikipedia.org

  Aug 10 09:47:10 sirion systemd[1]: Starting HTTP based time synchronization 
tool...
  Aug 10 09:47:10 sirion htpdate[143803]: htpdate version 1.2.2 started
  Aug 10 09:47:10 sirion systemd[1]: htpdate.service: New main PID 12732 does 
not exist or is a zombie.

This shows that a htpdate process is running, but it has PID 143804
rather than 12732 as reported in the PID file. Once the activation
times out that process is killed and the PID file deleted.

I can work around this by editing the service file and changing

  Type=forking
  PIDFile=/run/htpdate.pid

to

  Type=oneshot
  RemainAfterExit=yes
  ExecStopPost=/usr/bin/rm -f /run/htpdate.pid

This tells systemd to not track the PID, but just assume that htpdate
is always running successfully until the service is stopped, and then
delete the PID file so that htpdate won't object when it's started
next time. This is obviously not ideal since any problems will be
unreported.


-- System Information:
Debian Release: 11.0
  APT prefers testing-security
  APT policy: (500, 'testing-security'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages htpdate depends on:
ii  init-system-helpers  1.60
ii  libc62.31-13
ii  lsb-base 11.1.0

htpdate recommends no packages.

htpdate suggests no packages.

-- no debconf information


Bug#991982: nano does not work with TERM unset

2021-08-10 Thread Benno Schulenberg

Op 09-08-2021 om 15:08 schreef Bastien Roucariès:
> nano work with TERM=dumb (but is strange but it work),

For me, 'TERM=dumb nano somefile' does not work, not on a console, not
on an xterm, not on Xfce Terminal -- it shows something, but is totally
unusable: the user cannot see what he or she is doing.  What terminal
are you using?

> so safer will be to 
> consider as best effort TERM="" , TERM not set, equivalent to dumb.

May I ask what the scenario is?  How can it happen that TERM is unset?
What disaster can leave TERM unset?  When the user starts a shell with
'env -i' and does not know how to get out?

I think it is okay when nano works around an unset TERM, simply because
nano /needs/ a terminal.  But if TERM is set to anything that is invalid
(even the empty string), then the user is responsible and they should get
what they asked for -- that is: a non-functioning nano.

Benno



OpenPGP_signature
Description: OpenPGP digital signature


Bug#992055: edk2: Better naming of package

2021-08-10 Thread Bastien Roucariès
Source: edk2
Severity: minor
Tags: patch

Dear Maintainer,

Please use consistant naming of your package and canonical arch name

I have made a proposal using version provides to achieve this, but may be it
should be a plain rename with version provides of the old name

https://salsa.debian.org/qemu-team/edk2/-/merge_requests/2



Bug#992053: c-ares: diff for NMU version 1.17.1-1.1

2021-08-10 Thread Salvatore Bonaccorso
Hi Gregor,

On Tue, Aug 10, 2021 at 09:38:07AM +0200, Gregor Jasny wrote:
> Hello,
> 
> Thank you for handling this issue so quickly. I'm travelling for the next
> week and won't be able to work on anything Debian related.
> 
> If you feel comfortable, you could also upload the fixed package without
> any delay.

Thanks for your quick response. For DSA 4954-1 I pushed both
buster-security (and the already operational bullseye-security
packages, in preparation of next weekends release), so yes could do
then as well the NMU for unstable directly!

Thanks for acknowleging it.

Regards,
Salvatore



Bug#992008: ruby-google-protobuf: Missing lib/google/protobuf directory and fails require

2021-08-10 Thread GCS
Control: tags -1 +pending

Hi Pirate,

On Mon, Aug 9, 2021 at 8:51 PM Pirate Praveen  wrote:
> Can you upload this change? Or if you are okay with this change, I can
> upload it as well. Once this is fixed, I can switch back to the
> packaged version (currently using gem install google-protobuf as work
> around).
 Sure, I can. Will do it soon.

> I had seen this bug earlier
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989774 but I thought
> it was something similar/related to
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966653 (between, this
> bug also seems to be fixed with newer protobuf/grpc versions in
> experimental).
 You know, my question is, how and why it was and still working for
3.12.4 but nor for 3.17.3?

Regards,
Laszlo/GCS



Bug#992054: unblock: fetchmail/6.4.16-5

2021-08-10 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi RMs,

I would like to ask for unblocking fetchmail, fixing a regression in
its last security fix. This is a one liner, moving down an 'endif'.

[ Reason ]
partial_message_size_used was double incremented and messages got
truncated (the size limit reached much sooner).

[ Impact ]
Normal logging in all cases.

[ Tests ]
Local tests. Built on all architectures, piuparts are OK. But
autopkgtests are still running for arm64 and are already OK for all
other architectures.

[ Risks ]
None.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock fetchmail/6.4.16-5

Thanks for consideration,
Laszlo/GCS
diff -Nru fetchmail-6.4.16/debian/changelog fetchmail-6.4.16/debian/changelog
--- fetchmail-6.4.16/debian/changelog	2021-07-29 00:18:56.0 +0200
+++ fetchmail-6.4.16/debian/changelog	2021-08-09 20:06:48.0 +0200
@@ -1,3 +1,10 @@
+fetchmail (6.4.16-5) unstable; urgency=medium
+
+  * Backport upstream regression fix for 6.4.20's security (CVE-2021-36386)
+fix.
+
+ -- Laszlo Boszormenyi (GCS)   Mon, 09 Aug 2021 20:06:48 +0200
+
 fetchmail (6.4.16-4) unstable; urgency=high
 
   * Backport upstream security fix for CVE-2021-36386: denial of service or
diff -Nru fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch
--- fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch	1970-01-01 01:00:00.0 +0100
+++ fetchmail-6.4.16/debian/patches/12_fix_logfile_and_message_truncation_issue.patch	2021-08-09 20:06:48.0 +0200
@@ -0,0 +1,76 @@
+From d3db2da1d13bd2419370ad96defb92eecb17064c Mon Sep 17 00:00:00 2001
+From: Matthias Andree 
+Date: Mon, 9 Aug 2021 17:42:29 +0200
+Subject: [PATCH] Fix --logfile and message truncation issue.
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Regression in 6.4.20's security fix (Git commit c546c829).
+
+We doubly incremented partial_message_size_used on modern systems
+(stdard.h/vsnprintf), once in report_vbuild() and then again in
+report_build(), so the 2nd and subsequent report_build() fragments
+landed too late in the buffer.  This will not cause overruns due to the
+reallocation prior to the vsnprintf/sprintf, but it write starts behind
+the '\0' byte, instead of right over it, so the string also gets
+truncated to the first fragment written with report_vbuild().
+
+Fix by moving the increment back into the #else...#endif part that does
+not use report_vbuild().
+
+Reported by: Jürgen Edner, Erik Christiansen
+---
+ NEWS | 18 ++
+ report.c |  3 ++-
+ 2 files changed, 20 insertions(+), 1 deletion(-)
+
+diff --git a/NEWS b/NEWS
+index 0cd3f968..b98f15d2 100644
+--- a/NEWS
 b/NEWS
+@@ -64,6 +64,24 @@ removed from a 6.5.0 or newer release.)
+   for end-of-life OpenSSL versions may be removed even from patchlevel releases.
+ 
+ 
++fetchmail-6.4.21 (released 2021-08-09, 30042 LoC):
++
++# REGRESSION FIX:
++* The new security fix in 6.4.20 for CVE-2021-36386 caused truncation of
++  messages logged to buffered outputs, predominantly --logfile.
++
++  This also caused lines in the logfile to run into one another because
++  the fragment containing the '\n' line-end character was usually lost.
++
++  Reason is that on all modern systems (with  header and vsnprintf()
++  interface), the length of log message fragments was added up twice, so
++  that these ended too deep into a freshly allocated buffer, after the '\0'
++  byte.  Unbuffered outputs flushed the fragments right away, which masked the
++  bug.
++
++  Reported by: Jürgen Edner, Erik Christiansen.
++
++
+ fetchmail-6.4.20 (not yet released):
+ 
+ # SECURITY FIX:
+diff --git a/report.c b/report.c
+index aea6b3ea..2db7d0a9 100644
+--- a/report.c
 b/report.c
+@@ -286,10 +286,11 @@ report_build (FILE *errfp, message, va_alist)
+ n = snprintf (partial_message + partial_message_size_used,
+ 		partial_message_size - partial_message_size_used,
+ 		message, a1, a2, a3, a4, a5, a6, a7, a8);
+-#endif
+ 
+ if (n > 0) partial_message_size_used += n;
+ 
++#endif
++
+ if (unbuffered && partial_message_size_used != 0)
+ {
+ 	partial_message_size_used = 0;
+-- 
+GitLab
+
diff -Nru fetchmail-6.4.16/debian/patches/series fetchmail-6.4.16/debian/patches/series
--- fetchmail-6.4.16/debian/patches/series	2021-07-29 00:18:56.0 +0200
+++ fetchmail-6.4.16/debian/patches/series	2021-08-09 20:06:48.0 +0200
@@ -5,3 +5,4 @@
 09_fix_memory_leak_in_timeout_situation.patch
 10_update_manpage.patch
 

Bug#992053: c-ares: diff for NMU version 1.17.1-1.1

2021-08-10 Thread Salvatore Bonaccorso
Control: tags 992053 + patch
Control: tags 992053 + pending


Dear maintainer,

I've prepared an NMU for c-ares (versioned as 1.17.1-1.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
diff -Nru c-ares-1.17.1/debian/changelog c-ares-1.17.1/debian/changelog
--- c-ares-1.17.1/debian/changelog	2020-11-19 18:57:27.0 +0100
+++ c-ares-1.17.1/debian/changelog	2021-08-07 11:43:50.0 +0200
@@ -1,3 +1,13 @@
+c-ares (1.17.1-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Missing input validation on hostnames returned by DNS servers
+(CVE-2021-3672) (Closes: #992053)
+- ares_expand_name() should escape more characters
+- ares_expand_name(): fix formatting and handling of root name response
+
+ -- Salvatore Bonaccorso   Sat, 07 Aug 2021 11:43:50 +0200
+
 c-ares (1.17.1-1) unstable; urgency=medium
 
   * Imported Upstream version 1.17.1 (fixes CVE-2020-8277)
diff -Nru c-ares-1.17.1/debian/patches/ares_expand_name-fix-formatting-and-handling-of-root.patch c-ares-1.17.1/debian/patches/ares_expand_name-fix-formatting-and-handling-of-root.patch
--- c-ares-1.17.1/debian/patches/ares_expand_name-fix-formatting-and-handling-of-root.patch	1970-01-01 01:00:00.0 +0100
+++ c-ares-1.17.1/debian/patches/ares_expand_name-fix-formatting-and-handling-of-root.patch	2021-08-07 11:43:50.0 +0200
@@ -0,0 +1,112 @@
+From: bradh352 
+Date: Fri, 11 Jun 2021 12:39:24 -0400
+Subject: [2/2] ares_expand_name(): fix formatting and handling of root name
+ response
+Origin: https://github.com/c-ares/c-ares/commit/44c009b8e62ea1929de68e3f438181bea469ec14
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2021-3672
+
+Fixes issue introduced in prior commit with formatting and handling
+of parsing a root name response which should not be escaped.
+
+Fix By: Brad House
+---
+ src/lib/ares_expand_name.c | 62 --
+ 1 file changed, 40 insertions(+), 22 deletions(-)
+
+diff --git a/src/lib/ares_expand_name.c b/src/lib/ares_expand_name.c
+index f1c874a97cfc..eb9268c1ff0a 100644
+--- a/src/lib/ares_expand_name.c
 b/src/lib/ares_expand_name.c
+@@ -127,27 +127,37 @@ int ares_expand_name(const unsigned char *encoded, const unsigned char *abuf,
+ }
+   else
+ {
+-  len = *p;
++  int name_len = *p;
++  len = name_len;
+   p++;
++
+   while (len--)
+ {
+-  if (!isprint(*p)) {
+-/* Output as \DDD for consistency with RFC1035 5.1 */
+-*q++ = '\\';
+-*q++ = '0' + *p / 100;
+-*q++ = '0' + (*p % 100) / 10;
+-*q++ = '0' + (*p % 10);
+-  } else if (is_reservedch(*p)) {
+-*q++ = '\\';
+-*q++ = *p;
+-  } else {
+-*q++ = *p;
+-  }
++  /* Output as \DDD for consistency with RFC1035 5.1, except
++   * for the special case of a root name response  */
++  if (!isprint(*p) && !(name_len == 1 && *p == 0))
++{
++
++  *q++ = '\\';
++  *q++ = '0' + *p / 100;
++  *q++ = '0' + (*p % 100) / 10;
++  *q++ = '0' + (*p % 10);
++}
++  else if (is_reservedch(*p))
++{
++  *q++ = '\\';
++  *q++ = *p;
++}
++  else
++{
++  *q++ = *p;
++}
+   p++;
+ }
+   *q++ = '.';
+ }
+-}
++ }
++
+   if (!indir)
+ *enclen = aresx_uztosl(p + 1U - encoded);
+ 
+@@ -194,21 +204,29 @@ static int name_length(const unsigned char *encoded, const unsigned char *abuf,
+ }
+   else if (top == 0x00)
+ {
+-  offset = *encoded;
++  int name_len = *encoded;
++  offset = name_len;
+   if (encoded + offset + 1 >= abuf + alen)
+ return -1;
+   encoded++;
++
+   while (offset--)
+ {
+-  if (!isprint(*encoded)) {
+-n += 4;
+-  } else if (is_reservedch(*encoded)) {
+-n += 2;
+-  } else {
+-n += 1;
+-  }
++  if (!isprint(*encoded) && !(name_len == 1 && *encoded == 0))
++{
++  n += 4;
++}
++  else if (is_reservedch(*encoded))
++{
++  n += 2;
++}
++  else
++{
++  n += 1;
++}
+   encoded++;
+ }
++
+   n++;
+ }
+   else
+-- 
+2.32.0
+
diff -Nru c-ares-1.17.1/debian/patches/ares_expand_name-should-escape-more-characters.patch 

Bug#992053: c-ares: CVE-2021-3672: Missing input validation on hostnames returned by DNS servers

2021-08-10 Thread Salvatore Bonaccorso
Source: c-ares
Version: 1.17.1-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 1.14.0-1
Control: fixed -1 1.14.0-1+deb10u1
Control: fixed -1 1.17.1-1+deb11u1

Hi,

The following vulnerability was published for c-ares.

CVE-2021-3672[0]:
| Missing input validation on hostnames returned by DNS servers

Respective bullseye-security and buster-security updates are preapred
and as well a NMU for unstable. Will attach the debdiff shortly.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-3672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672
[1] https://c-ares.haxx.se/adv_20210810.html
[2] 
https://github.com/c-ares/c-ares/commit/362f91d807d293791008cdb7616d40f7784ece83
[3] 
https://github.com/c-ares/c-ares/commit/44c009b8e62ea1929de68e3f438181bea469ec14

Regards,
Salvatore



Bug#992052: cd-hit: autopkgtest fails on very powerful CI workers

2021-08-10 Thread Paul Gevers
Source: cd-hit
Version: 4.8.1-3
Severity: serious
X-Debbugs-CC: debian...@lists.debian.org
Tags: sid bookworm
User: debian...@lists.debian.org
Control: affects -1 src:perl

Dear maintainer(s),

With a recent upload of perl the autopkgtest of cd-hit fails in testing
on armhf when that autopkgtest is run with the binary packages of perl
from unstable. Unlike usually, this is not a *regression* from the
package point of view, but the result of a change of the workers showing
that the current defaults in the test are too low for some of our workers.

I copied some of the output at the bottom of this report. It's ironical
that cd-hit complains about not enough memory when the worker this test
runs on has the biggest amount of memory we have in the ci.d.n worker
park: 250GB. If I read the output correctly, you assign the amount of
memory cd-hit is allowed to use and the required amount of memory also
depends on the amount of cores. This machine has 160 cores. I wonder if
the value for -M needs to be calculated instead of hard coded or that
you should limit the maximum amount of cores used or... But I leave it
up to you to find the appropriate solution.

Paul

https://ci.debian.net/data/autopkgtest/testing/amd64/c/cd-hit/14380008/log.gz

autopkgtest [03:24:50]: test run-unit-test: [---
 CD_HIT 

Program: CD-HIT, V4.8.1 (+OpenMP), Nov 21 2020, 19:27:41
Command: cd-hit -i example.fa -o out -c 1.00 -n 5 -M 1000 -T 0

Started: Tue Aug 10 03:24:50 2021

Output

total number of CPUs in the system is 160
Actual number of CPUs to be used: 160

total seq: 4
longest and shortest : 1132 and 149
Total letters: 2136
Sequences have been sorted

Approximated minimal memory consumption:
Sequence: 0M
Buffer  : 160 X 10M = 1715M
Table   : 2 X 49M = 98M
Miscellaneous   : 0M
Total   : 1813M


Fatal Error:
not enough memory, please set -M option greater than 1913

Program halted !!

autopkgtest [03:24:51]: test run-unit-test: ---]



OpenPGP_signature
Description: OpenPGP digital signature