Bug#982944: rename.ul was arbitrarily removed from util-linux citing non-existent polic
Meanwhile, I have asked the technical committee for a revision of the removal of rename.ul from the util-linux package in Debian bug report #1003653 (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003653). Dirk.
Bug#1004292: debian-installer:s390x: installer fails to format dasd disc on s390x systems
Source: debian-installer Version: 20210731+deb11u2 Severity: important Tags: d-i s390-dasd upstream X-Debbugs-Cc: dipak.zo...@ibm.com On s390x machines with dasd disc, the installer fails to format the dasd disc. Logs: Jan 24 12:25:13 main-menu[341]: INFO: Menu item 's390-dasd' selected Jan 24 12:25:19 s390-dasd[3224]: dasdfmt: Jan 24 12:25:19 main-menu[341]: WARNING **: Configuring 's390-dasd' failed with error code 1 Jan 24 12:25:19 main-menu[341]: WARNING **: Menu item 's390-dasd' failed. Root cause: The s390-dasd package calls dasdfmt with '-f' option which is obselete long ago. Proposed Fix: s390-dasd / dasd-config.c: line 393: Existing line: snprintf (buf, sizeof (buf), "dasdfmt -l LX%04x -b 4096 -m 1 -f %s -y", channel_device (channel_current->name), dev); Proposed line: snprintf (buf, sizeof (buf), "dasdfmt -l LX%04x -b 4096 -m 1 %s -y", channel_device (channel_current->name), dev); This fix is verified. Logs for reference after changes (with additional debug statement): Jan 23 05:21:16 main-menu[347]: INFO: Menu item 'clock-setup' selected Jan 23 05:21:16 main-menu[347]: INFO: Menu item 's390-dasd' selected Jan 23 05:21:16 main-menu[347]: INFO: Falling back to the package description for dasd-modules-5.10.0-10-s390x-di Jan 23 05:21:16 main-menu[347]: INFO: Falling back to the package description for dasd-modules-5.10.0-10-s390x-di Jan 23 05:21:21 kernel: [ 302.451325] dasd-eckd 0.0.2c7c: A channel path to the device has become operational Jan 23 05:21:21 kernel: [ 302.461801] dasd-eckd 0.0.2c7c: New DASD 3390/0C (CU 3990/01) with 30051 cylinders, 15 heads, 224 sectors Jan 23 05:21:21 kernel: [ 302.485675] dasd-eckd 0.0.2c7c: DASD with 4 KB/block, 21636720 KB total size, 48 KB/track, compatible disk layout Jan 23 05:21:21 kernel: [ 302.486712] dasda:VOL1/ LX2C7C: Jan 23 05:21:24 s390-dasd[3591]: INFO: DZDEBUG:01 executing: dasdfmt -l LX2c7c -b 4096 -m 1 /dev/disk/by-path/ccw-0.0.2c7c -y Jan 23 05:21:24 s390-dasd[3591]: Printing hashmark every 10 cylinders. Jan 23 05:23:45 kernel: [ 446.669429] dasd-eckd 0.0.2c7c: DASD with 4 KB/block, 21636720 KB total size, 48 KB/track, compatible disk layout Jan 23 05:23:45 kernel: [ 446.669445] dasda: detected capacity change from 0 to 22156001280 Jan 23 05:23:45 kernel: [ 446.669876] dasda: Jan 23 05:23:45 kernel: [ 446.673221] dasda:VOL1/ LX2C7C: Jan 23 05:23:45 s390-dasd[3591]: Jan 23 05:23:45 s390-dasd[3591]: Finished formatting the device. Jan 23 05:23:45 s390-dasd[3591]: Rereading the partition table... ok Jan 23 05:23:45 kernel: [ 446.675799] dasda:VOL1/ LX2C7C: Jan 23 05:24:21 main-menu[347]: INFO: Menu item 's390-zfcp' selected -- System Information: Debian Release: bookworm/sid APT prefers testing APT policy: (500, 'testing') Architecture: s390x
Bug#1004291: ITP: php-dapphp-radius -- pure PHP RADIUS client based on the SysCo/al implementation
Package: wnpp Severity: wishlist Owner: Thomas Goirand X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: php-dapphp-radius Version : 2.5.6 Upstream Author : Drew Phillips * URL : https://github.com/dapphp/radius/ * License : LGPL-3 Programming Lang: PHP Description : pure PHP RADIUS client based on the SysCo/al implementation Dapphp\Radius is a pure PHP RADIUS client for authenticating users against a RADIUS server in PHP. It currently supports basic RADIUS auth using PAP, CHAP (MD5), MSCHAP v1, and EAP-MSCHAP v2. The current 2.5.x branch is tested to work with Microsoft Windows Server 2012 to 2019 Network Policy Server and FreeRADIUS 2 and above. . PAP authentication has been tested on: * Microsoft Radius server IAS * Mideye RADIUS Server * Radl * RSA SecurID * VASCO Middleware 3.0 server * WinRadius * ZyXEL ZyWALL OTP . The PHP openssl extension is required if using MSCHAP v1 or v2. For older PHP versions that have mcrypt without openssl support, then mcrypt is used. Note: This package is to replace the gap left with php-radius removal. I intend to use that in OCI (OpenStack cluster installer) if php-radius PECL extension is not available, which hopefully makes it possible to keep Radius auth in OCI.
Bug#1004290: ca-certificates: GeoTrust RSA CA 2018 intermediate certificate is missing in package
Package: ca-certificates Version: 20210119 Severity: important X-Debbugs-Cc: dmitr...@gmail.com According to Mozilla's list of included intermediate certificates https://ccadb-public.secure.force.com/mozilla/PublicAllIntermediateCerts GeoTrust RSA CA 2018 should be present in certificate store, but it is absent in ca-certificates package resulting curl to fail on many sites which are using GeoTrust certificates. -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates-debug'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-11-amd64 (SMP w/4 CPU threads) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages ca-certificates depends on: ii debconf [debconf-2.0] 1.5.77 ii openssl1.1.1k-1+deb11u1 ca-certificates recommends no packages. ca-certificates suggests no packages. -- debconf information: ca-certificates/new_crts: ca-certificates/enable_crts: mozilla/ACCVRAIZ1.crt, mozilla/AC_RAIZ_FNMT-RCM.crt, mozilla/Actalis_Authentication_Root_CA.crt, mozilla/AffirmTrust_Commercial.crt, mozilla/AffirmTrust_Networking.crt, mozilla/AffirmTrust_Premium.crt, mozilla/AffirmTrust_Premium_ECC.crt, mozilla/Amazon_Root_CA_1.crt, mozilla/Amazon_Root_CA_2.crt, mozilla/Amazon_Root_CA_3.crt, mozilla/Amazon_Root_CA_4.crt, mozilla/Atos_TrustedRoot_2011.crt, mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt, mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Buypass_Class_2_Root_CA.crt, mozilla/Buypass_Class_3_Root_CA.crt, mozilla/CA_Disig_Root_R2.crt, mozilla/Certigna.crt, mozilla/Certigna_Root_CA.crt, mozilla/certSIGN_ROOT_CA.crt, mozilla/certSIGN_Root_CA_G2.crt, mozilla/Certum_Trusted_Network_CA_2.crt, mozilla/Certum_Trusted_Network_CA.crt, mozilla/CFCA_EV_ROOT.crt, mozilla/Chambers_of_Commerce_Root_-_2008.crt, mozilla/Comodo_AAA_Services_root.crt, mozilla/COMODO_Certification_Authority.crt, mozilla/COMODO_ECC_Certification_Authority.crt, mozilla/COMODO_RSA_Certification_Authority.crt, mozilla/Cybertrust_Global_Root.crt, mozilla/DigiCert_Assured_ID_Root_CA.crt, mozilla/DigiCert_Assured_ID_Root_G2.crt, mozilla/DigiCert_Assured_ID_Root_G3.crt, mozilla/DigiCert_Global_Root_CA.crt, mozilla/DigiCert_Global_Root_G2.crt, mozilla/DigiCert_Global_Root_G3.crt, mozilla/DigiCert_High_Assurance_EV_Root_CA.crt, mozilla/DigiCert_Trusted_Root_G4.crt, mozilla/DST_Root_CA_X3.crt, mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt, mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt, mozilla/EC-ACC.crt, mozilla/emSign_ECC_Root_CA_-_C3.crt, mozilla/emSign_ECC_Root_CA_-_G3.crt, mozilla/emSign_Root_CA_-_C1.crt, mozilla/emSign_Root_CA_-_G1.crt, mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, mozilla/Entrust_Root_Certification_Authority.crt, mozilla/Entrust_Root_Certification_Authority_-_EC1.crt, mozilla/Entrust_Root_Certification_Authority_-_G2.crt, mozilla/Entrust_Root_Certification_Authority_-_G4.crt, mozilla/ePKI_Root_Certification_Authority.crt, mozilla/e-Szigno_Root_CA_2017.crt, mozilla/E-Tugra_Certification_Authority.crt, mozilla/GDCA_TrustAUTH_R5_ROOT.crt, mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt, mozilla/Global_Chambersign_Root_-_2008.crt, mozilla/GlobalSign_ECC_Root_CA_-_R4.crt, mozilla/GlobalSign_ECC_Root_CA_-_R5.crt, mozilla/GlobalSign_Root_CA.crt, mozilla/GlobalSign_Root_CA_-_R2.crt, mozilla/GlobalSign_Root_CA_-_R3.crt, mozilla/GlobalSign_Root_CA_-_R6.crt, mozilla/Go_Daddy_Class_2_CA.crt, mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt, mozilla/GTS_Root_R1.crt, mozilla/GTS_Root_R2.crt, mozilla/GTS_Root_R3.crt, mozilla/GTS_Root_R4.crt, mozilla/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.crt, mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt, mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt, mozilla/Hongkong_Post_Root_CA_1.crt, mozilla/Hongkong_Post_Root_CA_3.crt, mozilla/IdenTrust_Commercial_Root_CA_1.crt, mozilla/IdenTrust_Public_Sector_Root_CA_1.crt, mozilla/ISRG_Root_X1.crt, mozilla/Izenpe.com.crt, mozilla/Microsec_e-Szigno_Root_CA_2009.crt, mozilla/Microsoft_ECC_Root_Certificate_Authority_2017.crt, mozilla/Microsoft_RSA_Root_Certificate_Authority_2017.crt, mozilla/NAVER_Global_Root_Certification_Authority.crt, mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt, mozilla/Network_Solutions_Certificate_Authority.crt, mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt, mozilla/OISTE_WISeKey_Global_Root_GC_CA.crt, mozilla/QuoVadis_Root_CA_1_G3.crt, mozilla/QuoVadis_Root_CA_2.crt, mozilla/QuoVadis_Root_CA_2_G3.crt, mozilla/QuoVadis_Root_CA_3.crt, mozilla/QuoVadis_Root_CA_3_G3.crt,
Bug#999824: ima-evm-utils: missing evm portable signature verification in tooling
Control: retitle -1 ima-evm-utils: FTBFS because of the signature verification unit tests Control: severity -1 serious On Wed, 17 Nov 2021 10:35:05 +0100 Steffen Kothe wrote: EVM signatures can be created with the option '--portable | -o ' to get rid of a hashing of i_version and fsuuid. When files should be verified after a signing with '--portable' on the host, the tooling returns with "Verification failed" unless the signing itself is correct. The cause for this issue is a missing implementation for the probing and verification of portable signatures. A patch for this issue is already available in the official git source of the ima-evm-utils tooling: https://git.code.sf.net/p/linux-ima/ima-evm-utils f4b901d081ec ("Add support for verifying portable EVM signatures") The wrong checking of the signature format results in a false-positive error. Note, that this bug also affects version 1.3.2-2.1 provided by Debian/SID https://packages.debian.org/sid/ima-evm-utils. The official release 1.4 of the ima-evm-utils contains this fixes. Version 1.4 was imported but still fails to build from scratch on buildd because the unit tests for that new feature do not run without gnutls-bin and softhsm2 installed as build dependencies. I did not catch that building my NMU in a clean sid chroot. I do not know why, it still builds in that chroot and claims two of the three test to succeed with those packages uninstalled.
Bug#1001625: python3-script-but-no-python3-dep unoverridable
Hi, On Mon, Jan 24, 2022 at 4:03 AM Marc Haber wrote: > > Starting which lintian version are Deb822 overrides allowed? The Deb822 override format has not been released. It will be very soon, however. The implementation of file pointers—which appear inside square brackets on terminals and as live links on our website—has made the old override format cumbersome for many users. > Does all > Debian infrastructure run appropriately recent versions of lintian so > that a package can safely migrate to Deb822 overrides? I cannot speak for users of Lintian, but they are generally provided with timely backports. Kind regards Felix Lechner
Bug#1004289: libpod package stops buld at override_dh_auto_build
Source: libpod Version: 3.4.4=ds1 Severity: important X-Debbugs-Cc: hostmast...@hostsharing.net Dear Maintainers, I tried to backport libpod in bullseye. The build-dep's are installed in two steps: apt build-dep libpod && apt build-dep -t unstable libpod. The build stops at: dh_auto_build: error: cd _output && go install -trimpath -v -p 20 -tags apparmor,ostree,seccomp,selinux,systemd -ldflags "-X main.buildInfo=3.4.4+ds1-1" github.com make[1]: *** [debian/rules:29: override_dh_auto_build] Error 25 make[1]: Leaving directory '/source/podman/libpod-3.4.4+ds1' make: *** [debian/rules:25: build] Error 2 dpkg-buildpackage: error: debian/rules build subprocess returned exit status 2 debuild: fatal error at line 1182: dpkg-buildpackage -us -uc -ui failed The very same error is triggered by building version 3.0.1+dfsg1. Did that in a bullseye environment and in a pbuilder chroot. Thanks Elimar -- System Information: Debian Release: 11.2 APT prefers stable APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'stable-security'), (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 5.15.0-0.bpo.2-amd64 (SMP w/20 CPU threads) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
Bug#1004180: [External] : Bug#1004180: mysql-8.0: should mysql-8.0 be removed from unstable?
Hi Lars, On Mon, Jan 24, 2022 at 11:00:16AM +0100, Lars Tangvald wrote: > Hi, > > This is on me. I've been working on getting updates ready, but let myself > get bogged down with more long-running updates to the packaging (which is > pretty outdated with regards to things like the standards version). > > I'd like to make a better effort to keep it up-to-date (just focusing on > keeping MySQL itself updated for now, I think). Alright, thank you! In this case please feel free to close this bugreport. Regards, Salvatore
Bug#1004180: [External] : Bug#1004180: mysql-8.0: should mysql-8.0 be removed from unstable?
Hi, This is on me. I've been working on getting updates ready, but let myself get bogged down with more long-running updates to the packaging (which is pretty outdated with regards to things like the standards version). I'd like to make a better effort to keep it up-to-date (just focusing on keeping MySQL itself updated for now, I think). -- Lars On 22/01/2022 10:53, Salvatore Bonaccorso wrote: Source: mysql-8.0 Version: 8.0.23-3 Severity: normal X-Debbugs-Cc: car...@debian.org, t...@security.debian.org,locutusofb...@debian.org, lars.tangv...@oracle.com Hi While mysql-8.0 itself won't enter testing, the version in unstable is as well only from february 2021, lacking behind several updates for fixes in the Oracle CPUs. Should mysql-8.0 be removed as well from unstable? Regards, Salvatore
Bug#1004288: iotjs: CVE-2021-46349 CVE-2021-46348 CVE-2021-46346 CVE-2021-46340 CVE-2021-46338
Source: iotjs Version: 1.0+715-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for iotjs. CVE-2021-46349[0]: | There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == | ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma- | objects.c in JerryScript 3.0.0. CVE-2021-46348[1]: | There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' | failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript | 3.0.0. CVE-2021-46346[2]: | There is an Assertion 'local_tza == | ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry- | core/ecma/builtin-objects/ecma-builtin-date- | prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in | JerryScript 3.0.0. CVE-2021-46340[3]: | There is an Assertion 'context_p-stack_top_uint8 == | SCAN_STACK_TRY_STATEMENT || context_p-stack_top_uint8 == | SCAN_STACK_CATCH_STATEMENT' failed at /parser/js/js- | scanner.c(scanner_scan_statement_end) in JerryScript 3.0.0. CVE-2021-46338[4]: | There is an Assertion 'ecma_is_lexical_environment (object_p)' failed | at /base/ecma-helpers.c(ecma_get_lex_env_type) in JerryScript 3.0.0. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-46349 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46349 [1] https://security-tracker.debian.org/tracker/CVE-2021-46348 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46348 [2] https://security-tracker.debian.org/tracker/CVE-2021-46346 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46346 [3] https://security-tracker.debian.org/tracker/CVE-2021-46340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46340 [4] https://security-tracker.debian.org/tracker/CVE-2021-46338 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46338 Please adjust the affected versions in the BTS as needed. -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.15.0-2-amd64 (SMP w/16 CPU threads) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
Bug#904572: move x11-utils to Suggests
On Mon, Jan 24, 2022 at 10:06:46AM +0100, Harald Dunkel wrote: > Maybe the Recommends could be replaced by a Suggests: x11-utils. > By now I didn't even know that there is a tool "luit". It's used (when available and if the locale encoding is not UTF-8) by xterm for quite a while. But it doesn't use the X display (unlike the other programs in x11-utils). Moving it to a separate package would only affect xterm and a (probably) small number of direct command-line users. Changing the "recommends" to a "suggests" would have an impact on xterm, since some users would not see luit automatically. As I understand it, the best route would be to get luit available separately and then change the xterm package to recommend luit rather than x11-utils. By the way - the existing version of luit uses libfontenc, which _is_ used by several applications. Take a look at apt-rdepends --reverse libfontenc1 However, in my upgrade, I dispensed with that dependency, so the resulting luit depends only on glibc and libz. That makes it easily portable - unlike most of x11-utils :-) So... decoupling luit (and libfontenc1) from x11-utils will improve the dependencies of both xterm and x11-utils. -- Thomas E. Dickey https://invisible-island.net ftp://ftp.invisible-island.net signature.asc Description: PGP signature
Bug#996980: [Pkg-opencl-devel] Bug#996980: khronos-opencl-clhpp: build-dependency loop between khronos-opencl-clhpp, khronos-opencl-headers, ocl-icd
On 21/10/2021 22.42, Steve Langasek wrote: I have applied the attached patch in Ubuntu to break the bootstrap loop. While I could drop the patch once the bootstrap is finished, I think this, combined with adding the examples as an autopkgtest (which I have not implemented here - sorry) would be an overall improvement in robustness, so I'm submitting this bug for consideration. I've implemented support for the build profile, I hope that solves the dependency loop for bootstrapping. The components missing for running the upstream testsuite (and not only compiling the trivial examples and out own header compile test) are there, too, so we run them at build time and as autopkgtest. If I've missed something, i.e. there is still a bootstrap dependency loop, please let me know. Andreas
Bug#997415: build depends on tex-gyre
Control: tags -1 + patch Hello, This issue should be fixed by build-depending on tex-gyre which provides the missing tgtermes.sty. I have successfully built gprbuild-2021.0.0.0778b109 in clean chroot with tex-gyre additionally installed. Andrius
Bug#1002726: webext-quicktext: Please upgrade to 4.1
Package: webext-quicktext Followup-For: Bug #1002726 X-Debbugs-Cc: alua...@udc.es Dear Maintainer, This is not a "wishlist", the package is genuinely broken and doesn't work with current thunderbird from debian. If help is needed, I can maintain it. Otherwise it's best to keep it out of the archive.
Bug#1004285: davical: problems after upgrade to php 8, calendar clients reports "500"
Some additional information. On 24/01/2022 11:58, Benno Overeinder wrote: * What exactly did you do (or not do) that was effective (or ineffective)? I have looked at the apache2 log files and checked the /etc/php and /etc/davical directories if there were any references to php7 instead of php/php8. The apache2 log file reported [Mon Jan 24 11:29:29.678647 2022] [php:notice] [pid 684] [client /IPv6 address/] davical: LOG: response:-->DAViCal Fatal Error The macOS Calendar application warned with the error message: “500” to operation CalDAVAccountRefreshQueueableOperation
Bug#1004213: uscan: multiple mode=git source reuses same tmpdir and fails
Control: tag -1 +patch Quoting Jonas Smedegaard (2022-01-22 21:27:37) > I want the package asterisk to embed 2 sources both from git without any > tags, and added these: > > opts=\ > component=Xamr,\ > mode=git,pgpmode=none,pretty=4.0.%cd,\ > dversionmangle=auto \ > https://github.com/traud/asterisk-amr \ > HEAD checksum > > opts=\ > component=Xcodec2,\ > mode=git,pgpmode=none,pretty=0.0.%cd,\ > dversionmangle=auto \ > https://github.com/traud/asterisk-codec2 \ > HEAD checksum > > But that fails like this: > > fatal: destination path '../asterisk-temporary.2927923.git' already exists > and is not an empty directory. This patch fixes this issue for me: --- /usr/share/perl5/Devscripts/Uscan/Downloader.pm.orig2022-01-16 10:45:20.0 +0100 +++ /usr/share/perl5/Devscripts/Uscan/Downloader.pm 2022-01-24 12:19:01.720442693 +0100 @@ -87,7 +87,7 @@ default => sub { {} }); sub download () { -my ($self, $url, $fname, $optref, $base, $pkg_dir, $pkg, $mode) = @_; +my ($self, $url, $fname, $optref, $base, $pkg_dir, $pkg, $mode, $gitrepo_dir) = @_; my ($request, $response); $mode ||= $optref->mode; if ($mode eq 'http') { @@ -145,8 +145,7 @@ my $abs_dst = abs_path($dst); my $ver = $2; my $suffix = $3; -my $gitrepo_dir - = "$pkg-temporary.$$.git";# same as outside of downloader + my ($gitrepo, $gitref) = split /[[:space:]]+/, $url, 2; my $clean = sub { uscan_exec_no_fail('rm', '-fr', $gitrepo_dir); --- /usr/share/perl5/Devscripts/Uscan/WatchLine.pm.orig 2022-01-11 14:35:47.0 +0100 +++ /usr/share/perl5/Devscripts/Uscan/WatchLine.pm 2022-01-24 11:51:45.331351053 +0100 @@ -193,8 +193,10 @@ has gitrepo_dir => (# Working repository used only within uscan. is => 'ro', lazy=> 1, -default => sub { -$_[0]->{pkg} . "-temporary.$$.git"; +builder => sub { +$_[0]->{component} +? $_[0]->{pkg} . "-temporary.$$." . $_[0]->{component} . '.git' +: $_[0]->{pkg} . "-temporary.$$.git"; }); has headers => ( is => 'ro', @@ -1277,6 +1279,7 @@ $self->pkg_dir, $self->pkg, $self->mode, +$self->gitrepo_dir, ); if ($download_available) { dehs_verbose - Jonas -- * Jonas Smedegaard - idealist & Internet-arkitekt * Tlf.: +45 40843136 Website: http://dr.jones.dk/ [x] quote me freely [ ] ask before reusing [ ] keep private signature.asc Description: signature
Bug#1003947: New crash with stack trace
Maybe it will usefull 1642916816.083939 jupiter kernel: BUG: unable to handle page fault for address: a1dbd4d8 1642916816.101311 jupiter kernel: #PF: supervisor write access in kernel mode 1642916816.105396 jupiter kernel: #PF: error_code(0x0003) - permissions violation 1642916816.109831 jupiter kernel: PGD 21d40e067 P4D 21d40e067 PUD 21d40f063 PMD 80021ce000e1 1642916816.113732 jupiter kernel: Oops: 0003 [#1] SMP PTI 1642916816.113889 jupiter kernel: CPU: 4 PID: 988 Comm: pulseaudio Not tainted 5.10.0-11-amd64 #1 Debian 5.10.92-1 1642916816.113926 jupiter kernel: Hardware name: Intel(R) Client Systems NUC8i7BEH/NUC8BEB, BIOS BECFL357.86A.0089.2021.0621.1343 06/21/2021 1642916816.113943 jupiter kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x193/0x1d0 1642916816.114093 jupiter kernel: Code: ff ff ff c6 47 01 00 e9 21 ff ff ff c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 40 09 03 00 48 03 04 f5 00 b9 d7 a1 <48> 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32 1642916816.114130 jupiter kernel: RSP: 0018:9f5780f23a50 EFLAGS: 00010086 1642916816.114146 jupiter kernel: RAX: a1dbd4d8 RBX: 8a4ae4aa36a0 RCX: 0014 1642916816.114161 jupiter kernel: RDX: 8a511dd30940 RSI: 21be RDI: 8a4986fea500 1642916816.114309 jupiter kernel: RBP: 8a4986fea500 R08: 0014 R09: 1642916816.114342 jupiter kernel: R10: 8a49c0f51a00 R11: R12: 0286 1642916816.114359 jupiter kernel: R13: 9f5780f23c50 R14: 0009 R15: 8a49825c7500 1642916816.114374 jupiter kernel: FS: 7f8fab821000() GS:8a511dd0() knlGS: 1642916816.114540 jupiter kernel: CS: 0010 DS: ES: CR0: 80050033 1642916816.114714 jupiter kernel: CR2: a1dbd4d8 CR3: 00010a5ee001 CR4: 003706e0 1642916816.114752 jupiter kernel: Call Trace: 1642916816.114769 jupiter kernel: _raw_spin_lock_irqsave+0x32/0x40 1642916816.114786 jupiter kernel: remove_wait_queue+0x14/0x60 1642916816.114934 jupiter kernel: poll_freewait+0x6b/0xa0 1642916816.114968 jupiter kernel: do_sys_poll+0x49d/0x5a0 1642916816.114984 jupiter kernel: ? get_order+0x20/0x20 1642916816.115129 jupiter kernel: ? get_order+0x20/0x20 1642916816.115165 jupiter kernel: ? get_order+0x20/0x20 1642916816.115185 jupiter kernel: ? get_order+0x20/0x20 1642916816.115201 jupiter kernel: ? get_order+0x20/0x20 1642916816.115342 jupiter kernel: ? get_order+0x20/0x20 1642916816.115363 jupiter kernel: ? get_order+0x20/0x20 1642916816.115379 jupiter kernel: ? get_order+0x20/0x20 1642916816.115393 jupiter kernel: ? get_order+0x20/0x20 1642916816.115507 jupiter kernel: __x64_sys_ppoll+0xbc/0x150 1642916816.115530 jupiter kernel: do_syscall_64+0x33/0x80 1642916816.115548 jupiter kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 1642916816.115673 jupiter kernel: RIP: 0033:0x7f8fac4844f6 1642916816.115695 jupiter kernel: Code: 7c 24 08 e8 ac 18 f9 ff 4c 8b 54 24 18 48 8b 74 24 10 41 b8 08 00 00 00 41 89 c1 48 8b 7c 24 08 4c 89 e2 b8 0f 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 2a 44 89 cf 89 44 24 08 e8 d6 18 f9 ff 8b 44 1642916816.115728 jupiter kernel: RSP: 002b:7ffc39024b60 EFLAGS: 0293 ORIG_RAX: 010f 1642916816.115856 jupiter kernel: RAX: ffda RBX: 55fe71e0d2c0 RCX: 7f8fac4844f6 1642916816.115876 jupiter kernel: RDX: RSI: 0027 RDI: 55fe71fad660 1642916816.115895 jupiter kernel: RBP: R08: 0008 R09: 1642916816.115915 jupiter kernel: R10: R11: 0293 R12: 1642916816.116055 jupiter kernel: R13: 55fe71e0d2c0 R14: 0001 R15: 55fe71eba830 1642916816.116076 jupiter kernel: Modules linked in: xt_nat xt_tcpudp veth xt_conntrack nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user xfrm_algo nft_counter xt_addrtype nft_compat nf_tables br_netfilter bridge stp llc ctr ccm rfcomm cmac algif_hash algif_skcipher af_alg bnep btusb btrtl btbcm btintel bluetooth uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common jitterentropy_rng snd_usb_audio drbg videodev ansi_cprng snd_usbmidi_lib snd_rawmidi ecdh_generic snd_seq_device ecc crc16 joydev mc nfnetlink intel_rapl_msr intel_rapl_common overlay snd_sof_pci snd_sof_intel_byt snd_sof_intel_ipc x86_pkg_temp_thermal intel_powerclamp coretemp iwlmvm snd_hda_codec_hdmi snd_sof_intel_hda_common snd_sof_xtensa_dsp kvm_intel nls_ascii snd_sof mei_hdcp nls_cp437 snd_sof_intel_hda mac80211 kvm snd_soc_skl snd_soc_hdac_hda snd_hda_codec_realtek vfat snd_hda_ext_core snd_hda_codec_generic fat libarc4 snd_soc_sst_ipc irqbypass ledtrig_audio 1642916816.116227 jupiter kernel: snd_soc_sst_dsp snd_soc_acpi_intel_match ghash_clmulni_intel iwlwifi snd_soc_acpi snd_hda_intel snd_intel_dspcfg soundwire_intel
Bug#1003796: ITP: ifupdown-ng -- network device manager compatible with ifupdown
On 1/23/22 21:03, d...@darkboxed.org wrote: Hi Thomas, I've been working on the ifupdown-ng packaging today. I had a look at your existing git repo and did incorporate most of the debian/ files from that but decided to start the repo from scratch. The main reason being that I don't feel the gbp-import-ref workflow is quite ready yet so while I would prefer basing Debian packaging on the upstream git repo as you've done it just causes more friction right now in my experience. Hi, I'm not using gbp-import-ref, but my own tooling from openstack-pkg-tools. To import a new tag, I just do: ./debian/rules fetch-upstream-remote git merge -X theirs dch -i # edit changelog to match the new tag name ./debian/rules gen-orig-xz Maybe gbp-import-ref does the same thing? I've used this workflow for all of the OpenStack packages [1] without any issue for YEARS. I'm also not sure what kind of "friction" you're referring to... Could you add me to the debian/ifupdown-ng repo so I can push my work there? In the meantime the repo is here: https://salsa.debian.org/dxld-guest/ifupdown-ng/ One significant thing I noticed is that you seem to have Depends specifically for kfreebsd and hurd which I haven't dealt with yet. Did you test this stuff on those systems? I am not sure why I wrote these dependencies, probably because it was like that upstream already. I haven't tested on these arch, however, it should be easy to do so with Virtualbox or Qemu. FYI, when I first uploaded openrc to Debian, I used Virtualbox with the help of an OpenRC upstream author, so we could check and fix the port. These aren't official arch these days, so it maters less. Ordinarily I would think we could just go and get access porterbox for these arches but since I need to play with networking stuff for testing the porterboxes are likely not going to be much help. Right, porterbox wont be of any help here. Anyway, I have merged all of your changes to the main Salsa repository, and gave you access to it. Since you've audited my work and the package looks like in good enough shape, I have uploaded the final result. It's now up for review on the FTP master NEW queue. Let's hope it clears the NEW queue quickly... :) When it does, I very much welcome you to take care of this package as much as possible yourself, as I'm a fairly busy DD maintaining many packages. I will happily sponsor any change you want to include. Cheers, Thomas Goirand (zigo) [1] https://qa.debian.org/developer.php?login=team%2Bopenstack%40tracker.debian.org
Bug#1004287: ITP: rapidcheck -- C++ framework for property based testing
Package: wnpp Severity: wishlist Owner: Adam Borowski X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: rapidcheck * URL : https://github.com/emil-e/rapidcheck * License : BSD-2 Programming Lang: C++ Description : C++ framework for property based testing RapidCheck is a C++ framework for property based testing inspired by QuickCheck and other similar frameworks. In property based testing, you state facts about your code that given certain precondition should always be true. RapidCheck then generates random test data to try and find a case for which the property doesn't hold. If such a case is found, RapidCheck tries to find the smallest case (for some definition of smallest) for which the property is still false and then displays this as a counterexample. For example, if the input is an integer, RapidCheck tries to find the smallest integer for which the property is false. I don't really care about this package, but it's a Build-Dependency.
Bug#1004286: lintian: Consider switching from libio-prompt-tiny-perl to libio-prompter-perl
Source: lintian Severity: wishlist X-Debbugs-Cc: simon.cho...@canonical.com Hello, In 2.105, Lintian introduced a new dependency libio-prompt-tiny-perl. In Ubuntu, lintian is part of the main pocket, whereas libio-prompt-tiny-perl is part of universe, so syncing lintian means that we have to include this new dependency in main. However, we already have libio-prompter-perl in main via another dependency chain, and looking at the APIs, I believe it would be possible to simply change "use IO::Prompt::Tiny qw(prompt);" to "use IO::Prompter qw(prompt);" without any significant impact. Would you be willing to consider such a change? Thanks, -- Simon Chopin Foundations Team Ubuntu MOTU simon.cho...@canonical.comscho...@ubuntu.com
Bug#1004285: davical: problems after upgrade to php 8, calendar clients reports "500"
Package: davical Version: 1.1.10-1 Severity: grave Justification: renders package unusable X-Debbugs-Cc: be...@overeinder.net Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? I am using debian testing. After upgrade to php8 (with all dependencies), my calendar applications/clients on laptop and mobile were unable to contact the davical server. I have also logged into the davical (apache2) server via web browser, and there the user administration web pages seem to work as before. * What exactly did you do (or not do) that was effective (or ineffective)? I have looked at the apache2 log files and checked the /etc/php and /etc/davical directories if there were any references to php7 instead of php/php8. The apache2 log file reported [Mon Jan 24 11:29:29.678647 2022] [php:notice] [pid 684] [client /IPv6 address/] davical: LOG: response:-->DAViCal Fatal Error * What was the outcome of this action? There were no hints or clues for me to further investigate what might be going on. * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: bookworm/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 5.15.0-3-amd64 (SMP w/4 CPU threads) Kernel taint flags: TAINT_FIRMWARE_WORKAROUND Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages davical depends on: ii libawl-php0.62-1 ii libdbd-pg-perl3.15.0-2 ii libyaml-perl 1.30-1 ii perl 5.32.1-6 ii php 2:8.1+92 ii php-pgsql 2:8.1+92 ii php-xml 2:8.1+92 ii php8.1 [php] 8.1.1-4 ii php8.1-cli [php-cli] 8.1.1-4 ii php8.1-pgsql [php-pgsql] 8.1.1-4 ii php8.1-xml [php-xml] 8.1.1-4 ii postgresql-client-14 [postgresql-client] 14.1-5 Versions of packages davical recommends: ii php-curl2:8.1+92 ii php8.1-curl [php-curl] 8.1.1-4 ii postgresql 14+237 Versions of packages davical suggests: pn php-ldap | php5-ldap -- no debconf information
Bug#692072: README.Debian is misleading about no script to update options when ppp comes up
Package: bind9 Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec Followup-For: Bug #692072 Control: close -1 1:9.12.2.P1+dfsg-1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, the README.Debian files has been greatly simplified as of bind9 1:9.12.2.P1+dfsg-1, for the oldstable distribution, we are not going to touch it, so I am closing the issue. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages bind9 depends on: ii adduser3.118 ii bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii debconf [debconf-2.0] 1.5.77 ii dns-root-data 2021011101 ii iproute2 5.10.0-4 ii libc6 2.31-13+deb11u2 ii libcap21:2.44-1 ii libfstrm0 0.6.0-1+b1 ii libjson-c5 0.15-2 ii liblmdb0 0.9.24-1+0~20200325.6+debian10~1.gbpfd112d ii libmaxminddb0 1.5.2-1 ii libnghttp2-14 1.43.0-1 ii libprotobuf-c1 1.3.3-1+b2 ii libssl1.1 1.1.1k-1+deb11u1 ii libuv1 1.40.0-2 ii libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861 ii lsb-base 11.1.0 ii netbase6.3 ii zlib1g 1:1.2.11.dfsg-2 bind9 recommends no packages. Versions of packages bind9 suggests: pn bind-doc ii bind9-dnsutils [dnsutils] 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec pn resolvconf pn ufw - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHuhWxfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcKkyRAAgkkk09WJ2nX8mReppU4gyNoN+bDdDWc86g+v80OmkOeNSGZF9ApU62mY CEmtvPrvRFl5oo4GM2vWgNURvslZ0q6TRtAR7aJJKbyMPAd+h694PIzSYnPWKnyG a5uxFPB2nz6u+9JcDIPMsuKb3P3RLFSlQeK874slbOJTXqUW17xILBQ6jtEU2yla zKEqBUMYwkto5HU3FMbPUhmuCCJHlpEH8aPrOYSzXZQM7nXRN3HY5EW//77NGSnc kgVidRZ+L1pDvfrdemq5yomkHIp3qVATSJGZ/HylvXA4YVGvB4P7YykoftYffOON vVl7x3/qyStbJUfVX7CoLYeiqem380pTXaDzYos3icfwn0gSBkt+dIFbdBUrwA1D hS7v0WJyrwLerk9mZocy8fzIxBSH23hEdXmh3Sb45hsbbTg3rylW59FMP5gJXT6W pfvpgKRZzWnqCEMG0VSQH6NMvZNZ7poaEXO7JKeQW2D3O7aa0/yl3v2zDdkyWOzF vGkrPuqYG7EKC1AMELKhm5jk0ipqTWnCNtCp+GqUp+kQeEcgJAs89omCP+IawhfT 8R5pzEaL3A6uxirvlBB6q7B/cJyTOJ+1fnU7F7dvnzgwnqgAQGiu3d70pdoPnCWx X92OevvMMsugjyGWudSU5HJyXpyuvN9GtbZSFLcEjF7TTc4BHO0= =FEAo -END PGP SIGNATURE-
Bug#905019: bind9: Red Black Tree sanity check triggered - Fatal error in rbtdb.c, RUNTIME_CHECK failed
Package: bind9 Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec Followup-For: Bug #905019 Control: close -1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, this has been reported against a version of BIND 9 no longer in oldstable or stable distribution. Closing the issue. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages bind9 depends on: ii adduser3.118 ii bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii debconf [debconf-2.0] 1.5.77 ii dns-root-data 2021011101 ii iproute2 5.10.0-4 ii libc6 2.31-13+deb11u2 ii libcap21:2.44-1 ii libfstrm0 0.6.0-1+b1 ii libjson-c5 0.15-2 ii liblmdb0 0.9.24-1+0~20200325.6+debian10~1.gbpfd112d ii libmaxminddb0 1.5.2-1 ii libnghttp2-14 1.43.0-1 ii libprotobuf-c1 1.3.3-1+b2 ii libssl1.1 1.1.1k-1+deb11u1 ii libuv1 1.40.0-2 ii libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861 ii lsb-base 11.1.0 ii netbase6.3 ii zlib1g 1:1.2.11.dfsg-2 bind9 recommends no packages. Versions of packages bind9 suggests: pn bind-doc ii bind9-dnsutils [dnsutils] 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec pn resolvconf pn ufw - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHugd5fFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcJTug//evi01iiLWDLI/KGMe4KzMvrvh0eJdub0mjT1jjSIzG3HX7yGppVKpsA8 miLkC79A/9XDvWUo6H7aZ+wrIgYUQ/a9Nb72ncZQ71nYdNAy8XeFlVd81I/HgSBU w6qS5YExatOS7MdMXLSOjQrtOWHpBUnr9oCAVk9KVSeNbDCZ+iEgwooHw1Jd/L48 N5psLgMicBH24OHUs+ATyAhaosHn9iDpJ/Ps6cALQ3vOufvJEwzYceG7JIttgRXR +ARTlWLHfJl0A8khe6H5Dkn5zrZ19Gabf7T/6+F4Z8EvKVMy7wekz5Uy+KQhH8jw Tcp2UKwEZTg31sFHzM/2+EtVcvx4Ht/faO5ajq9mKu2isXheV3CTVRplk14K2PyY iJbrPLeV92EBDz1L8ORZHO6VeahmFdMa5gtZ6DtMKYIxI/FhyGipj2AdWmtEsbZR dfoJZeQw6QRNFmnIDPin2H+GulFgeQrKWhLf96sh6ebow8MLY0ab+j5CYcRk+0aD E+L8AMUl2ORFNfq4rJbm3KKNda4iROYCFIQ+L/HYAsuTpbHVfeL4QikaCR43610h SYNhcKOvxr7xneXDYRksJ+hJGquMB6YQGKogEfNGL4nkqobeIrPO7vC0xDwyGTl6 DlmBAcOUHoId+eJx2xpJu94lCEZ/+Cgm8K+eeP5g+j2EinRnXIs= =0m7e -END PGP SIGNATURE-
Bug#1003567: Please make a separate package for mistune 2.x
On Tue, 11 Jan 2022 22:38:44 +0100 p...@debian.org wrote: > Package: python3-schema-salad > Severity: wishlist > > Dear maintainer, > > Your package python3-schema-salad depends on python3-mistune 0.8.4 > which is no longer maintained and deprecated in favour of version > 2.0.0. > > As python3-mistune 2.0.0 is not backward compatible, I reverted the > upload of it that I did in unstable and python3-mistune 0.8.4 will > stay around a bit longer. > > In the meantime, please try to see if upstream of > python3-schema-salad either released a version that is compatible > with python3-mistune 2.0.0 or if python3-schema-salad can easily be > fixed to support such a version. As soon as you're ready to upload > your package please update this bug report and we'll try to > coordinate so that I release python3-mistune at a time that is fit > for you to also release python3-schema-salad. Dear Pierre-Elliott Bécue, Thank you for trying to find a way forward in this mess. I am also the upstream maintainer for schema-salad. We have yet to find a way to support mistune 2.x Here is our attempt so far: https://github.com/common-workflow-language/schema_salad/pull/496/files?short_path=5c6a130#diff-5c6a1301c6b59b30a040d747d065e861d3dd98bde0e5a4356d92d594e9835986 And an issue I opened with mistune directly about a regression in multi-line list handling that goes against multiple markdown specs: https://github.com/lepture/mistune/issues/296 We have not decided if we will switch to another library, wait for a fixed mistune 2.x release, or keep with the older version. > I intend to upload src:mistune 2.0.0 to unstable between March the > 15th and April the 15th (depending on the progress of its > reverse-dependencies). I'll raise the severity of this bug > approximately a month before making such an upload. Since Mistune 2.0.0 regresses its support for standard markdown, I ask that a separate package be made for mistune 2.x to give more time for mistune 0.8.x users to migrate to mistune 2.x or another library entirely. Cheers, -- Michael R. Crusoe OpenPGP_signature Description: OpenPGP digital signature
Bug#1003653: Revision of removal of rename.ul from package util-linux
* Sean Whitton [220124 05:56]: > On Sun 23 Jan 2022 at 10:27PM +01, Christoph Berg wrote: > > Re: Sean Whitton > >> On Sun 23 Jan 2022 at 10:04PM +01, Chris Hofstaedtler wrote: > >> > I guess the best thing would be to introduce a new binary package, > >> > but I am out of ideas on naming it. Open for ideas here. > >> > >> util-linux-extra? > > > > If it's about rename only, "rename-ul" or even "rename.ul"? > > > > I guess it should also contain the historical name as a symlink. > > > > Christoph > > Well, Chris mentioned wanting to transition some other things out of the > essential package in addition to this one. Also, the ftp team would not > love the idea of a single-script package. I think this will mostly depend on what src:rename will/should do (+CC: Debian Perl Group, Dominic Hargreaves). For context, the idea is that /usr/bin/rename should become src:util-linux' rename implementation. As was found in the past, this is not possible using alternatives. As the util-linux maintainer, I would also prefer to not having alternatives. If the rename binary package drops /usr/bin/rename, rename.ul(*) can start installing that, and conflict on old versions of rename. Or, to make this transition more clear to users: - src:rename could drop /usr/bin/rename AND rename its binary package to file-rename (?) or prename (?) - rename.ul could Conflict: rename indefinitely Chris (*) "working title"
Bug#1004284: tomcat9: postinst creates wrong userhome via systemd-sysusers
Package: tomcat9 Version: 9.0.43-2~deb11u3 Severity: important Dear Maintainer, Debian creates in the postinst script via systemd-sysusers a system user named tomcat whose home directory is /var/lib/tomcat. This directory does not exist, but /var/lib/tomcat9 -- System Information: Debian Release: 11.2 APT prefers stable-security APT policy: (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-11-amd64 (SMP w/4 CPU threads) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages tomcat9 depends on: ii lsb-base11.1.0 ii systemd 247.3-6 ii tomcat9-common 9.0.43-2~deb11u3 ii ucf 3.0043 Versions of packages tomcat9 recommends: ii libtcnative-1 1.2.26-1 Versions of packages tomcat9 suggests: ii tomcat9-admin 9.0.43-2~deb11u3 pn tomcat9-docs pn tomcat9-examples pn tomcat9-user -- no debconf information
Bug#948612: Unintelligble error message
Package: bind9-dnsutils Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec Followup-For: Bug #948612 Control: close -1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, the bug report is against a version of BIND 9 no longer in stable or oldstable release. Closing the bug report. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages bind9-dnsutils depends on: ii bind9-host [host] 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii libc6 2.31-13+deb11u2 ii libedit2 3.1-20191231-2+b1 ii libidn2-0 2.3.0-5 ii libkrb5-3 1.18.3-6+deb11u1 ii libprotobuf-c1 1.3.3-1+b2 bind9-dnsutils recommends no packages. bind9-dnsutils suggests no packages. - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHuf9hfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcK6Bg//fUme1kEhkr6DBnuRK0MOjoidq6yGKAKk/PSFdcNgxN5au3+JYpbMTCwf c5001Hq58rHy8dpG1cp0vRxljWOaRtfixeOAAfoRh+1Vo3QIr6vgKxOmVm0zxe5j fiN7BR+rRisHwb0OHpDxw80Ao1+9cD76FAjdkFHtAKGIWIP3ptaUdEyUhCYTZ4SM TU6pJbfTwrpLA7onZ7qf6G7JD/LCDTVTTmeJ8X3/YjOf3+C6DnhaV/Ww1uHJGpkC ye58lJ/nGKCRWbhP+/rF06eTtOHZmxsGQiGeMasPSP6x2uzoPvxiHcbadELy7XdA AOxisN3IR9lb30G+kIVEEAZYmatY3hYSEo735BkzUo/00c2Bwa9JdNghygIb/KVS J5CmRftDhCx2JLsPVL3UkjvUJAfN991oI5Nb7JBUEHpb88ARiYk9ad2ird97KbfH CUj2B+9EwWwcj704itDKXnm3DOGsBdEZ1bZ/Xju8AYZPgOwp4Y391ARoWdbX8VLu JCYWp7xJ+xA2x7ZvKGTmkZpZBlCl9UaT+5kg2kUNs1Tg5mXaQHqxVVrCI02V4pe8 8JfhENYovISbr0UCT5gs87Ip8GKjWi5yjq0qxvtZrXZI73ob+K3LU6JNcdVD4MV8 cWBQ8+OstU74UUdbDVE1hB9bh7xbnVmnoHNRWceeTTU+5TD16fM= =32cr -END PGP SIGNATURE-
Bug#1000162: ima-evm-utils: FTBFS with no internet connection
пн, 24 янв. 2022 г. в 13:00, Bastian Germann : > > On Thu, 18 Nov 2021 21:59:12 +0100 Bastian Germann wrote: > > Your package fails to build from scratch in an environment with no > > internect connection. > > Please check the buildd logs for this. > > I am going to fix this via a NMU as it was not resolved with the latest > upload. Ack for the NMU. -- With best wishes Dmitry
Bug#901394: bind9utils missing manuals, bind9 extra manuals
Package: bind9 Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec Followup-For: Bug #901394 Control: close -1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, the PKCS#11 build has been dropped from the package, closing the bug. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages bind9 depends on: ii adduser3.118 ii bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii debconf [debconf-2.0] 1.5.77 ii dns-root-data 2021011101 ii iproute2 5.10.0-4 ii libc6 2.31-13+deb11u2 ii libcap21:2.44-1 ii libfstrm0 0.6.0-1+b1 ii libjson-c5 0.15-2 ii liblmdb0 0.9.24-1+0~20200325.6+debian10~1.gbpfd112d ii libmaxminddb0 1.5.2-1 ii libnghttp2-14 1.43.0-1 ii libprotobuf-c1 1.3.3-1+b2 ii libssl1.1 1.1.1k-1+deb11u1 ii libuv1 1.40.0-2 ii libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861 ii lsb-base 11.1.0 ii netbase6.3 ii zlib1g 1:1.2.11.dfsg-2 bind9 recommends no packages. Versions of packages bind9 suggests: pn bind-doc ii bind9-dnsutils [dnsutils] 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec pn resolvconf pn ufw - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHufu9fFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcL98A/9FMjStVcqfVJAruf1HyeFLQ1Z/V0K5AVpu6UketGqszHq8dhYnAG/oS8V p523WOlb+NSLH3bxx8fuh/70OjvwC+bxNhx8XNe2Sb654Ap8+khcM5dFw5gtduBF RZBF9alDNEa1MvjZMQ5c66osiH7vpXT+ZWutsG5r+T4xglsnjQWry/yWvkC5FNmx EuGqOekwtXcczuS+IH1oqmaYzwzeV9TcZZVW/uiAh6lt2jiJvFNjYwnRu9ISRMPz JOYFjDsMBkFp3r1GJE3nc+30Vx1+4D9G0+6f3hPCi1Hj7ivr5/3a3c9Nv/HYREFW POQDLOzuMHif+KR6XQ7T4fJ0Sx1o/QKCfaok7Ty0vTEtw+XQOQHhz7LOXDdnfYKE DV1auc/xEYB2+K8nsmnZ0FJpqiEKLl9pK4lK499aoQRhdbmshZaRazulSww4Dy/6 lTUjIWsX8VZmNjt21VGB2C59jhkP8ZSP9H6zzaGc1Lf1kmlXs93WCqEXLOQfFRFP O0A8E3lXbTjCTl3XgSh8sCXNUjvp11SiRcyQvKUJHpBYYCkoKVmsjkflsD8E2551 ZDrdJtH29Zc8rRJjwWpJ3onnMmHJtpfRuvLDeYpaxQlQHL5uEdhutWj7LZDiB5ZG vSYqGIVddNvZnKlgDF7tMdS0aJhWzMgFd81fZ7cnoSDMUGSVH1k= =Z4k1 -END PGP SIGNATURE-
Bug#901078: Bind9 port binding problem
Package: bind9 Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec Followup-For: Bug #901078 Control: close -1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, this has been filled against version of BIND 9 that's not in Debian anymore. Closing the bug. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages bind9 depends on: ii adduser3.118 ii bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii debconf [debconf-2.0] 1.5.77 ii dns-root-data 2021011101 ii iproute2 5.10.0-4 ii libc6 2.31-13+deb11u2 ii libcap21:2.44-1 ii libfstrm0 0.6.0-1+b1 ii libjson-c5 0.15-2 ii liblmdb0 0.9.24-1+0~20200325.6+debian10~1.gbpfd112d ii libmaxminddb0 1.5.2-1 ii libnghttp2-14 1.43.0-1 ii libprotobuf-c1 1.3.3-1+b2 ii libssl1.1 1.1.1k-1+deb11u1 ii libuv1 1.40.0-2 ii libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861 ii lsb-base 11.1.0 ii netbase6.3 ii zlib1g 1:1.2.11.dfsg-2 bind9 recommends no packages. Versions of packages bind9 suggests: pn bind-doc ii bind9-dnsutils [dnsutils] 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec pn resolvconf pn ufw - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHufypfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcI9wQ//b2P2vXJFN0T94qKv1Ov5yI8UTkQpqcI4XSuiQc+gdM72+Mc0ygBg7qc8 q3/oEKbyQ0UhkHSZI+xf2Kzliz7XljYRK1mmPn3hF6gx4qJlJM+DdPtoTVLdyhuL DRmlLujx9jvSy7nfctKfXO4N8rGAghHFyLHhKOOdg8pR4M1GEPQhLkeGBFyczHXI MMNs3vVHSLxBmX15BuvBR4XV0k+y0JwFwGQLaVfppZW4SPny/G33sFR7eY7oNgUw eJ4L0YGOPIHWuAYyCcI73Vgt310MwmPyRbTHR79GOZ+ozuwVxS85iqMdV4+RRMcS RsZlIygBq4TK1/c5y2BV2Z7E5v9ro/UOD8+AB8YknsgC6NCDrYi5L44o0aNwEuyB n1uP52mdgW4+JsZZnPbXH2UPUoWd9S9k0kqKOv50bUVp9q6QqncuCv/jLCE4qJ2M Lk1M6x6iveL/TbB5/rPQLr+dKbNksk23usNKyzn3LXycWMVCfCQJvgcxQ9BhhZQw womzFPZiwmIZCo7sEvbHxCLYo3V19aRer/XduC0fWmvR+edk8ld1BXYFDgM+csXa 0eFosxrizgT8K3+6yJcSBzMjHNqS3slBNYderN5o8/qvuo6tAAnV6utXuzIkWfiw jytpcat6oyycccf5ujejYr/scXocGKHKgSjt6iinX9csEk4UUYM= =yH/w -END PGP SIGNATURE-
Bug#840714: bind9 FTCBFS: python3 dependency, missing --host flags, bad configure checks, etc
Source: bind9 Followup-For: Bug #840714 Control: fixed -1 1:9.17.0-1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, the python3 ply dependency has been dropped, marking it as fixed in 9.17.0+. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHufllfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcIYHA/7BLafWM2NYt6ZxkVF413R+2vkSID1o7SJ4ySLz+22oiGKixPDYdzv1+RS yqppxvrzV6sFgYsBNSH0MiQxAxXzbSQ/kCr/UD8LjPkFbxu4iTdDwNd6Y4OL7sL8 wlRvNiii642YrTql6pOYKsHMGv+fiRTTvKEASoBOio1TV5OJy70YiWA/D05mzq/u Kfu5O0DEDW1mITK5vYz5vQCc2ETiv3oBFRh/3lfBswYPZRtP7OhiGWZGLNAQWNEJ f2QhkE33ssCSJeWAJayBcVV0K9FuXdJzjVtNk0ORR4RhpOTNm67wj4g+6sTgNpcO W/AaDcuxny/lacjw9o6TmmvF7uCYBGITPUKR0SMTikubAbXysDmxUXMz8B0FJMmD 8B0ZAwccXu81PD306d21hgpGxLh7GBpA4OqZZ3bpidD4jIxmTl32/qmpZ1EAK1rL f6g0j4tzb/8k3Nq9Q0sg04u0UgO1g3GgmL1NDVbK6JLw+P/KslkTNLlGSIOYaHj/ /DOSwjXFWCEfE+wUSDw1aC/LMiDUAzV3YRlm3ot1AFKcSpDzu5denn19nfnrhgIe iidxVpLzp+abmLkDKS5Wr2JZ8i73NIrZ5yFf3ABN+QxWnlOc4g3xf0AEh+Oy5vcm szJG5WXwZeCqLcohJ0vrqhXdi80i2t2KbqsfJSwLaOOPzSJ/Pmc= =X2Vk -END PGP SIGNATURE-
Bug#979276: xserver-xorg-video-intel: Server fails to start: "Illegal instruction"
On Sat, Jan 22, 2022 at 12:56:25AM -0500, Stefan Monnier wrote: > Julien Cristau [2021-08-23 10:07:30] wrote: > > On Sun, Aug 22, 2021 at 03:12:58PM -0400, Stefan Monnier wrote: > >> > I just tried to upgrade my `testing` installation but the problem is > >> > still present. Did you install the patch there? > >> I just upgraded to the new `bullseye` release and the problem is > >> still there. > > Well yes. I've been waiting for someone affected to test the patch. > > Hmm... I just tried to figure out how to build a patched package, but > that failed. > > The instructions I found on debian.org seemed quite long (aimed at > Debian developers, it seems), so I ended up following probably obsolete > random help off the net. > I've got a package up at https://people.debian.org/~jcristau/xserver-xorg-video-intel_2.99.917+git20200714-1+sse2_i386.deb Having now had confirmation it's working from a couple of users, I'll try to get the fix into unstable and a stable update soon. Cheers, Julien
Bug#894000: bind9rndc: connect failed: 127.0.0.1#953: connection refused
Package: bind9 Version: 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec Followup-For: Bug #894000 Control: close -1 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, the bug report doesn't contain enough information to practically go on. The permissions on {/var}/run/bind is managed by systemd-tmpfiles, so perhaps something happened there? I am closing the bug report as it makes little sense to keep it open. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages bind9 depends on: ii adduser3.118 ii bind9-libs 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii bind9-utils1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec ii debconf [debconf-2.0] 1.5.77 ii dns-root-data 2021011101 ii iproute2 5.10.0-4 ii libc6 2.31-13+deb11u2 ii libcap21:2.44-1 ii libfstrm0 0.6.0-1+b1 ii libjson-c5 0.15-2 ii liblmdb0 0.9.24-1+0~20200325.6+debian10~1.gbpfd112d ii libmaxminddb0 1.5.2-1 ii libnghttp2-14 1.43.0-1 ii libprotobuf-c1 1.3.3-1+b2 ii libssl1.1 1.1.1k-1+deb11u1 ii libuv1 1.40.0-2 ii libxml22.9.12+dfsg-0+0~20210621.9+debian11~1.gbp43e861 ii lsb-base 11.1.0 ii netbase6.3 ii zlib1g 1:1.2.11.dfsg-2 bind9 recommends no packages. Versions of packages bind9 suggests: pn bind-doc ii bind9-dnsutils [dnsutils] 1:9.17.21-1+0~20211215.67+debian11~1.gbp8acaec pn resolvconf pn ufw - -- no debconf information -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHuedFfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcLkyRAAkXXbvSI5HVILUkMKntSF7XzK5QWhGlcyFoqAZoH2kvWekytAoiFEJAfU ae6UClqQvJ7ndWV1KqN7ymMtRMOzU6mVqifKp5AX1a5hMNIZppBMhUBtXs/qIX0i 1A4nbbkiUB2hfa2qDZMod5xa+c+bbEtqNk4swV7cA1G3+TNiEtLEJyALQ5TE10hN fvTz3SACP5IfZjv4AwS8SJ3oX3wdVFAFYs/yQcwS+bn5JrCPOuK5Vcv2St3Y5TyR u8vEA0lD3KeC9CgbqYsfLHP4QUD66hscaELjm+EsKnL7DSSm6j0fOvJARUt7t3vQ VaviN+ftSlHBLelKzjQ0m8qzCn4Z0ZuHlqWZnylGm6uNnsuYE2OLzgaAmCzdw1/0 +TtGX/i5+xZjhN0YOS1ezDeqh3/6J7TUlWPduiXSK6DUhRoAgefU8YfodfJvUhds 5mOcPolbk6hySs+WVGPgMs+uUXtdEi13JxrN4Tgq27oceiIIzKLIJTZW80gELWmK eDwgQXra3g7PhcbJf/DRsbImU8HPT5BX6KAYN6hjtOmWFG/tldf/dd8K+oWT2RMr gMLEsqc1im5Gwf6cWrs+mflnUjsDhysSSSIVEEH0kxsThHBTX3iDXZXtHW/gp31w kKk3UGCsP9Q0hflRARPP1pi5Ks70WKtMWnw5kUWPhPHHbrlGLH0= =SKkt -END PGP SIGNATURE-
Bug#1000162: ima-evm-utils: FTBFS with no internet connection
On Thu, 18 Nov 2021 21:59:12 +0100 Bastian Germann wrote: Your package fails to build from scratch in an environment with no internect connection. Please check the buildd logs for this. I am going to fix this via a NMU as it was not resolved with the latest upload.diff -Nru ima-evm-utils-1.4/debian/changelog ima-evm-utils-1.4/debian/changelog --- ima-evm-utils-1.4/debian/changelog 2022-01-22 04:21:14.0 +0100 +++ ima-evm-utils-1.4/debian/changelog 2022-01-24 10:49:06.0 +0100 @@ -1,3 +1,11 @@ +ima-evm-utils (1.4-1.1) unstable; urgency=high + + * Non-maintainer upload. + * d/libimaevm2.symbols: Correct SO version + * d/control: Add docbook-xml build dependency (Closes: #1000162) + + -- Bastian Germann Mon, 24 Jan 2022 10:49:06 +0100 + ima-evm-utils (1.4-1) unstable; urgency=medium * New upstream release diff -Nru ima-evm-utils-1.4/debian/control ima-evm-utils-1.4/debian/control --- ima-evm-utils-1.4/debian/control2021-09-24 11:39:11.0 +0200 +++ ima-evm-utils-1.4/debian/control2022-01-24 10:49:06.0 +0100 @@ -5,6 +5,7 @@ Standards-Version: 4.6.0 Build-Depends: asciidoc, debhelper (>= 11), + docbook-xml, docbook-xsl, attr, libattr1-dev, diff -Nru ima-evm-utils-1.4/debian/libimaevm2.symbols ima-evm-utils-1.4/debian/libimaevm2.symbols --- ima-evm-utils-1.4/debian/libimaevm2.symbols 2021-09-24 11:39:11.0 +0200 +++ ima-evm-utils-1.4/debian/libimaevm2.symbols 2022-01-24 10:49:06.0 +0100 @@ -1,4 +1,4 @@ -libimaevm.so.2 libimaevm2 #MINVER# +libimaevm.so.3 libimaevm2 #MINVER# * Build-Depends-Package: libimaevm-dev calc_keyid_v1@Base 1.3.1 calc_keyid_v2@Base 1.3.1
Bug#942502: src:isc-dhcp: please switch to bundled BIND 9 libraries
Source: isc-dhcp Followup-For: Bug #942502 Control: severity -1 serious -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Maintainer, BIND 9.11 will go EOL with the next release and ISC DHCP team is making switch to maintain the bundled libraries in ISC DHCP on their own. This means there will be only option now - use the bundled libraries as they will be maintained inside the ISC DHCP project. Ondrej - -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'proposed-updates'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-10-amd64 (SMP w/24 CPU threads) Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE=en_IE:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmHudwJfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u WcKF4w/9FxfCJZqBvrwAd4gdUTzVGZebiS+eAoKkGV13D+Tp35JAuwYw1d0kXWNr kmdmVIJg9vqM+NvHHd0H350ErcXczlJb84JetIbLHzRYlemeFgwsQQVoPYp+A/1y KjwqEC1Dkm6KXcxi9lSw5aP+huRuaRzOzVd3e34EwQ4hbihak73RV4nP4Xo67lvh r3dXP7wGu6o5GhopqcJDOc0YBYGTVXV7Zg5O5qRmzpxvoBXE/DtrMv7I4saedg+D vuMA5It5M+VCTvt3cgjDJI8wTL+G4+NN/w9mEX0gEpL2shw1eMSeJHjkdr9roNfv SA0gFvDdSLYGJCJ5vurTqvaOML/GrIUoPLAOxJ4t/tlEBGhTv2bWCZX6IK0GE3t+ rhLyfw3ZvqKcOapTOlPLYfz+/S1j71T/vDoRao50jbQs63Avmbe6Sy4AHyLTx4o7 A4/P1pJdvvrq7wXgb9KN8XeUrIV6BRLJ6DO0Uh3VODDHvwGEdKbVcB/hDaHFcmsi hgF4TrabRzJdTFFa+dYR7bLq9AieLMWtHySCMnpF3AsP/ZQJZJNh4wOOSaaq8XEF JZsLWzP0pkSgkJiTDrBSwXk4RyebNQIZ/7zGcgyL+QPE+o7Ykcd1/ELJ0FSPl4UQ 2wjEKyTuToNiRaW1voJi2SMzOXTtSyTSlg1WIdgU7nbjiHcEyPw= =bIsk -END PGP SIGNATURE-
Bug#998884: ITP: golang-github-go-git-go-git -- highly extensible Git implementation in pure Go
It seems like this package is already in Debian and therefore this ITP can be closed? $ rmadison golang-github-go-git-go-git debian: golang-github-go-git-go-git | 5.4.2-3 | testing | source golang-github-go-git-go-git | 5.4.2-3 | unstable | source Cheers, Arnaud.
Bug#998876: ITP: golang-github-go-git-go-billy -- The missing interface filesystem abstraction for Go
It seems like this package is already in Debian and therefore this ITP can be closed? $ rmadison golang-github-go-git-go-billy debian: golang-github-go-git-go-billy | 5.3.1-3 | testing | source golang-github-go-git-go-billy | 5.3.1-3 | unstable | source Cheers, Arnaud.
Bug#995171: need newer release
Hi Yaroslav, $ apt showsrc singularity-container | grep Uploaders Uploaders: Dave Love , Mehdi Dogguy , Yaroslav Halchenko , Afif Elghraoui , Dmitry Smirnov , Benda Xu shows you as Uploader of singularity-container. Is there any reason you file this bug report instead of simply uploading a new version of this package? When doing so I'd recommend the following patch: diff --git a/debian/watch b/debian/watch index 140951c..e4f994d 100644 --- a/debian/watch +++ b/debian/watch @@ -6,4 +6,4 @@ repacksuffix=+ds1,\ repack,compression=xz,\ dversionmangle=s{[+~](dfsg|ds)\d*}{},\ " https://github.com/sylabs/singularity/releases \ - (?:.*/)?singularity-(\d[\d\.]*)\.tar\.gz + (?:.*/)?singularity-ce-(\d[\d\.]*)\.tar\.gz I admit I've never used singularity before but this might change in the near future. Thus I'm wondering why we have 4 open bugs with CVE numbers and are lagging several versions behind upstream. May be there is a good reason to stick to the outdated security problematic version which I simply do not understand? Kind regards Andreas. -- http://fam-tille.de
Bug#1000362: newsboat: new usptream version available (2.25)
Hi, Newsboat now requires the rust-cxx crate , which is currently in NEW. (or components of it) It will probably take a while to get it updated. Regards, Nikos On Mon, 22 Nov 2021, at 06:23, Salvatore Bonaccorso wrote: > Source: newsboat > Version: 2.21-1 > Severity: wishlist > X-Debbugs-Cc: car...@debian.org > > Hi > > there is a new upstream version available for newsboat (2.25 at time > of writing). > > https://github.com/newsboat/newsboat/blob/master/CHANGELOG.md#225---2021-09-20 > > Possible to package the new version for unstable? > > Regards, > Salvatore -- Best Regards, Nikos Tsipinakis
Bug#904572: move x11-utils to Suggests
Maybe the Recommends could be replaced by a Suggests: x11-utils. By now I didn't even know that there is a tool "luit".
Bug#1004166: strongswan-nm: Creates VPN configs that disable using system CA certificate directories
Hi Daniel, Removing the blank "certificate=" line from the VPN connection config in /etc/NetworkManager/system-connections/ restores the original behavior. However, modifying the connection config in NetworkManager will again add the blank "certficiate=" line, once again breaking the connection config. I can't reproduce this. What does the "Certificate" file chooser display when you open the editor? "(None)"? Regards, Tobias
Bug#1004121: nmu: libgsf_1.14.47-1+b1
Le 24/01/22 à 09:51, Laurent Bigonville a écrit : Le 23/01/22 à 18:54, Sebastian Ramacher a écrit : Control: tags -1 moreinfo On 2022-01-21 10:33:22 +0100, Laurent Bigonville wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Hello, Apparently libgsf-1-dev in the archive is not co-installable due to the documentation (see #814502) Are you sue that this bug is still present? The binaries from the last binNMU (1.14.47-1+) only differ in /usr/lib/${DEB_HOST_MULTIARCH} which is to be expected. I indeed didn't check myself if the existing packages were having a conflict, but I trusted the error/warning displayed on https://tracker.debian.org/pkg/libgsf So the issue is maybe not present on all the architectures actually, mhh Just tried and actually there are still differences between amd64 and arm64 (-dev) packages, but it's not the .html file, it's the .png that contains a different timestamp. And this is caused by the binNMU debian/changelog file that has a different timestamp
Bug#1004121: nmu: libgsf_1.14.47-1+b1
Le 23/01/22 à 18:54, Sebastian Ramacher a écrit : Control: tags -1 moreinfo On 2022-01-21 10:33:22 +0100, Laurent Bigonville wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Hello, Apparently libgsf-1-dev in the archive is not co-installable due to the documentation (see #814502) Are you sue that this bug is still present? The binaries from the last binNMU (1.14.47-1+) only differ in /usr/lib/${DEB_HOST_MULTIARCH} which is to be expected. I indeed didn't check myself if the existing packages were having a conflict, but I trusted the error/warning displayed on https://tracker.debian.org/pkg/libgsf So the issue is maybe not present on all the architectures actually, mhh
Bug#1004283: RM: sdl-ttf2.0/experimental -- ROM; wrong upload, the sdl2 library is already in archive and called libsdl2-ttf
Package: ftp.debian.org Severity: normal As said, I did upload to experimental for an sdl1 to sdl2 transition, but a package was already in the archive with a different soname (this sad naming convention is finally fixed in sdl2, but in sdl1 is tricky to define the real package name) thanks for kicking it out, Gianfranco
Bug#1004282: ITP: golang-github-andybalholm-crlf -- handling CR/LF line endings for Go language
Package: wnpp Severity: wishlist Owner: Nobuhiro Iwamatsu * Package name: golang-github-andybalholm-crlf Version : 0.0~git20171020.670099a-1 Upstream Author : Andy Balholm * URL : https://github.com/andybalholm/crlf * License : BSD-2-clause Programming Lang: Go Description : handling CR/LF line endings for Go language The crlf library is a Go language package for helps in dealing with files that have DOS-style CR/LF line endings.