Bug#989193: fixed in apparmor-profiles-extra 1.34
On Wed, 09 Jun 2021 07:18:32 + intrigeri wrote: >* apt-cacher-ng: allow link operations on the contents of the cache > directory > (Closes: #989193). Thanks to Eduard Bloch for the patch. Here is a little bump to postpone the autoremoval so the fix gets into testing. -- bye, pabs https://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
Bug#990158: shim-signed-common: No UEFI boot with error "Could not create MokListXRT"
Hi Ayke, Thanks for your bug report, and apologies for the problem :-/ On Mon, Jun 21, 2021 at 09:00:15PM +0200, Ayke Halder wrote: >Package: shim-signed-common >Version: 1.33+15+1533136590.3beb971-7 >Severity: critical >Justification: breaks the whole system > >Dear Maintainer, > >## What led up to the situation? > >Upgrade: > >* shim-signed:amd64 (1.33+15+1533136590.3beb971-7, >1.36~1+deb10u1+15.4-5~deb10u1) >* shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7, >1.36~1+deb10u1+15.4-5~deb10u1) > >System: Dell T5600 with BIOS Revision A19 > > >## What was the outcome of this action? > >System is unbootable on booting via UEFI. System shows error message and then >powers off immediately: > >"Could not create MokListXRT: Out of Resources >Something has gone seriously wrong: import_mok_state() failed: Out of >Resources" > > >## What outcome did you expect instead? > >A normal booting system loading GRUB. > > >## Also reproducible with Debian Live-Installations-Image > >On affected hardware like "Dell T5600" doing a UEFI boot from USB with … > >* debian-live-10.10.0-amd64-standard.iso does *not* work. >* debian-live-10.9.0-amd64-standard.iso works. > > >## Related resources > >Might be related to: > >* https://bugzilla.suse.com/show_bug.cgi?id=1185261 Yes, it looks like exactly the same problem. :-( Several of the shim maintainers in various distributions are now seeing reports like this. It seems that lots of machines are short of space to store the new MokListXRT variable. Since the buster update this weekend, yours is the second problem report I've seen. Ubuntu have a patch to disable the variable mirroring here. I was not expecting we'd need it, but it looks like I was wrong. In terms of making your system boot, I'd suggest temporarily one of: * switch back to an older shim-signed package * disable Secure Boot and remove shim-signed -- Steve McIntyre, Cambridge, UK.st...@einval.com "We're the technical experts. We were hired so that management could ignore our recommendations and tell us how to do our jobs." -- Mike Andrews
Bug#987461: libuima-adapter-soap-java is empty
On Tue, Jun 22, 2021 at 07:57:13AM +0900, Hideki Yamane wrote: > Hi, > > On Mon, 21 Jun 2021 11:52:14 -0700 > tony mancill wrote: > > I saw the note in the changelog that Breaks is in fact there to remove > > the empty package, but it's not happening for me when I try to upgrade > > locally. My test case is to install uima-utils (which will install > > libuima-adapter-soap-java via Recommends) and then try to upgrade the > > binaries to 2.10.2-4 using dpkg. > > Well, it would remove libuima-adapter-soap-java if I've tested it > on chroot env as below. > > # apt install /tmp/libuima-core-java_2.10.2-4_all.deb > (snip) > The following packages will be REMOVED: > libuima-adapter-soap-java > The following packages will be upgraded: > libuima-core-java > 1 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. > Need to get 0 B/1513 kB of archives. > After this operation, 12.3 kB disk space will be freed. > > > > The only way I can make this work is remove libuima-adapter-soap-java > > manually. Are you sure that Breaks is necessary? apt-get autoremove > > will clean up libuima-adapter-soap-java at some point. > > Okay, libuima-adapter-soap-java is empty now, just manual autoremove > is fine. Ah, I should have tested with apt. I see that it works fine. > > I took a look at policy to see if Breaks + Replaces should be used in > > this situation, but I'm not sure it really applies (although I think it > > would work better than just Breaks). Still, I'm unsure about the need > > for Breaks for this empty package clean-up use case. > > I don't think "Replaces" to be used in this situation since it > does not provide any fuctions as same as previous one. Agreed. > > Any concerns if I drop the Breaks before the upload? > > None, please go ahead for bullseye :) My apologies if using Breaks in this way is a common pattern. I am simply not familiar with it. If you have used the pattern before, I will upgrade the package as-is, since your way is cleaner. Otherwise, I will remove the Breaks. Thank you for the response. I will upload once I hear back from you. Thank you! tony signature.asc Description: PGP signature
Bug#987461: libuima-adapter-soap-java is empty
Hi, On Mon, 21 Jun 2021 11:52:14 -0700 tony mancill wrote: > I saw the note in the changelog that Breaks is in fact there to remove > the empty package, but it's not happening for me when I try to upgrade > locally. My test case is to install uima-utils (which will install > libuima-adapter-soap-java via Recommends) and then try to upgrade the > binaries to 2.10.2-4 using dpkg. Well, it would remove libuima-adapter-soap-java if I've tested it on chroot env as below. # apt install /tmp/libuima-core-java_2.10.2-4_all.deb (snip) The following packages will be REMOVED: libuima-adapter-soap-java The following packages will be upgraded: libuima-core-java 1 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. Need to get 0 B/1513 kB of archives. After this operation, 12.3 kB disk space will be freed. > The only way I can make this work is remove libuima-adapter-soap-java > manually. Are you sure that Breaks is necessary? apt-get autoremove > will clean up libuima-adapter-soap-java at some point. Okay, libuima-adapter-soap-java is empty now, just manual autoremove is fine. > I took a look at policy to see if Breaks + Replaces should be used in > this situation, but I'm not sure it really applies (although I think it > would work better than just Breaks). Still, I'm unsure about the need > for Breaks for this empty package clean-up use case. I don't think "Replaces" to be used in this situation since it does not provide any fuctions as same as previous one. > Any concerns if I drop the Breaks before the upload? None, please go ahead for bullseye :) -- Regards, Hideki Yamane henrich @ debian.org/iijmio-mail.jp
Processed: Re: Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.1
Processing control commands: > reassign -1 iptables-netflow-dkms Bug #990123 [iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' Bug reassigned from package 'iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae' to 'iptables-netflow-dkms'. No longer marked as found in versions linux/4.19.194-1, iptables-netflow/2.3-5, and iptables-netflow/2.5.1-2. Ignoring request to alter fixed versions of bug #990123 to the same values previously set > found -1 2.3-5 Bug #990123 [iptables-netflow-dkms] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Marked as found in versions iptables-netflow/2.3-5. > notfound -1 2.5.1-2 Bug #990123 [iptables-netflow-dkms] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Ignoring request to alter found versions of bug #990123 to the same values previously set -- 990123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990123 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?)
Control: reassign -1 iptables-netflow-dkms Control: found -1 2.3-5 Control: notfound -1 2.5.1-2 Hi Salvatore, Salvatore Bonaccorso wrote: > On Mon, Jun 21, 2021 at 01:33:01PM +0200, Axel Beckert wrote: > > Since kernel packages linux-{image,headers}-4.19.0-17-*, at least with > > -amd64 and -i686-pae, iptables-netflow-dkms no more compiles its kernel > > module upon kernel installation: > > > > In file included from /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:75: > > /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c: In function > > ‘register_ct_events’: > > /var/lib/dkms/ipt-netflow/2.3/build/compat.h:173:21: error: implicit > > declaration of function ‘ref_module’; did you mean ‘use_module’? > > [-Werror=implicit-function-declaration] > > # define use_module ref_module > > ^~ > > /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:5399:3: note: in > > expansion of macro ‘use_module’ > >use_module(THIS_MODULE, netlink_m); > >^~ > > > > Reading the kernel changelog, there are a few very suspicious entries > > listed under upstream version 4.19.191: > > > > - modules: mark ref_module static > > - modules: mark find_symbol static > > - modules: mark each_symbol_section static > > > > One of the commits above (8745aa4e resp. 7ef5264d) states: > > > > ref_module isn't used anywhere outside of module.c. > > > > Which is only seems true if you ignore any third-party kernel modules > > out there. […] > 7ef5264de773 ("modules: mark ref_module static") indeed is likely to > cause the issue, or basically the patchset around that. Thanks for that confirmation. > That initially landed in 5.9-rc1, Right, I saw that the list of tags including that change on Github. I though wondered why 2.5.1-2 works in Sid/Bullseye but not on Buster — but probably because the current #ifdefs just don't expect that fix being needed for any kernel before 5.9. > There is some background here: > > https://lore.kernel.org/lkml/20200730061027.29472-1-...@lst.de/ > https://lore.kernel.org/stable/ymxnxqzcp0g1f...@kroah.com/ Thanks for that! I didn't really expected license enforcing to be the background. With that background I do understand that change much more. :-) > That said, upstream won't really revert those changes. Understandable. I'm though surprised that this got backported. But I guess the pain without it is bigger than this one precise cut. > So in my biased view, what would be needed for buster indeed would be > an equivalent approach in buster for iptables-netflow unbreaking this > regression similar as done in 2.5.1-1 wit the > > cherry-pick-adfc6318-fix-compilation-for-5.9-workaround-ref_module-unexport.patch Thanks for pointing out that this patch is already in 2.5.1-1. I actually forgot that I had to solve this already once in the past (probably because the solution was submitted as pull request upstream against 2.5.1) and since 2.5.1-2 didn't work on buster either, I didn't expect it to be more or less fixed already. But in the end it's hopefully just replacing #if LINUX_VERSION_CODE < KERNEL_VERSION(5,9,0) with a bit more complex condition including further constraints. > I had no time to check if the patch applies and what changes need to > be done, No need to worry. That's not your job but mine. :-) > but basically what was added there fo fix compilation with Linux 5.9 > (which introduced the above changes initially) would need as well > for the 4.19.y stable series. Ack. Thanks again. Regards, Axel -- ,''`. | Axel Beckert , https://people.debian.org/~abe/ : :' : | Debian Developer, ftp.ch.debian.org Admin `. `' | 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5 `-| 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE signature.asc Description: PGP signature
Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?)
Control: affects -1 + release.debian.org Hi Axel, On Mon, Jun 21, 2021 at 01:33:01PM +0200, Axel Beckert wrote: > Package: > iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae > Severity: serious > Version: iptables-netflow/2.3-5 > Version: iptables-netflow/2.5.1-2 > Version: linux/4.19.194-1 > Tags: buster > Forwarded: https://github.com/aabc/ipt-netflow/issues/177 > > Since kernel packages linux-{image,headers}-4.19.0-17-*, at least with > -amd64 and -i686-pae, iptables-netflow-dkms no more compiles its kernel > module upon kernel installation: > > In file included from /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:75: > /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c: In function > ‘register_ct_events’: > /var/lib/dkms/ipt-netflow/2.3/build/compat.h:173:21: error: implicit > declaration of function ‘ref_module’; did you mean ‘use_module’? > [-Werror=implicit-function-declaration] > # define use_module ref_module > ^~ > /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:5399:3: note: in expansion > of macro ‘use_module’ >use_module(THIS_MODULE, netlink_m); >^~ > > Reading the kernel changelog, there are a few very suspicious entries > listed under upstream version 4.19.191: > > - modules: mark ref_module static > - modules: mark find_symbol static > - modules: mark each_symbol_section static > > One of the commits above (8745aa4e resp. 7ef5264d) states: > > ref_module isn't used anywhere outside of module.c. > > Which is only seems true if you ignore any third-party kernel modules > out there. > > So why is the kernel API suddenly removing API-code used by third-party > modules inmidst a stable update? This looks like a regression to me. I > thought that stable updates only change the ABI, but not the API. (Well, > at least upstream and in Debian. :-) > > I also tried the iptables-netflow-dkms 2.5.1-2 from Bullseye on Buster, > but it fails to build the kernel module for 4.19.0-17-* when as well. > > 2.5.1-2 though still works fine on Sid/Bullseye, hence marked as found > in the version in Sid, but tagged buster. In case this causes issues in > the BTS or the release team scripts, please rather remove 2.5.1-2 from > the "found" versions instead of removing the buster tag — unless the > same regression gets introduced into Sid and Bullseye as well. > > Debian kernel maintainers: If this 3rd-party-module-breaking regression > was really intended and won't be fixed, please reassign the bug to > iptables-netflow-dkms only. > > I also reported this issue to iptables-netflow upstream at > https://github.com/aabc/ipt-netflow/issues/177 as I think it at least > should update the version based ifdef checks in something which looks > like a similar issue in kernel 5.13, see > https://github.com/aabc/ipt-netflow/commit/5aae3791922bd3df878605b15e83ea48a4bd096c > which is part of iptables-netflow upstream's 2.6 release, not yet > packaged due to the freeze for bullseye. > > I'll try and see if I can get that fix backported to the package in > buster (and if needed, later to the one in bullseye as well) and will > see if it actually helps in this case, too. > > JFTR: dkms from buster-backports (as reported below) is only installed > as I needed it for the iptables-netflow-dkms package from bullseye. It > happened with dkms from buster before as well. 7ef5264de773 ("modules: mark ref_module static") indeed is likely to cause the issue, or basically the patchset around that. That initially landed in 5.9-rc1, and recently got backported upstream to 4.19.191. There is some background here: https://lore.kernel.org/lkml/20200730061027.29472-1-...@lst.de/ and https://lore.kernel.org/stable/ymxnxqzcp0g1f...@kroah.com/ That said, upstream won't really revert those changes. So in my biased view, what would be needed for buster indeed would be an equivalent approach in buster for iptables-netflow unbreaking this regression similar as done in 2.5.1-1 wit the cherry-pick-adfc6318-fix-compilation-for-5.9-workaround-ref_module-unexport.patch patch. I had no time to check if the patch applies and what changes need to be done, but basically what was added there fo fix compilation with Linux 5.9 (which introduced the above changes initially) would need as well for the 4.19.y stable series. Regards, Salvatore
Processed: Re: Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.1
Processing control commands: > affects -1 + release.debian.org Bug #990123 [iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' Added indication that 990123 affects release.debian.org Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' -- 990123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990123 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#922981: tagging 922981 (ca-certificates-java: /etc/ca-certificates/update.d/jks-keystore doesn't update /etc/ssl/certs/java/cacerts)
Hi Julien, On Tue, 18 May 2021 21:38:46 +0200 Paul Gevers wrote: > On 08-04-2021 19:33, Julien Cristau wrote: > > I've started to look at it, I'm afraid building up context on this > > stuff to understand what it's doing is going to take a while... > > Just a friendly ping. Did you get anywhere with this yet? Another month has passed and we now have a *tentative* release date. Is there any progress on this bug? The patch is tested according to Andreas. Paul OpenPGP_signature Description: OpenPGP digital signature
Bug#990000: marked as done (tor: CVE-2021-34548 CVE-2021-34549 CVE-2021-34550)
Your message dated Mon, 21 Jun 2021 19:02:13 + with message-id and subject line Bug#99: fixed in tor 0.3.5.15-1 has caused the Debian Bug report #99, regarding tor: CVE-2021-34548 CVE-2021-34549 CVE-2021-34550 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 99: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=99 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: tor Version: 0.4.5.8-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team CVE-2021-34548[1], CVE-2021-34549[2] and CVE-2021-34550[3]. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-34548 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34548 [1] https://security-tracker.debian.org/tracker/CVE-2021-34549 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34549 [2] https://security-tracker.debian.org/tracker/CVE-2021-34550 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34550 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: tor Source-Version: 0.3.5.15-1 Done: Peter Palfrader We believe that the bug you reported is fixed in the latest version of tor, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 990...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Peter Palfrader (supplier of updated tor package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 18 Jun 2021 10:27:26 +0200 Source: tor Architecture: source Version: 0.3.5.15-1 Distribution: buster-security Urgency: medium Maintainer: Peter Palfrader Changed-By: Peter Palfrader Closes: 99 Changes: tor (0.3.5.15-1) buster-security; urgency=medium . * New upstream version, fixing several (security) issues (closes: #99). For a full list see the upstream changelog. It includes: - Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell on half-closed streams. Previously, clients failed to validate which hop sent these cells: this would allow a relay on a circuit to end a stream that wasn't actually built with it. Bugfix on 0.3.5.1-alpha. This issue is also tracked as TROVE-2021- 003 and CVE-2021-34548. - Detect more failure conditions from the OpenSSL RNG code. Previously, we would detect errors from a missing RNG implementation, but not failures from the RNG code itself. Fortunately, it appears those failures do not happen in practice when Tor is using OpenSSL's default RNG implementation. Bugfix on 0.2.8.1-alpha. This issue is also tracked as TROVE-2021-004. Reported by Jann Horn at Google's Project Zero. - Resist a hashtable-based CPU denial-of-service attack against relays. Previously we used a naive unkeyed hash function to look up circuits in a circuitmux object. An attacker could exploit this to construct circuits with chosen circuit IDs, to create collisions and make the hash table inefficient. Now we use a SipHash construction here instead. Bugfix on 0.2.4.4-alpha. This issue is also tracked as TROVE-2021-005 and CVE-2021-34549. Reported by Jann Horn from Google's Project Zero. - Fix an out-of-bounds memory access in v3 onion service descriptor parsing. An attacker could exploit this bug by crafting an onion service descriptor that would crash any client that tried to visit it. Bugfix on 0.3.0.1-alpha. This issue is also tracked as TROVE-2021-006 and CVE-2021-34550. Reported by Sergei Glazunov from Google's Project Zero. Checksums-Sha1: 08eeead59d5386910a3833ada2a63b7d6cdec84f 1968 tor_0.3.5.15-1.dsc 6dfbd329281627c3b680da6d6bc160e830410f17 7136322 tor_0.3.5.15.orig.tar.gz 55ac245c9df8d4e27075d783ee84c81adc4b008c 51228 tor_0.3.5.15-1.diff.gz Checksums-Sha256: 73dec977ceaf471fc6081249b848914309793b81b9ccb88ac57455e
Bug#989631: marked as done (nettle: CVE-2021-3580: Remote crash in RSA decryption via manipulated ciphertext)
Your message dated Mon, 21 Jun 2021 19:02:07 + with message-id and subject line Bug#989631: fixed in nettle 3.4.1-1+deb10u1 has caused the Debian Bug report #989631, regarding nettle: CVE-2021-3580: Remote crash in RSA decryption via manipulated ciphertext to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 989631: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989631 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: nettle Version: 3.7.2-3 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for nettle. CVE-2021-3580[0]: | Remote crash in RSA decryption via manipulated ciphertext If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-3580 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1967983 [2] https://git.lysator.liu.se/nettle/nettle/-/commit/0ad0b5df315665250dfdaa4a1e087f4799edaefe [3] https://git.lysator.liu.se/nettle/nettle/-/commit/485b5e2820a057e873b1ba812fdb39cae4adf98c [4] https://git.lysator.liu.se/nettle/nettle/-/commit/485b5e2820a057e873b1ba812fdb39cae4adf98c Regards, Salvatore --- End Message --- --- Begin Message --- Source: nettle Source-Version: 3.4.1-1+deb10u1 Done: Magnus Holmgren We believe that the bug you reported is fixed in the latest version of nettle, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 989...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Magnus Holmgren (supplier of updated nettle package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 11 Jun 2021 19:53:20 +0200 Source: nettle Architecture: source Version: 3.4.1-1+deb10u1 Distribution: buster-security Urgency: high Maintainer: Magnus Holmgren Changed-By: Magnus Holmgren Closes: 985652 989631 Changes: nettle (3.4.1-1+deb10u1) buster-security; urgency=high . * Fix for CVE-2021-3580 - potential crash on invalid input to the RSA decryption functions (Closes: #989631). * Fix for CVE-2021-20305 - bug in ECDSA signature verification that could lead to a denial of service attack (via an assertion failure) or possibly incorrect results, backported from 3.7.2 by Marc Deslauriers (Closes: #985652). Checksums-Sha1: 23fa2e1210934c2bf273688cc0eb85828dec108c 2290 nettle_3.4.1-1+deb10u1.dsc 56a81ed4a8d35489d8bddd99d5262fe3958a52b4 1947053 nettle_3.4.1.orig.tar.gz 32e42277da6045ef07b31a163f1479cd7a36eefd 2476 nettle_3.4.1.orig.tar.gz.asc a70315a26f6b06c637c2d5fbd46998b5d2162874 26508 nettle_3.4.1-1+deb10u1.debian.tar.xz c835ffcaeeacce3c2ddc7027cfcd6e712a75212c 6072 nettle_3.4.1-1+deb10u1_source.buildinfo Checksums-Sha256: b38c9a78ae0732a94d06dbc811479f6ee8357bd47604dfa92f0d0801b148eebc 2290 nettle_3.4.1-1+deb10u1.dsc f941cf1535cd5d1819be5ccae5babef01f6db611f9b5a777bae9c7604b8a92ad 1947053 nettle_3.4.1.orig.tar.gz 07b265366b46bc67950da3f34687235eaa85c45b326e42bb7c9b58830b651d28 2476 nettle_3.4.1.orig.tar.gz.asc b847de5ccd50b9bc0aa56dd7fe750c224683174676dde69c86f62bece52ff4ba 26508 nettle_3.4.1-1+deb10u1.debian.tar.xz ad09746fc846ae3df71208bde6f999c60439f26622b15adbc869e0690d6adcf8 6072 nettle_3.4.1-1+deb10u1_source.buildinfo Files: da1cbe8255a65c63d4d9fb18c960b512 2290 libs optional nettle_3.4.1-1+deb10u1.dsc 9bdebb0e2f638d3b9d91f7fc264b70c1 1947053 libs optional nettle_3.4.1.orig.tar.gz ad85955beeebd9807bd5f5b45cd4f70e 2476 libs optional nettle_3.4.1.orig.tar.gz.asc 65059423e88d34c1dd5359728d0c829a 26508 libs optional nettle_3.4.1-1+deb10u1.debian.tar.xz 19338059add839d800e725b30ab9f161 6072 libs optional nettle_3.4.1-1+deb10u1_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEzSoHOzhhVBcKQILo1PIZv+yZhIkFAmDJAMEACgkQ1PIZv+yZ hIm9nw//c2DYojSV2TKCqRttfyOz82DXoGh30Kp2U9q6l66t+ySiM+v7Qu6HzEer Dkq+zaqCetZRoaJMnuFK8i3YjQ5IeQN/hAJvjpCXIN50mZaBdjSlnv2X/DP7bl7j W3UXQSvMQMLkTk7nqV50v4JcVn+6MkJZNUpmDsL21mqRcXGOb4hWZVF+cPEQxV
Bug#990158: shim-signed-common: No UEFI boot with error "Could not create MokListXRT"
Package: shim-signed-common Version: 1.33+15+1533136590.3beb971-7 Severity: critical Justification: breaks the whole system Dear Maintainer, ## What led up to the situation? Upgrade: * shim-signed:amd64 (1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1) * shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1) System: Dell T5600 with BIOS Revision A19 ## What was the outcome of this action? System is unbootable on booting via UEFI. System shows error message and then powers off immediately: "Could not create MokListXRT: Out of Resources Something has gone seriously wrong: import_mok_state() failed: Out of Resources" ## What outcome did you expect instead? A normal booting system loading GRUB. ## Also reproducible with Debian Live-Installations-Image On affected hardware like "Dell T5600" doing a UEFI boot from USB with … * debian-live-10.10.0-amd64-standard.iso does *not* work. * debian-live-10.9.0-amd64-standard.iso works. ## Related resources Might be related to: * https://bugzilla.suse.com/show_bug.cgi?id=1185261 -- System Information: Debian Release: 10.10 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-0.bpo.7-amd64 (SMP w/32 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages shim-signed-common depends on: ii debconf [debconf-2.0] 1.5.71 ii mokutil0.3.0+1538710437.fb6250f-1 shim-signed-common recommends no packages. shim-signed-common suggests no packages. -- debconf information: shim/title/secureboot: shim/error/secureboot_key_mismatch: shim/secureboot_explanation: shim/error/bad_secureboot_key: shim/disable_secureboot: true shim/enable_secureboot: false
Bug#987461: libuima-adapter-soap-java is empty
On Sat, Jun 19, 2021 at 07:46:28AM -0700, tony mancill wrote: > On Sat, Jun 19, 2021 at 10:29:25PM +0900, Hideki Yamane wrote: > > So let's remove its binary package and add Breaks: to it. > > MR is here, could someone review it, please? > > https://salsa.debian.org/java-team/uimaj/-/merge_requests/1 > > Thank you for addressing this. I will handle the merge and upload. > > Just one quick question... Why is the Breaks necessary? Is it there to > force removal of libuima-adapter-soap-java when libuima-core-java is > upgraded? Hi, I saw the note in the changelog that Breaks is in fact there to remove the empty package, but it's not happening for me when I try to upgrade locally. My test case is to install uima-utils (which will install libuima-adapter-soap-java via Recommends) and then try to upgrade the binaries to 2.10.2-4 using dpkg. dpkg: regarding libuima-core-java_2.10.2-4_all.deb containing libuima-core-java: libuima-core-java breaks libuima-adapter-soap-java (<< 2.10.2-4) libuima-adapter-soap-java (version 2.10.2-3) is present and installed. The only way I can make this work is remove libuima-adapter-soap-java manually. Are you sure that Breaks is necessary? apt-get autoremove will clean up libuima-adapter-soap-java at some point. I took a look at policy to see if Breaks + Replaces should be used in this situation, but I'm not sure it really applies (although I think it would work better than just Breaks). Still, I'm unsure about the need for Breaks for this empty package clean-up use case. From https://www.debian.org/doc/debian-policy/ch-relationships.html#s-breaks: > Neither Breaks nor Conflicts should be used unless two packages cannot > be installed at the same time or installing them both causes one of > them to be broken or unusable. Having similar functionality or > performing the same tasks as another package is not sufficient reason > to declare Breaks or Conflicts with that package. Any concerns if I drop the Breaks before the upload? Thanks, tony signature.asc Description: PGP signature
Bug#990140: upgrade-reports: lxc-attach does not start with apparmor problem after ugrade to 10.10
Hi Paul, thanks for your immediate response. Your assumption is right, booting into kernel 4.19.0-16 causes lxc-attach to behave as expected, no more apparmor related errors. Cheers Bernd Am 21.06.21 um 19:06 schrieb Paul Gevers: Hi Bernd, Thanks for your report. On 21-06-2021 18:04, Bernd Breuer wrote: after the recent upgrade to Buster 10.10 (including a kernel upgrade) the command 'lxc-attach' (out of the Linux Container (lxc) set of commands), typed in like "sudo lxc-attach " stopped working with the error message "lxc-attach: : lsm/lsm.c: lsm_process_label_set_at: 174 Operation not permitted - Failed to set AppArmor label "unconfined" The conainer itself is starting, but apparmor related config lines like "lxc.apparmor.profile = unconfined" produce the above mentioned error, also on another machine after the same packages upgrade. I expect lxc-attach to provide me a root shell in the running lxc-container like it was the case before the recent upgrade. As we didn't upgrade lxc during the point release, this *may* be caused by the updated Linux kernel. What happens if you reboot using the previous kernel? Paul
Bug#987461: marked as pending in uimaj
Control: tag -1 pending Hello, Bug #987461 in uimaj reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at: https://salsa.debian.org/java-team/uimaj/-/commit/035375ad019b8d65469db2a48f6bc3e0c0d45c5e Drop libuima-adapter-soap-java and add Breaks: to it (Closes: #987461) (this message was generated automatically) -- Greetings https://bugs.debian.org/987461
Processed: Bug#987461 marked as pending in uimaj
Processing control commands: > tag -1 pending Bug #987461 [libuima-adapter-soap-java] libuima-adapter-soap-java is empty Added tag(s) pending. -- 987461: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987461 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: [bts-link] source package src:python-enable
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:python-enable > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org Setting user to debian-bts-l...@lists.debian.org (was debian-bts-l...@lists.debian.org). > # remote status report for #951888 (http://bugs.debian.org/951888) > # Bug title: python-enable FTBFS with swig 4.0.1 > # * https://github.com/enthought/enable/issues/360 > # * remote status changed: open -> closed > # * closed upstream > tags 951888 + fixed-upstream Bug #951888 [src:python-enable] python-enable FTBFS with swig 4.0.1 Bug #972023 [src:python-enable] python-enable ftbfs with python3.9 as supported python3 version Added tag(s) fixed-upstream. Added tag(s) fixed-upstream. > usertags 951888 - status-open Usertags were: status-open. There are now no usertags set. > usertags 951888 + status-closed There were no usertags set. Usertags are now: status-closed. > # remote status report for #972023 (http://bugs.debian.org/972023) > # Bug title: python-enable ftbfs with python3.9 as supported python3 version > # * https://github.com/enthought/enable/issues/360 > # * remote status changed: open -> closed > # * closed upstream > tags 972023 + fixed-upstream Bug #972023 [src:python-enable] python-enable ftbfs with python3.9 as supported python3 version Bug #951888 [src:python-enable] python-enable FTBFS with swig 4.0.1 Ignoring request to alter tags of bug #972023 to the same tags previously set Ignoring request to alter tags of bug #951888 to the same tags previously set > usertags 972023 - status-open Usertags were: status-open. There are now no usertags set. > usertags 972023 + status-closed There were no usertags set. Usertags are now: status-closed. > thanks Stopping processing here. Please contact me if you need assistance. -- 951888: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951888 972023: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972023 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: duplicate
Processing commands for cont...@bugs.debian.org: > # try two > forcemerge 990072 990140 Bug #990072 {Done: Salvatore Bonaccorso } [src:linux] lxc-attach fails after debian 10.10 update Bug #990075 {Done: Salvatore Bonaccorso } [src:linux] lxc-attach fails after debian 10.10 update Bug #990089 {Done: Salvatore Bonaccorso } [src:linux] linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined Bug #990107 {Done: Salvatore Bonaccorso } [src:linux] linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set AppArmor label Bug #990140 [src:linux] upgrade-reports: lxc-attach does not start with apparmor problem after ugrade to 10.10 Severity set to 'serious' from 'normal' Marked Bug as done Added indication that 990140 affects release.debian.org,lxc Marked as fixed in versions linux/4.19.194-2. Marked as found in versions linux/4.19.194-1. Added tag(s) upstream, buster, moreinfo, fixed-upstream, and confirmed. Bug #990075 {Done: Salvatore Bonaccorso } [src:linux] lxc-attach fails after debian 10.10 update Bug #990089 {Done: Salvatore Bonaccorso } [src:linux] linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined Bug #990107 {Done: Salvatore Bonaccorso } [src:linux] linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set AppArmor label Merged 990072 990075 990089 990107 990140 > thanks Stopping processing here. Please contact me if you need assistance. -- 990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072 990075: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990075 990089: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990089 990107: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990107 990140: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990140 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#989749: marked as done (kore: flaky amd64 autopkgtest: regularly times out after 2:47 h)
Your message dated Mon, 21 Jun 2021 17:03:34 + with message-id and subject line Bug#989749: fixed in kore 4.1.0-3 has caused the Debian Bug report #989749, regarding kore: flaky amd64 autopkgtest: regularly times out after 2:47 h to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 989749: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989749 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: kore Version: 4.0.1-5 Severity: serious Tags: bulleye-ignore X-Debbugs-CC: debian...@lists.debian.org User: debian...@lists.debian.org Usertags: flaky timeout Dear maintainer(s), Your package has an autopkgtest, great. However, I looked into the history of your autopkgtest [1] and I noticed it fails regularly on amd64. I copied some of the output at the bottom of this report. It hits the autopkgtest time out after 2hours and 47 minutes. Successful runs pass in a couple of minutes. Weirdly enough, all the failures where the timeout happened is ci-worker13, which is our most powerful host, and as such we run 8 parallel debci instances there. The same host also sees successful runs. Do you have any idea what in the kore test could be hanging? Because the unstable-to-testing migration software now blocks on regressions in testing, flaky tests, i.e. tests that flip between passing and failing without changes to the list of installed packages, are causing people unrelated to your package to spend time on these tests. Don't hesitate to reach out if you need help and some more information from our infrastructure. Paul [Release team member hat on: as we are so late in the freeze, I don't want this bug to kick kore out of bulleye, although I still appreciate a fix or work around. Hence, the bulleye-ignore tag.] [1] https://ci.debian.net/packages/k/kore/testing/amd64/ https://ci.debian.net/data/autopkgtest/testing/amd64/k/kore/12824802/log.gz autopkgtest [22:19:09]: test myapp: [--- created myapp/src/myapp.c created myapp/conf/myapp.conf created myapp/conf/build.conf created myapp/.gitignore created dh2048.pem myapp created successfully! WARNING: DO NOT USE THE GENERATED DH PARAMETERS AND CERTIFICATES IN PRODUCTION active flavordev output type dso kore binary /usr/bin/kore kore features-DKORE_USE_PGSQL -DKORE_USE_TASKS -I/usr/include/postgresql autopkgtest [01:05:50]: ERROR: timed out on command "su -s /bin/bash debci -c set -e; export USER=`id -nu`; . /etc/profile >/dev/null 2>&1 || true; . ~/.profile >/dev/null 2>&1 || true; buildtree="/tmp/autopkgtest-lxc.4kfgq6b2/downtmp/build.2hy/src"; mkdir -p -m 1777 -- "/tmp/autopkgtest-lxc.4kfgq6b2/downtmp/myapp-artifacts"; export AUTOPKGTEST_ARTIFACTS="/tmp/autopkgtest-lxc.4kfgq6b2/downtmp/myapp-artifacts"; export ADT_ARTIFACTS="$AUTOPKGTEST_ARTIFACTS"; mkdir -p -m 755 "/tmp/autopkgtest-lxc.4kfgq6b2/downtmp/autopkgtest_tmp"; export AUTOPKGTEST_TMP="/tmp/autopkgtest-lxc.4kfgq6b2/downtmp/autopkgtest_tmp"; export ADTTMP="$AUTOPKGTEST_TMP"; export DEBIAN_FRONTEND=noninteractive; export LANG=C.UTF-8; export DEB_BUILD_OPTIONS=parallel=48; unset LANGUAGE LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT LC_IDENTIFICATION LC_ALL;rm -f /tmp/autopkgtest_script_pid; set -C; echo $$ > /tmp/autopkgtest_script_pid; set +C; trap "rm -f /tmp/autopkgtest_script_pid" EXIT INT QUIT PIPE; cd "$buildtree"; chmod +x /tmp/autopkgtest-lxc.4kfgq6b2/downtmp/build.2hy/src/debian/tests/myapp; touch /tmp/autopkgtest-lxc.4kfgq6b2/downtmp/myapp-stdout /tmp/autopkgtest-lxc.4kfgq6b2/downtmp/myapp-stderr; /tmp/autopkgtest-lxc.4kfgq6b2/downtmp/build.2hy/src/debian/tests/myapp 2> >(tee -a /tmp/autopkgtest-lxc.4kfgq6b2/downtmp/myapp-stderr >&2) > >(tee -a /tmp/autopkgtest-lxc.4kfgq6b2/downtmp/myapp-stdout);" (kind: test) autopkgtest [01:05:51]: test myapp: ---] OpenPGP_signature Description: OpenPGP digital signature --- End Message --- --- Begin Message --- Source: kore Source-Version: 4.1.0-3 Done: Shih-Yuan Lee (FourDollars) We believe that the bug you reported is fixed in the latest version of kore, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 989...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Shih-Yuan Lee (FourDollars) (supplier of updated kore package) (This m
Bug#990026: Commonly-in-use characters
So far, we identified "/" and "=" as characters which definitely should be restored in order to not break our installations. -- -- Matthias Urlichs OpenPGP_signature Description: OpenPGP digital signature
Bug#989069: nvidia-driver: Crash when displayport is plugged.
On 25 mai 2021 08:10, Andreas Beckmann wrote: [...] >> Bug already reported upstream here : > > Not much we can do here :-( (besides not migrating this version to bullseye) Seems to be fixed : https://forums.developer.nvidia.com/t/465-24-02-page-fault/175782/135 Christian
Bug#897707: Should this package be removed from Debian?
Control: user debian...@lists.debian.org Control: usertag -1 + proposed-removal Given that this RC bug and #892288 have been unresolved for several years and the last upload dates back to 2016 with multiple upstream releases since, I believe this package should be considered for QA removal. Cheers Timo -- ⢀⣴⠾⠻⢶⣦⠀ ╭╮ ⣾⠁⢠⠒⠀⣿⡁ │ Timo Röhling │ ⢿⡄⠘⠷⠚⠋⠀ │ 9B03 EBB9 8300 DF97 C2B1 23BF CC8C 6BDD 1403 F4CA │ ⠈⠳⣄ ╰╯ signature.asc Description: PGP signature
Bug#989731: marked as done (postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c)
Your message dated Mon, 21 Jun 2021 14:20:29 + with message-id and subject line Bug#989731: fixed in postgresql-q3c 2.0.0-5 has caused the Debian Bug report #989731, regarding postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 989731: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989731 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: postgresql-13-pgsphere Version: 1.1.1+2020-10-20-1 Severity: serious Control: clone -1 -2 Control: reassign -2 postgresql-13-q3c 2.0.0-4 Control: retitle -1 postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c In https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984555#44 Markus Demleitner wrote: > One thing that needs to be > ensured, though, is that on upgrades, the old pgsphere packages do > not get removed until the operator asks dpkg to explicitly. Perhaps > stating the obvious, here's what needs to happen when upgrading from, > say pg 11 to 13: > > (1) normal dist-upgrade pulls in (hopefully) postgres-13, keeps > postgres-11 running as normal (hence, pgsphere-11 must still be > there). > (2) operator runs pg_upgrade (for which both pg-13 and pg-11 must be > present with all necessary extensions) > (3) the last step of pg_upgrade is to make pg-13 the default db server, > and pg-11 isn't started any more > (4) the operator can now purge postgres-11 together with the > version 11 extensions. This is currently not possible, since postgresql-13-pgsphere has Conflicts+Replaces: postgresql-pgsphere (<< 1.1.1+2020) (and C+R: postgresql-q3c (<< 2.0.0-2) for postgresql-13-q3c). I do not know if other extension packages have the same bug. (gavodachs2-server seems to be one of the few packages actually needing some extensions (pgsphere and q3c) and thus exhibiting upgrade errors.) I think these Conflicts+Replaces can be safely dropped, since all files in these packages are in versioned (/13/) paths and therefore cannot cause file conflicts with the unversioned package in buster that ships everything (but documentation) in versioned (/11/) paths. But I may be overlooking something ... Andreas --- End Message --- --- Begin Message --- Source: postgresql-q3c Source-Version: 2.0.0-5 Done: Ole Streicher We believe that the bug you reported is fixed in the latest version of postgresql-q3c, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 989...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ole Streicher (supplier of updated postgresql-q3c package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 21 Jun 2021 15:37:28 +0200 Source: postgresql-q3c Architecture: source Version: 2.0.0-5 Distribution: unstable Urgency: medium Maintainer: Debian PostgreSQL Maintainers Changed-By: Ole Streicher Closes: 989731 Changes: postgresql-q3c (2.0.0-5) unstable; urgency=medium . * Remove Conflitcs+Replaces: postgresql-pgsphere (Closes: #989731) Checksums-Sha1: 59b35bd8386b734499d8fd32f12f23f4ebb2dac6 2193 postgresql-q3c_2.0.0-5.dsc 436880605a49959817044f187d8d7ff0e6527bf3 4556 postgresql-q3c_2.0.0-5.debian.tar.xz Checksums-Sha256: 2644ffbd9170f49d8e2a2c7708d7538078e4d06d821b773c3001a84aa6bcbc7b 2193 postgresql-q3c_2.0.0-5.dsc c26c28b477c212e410f8fab77191997c9fa470464e6eaa8bbc65d514917982ce 4556 postgresql-q3c_2.0.0-5.debian.tar.xz Files: 1b0e8f76e815af988dc892d7bd96ec3e 2193 database optional postgresql-q3c_2.0.0-5.dsc 79b38e64cb4aec02c9cde98b5ce91bcf 4556 database optional postgresql-q3c_2.0.0-5.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEuvxshffLFD/utvsVcRWv0HcQ3PcFAmDQlq8ACgkQcRWv0HcQ 3PcEDw//XfFFPGUf+u2S72nQtqNz7TnpAgcmYJb5tXGeJjtfMSRoC37qZndPDTNa 7NhSgCDELMAmrVbdeHWUU7ipDvqzsmZwshxYTWuh0TmPxEA1Zh/MU2ZBmO5+Olhh DdqJ9yxtBSBbvbnSYaJZtWl8uC6W++IPKrZC7f9cZPdSxdRcTYu4uD8n27tlnNQ7 FKoOxclBMUayoEJGJpuP22uGfGKnwBv0w4uTnpHdPnOZKmdZKLx9arRpgB2rEv+b gJjgRivCz2G3L7LS5iIr06L/M6Mk5ynA1HtPyAeHJOmtxRWJ8L/xCYdffZ7vZfoT 9RcwbkGPKMPk2xOTbz4P1MjSdXgxdgyPU5uXMGXDRwr+3wzvRWPvQQKJRix/Lgz1 o2gJNduo+0yEDw1j2kuBAt0jOxoQdDOpHJ55h/yKiKzuxys9BX2qjg0KeauFSjDI CsrZBjKAjDcIyAwlHD
Bug#989732: marked as done (postgresql-13-pgsphere: drop Conflicts+Replaces: postgresql-pgsphere)
Your message dated Mon, 21 Jun 2021 15:54:52 +0200 with message-id <860266c8-670f-97ca-b852-954ef8389...@debian.org> and subject line Bug#989732: fixed in pgsphere 1.1.1+2020-10-20-2 has caused the Debian Bug report #989732, regarding postgresql-13-pgsphere: drop Conflicts+Replaces: postgresql-pgsphere to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 989732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989732 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: postgresql-13-pgsphere Version: 1.1.1+2020-10-20-1 Severity: serious Control: clone -1 -2 Control: reassign -2 postgresql-13-q3c 2.0.0-4 Control: retitle -1 postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c In https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984555#44 Markus Demleitner wrote: > One thing that needs to be > ensured, though, is that on upgrades, the old pgsphere packages do > not get removed until the operator asks dpkg to explicitly. Perhaps > stating the obvious, here's what needs to happen when upgrading from, > say pg 11 to 13: > > (1) normal dist-upgrade pulls in (hopefully) postgres-13, keeps > postgres-11 running as normal (hence, pgsphere-11 must still be > there). > (2) operator runs pg_upgrade (for which both pg-13 and pg-11 must be > present with all necessary extensions) > (3) the last step of pg_upgrade is to make pg-13 the default db server, > and pg-11 isn't started any more > (4) the operator can now purge postgres-11 together with the > version 11 extensions. This is currently not possible, since postgresql-13-pgsphere has Conflicts+Replaces: postgresql-pgsphere (<< 1.1.1+2020) (and C+R: postgresql-q3c (<< 2.0.0-2) for postgresql-13-q3c). I do not know if other extension packages have the same bug. (gavodachs2-server seems to be one of the few packages actually needing some extensions (pgsphere and q3c) and thus exhibiting upgrade errors.) I think these Conflicts+Replaces can be safely dropped, since all files in these packages are in versioned (/13/) paths and therefore cannot cause file conflicts with the unversioned package in buster that ships everything (but documentation) in versioned (/11/) paths. But I may be overlooking something ... Andreas --- End Message --- --- Begin Message --- Source: pgsphere Source-Version: 1.1.1+2020-10-20-2 Done: Ole Streicher We believe that the bug you reported is fixed in the latest version of pgsphere, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 989...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ole Streicher (supplier of updated pgsphere package) (This message was generated manually since I used the wrong bug id in d/changelog) Format: 1.8 Date: Mon, 21 Jun 2021 15:29:03 +0200 Source: pgsphere Architecture: source Version: 1.1.1+2020-10-20-2 Distribution: unstable Urgency: medium Maintainer: Debian PostgreSQL Maintainers Changed-By: Ole Streicher Closes: 989731 Changes: pgsphere (1.1.1+2020-10-20-2) unstable; urgency=medium . * Remove Conflitcs+Replaces: postgresql-pgsphere (Closes: #989731) Checksums-Sha1: b2c7516366882d29dd5a8697f04fe3545168e6b5 2230 pgsphere_1.1.1+2020-10-20-2.dsc 4551552bde5f6ea3dd53d8297d2893df97173cdf 4064 pgsphere_1.1.1+2020-10-20-2.debian.tar.xz Checksums-Sha256: 2916696b2beb8da9f4e1a2b9addbbff72225a38b24ffd9f72bab70bea2ca0435 2230 pgsphere_1.1.1+2020-10-20-2.dsc e1d4de133f1ce19d8c24d2e927a94c4913574d9509d1f8e469c3ff9df71113f6 4064 pgsphere_1.1.1+2020-10-20-2.debian.tar.xz Files: 66f1fd138c1f9e59c69a7b4cc0fe5cbb 2230 database optional pgsphere_1.1.1+2020-10-20-2.dsc f7af61ce75e7898c3673baff2391802b 4064 database optional pgsphere_1.1.1+2020-10-20-2.debian.tar.xz--- End Message ---
Bug#989731: marked as done (postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c)
Your message dated Mon, 21 Jun 2021 13:48:29 + with message-id and subject line Bug#989731: fixed in pgsphere 1.1.1+2020-10-20-2 has caused the Debian Bug report #989731, regarding postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 989731: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989731 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: postgresql-13-pgsphere Version: 1.1.1+2020-10-20-1 Severity: serious Control: clone -1 -2 Control: reassign -2 postgresql-13-q3c 2.0.0-4 Control: retitle -1 postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c In https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984555#44 Markus Demleitner wrote: > One thing that needs to be > ensured, though, is that on upgrades, the old pgsphere packages do > not get removed until the operator asks dpkg to explicitly. Perhaps > stating the obvious, here's what needs to happen when upgrading from, > say pg 11 to 13: > > (1) normal dist-upgrade pulls in (hopefully) postgres-13, keeps > postgres-11 running as normal (hence, pgsphere-11 must still be > there). > (2) operator runs pg_upgrade (for which both pg-13 and pg-11 must be > present with all necessary extensions) > (3) the last step of pg_upgrade is to make pg-13 the default db server, > and pg-11 isn't started any more > (4) the operator can now purge postgres-11 together with the > version 11 extensions. This is currently not possible, since postgresql-13-pgsphere has Conflicts+Replaces: postgresql-pgsphere (<< 1.1.1+2020) (and C+R: postgresql-q3c (<< 2.0.0-2) for postgresql-13-q3c). I do not know if other extension packages have the same bug. (gavodachs2-server seems to be one of the few packages actually needing some extensions (pgsphere and q3c) and thus exhibiting upgrade errors.) I think these Conflicts+Replaces can be safely dropped, since all files in these packages are in versioned (/13/) paths and therefore cannot cause file conflicts with the unversioned package in buster that ships everything (but documentation) in versioned (/11/) paths. But I may be overlooking something ... Andreas --- End Message --- --- Begin Message --- Source: pgsphere Source-Version: 1.1.1+2020-10-20-2 Done: Ole Streicher We believe that the bug you reported is fixed in the latest version of pgsphere, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 989...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ole Streicher (supplier of updated pgsphere package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 21 Jun 2021 15:29:03 +0200 Source: pgsphere Architecture: source Version: 1.1.1+2020-10-20-2 Distribution: unstable Urgency: medium Maintainer: Debian PostgreSQL Maintainers Changed-By: Ole Streicher Closes: 989731 Changes: pgsphere (1.1.1+2020-10-20-2) unstable; urgency=medium . * Remove Conflitcs+Replaces: postgresql-pgsphere (Closes: #989731) Checksums-Sha1: b2c7516366882d29dd5a8697f04fe3545168e6b5 2230 pgsphere_1.1.1+2020-10-20-2.dsc 4551552bde5f6ea3dd53d8297d2893df97173cdf 4064 pgsphere_1.1.1+2020-10-20-2.debian.tar.xz Checksums-Sha256: 2916696b2beb8da9f4e1a2b9addbbff72225a38b24ffd9f72bab70bea2ca0435 2230 pgsphere_1.1.1+2020-10-20-2.dsc e1d4de133f1ce19d8c24d2e927a94c4913574d9509d1f8e469c3ff9df71113f6 4064 pgsphere_1.1.1+2020-10-20-2.debian.tar.xz Files: 66f1fd138c1f9e59c69a7b4cc0fe5cbb 2230 database optional pgsphere_1.1.1+2020-10-20-2.dsc f7af61ce75e7898c3673baff2391802b 4064 database optional pgsphere_1.1.1+2020-10-20-2.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEuvxshffLFD/utvsVcRWv0HcQ3PcFAmDQlZAACgkQcRWv0HcQ 3Pd9bg//TSgiHczYxt/7011tzl8fpwxqyN3cH0l826hCLwfpBZB9p9teDpi53vma Xu99bdzRMW1xTJrAFRDc3k3UIuHJjWEya39gEI6Yem8hM3vGmknG5FdzmP501SEh aUb0ol2r80HzzKro6kk5Z+/1SWo0j4vdmngIwaTnEQX/chdv9Hem79ERHWNx5taj lk31TqEJfFO/g6bWP3Q1PiI+dap70fmzlBGwPlFrZAjueMlUZcyQbkZ/yJamki6U dO17X+17L6vMu4c8q6L0/wCwBKccgUhDcSYWCGNxFab7l/lCv5MUQ7WWFpkwRuY/ Q5h0tpjU707wzRUbSLlvUlWfiaByDLB0yXWZvXMiPeW5u08LA0upM1NDOo/X7mnc 1DajQaW7nwepmV+FgdZ+vS+x3QGzObGfSiR5hxb1s1gX1
Bug#989731: marked as pending in postgresql-q3c
Control: tag -1 pending Hello, Bug #989731 in postgresql-q3c reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at: https://salsa.debian.org/postgresql/postgresql-q3c/-/commit/2e7c5a6ec5d0c66a82f27f43f2f8df1d42ba2db1 Remove Conflitcs+Replaces: postgresql-pgsphere Closes: #989731 (this message was generated automatically) -- Greetings https://bugs.debian.org/989731
Processed: Bug#989731 marked as pending in postgresql-q3c
Processing control commands: > tag -1 pending Bug #989731 [postgresql-13-pgsphere] postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c Ignoring request to alter tags of bug #989731 to the same tags previously set -- 989731: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989731 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: Bug#989731 marked as pending in pgsphere
Processing control commands: > tag -1 pending Bug #989731 [postgresql-13-pgsphere] postgresql-13-q3c: drop Conflicts+Replaces: postgresql-q3c Added tag(s) pending. -- 989731: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989731 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#989731: marked as pending in pgsphere
Control: tag -1 pending Hello, Bug #989731 in pgsphere reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at: https://salsa.debian.org/postgresql/pgsphere/-/commit/f43a8809f78aead16d2a62714d0094f18a1c9272 Remove Conflitcs+Replaces: postgresql-pgsphere Closes: #989731 (this message was generated automatically) -- Greetings https://bugs.debian.org/989731
Processed: found 990123 in iptables-netflow/2.3-5, found 990123 in iptables-netflow/2.5.1-2 ...
Processing commands for cont...@bugs.debian.org: > # Version tracking seems to not have worked properly in the initial bug > submission > found 990123 iptables-netflow/2.3-5 Bug #990123 [iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' Marked as found in versions iptables-netflow/2.3-5. Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' > found 990123 iptables-netflow/2.5.1-2 Bug #990123 [iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' Marked as found in versions iptables-netflow/2.5.1-2. Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' > found 990123 linux/4.19.194-1 Bug #990123 [iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae] [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?) Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' Marked as found in versions linux/4.19.194-1. Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae' > thanks Stopping processing here. Please contact me if you need assistance. -- 990123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990123 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#990107: marked as done (linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set AppArmor label)
Your message dated Mon, 21 Jun 2021 12:02:07 + with message-id and subject line Bug#990072: fixed in linux 4.19.194-2 has caused the Debian Bug report #990072, regarding linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set AppArmor label to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:linux Version: 4.19.194-1 Severity: normal Since upgrading to linux-image-4.19.0-17-amd64 from linux-image-4.19.0-16-amd64, I can no longer enter my lxc container with the command 'lxc-attach'. It fails with the message: lxc-attach: shire: lsm/lsm.c: lsm_process_label_set_at: 174 Operation not permitted - Failed to set AppArmor label "lxc-shire_//&:lxc-shire_<-var-lib-lxc>: unconfined" Reverting to linux-image-4.19.0-16-amd64 version 4.19.181-1 (the previous kernel) fixes the issue. The lxc config for this container is the following: lxc.include = /usr/share/lxc/config/common.conf lxc.include = /usr/share/lxc/config/userns.conf lxc.arch = linux64 lxc.apparmor.profile = generated lxc.apparmor.allow_nesting = 1 lxc.idmap = u 0 10 90 lxc.idmap = g 0 10 90 lxc.rootfs.path = dir:/var/lib/lxc/shire/rootfs lxc.uts.name = shire lxc.net.0.type = empty lxc.mount.entry=/data/home home none bind 0 0 lxc.mount.entry=/data/mail var/mail none bind 0 0 And the auto-generated AppArmor profile: #include profile "lxc-shire_" flags=(attach_disconnected,mediate_deleted) { ### Base profile capability, dbus, file, network, umount, # Allow us to receive signals from anywhere. signal (receive), # Allow us to send signals to ourselves signal peer=@{profile_name}, # Allow other processes to read our /proc entries, futexes, perf tracing and # kcmp for now (they will need 'read' in the first place). Administrators can # override with: # deny ptrace (readby) ... ptrace (readby), # Allow other processes to trace us by default (they will need 'trace' in # the first place). Administrators can override with: # deny ptrace (tracedby) ... ptrace (tracedby), # Allow us to ptrace ourselves ptrace peer=@{profile_name}, # ignore DENIED message on / remount deny mount options=(ro, remount) -> /, deny mount options=(ro, remount, silent) -> /, # allow tmpfs mounts everywhere mount fstype=tmpfs, # allow hugetlbfs mounts everywhere mount fstype=hugetlbfs, # allow mqueue mounts everywhere mount fstype=mqueue, # allow fuse mounts everywhere mount fstype=fuse, mount fstype=fuse.*, # deny access under /proc/bus to avoid e.g. messing with pci devices directly deny @{PROC}/bus/** wklx, # deny writes in /proc/sys/fs but allow binfmt_misc to be mounted mount fstype=binfmt_misc -> /proc/sys/fs/binfmt_misc/, deny @{PROC}/sys/fs/** wklx, # allow efivars to be mounted, writing to it will be blocked though mount fstype=efivarfs -> /sys/firmware/efi/efivars/, # block some other dangerous paths deny @{PROC}/kcore rwklx, deny @{PROC}/sysrq-trigger rwklx, # deny writes in /sys except for /sys/fs/cgroup, also allow # fusectl, securityfs and debugfs to be mounted there (read-only) mount fstype=fusectl -> /sys/fs/fuse/connections/, mount fstype=securityfs -> /sys/kernel/security/, mount fstype=debugfs -> /sys/kernel/debug/, deny mount fstype=debugfs -> /var/lib/ureadahead/debugfs/, mount fstype=proc -> /proc/, mount fstype=sysfs -> /sys/, mount options=(rw, nosuid, nodev, noexec, remount) -> /sys/, deny /sys/firmware/efi/efivars/** rwklx, # note, /sys/kernel/security/** handled below mount options=(ro, nosuid, nodev, noexec, remount, strictatime) -> /sys/fs/cgroup/, # deny reads from debugfs deny /sys/kernel/debug/{,**} rwklx, # allow paths to be made slave, shared, private or unbindable # FIXME: This currently doesn't work due to the apparmor parser treating those as allowing all mounts. # mount options=(rw,make-slave) -> **, # mount options=(rw,make-rslave) -> **, # mount options=(rw,make-shared) -> **, # mount options=(rw,make-rshared) -> **, # mount options=(rw,make-private) -> **, # mount options=(rw,make-rprivate) -> **, # mount options=(rw,make-unbindable) -> **, # mount options=(rw,make-runbindable) -> **, # allow bind-mounts of anything except /proc, /sys and /dev mount options=(rw,bind) /[^spd]*{,/**}, mount options=(rw,bind) /d[^e]*{,/**}, mount options=(rw,bind) /de[^v]*{,/**}, mount options=(rw,bin
Bug#990089: marked as done (linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined)
Your message dated Mon, 21 Jun 2021 12:02:07 + with message-id and subject line Bug#990072: fixed in linux 4.19.194-2 has caused the Debian Bug report #990072, regarding linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:linux Version: 4.19.194-1 Severity: normal Dear Maintainer, After upgrading from linux-image-4.19.0-16-amd64 to linux-image-4.19.0-17-amd64 attaching an unprivileged linux container fails with the message: lxc-attach: debian-buster-amd64-basic: lsm/lsm.c: lsm_process_label_set_at: 174 Operation not permitted - Failed to set AppArmor label "unconfined" Rebooting into linux-image-4.19.0-16-amd64 with no other changes, the lxc system works as expected. Regrads, Mark Grant -- Package-specific info: ** Version: Linux version 4.19.0-17-amd64 (debian-ker...@lists.debian.org) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.194-1 (2021-06-10) ** Command line: BOOT_IMAGE=/vmlinuz-4.19.0-17-amd64 root=/dev/mapper/priam--vg-root ro ** Not tainted ** Kernel log: [ 14.211487] snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 [ 14.211554] snd_hda_codec_realtek hdaudioC0D0: Line=0x1a [ 14.351839] input: HDA Intel PCH Front Mic as /devices/pci:00/:00:1f.3/sound/card0/input10 [ 14.351896] input: HDA Intel PCH Rear Mic as /devices/pci:00/:00:1f.3/sound/card0/input11 [ 14.351941] input: HDA Intel PCH Line as /devices/pci:00/:00:1f.3/sound/card0/input12 [ 14.351981] input: HDA Intel PCH Line Out as /devices/pci:00/:00:1f.3/sound/card0/input13 [ 14.352023] input: HDA Intel PCH Front Headphone as /devices/pci:00/:00:1f.3/sound/card0/input14 [ 14.352071] input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci:00/:00:1f.3/sound/card0/input15 [ 14.352116] input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci:00/:00:1f.3/sound/card0/input16 [ 14.352164] input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci:00/:00:1f.3/sound/card0/input17 [ 14.352214] input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci:00/:00:1f.3/sound/card0/input18 [ 14.352257] input: HDA Intel PCH HDMI/DP,pcm=10 as /devices/pci:00/:00:1f.3/sound/card0/input19 [ 14.562406] EXT4-fs (dm-2): mounted filesystem with ordered data mode. Opts: errors=remount-ro [ 14.743100] EXT4-fs (sda1): mounting ext2 file system using the ext4 subsystem [ 14.815334] EXT4-fs (sda1): mounted filesystem without journal. Opts: (null) [ 15.862180] audit: type=1400 audit(1624175633.583:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=651 comm="apparmor_parser" [ 15.864947] audit: type=1400 audit(1624175633.583:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=651 comm="apparmor_parser" [ 15.876271] audit: type=1400 audit(1624175633.595:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=650 comm="apparmor_parser" [ 15.879040] audit: type=1400 audit(1624175633.595:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=650 comm="apparmor_parser" [ 15.881633] audit: type=1400 audit(1624175633.595:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=650 comm="apparmor_parser" [ 15.916140] audit: type=1400 audit(1624175633.635:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" pid=654 comm="apparmor_parser" [ 15.920983] audit: type=1400 audit(1624175633.639:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=649 comm="apparmor_parser" [ 15.972116] audit: type=1400 audit(1624175633.691:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default" pid=659 comm="apparmor_parser" [ 15.975071] audit: type=1400 audit(1624175633.691:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-cgns" pid=659 comm="apparmor_parser" [ 15.977826] audit: type=1400 audit(1624175633.691:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-mounting" pid=659 comm="apparmor_parser" [ 16.845248] usb 1-8: reset high-speed USB device number 3 using xhci_hcd [ 17.604508] new mount o
Bug#990072: marked as done (lxc-attach fails after debian 10.10 update)
Your message dated Mon, 21 Jun 2021 12:02:07 + with message-id and subject line Bug#990072: fixed in linux 4.19.194-2 has caused the Debian Bug report #990072, regarding lxc-attach fails after debian 10.10 update to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: lxc Version: 1:3.1.0+really3.0.3-8 Severity: grave Justification: renders package unusable Dear Maintainer, Applied latest apt updates (debian 10.10) and rebooted. After reboot, lxc-attach doesn't work. from /var/log/apt/history.log: Start-Date: 2021-06-19 12:27:42 Commandline: apt-get dist-upgrade Requested-By: matthew (1011) Install: linux-headers-4.19.0-17-common:amd64 (4.19.194-1, automatic), linux-headers-4.19.0-17-amd64:amd64 (4.19.194-1, automatic), linux-image-4.19.0-17-amd64:amd64 (4.19.194-1, automatic) Upgrade: libapt-inst2.0:amd64 (1.8.2.2, 1.8.2.3), apt:amd64 (1.8.2.2, 1.8.2.3), mariadb-common:amd64 (1:10.3.27-0+deb10u1, 1:10.3.29-0+deb10u1), linux-compiler-gcc-8-x86:amd64 (4.19.181-1, 4.19.194-1), libklibc:amd64 (2.0.6-1, 2.0.6-1+deb10u1), libcpupower1:amd64 (4.19.181-1, 4.19.194-1), libapt-pkg5.0:amd64 (1.8.2.2, 1.8.2.3), shim-helpers-amd64-signed:amd64 (1+15+1533136590.3beb971+7+deb10u1, 1+15.4+5~deb10u1), linux-image-amd64:amd64 (4.19+105+deb10u11, 4.19+105+deb10u12), libgcrypt20:amd64 (1.8.4-5, 1.8.4-5+deb10u1), linux-headers-amd64:amd64 (4.19+105+deb10u11, 4.19+105+deb10u12), libhogweed4:amd64 (3.4.1-1, 3.4.1-1+deb10u1), apt-utils:amd64 (1.8.2.2, 1.8.2.3), shim-unsigned:amd64 (15+1533136590.3beb971-7+deb10u1, 15.4-5~deb10u1), shim-signed:amd64 (1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1), libnettle6:amd64 (3.4.1-1, 3.4.1-1+deb10u1), libxml2:amd64 (2.9.4+dfsg1-7+deb10u1, 2.9.4+dfsg1-7+deb10u2), libmariadb3:amd64 (1:10.3.27-0+deb10u1, 1:10.3.29-0+deb10u1), libgnutls30:amd64 (3.6.7-4+deb10u6, 3.6.7-4+deb10u7), linux-kbuild-4.19:amd64 (4.19.181-1, 4.19.194-1), klibc-utils:amd64 (2.0.6-1, 2.0.6-1+deb10u1), libglib2.0-0:amd64 (2.58.3-2+deb10u2, 2.58.3-2+deb10u3), shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1), linux-cpupower:amd64 (4.19.181-1, 4.19.194-1), base-files:amd64 (10.3+deb10u9, 10.3+deb10u10) End-Date: 2021-06-19 12:29:41 $ lxc-attach mar-mon1 lxc-attach: mar-mon1: lsm/lsm.c: lsm_process_label_set_at: 174 Operation not permitted - Failed to set AppArmor label "lxc-mar-mon1_//&:lxc-mar-mon1_<-var-lib-lxc>:unconfined" The lxc-config file contains lxc.apparmor.profile = generated lxc.apparmor.allow_nesting = 1 The generated apparmor seems unchanged when I compare it to containers on a server I didn't reboot. I did reboot 2 servers after this debian update, and both have this problem. -- System Information: Debian Release: 10.10 APT prefers stable APT policy: (500, 'stable'), (90, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-17-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages lxc depends on: ii debconf [debconf-2.0] 1.5.71 ii libc6 2.28-10 ii libcap21:2.25-2 ii libgnutls303.6.7-4+deb10u7 ii liblxc11:3.1.0+really3.0.3-8 ii libseccomp22.3.3-4 ii libselinux12.8-1+b1 ii lsb-base 10.2019051400 Versions of packages lxc recommends: ii apparmor 2.13.2-10 ii bridge-utils 1.6-2 pn debootstrap ii dirmngr2.2.12-1+deb10u1 pn dnsmasq-base ii gnupg 2.2.12-1+deb10u1 ii iproute2 4.20.0-2+deb10u1 ii iptables 1.8.2-4 pn libpam-cgfs pn lxc-templates ii lxcfs 3.0.3-2 ii openssl1.1.1d-0+deb10u6 pn rsync pn uidmap Versions of packages lxc suggests: pn btrfs-progs pn lvm2 pn python3-lxc -- debconf information excluded --- End Message --- --- Begin Message --- Source: linux Source-Version: 4.19.194-2 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments ple
Bug#990075: marked as done (lxc-attach fails after debian 10.10 update)
Your message dated Mon, 21 Jun 2021 12:02:07 + with message-id and subject line Bug#990072: fixed in linux 4.19.194-2 has caused the Debian Bug report #990072, regarding lxc-attach fails after debian 10.10 update to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: lxc Version: 1:3.1.0+really3.0.3-8 Severity: grave Justification: renders package unusable Dear Maintainer, Applied latest apt updates (debian 10.10) and rebooted. After reboot, lxc-attach doesn't work. from /var/log/apt/history.log: Start-Date: 2021-06-19 12:27:42 Commandline: apt-get dist-upgrade Requested-By: matthew (1011) Install: linux-headers-4.19.0-17-common:amd64 (4.19.194-1, automatic), linux-headers-4.19.0-17-amd64:amd64 (4.19.194-1, automatic), linux-image-4.19.0-17-amd64:amd64 (4.19.194-1, automatic) Upgrade: libapt-inst2.0:amd64 (1.8.2.2, 1.8.2.3),apt:amd64 (1.8.2.2, 1.8.2.3), mariadb-common:amd64 (1:10.3.27-0+deb10u1, 1:10.3.29-0+deb10u1), linux-compiler-gcc-8-x86:amd64 (4.19.181-1, 4.19.194-1), libklibc:amd64 (2.0.6-1, 2.0.6-1+deb10u1), libcpupower1:amd64 (4.19.181-1, 4.19.194-1), libapt-pkg5.0:amd64 (1.8.2.2, 1.8.2.3), shim-helpers-amd64-signed:amd64 (1+15+1533136590.3beb971+7+deb10u1, 1+15.4+5~deb10u1), linux-image-amd64:amd64 (4.19+105+deb10u11, 4.19+105+deb10u12), libgcrypt20:amd64 (1.8.4-5, 1.8.4-5+deb10u1), linux-headers-amd64:amd64 (4.19+105+deb10u11, 4.19+105+deb10u12), libhogweed4:amd64 (3.4.1-1, 3.4.1-1+deb10u1), apt-utils:amd64 (1.8.2.2, 1.8.2.3), shim-unsigned:amd64 (15+1533136590.3beb971-7+deb10u1, 15.4-5~deb10u1), shim-signed:amd64 (1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1), libnettle6:amd64 (3.4.1-1, 3.4.1-1+deb10u1), libxml2:amd64 (2.9.4+dfsg1-7+deb10u1, 2.9.4+dfsg1-7+deb10u2), libmariadb3:amd64 (1:10.3.27-0+deb10u1, 1:10.3.29-0+deb10u1), libgnutls30:amd64 (3.6.7-4+deb10u6, 3.6.7-4+deb10u7), linux-kbuild-4.19:amd64 (4.19.181-1, 4.19.194-1), klibc-utils:amd64 (2.0.6-1, 2.0.6-1+deb10u1), libglib2.0-0:amd64 (2.58.3-2+deb10u2, 2.58.3-2+deb10u3), shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1), linux-cpupower:amd64 (4.19.181-1, 4.19.194-1), base-files:amd64 (10.3+deb10u9, 10.3+deb10u10) End-Date: 2021-06-19 12:29:41 $ lxc-attach mar-mon1 lxc-attach: mar-mon1: lsm/lsm.c: lsm_process_label_set_at: 174 Operation not permitted - Failed to set AppArmor label "lxc-mar-mon1_//&:lxc-mar-mon1_<-var-lib-lxc>:unconfined" The lxc-config file contains lxc.apparmor.profile = generated lxc.apparmor.allow_nesting = 1 The generated apparmor seems unchanged when I compare it to containers on a server I didn't reboot. I did reboot 2 servers after this debian update, and both have this problem. -- System Information: Debian Release: 10.10 APT prefers stable APT policy: (500, 'stable'), (90, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-17-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages lxc depends on: ii debconf [debconf-2.0] 1.5.71 ii libc6 2.28-10 ii libcap21:2.25-2 ii libgnutls303.6.7-4+deb10u7 ii liblxc11:3.1.0+really3.0.3-8 ii libseccomp22.3.3-4 ii libselinux12.8-1+b1 ii lsb-base 10.2019051400 Versions of packages lxc recommends: ii apparmor 2.13.2-10 ii bridge-utils 1.6-2 pn debootstrap ii dirmngr2.2.12-1+deb10u1 pn dnsmasq-base ii gnupg 2.2.12-1+deb10u1 ii iproute2 4.20.0-2+deb10u1 ii iptables 1.8.2-4 pn libpam-cgfs pn lxc-templates ii lxcfs 3.0.3-2 ii openssl1.1.1d-0+deb10u6 pn rsync pn uidmap Versions of packages lxc suggests: pn btrfs-progs pn lvm2 pn python3-lxc --- End Message --- --- Begin Message --- Source: linux Source-Version: 4.19.194-2 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 990...@bugs.d
Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?)
Package: iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae Severity: serious Version: iptables-netflow/2.3-5 Version: iptables-netflow/2.5.1-2 Version: linux/4.19.194-1 Tags: buster Forwarded: https://github.com/aabc/ipt-netflow/issues/177 Since kernel packages linux-{image,headers}-4.19.0-17-*, at least with -amd64 and -i686-pae, iptables-netflow-dkms no more compiles its kernel module upon kernel installation: In file included from /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:75: /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c: In function ‘register_ct_events’: /var/lib/dkms/ipt-netflow/2.3/build/compat.h:173:21: error: implicit declaration of function ‘ref_module’; did you mean ‘use_module’? [-Werror=implicit-function-declaration] # define use_module ref_module ^~ /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:5399:3: note: in expansion of macro ‘use_module’ use_module(THIS_MODULE, netlink_m); ^~ Reading the kernel changelog, there are a few very suspicious entries listed under upstream version 4.19.191: - modules: mark ref_module static - modules: mark find_symbol static - modules: mark each_symbol_section static One of the commits above (8745aa4e resp. 7ef5264d) states: ref_module isn't used anywhere outside of module.c. Which is only seems true if you ignore any third-party kernel modules out there. So why is the kernel API suddenly removing API-code used by third-party modules inmidst a stable update? This looks like a regression to me. I thought that stable updates only change the ABI, but not the API. (Well, at least upstream and in Debian. :-) I also tried the iptables-netflow-dkms 2.5.1-2 from Bullseye on Buster, but it fails to build the kernel module for 4.19.0-17-* when as well. 2.5.1-2 though still works fine on Sid/Bullseye, hence marked as found in the version in Sid, but tagged buster. In case this causes issues in the BTS or the release team scripts, please rather remove 2.5.1-2 from the "found" versions instead of removing the buster tag — unless the same regression gets introduced into Sid and Bullseye as well. Debian kernel maintainers: If this 3rd-party-module-breaking regression was really intended and won't be fixed, please reassign the bug to iptables-netflow-dkms only. I also reported this issue to iptables-netflow upstream at https://github.com/aabc/ipt-netflow/issues/177 as I think it at least should update the version based ifdef checks in something which looks like a similar issue in kernel 5.13, see https://github.com/aabc/ipt-netflow/commit/5aae3791922bd3df878605b15e83ea48a4bd096c which is part of iptables-netflow upstream's 2.6 release, not yet packaged due to the freeze for bullseye. I'll try and see if I can get that fix backported to the package in buster (and if needed, later to the one in bullseye as well) and will see if it actually helps in this case, too. JFTR: dkms from buster-backports (as reported below) is only installed as I needed it for the iptables-netflow-dkms package from bullseye. It happened with dkms from buster before as well. -- System Information: Debian Release: 10.10 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-debug'), (500, 'stable'), (400, 'proposed-updates-debug'), (400, 'proposed-updates') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-12-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages iptables-netflow-dkms depends on: ii dkms2.8.4-3~bpo10+1 ii libc6 2.28-10 ii libc6-dev 2.28-10 ii libxtables-dev 1.8.2-4 ii pkg-config 0.29-6 Versions of packages iptables-netflow-dkms recommends: ii iptables 1.8.2-4 Versions of packages iptables-netflow-dkms suggests: ii irqtop 2.3-5 ii nfdump 1.6.17-1 -- no debconf information
Bug#990089: linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined
Hi, On Mon, Jun 21, 2021 at 10:24:31AM +0100, Gmail wrote: > Salvatore, > > On Sun, 2021-06-20 at 20:39 +0200, Salvatore Bonaccorso wrote: > > Hi Mark, > > > > On Sun, Jun 20, 2021 at 10:44:29AM +0100, Mark Grant wrote: > > > Package: src:linux > > > Version: 4.19.194-1 > > > Severity: normal > > > > > > Dear Maintainer, > > > > > > After upgrading from linux-image-4.19.0-16-amd64 to linux-image- > > > 4.19.0-17-amd64 > > > attaching an unprivileged linux container fails with the message: > > > lxc-attach: debian-buster-amd64-basic: lsm/lsm.c: > > > lsm_process_label_set_at: 174 > > > Operation not permitted - Failed to set AppArmor label "unconfined" > > > Rebooting into linux-image-4.19.0-16-amd64 with no other changes, > > > the lxc > > > system works as expected. > > > > I think this is the same issue as in #990072, would you be able to > > test the patch as commited > > https://salsa.debian.org/kernel-team/linux/-/commit/d3fc7c8514bed949d8797cfd3a50a1bed95629c0 > > ? > > > I can confirm that the patch fixed the problem. Many thanks. Again, thanks. An update is pending and will be released once we have the builds. Regards, Salvatore
Bug#990119: vip-manager: systemd service file uses incorrect parameter syntax
Hi, it appears not only have the numbers of dashes changed, but also the actual parameter names. In the current service file, I see: ExecStart=/usr/bin/vip-manager -ip="${VIP_IP}" -iface="${VIP_IFACE}" -key="${VIP_KEY}" -host="${VIP_HOST}" -type="${VIP_TYPE}" -endpoint="${VIP_ENDPOINT}" -mask="${VIP_MASK}" Whats actually working is: ExecStart=/usr/bin/vip-manager --ip="${VIP_IP}" --interface="${VIP_IFACE}" --trigger-key="${VIP_KEY}" --trigger-value="${VIP_HOST}" --dcs-type="${VIP_TYPE}" --dcs-endpoints="${VIP_ENDPOINT}" --netmask="${VIP_MASK}" Note that this also causes deprecation warnings: vip-manager: Parameter "VIP_KEY" has been deprecated, please use "VIP_TRIGGER_KEY" instead vip-manager: Conflicting settings: key or VIP_KEY and trigger-key or VIP_TRIGGER_KEY are both specified… vip-manager: Parameter "VIP_TYPE" has been deprecated, please use "VIP_DCS_TYPE" instead vip-manager: Conflicting settings: type or VIP_TYPE and dcs-type or VIP_DCS_TYPE are both specified… vip-manager: Parameter "VIP_MASK" has been deprecated, please use "VIP_NETMASK" instead vip-manager: Conflicting settings: mask or VIP_MASK and netmask or VIP_NETMASK are both specified… vip-manager: Parameter "VIP_ENDPOINT" has been deprecated, please use "VIP_DCS_ENDPOINTS" instead vip-manager: Conflicting settings: endpoint or VIP_ENDPOINT and dcs-endpoints or VIP_DCS_ENDPOINTS are both specified… vip-manager: Parameter "VIP_IFACE" has been deprecated, please use "VIP_INTERFACE" instead vip-manager: Conflicting settings: iface or VIP_IFACE and interface or VIP_INTERFACE are both specified… vip-manager: Parameter "VIP_HOST" has been deprecated, please use "VIP_TRIGGER_VALUE" instead vip-manager: Conflicting settings: host or VIP_HOST and trigger-value or VIP_TRIGGER_VALUE are both specified… But at least it starts and works. Thanks, Chris
Bug#990089: linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined
Salvatore, On Sun, 2021-06-20 at 20:39 +0200, Salvatore Bonaccorso wrote: > Hi Mark, > > On Sun, Jun 20, 2021 at 10:44:29AM +0100, Mark Grant wrote: > > Package: src:linux > > Version: 4.19.194-1 > > Severity: normal > > > > Dear Maintainer, > > > > After upgrading from linux-image-4.19.0-16-amd64 to linux-image- > > 4.19.0-17-amd64 > > attaching an unprivileged linux container fails with the message: > > lxc-attach: debian-buster-amd64-basic: lsm/lsm.c: > > lsm_process_label_set_at: 174 > > Operation not permitted - Failed to set AppArmor label "unconfined" > > Rebooting into linux-image-4.19.0-16-amd64 with no other changes, > > the lxc > > system works as expected. > > I think this is the same issue as in #990072, would you be able to > test the patch as commited > https://salsa.debian.org/kernel-team/linux/-/commit/d3fc7c8514bed949d8797cfd3a50a1bed95629c0 > ? > I can confirm that the patch fixed the problem. Many thanks. Regards, Mark > Regards, > Salvatore
Bug#990119: vip-manager: systemd service file uses incorrect parameter syntax
Package: vip-manager Version: 1.0.1-3+b2 Severity: serious Dear Maintainer, thanks for maintaining the vip-manager package. I've noticed that the service file /lib/systemd/system/vip-manager.service uses options with one dash (ex: `-ip=a.b.c.d`), but the vip-manager binary expects two dashes (`--ip=a.b.c.d`). I believe old vip-manager versions used one dash, but apparently this has changed, and the Debian patch "service_file.patch" needs to be updated. Setting severity serious, because the default service file appears broken. Thanks, Chris
Bug#989731: Bug#989732: Shall I upload?
Re: Ole Streicher > would you upload the packages with C+R removed soon? Or shall I do? I'd like > to have that fixed before the final freeze. Sorry I haven't got to these yet. If you could upload them, that would be nice. Thanks, Christoph
Bug#990072: Update
Hi Matthew, On Sun, Jun 20, 2021 at 11:14:57PM -0400, Matthew Darwin wrote: > kernel 4.19.194-1a~test resolved the issue > > Applied > https://lore.kernel.org/stable/20210614102643.875096...@linuxfoundation.org/ > using the process described at > https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html Many thanks for confirming. Regards, Salvatore
Bug#978361: marked as done (hg-git: FTBFS: tests failed)
Your message dated Mon, 21 Jun 2021 08:33:31 + with message-id and subject line Bug#978361: fixed in hg-git 0.10.1-1 has caused the Debian Bug report #978361, regarding hg-git: FTBFS: tests failed to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 978361: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978361 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: hg-git Version: 0.9.0-2 Severity: serious Justification: FTBFS on amd64 Tags: bullseye sid ftbfs Usertags: ftbfs-20201226 ftbfs-bullseye Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[2]: Entering directory '/<>' > cd tests && python3 run-tests.py --with-hg=`which hg` --blacklist > /<>/debian/hg-git.test_blacklist > running 41 tests using 4 parallel processes > sss > --- /<>/tests/test-file-removal.t > +++ /<>/tests/test-file-removal.t.err > @@ -2,6 +2,16 @@ >$ . "$TESTDIR/testutil" > >$ git init gitrepo > + hint: Using 'master' as the name for the initial branch. This default > branch name > + hint: is subject to change. To configure the initial branch name to use in > all > + hint: of your new repositories, which will suppress this warning, call: > + hint: > + hint: git config --global init.defaultBranch > + hint: > + hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and > + hint: 'development'. The just-created branch can be renamed via this > command: > + hint: > + hint: git branch -m >Initialized empty Git repository in $TESTTMP/gitrepo/.git/ >$ cd gitrepo >$ echo alpha > alpha > @@ -96,6 +106,16 @@ > >$ cd .. >$ git init --bare gitrepo2 > + hint: Using 'master' as the name for the initial branch. This default > branch name > + hint: is subject to change. To configure the initial branch name to use in > all > + hint: of your new repositories, which will suppress this warning, call: > + hint: > + hint: git config --global init.defaultBranch > + hint: > + hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and > + hint: 'development'. The just-created branch can be renamed via this > command: > + hint: > + hint: git branch -m >Initialized empty Git repository in $TESTTMP/gitrepo2/ > >$ hg clone gitrepo hgrepo | grep -v '^updating' > > ERROR: test-file-removal.t output changed > !.. > --- /<>/tests/test-git-submodules.t > +++ /<>/tests/test-git-submodules.t.err > @@ -2,6 +2,16 @@ >$ . "$TESTDIR/testutil" > >$ git init gitrepo1 > + hint: Using 'master' as the name for the initial branch. This default > branch name > + hint: is subject to change. To configure the initial branch name to use in > all > + hint: of your new repositories, which will suppress this warning, call: > + hint: > + hint: git config --global init.defaultBranch > + hint: > + hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and > + hint: 'development'. The just-created branch can be renamed via this > command: > + hint: > + hint: git branch -m >Initialized empty Git repository in $TESTTMP/gitrepo1/.git/ >$ cd gitrepo1 >$ echo alpha > alpha > @@ -10,6 +20,16 @@ >$ cd .. > >$ git init gitsubrepo > + hint: Using 'master' as the name for the initial branch. This default > branch name > + hint: is subject to change. To configure the initial branch name to use in > all > + hint: of your new repositories, which will suppress this warning, call: > + hint: > + hint: git config --global init.defaultBranch > + hint: > + hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and > + hint: 'development'. The just-created branch can be renamed via this > command: > + hint: > + hint: git branch -m >Initialized empty Git repository in $TESTTMP/gitsubrepo/.git/ >$ cd gitsubrepo >$ echo beta > beta > > ERROR: test-git-submodules.t output changed > ! > --- /<>/tests/test-hg-author.t > +++ /<>/tests/test-hg-author.t.err > @@ -2,6 +2,16 @@ >$ . "$TESTDIR/testutil" > >$ git init gitrepo > + hint: Using 'master' as the name for the initial branch. This default > branch name > + hint: is subject to change. To configure the initial branch name to use in > all > + hint: of your new repositories, which will suppress this warning, call: > + hint: > + hint: git config --global init.defaultBranch > + hint: > + hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and > + hint: 'development'. The just-creat
Bug#982459: mdadm --examine in chroot without /proc,/dev,/sys mounted corrupts host's filesystem
Hi, On 18.06.21 12:48, Patrick Cernko wrote: I will try to reproduce the bug now with one of /dev or /sys mounted and check if it still occurs or not. I will send my report about this later as this will take some time again. I could reproduce the bug with /dev *NOT* mounted in chroot. It seems independent of /sys being mounted in chroot. Best Regards, -- Patrick Cernko Joint Administration: Information Services and Technology Max-Planck-Institute fuer Informatik & Softwaresysteme smime.p7s Description: S/MIME Cryptographic Signature
Bug#989731: Shall I upload?
Dear Christoph, would you upload the packages with C+R removed soon? Or shall I do? I'd like to have that fixed before the final freeze. Cheers Ole