Bug#1032287: marked as done (SystemError: PY_SSIZE_T_CLEAN macro must be defined for '#' formats)

2023-03-12 Thread Debian Bug Tracking System
Your message dated Mon, 13 Mar 2023 04:48:58 +
with message-id 
and subject line Bug#1032287: fixed in python-qrencode 1.2-5.1
has caused the Debian Bug report #1032287,
regarding SystemError: PY_SSIZE_T_CLEAN macro must be defined for '#' formats
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032287: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032287
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python3-qrencode
Version: 1.2-5+b8
Severity: grave
X-Debbugs-Cc: debian-pyt...@lists.debian.org

It looks like the qrencode Python library is currently unusable in
Debian bookworm. Here's a simple example:

anarcat@angela:paperbackup$ python3 -c 'import qrencode ; version, size, data = 
qrencode.encode(b"test")'
Traceback (most recent call last):
  File "", line 1, in 
  File "/usr/lib/python3/dist-packages/qrencode/__init__.py", line 47, in encode
version, size, data = _encode(data, version, level, hint, True)
  ^
SystemError: PY_SSIZE_T_CLEAN macro must be defined for '#' formats
anarcat@angela:paperbackup[1]$

According to a casual search on the web, it looks like the extension
needs to be recompiled / patched for Python 3.10:

https://stackoverflow.com/a/71019907

Quote:

> On 3.10 any module(s) that use the # variant when parsing arguments
> need to have a #define PY_SSIZE_T_CLEAN before including Python.h.

So this could be as simple as:

--- python-qrencode-1.2.orig/qr_encode.c
+++ python-qrencode-1.2/qr_encode.c
@@ -1,3 +1,4 @@
+#define PY_SSIZE_T_CLEAN
 #include 
 #include 
 #include 

Will test this out soon.

-- System Information:
Debian Release: bookworm/sid
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'testing'), (500, 'stable'), (1, 
'experimental'), (1, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-5-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages python3-qrencode depends on:
ii  libc6 2.36-8
ii  libqrencode4  4.1.1-1
ii  python3   3.11.2-1

python3-qrencode recommends no packages.

python3-qrencode suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: python-qrencode
Source-Version: 1.2-5.1
Done: Antoine Beaupré 

We believe that the bug you reported is fixed in the latest version of
python-qrencode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1032...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Antoine Beaupré  (supplier of updated python-qrencode 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 02 Mar 2023 22:19:32 -0500
Source: python-qrencode
Architecture: source
Version: 1.2-5.1
Distribution: unstable
Urgency: medium
Maintainer: Hugo Lefeuvre 
Changed-By: Antoine Beaupré 
Closes: 1032287
Changes:
 python-qrencode (1.2-5.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * fix crash in Python 3.10 (Closes: #1032287)
Checksums-Sha1:
 108f1afd2b58feb39550cc4c47d780f23f4437cd 1623 python-qrencode_1.2-5.1.dsc
 718db458d1c01d3adef853d7d88d5194640fceb3 2988 
python-qrencode_1.2-5.1.debian.tar.xz
 e1d52cd47b41d97946ed5d5ad6921362a2acd628 7525 
python-qrencode_1.2-5.1_amd64.buildinfo
Checksums-Sha256:
 bb78abc906f8dbf81ef106c697e006d441982e189c9d41099a4de0c61f728f00 1623 
python-qrencode_1.2-5.1.dsc
 ab27bd55fe36640e0b0018497383abce871e048bc5205cbc59b377c360a3e5c2 2988 
python-qrencode_1.2-5.1.debian.tar.xz
 e7bad4420d73f6cc19c706588ca8f6d8049409c8de2341936a04aef246d8c86f 7525 
python-qrencode_1.2-5.1_amd64.buildinfo
Files:
 b0bbf1b5978d505f87634815936bab37 1623 python optional 
python-qrencode_1.2-5.1.dsc
 7769ded2f52343f573d2101ff280b9f2 2988 python optional 
python-qrencode_1.2-5.1.debian.tar.xz
 276347237c57b4ea9034b6551f21f6c1 7525 python optional 
python-qrencode_1.2-5.1_amd64.buildinfo

-BEGIN PGP SIGNATURE-


Bug#1032468: More info needed

2023-03-12 Thread Vincent Lefevre
On 2023-03-12 19:00:21 +0100, Dominik Stadler wrote:
> Works as expected on a fresh installation of bookworm.
> 
> Can you provide the output of the following command
> 
> dpkg --list | grep dbus

cventin:~> dpkg --list | grep dbus
ii  dbus 1.14.6-1   
  amd64simple interprocess messaging system (system message bus)
ii  dbus-bin 1.14.6-1   
  amd64simple interprocess messaging system (command line utilities)
ii  dbus-daemon  1.14.6-1   
  amd64simple interprocess messaging system (reference message bus)
ii  dbus-session-bus-common  1.14.6-1   
  all  simple interprocess messaging system (session bus 
configuration)
ii  dbus-system-bus-common   1.14.6-1   
  all  simple interprocess messaging system (system bus 
configuration)
ii  dbus-user-session1.14.6-1   
  amd64simple interprocess messaging system (systemd --user 
integration)
ii  dbus-x11 1.14.6-1   
  amd64simple interprocess messaging system (X11 deps)
ii  libdbus-1-3:amd641.14.6-1   
  amd64simple interprocess messaging system (library)
ii  libdbus-1-3:i386 1.14.6-1   
  i386 simple interprocess messaging system (library)
ii  libdbus-1-dev:amd64  1.14.6-1   
  amd64simple interprocess messaging system (development headers)
ii  libdbus-glib-1-2:amd64   0.112-3
  amd64deprecated library for D-Bus IPC
ii  libdbusmenu-glib4:amd64  
18.10.20180917~bzr492+repack1-3  amd64library for passing menus 
over DBus
ii  libdbusmenu-gtk3-4:amd64 
18.10.20180917~bzr492+repack1-3  amd64library for passing menus 
over DBus - GTK-3+ version
ii  libnet-dbus-perl 1.2.0-2
  amd64Perl extension for the DBus bindings
ii  libqt5dbus5:amd645.15.8+dfsg-3  
  amd64Qt 5 D-Bus module
ii  xdg-dbus-proxy   0.1.4-3
  amd64filtering D-Bus proxy

BTW, I'm a bit surprised that this is related, as the file-roller
package does not depend on libdbus-1-3 (there's also no mention
of dbus in the description and the man page).

Note: I've just done some tests, remotely as I'm not in front of
the machine where it is installed. Outside of Firefox, file-roller
appears to work, but it takes at least 25 seconds before the window
appears! I've just done a test with strace, and it froze on

1678666206.918658 poll([{fd=9, events=POLLIN}], 1, 25000

1678666232.046417 poll([{fd=9, events=POLLIN}], 1, 25000

Thus there's a 25-second timeout. In this test, it occurred twice,
so it took 50 seconds to appear.

> P.S. Regarding "First, any recommended application is expected to work
> without any issue" => This sounds a bit strange when you are actually using
> a totally free operating system built by volunteers! Please consider how
> much you can "expect" or "request" here. Better to spend time yourself to
> improve Debian. If you think the application or X-Windows itself should do
> things differently, you are welcome to provide improvements and patches to
> the upstream projects!

What I meant is that some applications appear to have specific
requirements about a desktop environment (here this appears to
be a GNOME application, though it was not presented as a GNOME
application in Firefox). If there are specific requirements,
then the application shouldn't be proposed by Firefox (at least
not by default) if there requirements are not satisfied.

-- 
Vincent Lefèvre  - Web: 
100% accessible validated (X)HTML - Blog: 
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)



Bug#1031794: marked as done (socklog: fails to extract source package: dpkg-source: error: pathname 'socklog-2.1.0+repack/debian/service/socklog-unix/log/supervise' points outside source root (to '/ru

2023-03-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 Mar 2023 21:34:46 +
with message-id 
and subject line Bug#1031794: fixed in socklog 2.1.0+repack-5
has caused the Debian Bug report #1031794,
regarding socklog: fails to extract source package: dpkg-source: error: 
pathname 'socklog-2.1.0+repack/debian/service/socklog-unix/log/supervise' 
points outside source root (to '/run/runit/supervise/socklog-unix.log')
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1031794: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031794
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: socklog
Version: 2.1.0+repack-4
Severity: serious

Hi,

# dget 
https://deb.debian.org/debian/pool/main/s/socklog/socklog_2.1.0+repack-4.dsc
dget: retrieving 
https://deb.debian.org/debian/pool/main/s/socklog/socklog_2.1.0+repack-4.dsc
  % Total% Received % Xferd  Average Speed   TimeTime Time  Current
 Dload  Upload   Total   SpentLeft  Speed
100  1980  100  19800 0   8615  0 --:--:-- --:--:-- --:--:--  8646
dget: retrieving 
https://deb.debian.org/debian/pool/main/s/socklog/socklog_2.1.0+repack.orig.tar.gz
  % Total% Received % Xferd  Average Speed   TimeTime Time  Current
 Dload  Upload   Total   SpentLeft  Speed
100 59796  100 597960 0   162k  0 --:--:-- --:--:-- --:--:--  163k
dget: retrieving 
https://deb.debian.org/debian/pool/main/s/socklog/socklog_2.1.0+repack-4.debian.tar.xz
  % Total% Received % Xferd  Average Speed   TimeTime Time  Current
 Dload  Upload   Total   SpentLeft  Speed
100 11080  100 110800 0  46909  0 --:--:-- --:--:-- --:--:-- 46751
socklog_2.1.0+repack-4.dsc:
  Good signature found
   validating socklog_2.1.0+repack.orig.tar.gz
   validating socklog_2.1.0+repack-4.debian.tar.xz
All files validated successfully.
dpkg-source: info: extracting socklog in socklog-2.1.0+repack
dpkg-source: info: unpacking socklog_2.1.0+repack.orig.tar.gz
dpkg-source: info: unpacking socklog_2.1.0+repack-4.debian.tar.xz
dpkg-source: info: using patch list from debian/patches/series
dpkg-source: info: applying 0001-socklog-conf-update-service.patch
dpkg-source: info: applying 0002-tryto-c.patch
dpkg-source: info: applying 0003-patches-fix-build-warnings.patch
dpkg-source: error: pathname 
'socklog-2.1.0+repack/debian/service/socklog-unix/log/supervise' points outside 
source root (to '/run/runit/supervise/socklog-unix.log')

That's on a system with a mix of testing and unstable. I'm not sure of
which package introduced that additional check. Let me know if you
cannot reproduce.

Lucas
--- End Message ---
--- Begin Message ---
Source: socklog
Source-Version: 2.1.0+repack-5
Done: Mathieu Mirmont 

We believe that the bug you reported is fixed in the latest version of
socklog, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1031...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mathieu Mirmont  (supplier of updated socklog package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 06 Mar 2023 22:01:18 +0100
Source: socklog
Architecture: source
Version: 2.1.0+repack-5
Distribution: unstable
Urgency: medium
Maintainer: Mathieu Mirmont 
Changed-By: Mathieu Mirmont 
Closes: 1031794
Changes:
 socklog (2.1.0+repack-5) unstable; urgency=medium
 .
   * Various uninteresting changes
   * watch, repack.sh: append +repack to tarball filename
   * Refresh lintian overrides
   * service/socklog-unix: remove supervise symlink (Closes: #1031794)
   * control: bump debian policy to 4.6.2, no change required
   * gitlab-ci.yml: disable unnecessary jobs
   * gbp.conf: add configuration file
Checksums-Sha1:
 c4e575cdf31744739e4d968d7b2955aa9cf3a969 1980 socklog_2.1.0+repack-5.dsc
 612a033dc87aacc0187c071ba2a1df1fdbe9a60c 11292 
socklog_2.1.0+repack-5.debian.tar.xz
 edc1b86665da6b72da4f583d6416a78201f463e3 5874 
socklog_2.1.0+repack-5_source.buildinfo
Checksums-Sha256:
 6fe6594a8bbd6616f03eb15da53cdb703633cd506e3ea293cb94fe5a688b8f3e 1980 
socklog_2.1.0+repack-5.dsc
 

Bug#1032822: marked as done (liferea: CVE-2023-1350: RCE vulnerability on feed enrichment)

2023-03-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 Mar 2023 21:04:24 +
with message-id 
and subject line Bug#1032822: fixed in liferea 1.14.1-1
has caused the Debian Bug report #1032822,
regarding liferea: CVE-2023-1350: RCE vulnerability on feed enrichment
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032822: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032822
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: liferea
Version: 1.14.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for liferea.

CVE-2023-1350[0]:
| A vulnerability was found in liferea. It has been rated as critical.
| Affected by this issue is the function update_job_run of the file
| src/update.c of the component Feed Enrichment. The manipulation of the
| argument source with the input |date gt;/tmp/bad-item-link.txt
| leads to os command injection. The attack may be launched remotely.
| The exploit has been disclosed to the public and may be used. The name
| of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is
| recommended to apply a patch to fix this issue. The identifier of this
| vulnerability is VDB-222848.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1350
https://www.cve.org/CVERecord?id=CVE-2023-1350
[1] 
https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: liferea
Source-Version: 1.14.1-1
Done: Paul Gevers 

We believe that the bug you reported is fixed in the latest version of
liferea, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1032...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Paul Gevers  (supplier of updated liferea package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 12 Mar 2023 21:32:33 +0100
Source: liferea
Architecture: source
Version: 1.14.1-1
Distribution: unstable
Urgency: medium
Maintainer: Paul Gevers 
Changed-By: Paul Gevers 
Closes: 1032822
Changes:
 liferea (1.14.1-1) unstable; urgency=medium
 .
   * New upstream version 1.14.1
 Contains fix for CVE-2023-1350 which is a RCE when the option "Extract
 full content from HTML5 and Google AMP" is enable on a feed (Closes:
 #1032822)
Checksums-Sha1:
 f6f42984164a2b5bdd29eb605b7bb3237cb7c51e 2014 liferea_1.14.1-1.dsc
 9f2c54c502f802eba9ff90473896446576df528c 1833227 liferea_1.14.1.orig.tar.gz
 f3088131dfe829f8c9e6fc967fb57d1e6b921f2c 29408 liferea_1.14.1-1.debian.tar.xz
Checksums-Sha256:
 efa30e40f234a6d7ac5396331d07b1712bc04ddc02b436d77fd7039b7a1e 2014 
liferea_1.14.1-1.dsc
 a95bc784e313a8c9fc25284d7daa4b059933f9d96b49340b8192631e6fe7faa3 1833227 
liferea_1.14.1.orig.tar.gz
 3487e410214e9ec3540e430be23693a4eb1dad14cc40dc653653778049c3b8d7 29408 
liferea_1.14.1-1.debian.tar.xz
Files:
 996a106bff24f4e6e2e2306debc56d59 2014 web optional liferea_1.14.1-1.dsc
 ac41b8ec6a4e09a8942a91d7373d6516 1833227 web optional 
liferea_1.14.1.orig.tar.gz
 b0b75e544a4967420f61939c199ab756 29408 web optional 
liferea_1.14.1-1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEWLZtSHNr6TsFLeZynFyZ6wW9dQoFAmQOO6sACgkQnFyZ6wW9
dQprqwf8C56KYg7wGmsoHG+eyzlL1Ss+HOtKzyTLZ/EpPB6Meoy7NZiU9fkTaXJn
MfLpUF7aX6qn31fzV/s/1Zt2BfcxVnkAz2e2i2lqhyTst+ht/L/yg83PMKnBDbHf
JPFyQowxNDi+JkDx85v5DlyVQUVbbJCZQbnYAxbu6cgzS/3KzIUD6s+6dog4IWO4
aeEbWASLYPH/UT9H/8Vh3S5rXY5glNc2WxIodFS1+7UQWnTi3/oDDg6pzli5SY0K
xi8vSiCbiqfDSA60niO1mCA3g/EAqr94frPDJhtiuvhOJWKucYjO4ezheRi04tdy
v5kyiNECvjxFLCCBTmcmE6o+OCxpqg==
=3DOA
-END PGP SIGNATURE End Message ---


Processed: Fixed upstream

2023-03-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1025825 + fixed-upstream
Bug #1025825 [grip] ImportError: cannot import name 'safe_join' from 'flask'
Added tag(s) fixed-upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1025825: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025825
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032822: liferea: CVE-2023-1350: RCE vulnerability on feed enrichment

2023-03-12 Thread Lars Windolf

Hi,

upstream fixed with release 1.14.1

With Best Regards,
Lars Windolf



Processed: Re: Bug#1032822: liferea: CVE-2023-1350: RCE vulnerability on feed enrichment

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1.12.0-1
Bug #1032822 [src:liferea] liferea: CVE-2023-1350: RCE vulnerability on feed 
enrichment
Marked as found in versions liferea/1.12.0-1.
> tags -1 pending
Bug #1032822 [src:liferea] liferea: CVE-2023-1350: RCE vulnerability on feed 
enrichment
Added tag(s) pending.

-- 
1032822: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032822
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032822: liferea: CVE-2023-1350: RCE vulnerability on feed enrichment

2023-03-12 Thread Paul Gevers

Control: found -1 1.12.0-1
Control: tags -1 pending

Hi Salvatore,

On 12-03-2023 08:47, Salvatore Bonaccorso wrote:

The following vulnerability was published for liferea.

CVE-2023-1350[0]:
| A vulnerability was found in liferea. It has been rated as critical.
| Affected by this issue is the function update_job_run of the file
| src/update.c of the component Feed Enrichment. The manipulation of the
| argument source with the input |date gt;/tmp/bad-item-link.txt
| leads to os command injection. The attack may be launched remotely.
| The exploit has been disclosed to the public and may be used. The name
| of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is
| recommended to apply a patch to fix this issue. The identifier of this
| vulnerability is VDB-222848.



Please adjust the affected versions in the BTS as needed.


Patch applies cleanly on both the version in unstable and the version in 
bullseye. I'll verify further.


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1032032: FTBFS: error: AM_INIT_AUTOMAKE expanded multiple times

2023-03-12 Thread Thomas Uhle

Package: fenix-plugins
Followup-For: Bug #1032032
Control: tags -1 + patch

Dear maintainers,

I have prepared a patch that updates all the configure.ac files to work 
with newer versions of autoconf and libtool.


Best regards,

Thomas Uhle

04-update-configure-ac.patch.gz
Description: GNU Zip compressed data


Processed: Re: Bug#1032032: FTBFS: error: AM_INIT_AUTOMAKE expanded multiple times

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + patch
Bug #1032032 [src:fenix-plugins] FTBFS: error: AM_INIT_AUTOMAKE expanded 
multiple times
Added tag(s) patch.

-- 
1032032: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032032
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032468: More info needed

2023-03-12 Thread Dominik Stadler
Works as expected on a fresh installation of bookworm.

Can you provide the output of the following command

dpkg --list | grep dbus


P.S. Regarding "First, any recommended application is expected to work
without any issue" => This sounds a bit strange when you are actually using
a totally free operating system built by volunteers! Please consider how
much you can "expect" or "request" here. Better to spend time yourself to
improve Debian. If you think the application or X-Windows itself should do
things differently, you are welcome to provide improvements and patches to
the upstream projects!


Processed: mark for transition

2023-03-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> notfound 1032235 argon2/0~20190702-0.1
Bug #1032235 {Done: Guilhem Moulin } [libargon2-1] 
cryptsetup: libgcc_s.so.1 must be installed for pthread_exit to work
No longer marked as found in versions argon2/0~20190702-0.1.
> severity 1032235 normal
Bug #1032235 {Done: Guilhem Moulin } [libargon2-1] 
cryptsetup: libgcc_s.so.1 must be installed for pthread_exit to work
Severity set to 'normal' from 'grave'
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1032235: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032235
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032120: Upload of new upstream version before fix has migrated to testing (Was: Re: Bug#1032120: tiledb: uses atomic operations, but is not linked to libatomic)

2023-03-12 Thread Nilesh Patra

Tl;dr: Because It will not migrate and eventually get kicked out of testing and 
next stable on April, 13 regardless
of what the tracker says now.

On 3/12/23 19:00, Dirk Eddelbuettel wrote:


Why not wait a week on 2.15.0-1 which now 'Too young, only 4 of 10 days old'?


It won't migrate as told earlier too. By tomorrow it would have 'blocked by 
freeze' written over there.
Hard freeze starts tomorrow, and it'd need an unblock request which wouldn't be 
agreed upon as only changes
like these[1] are allowed in hard freeze.
The version in testing has an RC bug, and hence this will be taken out of 
testing if we do not revert the version
to a previous one.

[1]: https://release.debian.org/bullseye/freeze_policy.html#appropriate

Best,
Nilesh



Bug#1032120: Upload of new upstream version before fix has migrated to testing (Was: Re: Bug#1032120: tiledb: uses atomic operations, but is not linked to libatomic)

2023-03-12 Thread Dirk Eddelbuettel


Why not wait a week on 2.15.0-1 which now 'Too young, only 4 of 10 days old'?

Dirk

-- 
dirk.eddelbuettel.com | @eddelbuettel | e...@debian.org



Processed:

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> forwarded -1 https://github.com/lxc/lxc/issues/4289
Bug #1032706 [lxc] lxc-snapshot cannot restore containers with loop storage 
backend
Set Bug forwarded-to-address to 'https://github.com/lxc/lxc/issues/4289'.

-- 
1032706: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032706
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032706:

2023-03-12 Thread Mathias Gibbens
Control: forwarded -1 https://github.com/lxc/lxc/issues/4289


signature.asc
Description: This is a digitally signed message part