Bug#1052376: lxpanel: probably related to #1052050

2023-09-21 Thread Dimitris T.
Package: lxpanel
Version: 0.10.1-4
Followup-For: Bug #1052376

Hey,

similar issue here.. 
i think this is related to 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052050

cheers,


-- System Information:
Debian Release: trixie/sid
  APT prefers experimental
  APT policy: (1, 'experimental')
merged-usr: no
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.4-x64v3-xanmod1 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=el_GR.UTF-8, LC_CTYPE=el_GR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)
LSM: AppArmor: enabled

Versions of packages lxpanel depends on:
ii  libasound2   1.2.10-1
ii  libc62.37-10
ii  libcairo21.17.8-3
ii  libcurl3-gnutls  8.3.0-1
ii  libfm-gtk3-4 1.3.2-4
ii  libfm-modules1.3.2-4
ii  libfm4   1.3.2-4
ii  libgdk-pixbuf-2.0-0  2.42.10+dfsg-1+b1
ii  libglib2.0-0 2.78.0-2
ii  libgtk-3-0   3.24.38-5
ii  libiw30  30~pre9-14
ii  libkeybinder-3.0-0   0.3.2-1.1
ii  libmenu-cache3   1.1.0-1.1
ii  libpango-1.0-0   1.51.0+ds-2
ii  libwnck-3-0  43.0-3
ii  libx11-6 2:1.8.6-1
ii  libxml2  2.9.14+dfsg-1.3
ii  lxmenu-data  0.1.5-2.1
ii  lxpanel-data 0.10.1-4

Versions of packages lxpanel recommends:
ii  dunst [notification-daemon]  1.9.2-1
ii  libnotify-bin0.8.2-1
ii  lxterminal [x-terminal-emulator] 0.4.0-2
ii  mate-terminal [x-terminal-emulator]  1.26.1-1
ii  notification-daemon  3.20.0-4+b1
ii  pavucontrol  5.0-2
ii  xkb-data 2.38-2

Versions of packages lxpanel suggests:
ii  chromium [www-browser]117.0.5938.62-1
ii  firefox [www-browser] 117.0.1-1
ii  librewolf [www-browser]   117.0-1
ii  lynx [www-browser]2.9.0dev.12-1
ii  vivaldi-stable [www-browser]  6.2.3105.48-1

-- no debconf information



Bug#999962: RFS to solve bug#999962 (silversearcher-ag: depends on obsolete pcre3 library)

2023-09-21 Thread Manphiz
Nicholas D Steeves  writes:

> I've moved this discussion from debian-emacsen to the relevant bug.
> Please remove debian-emacsen from CC and add me to CC for all
> follow-ups.
>

Dropped debian-emacsen@.

> Manphiz  writes:
>
>> Manphiz  writes:
>>
>>>
>>> Thanks Nicholas!  I used licensecheck and checked manually and updated
>>> d/copyright accordingly in my merge request[1].  PTAL, thanks!
>>>
>>> [1] https://salsa.debian.org/debian/silversearcher-ag/-/merge_requests/1
>>
>> Friendly ping.
>
> haha @enable_pcre2_support.patch:L478
>
> Thanks for adding some copyright info; this will cover a "patches
> applied" view, but doesn't cover the "patches unapplied" source package
> (orig.tar, debian.tar, dsc).  If you manually evaluate the rules in
> d/copyright you'll see that this patch becomes misattributed to the
> debian/* holder, which gets even more confusing since you set yourself
> as the patch author ;)  Yes, I understand you synthesised commits, and
> I'm fine with that, but please finish fixing up d/copyright.
>

Makes sense.  Updated accordingly.

> changelog: Please enclose "Closes: #62" in parentheses in order to
> follow the style that is already in use by this package's maintainer;
> it's technically still Majime Mizuno's package, after all.
>

Done.

> Then finalise the changelog and build the package.
>

Done as well.

> Finally, learn about what an "nmudiff" is, and file one at the relevant
> bug.
>

To be careful I'd like to have you take another look before doing so[1]
:)

BTW, I'm not a DD or DMD yet so I'm probably not able to submit to
delayed queue yet, right?

> Thanks,
> Nicholas
>

[1] https://salsa.debian.org/debian/silversearcher-ag/-/merge_requests/1/diffs
-- 
Manphiz


signature.asc
Description: PGP signature


Bug#1052234: marked as done (FTBFS with OCaml 4.14.1)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Fri, 22 Sep 2023 04:52:10 +
with message-id 
and subject line Bug#1052234: fixed in ocaml-merlin 4.10-414-1
has caused the Debian Bug report #1052234,
regarding FTBFS with OCaml 4.14.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052234: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052234
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Source: ocaml-merlin
Version: 4.7-413-4
Severity: important
Tags: ftbfs
User: debian-ocaml-ma...@lists.debian.org
Usertags: ocaml-4.14.1-transition

Dear Maintainer,

Your package FTBFS with OCaml 4.14.1 with the following error:

[...]
dune build @all
File "src/config/my_config.ml", line 7, characters 70-83:
7 |   | `OCaml_4_10_0 | `OCaml_4_11_0 | `OCaml_4_12_0 | `OCaml_4_13_0 ] = 
`OCaml_4_14_0
  
^
Error: This expression has type [> `OCaml_4_14_0 ]
   but an expression was expected of type
 [ `OCaml_4_02_0
 | `OCaml_4_02_1
 | `OCaml_4_02_2
 | `OCaml_4_02_3
 | `OCaml_4_03_0
 | `OCaml_4_04_0
 | `OCaml_4_05_0
 | `OCaml_4_06_0
 | `OCaml_4_07_0
 | `OCaml_4_07_1
 | `OCaml_4_08_0
 | `OCaml_4_09_0
 | `OCaml_4_10_0
 | `OCaml_4_11_0
 | `OCaml_4_12_0
 | `OCaml_4_13_0 ]
   The second variant type does not allow tag(s) `OCaml_4_14_0
File "src/ocaml/preprocess/parser_raw.mly", line 846, characters 29-36:
Warning: the token COMMENT is unused.
File "src/ocaml/preprocess/parser_raw.mly", line 847, characters 30-39:
Warning: the token DOCSTRING is unused.
File "src/ocaml/preprocess/parser_raw.mly", line 849, characters 7-10:
Warning: the token EOL is unused.
File "src/ocaml/preprocess/parser_raw.mly", line 759, characters 7-22:
Warning: the token GREATERRBRACKET is unused.
ocamlmerlin.c: In function 'connect_socket.constprop':
ocamlmerlin.c:262:40: warning: '%s' directive output may be truncated writing 
up to 4096 bytes into a region of size 102 [-Wformat-truncation=]
  262 | snprintf(address.sun_path, 104, "./%s", socketname);
  |^~
ocamlmerlin.c:262:5: note: 'snprintf' output between 3 and 4099 bytes into a 
destination of size 104
  262 | snprintf(address.sun_path, 104, "./%s", socketname);
  | ^~~
ocamlmerlin.c: In function 'start_server.constprop':
ocamlmerlin.c:353:40: warning: '%s' directive output may be truncated writing 
up to 4096 bytes into a region of size 102 [-Wformat-truncation=]
  353 | snprintf(address.sun_path, 104, "./%s", socketname);
  |^~
ocamlmerlin.c:353:5: note: 'snprintf' output between 3 and 4099 bytes into a 
destination of size 104
  353 | snprintf(address.sun_path, 104, "./%s", socketname);
  | ^~~
ocamlmerlin.c:377:41: warning: 'snprintf' output may be truncated before the 
last format character [-Wformat-truncation=]
  377 | snprintf(socket_path, PATHSZ, "%s/%s", path_socketdir(), 
socketname);
  | ^
ocamlmerlin.c:377:5: note: 'snprintf' output 2 or more bytes (assuming 4098) 
into a destination of size 4097
  377 | snprintf(socket_path, PATHSZ, "%s/%s", path_socketdir(), 
socketname);
  | ^~~~
make[1]: *** [debian/rules:9: override_dh_auto_build] Error 1
make[1]: Leaving directory '/tmp/build/ocaml-merlin-4.7-413'
make: *** [debian/rules:6: binary] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2



Packages rebuilt with OCaml 4.14.1 are available at:

  http://ocaml.debian.net/transitions/ocaml-4.14.1/


Cheers,

--
Stéphane
--- End Message ---
--- Begin Message ---
Source: ocaml-merlin
Source-Version: 4.10-414-1
Done: Julien Puydt 

We believe that the bug you reported is fixed in the latest version of
ocaml-merlin, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1052...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Puydt  (supplier of updated ocaml-merlin package)

(This message was generated automatically at their request; if y

Processed: Bug#1042049 marked as pending in lintian

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1042049 [src:lintian] lintian: FTBFS: 3 tests failed
Added tag(s) pending.

-- 
1042049: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042049
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1042049: marked as pending in lintian

2023-09-21 Thread Nilesh Patra
Control: tag -1 pending

Hello,

Bug #1042049 in lintian reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/lintian/lintian/-/commit/0803577fdbecc26dcda6719789a55637cacedc34


Adapt groff 1.23 warning message (Closes: #1042049)


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1042049



Bug#1036256: golang-github-pin-tftp: FTBFS in testing

2023-09-21 Thread Arnaud Rebillout
On Mon, 18 Sep 2023 09:23:19 -0300 Thiago Andrade  
wrote:

> I'm waiting for this upgrade. After I'll try to upgrade gobuster to
> 3.6.0 version.

Hello Thiago,

the new package was uploaded and is now in unstable.

However, after manually triggering the autopkgtests two times, I noticed 
that a test failed (2 times, on a different architecture each time, cf 
ppc64el and riscv64 logs at [1]). So it still looks like a test is 
flaky, or maybe there's a bug in the code. I pinged upstream to see if 
they can help [2].


Cheers,

Arnaud

--

[1] https://ci.debian.net/packages/g/golang-github-pin-tftp/

[2] https://github.com/pin/tftp/issues/87



Bug#1037607: marked as done (colobot: ftbfs with GCC-13)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Fri, 22 Sep 2023 00:34:53 +
with message-id 
and subject line Bug#1037607: fixed in colobot 0.2.0-2.1
has caused the Debian Bug report #1037607,
regarding colobot: ftbfs with GCC-13
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1037607: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037607
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:colobot
Version: 0.2.0-2
Severity: normal
Tags: sid trixie
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-13

[This bug is targeted to the upcoming trixie release]

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-13/g++-13, but succeeds to build with gcc-12/g++-12. The
severity of this report will be raised before the trixie release.

The full build log can be found at:
http://qa-logs.debian.net/2023/05/22/logs/colobot_0.2.0-2_unstable_gccexp.log
The last lines of the build log are at the end of this report.

To build with GCC 13, either set CC=gcc-13 CXX=g++-13 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-13/porting_to.html

[...]
  | ^~~
/<>/src/common/resources/resourcemanager.cpp: In static member 
function ‘static bool CResourceManager::RemoveLocation(const std::string&)’:
/<>/src/common/resources/resourcemanager.cpp:79:37: warning: ‘int 
PHYSFS_removeFromSearchPath(const char*)’ is deprecated 
[-Wdeprecated-declarations]
   79 | if (!PHYSFS_removeFromSearchPath(location.c_str()))
  |  ~~~^~
/usr/include/physfs.h:878:17: note: declared here
  878 | PHYSFS_DECL int PHYSFS_removeFromSearchPath(const char *oldDir)
  | ^~~
/<>/src/common/resources/resourcemanager.cpp:81:104: warning: 
‘const char* PHYSFS_getLastError()’ is deprecated [-Wdeprecated-declarations]
   81 | GetLogger()->Error("Error while unmounting \"%s\": %s\n", 
location.c_str(), PHYSFS_getLastError());
  | 
~~~^~
/usr/include/physfs.h:654:25: note: declared here
  654 | PHYSFS_DECL const char *PHYSFS_getLastError(void) PHYSFS_DEPRECATED;
  | ^~~
/<>/src/common/resources/resourcemanager.cpp: In static member 
function ‘static bool CResourceManager::SetSaveLocation(const std::string&)’:
/<>/src/common/resources/resourcemanager.cpp:109:118: warning: 
‘const char* PHYSFS_getLastError()’ is deprecated [-Wdeprecated-declarations]
  109 | GetLogger()->Error("Error while setting save location to 
\"%s\": %s\n", location.c_str(), PHYSFS_getLastError());
  | 
  ~~~^~
/usr/include/physfs.h:654:25: note: declared here
  654 | PHYSFS_DECL const char *PHYSFS_getLastError(void) PHYSFS_DEPRECATED;
  | ^~~
/<>/src/common/resources/resourcemanager.cpp: In static member 
function ‘static bool CResourceManager::DirectoryExists(const std::string&)’:
/<>/src/common/resources/resourcemanager.cpp:154:81: warning: ‘int 
PHYSFS_isDirectory(const char*)’ is deprecated [-Wdeprecated-declarations]
  154 | return PHYSFS_exists(CleanPath(directory).c_str()) && 
PHYSFS_isDirectory(CleanPath(directory).c_str());
  |   
~~^~
/usr/include/physfs.h:1159:17: note: declared here
 1159 | PHYSFS_DECL int PHYSFS_isDirectory(const char *fname) PHYSFS_DEPRECATED;
  | ^~
/<>/src/common/resources/resourcemanager.cpp: In static member 
function ‘static std::vector > 
CResourceManager::ListFiles(const std::string&, bool)’:
/<>/src/common/resources/resourcemanager.cpp:196:39: warning: ‘int 
PHYSFS_isDirectory(const char*)’ is deprecated [-Wdeprecated-declarations]
  19

Bug#1041081: marked as done (apitrace FTBFS with waffle 1.7.2-1)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 23:19:18 +
with message-id 
and subject line Bug#1041081: fixed in apitrace 11.1+repack-1.2
has caused the Debian Bug report #1041081,
regarding apitrace FTBFS with waffle 1.7.2-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1041081: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041081
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: apitrace
Version: 11.1+repack-1.1
Severity: serious
Tags: ftbfs trixie sid

https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/apitrace.html

...
CMake Error at CMakeLists.txt:216 (find_package):
  By not providing "FindWaffle.cmake" in CMAKE_MODULE_PATH this project has
  asked CMake to find a package configuration file provided by "Waffle", but
  CMake did not find one.

  Could not find a package configuration file provided by "Waffle" with any
  of the following names:

WaffleConfig.cmake
waffle-config.cmake

  Add the installation prefix of "Waffle" to CMAKE_PREFIX_PATH or set
  "Waffle_DIR" to a directory containing one of the above files.  If "Waffle"
  provides a separate development package or SDK, be sure it has been
  installed.


-- Configuring incomplete, errors occurred!
--- End Message ---
--- Begin Message ---
Source: apitrace
Source-Version: 11.1+repack-1.2
Done: Dimitri John Ledkov 

We believe that the bug you reported is fixed in the latest version of
apitrace, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1041...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dimitri John Ledkov  (supplier of updated 
apitrace package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 21 Sep 2023 23:42:42 +0100
Source: apitrace
Built-For-Profiles: noudeb
Architecture: source
Version: 11.1+repack-1.2
Distribution: unstable
Urgency: medium
Maintainer: Debian X Strike Force 
Changed-By: Dimitri John Ledkov 
Closes: 1041081
Changes:
 apitrace (11.1+repack-1.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Switch CMake check from native to pkgconfig for waffle-1. Closes:
 #1041081
Checksums-Sha1:
 b313624d44e2a5b85ec21a958ba4a7473fba7373 2309 apitrace_11.1+repack-1.2.dsc
 6bed72d50354881f20366f881b39d83a0ed2b6e8 8432 
apitrace_11.1+repack-1.2.debian.tar.xz
 1fcb5b93923cb4068a976a09b1fe12afd93c07db 7554 
apitrace_11.1+repack-1.2_source.buildinfo
Checksums-Sha256:
 69cb7da5d5e7fdab345c18252fbf727b52fe3eefc144a2a554a9c571a242f10d 2309 
apitrace_11.1+repack-1.2.dsc
 9713f794466992779d7c84158926fcb18f62472134a94326b6e6735a276f15fe 8432 
apitrace_11.1+repack-1.2.debian.tar.xz
 5b408f225371384e03f6c1da3e2c13893b83c56fa6bac298628096e9f5d93609 7554 
apitrace_11.1+repack-1.2_source.buildinfo
Files:
 ac755cec1653bb6f05843ee442c4c773 2309 graphics optional 
apitrace_11.1+repack-1.2.dsc
 fba5e8b9913976c1b2799e6de0e40dd4 8432 graphics optional 
apitrace_11.1+repack-1.2.debian.tar.xz
 af150304a1d667c6f861ee040c5699a4 7554 graphics optional 
apitrace_11.1+repack-1.2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=PnCo
-END PGP SIGNATURE End Message ---


Bug#1041242: libheif1: 1.16.2-1+b1 breaks displaying any pictures

2023-09-21 Thread Christoph Anton Mitterer
Hey.

Any chance to cherry pick the fixing commit from upstream and upload a
new version with that to unstable?

Thanks,
Chris.



Bug#1051454: marked as done (librist: FTBFS on 32-bit architectures: "Simple profile unicast packet loss" test segfaults)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 20:38:33 +
with message-id 
and subject line Bug#1051454: fixed in librist 0.2.8+dfsg+really0.2.7+dfsg-1
has caused the Debian Bug report #1051454,
regarding librist: FTBFS on 32-bit architectures: "Simple profile unicast 
packet loss" test segfaults
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051454: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051454
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: librist
Version: 0.2.8+dfsg-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)

The new version of librist in unstable is failing its build-time tests on
all 32-bit architectures (armel, armhf, i386 and several ports
architectures):

> Summary of Failures:
> 
> 3/21 libRIST:simple+unicast / Simple profile unicast packet loss 10%  
>  FAIL 
> 0.05s   killed by signal 11 SIGSEGV
> 4/21 libRIST:simple+unicast / Simple profile unicast packet loss 25%  
>  FAIL 
> 0.03s   killed by signal 11 SIGSEGV

It's likely to be easy to reproduce this on an amd64 machine by building
the i386 package (debuild -ai386), either cross-compiling or in an
i386 chroot, container or VM. This is a regression since 0.2.7+dfsg-1,
so I would suggest starting by reviewing the differences between those
versions.

This could be related to one of these compiler warnings, which indicate
assumptions in the source code that are not true on ILP32 architectures:

> ../tools/srp_shared.c: In function ‘user_verifier_lookup’:
> ../tools/srp_shared.c:176:43: warning: left shift count >= width of type 
> [-Wshift-count-overflow]
>   176 | *generation = (buf.st_mtim.tv_sec << 32) | 
> buf.st_mtim.tv_nsec;
>   |   ^~

> ../tools/ristreceiver.c: In function ‘cb_stats’:
> ../tools/ristreceiver.c:446:86: warning: cast from pointer to integer of 
> different size [-Wpointer-to-int-cast]
>   446 | rist_prometheus_parse_stats(prom_stats_ctx, 
> stats_container, (uint64_t)arg);
>   |   
>^

> ../tools/ristsender.c: In function ‘setup_rist_peer’:
> ../tools/ristsender.c:447:74: warning: cast to pointer from integer of 
> different size [-Wint-to-pointer-cast]
>   447 | if (rist_stats_callback_set(ctx, setup->statsinterval, 
> cb_stats, (void*)w->id) == -1) {
>   |   
>^

Or it could be something more subtle that gcc is unable to diagnose, like
type-size assumptions in a varargs function.

(It also failed to build on arm64, but that seems to be unrelated:
a different test failed there with an assertion failure, that test has
failed similarly in the past, and it doesn't fit the pattern of 64-bit
architectures succeeding but 32-bit failing. That's out of scope for this
particular bug report.)

librist4:i386 is pulled in by this dependency chain for users of Wine:

wine32 -> libwine -R-> gstreamer1.0-libav -> libavformat60 -> librist4

(where -R-> indicates a Recommends)

so having both amd64 and i386 versions installed is going to be a relatively
normal thing to do. Please could you take a look?

Thanks,
smcv
--- End Message ---
--- Begin Message ---
Source: librist
Source-Version: 0.2.8+dfsg+really0.2.7+dfsg-1
Done: Florian Ernst 

We believe that the bug you reported is fixed in the latest version of
librist, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Ernst  (supplier of updated librist package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 21 Sep 2023 21:06:00 +0200
Source: librist
Architecture: source
Version: 0.2.8+dfsg+really0.2.7+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Florian Ernst 
Changed-By: Florian Ernst 
Closes: 1051454
Cha

Bug#1052430: pastedeploy: FTBFS against dh-python 6.20230825

2023-09-21 Thread Simon Chopin
Package: pastedeploy
Severity: serious
Tags: patch ftbfs
Justification: fails to build from source (but built successfully in the past)
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu mantic ubuntu-patch
X-Debbugs-Cc: scho...@ubuntu.com

Hi,

The package now fails to build due to dh-python new clean behavior
removing the FakeApp egg info that is needed for the test suite to run.

We've applied the attached workaround in Ubuntu, although I think it'd
be nicer to have an API for specifying exclusion, see #1051837.

  * Fix FTBFS due to dh-python being overly enthusiastic in its cleaning
duties (LP: #2035337)

Thanks for considering the patch.

Simon Chopin

-- System Information:
Debian Release: trixie/sid
  APT prefers mantic
  APT policy: (500, 'mantic'), (100, 'mantic-proposed')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-5-generic (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_USER, TAINT_OOT_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru pastedeploy-3.0.1/debian/rules pastedeploy-3.0.1/debian/rules
--- pastedeploy-3.0.1/debian/rules  2022-12-08 00:29:11.0 +0100
+++ pastedeploy-3.0.1/debian/rules  2023-09-21 22:20:30.0 +0200
@@ -22,3 +22,8 @@
 
 override_dh_installchangelogs:
dh_installchangelogs $(CURDIR)/docs/news.rst
+
+override_dh_auto_clean:
+   mv tests/fake_packages/FakeApp.egg/FakeApp.egg-info FakeApp.backup
+   dh_auto_clean
+   mv FakeApp.backup tests/fake_packages/FakeApp.egg/FakeApp.egg-info


Bug#1050019: marked as done (cctz: FTBFS due to time_zone_lookup_test failure)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 19:19:40 +
with message-id 
and subject line Bug#1050019: fixed in cctz 2.3+dfsg1-4
has caused the Debian Bug report #1050019,
regarding cctz: FTBFS due to time_zone_lookup_test failure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050019: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050019
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: cctz
Version: 2.3+dfsg1-3
Severity: serious
Tags: sid trixie ftbfs

Hi,

cctz fails to build with the following error message:

75% tests passed, 1 tests failed out of 4

Total Test time (real) =  30.25 sec

The following tests FAILED:
  2 - time_zone_lookup_test (Failed)
Errors while running CTest
make[1]: *** [Makefile:74: test] Error 8
make[1]: Leaving directory '/<>/obj-x86_64-linux-gnu'
dh_auto_test: error: cd obj-x86_64-linux-gnu && make -j16 test ARGS\+=--verbose 
ARGS\+=-j16 returned exit code 2
make: *** [debian/rules:7: build] Error 25
--- End Message ---
--- Begin Message ---
Source: cctz
Source-Version: 2.3+dfsg1-4
Done: Anton Gladky 

We believe that the bug you reported is fixed in the latest version of
cctz, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anton Gladky  (supplier of updated cctz package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 21 Sep 2023 20:30:20 +0200
Source: cctz
Architecture: source
Version: 2.3+dfsg1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Team 

Changed-By: Anton Gladky 
Closes: 1050019
Changes:
 cctz (2.3+dfsg1-4) unstable; urgency=medium
 .
   [ Anton Gladky ]
   * [434ca88] Add .gitlab-ci.yml
 .
   [ Janitor ]
   * [f2d6695] Apply multi-arch hints
 .
   [ Anton Gladky ]
   * [fa70f53] Refresh patches
   * [c995bca] Use tzdata-legacy instead of tzdata. (Closes: #1050019)
   * [8c7e732] Set compat-level to 13
   Standards-Version to 4.6.2.
   * [6770455] Install cmake files and some more changes due to dh 13.
Checksums-Sha1:
 a4043de06a289ce548e4b10557a3d2157b46bf29 2124 cctz_2.3+dfsg1-4.dsc
 227c989e0a8176531b335a2d649c007ded2307d7 4460 cctz_2.3+dfsg1-4.debian.tar.xz
 a18202e6c723309dd20ca62c251f1644b6c99c7c 6970 cctz_2.3+dfsg1-4_source.buildinfo
Checksums-Sha256:
 879f442192775cbe003824f917251b86cab7ac3b2838724264241e2e7300842a 2124 
cctz_2.3+dfsg1-4.dsc
 4118fb5232710515819dbd3cf6631a1863d6b085cb135ef785a9c1f5052b2156 4460 
cctz_2.3+dfsg1-4.debian.tar.xz
 f63ca6ec0b5cb51871aa805204cba93ac36b070f3b6216bb41ed23292778db1e 6970 
cctz_2.3+dfsg1-4_source.buildinfo
Files:
 36058af4b2990cc6d5b930952ab22f08 2124 libs optional cctz_2.3+dfsg1-4.dsc
 da3bf6810a615b2cc810d98aa2d42f55 4460 libs optional 
cctz_2.3+dfsg1-4.debian.tar.xz
 587705df11b959a6e27de507550733e6 6970 libs optional 
cctz_2.3+dfsg1-4_source.buildinfo

-BEGIN PGP SIGNATURE-
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=SB9a
-END PGP SIGNATURE End Message ---


Bug#1052417: marked as done (bind9: CVE-2023-4236)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 18:19:33 +
with message-id 
and subject line Bug#1052417: fixed in bind9 1:9.19.17-1
has caused the Debian Bug report #1052417,
regarding bind9: CVE-2023-4236
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052417: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052417
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: bind9
Version: 1:9.18.16-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 1:9.18.16-1~deb12u1

Hi,

The following vulnerability was published for bind9.

CVE-2023-4236[0]:
| A flaw in the networking code handling DNS-over-TLS queries may
| cause `named` to terminate unexpectedly due to an assertion failure.
| This happens when internal data structures are incorrectly reused
| under significant DNS-over-TLS query load. This issue affects BIND 9
| versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-4236
https://www.cve.org/CVERecord?id=CVE-2023-4236
[1] https://kb.isc.org/docs/cve-2023-4236

Regards,
Salvtore
--- End Message ---
--- Begin Message ---
Source: bind9
Source-Version: 1:9.19.17-1
Done: Ondřej Surý 

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1052...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý  (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 20 Sep 2023 18:13:07 +0200
Source: bind9
Architecture: source
Version: 1:9.19.17-1
Distribution: unstable
Urgency: medium
Maintainer: Debian DNS Team 
Changed-By: Ondřej Surý 
Closes: 1052416 1052417
Changes:
 bind9 (1:9.19.17-1) unstable; urgency=medium
 .
   * New upstream version 9.19.17
- CVE-2023-3341: A stack exhaustion flaw in control channel code may
  cause named to terminate unexpectedly (Closes: #1052416)
- CVE-2023-4236: named may terminate unexpectedly under high
  DNS-over-TLS query load (Closes: #1052417)
Checksums-Sha1:
 9420e1389ac7a41fb993681aabdffe081c7493ec 3294 bind9_9.19.17-1.dsc
 c867148749eef06b0501462203d91bf0b64175ff 5644580 bind9_9.19.17.orig.tar.xz
 d2a7c9dbe011f401daf192cc379e4afa3c22683d 833 bind9_9.19.17.orig.tar.xz.asc
 1fe69f2ad652ad3510b551f0f67c58b6a173bad3 58768 bind9_9.19.17-1.debian.tar.xz
 22799d90575d3e91dd7bf1a7f61b90020d03b02f 15417 bind9_9.19.17-1_amd64.buildinfo
Checksums-Sha256:
 3eebd753ba99f960386bb89b713f5fade678262ee97d934acebb0cbbd7b3d68f 3294 
bind9_9.19.17-1.dsc
 d86460943ababf8fb91cb20c2807efb30c2014ba6d8b5c690ad889e328655363 5644580 
bind9_9.19.17.orig.tar.xz
 a4a5db0fd558f4dfe9fdedd5bef851010fa5e446def5e0d14976869683982d0f 833 
bind9_9.19.17.orig.tar.xz.asc
 3ea74154c695d78992f941ff0069d56a0530ba9b429b5b1afcfa00fc53e76e2c 58768 
bind9_9.19.17-1.debian.tar.xz
 e492e18ca459ade8d85fbf1ed0e3a611db35e02545f22a2d27720598f5509b65 15417 
bind9_9.19.17-1_amd64.buildinfo
Files:
 c7a3671b65a2eaccab327a5dc96cb795 3294 net optional bind9_9.19.17-1.dsc
 534c24d4bc2de30adc62ef7612cd3dde 5644580 net optional bind9_9.19.17.orig.tar.xz
 b739c3c0258ba15f226915481c0e36dd 833 net optional bind9_9.19.17.orig.tar.xz.asc
 548011800fa7daf557cc91d3963d79a8 58768 net optional 
bind9_9.19.17-1.debian.tar.xz
 98329a37818157b9a8c661987818b59d 15417 net optional 
bind9_9.19.17-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEEw2Gx4wKVQ+vGJel9g3Kkd++uWcIFAmUMhmVfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEMz
NjFCMUUzMDI5NTQzRUJDNjI1RTk3RDgzNzJBNDc3RUZBRTU5QzIACgkQg3Kkd++u
WcJPHA/+OVeA8xdC9t/jKRa0bvkGDcweEK+3nuLbYAij/lIUaZfrzrHdLZXzzaot
l9GuIFW33ANPvlxL0QG93X9ymgs80r/ukO/BZNnPGRah6AhhtCo7MR7OEphtW2qd
fa9pROcf96gMax48s6TgmDiymE+6s5WGuLciB5dWmmar+2QAfonA0Wf5tYJF+DO9
Juaqq/FJoOrC3v0AmVI6Un8oCvwz1q5jwZj57CqIgfZu+r0knTu6O4yquBNhE6aG
vDsHdmm8TOFl/pz4ywBr62t2bf32M3Wgipb3OWMB

Bug#1052416: marked as done (bind9: CVE-2023-3341)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 18:19:33 +
with message-id 
and subject line Bug#1052416: fixed in bind9 1:9.19.17-1
has caused the Debian Bug report #1052416,
regarding bind9: CVE-2023-3341
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052416: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: bind9
Version: 1:9.18.16-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 1:9.18.16-1~deb12u1
Control: found -1 1:9.16.42-1~deb11u1
Control: found -1 1:9.16.37-1~deb11u1

Hi,

The following vulnerability was published for bind9.

CVE-2023-3341[0]:
| The code that processes control channel messages sent to `named`
| calls certain functions recursively during packet parsing. Recursion
| depth is only limited by the maximum accepted packet size; depending
| on the environment, this may cause the packet-parsing code to run
| out of available stack memory, causing `named` to terminate
| unexpectedly. Since each incoming control channel message is fully
| parsed before its contents are authenticated, exploiting this flaw
| does not require the attacker to hold a valid RNDC key; only network
| access to the control channel's configured TCP port is necessary.
| This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0
| through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through
| 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-3341
https://www.cve.org/CVERecord?id=CVE-2023-3341
[1] https://kb.isc.org/docs/cve-2023-3341

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: bind9
Source-Version: 1:9.19.17-1
Done: Ondřej Surý 

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1052...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý  (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 20 Sep 2023 18:13:07 +0200
Source: bind9
Architecture: source
Version: 1:9.19.17-1
Distribution: unstable
Urgency: medium
Maintainer: Debian DNS Team 
Changed-By: Ondřej Surý 
Closes: 1052416 1052417
Changes:
 bind9 (1:9.19.17-1) unstable; urgency=medium
 .
   * New upstream version 9.19.17
- CVE-2023-3341: A stack exhaustion flaw in control channel code may
  cause named to terminate unexpectedly (Closes: #1052416)
- CVE-2023-4236: named may terminate unexpectedly under high
  DNS-over-TLS query load (Closes: #1052417)
Checksums-Sha1:
 9420e1389ac7a41fb993681aabdffe081c7493ec 3294 bind9_9.19.17-1.dsc
 c867148749eef06b0501462203d91bf0b64175ff 5644580 bind9_9.19.17.orig.tar.xz
 d2a7c9dbe011f401daf192cc379e4afa3c22683d 833 bind9_9.19.17.orig.tar.xz.asc
 1fe69f2ad652ad3510b551f0f67c58b6a173bad3 58768 bind9_9.19.17-1.debian.tar.xz
 22799d90575d3e91dd7bf1a7f61b90020d03b02f 15417 bind9_9.19.17-1_amd64.buildinfo
Checksums-Sha256:
 3eebd753ba99f960386bb89b713f5fade678262ee97d934acebb0cbbd7b3d68f 3294 
bind9_9.19.17-1.dsc
 d86460943ababf8fb91cb20c2807efb30c2014ba6d8b5c690ad889e328655363 5644580 
bind9_9.19.17.orig.tar.xz
 a4a5db0fd558f4dfe9fdedd5bef851010fa5e446def5e0d14976869683982d0f 833 
bind9_9.19.17.orig.tar.xz.asc
 3ea74154c695d78992f941ff0069d56a0530ba9b429b5b1afcfa00fc53e76e2c 58768 
bind9_9.19.17-1.debian.tar.xz
 e492e18ca459ade8d85fbf1ed0e3a611db35e02545f22a2d27720598f5509b65 15417 
bind9_9.19.17-1_amd64.buildinfo
Files:
 c7a3671b65a2eaccab327a5dc96cb795 3294 net optional bind9_9.19.17-1.dsc
 534c24d4bc2de30adc62ef7612cd3dde 5644580 net optional bind9_9.19.17.orig.tar.xz
 b739c3c0258ba15f226915481c0e36dd 833 net optional bind9_9.19.17.orig.tar.xz.asc
 548011800fa7daf557cc91d3963d79a8 58768 net optional 
bind9_9.19.17-1.debian.tar.xz
 98329a37818157b9a8c661987818b5

Bug#1052334: marked as done (rust-leptonica-sys - Debian and Cargo dependencies inconsistent.)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 17:54:35 +
with message-id 
and subject line Bug#1052334: fixed in rust-leptonica-sys 0.4.6-4
has caused the Debian Bug report #1052334,
regarding rust-leptonica-sys - Debian and Cargo dependencies inconsistent.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052334: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052334
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: rust-leptonica-sys
Version: 0.4.6-3
Severity: serious

The Debian dependencies for rust-leptonica-sys allow versions of
rust-bindgen from 0.60.x to 0.66.x, however the Cargo dependencies
only allow versions from 0.64.x to 0.66.x. This is causing
autopkgtest failures and blocking rust-leptonica-sys
and hence rust-bindgen from migrating to testing.

Please make the dependencies consistent, either by changing the
Debian depndencies to match the Cargo ones or by changing the
Cargo dependency to match the Debian ones.
--- End Message ---
--- Begin Message ---
Source: rust-leptonica-sys
Source-Version: 0.4.6-4
Done: Jonas Smedegaard 

We believe that the bug you reported is fixed in the latest version of
rust-leptonica-sys, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1052...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard  (supplier of updated rust-leptonica-sys 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 21 Sep 2023 19:27:51 +0200
Source: rust-leptonica-sys
Architecture: source
Version: 0.4.6-4
Distribution: unstable
Urgency: medium
Maintainer: Jonas Smedegaard 
Changed-By: Jonas Smedegaard 
Closes: 1052334
Changes:
 rust-leptonica-sys (0.4.6-4) unstable; urgency=medium
 .
   * tighten (build-)dependency on packages for crate bindgen;
 closes: bug#1052334, thanks to Peter Green
   * update dh-cargo fork
   * update copyright info: update coverage
Checksums-Sha1:
 4da7f79271e0bc427ca73936c515933778d3e05e 2326 rust-leptonica-sys_0.4.6-4.dsc
 f9a7754fb1cc76bd4c478b5273ecc7c03c3d526f 15156 
rust-leptonica-sys_0.4.6-4.debian.tar.xz
 e63fa33d0f110ab9651a06233fc424e5d30652b6 14506 
rust-leptonica-sys_0.4.6-4_amd64.buildinfo
Checksums-Sha256:
 5c1012d9da0369b63d142b08f51c74bcef2f88f86e774dce11047c7360a8b093 2326 
rust-leptonica-sys_0.4.6-4.dsc
 878c16fa5194c36d68add3f8e083b58fec5d5b09894189c332fb020ba507e681 15156 
rust-leptonica-sys_0.4.6-4.debian.tar.xz
 383da8695ee12be4e1008a060cbc9f323142641d095e425c143c68724ac9140e 14506 
rust-leptonica-sys_0.4.6-4_amd64.buildinfo
Files:
 26aeb2447d0289cf3b4a877caa78ded2 2326 rust optional 
rust-leptonica-sys_0.4.6-4.dsc
 c1204bdbb6b0a0d1f6dcddca2dc21170 15156 rust optional 
rust-leptonica-sys_0.4.6-4.debian.tar.xz
 2b04b92eb83257c4b8688a7db203e045 14506 rust optional 
rust-leptonica-sys_0.4.6-4_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEn+Ppw2aRpp/1PMaELHwxRsGgASEFAmUMfaEACgkQLHwxRsGg
ASHnqQ/+KzfYWfdCzvSYcx2kdkWPPHBUWs9M9euxXWDrim3TBQYF+8S8Yjgc29ne
+2nxvWprkS4cO0Fkj++rFIxrCMz+uK6VAr+MvzgSV2ObyEFp8sA6pK4u0bevEJEz
1g1DtTiaG3ehCe9jll7NkgY/3mWCc5VpHm4wbDuEexw0ixzorGEwoGtAtau2MnYb
y/ZKWR+KNX9L8tQg6qxUi2Wh/d75tHB/kAxZFI842xnrJNQNnTGbf/Co40SCJpOy
w1WEOmPyFAxmUvlf4xtr4Y7nIUFIzmeK6fkJ8a6TUEHqCiqsbhHdGeZehuN+bOO/
THbyaJymnDoxA5GK7ID+1tZktS1x471l77u+iPApYVVQcvW4U/psL28VSVdZOlax
gqT5tQnn6ewzadVk2EPhM6MypRJT6mDhjcuipKuDaorh0QZkDA1DU3mVpkaFt4n1
oUWf7AnOBn+EMyQ+aeYFTc0yHX5vcMESv2ambIYe6XpONLXxYZ1E0S4KUnZ3tzzv
4SSDyN+fhQTpdpZY2LsboA9I8ZhZg3MHQd5yWR3UCJXtt3gKpI0vwAQNJ9btPg6I
WL9toT5KHXyP9RqaEouI3dbp+j4PFr4OAM1eqsyW6kLkBPOwsyWDhAZ32ZrlKNxz
VpFMD120qtXEXczwu7Zm/b0YUMZYQP29HEmyZE2z1Gx8IjWcmLM=
=RqjR
-END PGP SIGNATURE End Message ---


Bug#1052417: bind9: CVE-2023-4236

2023-09-21 Thread Ondřej Surý
Thanks for the nudge.  I must be tired or something as I totally forgot about 
updating
the versions in upstream Debian. I'm working on it right now.

Ondrej
--
Ondřej Surý (He/Him)
ond...@sury.org

> On 21. 9. 2023, at 19:23, Salvatore Bonaccorso  wrote:
> 
> Source: bind9
> Version: 1:9.18.16-1
> Severity: grave
> Tags: security upstream
> X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> 
> Control: found -1 1:9.18.16-1~deb12u1
> 
> Hi,
> 
> The following vulnerability was published for bind9.
> 
> CVE-2023-4236[0]:
> | A flaw in the networking code handling DNS-over-TLS queries may
> | cause `named` to terminate unexpectedly due to an assertion failure.
> | This happens when internal data structures are incorrectly reused
> | under significant DNS-over-TLS query load. This issue affects BIND 9
> | versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2023-4236
>https://www.cve.org/CVERecord?id=CVE-2023-4236
> [1] https://kb.isc.org/docs/cve-2023-4236
> 
> Regards,
> Salvtore
> 



Processed: [bts-link] source package src:gpac

2023-09-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #
> # bts-link upstream status pull for source package src:gpac
> # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
> # https://bts-link-team.pages.debian.net/bts-link/
> #
> user debian-bts-l...@lists.debian.org
Setting user to debian-bts-l...@lists.debian.org (was 
debian-bts-l...@lists.debian.org).
> # remote status report for #1051955 (http://bugs.debian.org/1051955)
> # Bug title: gpac: CVE-2023-41000
> #  * https://github.com/gpac/gpac/issues/2550
> #  * remote status changed: (?) -> closed
> #  * closed upstream
> tags 1051955 + fixed-upstream
Bug #1051955 [src:gpac] gpac: CVE-2023-41000
Added tag(s) fixed-upstream.
> usertags 1051955 + status-closed
There were no usertags set.
Usertags are now: status-closed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1051955: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051955
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: [bts-link] source package src:ocsigenserver

2023-09-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #
> # bts-link upstream status pull for source package src:ocsigenserver
> # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
> # https://bts-link-team.pages.debian.net/bts-link/
> #
> user debian-bts-l...@lists.debian.org
Setting user to debian-bts-l...@lists.debian.org (was 
debian-bts-l...@lists.debian.org).
> # remote status report for #1042501 (http://bugs.debian.org/1042501)
> # Bug title: ocsigenserver depends on obsolete pcre
> #  * https://github.com/ocsigen/ocsigenserver/pull/229
> #  * remote status changed: open -> closed
> #  * closed upstream
> tags 1042501 + fixed-upstream
Bug #1042501 [src:ocsigenserver] ocsigenserver depends on obsolete pcre
Added tag(s) fixed-upstream.
> usertags 1042501 - status-open
Usertags were: status-open.
There are now no usertags set.
> usertags 1042501 + status-closed
There were no usertags set.
Usertags are now: status-closed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1042501: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042501
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052417: bind9: CVE-2023-4236

2023-09-21 Thread Salvatore Bonaccorso
Source: bind9
Version: 1:9.18.16-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 1:9.18.16-1~deb12u1

Hi,

The following vulnerability was published for bind9.

CVE-2023-4236[0]:
| A flaw in the networking code handling DNS-over-TLS queries may
| cause `named` to terminate unexpectedly due to an assertion failure.
| This happens when internal data structures are incorrectly reused
| under significant DNS-over-TLS query load. This issue affects BIND 9
| versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-4236
https://www.cve.org/CVERecord?id=CVE-2023-4236
[1] https://kb.isc.org/docs/cve-2023-4236

Regards,
Salvtore



Processed: bind9: CVE-2023-4236

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1:9.18.16-1~deb12u1
Bug #1052417 [src:bind9] bind9: CVE-2023-4236
Marked as found in versions bind9/1:9.18.16-1~deb12u1.

-- 
1052417: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052417
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: bind9: CVE-2023-3341

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1:9.18.16-1~deb12u1
Bug #1052416 [src:bind9] bind9: CVE-2023-3341
Marked as found in versions bind9/1:9.18.16-1~deb12u1.
> found -1 1:9.16.42-1~deb11u1
Bug #1052416 [src:bind9] bind9: CVE-2023-3341
Marked as found in versions bind9/1:9.16.42-1~deb11u1.
> found -1 1:9.16.37-1~deb11u1
Bug #1052416 [src:bind9] bind9: CVE-2023-3341
Marked as found in versions bind9/1:9.16.37-1~deb11u1.

-- 
1052416: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052416: bind9: CVE-2023-3341

2023-09-21 Thread Salvatore Bonaccorso
Source: bind9
Version: 1:9.18.16-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 1:9.18.16-1~deb12u1
Control: found -1 1:9.16.42-1~deb11u1
Control: found -1 1:9.16.37-1~deb11u1

Hi,

The following vulnerability was published for bind9.

CVE-2023-3341[0]:
| The code that processes control channel messages sent to `named`
| calls certain functions recursively during packet parsing. Recursion
| depth is only limited by the maximum accepted packet size; depending
| on the environment, this may cause the packet-parsing code to run
| out of available stack memory, causing `named` to terminate
| unexpectedly. Since each incoming control channel message is fully
| parsed before its contents are authenticated, exploiting this flaw
| does not require the attacker to hold a valid RNDC key; only network
| access to the control channel's configured TCP port is necessary.
| This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0
| through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through
| 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-3341
https://www.cve.org/CVERecord?id=CVE-2023-3341
[1] https://kb.isc.org/docs/cve-2023-3341

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1051408: Acknowledgement (flameshot: uploads potentially sensitive screenshots to the internet)

2023-09-21 Thread Boyuan Yang
X-Debbugs-CC: Peter 
Control: tags -1 +confirmed
Control: notfound -1 12.1.0-2
Control: fixed -1 12.1.0-2

Hi,

On Thu, 7 Sep 2023 19:43:10 +0200 Peter  wrote:
> Thank you for the quick response to my message.
> 
> My message is wrong in one place: I tested the old version from Debian 
> Bullseye.
> 
> In Bookworm it behaves as follows: There is an "Imgur Application Client 
> Id" configured in the installation. So it is possible to use the upload 
> without any further configuration. But before uploading there is a 
> security prompt. In German: "Möchest du diese Aufnahme hochladen?"/"Do 
> you want to upload this image?". You may set "Upload without confirmation".
> 
> For privacy reasons I would prefer the image upload function to be 
> disabled by default and no Imgur Application Id configured.

Debian's flameshot package maintainer here.

My understanding is that this bug only affects flameshot in Debian 11.
Since flameshot in Debian 12 or later provides a confirmation window
before uploading, no security concern should be assumed. As a package
maintainer, I do not want to deviate from upstream's decision on providing
a default imgur token in newer flameshot.

Your concern of flameshot in Debian 11 looks valid. You proposed the patch
to completely strip imgur token is kind of brute-force and I don't really
like it, but I don't have enough time to backport a proper fix on popping up
a confirmation window before imgur upload. As a result, I will take it
as-is and provide an oldstable-proposed-updates for flameshot in Debian 11.

NOTE: such change will later need to be reviewed by Debian Release Team, and
the acceptance of this patch is solely at the discretion of Release Team, which
I cannot guarantee to be accepted.

Thanks,
Boyuan Yang


signature.asc
Description: This is a digitally signed message part


Processed: Re: Bug#1051408: Acknowledgement (flameshot: uploads potentially sensitive screenshots to the internet)

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +confirmed
Bug #1051408 [flameshot] flameshot: uploads potentially sensitive screenshots 
to the internet
Added tag(s) confirmed.
> notfound -1 12.1.0-2
Bug #1051408 [flameshot] flameshot: uploads potentially sensitive screenshots 
to the internet
No longer marked as found in versions flameshot/12.1.0-2.
> fixed -1 12.1.0-2
Bug #1051408 [flameshot] flameshot: uploads potentially sensitive screenshots 
to the internet
Marked as fixed in versions flameshot/12.1.0-2.

-- 
1051408: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051408
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1051739: Package is uninstallable, bug unacknowledged, therefore release critical

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 wontfix
Bug #1051739 [caja-dropbox] 1.26.0-3 uninstallable due to nonexistent package
Added tag(s) wontfix.

-- 
1051739: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051739
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1051739: Package is uninstallable, bug unacknowledged, therefore release critical

2023-09-21 Thread Mike Gabriel

Control: tags -1 wontfix

Hi,

On  So 17 Sep 2023 03:39:55 CEST, Joseph Carter wrote:


Control: severity -1 grave

I didn't do this when filing the bug since ages ago it was  
considered impolite for end-users to set severity and particularly  
to set a severity above important. But it's been a week without  
acknowledgment or fix, and it is release critical even if it's a  
contrib package that isn't for the Holy Gnoman Empire DE.


Joseph


Problem here is that we are removing GTK-2+ from Debian  
testing/unstable, so the libs that get built against GTK-2+ (such as  
libayatana-appindicator-1).


Problem here is that the downloaded dropbox executable probably is  
still GTK-2+. I need to test this and see how easily portable to GTK-3  
is.


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpN_uo04Qdue.pgp
Description: Digitale PGP-Signatur


Bug#1051063: vim-scripts: no license assumption must be non-free

2023-09-21 Thread James McCoy
On Fri, Sep 01, 2023 at 11:04:44PM +0200, Bastian Germann wrote:
> In vim-script's copyright file, the following assumption is written:
> 
> "Summary of license information of each script is reported below. For scripts
> which license is "no license" it is assumed in good faith that having being
> posted on vim.org their licence is at least as free as the licence of Vim
> itself."
> 
> This assumption is wrong. International copyright agreements unfortunately 
> make
> those files non-DFSG-free.
> 
> Please move them affected files to a new source package with Section: 
> non-free/editors.

Honestly, this package probably should just be removed.  Most of the
scripts aren't maintained upstream anymore and are of questionable
utility.

I had been intending to split the package up anyway, but I'll probably
just package a couple of the more useful/maintained ones and then just
RM vim-scripts.

Cheers,
-- 
James
GPG Key: 4096R/91BF BF4D 6956 BD5D F7B7  2D23 DFE6 91AE 331B A3DB



Bug#1052374: gdm3: Shows only an error screen when gnome.session is missing

2023-09-21 Thread Alper Nebi Yasak
On 2023-09-21 13:39 +03:00, Simon McVittie wrote:
> On Thu, 21 Sep 2023 at 11:17:51 +0100, Simon McVittie wrote:
>> On Thu, 21 Sep 2023 at 09:41:25 +0300, Alper Nebi Yasak wrote:
>>> I've been using gdm3 without GNOME, and after recently upgrading gdm3 to
>>> 45~beta-1 I started getting the gray "Oh no!" error message instead of
>>> the login screen.
>>
>> Please look in the system log (systemd Journal) for the error messages
>> that occur at this time, and send it to the bug address. Knowing only
>> "it crashed" does not give us much information, and in particular, if we
>> can reproduce a crash with gdm but not GNOME, it does not give us enough
>> information to know that we have really reproduced the same crash you see.
> 
> I can reproduce something similar in a test VM after
> `apt install --no-install-recommends xorg openbox gdm3`, does the attached
> match what you see?

I had tried `journalctl -u gdm3` and `dmesg` but those were not very
informative... Didn't think of `journalctl -b`, sorry. It's similar to
your logs, attached for the record.

More specifically, I do have "gsettings[1650]: unable to open named
profile (Debian-gdm): using the null configuration." which seems to
match what you fixed (per the changelog).

Anyway, I built 45.0.1-1 locally and can confirm it fixes this error
screen, thanks!

journalctl-xb.log.gz
Description: application/gzip


Bug#1052374: marked as done (gdm3: Shows only an error screen when gnome.session is missing)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 13:04:12 +
with message-id 
and subject line Bug#1052374: fixed in gdm3 45.0.1-1
has caused the Debian Bug report #1052374,
regarding gdm3: Shows only an error screen when gnome.session is missing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gdm3
Version: 45~beta-1
Severity: serious
Justification: missing dependency to function properly
Control: -1 notfound 44.1-2

Dear Maintainer,

I've been using gdm3 without GNOME, and after recently upgrading gdm3 to
45~beta-1 I started getting the gray "Oh no!" error message instead of
the login screen.

Tried a few things and found installing the gnome-session package fixes
it. Copying /usr/share/gnome-session/sessions/gnome-login.session to
.../gnome.session also fixes it.

Looks like #850291, but that is archived and I don't know the Control
invocations I need to continue on top of that. Setting severity same as
that, though.

Thanks for all the work on GNOME. My system is a bit of a mess, so don't
hesitate to ask specifics if you can't reproduce the error.

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64, armhf, armel, i386

Kernel: Linux 6.5.0-1-amd64 (SMP w/24 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8),
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gdm3 depends on:
ii  accountsservice   23.13.9-4
ii  adduser   3.137
ii  dbus [default-dbus-system-bus]1.14.10-1
ii  dbus-bin  1.14.10-1
ii  dbus-daemon   1.14.10-1
ii  dconf-cli 0.40.0-4
ii  dconf-gsettings-backend   0.40.0-4
ii  debconf [debconf-2.0] 1.5.82
ii  gir1.2-gdm-1.045~beta-1
ii  gnome-session [x-session-manager] 45.0-1
ii  gnome-session-bin 45.0-1
ii  gnome-session-common  45.0-1
ii  gnome-settings-daemon 45.0-1
ii  gnome-shell   44.5-1
ii  gnome-terminal [x-terminal-emulator]  3.50.0-1
ii  gsettings-desktop-schemas 45.0-1
ii  kwin-x11 [x-window-manager]   4:5.27.8-1
ii  libaccountsservice0   23.13.9-4
ii  libaudit1 1:3.1.1-1
ii  libc6 2.37-10
ii  libcanberra-gtk3-00.30-10
ii  libcanberra0  0.30-10
ii  libgdk-pixbuf-2.0-0   2.42.10+dfsg-1+b1
ii  libgdm1   45~beta-1
ii  libglib2.0-0  2.78.0-2
ii  libglib2.0-bin2.78.0-2
ii  libgtk-3-03.24.38-5
ii  libgudev-1.0-0238-2
ii  libkeyutils1  1.6.3-2
ii  libpam-modules1.5.2-7
ii  libpam-runtime1.5.2-7
ii  libpam-systemd [logind]   254.3-1
ii  libpam0g  1.5.2-7
ii  librsvg2-common   2.54.7+dfsg-2
ii  libselinux1   3.5-1
ii  libsystemd0   254.3-1
ii  libx11-6  2:1.8.6-1
ii  libxau6   1:1.0.9-1
ii  libxcb1   1.15-1
ii  libxdmcp6 1:1.1.2-3
ii  lxterminal [x-terminal-emulator]  0.4.0-2
ii  metacity [x-window-manager]   1:3.49.1-1
ii  polkitd   123-1
ii  procps2:4.0.3-1
ii  qterminal [x-terminal-emulator]   1.3.0-1
ii  rxvt-unicode [x-terminal-emulator]9.31-1
ii  systemd-sysv  254.3-1
ii  ucf   3.0043+nmu1
ii  x11-common1:7.7+23
ii  x11-xserver-utils 7.7+9+b1
ii  xfce4-session [x-session-manager] 4.18.3-1
ii  xfce4-terminal [x-terminal-emulator]  1.1.0-1
ii  xfwm4 [x-window-manager]  4.18.0-1
ii  xterm [x-terminal-emulator]   384-1

Versions of packages gdm3 recommends:
ii  at-spi2-core   2.50.0-1
ii  desktop-base   12.0.6+nmu1
ii  gnome-session [x

Processed: Bug#1052374 marked as pending in gdm3

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1052374 [gdm3] gdm3: Shows only an error screen when gnome.session is 
missing
Added tag(s) pending.

-- 
1052374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052374: marked as pending in gdm3

2023-09-21 Thread Simon McVittie
Control: tag -1 pending

Hello,

Bug #1052374 in gdm3 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/gnome-team/gdm/-/commit/46f501348e7d96f31a73c94754a30399fe125c50


d/gdm3.links: Create a dconf profile named for the Debian-gdm user

In upstream and Ubuntu gdm, the system username used for the greeter
is "gdm", but in Debian, for historical reasons it is "Debian-gdm".
Before version 45, the dconf profile name "gdm" was hard-coded, but
since version 45 it uses a profile name that matches the system username
(to allow gnome-initial-setup to have its own profile).

This resulted in the gdm greeter trying to use the ordinary gnome.session
instead of gnome-login.session, which caused login to fail when
the gnome-session package was not installed, and caused settings in
/etc/gdm3/greeter.dconf-defaults to be ineffective. Other differences
between gnome.session and gnome-login.session, potentially including
security hardening for the greeter, would also not have been effective.

Closes: #1052374, #1051671, #1051993


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1052374



Bug#1051374: breaks existing setups using /etc/default/mini-httpd

2023-09-21 Thread Alexandru Mihail
Hello,
> Looks good to me! I just uploaded. If this upload introduces any
> other
> problems, feel free to contact me to upload a fix.
> 
> Thanks!
> 
Thanks for your contribution and thanks for offering to help with a
possible future upload :)
By the way, the other fixed bug rendered virtual hosting in mini-httpd
pretty annoying; if you were ever thinking about using that feature, it
should work as intended now (seeing you have a non-trivial setup, maybe
that could be of interest sometimes)

> cheers, josch
Have a great day,
Alexandru



signature.asc
Description: This is a digitally signed message part


Bug#1051374: marked as done (breaks existing setups using /etc/default/mini-httpd)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 12:09:08 +
with message-id 
and subject line Bug#1051374: fixed in mini-httpd 1.30-5
has caused the Debian Bug report #1051374,
regarding breaks existing setups using /etc/default/mini-httpd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mini-httpd
Version: 1.30-4
Severity: serious

Hi,

after an upgrade to mini-httpd 1.30-4 my setup stopped working. It seems
that this new version changed the init script for a systemd unit where
the latter ignores the contents of /etc/default/mini-httpd.

If that is intentional and not an oversight, there should at least be a
NEWS entry so that users upgrading to 1.30-4 learn about this breaking
change and are also told how to convert their existing configuration to
the new style.

If possible it would of course be nice if the systemd service would not
break user's setups and would continue to consume /etc/default/mini-httpd.

Thanks!

cheers, josch
--- End Message ---
--- Begin Message ---
Source: mini-httpd
Source-Version: 1.30-5
Done: Alexandru Mihail 

We believe that the bug you reported is fixed in the latest version of
mini-httpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alexandru Mihail  (supplier of updated 
mini-httpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 21 Sep 2023 01:39:39 +0300
Source: mini-httpd
Architecture: source
Version: 1.30-5
Distribution: unstable
Urgency: medium
Maintainer: Alexandru Mihail 
Changed-By: Alexandru Mihail 
Closes: 491078 1051374
Changes:
 mini-httpd (1.30-5) unstable; urgency=medium
 .
   * Added patch stripping port numbers in vhost setup. (Closes: #491078).
   * Corrected systemd service not consuming /etc/default/mini-httpd
 configurations.
 Thanks a lot, Johannes Schauer Marin Rodrigues (Closes: #1051374).
Checksums-Sha1:
 cc28ae7275c37669d2ac22f9ecfa3243b50f4ee6 1869 mini-httpd_1.30-5.dsc
 c9b88d1a46e16a1e78a6f781b1df4255ad4fff61 15540 mini-httpd_1.30-5.debian.tar.xz
 943da2c11260441ab8fc3058451ffbc7024d4b15 5937 mini-httpd_1.30-5_arm64.buildinfo
Checksums-Sha256:
 9ab8df08a946254e8404d11adafc1b1afd19b5eb3b32ce0ee010ace58e3fe1ff 1869 
mini-httpd_1.30-5.dsc
 c20c86239bc0d4d6316990ca575d8f4bb177518a167c50e1db6ffe15d9d2835e 15540 
mini-httpd_1.30-5.debian.tar.xz
 083fcbed4f5cebbec3422b6a78bc5406ed148faccda8ae8b0218acdc6d801f29 5937 
mini-httpd_1.30-5_arm64.buildinfo
Files:
 151d544ea12838d3455ea76d688a8364 1869 web optional mini-httpd_1.30-5.dsc
 1452b3b112177433bbe08fcd726604ed 15540 web optional 
mini-httpd_1.30-5.debian.tar.xz
 1574a4a8388306f482fb9107248f4d78 5937 web optional 
mini-httpd_1.30-5_arm64.buildinfo

-BEGIN PGP SIGNATURE-
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=FJt/
-END PGP SIGNATURE End Message ---


Bug#1041162: marked as done (autopkgtest should ignore ESO entries for pinning)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 13:50:21 +0200
with message-id <4996da1b-a453-4e75-ad7a-f4f61972c...@debian.org>
and subject line Re: Accepted autopkgtest 5.30 (source) into unstable
has caused the Debian Bug report #1041162,
regarding autopkgtest should ignore ESO entries for pinning
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1041162: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041162
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: src:dkms
Version: 3.0.11-3
Severity: serious
Tags: sid trixie

seen with
https://ci.debian.net/data/autopkgtest/testing/amd64/d/dkms/35776414/log.gz

triggered by gcc-11, gcc-12, gcc-9

dkms's dependencies are a bit bogus, make | build-essential can be reduced to 
just make, because build-essential depends on it.


gcc | c-compiler probably leads to the excessive testing, please consider 
dropping the alternative, or if you want to really test with a specific 
compiler, use the package that triggered the test.


But having these tests fail on a regular basis is just a burden.

[...]
343s autoinstall for dkms modules has been disabled.
343s I: Checking for missing dkms dependency by trying to deinstall dkms
343s dpkg: dependency problems prevent removal of dkms:
343s  dkms-test-dkms depends on dkms (>= 2.1.0.0).
343s
343s dpkg: error processing package dkms (--remove):
343s  dependency problems - not removing
343s Errors were encountered while processing:
343s  dkms
344s I: No Linux header packages are installed.
344s I: Installing all available ones from src:linux 6.3.7-1:
344s I:   install linux-headers-6.3.0-1-amd64
344s I:   install linux-headers-6.3.0-1-cloud-amd64
344s I:   install linux-headers-6.3.0-1-rt-amd64
344s I:   skiplinux-headers-amd64
344s I:   skiplinux-headers-cloud-amd64
345s I:   skiplinux-headers-rt-amd64
345s I:   skiplinux-headers-6.3.0-2-amd64
345s I:   skiplinux-headers-6.3.0-2-cloud-amd64
345s I:   skiplinux-headers-6.3.0-2-rt-amd64
345s Reading package lists...
345s Building dependency tree...
345s Reading state information...
345s Some packages could not be installed. This may mean that you have
345s requested an impossible situation or if you are using the unstable
345s distribution that some required packages have not yet been created
345s or been moved out of Incoming.
345s The following information may help to resolve the situation:
345s
345s The following packages have unmet dependencies:
345s  libatomic1 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
345s  libcc1-0 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
345s  libgomp1 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
345s  libitm1 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
345s  liblsan0 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
345s  libquadmath0 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed

345s  libubsan1 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
345s E: Unable to correct problems, you have held broken packages.
345s E: Linux headers failed to install.
--- End Message ---
--- Begin Message ---

Version: 5.30

This landed in unstable and testing some time ago.

Paul


OpenPGP_signature.asc
Description: OpenPGP digital signature
--- End Message ---


Bug#1041161: marked as done (autopkgtest should ignore ESO entries for pinning)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 13:50:21 +0200
with message-id <4996da1b-a453-4e75-ad7a-f4f61972c...@debian.org>
and subject line Re: Accepted autopkgtest 5.30 (source) into unstable
has caused the Debian Bug report #1041162,
regarding autopkgtest should ignore ESO entries for pinning
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1041162: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041162
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: src:dkms
Version: 3.0.11-3
Severity: serious
Tags: sid trixie

see
https://ci.debian.net/data/autopkgtest/testing/arm64/d/dkms/35791560/log.gz

triggered by gcc-11

[...]
179s Building dependency tree...
179s Reading state information...
179s Some packages could not be installed. This may mean that you have
179s requested an impossible situation or if you are using the unstable
179s distribution that some required packages have not yet been created
179s or been moved out of Incoming.
179s The following information may help to resolve the situation:
179s
179s The following packages have unmet dependencies:
179s  libhwasan0 : Depends: gcc-13-base (= 13.1.0-8) but 13.1.0-6 is to be 
installed
179s E: Unable to correct problems, you have held broken packages.
179s E: Linux headers failed to install.

there seems to be something wrong with the setup of the test. why isn't the same 
version taken for the two packages?
--- End Message ---
--- Begin Message ---

Version: 5.30

This landed in unstable and testing some time ago.

Paul


OpenPGP_signature.asc
Description: OpenPGP digital signature
--- End Message ---


Bug#1051374: breaks existing setups using /etc/default/mini-httpd

2023-09-21 Thread Johannes Schauer Marin Rodrigues
Quoting Alexandru Mihail (2023-09-21 12:30:52)
> I have no problem with that, can you minimally review the tag and determine
> if it's fit for release or if anything is missing (ignore the added patch,
> that fixes a separate bug) ?
> 
>  This is still one of my first releases, I'm still getting the hang of
>  certain operations in salsa :)
> 
>  If everything is OK, let's proceed with the upload !

Looks good to me! I just uploaded. If this upload introduces any other
problems, feel free to contact me to upload a fix.

Thanks!

cheers, josch

signature.asc
Description: signature


Bug#1052316: marked as done (udev postinst uses update-rc.d -f remove which breaks /etc.init.d/udev transition and non-systemd boot)

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 13:40:36 +0200
with message-id <42c8f6c9-360a-4ef4-a32f-22a9dd7aa...@debian.org>
and subject line Re: udev postinst uses update-rc.d -f remove which breaks 
/etc.init.d/udev transition and non-systemd boot
has caused the Debian Bug report #1052316,
regarding udev postinst uses update-rc.d -f remove which breaks 
/etc.init.d/udev transition and  non-systemd boot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1052316: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052316
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: udev
Version: 254.3-1
Severity: serious
Justification: Breaks unrelated software, causes boot failure on some systems

Dear systemd Maintainers,

As reported in the follow-up to #1052116[1], udev's postinst uses update-rc.d's
-f option which breaks the transition of /etc/init.d/udev to bin:initscripts and
causes non-systemd systems to fail to boot.

Michael, as discussed yesterday on #debian-systemd, I am very grateful for your
quick commit of a fix[2].

This bug is to prevent unintended migration of the broken udev to trixie.

With thanks and best wishes

Mark

[1]  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052116#17
[2]  
https://salsa.debian.org/systemd-team/systemd/-/commit/12e2c67612f958148f0a4ca165cfb9ca1ed9d3c3


-- System Information:
Debian Release: 12.0
merged-usr: no
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-9-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
--- End Message ---
--- Begin Message ---

Version: 254.4-1


OpenPGP_signature.asc
Description: OpenPGP digital signature
--- End Message ---


Bug#1052374: gdm3: Shows only an error screen when gnome.session is missing

2023-09-21 Thread Simon McVittie
On Thu, 21 Sep 2023 at 11:17:51 +0100, Simon McVittie wrote:
> On Thu, 21 Sep 2023 at 09:41:25 +0300, Alper Nebi Yasak wrote:
> > I've been using gdm3 without GNOME, and after recently upgrading gdm3 to
> > 45~beta-1 I started getting the gray "Oh no!" error message instead of
> > the login screen.
> 
> Please look in the system log (systemd Journal) for the error messages
> that occur at this time, and send it to the bug address. Knowing only
> "it crashed" does not give us much information, and in particular, if we
> can reproduce a crash with gdm but not GNOME, it does not give us enough
> information to know that we have really reproduced the same crash you see.

I can reproduce something similar in a test VM after
`apt install --no-install-recommends xorg openbox gdm3`, does the attached
match what you see?

smcv


gdm-only.log.gz
Description: application/gzip


Bug#1042172: marked as done (ruby-jekyll-commonmark: FTBFS: ERROR: Test "ruby3.1" failed: Failure/Error: expect(commonmark.convert(content).gsub(%r!\s+!, "")).to match(output.gsub(%r!\s+!, "")))

2023-09-21 Thread Debian Bug Tracking System
Your message dated Thu, 21 Sep 2023 10:18:22 +
with message-id 
and subject line Bug#1042172: fixed in ruby-jekyll-commonmark 1.4.0-2
has caused the Debian Bug report #1042172,
regarding ruby-jekyll-commonmark: FTBFS: ERROR: Test "ruby3.1" failed: 
Failure/Error: expect(commonmark.convert(content).gsub(%r!\s+!, "")).to 
match(output.gsub(%r!\s+!, ""))
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1042172: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042172
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-jekyll-commonmark
Version: 1.4.0-1
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20230726 ftbfs-trixie

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>  Failure/Error: expect(commonmark.convert(content).gsub(%r!\s+!, "")).to 
> match(output.gsub(%r!\s+!, ""))
>expected 
> "atm_pin:1234"
>  to match 
> "#Sampleconfigurationtitle:CommonMarkTestverbose:trueatm_pin:1234"
>  # ./spec/jekyll_commonmark_spec.rb:78:in `block (3 levels) in  (required)>'
> 
> Finished in 0.36213 seconds (files took 0.48642 seconds to load)
> 12 examples, 1 failure
> 
> Failed examples:
> 
> rspec ./spec/jekyll_commonmark_spec.rb:50 # 
> Jekyll::Converters::Markdown::CommonMark with default configuration 
> highlights fenced code-block
> 
> Randomized with seed 62109
> 
> /usr/bin/ruby3.1 
> -I/usr/share/rubygems-integration/all/gems/rspec-support-3.12.0/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.12.0/lib
>  /usr/share/rubygems-integration/all/gems/rspec-core-3.12.0/exe/rspec 
> ./spec/jekyll_commonmark_spec.rb --format documentation failed
> ERROR: Test "ruby3.1" failed: 


The full build log is available from:
http://qa-logs.debian.net/2023/07/26/ruby-jekyll-commonmark_1.4.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20230726;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20230726&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: ruby-jekyll-commonmark
Source-Version: 1.4.0-2
Done: Cédric Boutillier 

We believe that the bug you reported is fixed in the latest version of
ruby-jekyll-commonmark, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1042...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cédric Boutillier  (supplier of updated 
ruby-jekyll-commonmark package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 21 Sep 2023 11:11:06 +0200
Source: ruby-jekyll-commonmark
Architecture: source
Version: 1.4.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers 

Changed-By: Cédric Boutillier 
Closes: 1042172
Changes:
 ruby-jekyll-commonmark (1.4.0-2) unstable; urgency=medium
 .
   * Team upload
   * patch to fix class for boolean in test. Closes: #1042172
Checksums-Sha1:
 007ba99605ed13b2646d6c098ae2250fb50e7e9a 1588 
ruby-jekyll-commonmark_1.4.0-2.dsc
 6cd33a09f45284e193f48619c57ff41d6161e003 3976 
ruby-jekyll-commonmark_1.4.0-2.debian.tar.xz
 8a6f4b8e401d10f90f9d95afc83bd40e0ba496f0 10381 
ruby-jekyll-commonmark_1.4.0-2_amd64.buildinfo
Checksums-Sha256:
 5ada8382ce9dc2da01aca767becd803a5f1543535a48a65b82853f0d5fd81f10 1588 
ruby-jekyll-commonmark_1.4.0-2.dsc
 f498540f986b65023a006211ba49e6ac2430c89d2366598f6451ef337101906c 3976 
ruby-jekyll-commonmark_1.4.0-2.debian.tar.xz
 88495d175f1a169d6f4e5c9bf09b39fc51526c9dc309c9625d66

Bug#1052374: gdm3: Shows only an error screen when gnome.session is missing

2023-09-21 Thread Simon McVittie
On Thu, 21 Sep 2023 at 09:41:25 +0300, Alper Nebi Yasak wrote:
> I've been using gdm3 without GNOME, and after recently upgrading gdm3 to
> 45~beta-1 I started getting the gray "Oh no!" error message instead of
> the login screen.

Please look in the system log (systemd Journal) for the error messages
that occur at this time, and send it to the bug address. Knowing only
"it crashed" does not give us much information, and in particular, if we
can reproduce a crash with gdm but not GNOME, it does not give us enough
information to know that we have really reproduced the same crash you see.

Thanks,
smcv



Bug#1042172: marked as pending in ruby-jekyll-commonmark

2023-09-21 Thread Cédric Boutillier
Control: tag -1 pending

Hello,

Bug #1042172 in ruby-jekyll-commonmark reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/ruby-team/ruby-jekyll-commonmark/-/commit/8c4233bf4565bcb180fa30e51a8804f68d89


patch to fix class for boolean in test. Closes: #1042172


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1042172



Processed: Bug#1042172 marked as pending in ruby-jekyll-commonmark

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1042172 [src:ruby-jekyll-commonmark] ruby-jekyll-commonmark: FTBFS: ERROR: 
Test "ruby3.1" failed: Failure/Error: 
expect(commonmark.convert(content).gsub(%r!\s+!, "")).to 
match(output.gsub(%r!\s+!, ""))
Added tag(s) pending.

-- 
1042172: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042172
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052388: python-sparse: autopkgtest needs update for new version of numba

2023-09-21 Thread Paul Gevers

Source: python-sparse
Version: 0.13.0-1
Severity: serious
X-Debbugs-CC: nu...@packages.debian.org
Tags: sid trixie
User: debian...@lists.debian.org
Usertags: needs-update
Control: affects -1 src:numba

Dear maintainer(s),

With a recent upload of numba the autopkgtest of python-sparse fails in 
testing when that autopkgtest is run with the binary packages of numba 
from unstable. It passes when run with only packages from testing. In 
tabular form:


   passfail
numba  from testing0.57.1+dfsg-1
python-sparse  from testing0.13.0-1
all others from testingfrom testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration of numba to testing 
[1]. Of course, numba shouldn't just break your autopkgtest (or even 
worse, your package), but it seems to me that numba isn't going to fix 
the situation.


If this is a real problem in your package (and not only in your 
autopkgtest), the right binary package(s) from numba should really add a 
versioned Breaks on the unfixed version of (one of your) package(s). 
Note: the Breaks is nice even if the issue is only in the autopkgtest as 
it helps the migration software to figure out the right versions to 
combine in the tests.


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=numba

https://ci.debian.net/data/autopkgtest/testing/amd64/p/python-sparse/38059394/log.gz

115s === FAILURES 
===
115s ___ test_tensordot[coo-gcxs-a_shape1-b_shape1-axes1] 
___

115s
115s a_shape = (3, 4), b_shape = (4, 3), axes = (0, 1), a_format = 'coo'
115s b_format = 'gcxs'
115s
115s @pytest.mark.parametrize(
115s "a_shape,b_shape,axes",
115s [
115s [(3, 4), (4, 3), (1, 0)],
115s [(3, 4), (4, 3), (0, 1)],
115s [(3, 4, 5), (4, 3), (1, 0)],
115s [(3, 4), (5, 4, 3), (1, 1)],
115s [(3, 4), (5, 4, 3), ((0, 1), (2, 1))],
115s [(3, 4), (5, 4, 3), ((1, 0), (1, 2))],
115s [(3, 4, 5), (4,), (1, 0)],
115s [(4,), (3, 4, 5), (0, 1)],
115s [(4,), (4,), (0, 0)],
115s [(4,), (4,), 0],
115s ],
115s )
115s @pytest.mark.parametrize(
115s "a_format, b_format",
115s [("coo", "coo"), ("coo", "gcxs"), ("gcxs", "coo"), ("gcxs", 
"gcxs")],

115s )
115s def test_tensordot(a_shape, b_shape, axes, a_format, b_format):
115s sa = sparse.random(a_shape, density=0.5, format=a_format)
115s sb = sparse.random(b_shape, density=0.5, format=b_format)
115s
115s a = sa.todense()
115s b = sb.todense()
115s
115s a_b = np.tensordot(a, b, axes)
115s
115s # tests for return_type=None
115s sa_sb = sparse.tensordot(sa, sb, axes)
115s sa_b = sparse.tensordot(sa, b, axes)
115s a_sb = sparse.tensordot(a, sb, axes)
115s
115s assert_eq(a_b, sa_sb)
115s assert_eq(a_b, sa_b)
115s assert_eq(a_b, a_sb)
115s if all(isinstance(arr, COO) for arr in [sa, sb]):
115s assert isinstance(sa_sb, COO)
115s else:
115s assert isinstance(sa_sb, GCXS)
115s assert isinstance(sa_b, np.ndarray)
115s assert isinstance(a_sb, np.ndarray)
115s
115s # tests for return_type=COO
115s sa_b = sparse.tensordot(sa, b, axes, return_type=COO)
115s >   a_sb = sparse.tensordot(a, sb, axes, return_type=COO)
115s
115s tests/test_dot.py:58:
115s _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
_ _ _ _ _ _

115s /usr/lib/python3/dist-packages/sparse/_common.py:198: in tensordot
115s res = _dot(at, bt, return_type)
115s /usr/lib/python3/dist-packages/sparse/_common.py:425: in _dot
115s out = GCXS(
115s 
/usr/lib/python3/dist-packages/sparse/_compressed/compressed.py:195: in 
__init__

115s self._prune()
115s 
/usr/lib/python3/dist-packages/sparse/_compressed/compressed.py:817: in 
_prune
115s np.cumsum(np.bincount(coords[0], minlength=row_size), 
out=indptr[1:])
115s _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
_ _ _ _ _ _

115s
115s args = (array([7304680739967889201, 3701732606794297453, 
   1,

115s  1,   2,   2,
115s  3,   3]),)
115s kwargs = {'minlength': 4}
115s relevant_args = (array([7304680739967889201, 3701732606794297453, 
1,

115s  1,   2,   2,
115s  3,   3]), None)
115s
115s >   ???
115s E   ValueError: array is too big; `arr.size * arr.dtype.itemsize` 
is larger than the maximum possib

Processed: python-sparse: autopkgtest needs update for new version of numba

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 src:numba
Bug #1052388 [src:python-sparse] python-sparse: autopkgtest needs update for 
new version of numba
Added indication that 1052388 affects src:numba

-- 
1052388: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052388
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: src:android-platform-tools: fails to migrate to testing for too long: ABI breakage?

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> close -1 34.0.4-1
Bug #1052383 [src:android-platform-tools] src:android-platform-tools: fails to 
migrate to testing for too long: ABI breakage?
Marked as fixed in versions android-platform-tools/34.0.4-1.
Bug #1052383 [src:android-platform-tools] src:android-platform-tools: fails to 
migrate to testing for too long: ABI breakage?
Marked Bug as done

-- 
1052383: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052383
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052383: src:android-platform-tools: fails to migrate to testing for too long: ABI breakage?

2023-09-21 Thread Paul Gevers

Source: android-platform-tools
Version: 33.0.3-2
Severity: serious
Control: close -1 34.0.4-1
Tags: sid trixie
User: release.debian@packages.debian.org
Usertags: out-of-sync

Dear maintainer(s),

The Release Team considers packages that are out-of-sync between testing 
and unstable for more than 30 days as having a Release Critical bug in 
testing [1]. Your package src:android-platform-tools has been trying to 
migrate for 31 days [2]. Hence, I am filing this bug. The version in 
unstable causes autopkgtest failures in android-platform-art. The error 
message suggest an ABI breakage without a SONAME bump and associated 
library package rename.


If a package is out of sync between unstable and testing for a longer 
period, this usually means that bugs in the package in testing cannot be 
fixed via unstable. Additionally, blocked packages can have impact on 
other packages, which makes preparing for the release more difficult. 
Finally, it often exposes issues with the package and/or
its (reverse-)dependencies. We expect maintainers to fix issues that 
hamper the migration of their package in a timely manner.


This bug will trigger auto-removal when appropriate. As with all new 
bugs, there will be at least 30 days before the package is auto-removed.


I have immediately closed this bug with the version in unstable, so if 
that version or a later version migrates, this bug will no longer affect 
testing. I have also tagged this bug to only affect sid and trixie, so 
it doesn't affect (old-)stable.


If you believe your package is unable to migrate to testing due to 
issues beyond your control, don't hesitate to contact the Release Team.


Paul

[1] https://lists.debian.org/debian-devel-announce/2023/06/msg1.html
[2] https://qa.debian.org/excuses.php?package=android-platform-tools

https://ci.debian.net/data/autopkgtest/testing/amd64/a/android-platform-art/38059356/log.gz

 86s /usr/bin/dexdump: symbol lookup error: 
/usr/lib/x86_64-linux-gnu/android/libart.so.0: undefined symbol: 
_ZN12BacktraceMap6CreateEib


OpenPGP_signature.asc
Description: OpenPGP digital signature


Processed: wrong tags

2023-09-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1031414 =
Bug #1031414 [src:libgpuarray] libgpuarray: i386 test fail with new pocl
Removed tag(s) fixed-upstream, sid, and bookworm.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1031414: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031414
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1031414: not fixed Re: libgpuarray: i386 test fail with new pocl

2023-09-21 Thread Paul Gevers

Control: reassign -1 src:libgpuarray
Control: found -1 0.7.6-13

On Mon, 21 Aug 2023 07:51:27 +0100 "Rebecca N. Palmer" 
 wrote:

Control: severity -1 serious

That wasn't a fix - log with pocl 4:

https://ci.debian.net/data/autopkgtest/testing/i386/libg/libgpuarray/37023715/log.gz


Given that this bug is already linked (blocked) by the root cause of 
this issue, which doesn't seem to get resolved, I consider this bug to 
not be a pocl issue anymore, but only a libgpuarray issue: its 
autopkgtest fails.


Of course ideally the issue in llvm gets fixed, but while that is 
waiting for somebody to pick up the work, I suggest to skip the failing 
test on i386. If you believe that the autopkgtest shows that libgpuarray 
(or pocl) isn't usable for most usage on i386, than please have it 
removed from i386 (and prevent a successful build until the issue is 
resolved).


Paul
PS: CC the i386 porter to let him know in case he's not aware yet.


OpenPGP_signature.asc
Description: OpenPGP digital signature


Processed: not fixed Re: libgpuarray: i386 test fail with new pocl

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:libgpuarray
Bug #1031414 [src:pocl,src:libgpuarray] libgpuarray: i386 test fail with new 
pocl
Bug reassigned from package 'src:pocl,src:libgpuarray' to 'src:libgpuarray'.
No longer marked as found in versions libgpuarray/0.7.6-13, pocl/4.0-2, 
pocl/3.1-3, and libgpuarray/0.7.6-14.
Ignoring request to alter fixed versions of bug #1031414 to the same values 
previously set
> found -1 0.7.6-13
Bug #1031414 [src:libgpuarray] libgpuarray: i386 test fail with new pocl
Marked as found in versions libgpuarray/0.7.6-13.

-- 
1031414: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031414
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052376: lxpanel: no longer obeys its geometry settings

2023-09-21 Thread Francesco Poli
On Thu, 21 Sep 2023 08:49:04 +0200 Francesco Poli (wintermute) wrote:

> Downgrading/reinstalling the following packages:
> 
>   libwnck-common (2.30.7-6)
>   libwnck22 (2.30.7-6+b1)
>   libkeybinder0 (0.3.1-2.1)
>   libfm4 (1.3.2-1)
>   libfm-gtk4 (1.3.2-1)
>   lxpanel-data (0.10.1-2) ...
>   lxpanel (0.10.1-2)
> 
> is enough to restore the normal (sane) behavior.

I also had to downgrade the following package:

  libfm-modules (1.3.2-1)

and to purge the following packages:

  libfm-gtk3-4
  libkeybinder-3.0-0
  libwnck-3-0
  libwnck-3-common



-- 
 http://www.inventati.org/frx/
 There's not a second to spare! To the laboratory!
. Francesco Poli .
 GnuPG key fpr == CA01 1147 9CD2 EFDF FB82  3925 3E1C 27E1 1F69 BFFE


pgpEyZ59mSSga.pgp
Description: PGP signature


Processed: Re: lintian: FTBFS: 3 tests failed

2023-09-21 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + patch
Bug #1042049 [src:lintian] lintian: FTBFS: 3 tests failed
Added tag(s) patch.

-- 
1042049: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042049
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1042049: lintian: FTBFS: 3 tests failed

2023-09-21 Thread Shengjing Zhu
Control: tags -1 + patch

Hi,

Please see the following patch
https://salsa.debian.org/lintian/lintian/-/merge_requests/480