Bug#1068681: kquickcharts: Make the tests non-fatal on loong64

2024-04-08 Thread zhangdandan

Source: kquickcharts
Version: 5.107.0-1
Severity: wishlist
Tags: ftbfs patch
User: debian-loonga...@lists.debian.org
Usertags: loong64

Dear maintainers,

Compiling the kquickcharts package failed for loong64 in the Debian 
Package Auto-Building environment, the error log is as follows:

```
..
The following tests FAILED:
      5 - tst_BarChart.qml (Subprocess aborted)
      6 - tst_LineChart.qml (Subprocess aborted)
      7 - tst_PieChart.qml (Subprocess aborted)
Errors while running CTest
```

The full build log can be found at 
https://buildd.debian.org/status/logs.php?pkg=kquickcharts=5.107.0-1%2Bb1=loong64.


There is no architecture-related code in the kquickcharts source code.
Refer to the processing methods of other architectures, could you set 
the tests non-fatal on loong64?

Please consider the patch I have attached.
Your opinions are welcome.

Thanks,
Dandan Zhang

diff -Nru kquickcharts-5.107.0/debian/rules kquickcharts-5.107.0/debian/rules
--- kquickcharts-5.107.0/debian/rules   2023-03-16 21:42:02.0 +
+++ kquickcharts-5.107.0/debian/rules   2023-06-18 14:08:49.0 +
@@ -5,7 +5,7 @@
 
 export DEB_BUILD_MAINT_OPTIONS = hardening=+all
 
-testsuite_failing_archs := alpha hppa hurd-i386 mips64el powerpc riscv64 x32
+testsuite_failing_archs := alpha hppa hurd-i386 loong64 mips64el powerpc 
riscv64 x32
 ifneq (,$(filter $(DEB_HOST_ARCH),$(testsuite_failing_archs)))
   fail_param := || true
 endif


Processing of kf6-kconfigwidgets_6.0.0-1_amd64.changes

2024-04-08 Thread Debian FTP Masters
kf6-kconfigwidgets_6.0.0-1_amd64.changes uploaded successfully to localhost
along with the files:
  kf6-kconfigwidgets_6.0.0-1.dsc
  kf6-kconfigwidgets_6.0.0.orig.tar.xz
  kf6-kconfigwidgets_6.0.0.orig.tar.xz.asc
  kf6-kconfigwidgets_6.0.0-1.debian.tar.xz
  kf6-kconfigwidgets_6.0.0-1_amd64.buildinfo
  libkf6configwidgets-data_6.0.0-1_all.deb
  libkf6configwidgets-dev-dbgsym_6.0.0-1_amd64.deb
  libkf6configwidgets-dev_6.0.0-1_amd64.deb
  libkf6configwidgets-doc_6.0.0-1_all.deb
  libkf6configwidgets6-dbgsym_6.0.0-1_amd64.deb
  libkf6configwidgets6_6.0.0-1_amd64.deb

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



kf6-kconfigwidgets_6.0.0-1_amd64.changes is NEW

2024-04-08 Thread Debian FTP Masters
binary:libkf6configwidgets-data is NEW.
binary:libkf6configwidgets-dev is NEW.
binary:libkf6configwidgets-doc is NEW.
binary:libkf6configwidgets6 is NEW.
binary:libkf6configwidgets-data is NEW.
binary:libkf6configwidgets-dev is NEW.
binary:libkf6configwidgets-doc is NEW.
binary:libkf6configwidgets6 is NEW.
source:kf6-kconfigwidgets is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports


pgpamcok_9Cjx.pgp
Description: PGP signature


Processing of kf6-kcolorscheme_6.0.0-1_amd64.changes

2024-04-08 Thread Debian FTP Masters
kf6-kcolorscheme_6.0.0-1_amd64.changes uploaded successfully to localhost
along with the files:
  kf6-kcolorscheme_6.0.0-1.dsc
  kf6-kcolorscheme_6.0.0.orig.tar.xz
  kf6-kcolorscheme_6.0.0.orig.tar.xz.asc
  kf6-kcolorscheme_6.0.0-1.debian.tar.xz
  kf6-kcolorscheme_6.0.0-1_amd64.buildinfo
  libkf6colorscheme-data_6.0.0-1_all.deb
  libkf6colorscheme-dev_6.0.0-1_amd64.deb
  libkf6colorscheme-doc_6.0.0-1_all.deb
  libkf6colorscheme6-dbgsym_6.0.0-1_amd64.deb
  libkf6colorscheme6_6.0.0-1_amd64.deb

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



kf6-kcolorscheme_6.0.0-1_amd64.changes REJECTED

2024-04-08 Thread Debian FTP Masters

kf6-kcolorscheme_6.0.0-1.dsc: Does not match file already existing in the pool.


binary:libkf6colorscheme-data is NEW.
binary:libkf6colorscheme-dev is NEW.
binary:libkf6colorscheme-doc is NEW.
binary:libkf6colorscheme6 is NEW.
binary:libkf6colorscheme-data is NEW.
binary:libkf6colorscheme-dev is NEW.
binary:libkf6colorscheme-doc is NEW.
binary:libkf6colorscheme6 is NEW.
source:kf6-kcolorscheme is NEW.
kf6-kcolorscheme_6.0.0.orig.tar.xz is only available in NEW.
kf6-kcolorscheme_6.0.0.orig.tar.xz.asc is only available in NEW.
libkf6colorscheme-data_6.0.0-1_all.deb is only available in NEW.
libkf6colorscheme-dev_6.0.0-1_amd64.deb is only available in NEW.
libkf6colorscheme6-dbgsym_6.0.0-1_amd64.deb is only available in NEW.
kf6-kcolorscheme_6.0.0.orig.tar.xz is only available in NEW.
kf6-kcolorscheme_6.0.0.orig.tar.xz.asc is only available in NEW.

===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.



pgpZ7adchEuuv.pgp
Description: PGP signature


Processing of kf6-kcolorscheme_6.0.0-1_amd64.changes

2024-04-08 Thread Debian FTP Masters
kf6-kcolorscheme_6.0.0-1_amd64.changes uploaded successfully to localhost
along with the files:
  kf6-kcolorscheme_6.0.0-1.dsc
  kf6-kcolorscheme_6.0.0.orig.tar.xz
  kf6-kcolorscheme_6.0.0.orig.tar.xz.asc
  kf6-kcolorscheme_6.0.0-1.debian.tar.xz
  kf6-kcolorscheme_6.0.0-1_amd64.buildinfo
  libkf6colorscheme-data_6.0.0-1_all.deb
  libkf6colorscheme-dev_6.0.0-1_amd64.deb
  libkf6colorscheme-doc_6.0.0-1_all.deb
  libkf6colorscheme6-dbgsym_6.0.0-1_amd64.deb
  libkf6colorscheme6_6.0.0-1_amd64.deb

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



kf6-kcolorscheme_6.0.0-1_amd64.changes is NEW

2024-04-08 Thread Debian FTP Masters
binary:libkf6colorscheme-data is NEW.
binary:libkf6colorscheme-dev is NEW.
binary:libkf6colorscheme-doc is NEW.
binary:libkf6colorscheme6 is NEW.
binary:libkf6colorscheme-data is NEW.
binary:libkf6colorscheme-dev is NEW.
binary:libkf6colorscheme-doc is NEW.
binary:libkf6colorscheme6 is NEW.
source:kf6-kcolorscheme is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports


pgpJgGtaG4Ed6.pgp
Description: PGP signature


Bug#1068454: marked as done (qt6-base: CVE-2024-30161)

2024-04-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Apr 2024 09:12:48 -0300
with message-id <4656997.FDCN7LgBLZ@gryffindor>
and subject line Re: qt6-base: CVE-2024-30161
has caused the Debian Bug report #1068454,
regarding qt6-base: CVE-2024-30161
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1068454: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068454
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: qt6-base
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for qt6-base.

CVE-2024-30161[0]:
| In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component may
| access QNetworkReply header data via a dangling pointer.

https://codereview.qt-project.org/c/qt/qtbase/+/544314
https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-30161
https://www.cve.org/CVERecord?id=CVE-2024-30161

Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Hi Moritz!

El viernes, 5 de abril de 2024 11:47:22 -03 Moritz Mühlenhoff escribió:
> Source: qt6-base
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for qt6-base.
> 
> CVE-2024-30161[0]:
> | In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component may
> | access QNetworkReply header data via a dangling pointer.
> 
> https://codereview.qt-project.org/c/qt/qtbase/+/544314
> https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365

To the best of my knowledge we do not use the wasm (web assembly) at all, so as 
discussed on IRC, I am closing this bug.

Thanks for your work 

-- 
Lisandro Pérez Meyer
Embedded Platform Engineer--- End Message ---