Bug#990066: unblock: distcc/3.3.2-10+deb10u1

2021-06-25 Thread Christian Marillat
On 19 juin 2021 08:40, Christian Marillat  wrote:

> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: maril...@debian.org
>
> Please unblock package distcc
>
> The Debian script update-distcc-symlinks who generate gcc/clang symlinks in
> /usr/lib/distcc doesn't work with gcc cross compiler and clang.
>
> This bug has been "fixed" in 3.3.2-6 by installing the upstream python
> script, but I reverted to the Debian perl script in 3.3.2-8 to not depends
> on python3 without reopening/fixing bug #919704

Would be nice to know if this package is accepter in buster before the
bullseye release.

Christian



Información 2021 FOESCO

2021-06-25 Thread FOESCO
FOESCO informa


Abierto el plazo de inscripción de CURSOS BONIFICABLES E-LEARNING dirigidos a 
empleados en activo o en situación de ERTE (Convocatoria JULIO 2021)

Plazo de inscripción hasta el 30 de Junio


Adjuntamos PDF con el listado de cursos disponibles.

Para más información por favor respondan a este mismo correo electrónico o bien 
llamen al teléfono 910323794.


Saludos cordiales.


FOESCO Formación Estatal Continua.
Departamento de Formación Bonificable.
Tel: 910 323 794 
(Horario de 9h a 15h y de 17h a 20h de Lunes a Viernes)



NEW changes in stable-new

2021-06-25 Thread Debian FTP Masters
Processing changes file: 
shim-helpers-arm64-signed_1+15.4+6~deb10u1_arm64-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-06-25 Thread Debian FTP Masters
Processing changes file: 
shim-helpers-amd64-signed_1+15.4+6~deb10u1_amd64.changes
  ACCEPT
Processing changes file: shim-helpers-i386-signed_1+15.4+6~deb10u1_i386.changes
  ACCEPT



Bug#989695: pre-approval: mono/6.8.0.105+dfsg-3.1

2021-06-25 Thread Paul Gevers
Hi,

On 10-06-2021 19:25, Andreas Beckmann wrote:
> If you ACK this, I intend to 0-day NMU this to experimental because it
> needs NEW processing. Please prod the ftp-masters to get this actually done.

We don't have control over ftp-masters *and* I still need some days
before I can actually look properly into this (I suspect strongly that
other colleagues won't beat me to it). Therefor, I propose you already
upload to experimental.

Paul



OpenPGP_signature
Description: OpenPGP digital signature


Bug#990277: unblock: feature-check/0.2.2-7

2021-06-25 Thread Sebastian Ramacher
Control: tags -1 moreinfo confirmed

On 2021-06-24 15:42:28 +0300, Peter Pentchev wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> 
> This is a pre-approval request before I upload feature-check/0.2.2-7
> to unstable to fix an RC bug.

Please go ahead and remove the moreinfo tag once the new version is
available in unstable.

> 
> [ Reason ]
> See #990276 (https://bugs.debian.org/990276): Version comparisons may
> return the wrong result.
> 
> [ Impact ]
> If the feature-check command-line tool is used by other programs to
> make sure that an installed program has a recent enough version of
> a supported feature, the checks may fail for some versions containing
> non-numeric characters (pre-release, patch, etc).
> 
> [ Tests ]
> The patches include additions to the feature-check unit-test suite that
> is run both at build time and as an autopkgtest.
> 
> [ Risks ]
> Leaf package, not widely used yet; targeted fix, so hopefully
> any risks are very low.
> 
> [ Checklist ]
>   [x] all changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in testing
> 
> unblock feature-check/0.2.2-7

> diff -Nru feature-check-0.2.2/debian/changelog 
> feature-check-0.2.2/debian/changelog
> --- feature-check-0.2.2/debian/changelog  2020-10-26 11:14:52.0 
> +0200
> +++ feature-check-0.2.2/debian/changelog  2021-06-24 15:33:07.0 
> +0300
> @@ -1,3 +1,10 @@
> +feature-check (0.2.2-7) unstable; urgency=medium
> +
> +  * Add the cmp-num and cmp-rest upstream patches to fix some version
> +string comparisons. Closes: #990276
> +
> + -- Peter Pentchev   Thu, 24 Jun 2021 15:33:07 +0300
> +
>  feature-check (0.2.2-6) unstable; urgency=medium
>  
>[ Michael Hudson-Doyle ]
> diff -Nru feature-check-0.2.2/debian/patches/cmp-num.patch 
> feature-check-0.2.2/debian/patches/cmp-num.patch
> --- feature-check-0.2.2/debian/patches/cmp-num.patch  1970-01-01 
> 02:00:00.0 +0200
> +++ feature-check-0.2.2/debian/patches/cmp-num.patch  2021-06-24 
> 15:30:21.0 +0300
> @@ -0,0 +1,46 @@
> +Description: Fix a 2 < 10 version int/string bug.
> +Origin: upstream; 
> https://gitlab.com/ppentchev/feature-check/-/commit/ed0da5159562fa37cf32386a1baf2a1114562822
> +Bug-Debian: https://bugs.debian.org/990276
> +Author: Peter Pentchev 
> +Last-Update: 2021-06-24
> +
> +--- a/perl5/feature-check.pl
>  b/perl5/feature-check.pl
> +@@ -269,7 +269,7 @@
> + if ($na ne '') {
> + if ($nb ne '') {
> + if ($nb != $na) {
> +-return $na cmp $nb;
> ++return $na <=> $nb;
> + }
> + } else {
> + return 1;
> +--- a/t/04-simple.t
>  b/t/04-simple.t
> +@@ -1,6 +1,6 @@
> + #!/usr/bin/perl
> + #
> +-# Copyright (c) 2018  Peter Pentchev
> ++# Copyright (c) 2018, 2021  Peter Pentchev
> + # All rights reserved.
> + #
> + # Redistribution and use in source and binary forms, with or without
> +@@ -89,6 +89,18 @@
> + ['base ge 3', 0],
> + ['base gt 3', 0],
> + ['base eq 3', 0],
> ++
> ++['base lt 10', 1],
> ++['base le 10', 1],
> ++['base ge 10', 0],
> ++['base gt 10', 0],
> ++['base eq 10', 0],
> ++
> ++['base lt 10.1', 1],
> ++['base le 10.1', 1],
> ++['base ge 10.1', 0],
> ++['base gt 10.1', 0],
> ++['base eq 10.1', 0],
> + );
> + 
> + my %c = env_init;
> diff -Nru feature-check-0.2.2/debian/patches/cmp-rest.patch 
> feature-check-0.2.2/debian/patches/cmp-rest.patch
> --- feature-check-0.2.2/debian/patches/cmp-rest.patch 1970-01-01 
> 02:00:00.0 +0200
> +++ feature-check-0.2.2/debian/patches/cmp-rest.patch 2021-06-24 
> 15:30:28.0 +0300
> @@ -0,0 +1,62 @@
> +Description: Fix a 3.0.beta2 < 3.0 version int/string bug.
> +Origin: upstream; 
> https://gitlab.com/ppentchev/feature-check/-/commit/59e618baff6836f281697561f5a9cfa22ccd28df
> +Bug-Debian: https://bugs.debian.org/990276
> +Author: Peter Pentchev 
> +Last-Update: 2021-06-24
> +
> +--- a/perl5/feature-check.pl
>  b/perl5/feature-check.pl
> +@@ -282,7 +282,7 @@
> + if ($ra ne '') {
> + if ($rb ne '') {
> + if ($ra ne $rb) {
> +-return $ra <=> $rb;
> ++return $ra cmp $rb;
> + }
> + } else {
> + return 1;
> +--- a/t/04-simple.t
>  b/t/04-simple.t
> +@@ -101,6 +101,42 @@
> + ['base ge 10.1', 0],
> + ['base gt 10.1', 0],
> + ['base eq 10.1', 0],
> ++
> ++['beta lt 1', 0],
> ++['beta le 1', 0],
> ++['beta eq 1', 0],
> ++['beta ge 1', 1],
> ++['beta gt 1', 1],
> ++
> ++['beta lt 3.0', 1],
> ++['beta le 3.0', 1],
> ++['beta eq 3.0', 0],
> ++['beta ge 3.0', 0],
> ++['beta gt 3.0', 0],
> ++
> ++['beta lt 3.0.beta1', 

Processed: Re: Bug#990277: unblock: feature-check/0.2.2-7

2021-06-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo confirmed
Bug #990277 [release.debian.org] unblock: feature-check/0.2.2-7
Added tag(s) confirmed and moreinfo.

-- 
990277: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990277
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990203: marked as done (unblock: cinnamon-screensaver/4.8.1-3)

2021-06-25 Thread Debian Bug Tracking System
Your message dated Fri, 25 Jun 2021 18:37:53 +
with message-id 
and subject line unblock cinnamon-screensaver
has caused the Debian Bug report #990203,
regarding unblock: cinnamon-screensaver/4.8.1-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
990203: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990203
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package cinnamon-screensaver

[ Reason ]
/etc/pam.d/cinnamon-screensaver was missed for a mistake in 4.8.1-1, 
4.8.1-3 readd it


[ Impact ]
Impact is for new bullseye install, upgrade from version that still have 
the file (as conffile) should be null instead FWIK


[ Tests ]
I tested the new package install/upgrade and I not found issue

[ Risks ]
there should be no risk FWIK

The diff: 
https://salsa.debian.org/cinnamon-team/cinnamon-screensaver/-/compare/debian%2F4.8.1-2...debian%2F4.8.1-3


unblock cinnamon-screensaver/4.8.1-3
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


NEW changes in stable-new

2021-06-25 Thread Debian FTP Masters
Processing changes file: 
shim-helpers-amd64-signed_1+15.4+6~deb10u1_source.changes
  ACCEPT
Processing changes file: 
shim-helpers-arm64-signed_1+15.4+6~deb10u1_source.changes
  ACCEPT
Processing changes file: 
shim-helpers-i386-signed_1+15.4+6~deb10u1_source.changes
  ACCEPT



Bug#990319: unblock: intel-microcode/3.20210608.2

2021-06-25 Thread Henrique de Moraes Holschuh
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package intel-microcode

I would like to unblock the intel-microcode update currently in
unstable, so that it will be available in Debian 11.

Please note that the current plans are that a Debian 10 (buster)
security update, intel-microcode/3.20210608.2~deb10u1, will be delivered
to Debian stable in the next couple days through debian-security, in
which case the version currently in Debian 11 "bullseye" would be
*OLDER* than what would be available in buster-security and unstable.

Also, please be warned that this update has the potential to cause
regressions when compared to the previous version of the intel-microcode
package.  But do read the text below for the full rationale.


Potential regressions:

intel-microcode/3.20210608.2 restores a *LOT* of security updates to
Skylake D0/R0, but it might cause boot problems on systems that have too
old a microcode update *in BIOS*.  I have been asking around to check if
this still happens on the new microcode, but I haven't heard from anyone
affected yet.

Ubuntu and upstream reports about this:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1882890

intel-microcode/3.20210608.2 can also cause Intel WiFi connection issues
on systems with Intel Wireless *on-board* and a specific family of
processors (CoffeLake signature 0x906ea).  There is hope that a newer
release of iwlwifi-firmware (which is being arranged by the Debian
security team, since it is *also* a security update to mitigate some of
FragAttack) works around this issue.

Upstream report:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/56


Rationale for issuing it as a security-update to Debian buster, and the
Debian bollseye unblock request:

I have talked it over with the stable security team, and they're fully
aware of the above regression potential.  We considered several possible
scenarios (including *not* updating the affected processors), and the
security team prefers that we *do* issue the full microcode update, but
warn users of the potential issues.

The reason behind this decision is simple: we were forced to withold
relevant operational and security updates from a much larger set of
users, to avoid regressions on a much smaller set of users, and have
done so for quite a while already.  This situation cannot continue
indefinitely.

Anyway, once the buster-security update to
intel-microcode/3.20210608.2~deb10u1 is out, switching bullseye to
intel-microcode/3.20210608.2 is *NOT* going to add any regressions
compared to Debian stable + security updates.

I am filling this bug report before the security update is distributed
just in case.

IMPORTANT: I do recommend that we wait for at least 10 more days before
possibly unblocking the migration of intel-microcode/3.20210608.2 to
bullseye, anyway.  That will allow for feedback from the security
update to be acted upon.


Here's the git diffstat (git diff attached, as usual):
 README.md |   14 ++--
 changelog |   59 
 debian/changelog  |   71 
 intel-ucode-with-caveats/06-4f-01 |binary
 intel-ucode/06-3f-02  |binary
 intel-ucode/06-3f-04  |binary
 intel-ucode/06-4e-03  |binary
 intel-ucode/06-55-03  |binary
 intel-ucode/06-55-04  |binary
 intel-ucode/06-55-05  |binary
 intel-ucode/06-55-06  |binary
 intel-ucode/06-55-07  |binary
 intel-ucode/06-55-0b  |binary
 intel-ucode/06-56-03  |binary
 intel-ucode/06-56-04  |binary
 intel-ucode/06-56-05  |binary
 intel-ucode/06-5c-09  |binary
 intel-ucode/06-5c-0a  |binary
 intel-ucode/06-5e-03  |binary
 intel-ucode/06-5f-01  |binary
 intel-ucode/06-6a-05  |binary
 intel-ucode/06-6a-06  |binary
 intel-ucode/06-7a-01  |binary
 intel-ucode/06-7a-08  |binary
 intel-ucode/06-7e-05  |binary
 intel-ucode/06-86-04  |binary
 intel-ucode/06-86-05  |binary
 intel-ucode/06-8a-01  |binary
 intel-ucode/06-8c-01  |binary
 intel-ucode/06-8c-02  |binary
 intel-ucode/06-8d-01  |binary
 intel-ucode/06-8e-09  |binary
 intel-ucode/06-8e-0a  |binary
 intel-ucode/06-8e-0b  |binary
 intel-ucode/06-8e-0c  |binary
 intel-ucode/06-96-01  |binary
 intel-ucode/06-9c-00  |binary
 intel-ucode/06-9e-09  |binary
 intel-ucode/06-9e-0a  |binary
 intel-ucode/06-9e-0b  |binary
 intel-ucode/06-9e-0c  |binary
 intel-ucode/06-9e-0d  |binary
 

Bug#990315: buster-pu: package gcc-mingw-w64/21.3~deb10u1

2021-06-25 Thread Stephen Kitt
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

Would it be possible to upload the backported fix for gcc-mingw-w64’s
#989862 to Buster? The debdiff is attached; it’s a minimal, targeted
fix for gcov support.

Regards,

Stephen


-- System Information:
Debian Release: 10.10
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-debug'), (500, 'stable'), 
(100, 'unstable-debug'), (100, 'testing-debug'), (100, 'unstable'), (100, 
'testing'), (1, 'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, arm64

Kernel: Linux 4.19.0-17-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
commit f319345c3caf1dedbfc87654e1853762af3b6d77
Author: Stephen Kitt 
Date:   Tue Jun 15 22:18:31 2021 +0200

Fix gcov handling

When gcov is supported in a cross-compiler setup, GCC assumes that
either the headers are present and shared with the host, or present
and set up in a sysroot, or absent. We have headers which aren’t
shared and aren’t in a sysroot, so we need to tell GCC where they are
*without* specifying them as an argument to --with-headers (the latter
must only be enabled).

Closes: #989862
LP: #1883933, #1920988
(cherry picked from commit 2ee26ff4f275384aa6173ada884929db4d2f1bbf)

diff --git a/debian/changelog b/debian/changelog
index 66834dc..7d18a47 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+gcc-mingw-w64 (21.3~deb10u2) buster; urgency=medium
+
+  * Fix gcov handling: we need to tell GCC that we have headers, without
+telling it where, and then we need to correct its default assumption
+about where they are. Closes: #989862. LP: #1883933, #1920988.
+
+ -- Stephen Kitt   Sat, 12 Jun 2021 18:54:10 +0200
+
 gcc-mingw-w64 (21.3~deb10u1) buster; urgency=medium
 
   * Upload to Buster.
diff --git a/debian/patches/gcov.patch b/debian/patches/gcov.patch
index 4400d53..4e6a83e 100644
--- a/debian/patches/gcov.patch
+++ b/debian/patches/gcov.patch
@@ -1,10 +1,17 @@
-Description: Add __gcov_exit for gcov fallback
+Description: Fix gcov build issues
 Author: Stephen Kitt 
 
 When gcov is not supported on the target, gcc uses a fallback
 do-nothing implementation. That’s missing a __gcov_exit()
 implementation, causing linking errors.
 
+When gcov is supported in a cross-compiler setup, GCC assumes that
+either the headers are present and shared with the host, or present
+and set up in a sysroot, or absent. We have headers which aren’t
+shared and aren’t in a sysroot, so we need to tell GCC where they are
+*without* specifying them as an argument to --with-headers (the latter
+must only be enabled).
+
 --- a/src/libgcc/libgcov-driver.c
 +++ b/src/libgcc/libgcov-driver.c
 @@ -30,6 +30,7 @@
@@ -15,3 +22,14 @@ implementation, causing linking errors.
  #endif
  
  #else /* inhibit_libc */
+--- a/src/gcc/configure.ac
 b/src/gcc/configure.ac
+@@ -2268,7 +2268,7 @@
+   if test "x$with_build_sysroot" != "x"; then
+ target_header_dir="${with_build_sysroot}${native_system_header_dir}"
+   elif test "x$with_sysroot" = x; then
+-target_header_dir="${test_exec_prefix}/${target_noncanonical}/sys-include"
++target_header_dir="${test_exec_prefix}/${target_noncanonical}/include"
+   elif test "x$with_sysroot" = xyes; then
+ 
target_header_dir="${test_exec_prefix}/${target_noncanonical}/sys-root${native_system_header_dir}"
+   else
diff --git a/debian/patches/series1 b/debian/patches/series1
index 048c6bf..7a28c31 100644
--- a/debian/patches/series1
+++ b/debian/patches/series1
@@ -1,3 +1,4 @@
 disable-multilib.patch
 reproducible-sort.patch
 bug-55930.patch
+gcov.patch
diff --git a/debian/patches/series2 b/debian/patches/series2
index 53bd6d3..4cce23c 100644
--- a/debian/patches/series2
+++ b/debian/patches/series2
@@ -1,5 +1,4 @@
 reproducible-s-oscons.patch
-gcov.patch
 wc-file-streams.patch
 refactor-path-construction.patch
 win-std-filesystem.patch
diff --git a/debian/rules b/debian/rules
index e9e4416..4bbb4d1 100755
--- a/debian/rules
+++ b/debian/rules
@@ -187,9 +187,9 @@ CONFFLAGS = \
--libdir=/$(PF)/$(libdir) \
--enable-libstdcxx-time=yes \
--with-tune=generic
-# Tell GCC where the headers are (this enables gcov)
+# Tell GCC we have headers (this enables gcov)
 CONFFLAGS += \
-   --with-headers=/usr/$$target/include
+   --with-headers
 # MinGW-w64 flags
 # version-specific-runtime-libs puts target-specific libraries in
 # /usr/lib/gcc rather than /usr/$(target)