Bug#1007222: transition: onetbb

2022-03-13 Thread Matthias Klose

On 13.03.22 21:59, M. Zhou wrote:

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Hi release team,

This involves an upstream source name change (from tbb to onetbb),
as well as SOVERSION bump (from 2 to 12), along with a major API
change including some changes in the core API.

I should have submitted this after my local build test for the
reverse dependencies of libtbb-dev, but fellow developers from
debian-science are eager to see this in unstable to unblock
their works.

I have not tested by myself, but I heard from an archlinux
developer that this API bump breaks a lot packages. And
some upstreams decided to disable or drop tbb support as
a result. I guess we can take similar measures for short
term workaround.


"I heard from archlinux" is not good enough.  I sent you email about this 
without getting a reply, then filed #1006920, without getting a reply, now this 
incomplete proposal. you may want to look at all the build rdeps for libtbb2-dev 
in Ubuntu to get an overview what at least breaks:


$ reverse-depends -b libtbb2-dev

Reverse-Testsuite-Triggers

* intel-mkl



Reverse-Build-Depends

* casparcg-server

* flexbar

* gazebo

* opencascade

* opensubdiv

* r-cran-rcppparallel
 (plus implicit dependencies)



Ben file:

title = "tbb";
is_affected = .depends ~ "libtbb2" | .depends ~ "libtbb12";
is_good = .depends ~ "libtbb12";
is_bad = .depends ~ "libtbb2";


this breaks everything immediately because of the conflicting libtbb2 and 
libtbb12. Please fix this first.


Matthias



Processed: Re: Bug#1007222: transition: onetbb

2022-03-13 Thread Debian Bug Tracking System
Processing control commands:

> forwarded -1 https://release.debian.org/transitions/html/onetbb.html
Bug #1007222 [release.debian.org] transition: onetbb
Set Bug forwarded-to-address to 
'https://release.debian.org/transitions/html/onetbb.html'.
> tags -1 moreinfo
Bug #1007222 [release.debian.org] transition: onetbb
Added tag(s) moreinfo.

-- 
1007222: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007222
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1007222: transition: onetbb

2022-03-13 Thread Sebastian Ramacher
Control: forwarded -1 https://release.debian.org/transitions/html/onetbb.html
Control: tags -1 moreinfo

On 2022-03-13 16:59:48 -0400, M. Zhou wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: transition
> 
> Hi release team,
> 
> This involves an upstream source name change (from tbb to onetbb),
> as well as SOVERSION bump (from 2 to 12), along with a major API
> change including some changes in the core API.
> 
> I should have submitted this after my local build test for the
> reverse dependencies of libtbb-dev, but fellow developers from
> debian-science are eager to see this in unstable to unblock
> their works.
> 
> I have not tested by myself, but I heard from an archlinux
> developer that this API bump breaks a lot packages. And
> some upstreams decided to disable or drop tbb support as
> a result. I guess we can take similar measures for short
> term workaround.

Please remove the moreinfo tag once these issues have been investigated
and bugs have been filed.

Cheers

> 
> Ben file:
> 
> title = "tbb";
> is_affected = .depends ~ "libtbb2" | .depends ~ "libtbb12";
> is_good = .depends ~ "libtbb12";
> is_bad = .depends ~ "libtbb2";
> Thank you for using reportbug
> 

-- 
Sebastian Ramacher


signature.asc
Description: PGP signature


Bug#1007222: transition: onetbb

2022-03-13 Thread M. Zhou
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Hi release team,

This involves an upstream source name change (from tbb to onetbb),
as well as SOVERSION bump (from 2 to 12), along with a major API
change including some changes in the core API.

I should have submitted this after my local build test for the
reverse dependencies of libtbb-dev, but fellow developers from
debian-science are eager to see this in unstable to unblock
their works.

I have not tested by myself, but I heard from an archlinux
developer that this API bump breaks a lot packages. And
some upstreams decided to disable or drop tbb support as
a result. I guess we can take similar measures for short
term workaround.

Ben file:

title = "tbb";
is_affected = .depends ~ "libtbb2" | .depends ~ "libtbb12";
is_good = .depends ~ "libtbb12";
is_bad = .depends ~ "libtbb2";
Thank you for using reportbug



Bug#1006456: transition: openldap

2022-03-13 Thread Ryan Tandy

On Sun, Mar 13, 2022 at 02:26:20PM +0100, Sebastian Ramacher wrote:

Please take a look at golang-openldap. It's an arch: all package and
hardcodes a dependency on libldap-2.4-2


Thanks. I hadn't noticed it was hard-coded. Filed #1006456.

Also examining some of the "unknown" rows in the tracker, looks like 
several might legitimately be unused/unneeded build-depends. Will 
probably file some sev:minor bugs for those later.


Otherwise looks like things are going smoothly so far?



Processed: golang-openldap: openldap 2.5 transition

2022-03-13 Thread Debian Bug Tracking System
Processing control commands:

> block 1006456 by -1
Bug #1006456 [release.debian.org] transition: openldap
1006456 was blocked by: 989409 990335 1006016 1005996
1006456 was not blocking any bugs.
Added blocking bug(s) of 1006456: 1007217

-- 
1006456: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006456
1007217: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007217
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1006456: transition: openldap

2022-03-13 Thread Debian Bug Tracking System
Processing control commands:

> forwarded -1 https://release.debian.org/transitions/html/openldap-2.5.html
Bug #1006456 [release.debian.org] transition: openldap
Set Bug forwarded-to-address to 
'https://release.debian.org/transitions/html/openldap-2.5.html'.

-- 
1006456: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006456
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1006456: transition: openldap

2022-03-13 Thread Sebastian Ramacher
Control: forwarded -1 
https://release.debian.org/transitions/html/openldap-2.5.html

On 2022-03-12 11:26:19 -0800, Ryan Tandy wrote:
> On Fri, Mar 11, 2022 at 10:15:31PM +0100, Sebastian Ramacher wrote:
> > Please go ahead
> 
> Thank you. openldap/2.5.11+dfsg-1 has just been accepted into unstable.
> 
> Should I bump the remaining autopkgtest issues to RC severity at this time?
> 
> Could you please update the ben file for the transition? The auto-generated
> one is not ideal. I think it should look something like:
> 
> is_affected = .build-depends ~ /\b(libldap(2)?\-dev|libslapi\-dev)\b/;
> is_bad = .depends ~ /\b(libldap\-2\.4\-2|libslapi\-2\.4\-2)\b/;
> is_good = .depends ~ /\b(libldap\-2\.5\-0|libslapi\-2\.5\-0)\b/;

The tracker is now available at
https://release.debian.org/transitions/html/openldap-2.5.html

Please take a look at golang-openldap. It's an arch: all package and
hardcodes a dependency on libldap-2.4-2

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: PGP signature


Bug#1007183: marked as done (buster-pu: package libphp-adodb/5.20.14-1)

2022-03-13 Thread Debian Bug Tracking System
Your message dated Sun, 13 Mar 2022 11:08:43 +0100
with message-id <5023343.8jc8pb4lGu@giga>
and subject line Re: buster-pu, bullseye-pu: package libphp-adodb
has caused the Debian Bug report #1007183,
regarding buster-pu: package libphp-adodb/5.20.14-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1007183: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007183
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: buster
Severity: normal

Hello

I'd like to patch CVE-2021-3850

The one-line patch is already released in sid, and in old-old-security
as version 5.20.9-1+deb9u1 thanks to the ELTS team.

The patch, from upstream, removes the detection of a string being 
already quoted. This results in the proper escaping always taking place.
Note that this function is only called for escaping pg_connect arguments.

Is that ok?

Tell me if you think it's better to upload in buster-security.diff -Nru libphp-adodb-5.20.14/debian/changelog libphp-adodb-5.20.14/debian/changelog
--- libphp-adodb-5.20.14/debian/changelog	2019-01-07 07:18:32.0 +0100
+++ libphp-adodb-5.20.14/debian/changelog	2022-03-12 21:40:01.0 +0100
@@ -1,3 +1,10 @@
+libphp-adodb (5.20.14-1+deb10u1) buster; urgency=high
+
+  * Add patch to prevent auth bypass with PostgreSQL
+connections. (Fixes: CVE-2021-3850) (Closes: #1004376)
+
+ -- Jean-Michel Vourgère   Sat, 12 Mar 2022 21:40:01 +0100
+
 libphp-adodb (5.20.14-1) unstable; urgency=medium
 
   * New upstream version.
diff -Nru libphp-adodb-5.20.14/debian/patches/CVE-2021-3850.patch libphp-adodb-5.20.14/debian/patches/CVE-2021-3850.patch
--- libphp-adodb-5.20.14/debian/patches/CVE-2021-3850.patch	1970-01-01 01:00:00.0 +0100
+++ libphp-adodb-5.20.14/debian/patches/CVE-2021-3850.patch	2022-02-06 09:56:10.0 +0100
@@ -0,0 +1,26 @@
+From 952de6c4273d9b1e91c2b838044f8c250c29 Mon Sep 17 00:00:00 2001
+From: Damien Regad 
+Date: Mon, 10 Jan 2022 09:41:32 +0100
+Subject: [PATCH] Prevent auth bypass with PostgreSQL connections
+
+Thanks to Emmet Leahy of Sorcery Ltd for reporting this vulnerability
+(CVE-2021-3850).
+
+This is a minimalistic approach to patch the issue, to reduce the risk
+of causing regressions in the legacy stable branch.
+
+Fixes #793
+---
+ drivers/adodb-postgres64.inc.php | 1 -
+ 1 file changed, 1 deletion(-)
+
+--- a/drivers/adodb-postgres64.inc.php
 b/drivers/adodb-postgres64.inc.php
+@@ -51,7 +51,6 @@
+ {
+ 	$len = strlen($s);
+ 	if ($len == 0) return "''";
+-	if (strncmp($s,"'",1) === 0 && substr($s,$len-1) == "'") return $s; // already quoted
+ 
+ 	return "'".addslashes($s)."'";
+ }
diff -Nru libphp-adodb-5.20.14/debian/patches/series libphp-adodb-5.20.14/debian/patches/series
--- libphp-adodb-5.20.14/debian/patches/series	1970-01-01 01:00:00.0 +0100
+++ libphp-adodb-5.20.14/debian/patches/series	2022-02-06 09:55:43.0 +0100
@@ -0,0 +1 @@
+CVE-2021-3850.patch


signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
Hi

Similar fixes were uploaded yesterday by carnil in buster-security and in
bullseye-security (thanks!)

As a result, #1007181 and #100783 are no longer relevant.

Closing--- End Message ---


Bug#1007181: marked as done (bullseye-pu: package libphp-adodb/5.20.19-1)

2022-03-13 Thread Debian Bug Tracking System
Your message dated Sun, 13 Mar 2022 11:08:43 +0100
with message-id <5023343.8jc8pb4lGu@giga>
and subject line Re: buster-pu, bullseye-pu: package libphp-adodb
has caused the Debian Bug report #1007181,
regarding bullseye-pu: package libphp-adodb/5.20.19-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1007181: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007181
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bullseye
Severity: normal

Hello

I'd like to patch CVE-2021-3850

The one-line patch is already released in sid, and in old-old-security
as version 5.20.9-1+deb9u1 thanks to the ELTS team.

The patch, from upstream, removes the detection of a string being 
already quoted. This results in the proper escaping always taking place.
Note that this function is only called for escaping pg_connect arguments.

Is that ok?

Tell me if you think it's better to upload in bullseye-security.diff -Nru libphp-adodb-5.20.19/debian/changelog libphp-adodb-5.20.19/debian/changelog
--- libphp-adodb-5.20.19/debian/changelog	2020-12-19 08:08:01.0 +0100
+++ libphp-adodb-5.20.19/debian/changelog	2022-03-12 18:50:26.0 +0100
@@ -1,3 +1,10 @@
+libphp-adodb (5.20.19-1+deb11u1) bullseye; urgency=high
+
+  * Add patch to prevent auth bypass with PostgreSQL
+connections. (Fixes: CVE-2021-3850) (Closes: #1004376)
+
+ -- Jean-Michel Vourgère   Sat, 12 Mar 2022 18:50:26 +0100
+
 libphp-adodb (5.20.19-1) unstable; urgency=medium
 
   * New upstream version.
diff -Nru libphp-adodb-5.20.19/debian/patches/CVE-2021-3850.patch libphp-adodb-5.20.19/debian/patches/CVE-2021-3850.patch
--- libphp-adodb-5.20.19/debian/patches/CVE-2021-3850.patch	1970-01-01 01:00:00.0 +0100
+++ libphp-adodb-5.20.19/debian/patches/CVE-2021-3850.patch	2022-02-06 09:56:10.0 +0100
@@ -0,0 +1,26 @@
+From 952de6c4273d9b1e91c2b838044f8c250c29 Mon Sep 17 00:00:00 2001
+From: Damien Regad 
+Date: Mon, 10 Jan 2022 09:41:32 +0100
+Subject: [PATCH] Prevent auth bypass with PostgreSQL connections
+
+Thanks to Emmet Leahy of Sorcery Ltd for reporting this vulnerability
+(CVE-2021-3850).
+
+This is a minimalistic approach to patch the issue, to reduce the risk
+of causing regressions in the legacy stable branch.
+
+Fixes #793
+---
+ drivers/adodb-postgres64.inc.php | 1 -
+ 1 file changed, 1 deletion(-)
+
+--- a/drivers/adodb-postgres64.inc.php
 b/drivers/adodb-postgres64.inc.php
+@@ -51,7 +51,6 @@
+ {
+ 	$len = strlen($s);
+ 	if ($len == 0) return "''";
+-	if (strncmp($s,"'",1) === 0 && substr($s,$len-1) == "'") return $s; // already quoted
+ 
+ 	return "'".addslashes($s)."'";
+ }
diff -Nru libphp-adodb-5.20.19/debian/patches/series libphp-adodb-5.20.19/debian/patches/series
--- libphp-adodb-5.20.19/debian/patches/series	1970-01-01 01:00:00.0 +0100
+++ libphp-adodb-5.20.19/debian/patches/series	2022-02-06 09:55:43.0 +0100
@@ -0,0 +1 @@
+CVE-2021-3850.patch


signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
Hi

Similar fixes were uploaded yesterday by carnil in buster-security and in
bullseye-security (thanks!)

As a result, #1007181 and #100783 are no longer relevant.

Closing--- End Message ---