Bug#1007905: transition: icu

2022-03-20 Thread GCS
On Sat, Mar 19, 2022 at 8:28 AM Adrian Bunk  wrote:
> On Fri, Mar 18, 2022 at 06:05:38PM +, Simon McVittie wrote:
> > Obviously all these copies of essentially the same codebase are quite
> > unfortunate, but mozjs and ICU seem to be sufficiently tightly-coupled
> > that perhaps using its vendored version of ICU, at least temporarily,
> > would be wiser than using the system copy?
>
> IMHO unblocking GNOME by temporarily making mozjs91 use its vendored
> version until the ICU transition would be a reasonable approach.
 OK.

> > On Fri, 18 Mar 2022 at 18:26:41 +0100, László Böszörményi (GCS) wrote:
> > > Speak of the devil. ICU 71.1 RC [1] just released. Final is expected
> > > in April (two-three weeks). Would you two mind if I package it and ask
> > > for testing of your packages (mozjs91 and nodejs) against it?
> >
> > Speaking only for myself, I'm flexible about timings for this; but Ubuntu
> > has already done the ICU 70.1 transition and is currently using it for
> > their next LTS release, and 2-3 weeks is probably too late for them to
> > do another transition before their freeze deadline.
 Can you elucidate why Ubuntu would be forced to do the ICU 71.1
transition for their current to be released LTS version?

> Does Ubuntu even care either way?
 I think no.

> AFAIK both now and in 2-3 weeks is inside their freeze.
 Exactly. As Matthias noted, we were in contact and helped them a bit
for doing the transition in Ubuntu. Blame me that I didn't start ICU
transition at the same time for Debian.
Now a status update in short. ICU 71.1 RC looks identical in API sense
to ICU 70.1 meaning all packages fail or build the same way with both
versions.
I've packaged ICU 71.1 RC at least and restarted the rebuilds on i386
_and_ amd64 parallel. This slowed me down, but I can report the
following. Package haskell-text-icu FTBFS, but the patch I've provided
[1] still fixes the issue. As noted, mozjs78 and 0ad FTBFS in my
pbuilder setups.
Other packages are built with ICU 70.1 and I'm at level3 with ICU 71.1
RC. Already built ceph, chromium and postgresql-14 with it on that
level. Any objection not to upload ICU 71.1 RC to experimental right
now?

Regards,
Laszlo/GCS
[1] https://bugs.debian.org/1004093



Bug#959469: openssl 1.1.1n-0+deb10u1 flagged for acceptance

2022-03-20 Thread Kurt Roeckx
On Mon, Mar 21, 2022 at 12:12:11AM +0100, Sebastian Andrzej Siewior wrote:
> 
> The change in openssl is commit
>cc7c6eb8135b ("Check that the default signature type is allowed")

So that's:
commit cc7c6eb8135be665d0acc176a5963e1eaf52e4e2
Author: Kurt Roeckx 
Date:   Thu Jan 2 22:53:32 2020 +0100

Check that the default signature type is allowed

TLS < 1.2 has fixed signature algorithms: MD5+SHA1 for RSA and SHA1 for the
others. TLS 1.2 sends a list of supported ciphers, but allows not sending
it in which case SHA1 is used. TLS 1.3 makes sending the list mandatory.

When we didn't receive a list from the client, we always used the
defaults without checking that they are allowed by the configuration.

Reviewed-by: Paul Dale 
GH: #10784
(cherry picked from commit b0031e5dc2c8c99a6c04bc7625aa00d3d20a59a5)


Kurt



Bug#959469: openssl 1.1.1n-0+deb10u1 flagged for acceptance

2022-03-20 Thread Sebastian Andrzej Siewior
On 2022-03-20 23:15:57 [+0100], Kurt Roeckx wrote:
> > https://ci.debian.net/data/autopkgtest/oldstable/amd64/g/gnutls28/20199677/log.gz
> > 
> > Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> > %COMPAT: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> > *** Fatal error: A TLS fatal alert has been received.
> > Failure: Failed
> > *** Fatal error: A TLS fatal alert has been received.
> > %NO_ETM: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> > Failure: Failed
> > *** Fatal error: A TLS fatal alert has been received.
> > Failure: Failed
> > FAIL [11]../../tests/suite/testcompat-main-openssl
> > 
> > Which, according to me, is this check:
> > https://sources.debian.org/src/gnutls28/3.6.7-4%2Bdeb10u7/tests/suite/testcompat-main-openssl/#L307
> 
> That test still seems to exist, but is just moved to a different file:
> https://github.com/gnutls/gnutls/blob/master/tests/suite/testcompat-openssl-cli-common.sh#L255
> 
> My understanding is that gnutls now passes the correct list of signature
> algorithms to use to OpenSSL's s_client to be able to do that test, and
> that this is probably fixed by:
> https://github.com/gnutls/gnutls/commit/23958322865a8a77c2f924f569484e5fd150a24b
> (and 
> https://github.com/gnutls/gnutls/commit/8259a1dc8503ad760c0887eb95278f9957a00667)
> 
> I'm trying to remember what was changed and why, but I can't
> find/remember it.

The change in openssl is commit
   cc7c6eb8135b ("Check that the default signature type is allowed")

The server is
openssl s_server -quiet -www -accept 57687 -keyform pem -certform pem 
-tls1 \
 -key tests/certs/ecc384.pem -cert tests/certs/cert-ecc384.pem -Verify 
1 \
 -named_curve secp384r1 -CAfile tests/certs/ca-cert-ecc.pem

The client is
/usr/bin/gnutls-cli -p 57687 127.0.0.1 \
  --priority 
NONE:+CIPHER-ALL:+SIGN-ALL:+COMP-NULL:+MAC-ALL:+VERS-TLS1.0:+ECDHE-ECDSA:+CURVE-ALL
 \
  --insecure --x509certfile tests/certs/cert-ecc384.pem --x509keyfile 
tests/certs/ecc384.pem

Before the commit in question it connects as:
  - Description: (TLS1.0)-(ECDHE-SECP384R1)-(AES-256-CBC)-(SHA1)

after that, the server throws:
  140490373015360:error:14201044:SSL routines:tls_choose_sigalg:internal 
error:../ssl/t1_lib.c:2880:

and it appears that the security level in openssl forbids SHA1 here.
The argument on the s_server side
 -sigalgs RSA+SHA1:RSA+SHA256:DSA+SHA1:DSA+SHA256

doesn't help here but
 -cipher "ALL:@SECLEVEL=1"

does. 

> Kurt

Sebastian



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_mipsel-buildd.changes
  ACCEPT



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_armel-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_mips64el-buildd.changes
  ACCEPT



Bug#1007792: nmu: fdroidcl_0.5.0-3+b3

2022-03-20 Thread Jochen Sprickerhof

Hi Sebastian,

* Sebastian Ramacher  [2022-03-19 18:08]:

Control: tags -1 moreinfo

On 2022-03-16 20:38:48 +0100, Jochen Sprickerhof wrote:

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
X-Debbugs-Cc: jspri...@debian.org

nmu fdroidcl_0.5.0-3+b3 . ANY . unstable . -m "rebuild with new golang version"


There is currently no golang transition ongoing. Why is this necessary?


fdroidcl was removed from testing due to being build with golang-1.15. 
I've tested it locally with the current golang version and it builds 
file, so a binnmu would be enough.


Actually I just saw that there are some minor changes in git so I could 
also upload a new version. Given that this is not the first testing 
removal, is there anything I should change in the package to fix this?


Cheers Jochen


signature.asc
Description: PGP signature


Bug#959469: openssl 1.1.1n-0+deb10u1 flagged for acceptance

2022-03-20 Thread Kurt Roeckx
On Sun, Mar 20, 2022 at 10:00:15PM +0100, Paul Gevers wrote:
> Dear Sebastian, Kurt,
> 
> On 19-03-2022 12:33, Adam D Barratt wrote:
> > Upload details
> > ==
> > 
> > Package: openssl
> > Version: 1.1.1n-0+deb10u1
> > 
> > Explanation: new upstream release
> 
> We're seeing a regression in buster in the autopkgtest of gnutls28 with the
> new version of openssl on all tested architectures. Can you please have a
> look and advise? (bullseye doesn't seem to have the test anymore, hence it
> doesn't fail).
> 
> https://ci.debian.net/data/autopkgtest/oldstable/amd64/g/gnutls28/20199677/log.gz
> 
> Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> %COMPAT: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> *** Fatal error: A TLS fatal alert has been received.
> Failure: Failed
> *** Fatal error: A TLS fatal alert has been received.
> %NO_ETM: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> Failure: Failed
> *** Fatal error: A TLS fatal alert has been received.
> Failure: Failed
> FAIL [11]../../tests/suite/testcompat-main-openssl
> 
> Which, according to me, is this check:
> https://sources.debian.org/src/gnutls28/3.6.7-4%2Bdeb10u7/tests/suite/testcompat-main-openssl/#L307

That test still seems to exist, but is just moved to a different file:
https://github.com/gnutls/gnutls/blob/master/tests/suite/testcompat-openssl-cli-common.sh#L255

My understanding is that gnutls now passes the correct list of signature
algorithms to use to OpenSSL's s_client to be able to do that test, and
that this is probably fixed by:
https://github.com/gnutls/gnutls/commit/23958322865a8a77c2f924f569484e5fd150a24b
(and 
https://github.com/gnutls/gnutls/commit/8259a1dc8503ad760c0887eb95278f9957a00667)

I'm trying to remember what was changed and why, but I can't
find/remember it.


Kurt



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_mips-buildd.changes
  ACCEPT



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_armhf-buildd.changes
  ACCEPT



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u3_mips64el-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u3_mipsel-buildd.changes
  ACCEPT



Bug#1008031: bullseye-pu: package intel-microcode/3.20210608.2

2022-03-20 Thread Henrique de Moraes Holschuh
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu

I'd like to update the intel-microcode package in bullseye.

The new Intel microcode release includes fixes for several critical
functional defects (errata) as well as security fixes and mitigations.
It fixes hangs and incorrect behavior on *many* processors, as well as
several CVEs.

The package changelog has a reasonable list of the issues addressed by
the update.

There are no known regressions introduced by this microcode update.

The same package is alrady in bullseye-backports, testing and unstable,
with no bug reports.

I have attached a git diff against the version currently in bullseye.

Here's the diffstat:
 b/.gitignore|1 
 b/changelog |   79 +++
 b/debian/.gitignore |5 +
 b/debian/changelog  |  103 
 b/debian/ucode-blacklist.txt|2 
 b/intel-ucode-with-caveats/06-4f-01 |binary
 b/intel-ucode/06-3f-02  |binary
 b/intel-ucode/06-3f-04  |binary
 b/intel-ucode/06-4e-03  |binary
 b/intel-ucode/06-55-03  |binary
 b/intel-ucode/06-55-04  |binary
 b/intel-ucode/06-55-06  |binary
 b/intel-ucode/06-55-07  |binary
 b/intel-ucode/06-55-0b  |binary
 b/intel-ucode/06-56-03  |binary
 b/intel-ucode/06-56-04  |binary
 b/intel-ucode/06-56-05  |binary
 b/intel-ucode/06-5c-09  |binary
 b/intel-ucode/06-5c-0a  |binary
 b/intel-ucode/06-5e-03  |binary
 b/intel-ucode/06-5f-01  |binary
 b/intel-ucode/06-6a-06  |binary
 b/intel-ucode/06-7a-01  |binary
 b/intel-ucode/06-7a-08  |binary
 b/intel-ucode/06-7e-05  |binary
 b/intel-ucode/06-8a-01  |binary
 b/intel-ucode/06-8c-01  |binary
 b/intel-ucode/06-8c-02  |binary
 b/intel-ucode/06-8d-01  |binary
 b/intel-ucode/06-8e-09  |binary
 b/intel-ucode/06-8e-0a  |binary
 b/intel-ucode/06-8e-0b  |binary
 b/intel-ucode/06-8e-0c  |binary
 b/intel-ucode/06-96-01  |binary
 b/intel-ucode/06-9c-00  |binary
 b/intel-ucode/06-9e-09  |binary
 b/intel-ucode/06-9e-0a  |binary
 b/intel-ucode/06-9e-0b  |binary
 b/intel-ucode/06-9e-0c  |binary
 b/intel-ucode/06-9e-0d  |binary
 b/intel-ucode/06-a5-02  |binary
 b/intel-ucode/06-a5-03  |binary
 b/intel-ucode/06-a5-05  |binary
 b/intel-ucode/06-a6-00  |binary
 b/intel-ucode/06-a6-01  |binary
 b/intel-ucode/06-a7-01  |binary
 b/releasenote.md|   80 +++
 48 files changed, 270 insertions(+)


PS: I apologise for sending this so close to the deadline for the next
point release.

-- 
  Henrique Holschuh
diff --git a/.gitignore b/.gitignore
index 5ead64a..0af49a5 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,4 @@
 intel-microcode.bin
 intel-microcode-64.bin
 *.pbin
+*.dbin
diff --git a/changelog b/changelog
index 25b8ada..7dfb0b0 100644
--- a/changelog
+++ b/changelog
@@ -1,3 +1,81 @@
+2022-02-07:
+  * Relevant information:
+https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html
+  * Mitigates (*only* when loaded from firmware through the FIT)
+CVE-2021-0146, INTEL-SA-00528: VT-d privilege escalation through
+debug port, on Pentium, Celeron and Atom processors with signatures
+0x506c9, 0x506ca, 0x506f1, 0x706a1, 0x706a8
+https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/57#issuecomment-1036363145
+  * Mitigates CVE-2021-0127, INTEL-SA-00532: an unexpected code breakpoint
+may cause a system hang, on many processors.
+  * Mitigates CVE-2021-0145, INTEL-SA-00561: information disclosure due
+to improper sanitization of shared resources (fast-store forward
+predictor), on many processors.
+  * Mitigates CVE-2021-33120, INTEL-SA-00589: out-of-bounds read on some
+Atom Processors may allow information disclosure or denial of service
+via network access.
+  * Fixes critical errata (functional issues) on many processors
+  * Adds a MSR switch to enable RAPL filtering (default off, once enabled
+it can only be disabled by poweroff or reboot).  Useful to protect
+SGX and other threads from side-channel info leak.  Improves the
+mitigation for CVE-2020-8694, CVE-2020-8695, INTEL-SA-00389 on many
+processors.
+  * Disables TSX in more processor models.
+  * Fixes issue with WBINDV on multi-socket (server) systems which could
+cause resets and unpredictable system behavior
+  * Adds a MSR switch 

Bug#1008030: buster-pu: package intel-microcode/3.20210608.2~deb10u1

2022-03-20 Thread Henrique de Moraes Holschuh
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

I'd like to update the intel-microcode package in buster.

The new Intel microcode release includes fixes for several critical
functional defects (errata) as well as security fixes and mitigations.
It fixes hangs and incorrect behavior on *many* processors, as well as
several CVEs.

The package changelog has a reasonable list of the issues addressed by
the update.

There are no known regressions introduced by this microcode update.

The same package is alrady in bullseye-backports, testing and unstable,
with no bug reports.

I have attached a git diff against the version currently in buster.
 b/.gitignore|1 
 b/changelog |   79 +++
 b/debian/.gitignore |5 +
 b/debian/changelog  |  103 
 b/debian/ucode-blacklist.txt|2 
 b/intel-ucode-with-caveats/06-4f-01 |binary
 b/intel-ucode/06-3f-02  |binary
 b/intel-ucode/06-3f-04  |binary
 b/intel-ucode/06-4e-03  |binary
 b/intel-ucode/06-55-03  |binary
 b/intel-ucode/06-55-04  |binary
 b/intel-ucode/06-55-06  |binary
 b/intel-ucode/06-55-07  |binary
 b/intel-ucode/06-55-0b  |binary
 b/intel-ucode/06-56-03  |binary
 b/intel-ucode/06-56-04  |binary
 b/intel-ucode/06-56-05  |binary
 b/intel-ucode/06-5c-09  |binary
 b/intel-ucode/06-5c-0a  |binary
 b/intel-ucode/06-5e-03  |binary
 b/intel-ucode/06-5f-01  |binary
 b/intel-ucode/06-6a-06  |binary
 b/intel-ucode/06-7a-01  |binary
 b/intel-ucode/06-7a-08  |binary
 b/intel-ucode/06-7e-05  |binary
 b/intel-ucode/06-8a-01  |binary
 b/intel-ucode/06-8c-01  |binary
 b/intel-ucode/06-8c-02  |binary
 b/intel-ucode/06-8d-01  |binary
 b/intel-ucode/06-8e-09  |binary
 b/intel-ucode/06-8e-0a  |binary
 b/intel-ucode/06-8e-0b  |binary
 b/intel-ucode/06-8e-0c  |binary
 b/intel-ucode/06-96-01  |binary
 b/intel-ucode/06-9c-00  |binary
 b/intel-ucode/06-9e-09  |binary
 b/intel-ucode/06-9e-0a  |binary
 b/intel-ucode/06-9e-0b  |binary
 b/intel-ucode/06-9e-0c  |binary
 b/intel-ucode/06-9e-0d  |binary
 b/intel-ucode/06-a5-02  |binary
 b/intel-ucode/06-a5-03  |binary
 b/intel-ucode/06-a5-05  |binary
 b/intel-ucode/06-a6-00  |binary
 b/intel-ucode/06-a6-01  |binary
 b/intel-ucode/06-a7-01  |binary
 b/releasenote.md|   80 +++
 48 files changed, 270 insertions(+)

PS: I apologise for sending this so close to the deadline for the next
point release.

-- 
  Henrique Holschuh
diff --git a/.gitignore b/.gitignore
index 5ead64a..0af49a5 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,3 +1,4 @@
 intel-microcode.bin
 intel-microcode-64.bin
 *.pbin
+*.dbin
diff --git a/changelog b/changelog
index 25b8ada..7dfb0b0 100644
--- a/changelog
+++ b/changelog
@@ -1,3 +1,81 @@
+2022-02-07:
+  * Relevant information:
+https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html
+  * Mitigates (*only* when loaded from firmware through the FIT)
+CVE-2021-0146, INTEL-SA-00528: VT-d privilege escalation through
+debug port, on Pentium, Celeron and Atom processors with signatures
+0x506c9, 0x506ca, 0x506f1, 0x706a1, 0x706a8
+https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/57#issuecomment-1036363145
+  * Mitigates CVE-2021-0127, INTEL-SA-00532: an unexpected code breakpoint
+may cause a system hang, on many processors.
+  * Mitigates CVE-2021-0145, INTEL-SA-00561: information disclosure due
+to improper sanitization of shared resources (fast-store forward
+predictor), on many processors.
+  * Mitigates CVE-2021-33120, INTEL-SA-00589: out-of-bounds read on some
+Atom Processors may allow information disclosure or denial of service
+via network access.
+  * Fixes critical errata (functional issues) on many processors
+  * Adds a MSR switch to enable RAPL filtering (default off, once enabled
+it can only be disabled by poweroff or reboot).  Useful to protect
+SGX and other threads from side-channel info leak.  Improves the
+mitigation for CVE-2020-8694, CVE-2020-8695, INTEL-SA-00389 on many
+processors.
+  * Disables TSX in more processor models.
+  * Fixes issue with WBINDV on multi-socket (server) systems which could
+cause resets and unpredictable system behavior
+  * Adds a MSR switch to 10th and 11th-gen (Ice 

NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_10.3+deb10u12_mipsel-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_amd64-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_arm64-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_i386-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_ppc64el-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_s390x-buildd.changes
  ACCEPT



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u3_ppc64el-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u3_s390x-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers-tesla-450_450.172.01-2~deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers-tesla-450_450.172.01-2~deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers-tesla-450_450.172.01-2~deb11u1_ppc64el-buildd.changes
  ACCEPT



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_10.3+deb10u12_amd64-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_arm64-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_armel-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_armhf-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_i386-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_mips-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_mips64el-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_ppc64el-buildd.changes
  ACCEPT
Processing changes file: base-files_10.3+deb10u12_s390x-buildd.changes
  ACCEPT
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_all-buildd.changes
  ACCEPT



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u3_amd64-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u3_arm64-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u3_armel-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u3_armhf-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u3_i386-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers-tesla-450_450.172.01-2~deb11u1_i386-buildd.changes
  ACCEPT



Bug#959469: openssl 1.1.1n-0+deb10u1 flagged for acceptance

2022-03-20 Thread Paul Gevers

Dear Sebastian, Kurt,

On 19-03-2022 12:33, Adam D Barratt wrote:

Upload details
==

Package: openssl
Version: 1.1.1n-0+deb10u1

Explanation: new upstream release


We're seeing a regression in buster in the autopkgtest of gnutls28 with 
the new version of openssl on all tested architectures. Can you please 
have a look and advise? (bullseye doesn't seem to have the test anymore, 
hence it doesn't fail).


https://ci.debian.net/data/autopkgtest/oldstable/amd64/g/gnutls28/20199677/log.gz

Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
%COMPAT: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
*** Fatal error: A TLS fatal alert has been received.
Failure: Failed
*** Fatal error: A TLS fatal alert has been received.
%NO_ETM: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
Failure: Failed
*** Fatal error: A TLS fatal alert has been received.
Failure: Failed
FAIL [11]../../tests/suite/testcompat-main-openssl

Which, according to me, is this check:
https://sources.debian.org/src/gnutls28/3.6.7-4%2Bdeb10u7/tests/suite/testcompat-main-openssl/#L307

Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1003948: bullseye-pu: package systemd/247.3-7

2022-03-20 Thread Michael Biebl

Am 19.03.22 um 18:04 schrieb Julien Cristau:

Control: tag -1 confirmed

On Tue, Jan 18, 2022 at 02:46:06PM +0100, Michael Biebl wrote:

   * Demote systemd-timesyncd from Depends to Recommends.
 This avoids a dependency cycle between systemd and systemd-timesyncd and
 thus makes dist upgrades more predictable and robust.
 It also allows minimal, systemd based containers where no NTP client is
 strictly necessary.
 To ensure that systemd-timesyncd is installed in a default installation
 created by d-i, bump its priority to standard.
 (Closes: #986651, #993947)

This one is probably the trickiest (and possibly also the simplest)
change. It simply breaks a dependency loop between systemd and
systemd-timesyncd resulting in a more predictable upgrade sequence which
in turn ensures that modifications of systemd-timesyncd's conffiles are
preserved on upgrades.


Difficult to predict the side effects this might have, but on the whole
it's probably better to do this than not.

Go ahead.


Uploaded. Thanks, Julien.


I've CCed the FTP team for #1003949.

Now that this change has been acked by the RT, please adjust the 
priority accordingly.


Regards,
Michael



OpenPGP_signature
Description: OpenPGP digital signature


NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_10.3+deb10u12_source.changes
  ACCEPT



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u3_source.changes
  ACCEPT



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
nvidia-graphics-drivers-tesla-450_450.172.01-2~deb11u1_source.changes
  ACCEPT



Bug#1005158: nvidia-graphics-drivers-tesla-450 450.172.01-2~deb11u1 flagged for acceptance

2022-03-20 Thread Adam D Barratt
package release.debian.org
tags 1005158 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: nvidia-graphics-drivers-tesla-450
Version: 450.172.01-2~deb11u1

Explanation: new upstream release; fix denial of service issues [CVE-2022-21813 
CVE-2022-21814]; nvidia-kernel-support: Provide 
/etc/modprobe.d/nvidia-options.conf as a template



Processed: nvidia-graphics-drivers-tesla-450 450.172.01-2~deb11u1 flagged for acceptance

2022-03-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1005158 = bullseye pending
Bug #1005158 [release.debian.org] bullseye-pu: package 
nvidia-graphics-drivers-tesla-450/450.172.01-1~deb11u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1005158: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005158
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1005158: bullseye-pu: package nvidia-graphics-drivers-tesla-450/450.172.01-1~deb11u1

2022-03-20 Thread Adam D. Barratt
On Sun, 2022-03-20 at 17:32 +0100, Andreas Beckmann wrote:
> On 19/03/2022 17.48, Adam D. Barratt wrote:
> > Control: tags -1 + confirmed
> > 
> > On Tue, 2022-02-08 at 09:06 +0100, Andreas Beckmann wrote:
> > > I'd like to update src:nvidia-graphics-drivers-tesla-450/non-free 
> > > to
> > > a
> > > new upstream version to fix CVE‑2022‑21813, CVE‑2022‑21814.
> > > 
> > > This is a simple rebuild of the package from sid.
> > > 
> > 
> > Please go ahead.
> 
> I've uploaded a rebuild of the latest version from sid (-2 instead
> of 
> -1), which contains a few additional changes, please see the
> attached 
> incremental debdiff from 450.172.01-1 to 450.172.01-2~deb11u1
> 

Just to confirm, this and nvidia-modprobe - as the only packages from
the set so far uploaded AFAICS - are OK to be included in 11.3 without
needing the remainder of the updates?

Regards,

Adam



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
graphicsmagick_1.4+really1.3.35-1~deb10u2_source.changes
  ACCEPT



Bug#1003548: marked as done (transition: libwebp)

2022-03-20 Thread Debian Bug Tracking System
Your message dated Sun, 20 Mar 2022 18:50:39 +0100
with message-id 
and subject line Re: Bug#1003548: transition: libwebp
has caused the Debian Bug report #1003548,
regarding transition: libwebp
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1003548: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003548
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Hello Release Team,

We would like to transition libwebp to a new upstream version 1.2.1-1
that is already uploaded and built in experimental. No build problems
are expected in the reverse dependencies either. This was tested by
rebuilding a subset of packages listed on the transition web page:

https://release.debian.org/transitions/html/auto-libwebp.html

Please let us know if we can proceed with the upload to unstable. Also
a binNMU rebuild of reverse dependencies would be required afterwards.

Ben file:

title = "libwebp";
is_affected = .depends ~ "libwebp6" | .depends ~ "libwebp8";
is_good = .depends ~ "libwebp8";
is_bad = .depends ~ "libwebp6";
--- End Message ---
--- Begin Message ---
On 2022-02-19 19:30:40, Sebastian Ramacher wrote:
> On 2022-02-18 10:26:26 +0100, Sebastian Ramacher wrote:
> > On 2022-02-16 20:49:44, Jeff Breidenbach wrote:
> > > libwebp 1.2.1-7 has been successfully uploaded to unstable.
> > > 
> > > Anthony and Iustin, help is very strongly appreciated for the NMUs.
> > 
> > Almost all reverse dependencies have successfully been rebuilt against
> > libwebp7. Packages failing to build are weston (#998603) and openimageio
> > (#1003470).
> 
> The builds of graphicsmagick (#1006110) and qtimageformats-opensource
> (#1006009) failed due to tests related to libwebp. Could this be a bug
> in libwebp?

The old binaries got removed from testing. So that's done.

Cheers
-- 
Sebastian Ramacher--- End Message ---


Processed: graphicsmagick 1.4+really1.3.35-1~deb10u2 flagged for acceptance

2022-03-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1002912 = buster pending
Bug #1002912 [release.debian.org] buster-pu: package 
graphicsmagick/1.4+really1.3.35-1~deb10u2
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1002912: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002912
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1002912: graphicsmagick 1.4+really1.3.35-1~deb10u2 flagged for acceptance

2022-03-20 Thread Adam D Barratt
package release.debian.org
tags 1002912 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: graphicsmagick
Version: 1.4+really1.3.35-1~deb10u2

Explanation: fix buffer overflow issue [CVE-2020-12672]



Bug#1005158: bullseye-pu: package nvidia-graphics-drivers-tesla-450/450.172.01-1~deb11u1

2022-03-20 Thread Andreas Beckmann

On 19/03/2022 17.48, Adam D. Barratt wrote:

Control: tags -1 + confirmed

On Tue, 2022-02-08 at 09:06 +0100, Andreas Beckmann wrote:

I'd like to update src:nvidia-graphics-drivers-tesla-450/non-free to
a
new upstream version to fix CVE‑2022‑21813, CVE‑2022‑21814.

This is a simple rebuild of the package from sid.



Please go ahead.


I've uploaded a rebuild of the latest version from sid (-2 instead of 
-1), which contains a few additional changes, please see the attached 
incremental debdiff from 450.172.01-1 to 450.172.01-2~deb11u1


The new autopkgtest (for testing buildability of the kernel module) 
currently is a (passing) no-op, it requires additional changes to dkms 
and autodep8 s.t. kernel headers get installed and the kernel module 
gets compiled.



Andreas
diff --git a/debian/README.source b/debian/README.source
index 03853038..d48a6fcf 100644
--- a/debian/README.source
+++ b/debian/README.source
@@ -13,6 +13,28 @@ Building "bleeding edge" from GIT for users
 uploaded in the archive.
 
 
+Upstream support timeframes
+
+https://nvidia.custhelp.com/app/answers/detail/a_id/3142
+https://docs.nvidia.com/datacenter/tesla/drivers/
+https://web.archive.org/web/20210522000916/https://docs.nvidia.com/datacenter/tesla/drivers/
+
+Driver Series   Supported until
+71  EoL
+96  EoL
+173 EoL
+304 12/2017 EoL
+340 12/2019 EoL
+390 12/2022
+Tesla 410   EoL
+Tesla 418 (LTSB)03/2022
+Tesla 440   11/2020 EoL
+Tesla 450 (LTSB)07/2023
+Tesla 460 (PB)  01/2022 EoL
+Tesla 470 (LTSB)07/2024
+Tesla 510 (PB)  01/2023
+
+
 The branch structure in the GIT repository
 
 The following branches exist in the git repository:
@@ -39,9 +61,16 @@ The branch structure in the GIT repository
 450   (bullseye)  460, 450-tesla
 450-tesla (bullseye)  460-tesla, tesla-450/master
 tesla-450/master  bullseye,sidtesla-460/master
-460   (bullseye)  master, 460-tesla
-460-tesla (bullseye)  tesla-460/master
-tesla-460/master  bullseye,sid
+460 EoL   (bullseye)  470, 460-tesla
+460-tesla   EoL   (bullseye)  470-tesla, tesla-460/master
+tesla-460/masterEoL   (bullseye),(sid)tesla-470/master, tesla-460/transition-470
+tesla-460/transition-470  bullseye,sid
+470   (bullseye)  510, 470-tesla
+470-tesla (bullseye)  510-tesla, tesla-470/master
+tesla-470/master  bullseye,sidtesla-510/master
+510   (bookworm)  master, 510-tesla
+510-tesla (bookworm)  tesla-510/master
+tesla-510/master  bookworm,sid
 mastersid YYY
 YYY   experimentalZZZ, (master)
 ZZZ   experimental(master)
diff --git a/debian/changelog b/debian/changelog
index 10c0a787..7a864cf1 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,21 @@
+nvidia-graphics-drivers-tesla-450 (450.172.01-2~deb11u1) bullseye; urgency=medium
+
+  * Rebuild for bullseye.
+
+ -- Andreas Beckmann   Sun, 20 Mar 2022 16:53:36 +0100
+
+nvidia-graphics-drivers-tesla-450 (450.172.01-2) unstable; urgency=medium
+
+  * Add xorg-video-abi-25 (Xorg Xserver 21) as alternative dependency.
+(Closes: #1005932)
+  * Backport pde_data changes from 470.103.01 to fix kernel module build for
+Linux 5.17.
+  * dkms.conf: Use a BUILD_EXCLUSIVE equivalent hack to skip building for -rt
+kernels, not supported upstream (510.54-1).
+  * Declare Testsuite: autopkgtest-pkg-dkms (510.54-1).
+
+ -- Andreas Beckmann   Mon, 28 Feb 2022 21:03:12 +0100
+
 nvidia-graphics-drivers-tesla-450 (450.172.01-1) unstable; urgency=medium
 
   * New upstream Tesla release 450.172.01 (2022-01-31).
@@ -919,6 +937,19 @@ nvidia-graphics-drivers (430.14-1) experimental; urgency=medium
 
  -- Andreas Beckmann   Sat, 25 May 2019 13:49:09 +0200
 
+nvidia-graphics-drivers-tesla-418 (418.226.00-2) unstable; urgency=medium
+
+  * Backport stdarg.h and stddef.h changes from 495.44 to fix kernel module
+build for Linux 5.16.
+  * Backport pde_data changes from 470.103.01 to fix kernel module build for
+Linux 5.17.  (Closes: #1005405)
+  * nvidia-tesla-418-kernel-support: Provide
+/etc/modprobe.d/nvidia-options.conf as a template taking into account the
+module renaming. This is a slave alternative of the nvidia alternative
+(470.86-1).  (Closes: #999670)
+
+ -- Andreas Beckmann   Fri, 25 Feb 2022 13:48:18 +0100
+
 nvidia-graphics-drivers-tesla-418 (418.226.00-1) unstable; urgency=medium
 
   * New upstream Tesla 

NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: linux-signed-i386_4.19.235+1_i386-buildd.changes
  ACCEPT
Processing changes file: phpliteadmin_1.9.7.1-2+deb10u1_all-buildd.changes
  ACCEPT



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: 
nvidia-modprobe_470.103.01-1~deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-modprobe_470.103.01-1~deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-modprobe_470.103.01-1~deb11u1_armhf-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-modprobe_470.103.01-1~deb11u1_i386-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-modprobe_470.103.01-1~deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: phpliteadmin_1.9.8.2-1+deb11u1_all-buildd.changes
  ACCEPT



my email

2022-03-20 Thread Dong Guo




Did you receive our earlier message to you regarding our introduction for 
private global investment partnership? Please get back as soon as possible.


Dong Guo
dongguo...@gmail.com
Independent Advisor
Private Global investment Partnership 


Best regards,
3/20/2022
9:19:44 PM



NEW changes in stable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: nvidia-modprobe_470.103.01-1~deb11u1_source.changes
  ACCEPT
Processing changes file: phpliteadmin_1.9.8.2-1+deb11u1_source.changes
  ACCEPT



Processed: phpliteadmin 1.9.8.2-1+deb11u1 flagged for acceptance

2022-03-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1007947 = bullseye pending
Bug #1007947 [release.debian.org] bullseye-pu: package 
phpliteadmin/1.9.8.2-1+deb11u1
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1007947: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007947
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: nvidia-modprobe 470.103.01-1~deb11u1 flagged for acceptance

2022-03-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1005148 = bullseye pending
Bug #1005148 [release.debian.org] bullseye-pu: package 
nvidia-modprobe/470.103.01-1~deb11u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1005148: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005148
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1007947: phpliteadmin 1.9.8.2-1+deb11u1 flagged for acceptance

2022-03-20 Thread Adam D Barratt
package release.debian.org
tags 1007947 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: phpliteadmin
Version: 1.9.8.2-1+deb11u1

Explanation: fix cross-site scripting issue [CVE-2021-46709]



Bug#1005148: nvidia-modprobe 470.103.01-1~deb11u1 flagged for acceptance

2022-03-20 Thread Adam D Barratt
package release.debian.org
tags 1005148 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: nvidia-modprobe
Version: 470.103.01-1~deb11u1

Explanation: new upstream release



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: phpliteadmin_1.9.7.1-2+deb10u1_source.changes
  ACCEPT



Bug#1007948: phpliteadmin 1.9.7.1-2+deb10u1 flagged for acceptance

2022-03-20 Thread Adam D Barratt
package release.debian.org
tags 1007948 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: phpliteadmin
Version: 1.9.7.1-2+deb10u1

Explanation: fix cross-site scripting issue [CVE-2021-46709]



Processed: phpliteadmin 1.9.7.1-2+deb10u1 flagged for acceptance

2022-03-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1007948 = buster pending
Bug #1007948 [release.debian.org] buster-pu: package 
phpliteadmin/1.9.7.1-2+deb10u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1007948: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007948
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in oldstable-new

2022-03-20 Thread Debian FTP Masters
Processing changes file: linux-signed-i386_4.19.235+1_source.changes
  ACCEPT