Bug#1061476: marked as done (transition: elpi)
Your message dated Sat, 24 Feb 2024 08:38:30 +0100 with message-id <8c57e80b2c2462872fff67aea5a5af69197654a1.ca...@gmail.com> and subject line Abandon this transition has caused the Debian Bug report #1061476, regarding transition: elpi to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1061476: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061476 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Usertags: transition X-Debbugs-Cc: jpu...@debian.org Severity: normal there is a new upstream for elpi in the OCaml packages, which has an impact on a few Coq packages. I checked locally (using sbuild in a chroot) everything could move fine. Several packages need a new version and then some need just a rebuild. A ben description of the plan is in post scriptum. Waiting for your ACK to upload the new packages sources. Thanks, J.Puydt PS: dw coq-elpi 2.0.0-1 . ANY . -m 'elpi >= 1.18.1-1' dw coq-hierarchy-builder_1.7.0-1 . ANY . -m 'coq-elpi >= 2.0.0-1' dw ssreflect_2.2.0-1 . ANY . -m 'coq-hierarchy-builder >= 1.7.0-1' dw coq-relation-algebra_1.7.10-1 . ANY . -m 'ssreflect >= 2.2.0-1' dw mathcomp-finmap_2.1.0-1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu coq-deriving_0.2.0-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1' dw coq-deriving_0.2.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu coq-reglang_1.2.1-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1' dw coq-reglang_1.2.1-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu coquelicot_3.4.1-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1' dw coquelicot_3.4.1-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu mathcomp-bigenough_1.0.1-12+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1' dw mathcomp-bigenough_1.0.1-12+b1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu mathcomp-zify_1.5.0+2.0+8.16-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1' dw mathcomp-zify_1.5.0+2.0+8.16-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu coq-quickchick_2.0.2-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1' dw coq-quickchick_2.0.2-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' nmu coq-extructures_0.4.0-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1 coq-deriving=0.2.0-1+b1' dw coq-extructures_0.4.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' dw coq-extructures_0.4.0-1+b1 . ANY . -m 'coq-deriving >= 0.2.0-1+b1' nmu coq-interval_4.9.0-1+b2 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1 coquelicot=3.4.1-1+b1' dw coq-interval_4.9.0-1+b2 . ANY . -m 'ssreflect >= 2.2.0-1' dw coq-interval_4.9.0-1+b2 . ANY . -m 'coquelicot >= 3.4.1-1+b1' nmu mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1 mathcomp-zify=1.5.0+2.0+8.16-1+b1 coq- elpi=2.0.0-1' dw mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'ssreflect >= 2.2.0- 1' dw mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'mathcomp-zify >= 1.5.0+2.0+8.16-1+b1' dw mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'coq-elpi >= 2.0.0- 1' nmu mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1 mathcomp-finmap=2.1.0-1 mathcomp- bigenough=1.0.1-12+b1' dw mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' dw mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'mathcomp-finmap >= 2.1.0-1' dw mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'mathcomp-bigenough >= 1.0.1-12+b1' nmu mathcomp-real-closed_2.0.0-1+b1 . ANY . -m 'Rebuild because of upload of ssreflect=2.2.0-1 mathcomp-bigenough=1.0.1-12+b1' dw mathcomp-real-closed_2.0.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' dw mathcomp-real-closed_2.0.0-1+b1 . ANY . -m 'mathcomp-bigenough >= 1.0.1-12+b1' nmu coqeal_2.0.1-1+b1 . ANY . -m 'Rebuild because of upload of mathcomp-real-closed=2.0.0-1+b1 ssreflect=2.2.0-1' dw coqeal_2.0.1-1+b1 . ANY . -m 'mathcomp-real-closed >= 2.0.0-1+b1' dw coqeal_2.0.1-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1' --- End Message --- --- Begin Message --- Hi, I'm already working on the next big transition for the Coq ecosystem in Debian, and this one will just be part of it. Cheers, J.Puydt--- End Message ---
Bug#1064551: bookworm-pu: libjwt/1.10.2-1+deb11u1
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu The attached debdiff for libjwt fixes CVE-2024-25189 in Bookworm. It is marked as no-dsa by the security team. The fix is straightfoward and should not make any problems. Thorsten diff -Nru libjwt-1.10.2/debian/changelog libjwt-1.10.2/debian/changelog --- libjwt-1.10.2/debian/changelog 2019-07-14 19:03:00.0 +0200 +++ libjwt-1.10.2/debian/changelog 2024-02-19 22:03:02.0 +0100 @@ -1,3 +1,10 @@ +libjwt (1.10.2-1+deb12u1) bookworm; urgency=medium + + * CVE-2024-25189 (Closes: #1063534) +fix a timing side channel via strcmp() + + -- Thorsten Alteholz Mon, 19 Feb 2024 22:03:02 +0100 + libjwt (1.10.2-1) unstable; urgency=medium * New upstream release diff -Nru libjwt-1.10.2/debian/libjwt0.symbols libjwt-1.10.2/debian/libjwt0.symbols --- libjwt-1.10.2/debian/libjwt0.symbols2019-01-13 15:13:51.0 +0100 +++ libjwt-1.10.2/debian/libjwt0.symbols2024-02-19 22:03:02.0 +0100 @@ -38,5 +38,6 @@ jwt_sign_sha_hmac@Base 1.9.0 jwt_sign_sha_pem@Base 1.9.0 jwt_str_alg@Base 1.9.0 + jwt_strcmp@Base 1.10.2 jwt_verify_sha_hmac@Base 1.9.0 jwt_verify_sha_pem@Base 1.9.0 diff -Nru libjwt-1.10.2/debian/libjwt-gnutls0.symbols libjwt-1.10.2/debian/libjwt-gnutls0.symbols --- libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2019-01-13 15:13:51.0 +0100 +++ libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2024-02-19 22:03:02.0 +0100 @@ -38,5 +38,6 @@ jwt_sign_sha_hmac@Base 1.9.0 jwt_sign_sha_pem@Base 1.9.0 jwt_str_alg@Base 1.9.0 + jwt_strcmp@Base 1.10.2 jwt_verify_sha_hmac@Base 1.9.0 jwt_verify_sha_pem@Base 1.9.0 diff -Nru libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch --- libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 1970-01-01 01:00:00.0 +0100 +++ libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 2024-02-19 22:03:02.0 +0100 @@ -0,0 +1,130 @@ +commit f73bac57c5bece16ac24f1a70022aa34355fc1bf +Author: Ben Collins +Date: Fri Feb 9 09:03:35 2024 -0500 + +Implement a safer strcmp() function + +As noted, the strcmp() function can be used for time-based side attacks. + +I tried to test this and could not find a reasonable way to implement +this attack for several reasons: + +1) strcmp() is optimized to compare 4 and 8 bytes at a time when possible + on almost every modern system, making the attack almost impossible. +2) Running 128 million iterations of strcmp() for a single byte attack + gave sub-nanosecond average differences (locally on same excution stack) + and almost as often as the comparison was correct, it was also wrong in + the reverse sense (i.e. two byte strcmp() took less time than single + byte). +3) Adding noise from network, application stack, web server, etc. would + only add to the failure rate of guessing the differences above. + +Erwan noted that there are proofs out there showing that signal noise +reduction can make this guessing more "accurate", but this proof also +noted it would take up to 4 billion guesses to completely cover this +attack surface. The claim was that 50k attempts per second would break +a 256-bit hmac in 22 hours. While this isn't impossible, it's very +implausible. + +However, for the sake of cryptographic correctness, I implemented +jwt_strcmp() which always compares all bytes, and does so up to the +longest string in the 2-string set, without passing string boundaries. + +This makes it time-consistent for len(max(a,b)) comparisons. I proofed +this using a 128 million interation average for various scenarious. + +Reported-by: Erwan Legrand +Signed-off-by: Ben Collins + +Index: libjwt-1.10.2/libjwt/jwt-gnutls.c +=== +--- libjwt-1.10.2.orig/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.575655983 +0100 libjwt-1.10.2/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.571655984 +0100 +@@ -90,7 +90,7 @@ + jwt_Base64encode(buf, sig_check, len); + jwt_base64uri_encode(buf); + +- if (!strcmp(sig, buf)) ++ if (!jwt_strcmp(sig, buf)) + ret = 0; + + free(sig_check); +Index: libjwt-1.10.2/libjwt/jwt-openssl.c +=== +--- libjwt-1.10.2.orig/libjwt/jwt-openssl.c2024-02-19 22:38:58.575655983 +0100 libjwt-1.10.2/libjwt/jwt-openssl.c 2024-02-19 22:38:58.571655984 +0100 +@@ -140,7 +140,7 @@ + jwt_base64uri_encode(buf); + + /* And now... */ +- ret = strcmp(buf, sig) ? EINVAL : 0; ++ ret = jwt_strcmp(buf, sig) ? EINVAL : 0; + + jwt_verify_hmac_done: + BIO_free_all(b64); +Index: libjwt-1.10.2/libjwt/jwt-private.h
Bug#1064550: bullseye-pu: libjwt/1.10.2-1+deb11u1
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu The attached debdiff for libjwt fixes CVE-2024-25189 in Bullseye. It is marked as no-dsa by the security team. The fix is straightfoward and should not make any problems. Thorsten diff -Nru libjwt-1.10.2/debian/changelog libjwt-1.10.2/debian/changelog --- libjwt-1.10.2/debian/changelog 2019-07-14 19:03:00.0 +0200 +++ libjwt-1.10.2/debian/changelog 2024-02-20 23:03:02.0 +0100 @@ -1,3 +1,10 @@ +libjwt (1.10.2-1+deb11u1) bullseye; urgency=medium + + * CVE-2024-25189 (Closes: #1063534) +fix a timing side channel via strcmp() + + -- Thorsten Alteholz Tue, 20 Feb 2024 23:03:02 +0100 + libjwt (1.10.2-1) unstable; urgency=medium * New upstream release diff -Nru libjwt-1.10.2/debian/libjwt0.symbols libjwt-1.10.2/debian/libjwt0.symbols --- libjwt-1.10.2/debian/libjwt0.symbols2019-01-13 15:13:51.0 +0100 +++ libjwt-1.10.2/debian/libjwt0.symbols2024-02-20 23:03:02.0 +0100 @@ -38,5 +38,6 @@ jwt_sign_sha_hmac@Base 1.9.0 jwt_sign_sha_pem@Base 1.9.0 jwt_str_alg@Base 1.9.0 + jwt_strcmp@Base 1.10.2 jwt_verify_sha_hmac@Base 1.9.0 jwt_verify_sha_pem@Base 1.9.0 diff -Nru libjwt-1.10.2/debian/libjwt-gnutls0.symbols libjwt-1.10.2/debian/libjwt-gnutls0.symbols --- libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2019-01-13 15:13:51.0 +0100 +++ libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2024-02-20 23:03:02.0 +0100 @@ -38,5 +38,6 @@ jwt_sign_sha_hmac@Base 1.9.0 jwt_sign_sha_pem@Base 1.9.0 jwt_str_alg@Base 1.9.0 + jwt_strcmp@Base 1.10.2 jwt_verify_sha_hmac@Base 1.9.0 jwt_verify_sha_pem@Base 1.9.0 diff -Nru libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch --- libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 1970-01-01 01:00:00.0 +0100 +++ libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 2024-02-20 23:03:02.0 +0100 @@ -0,0 +1,130 @@ +commit f73bac57c5bece16ac24f1a70022aa34355fc1bf +Author: Ben Collins +Date: Fri Feb 9 09:03:35 2024 -0500 + +Implement a safer strcmp() function + +As noted, the strcmp() function can be used for time-based side attacks. + +I tried to test this and could not find a reasonable way to implement +this attack for several reasons: + +1) strcmp() is optimized to compare 4 and 8 bytes at a time when possible + on almost every modern system, making the attack almost impossible. +2) Running 128 million iterations of strcmp() for a single byte attack + gave sub-nanosecond average differences (locally on same excution stack) + and almost as often as the comparison was correct, it was also wrong in + the reverse sense (i.e. two byte strcmp() took less time than single + byte). +3) Adding noise from network, application stack, web server, etc. would + only add to the failure rate of guessing the differences above. + +Erwan noted that there are proofs out there showing that signal noise +reduction can make this guessing more "accurate", but this proof also +noted it would take up to 4 billion guesses to completely cover this +attack surface. The claim was that 50k attempts per second would break +a 256-bit hmac in 22 hours. While this isn't impossible, it's very +implausible. + +However, for the sake of cryptographic correctness, I implemented +jwt_strcmp() which always compares all bytes, and does so up to the +longest string in the 2-string set, without passing string boundaries. + +This makes it time-consistent for len(max(a,b)) comparisons. I proofed +this using a 128 million interation average for various scenarious. + +Reported-by: Erwan Legrand +Signed-off-by: Ben Collins + +Index: libjwt-1.10.2/libjwt/jwt-gnutls.c +=== +--- libjwt-1.10.2.orig/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.575655983 +0100 libjwt-1.10.2/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.571655984 +0100 +@@ -90,7 +90,7 @@ + jwt_Base64encode(buf, sig_check, len); + jwt_base64uri_encode(buf); + +- if (!strcmp(sig, buf)) ++ if (!jwt_strcmp(sig, buf)) + ret = 0; + + free(sig_check); +Index: libjwt-1.10.2/libjwt/jwt-openssl.c +=== +--- libjwt-1.10.2.orig/libjwt/jwt-openssl.c2024-02-19 22:38:58.575655983 +0100 libjwt-1.10.2/libjwt/jwt-openssl.c 2024-02-19 22:38:58.571655984 +0100 +@@ -140,7 +140,7 @@ + jwt_base64uri_encode(buf); + + /* And now... */ +- ret = strcmp(buf, sig) ? EINVAL : 0; ++ ret = jwt_strcmp(buf, sig) ? EINVAL : 0; + + jwt_verify_hmac_done: + BIO_free_all(b64); +Index: libjwt-1.10.2/libjwt/jwt-private.h
NEW changes in stable-new
Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_mipsel-buildd.changes ACCEPT
NEW changes in oldstable-new
Processing changes file: nvidia-graphics-drivers_470.223.02-2_amd64-buildd.changes ACCEPT Processing changes file: nvidia-graphics-drivers_470.223.02-2_arm64-buildd.changes ACCEPT Processing changes file: nvidia-graphics-drivers_470.223.02-2_armhf-buildd.changes ACCEPT Processing changes file: nvidia-graphics-drivers_470.223.02-2_i386-buildd.changes ACCEPT Processing changes file: nvidia-graphics-drivers_470.223.02-2_ppc64el-buildd.changes ACCEPT
NEW changes in stable-new
Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_all-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_amd64-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_arm64-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_armel-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_armhf-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_i386-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_mips64el-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_ppc64el-buildd.changes ACCEPT Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_s390x-buildd.changes ACCEPT Processing changes file: prometheus-node-exporter-collectors_0.0~git20230203.6f710f8-1+deb12u1_all-buildd.changes ACCEPT Processing changes file: python-channels-redis_4.0.0-1+deb12u1_all-buildd.changes ACCEPT Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_s390x-buildd.changes ACCEPT
NEW changes in stable-new
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_i386-buildd.changes ACCEPT
Bug#1057089: bookworm-pu: package usrmerge/37~deb12u1
On 30/11/2023 09.49, Marco d'Itri wrote: On Nov 29, Andreas Beckmann wrote: Improve the usrmerge experience in bookworm. Great idea, thank you for working on this! The bookworm branch and a signed tag can be found in https://salsa.debian.org/anbe/usrmerge.git (IIRC merge requests don't handle tags, therefore I'm not creating one.) Andreas
NEW changes in oldstable-new
Processing changes file: nvidia-graphics-drivers_470.223.02-2_source.changes ACCEPT
NEW changes in stable-new
Processing changes file: fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_source.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_source.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_all-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_amd64-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_arm64-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_armel-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_armhf-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_i386-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_mips64el-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_mipsel-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_ppc64el-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_s390x-buildd.changes ACCEPT Processing changes file: prometheus-node-exporter-collectors_0.0~git20230203.6f710f8-1+deb12u1_source.changes ACCEPT Processing changes file: python-channels-redis_4.0.0-1+deb12u1_source.changes ACCEPT
Processed: python-channels-redis 4.0.0-1+deb12u1 flagged for acceptance
Processing commands for cont...@bugs.debian.org: > package release.debian.org Limiting to bugs with field 'package' containing at least one of 'release.debian.org' Limit currently set to 'package':'release.debian.org' > tags 1064276 = bookworm pending Bug #1064276 [release.debian.org] bookworm-pu: package python-channels-redis/4.0.0-1+deb12u1 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 1064276: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064276 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: prometheus-node-exporter-collectors 0.0~git20230203.6f710f8-1+deb12u1 flagged for acceptance
Processing commands for cont...@bugs.debian.org: > package release.debian.org Limiting to bugs with field 'package' containing at least one of 'release.debian.org' Limit currently set to 'package':'release.debian.org' > tags 1055115 = bookworm pending Bug #1055115 [release.debian.org] bookworm-pu: package prometheus-node-exporter-collectors/0.0~git20230203.6f710f8-1+deb12u1 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 1055115: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055115 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1064276: python-channels-redis 4.0.0-1+deb12u1 flagged for acceptance
package release.debian.org tags 1064276 = bookworm pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bookworm. Thanks for your contribution! Upload details == Package: python-channels-redis Version: 4.0.0-1+deb12u1 Explanation:
Bug#1063823: nvidia-graphics-drivers 470.223.02-2 flagged for acceptance
package release.debian.org tags 1063823 = bullseye pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bullseye. Thanks for your contribution! Upload details == Package: nvidia-graphics-drivers Version: 470.223.02-2 Explanation: end support for Tesla 450 drivers; build libnvidia-fbc1 for arm64
Bug#1055115: prometheus-node-exporter-collectors 0.0~git20230203.6f710f8-1+deb12u1 flagged for acceptance
package release.debian.org tags 1055115 = bookworm pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bookworm. Thanks for your contribution! Upload details == Package: prometheus-node-exporter-collectors Version: 0.0~git20230203.6f710f8-1+deb12u1 Explanation: do not adversely affect mirror network; fix deadlock with other apt update runs
Processed: nvidia-graphics-drivers 470.223.02-2 flagged for acceptance
Processing commands for cont...@bugs.debian.org: > package release.debian.org Limiting to bugs with field 'package' containing at least one of 'release.debian.org' Limit currently set to 'package':'release.debian.org' > tags 1063823 = bullseye pending Bug #1063823 [release.debian.org] bullseye-pu: package nvidia-graphics-drivers/470.223.02-2 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 1063823: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063823 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
NEW changes in stable-new
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_arm64-buildd.changes ACCEPT
NEW changes in oldstable-new
Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_source.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_all-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_amd64-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_arm64-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_armel-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_armhf-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_i386-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_mips64el-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_mipsel-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_ppc64el-buildd.changes ACCEPT Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_s390x-buildd.changes ACCEPT
NEW changes in stable-new
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_amd64.changes ACCEPT
Bug#1064031: rustc-web 1.70.0+dfsg1-7~deb12u1 flagged for acceptance
package release.debian.org tags 1064031 = bookworm pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bookworm. Thanks for your contribution! Upload details == Package: rustc-web Version: 1.70.0+dfsg1-7~deb12u1 Explanation: new source package to support builds of web browsers
Processed: rustc-web 1.70.0+dfsg1-7~deb12u1 flagged for acceptance
Processing commands for cont...@bugs.debian.org: > package release.debian.org Limiting to bugs with field 'package' containing at least one of 'release.debian.org' Limit currently set to 'package':'release.debian.org' > tags 1064031 = bookworm pending Bug #1064031 [release.debian.org] bookworm-pu: package rustc-web/1.70.0+dfsg1-7~deb12u1 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 1064031: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064031 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
NEW changes in stable-new
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_source.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_all-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_amd64-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_arm64-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_armhf-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_i386-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_mips64el-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_ppc64el-buildd.changes ACCEPT Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_s390x-buildd.changes ACCEPT