Bug#1064551: bookworm-pu: libjwt/1.10.2-1+deb11u1

2024-03-02 Thread Thorsten Alteholz




On Sun, 25 Feb 2024, Jonathan Wiltshire wrote:

Please go ahead.


great, thanks ...

... and uploaded.


 Thorsten



Bug#1065326: bookworm-pu: package python3.11/3.11.2-6+deb12u1

2024-03-02 Thread Stefano Rivera
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: python3...@packages.debian.org, d...@debian.org
Control: affects -1 + src:python3.11
User: release.debian@packages.debian.org
Usertags: pu

[ Reason ]
A use-after-free causing a SEGV was found in python 3.11, affecting the
the Zulip chat server.

The bug is known to affect python 3.11.0 - 3.11.4. And since being fixed
upstream, there have been no known related regressions.

[ Impact ]
Potential SEGV in python3. Known to be triggered by zulip's CI when
running under coverage.

[ Tests ]
The Python stdlib testsuite is extensive and passes with this patch.

There is a stand-alone reproducer that I've manually reproduced the bug
with and verified that it's fixed.

[ Risks ]
The code is pretty straight-forward. It asserts that the f_frame hasn't
already been freed before freeing.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable
diff -Nru python3.11-3.11.2/debian/changelog python3.11-3.11.2/debian/changelog
--- python3.11-3.11.2/debian/changelog  2023-03-13 08:18:29.0 -0400
+++ python3.11-3.11.2/debian/changelog  2024-03-02 16:28:50.0 -0400
@@ -1,3 +1,11 @@
+python3.11 (3.11.2-6+deb12u1) bookworm; urgency=medium
+
+  [ Anders Kaseorg ]
+  * Fix a use-after-free crash when deallocating a frame object
+(closes: #1050843).
+
+ -- Stefano Rivera   Sat, 02 Mar 2024 16:28:50 -0400
+
 python3.11 (3.11.2-6) unstable; urgency=high
 
   [ Stefano Rivera ]
diff -Nru python3.11-3.11.2/debian/patches/frame_dealloc-crash.diff 
python3.11-3.11.2/debian/patches/frame_dealloc-crash.diff
--- python3.11-3.11.2/debian/patches/frame_dealloc-crash.diff   1969-12-31 
20:00:00.0 -0400
+++ python3.11-3.11.2/debian/patches/frame_dealloc-crash.diff   2024-03-02 
16:28:50.0 -0400
@@ -0,0 +1,54 @@
+Description: Fix use-after-free crash in frame_dealloc
+ It was possible for the trashcan to delay the deallocation of a
+ PyFrameObject until after its corresponding _PyInterpreterFrame has
+ already been freed.  So frame_dealloc needs to avoid dereferencing the
+ f_frame pointer unless it first checks that the pointer still points
+ to the interpreter frame within the frame object.
+Origin: 
https://github.com/python/cpython/commit/46cae02085311481dc8b1ea9a5110969d9325bc7
+Bug-upstream: https://github.com/python/cpython/issues/106092
+Bug-Debian: https://bugs.debian.org/1050843
+Author: Anders Kaseorg 
+Last-Update: 2023-08-29
+Applied-Upstream: 3.11.5
+
+---
+ .../2023-07-18-16-13-51.gh-issue-106092.bObgRM.rst  |  2 ++
+ Objects/frameobject.c   | 13 +++--
+ 2 files changed, 9 insertions(+), 6 deletions(-)
+ create mode 100644 Misc/NEWS.d/next/Core and 
Builtins/2023-07-18-16-13-51.gh-issue-106092.bObgRM.rst
+
+--- /dev/null
 b/Misc/NEWS.d/next/Core and 
Builtins/2023-07-18-16-13-51.gh-issue-106092.bObgRM.rst
+@@ -0,0 +1,2 @@
++Fix a segmentation fault caused by a use-after-free bug in ``frame_dealloc``
++when the trashcan delays the deallocation of a ``PyFrameObject``.
+--- a/Objects/frameobject.c
 b/Objects/frameobject.c
+@@ -851,9 +851,6 @@
+ /* It is the responsibility of the owning generator/coroutine
+  * to have cleared the generator pointer */
+ 
+-assert(f->f_frame->owner != FRAME_OWNED_BY_GENERATOR ||
+-_PyFrame_GetGenerator(f->f_frame)->gi_frame_state == FRAME_CLEARED);
+-
+ if (_PyObject_GC_IS_TRACKED(f)) {
+ _PyObject_GC_UNTRACK(f);
+ }
+@@ -861,10 +858,14 @@
+ Py_TRASHCAN_BEGIN(f, frame_dealloc);
+ PyCodeObject *co = NULL;
+ 
++/* GH-106092: If f->f_frame was on the stack and we reached the maximum
++ * nesting depth for deallocations, the trashcan may have delayed this
++ * deallocation until after f->f_frame is freed. Avoid dereferencing
++ * f->f_frame unless we know it still points to valid memory. */
++_PyInterpreterFrame *frame = (_PyInterpreterFrame *)f->_f_frame_data;
++
+ /* Kill all local variables including specials, if we own them */
+-if (f->f_frame->owner == FRAME_OWNED_BY_FRAME_OBJECT) {
+-assert(f->f_frame == (_PyInterpreterFrame *)f->_f_frame_data);
+-_PyInterpreterFrame *frame = (_PyInterpreterFrame *)f->_f_frame_data;
++if (f->f_frame == frame && frame->owner == FRAME_OWNED_BY_FRAME_OBJECT) {
+ /* Don't clear code object until the end */
+ co = frame->f_code;
+ frame->f_code = NULL;
diff -Nru python3.11-3.11.2/debian/patches/series 
python3.11-3.11.2/debian/patches/series
--- python3.11-3.11.2/debian/patches/series 2023-03-01 05:58:01.0 
-0400
+++ python3.11-3.11.2/debian/patches/series 2024-03-02 16:28:50.0 
-0400
@@ -39,3 +39,4 @@
 fix-py_compile.diff
 ntpath-import.diff
 shutdown-deadlock.diff
+frame_dealloc-crash.diff


Processed: bookworm-pu: package python3.11/3.11.2-6+deb12u1

2024-03-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:python3.11
Bug #1065326 [release.debian.org] bookworm-pu: package 
python3.11/3.11.2-6+deb12u1
Added indication that 1065326 affects src:python3.11

-- 
1065326: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065326
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1036884: 64-bit time_t: libpam0g -> libpam0t64 -> libpam0g

2024-03-02 Thread Sebastian Ramacher
On 2024-03-02 13:51:13 +0100, Aurelien Jarno wrote:
> Hi,
> 
> As part of the time_t transition, the libpam0t64 library change got
> reverted, and we ended-up with a few packages not installable even on
> non arm* because they depends on libpam0t64 which is now gone. Well
> technically it is still there as cruft, but it conflicts with libpam0g
> which is used by essential packages.
> 
> Would it be possible to fix that for our non arm* users? I have attached
> the wb commands below, but you might want to do some of them on all
> architectures for multiarch sync.

Scheduled. We'll need to do some MA: same version skew clean up after
the transition is done, though.

Cheers
-- 
Sebastian Ramacher



Bug#1065309: transition: gnat (12 -> 13 + time_t64)

2024-03-02 Thread Matthias Klose

Package: release.debian.org
X-Debbugs-CC: Nicolas Boulenguez 

when preparing GCC packages for time_t64, I noticed that we'll have an 
ABI change for libgnat as well.  Instead of doing a gnat 12 -> 12+t64 
transition, let's do a gnat 12 -> 13+t64 transition instead.  According 
to Nicolas, packages are already prepared in experimental.


Waiting with the transition until all t64 stuff is finished doesn't work 
well, packages which need binNMUs will ftbfs.




Bug#1036884: transition: time64_t

2024-03-02 Thread Adrian Bunk
On Sat, Mar 02, 2024 at 02:16:59PM +0100, Sebastian Ramacher wrote:
> On 2024-03-02 15:06:15 +0200, Adrian Bunk wrote:
> > On Fri, Mar 01, 2024 at 11:10:22PM -0800, Steve Langasek wrote:
> > >...
> > > This needs to be built with dpkg-dev (>= 1.5.22), ...
> > >...
> > 
> > The correct version is 1.22.5 (and >= 1.5.22 therefore a nop).
> 
> There was already an upload by the maintainer correcting the issue.

This incorrect version seems to be pasted further, e.g. glib2.0 
extra-depends have (in addition to the now corrected missing 'd')
also the nop version 1.5.22

> Cheers

cu
Adrian



Bug#1036884: transition: time64_t

2024-03-02 Thread Sebastian Ramacher
On 2024-03-02 15:06:15 +0200, Adrian Bunk wrote:
> On Fri, Mar 01, 2024 at 11:10:22PM -0800, Steve Langasek wrote:
> >...
> > This needs to be built with dpkg-dev (>= 1.5.22), ...
> >...
> 
> The correct version is 1.22.5 (and >= 1.5.22 therefore a nop).

There was already an upload by the maintainer correcting the issue.

Cheers
-- 
Sebastian Ramacher



Bug#1036884: transition: time64_t

2024-03-02 Thread Adrian Bunk
On Fri, Mar 01, 2024 at 11:10:22PM -0800, Steve Langasek wrote:
>...
> This needs to be built with dpkg-dev (>= 1.5.22), ...
>...

The correct version is 1.22.5 (and >= 1.5.22 therefore a nop).

cu
Adrian



Bug#1036884: 64-bit time_t: libpam0g -> libpam0t64 -> libpam0g

2024-03-02 Thread Aurelien Jarno
Hi,

As part of the time_t transition, the libpam0t64 library change got
reverted, and we ended-up with a few packages not installable even on
non arm* because they depends on libpam0t64 which is now gone. Well
technically it is still there as cruft, but it conflicts with libpam0g
which is used by essential packages.

Would it be possible to fix that for our non arm* users? I have attached
the wb commands below, but you might want to do some of them on all
architectures for multiarch sync.

Thanks
Aurelien


wb nmu cockpit_312-1 . amd64 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cockpit_312-1 . arm64 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cockpit_312-1 . i386 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cockpit_312-1 . mips64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cockpit_312-1 . ppc64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cockpit_312-1 . riscv64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cockpit_312-1 . s390x . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . amd64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . arm64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . i386 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . mips64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . ppc64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . riscv64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cron_3.0pl1-186 . s390x . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cups_2.4.7-1.2 . amd64 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cups_2.4.7-1.2 . arm64 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu cups_2.4.7-1.2 . mips64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cups_2.4.7-1.2 . ppc64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cups_2.4.7-1.2 . riscv64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu cups_2.4.7-1.2 . s390x . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . amd64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . arm64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . i386 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . mips64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . ppc64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . riscv64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu gensio_2.8.2-6.1 . s390x . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . amd64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . arm64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . i386 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . mips64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . ppc64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . riscv64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu libinfinity_0.7.2-2.1 . s390x . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu lxc_1:5.0.3-2.1 . amd64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu lxc_1:5.0.3-2.1 . arm64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu lxc_1:5.0.3-2.1 . i386 . -m "Rebuild against libpam0g" . --extra-depends 
"libpam0g-dev (>= 1.5.3-6)"
wb nmu lxc_1:5.0.3-2.1 . mips64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu lxc_1:5.0.3-2.1 . ppc64el . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu lxc_1:5.0.3-2.1 . riscv64 . -m "Rebuild against libpam0g" . 
--extra-depends "libpam0g-dev (>= 1.5.3-6)"
wb nmu mailutils_1:

Bug#1065266: bullseye-pu: package php-phpseclib/2.0.30-2+deb11u2

2024-03-02 Thread David Prévot
Le Sat, Mar 02, 2024 at 11:22:22AM +0100, David Prévot a écrit :
[…]
>   [x] attach debdiff against the package in oldstable

Second try.

diff -Nru php-phpseclib-2.0.30/debian/changelog php-phpseclib-2.0.30/debian/changelog
--- php-phpseclib-2.0.30/debian/changelog	2023-12-31 15:36:22.0 +0100
+++ php-phpseclib-2.0.30/debian/changelog	2024-02-27 21:15:41.0 +0100
@@ -1,3 +1,15 @@
+php-phpseclib (2.0.30-2+deb11u2) bullseye; urgency=medium
+
+  * Backport upstream fixes
+- BigInteger: put guardrails on isPrime() and randomPrime() [CVE-2024-27354]
+- BigInteger: rm visibility modifiers from static variables
+- ASN1: limit OID length [CVE-2024-27355]
+- Tests: updates for phpseclib 2.0
+- BigInteger: phpseclib 2.0 updates
+- BigInteger: fix getLength()
+
+ -- David Prévot   Tue, 27 Feb 2024 21:15:41 +0100
+
 php-phpseclib (2.0.30-2+deb11u1) bullseye-security; urgency=medium
 
   * Backport upstream SSH2 changes
diff -Nru php-phpseclib-2.0.30/debian/patches/0028-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch php-phpseclib-2.0.30/debian/patches/0028-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch
--- php-phpseclib-2.0.30/debian/patches/0028-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib-2.0.30/debian/patches/0028-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	2024-02-27 21:15:41.0 +0100
@@ -0,0 +1,76 @@
+From: terrafrost 
+Date: Fri, 23 Feb 2024 08:57:22 -0600
+Subject: BigInteger: put guardrails on isPrime() and randomPrime()
+
+Origin: upstream, https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575
+Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2024-27354
+---
+ phpseclib/Math/BigInteger.php | 41 -
+ 1 file changed, 40 insertions(+), 1 deletion(-)
+
+diff --git a/phpseclib/Math/BigInteger.php b/phpseclib/Math/BigInteger.php
+index 9df0bf0..bbe7c86 100644
+--- a/phpseclib/Math/BigInteger.php
 b/phpseclib/Math/BigInteger.php
+@@ -729,6 +729,33 @@ class BigInteger
+ return $result;
+ }
+ 
++/**
++ * Return the size of a BigInteger in bits
++ *
++ * @return int
++ */
++function getLength()
++{
++if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL) {
++return strlen($this->toBits());
++}
++
++$max = count($this->value) - 1;
++return $max != -1 ?
++$max * MATH_BIGINTEGER_BASE + ceil(log($a->value[$max] + 1, 2)) :
++0;
++}
++
++/**
++ * Return the size of a BigInteger in bytes
++ *
++ * @return int
++ */
++function getLengthInBytes()
++{
++return ceil($this->getLength() / 8);
++}
++
+ /**
+  * Copy an object
+  *
+@@ -3237,6 +3264,11 @@ class BigInteger
+ $min = $temp;
+ }
+ 
++$length = $max->getLength();
++if ($length > 8196) {
++user_error('Generation of random prime numbers larger than 8196 has been disabled');
++}
++
+ static $one, $two;
+ if (!isset($one)) {
+ $one = new static(1);
+@@ -3344,7 +3376,14 @@ class BigInteger
+  */
+ function isPrime($t = false)
+ {
+-$length = strlen($this->toBytes());
++$length = $this->getLength();
++// OpenSSL limits RSA keys to 16384 bits. The length of an RSA key is equal to the length of the modulo, which is
++// produced by multiplying the primes p and q by one another. The largest number two 8196 bit primes can produce is
++// a 16384 bit number so, basically, 8196 bit primes are the largest OpenSSL will generate and if that's the largest
++// that it'll generate it also stands to reason that that's the largest you'll be able to test primality on
++if ($length > 8196) {
++user_error('Primality testing is not supported for numbers larger than 8196 bits');
++}
+ 
+ if (!$t) {
+ // see HAC 4.49 "Note (controlling the error probability)"
diff -Nru php-phpseclib-2.0.30/debian/patches/0029-BigInteger-rm-visibility-modifiers-from-static-varia.patch php-phpseclib-2.0.30/debian/patches/0029-BigInteger-rm-visibility-modifiers-from-static-varia.patch
--- php-phpseclib-2.0.30/debian/patches/0029-BigInteger-rm-visibility-modifiers-from-static-varia.patch	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib-2.0.30/debian/patches/0029-BigInteger-rm-visibility-modifiers-from-static-varia.patch	2024-02-27 21:15:41.0 +0100
@@ -0,0 +1,48 @@
+From: terrafrost 
+Date: Fri, 23 Feb 2024 21:55:47 -0600
+Subject: BigInteger: rm visibility modifiers from static variables
+
+the non static variables don't have privacy modifiers so idk that
+the static ones ought to either. phpseclib 3.0 uses privacy
+modifiers but not the 2.0 branch
+
+Origin: upstream, https://github.com/phpseclib/phpseclib/commit/21

Processed: bullseye-pu: package phpseclib/1.0.19-3+deb11u2

2024-03-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:phpseclib
Bug #1065268 [release.debian.org] bullseye-pu: package 
phpseclib/1.0.19-3+deb11u2
Added indication that 1065268 affects src:phpseclib

-- 
1065268: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065268
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1065268: bullseye-pu: package phpseclib/1.0.19-3+deb11u2

2024-03-02 Thread David Prévot
Package: release.debian.org
Severity: normal
Tags: bullseye
X-Debbugs-Cc: phpsec...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:phpseclib
User: release.debian@packages.debian.org
Usertags: pu

Hi,

This issue is simalar to #1065264 for bookworm

I’d like to see CVE-2024-27354 and CVE-2024-27355 addressed in the next
point release. We agreed with the security team that these issues are
not worth a DSA. This update also fixes an issue in dependency loading
similar to CVE-2024-24821 as fixed in composer/DSA-5632-1.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in oldstable
  [x] the issue is verified as fixed in unstable

TIA for considering.

Cheers,

taffit
diff -Nru phpseclib-1.0.19/debian/autoload.php.tpl phpseclib-1.0.19/debian/autoload.php.tpl
--- phpseclib-1.0.19/debian/autoload.php.tpl	2023-12-31 15:43:05.0 +0100
+++ phpseclib-1.0.19/debian/autoload.php.tpl	2024-02-27 21:27:58.0 +0100
@@ -1,7 +1,7 @@
   Tue, 27 Feb 2024 21:27:58 +0100
+
 phpseclib (1.0.19-3+deb11u1) bullseye-security; urgency=medium
 
   * Track bullseye
diff -Nru phpseclib-1.0.19/debian/patches/0029-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch phpseclib-1.0.19/debian/patches/0029-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch
--- phpseclib-1.0.19/debian/patches/0029-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	1970-01-01 01:00:00.0 +0100
+++ phpseclib-1.0.19/debian/patches/0029-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	2024-02-27 21:27:58.0 +0100
@@ -0,0 +1,76 @@
+From: terrafrost 
+Date: Fri, 23 Feb 2024 08:57:22 -0600
+Subject: BigInteger: put guardrails on isPrime() and randomPrime()
+
+Origin: upstream, https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575
+Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2024-27354
+---
+ phpseclib/Math/BigInteger.php | 41 -
+ 1 file changed, 40 insertions(+), 1 deletion(-)
+
+diff --git a/phpseclib/Math/BigInteger.php b/phpseclib/Math/BigInteger.php
+index 35df7ad..1dd4729 100644
+--- a/phpseclib/Math/BigInteger.php
 b/phpseclib/Math/BigInteger.php
+@@ -746,6 +746,33 @@ class Math_BigInteger
+ return $result;
+ }
+ 
++/**
++ * Return the size of a BigInteger in bits
++ *
++ * @return int
++ */
++function getLength()
++{
++if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL) {
++return strlen($this->toBits());
++}
++
++$max = count($this->value) - 1;
++return $max != -1 ?
++$max * MATH_BIGINTEGER_BASE + ceil(log($a->value[$max] + 1, 2)) :
++0;
++}
++
++/**
++ * Return the size of a BigInteger in bytes
++ *
++ * @return int
++ */
++function getLengthInBytes()
++{
++return ceil($this->getLength() / 8);
++}
++
+ /**
+  * Copy an object
+  *
+@@ -3283,6 +3310,11 @@ class Math_BigInteger
+ $min = $temp;
+ }
+ 
++$length = $max->getLength();
++if ($length > 8196) {
++user_error('Generation of random prime numbers larger than 8196 has been disabled');
++}
++
+ static $one, $two;
+ if (!isset($one)) {
+ $one = new Math_BigInteger(1);
+@@ -3390,7 +3422,14 @@ class Math_BigInteger
+  */
+ function isPrime($t = false)
+ {
+-$length = strlen($this->toBytes());
++$length = $this->getLength();
++// OpenSSL limits RSA keys to 16384 bits. The length of an RSA key is equal to the length of the modulo, which is
++// produced by multiplying the primes p and q by one another. The largest number two 8196 bit primes can produce is
++// a 16384 bit number so, basically, 8196 bit primes are the largest OpenSSL will generate and if that's the largest
++// that it'll generate it also stands to reason that that's the largest you'll be able to test primality on
++if ($length > 8196) {
++user_error('Primality testing is not supported for numbers larger than 8196 bits');
++}
+ 
+ if (!$t) {
+ // see HAC 4.49 "Note (controlling the error probability)"
Les fichiers binaires /tmp/q2874tUZtM/phpseclib-1.0.19/debian/patches/0030-ASN1-limit-OID-length.patch et /tmp/8dbXhTc93J/phpseclib-1.0.19/debian/patches/0030-ASN1-limit-OID-length.patch sont différents
diff -Nru phpseclib-1.0.19/debian/patches/0031-BigInteger-fix-getLength.patch phpseclib-1.0.19/debian/patches/0031-BigInteger-fix-getLength.patch
--- phpseclib-1.0.19/debian/patches/0031-BigInteger-fix-getLength.patch	1970-01-01 01:00:00.0 +0100
+++ phpseclib-1.0.19/debian/patches/0031-BigInteger-fix-getLength.patch	2024-02-27 21:27:58.0 +0100
@@ -0,0 +1,31 @@
+From: terrafrost 
+Date: Sat, 24 

Processed: bullseye-pu: package php-phpseclib/2.0.30-2+deb11u2

2024-03-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:php-phpseclib
Bug #1065266 [release.debian.org] bullseye-pu: package 
php-phpseclib/2.0.30-2+deb11u2
Added indication that 1065266 affects src:php-phpseclib

-- 
1065266: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065266
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1065266: bullseye-pu: package php-phpseclib/2.0.30-2+deb11u2

2024-03-02 Thread David Prévot
Package: release.debian.org
Severity: normal
Tags: bullseye
X-Debbugs-Cc: php-phpsec...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:php-phpseclib
User: release.debian@packages.debian.org
Usertags: pu

Hi,

This issue is similar to #1065263 for bookworm

I’d like to see CVE-2024-27354 and CVE-2024-27355 addressed in the next
point release. We agreed with the security team that these issues are
not worth a DSA.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in oldstable
  [x] the issue is verified as fixed in unstable

TIA for considering.

Cheers,

taffit


signature.asc
Description: PGP signature


Processed: bookworm-pu: package phpseclib/1.0.20-1+deb12u2

2024-03-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:phpseclib
Bug #1065264 [release.debian.org] bookworm-pu: package 
phpseclib/1.0.20-1+deb12u2
Added indication that 1065264 affects src:phpseclib

-- 
1065264: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065264
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1065264: bookworm-pu: package phpseclib/1.0.20-1+deb12u2

2024-03-02 Thread David Prévot
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: phpsec...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:phpseclib
User: release.debian@packages.debian.org
Usertags: pu

Hi,

I’d like to see CVE-2024-27354 and CVE-2024-27355 addressed in the next
point release. We agreed with the security team that these issues are
not worth a DSA. This update also fixes an issue in dependency loading
similar to CVE-2024-24821 as fixed in composer/DSA-5632-1.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in stable
  [x] the issue is verified as fixed in unstable

TIA for considering.

Cheers,

taffit
diff -Nru phpseclib-1.0.20/debian/changelog phpseclib-1.0.20/debian/changelog
--- phpseclib-1.0.20/debian/changelog	2023-12-31 11:37:21.0 +0100
+++ phpseclib-1.0.20/debian/changelog	2024-02-26 22:58:32.0 +0100
@@ -1,3 +1,13 @@
+phpseclib (1.0.20-1+deb12u2) bookworm; urgency=medium
+
+  * Backport upstream fixes
+- BigInteger: put guardrails on isPrime() and randomPrime() [CVE-2024-27354]
+- ASN1: limit OID length [CVE-2024-27355]
+- BigInteger: fix getLength()
+  * Force system dependencies loading
+
+ -- David Prévot   Mon, 26 Feb 2024 22:58:32 +0100
+
 phpseclib (1.0.20-1+deb12u1) bookworm-security; urgency=medium
 
   * Track Bookworm
diff -Nru phpseclib-1.0.20/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch phpseclib-1.0.20/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch
--- phpseclib-1.0.20/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	1970-01-01 01:00:00.0 +0100
+++ phpseclib-1.0.20/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	2024-02-26 22:58:32.0 +0100
@@ -0,0 +1,76 @@
+From: terrafrost 
+Date: Fri, 23 Feb 2024 08:57:22 -0600
+Subject: BigInteger: put guardrails on isPrime() and randomPrime()
+
+Origin: upstream, https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575
+Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2024-27354
+---
+ phpseclib/Math/BigInteger.php | 41 -
+ 1 file changed, 40 insertions(+), 1 deletion(-)
+
+diff --git a/phpseclib/Math/BigInteger.php b/phpseclib/Math/BigInteger.php
+index 961e6ca..5f6b8f3 100644
+--- a/phpseclib/Math/BigInteger.php
 b/phpseclib/Math/BigInteger.php
+@@ -746,6 +746,33 @@ class Math_BigInteger
+ return $result;
+ }
+ 
++/**
++ * Return the size of a BigInteger in bits
++ *
++ * @return int
++ */
++function getLength()
++{
++if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL) {
++return strlen($this->toBits());
++}
++
++$max = count($this->value) - 1;
++return $max != -1 ?
++$max * MATH_BIGINTEGER_BASE + ceil(log($a->value[$max] + 1, 2)) :
++0;
++}
++
++/**
++ * Return the size of a BigInteger in bytes
++ *
++ * @return int
++ */
++function getLengthInBytes()
++{
++return ceil($this->getLength() / 8);
++}
++
+ /**
+  * Copy an object
+  *
+@@ -3283,6 +3310,11 @@ class Math_BigInteger
+ $min = $temp;
+ }
+ 
++$length = $max->getLength();
++if ($length > 8196) {
++user_error('Generation of random prime numbers larger than 8196 has been disabled');
++}
++
+ static $one, $two;
+ if (!isset($one)) {
+ $one = new Math_BigInteger(1);
+@@ -3390,7 +3422,14 @@ class Math_BigInteger
+  */
+ function isPrime($t = false)
+ {
+-$length = strlen($this->toBytes());
++$length = $this->getLength();
++// OpenSSL limits RSA keys to 16384 bits. The length of an RSA key is equal to the length of the modulo, which is
++// produced by multiplying the primes p and q by one another. The largest number two 8196 bit primes can produce is
++// a 16384 bit number so, basically, 8196 bit primes are the largest OpenSSL will generate and if that's the largest
++// that it'll generate it also stands to reason that that's the largest you'll be able to test primality on
++if ($length > 8196) {
++user_error('Primality testing is not supported for numbers larger than 8196 bits');
++}
+ 
+ if (!$t) {
+ // see HAC 4.49 "Note (controlling the error probability)"
Les fichiers binaires /tmp/iyz_ted7Do/phpseclib-1.0.20/debian/patches/0012-ASN1-limit-OID-length.patch et /tmp/6XyXWtF89o/phpseclib-1.0.20/debian/patches/0012-ASN1-limit-OID-length.patch sont différents
diff -Nru phpseclib-1.0.20/debian/patches/0013-BigInteger-fix-getLength.patch phpseclib-1.0.20/debian/patches/0013-BigInteger-fix-getLength.patch
--- phpseclib-1.0.20/debian/patches/0

Bug#1065263: bookworm-pu: package php-phpseclib/2.0.42-1+deb12u2

2024-03-02 Thread David Prévot
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: php-phpsec...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:php-phpseclib
User: release.debian@packages.debian.org
Usertags: pu

Hi,

I’d like to see CVE-2024-27354 and CVE-2024-27355 addressed in the next
point release. We agreed with the security team that these issues are
not worth a DSA.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in stable
  [x] the issue is verified as fixed in unstable

TIA for considering.

Cheers,

taffit
diff -Nru php-phpseclib-2.0.42/debian/changelog php-phpseclib-2.0.42/debian/changelog
--- php-phpseclib-2.0.42/debian/changelog	2023-12-31 11:49:50.0 +0100
+++ php-phpseclib-2.0.42/debian/changelog	2024-02-26 23:23:19.0 +0100
@@ -1,3 +1,15 @@
+php-phpseclib (2.0.42-1+deb12u2) bookworm; urgency=medium
+
+  * Backport upstream fixes
+- BigInteger: put guardrails on isPrime() and randomPrime() [CVE-2024-27354]
+- BigInteger: rm visibility modifiers from static variables
+- ASN1: limit OID length [CVE-2024-27355]
+- Tests: updates for phpseclib 2.0
+- BigInteger: phpseclib 2.0 updates
+- BigInteger: fix getLength()
+
+ -- David Prévot   Mon, 26 Feb 2024 23:23:19 +0100
+
 php-phpseclib (2.0.42-1+deb12u1) bookworm-security; urgency=medium
 
   * Track bookworm
diff -Nru php-phpseclib-2.0.42/debian/patches/0010-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch php-phpseclib-2.0.42/debian/patches/0010-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch
--- php-phpseclib-2.0.42/debian/patches/0010-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib-2.0.42/debian/patches/0010-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	2024-02-26 23:23:19.0 +0100
@@ -0,0 +1,76 @@
+From: terrafrost 
+Date: Fri, 23 Feb 2024 08:57:22 -0600
+Subject: BigInteger: put guardrails on isPrime() and randomPrime()
+
+Origin: upstream, https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575
+Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2024-27354
+---
+ phpseclib/Math/BigInteger.php | 41 -
+ 1 file changed, 40 insertions(+), 1 deletion(-)
+
+diff --git a/phpseclib/Math/BigInteger.php b/phpseclib/Math/BigInteger.php
+index 81b69ac..fd9cd57 100644
+--- a/phpseclib/Math/BigInteger.php
 b/phpseclib/Math/BigInteger.php
+@@ -729,6 +729,33 @@ class BigInteger
+ return $result;
+ }
+ 
++/**
++ * Return the size of a BigInteger in bits
++ *
++ * @return int
++ */
++function getLength()
++{
++if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL) {
++return strlen($this->toBits());
++}
++
++$max = count($this->value) - 1;
++return $max != -1 ?
++$max * MATH_BIGINTEGER_BASE + ceil(log($a->value[$max] + 1, 2)) :
++0;
++}
++
++/**
++ * Return the size of a BigInteger in bytes
++ *
++ * @return int
++ */
++function getLengthInBytes()
++{
++return ceil($this->getLength() / 8);
++}
++
+ /**
+  * Copy an object
+  *
+@@ -3237,6 +3264,11 @@ class BigInteger
+ $min = $temp;
+ }
+ 
++$length = $max->getLength();
++if ($length > 8196) {
++user_error('Generation of random prime numbers larger than 8196 has been disabled');
++}
++
+ static $one, $two;
+ if (!isset($one)) {
+ $one = new static(1);
+@@ -3344,7 +3376,14 @@ class BigInteger
+  */
+ function isPrime($t = false)
+ {
+-$length = strlen($this->toBytes());
++$length = $this->getLength();
++// OpenSSL limits RSA keys to 16384 bits. The length of an RSA key is equal to the length of the modulo, which is
++// produced by multiplying the primes p and q by one another. The largest number two 8196 bit primes can produce is
++// a 16384 bit number so, basically, 8196 bit primes are the largest OpenSSL will generate and if that's the largest
++// that it'll generate it also stands to reason that that's the largest you'll be able to test primality on
++if ($length > 8196) {
++user_error('Primality testing is not supported for numbers larger than 8196 bits');
++}
+ 
+ if (!$t) {
+ // see HAC 4.49 "Note (controlling the error probability)"
diff -Nru php-phpseclib-2.0.42/debian/patches/0011-BigInteger-rm-visibility-modifiers-from-static-varia.patch php-phpseclib-2.0.42/debian/patches/0011-BigInteger-rm-visibility-modifiers-from-static-varia.patch
--- php-phpseclib-2.0.42/debian/patches/0011-BigInteger-rm-visibility-modifiers-from-static-varia.patch	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib-

Processed: bookworm-pu: package php-phpseclib/2.0.42-1+deb12u2

2024-03-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:php-phpseclib
Bug #1065263 [release.debian.org] bookworm-pu: package 
php-phpseclib/2.0.42-1+deb12u2
Added indication that 1065263 affects src:php-phpseclib

-- 
1065263: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065263
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1065261: bookworm-pu: package php-phpseclib3/3.0.19-1+deb12u3

2024-03-02 Thread David Prévot
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: php-phpsecl...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:php-phpseclib3
User: release.debian@packages.debian.org
Usertags: pu

Hi,

I’d like to see CVE-2024-27354 and CVE-2024-27355 addressed in the next
point release. We agreed with the security team that these issues are
not worth a DSA. This update also fixes an issue in dependency loading
similar to CVE-2024-24821 as fixed in composer/DSA-5632-1.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in stable
  [x] the issue is verified as fixed in unstable

TIA for considering.

Cheers,

taffit
diff -Nru php-phpseclib3-3.0.19/debian/autoload.php.tpl php-phpseclib3-3.0.19/debian/autoload.php.tpl
--- php-phpseclib3-3.0.19/debian/autoload.php.tpl	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib3-3.0.19/debian/autoload.php.tpl	2024-02-27 21:58:00.0 +0100
@@ -0,0 +1,31 @@
+  Tue, 27 Feb 2024 21:58:00 +0100
+
 php-phpseclib3 (3.0.19-1+deb12u2) bookworm-security; urgency=medium
 
   * Backport upstream SSH2 changes
diff -Nru php-phpseclib3-3.0.19/debian/clean php-phpseclib3-3.0.19/debian/clean
--- php-phpseclib3-3.0.19/debian/clean	2023-12-31 12:13:49.0 +0100
+++ php-phpseclib3-3.0.19/debian/clean	2024-02-27 21:58:00.0 +0100
@@ -1,6 +1,7 @@
-debian/autoload.php.tpl
 debian/autoload.tests.php.tpl
+ParagonIE
 phpseclib/autoload.php
 phpseclib3
+random_compat
 tests/.phpunit.result.cache
 vendor/
diff -Nru php-phpseclib3-3.0.19/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch php-phpseclib3-3.0.19/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch
--- php-phpseclib3-3.0.19/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib3-3.0.19/debian/patches/0011-BigInteger-put-guardrails-on-isPrime-and-randomPrime.patch	2024-02-27 21:58:00.0 +0100
@@ -0,0 +1,42 @@
+From: terrafrost 
+Date: Sat, 24 Feb 2024 08:38:47 -0600
+Subject: BigInteger: put guardrails on isPrime() and randomPrime()
+
+Origin: upstream, https://github.com/phpseclib/phpseclib/commit/0358eb163c55a9fd7b3848b9ecc83f6b9e49dbf5
+Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2024-27354
+---
+ phpseclib/Math/BigInteger/Engines/Engine.php | 14 ++
+ 1 file changed, 14 insertions(+)
+
+diff --git a/phpseclib/Math/BigInteger/Engines/Engine.php b/phpseclib/Math/BigInteger/Engines/Engine.php
+index 2b00bc3..3a735e7 100644
+--- a/phpseclib/Math/BigInteger/Engines/Engine.php
 b/phpseclib/Math/BigInteger/Engines/Engine.php
+@@ -781,6 +781,11 @@ abstract class Engine implements \JsonSerializable
+ $min = $temp;
+ }
+ 
++$length = $max->getLength();
++if ($length > 8196) {
++throw new \RuntimeException("Generation of random prime numbers larger than 8196 has been disabled ($length)");
++}
++
+ $x = static::randomRange($min, $max);
+ 
+ return static::randomRangePrimeInner($x, $min, $max);
+@@ -985,6 +990,15 @@ abstract class Engine implements \JsonSerializable
+  */
+ public function isPrime($t = false)
+ {
++// OpenSSL limits RSA keys to 16384 bits. The length of an RSA key is equal to the length of the modulo, which is
++// produced by multiplying the primes p and q by one another. The largest number two 8196 bit primes can produce is
++// a 16384 bit number so, basically, 8196 bit primes are the largest OpenSSL will generate and if that's the largest
++// that it'll generate it also stands to reason that that's the largest you'll be able to test primality on
++$length = $this->getLength();
++if ($length > 8196) {
++throw new \RuntimeException("Primality testing is not supported for numbers larger than 8196 bits ($length)");
++}
++
+ if (!$t) {
+ $t = $this->setupIsPrime();
+ }
diff -Nru php-phpseclib3-3.0.19/debian/patches/0012-Tests-add-unit-test-for-EC-pub-key-with-excessively-.patch php-phpseclib3-3.0.19/debian/patches/0012-Tests-add-unit-test-for-EC-pub-key-with-excessively-.patch
--- php-phpseclib3-3.0.19/debian/patches/0012-Tests-add-unit-test-for-EC-pub-key-with-excessively-.patch	1970-01-01 01:00:00.0 +0100
+++ php-phpseclib3-3.0.19/debian/patches/0012-Tests-add-unit-test-for-EC-pub-key-with-excessively-.patch	2024-02-27 21:58:00.0 +0100
@@ -0,0 +1,46 @@
+From: terrafrost 
+Date: Sat, 24 Feb 2024 08:42:27 -0600
+Subject: Tests: add unit test for EC pub key with excessively large integer
+
+Origin: backport, https://github.com/phpseclib/phpseclib/commit/e17409a3e39baf7c8ed9635c04130802463b117b
+---
+ tests/Unit/File/X509/X509Test.php|  12 
+ tests/Unit/File/X509/mal-cert-01.der | Bin 0 -> 

Processed: bookworm-pu: package php-phpseclib3/3.0.19-1+deb12u3

2024-03-02 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:php-phpseclib3
Bug #1065261 [release.debian.org] bookworm-pu: package 
php-phpseclib3/3.0.19-1+deb12u3
Added indication that 1065261 affects src:php-phpseclib3

-- 
1065261: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065261
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1064031: rustc-web 1.70.0+dfsg1-7~deb12u1 flagged for acceptance

2024-03-02 Thread Andres Salomon

On 3/2/24 02:00, Andres Salomon wrote:

Actually, scratch that; I had missed #1064563.

I'll redo the deb11u2 package with conflicts/replaces for that, as well, 
and then resend it shortly.


On 3/2/24 01:49, Andres Salomon wrote:


Okay, here's an updated package with fixes:

rustc-web (1.70.0+dfsg1-7~deb12u2) bookworm; urgency=medium

   * Non-maintainer upload.
   * Increase allowed test failures on armhf and ppc64el to fix FTBFS.
   * Provide Conflicts/Replaces for rust*-mozilla*, which could still be
 installed from oldstable (closes: #1064562).




rustc-web (1.70.0+dfsg1-7~deb12u2) bookworm; urgency=medium

  * Non-maintainer upload.
  * Increase allowed test failures on armhf and ppc64el to fix FTBFS.
  * Provide Conflicts/Replaces for rust*-mozilla*, which could still be
installed from oldstable (closes: #1064562).
  * Add Provides/Conflicts/Replaces for libstd-rust-1.70 (closes: 
#1064563).




This should fix builds for armhf & ppc64el, and also specifies manual 
conflicts/replaces with a bunch of packages from rustc-mozilla. In 
addition, it adds a p/c/r in libstd-rust-web-1.70 for libstd-rust-1.70.


For the rust*mozilla* conflicts, I tested it by doing an 'apt install 
rustc-mozilla rust-mozilla-src rust-mozilla-gdb libstd-rust-mozilla-dev' 
from oldstable onto a bookworm environmente, and then installed the 
locally built 'libstd-rust-web-1.70 libstd-rust-web-dev rust-web-gdb 
rust-web-src rustc-web' packages over that. The older rustc-mozilla 
packages are properly removed by apt, with the exception of 
libstd-rust-mozilla-1.63 (which should be fine).


For the libstd-rust-1.70 conflict, I tested it by manually installing 
the 'rustc-web libstd-rust-web-1.70 libstd-rust-web-dev' packages in a 
trixie environment, and then 'apt install rustc libstd-rust-web-dev' 
over that. As expected, it removed the three *-web* packages and 
successfully installed the standard rustc packages.


diff -u rustc-web-1.70.0+dfsg1/debian/changelog rustc-web-1.70.0+dfsg1/debian/changelog
--- rustc-web-1.70.0+dfsg1/debian/changelog	2024-02-14 02:02:37.0 +
+++ rustc-web-1.70.0+dfsg1/debian/changelog	2024-03-02 07:23:17.763665420 +
@@ -1,3 +1,13 @@
+rustc-web (1.70.0+dfsg1-7~deb12u2) bookworm; urgency=medium
+
+  * Non-maintainer upload.
+  * Increase allowed test failures on armhf and ppc64el to fix FTBFS.
+  * Provide Conflicts/Replaces for rust*-mozilla*, which could still be
+installed from oldstable (closes: #1064562).
+  * Add Provides/Conflicts/Replaces for libstd-rust-1.70 (closes: #1064563).
+
+ -- Andres Salomon   Sat, 02 Mar 2024 07:23:15 +
+
 rustc-web (1.70.0+dfsg1-7~deb12u1) bookworm; urgency=medium
 
   * Non-maintainer upload.
diff -u rustc-web-1.70.0+dfsg1/debian/control rustc-web-1.70.0+dfsg1/debian/control
--- rustc-web-1.70.0+dfsg1/debian/control	2024-02-14 02:02:37.0 +
+++ rustc-web-1.70.0+dfsg1/debian/control	2024-03-02 07:05:53.739717477 +
@@ -58,9 +58,9 @@
 Suggests:
 # lld and clang are needed for wasm compilation
  lld-16, clang-16,
-Conflicts: rustc
+Conflicts: rustc, rustc-mozilla
 Provides: rustc (= ${binary:Version})
-Replaces: libstd-rust-dev (<< 1.25.0+dfsg1-2~~), rustc
+Replaces: libstd-rust-dev (<< 1.25.0+dfsg1-2~~), rustc, rustc-mozilla
 Breaks: libstd-rust-dev (<< 1.25.0+dfsg1-2~~)
 Description: Rust systems programming language
  Rust is a curly-brace, block-structured expression language.  It
@@ -81,6 +81,9 @@
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
 Depends: ${shlibs:Depends}, ${misc:Depends}
+Conflicts: libstd-rust-1.70
+Replaces: libstd-rust-1.70
+Provides: libstd-rust-1.70
 Description: Rust standard libraries
  Rust is a curly-brace, block-structured expression language.  It
  visually resembles the C language family, but differs significantly
@@ -103,9 +106,9 @@
 Multi-Arch: same
 Depends: ${shlibs:Depends}, ${misc:Depends},
  libstd-rust-web-1.70 (= ${binary:Version}),
-Conflicts: libstd-rust-dev
+Conflicts: libstd-rust-dev, libstd-rust-mozilla-dev
 Provides: libstd-rust-dev (= ${binary:Version})
-Replaces: libstd-rust-dev
+Replaces: libstd-rust-dev, libstd-rust-mozilla-dev
 Description: Rust standard libraries - development files
  Rust is a curly-brace, block-structured expression language.  It
  visually resembles the C language family, but differs significantly
@@ -131,7 +134,8 @@
 Recommends:
  gcc-mingw-w64-x86-64-posix [amd64],
  gcc-mingw-w64-i686-posix [i386],
-Conflicts: libstd-rust-dev-windows
+Conflicts: libstd-rust-dev-windows, libstd-rust-mozilla-dev-windows
+Replaces: libstd-rust-mozilla-dev-windows
 Build-Profiles: 
 Description: Rust standard libraries - development files
  Rust is a curly-brace, block-structured expression language.  It
@@ -154,8 +158,8 @@
 Architecture: all
 Depends: gdb, ${misc:Depends}
 Suggests: gdb-doc
-Conflicts: rust-gdb
-Replaces: rustc (<< 1.1.0+dfsg1-1)
+Conflicts: rust-gdb, rust-mozilla-gdb
+Replaces: rustc (<< 1.1.0+dfsg1-1), rust-mozilla-gdb
 Description: Rust deb

Bug#1036884: transition: time64_t

2024-03-02 Thread Sebastian Ramacher
On 2024-03-01 23:10:22 -0800, Steve Langasek wrote:
> Please binNMU fyba on armhf and armel.  The maintainer uploaded it without
> versioned build-deps so it is renamed but has wrong ABI.
> 
> This needs to be built with dpkg-dev (>= 1.5.22), gcc-13 (>= 13.2.0-16.1).

Scheduled everywhere since it builds MA: same binaries.

Cheers
-- 
Sebastian Ramacher