Bug#930761: Bug#894068: ocrmypdf: New dependency on PyMuPDF for v6.0.0

2019-06-19 Thread James R Barlow
I should mention that ocrmypdf no longer has an immediate use for PyMuPDF -
I went the route of creating pikepdf, Python bindings for qpdf, and this is
library is now in Debian thanks to Sean's work on packaging it. I don't
think I would use PyMuPDF if it were available. pikepdf overlaps the core
of PyMuPDF but is not a competing library, offering low level PDF
manipulation and much in the less way of content generation.

As such the original basis for this ticket is gone. I just want to make
sure people aren't putting effort into this ticket for ocrmypdf alone. If
other people want to see PyMuPDF added to Debian for their own reasons,
that's quite fine.

-James

On Wed, Jun 19, 2019 at 10:28 PM Sean Whitton 
wrote:

> [updating CC to point to the newly-filed RFP]
>
> Hello Johannes,
>
> Thank you again for looking into this.
>
> On Sat 08 Jun 2019 at 09:52pm +0200, Johannes Schauer wrote:
>
> > after my struggles in #930212 I now figured out how to compile stuff
> against
> > the static library in libmupdf-dev. As a result I managed to package
> PyMuPDF.
> > You can see the result here:
> >
> > https://salsa.debian.org/python-team/modules/pymupdf
> >
> > It's mostly Lintian-clean and just waiting for somebody who feels like
> > maintaining it in the future. :)
>
> I've had a look at your repo.  I've got a few questions and comments
> (relevant to whomever wants to take ownership of the ITP and upload this
> to NEW).
>
> A tool called SWIG, with which I'm unfamiliar, was used to generate
> fitz/fitz.py from the files fitz/*.i, but this tool does not get run
> during the package build.  There could be updates to SWIG, including
> security updates, which would change fitz.py.  It seems to me that we
> want to run SWIG during the package build to ensure that fitz.py
> reflects all improvements made to SWIG since pymupdf upstream ran that
> tool when releasing pymupdf.
>
> Secondly, how do you foresee us triggering binNMUs to rebuild this
> package when the static library in libmupdf-dev changes?  We would need
> to be sure that this package gets rebuilt if a security update was made
> to libmupdf-dev, for example, or the vulnerable version of mupdf would
> still be present in this package.  PDF libraries tend to get CVEs, to
> put it mildly.  I'm worried we've the same sort of problem as discussed
> in #928227.
>
> Finally, I noticed that the project looks to be GPL-3 not GPL-3+, though
> I haven't looked through every file in the source.  I also haven't
> thought carefully about the implications of statically linking a project
> that's under the AGPL.  I think that we can do it, but I'm not sure
> quite what license the binary package will end up with, and quite how to
> document that in d/copyright.
>
> --
> Sean Whitton
>


Bug#930761: Bug#894068: ocrmypdf: New dependency on PyMuPDF for v6.0.0

2019-06-19 Thread Johannes Schauer
Hi Sean,

Quoting Sean Whitton (2019-06-20 07:28:12)
> [updating CC to point to the newly-filed RFP]

thank you!

> Thank you again for looking into this.

Incidentally I'm currently writing a tool that needs PyMuPDF so I'll probably
spend a bit more time on this. ;)

> On Sat 08 Jun 2019 at 09:52pm +0200, Johannes Schauer wrote:
> > after my struggles in #930212 I now figured out how to compile stuff
> > against the static library in libmupdf-dev. As a result I managed to
> > package PyMuPDF.  You can see the result here:
> >
> > https://salsa.debian.org/python-team/modules/pymupdf
> >
> > It's mostly Lintian-clean and just waiting for somebody who feels like
> > maintaining it in the future. :)
> I've had a look at your repo.  I've got a few questions and comments
> (relevant to whomever wants to take ownership of the ITP and upload this to
> NEW).
> 
> A tool called SWIG, with which I'm unfamiliar, was used to generate
> fitz/fitz.py from the files fitz/*.i, but this tool does not get run
> during the package build.  There could be updates to SWIG, including
> security updates, which would change fitz.py.  It seems to me that we
> want to run SWIG during the package build to ensure that fitz.py
> reflects all improvements made to SWIG since pymupdf upstream ran that
> tool when releasing pymupdf.

Agreed.

https://github.com/pymupdf/PyMuPDF/issues/312

> Secondly, how do you foresee us triggering binNMUs to rebuild this package
> when the static library in libmupdf-dev changes?  We would need to be sure
> that this package gets rebuilt if a security update was made to libmupdf-dev,
> for example, or the vulnerable version of mupdf would still be present in
> this package.  PDF libraries tend to get CVEs, to put it mildly.  I'm worried
> we've the same sort of problem as discussed in #928227.

We have a similar issue but a less severe one because this is only one package
and not a whole ecosystem of them. Since the required tooling is currently
missing, I guess any maintainer of PyMuPDF would need to closely follow mupdf
development and trigger binNMUs as necessary.

> Finally, I noticed that the project looks to be GPL-3 not GPL-3+, though I
> haven't looked through every file in the source.

Indeed there seem to be some files in it that are just GPL-3 and not GPL-3+,
namely in the demo and examples directories. d/copyright has to be adjusted
accordingly.

> I also haven't thought carefully about the implications of statically linking
> a project that's under the AGPL.  I think that we can do it, but I'm not sure
> quite what license the binary package will end up with, and quite how to
> document that in d/copyright.

d/copyright only documents the contents of the source package. As far as I know
we do not yet have means to also document the inferred license of any generated
binary artifacts?

Thanks!

cheers, josch


signature.asc
Description: signature


Bug#930763: vim-gtk3: After modeline fix (#930020) syntax HL is removed after safe

2019-06-19 Thread Miek Gieben
Package: vim-gtk3
Version: 2:8.0.0197-4+deb9u2
Severity: normal

Dear Maintainer,

See the upstream bug that I filed on the issue: 
https://github.com/fatih/vim-go/issues/2363
Abbreviated here:

After a Debian Vim upgrade (2:8.1.0875-2) my vim + vim-go exhibits the 
following behaviour:

1.Open Go file; syntax highlighting is enabled
2.Write file
3.No syntax is available (:syntax: returns No Syntax items defined for this 
buffer)

-- Package-specific info:

--- real paths of main Vim binaries ---
/usr/bin/vi is /usr/bin/vim.gtk3
/usr/bin/vim is /usr/bin/vim.gtk3
/usr/bin/gvim is /usr/bin/vim.gtk3

-- System Information:
Debian Release: 9.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-6-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages vim-gtk3 depends on:
ii  libacl1  2.2.52-3+b1
ii  libc62.24-11+deb9u4
ii  libcairo21.14.8-1
ii  libgdk-pixbuf2.0-0   2.36.5-2+deb9u2
ii  libglib2.0-0 2.50.3-2
ii  libgpm2  1.20.7-5
ii  libgtk-3-0   3.22.11-1
ii  libice6  2:1.0.9-2
ii  liblua5.2-0  5.2.4-1.1+b2
ii  libpango-1.0-0   1.40.5-1
ii  libpangocairo-1.0-0  1.40.5-1
ii  libperl5.24  5.24.1-3+deb9u5
ii  libpython3.5 3.5.3-1+deb9u1
ii  libruby2.3   2.3.3-1+deb9u6
ii  libselinux1  2.6-3+b3
ii  libsm6   2:1.2.2-1+b3
ii  libtcl8.68.6.6+dfsg-1+b1
ii  libtinfo56.0+20161126-1+deb9u2
ii  libx11-6 2:1.6.4-3+deb9u1
ii  libxt6   1:1.1.5-1
ii  vim-common   2:8.0.0197-4+deb9u2
ii  vim-gui-common   2:8.0.0197-4+deb9u2
ii  vim-runtime  2:8.0.0197-4+deb9u2

vim-gtk3 recommends no packages.

Versions of packages vim-gtk3 suggests:
ii  cscope15.8b-2
ii  fonts-dejavu  2.37-1
ii  gnome-icon-theme  3.12.0-2
pn  vim-doc   

-- no debconf information



Bug#926884: distcc: Does not work with clang

2019-06-19 Thread Christian Marillat
> Package: distcc
> Followup-For: Bug #926884
>
> This package should not be released in Buster with this bug,
> clang is an important compiler (and much easier for cross-compiling)
> and not working with it is too big of a bug.

I'm sorry but no. Your python script doesnt work for Debian See #920709

Christian



Bug#930762: pybigwig: autopkgtest fails because it tests non-existing python-pybigwig

2019-06-19 Thread Steve Langasek
Package: pybigwig
Version: 0.3.16+dfsg-1
Severity: serious
Tags: patch
Justification: autopkgtest regression
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu eoan ubuntu-patch

Hi Diane,

The pybigwig package is failing its autopkgtests now in unstable, because
debian/tests/control was not updated to account for the fact that the
python2 binary package is no longer built:

[...]
autopkgtest [21:50:25]: test command1: preparing testbed
Reading package lists...
Building dependency tree...
Reading state information...
Correcting dependencies...Starting pkgProblemResolver with broken count: 1
Starting 2 pkgProblemResolver with broken count: 1
Investigating (0) autopkgtest-satdep:amd64 < 0 @iU mK Nb Ib >
Broken autopkgtest-satdep:amd64 Depends on python-pybigwig:amd64 < none @un H >
  Removing autopkgtest-satdep:amd64 because I can't find python-pybigwig:amd64
Done
 Done
Starting pkgProblemResolver with broken count: 0
Starting 2 pkgProblemResolver with broken count: 0
Done
The following packages will be REMOVED:
  autopkgtest-satdep
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
1 not fully installed or removed.
[...]

   (https://ci.debian.net/packages/p/pybigwig/unstable/amd64/)

The simple solution is to drop the python2 test from the package, as in the
attached patch.

Cheers,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developer   https://www.debian.org/
slanga...@ubuntu.com vor...@debian.org
diff -Nru pybigwig-0.3.16+dfsg/debian/tests/control 
pybigwig-0.3.16+dfsg/debian/tests/control
--- pybigwig-0.3.16+dfsg/debian/tests/control   2019-05-03 08:55:38.0 
-0700
+++ pybigwig-0.3.16+dfsg/debian/tests/control   2019-06-19 23:01:34.0 
-0700
@@ -1,12 +1,4 @@
 Test-Command: set -e
- ; for py in $(pyversions -r 2>/dev/null)
- ; do cd pyBigWigTest
- ; $py test.py
- ; cd ..
- ; done
-Depends: python-pybigwig, python-all
-
-Test-Command: set -e
  ; for py in $(py3versions -r 2>/dev/null)
  ; do cd pyBigWigTest
  ; $py test.py


Bug#930666: Please document consensus on use of dh sequencer

2019-06-19 Thread Sean Whitton
Hello Russ,

On Tue 18 Jun 2019 at 06:24PM -07, Russ Allbery wrote:

> For those reading this, note that "recommended" is a documented keyword in
> Policy, equivalent to "should."  However, it is intentionally weakened
> here with the "in the absence of a reason to use a different approach"
> language.  The goal here (and please judge whether I achieved it) is to
> concentrate on providing default advice to people with no preference,
> particularly people new to packaging, not to argue with maintainers who
> are familiar with the tradeoffs and are intentionally making a different
> choice.

This seems like the right goal but I'm not sure your patch quite
achieves it yet.

> diff --git a/policy/ch-source.rst b/policy/ch-source.rst
> index ee9270d..9ea2f5c 100644
> --- a/policy/ch-source.rst
> +++ b/policy/ch-source.rst
> @@ -259,18 +259,49 @@ files, sockets or setuid or setgid files.. [#]_
>  Main building script: ``debian/rules``
>  --
>
> -This file must be an executable makefile, and contains the
> -package-specific recipes for compiling the package and building binary
> -package(s) from the source.
> -
> -It must start with the line ``#!/usr/bin/make -f``, so that it can be
> -invoked by saying its name rather than invoking ``make`` explicitly.
> -That is, invoking either of ``make -f debian/rules args...`` or 
> ``./debian/rules args...`` must result in identical behavior.
> +This file must be an executable makefile.  It contains the
> +package-specific recipes for compiling the source (if required) and
> +constructing one or more binary packages.
> +
> +``debian/rules`` must start with the line ``#!/usr/bin/make -f`` so that
> +it can be executed by running ``./debian/rules`` from the top of the
> +source package.  Invoking either of ``make -f debian/rules  ...`` or
> +``./debian/rules  ...`` must result in identical behavior.

I must admit to being sad to see the demise of "invoked by saying its
name", but this is probably a sensible change.

A tiny thing is that you seem to have switched "" for "",
which seems wrong.

> +
> +In the absence of a reason to use a different approach, the recommended
> +way to implement the build process of a Debian package, including the
> +contents of the ``debian/rules`` building script, is the ``dh`` tool,
> +which is provided by the debhelper package.  This is the most common
> +packaging helper tool in Debian.  Using it will save effort in complying
> +with the rules in this document, since it will automatically implement
> +many of them without requiring explicit instructions.

I would like to try to make the first sentence normatively clearer.  I
think that it would be difficult to understand exactly what the project
consensus is from that sentence, had you not read Sam's d-d-a post.

Let me try to express what I think the problem is.  What the first
sentence says, given the equivalence of RECOMMENDED and SHOULD noted
above, is "you should use dh unless there is a reason not to use dh".

However, any SHOULD requirement in Policy implicitly has that structure:
"you should X unless there is reason not to X".  Perhaps MUST
requirements don't have that implicit structure, because perhaps the
idea in such cases is that there is never reason not to X.

Thus, your sentence seems to just be making explicit something which is
already implicit in any SHOULD requirement, i.e., "In the absence ..."
is strictly redundant.  And so I don't think the sentence succeeds in
expressing the nuanced project consensus which it aims to express,
because the consensus is more nuanced than just the implicit structure
had by any SHOULD requirement.

Would it be right to say that what we are trying to express is the idea
that dh should be used when there aren't *package-specific* reasons not
to use dh, and for new packages, we're recommending a workflow of
starting with the assumption that no such package-specific reasons
exist?  This captures the idea that dh makes things easier for other
contributors working on your package, which seems core to the project's
consensus.

> +
> +There are various situations in which ``dh`` is not the best choice.  For
> +example, the standard tools for packaging software written in some
> +languages may use another tool, some rarer packaging patterns (such as
> +multiple builds of the same software with different options) are easier to
> +express with other tools, or the packager may be working on a new
> +packaging helper and may therefore want to use that tool.  Using ``dh`` is
> +therefore not required.  But it is a wise default choice in most
> +situations.
> +
> +If the package uses ``dh``, the default content of ``debian/rules`` will
> +be::

I find the expression "default content" odd in this context, I think
because defaults are things that executable programs have, not source
code.

Can I suggest we talk instead about the "starting point for the content
of d/rules" and say something like "this starting point is of

Bug#930761: Bug#894068: ocrmypdf: New dependency on PyMuPDF for v6.0.0

2019-06-19 Thread Sean Whitton
[updating CC to point to the newly-filed RFP]

Hello Johannes,

Thank you again for looking into this.

On Sat 08 Jun 2019 at 09:52pm +0200, Johannes Schauer wrote:

> after my struggles in #930212 I now figured out how to compile stuff against
> the static library in libmupdf-dev. As a result I managed to package PyMuPDF.
> You can see the result here:
>
> https://salsa.debian.org/python-team/modules/pymupdf
>
> It's mostly Lintian-clean and just waiting for somebody who feels like
> maintaining it in the future. :)

I've had a look at your repo.  I've got a few questions and comments
(relevant to whomever wants to take ownership of the ITP and upload this
to NEW).

A tool called SWIG, with which I'm unfamiliar, was used to generate
fitz/fitz.py from the files fitz/*.i, but this tool does not get run
during the package build.  There could be updates to SWIG, including
security updates, which would change fitz.py.  It seems to me that we
want to run SWIG during the package build to ensure that fitz.py
reflects all improvements made to SWIG since pymupdf upstream ran that
tool when releasing pymupdf.

Secondly, how do you foresee us triggering binNMUs to rebuild this
package when the static library in libmupdf-dev changes?  We would need
to be sure that this package gets rebuilt if a security update was made
to libmupdf-dev, for example, or the vulnerable version of mupdf would
still be present in this package.  PDF libraries tend to get CVEs, to
put it mildly.  I'm worried we've the same sort of problem as discussed
in #928227.

Finally, I noticed that the project looks to be GPL-3 not GPL-3+, though
I haven't looked through every file in the source.  I also haven't
thought carefully about the implications of statically linking a project
that's under the AGPL.  I think that we can do it, but I'm not sure
quite what license the binary package will end up with, and quite how to
document that in d/copyright.

-- 
Sean Whitton



Bug#930659: libapache-session-perl: poor source of entropy for session id generation

2019-06-19 Thread Xavier
Le 18/06/2019 à 09:56, Xavier a écrit :
> Le 18/06/2019 à 09:46, Xavier a écrit :
>> Le 17/06/2019 à 22:44, Raphael Geissert a écrit :
>>> Package: libapache-session-perl
>>> Version: 1.93-3
>>> Severity: important
>>> Tags: security
>>>
>>> Hi,
>>>
>>> As discussed in oss-security[1], libapache-session-perl uses a poor
>>> source of entropy in Apache::Session::Generate::MD5. The critical part
>>> is moving away from rand (e.g. to using urandom), but it would also be
>>> a good time to update the way the id is generated.
>>>
>>> The details are in the oss-sec thread.
>>>
>>> [1] https://www.openwall.com/lists/oss-security/2019/06/15/1
>>>
>>> Cheers,
>>
>> Hi all,
>>
>> lemonldap-ng is not affected by this issue even if it depends on
>> Apache::Session: it uses its own
>> Lemonldap::NG::Common::Apache::Session::Generate::SHA256 which uses
>> Crypt::URandom instead of rand(). This can be easily backported to
>> Apache::Session but changes the generated id: SHA256 is longer.
> 
> This is true for lemonldap-ng ≥ 2.0.2 (buster), 1.9.x versions (stretch)
> are concerned by this issue.
> 
> Fix is referenced here:
> https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1633

I proposed a fix here:
https://salsa.debian.org/perl-team/modules/packages/libapache-session-perl/merge_requests/1

Cheers,
Xavier



Bug#930012: gcc-8: ICE building firefox 68.0~b6-2 on s390x and i386

2019-06-19 Thread Olivier Tilloy
I am attaching a patch for skcms that fixes the firefox build on s390x
and i386. Not submitted upstream yet.
Description: work around a GCC bug that results in build failures on i386 and s390x
Author: Olivier Tilloy 
Bug: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90756
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930012

--- a/gfx/skia/skia/third_party/skcms/src/Transform_inl.h
+++ b/gfx/skia/skia/third_party/skcms/src/Transform_inl.h
@@ -559,7 +559,7 @@ SI void sample_clut_16(const skcms_A2B*
 
 // GCC 7.2.0 hits an internal compiler error with -finline-functions (or -O3)
 // when targeting MIPS 64,  I think attempting to inline clut() into exec_ops().
-#if 1 && defined(__GNUC__) && !defined(__clang__) && defined(__mips64)
+#if 1 && defined(__GNUC__) && !defined(__clang__) && (defined(__mips64) || defined(__i386) || defined(__s390x__))
 #define MAYBE_NOINLINE __attribute__((noinline))
 #else
 #define MAYBE_NOINLINE


Bug#929564: gatb-core-testdata: broken symlink: /usr/share/doc/gatb-core/test/gatb-core-cppunit -> ../../../../lib/gatb-core/gatb-core-cppunit

2019-06-19 Thread Andreas Tille
Hi Andreas,

On Sun, May 26, 2019 at 10:45:43AM +0200, Andreas Beckmann wrote:
> during a test with piuparts I noticed your package ships (or creates)
> a broken symlink.
> 
> >From the attached log (scroll to the bottom...):
> 
> 0m20.3s ERROR: FAIL: Broken symlinks:
>   /usr/share/doc/gatb-core/test/gatb-core-cppunit -> 
> ../../../../lib/gatb-core/gatb-core-cppunit (gatb-core-testdata)
> 
> The target does not seem to exist in any package in the archive.

That's actually quite strange.  In local builds using pbuilder the file
/usr/lib/gatb-core/gatb-core-cppunit is created and part of the package
gatb-core.  However, it seems the package build by the autobuilders
after uploading the source package is lacking the file.  I admit I have
no idea how this can happen.  I just observed this with the recently
uploaded gatb-core_1.4.1+git20181225.44d5a44+dfsg-3.

Kind regards

Andreas.

-- 
http://fam-tille.de



Bug#930761: RFP: PyMuPDF -- python bindings for MuPDF

2019-06-19 Thread Sean Whitton
Package: wnpp
Severity: wishlist

* Package name: pymupdf
  Version : 1.14.16
  Upstream Author : Ruikai Liu and Jorj X. McKie
* URL : https://github.com/pymupdf/PyMuPDF
* License : GPL-3
  Programming Lang: Python
  Description : python bindings for MuPDF

josch provides this long description:

 Allows one to access files in PDF, XPS, OpenXPS, CBZ, EPUB, and FB2 (e-books)
 formats, and it is known for its top performance and high rendering quality.
 .
 PDF manipulation and generation functions are available, including metadata
 and bookmark maintenance, document restructuring, annotation / link handling
 and document or page creation.

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#930760: aoeui FTCBFS: does not pass cross tools to make

2019-06-19 Thread Helmut Grohne
Source: aoeui
Version: 1.7+20160302.git4e5dee9-1
Tags: patch
User: debian-cr...@lists.debian.org
Usertags: ftcbfs

aoeui fails to cross build from source, because it does not pass cross
tools to make. The easiest way of doing so - using dh_auto_build - makes
aoeui cross buildable. Please consider applying the attached patch.

Helmut
diff --minimal -Nru aoeui-1.7+20160302.git4e5dee9/debian/changelog 
aoeui-1.7+20160302.git4e5dee9/debian/changelog
--- aoeui-1.7+20160302.git4e5dee9/debian/changelog  2018-01-04 
21:25:32.0 +0100
+++ aoeui-1.7+20160302.git4e5dee9/debian/changelog  2019-06-20 
06:01:06.0 +0200
@@ -1,3 +1,10 @@
+aoeui (1.7+20160302.git4e5dee9-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Let dh_auto_build pass cross tools to make. (Closes: #-1)
+
+ -- Helmut Grohne   Thu, 20 Jun 2019 06:01:06 +0200
+
 aoeui (1.7+20160302.git4e5dee9-1) unstable; urgency=medium
 
   * New upstream release
diff --minimal -Nru aoeui-1.7+20160302.git4e5dee9/debian/rules 
aoeui-1.7+20160302.git4e5dee9/debian/rules
--- aoeui-1.7+20160302.git4e5dee9/debian/rules  2018-01-04 21:25:32.0 
+0100
+++ aoeui-1.7+20160302.git4e5dee9/debian/rules  2019-06-20 06:01:05.0 
+0200
@@ -12,7 +12,7 @@
dh_auto_clean
 
 override_dh_auto_build:
-   $(MAKE) aoeui aoeui.1 asdfg.1
+   dh_auto_build -- aoeui aoeui.1 asdfg.1
 
 override_dh_auto_install:
dh_auto_install


Bug#906518: qa.debian.org: Missing manpages webpage links to seemingly dead project

2019-06-19 Thread Stephen Gelman
I contacted him and the reply was:

> Thanks for contacting me, but I'm afraid those efforts
> are long dead.  Please remove the links.

On Wed, Jun 19, 2019 at 9:05 PM Stephen Gelman  wrote:
>
> Great point I totally missed that before.  I'll contact them!
>
> On Wed, Jun 19, 2019 at 9:02 PM Paul Wise  wrote:
> >
> > On Sat, Aug 18, 2018 at 5:03 AM Stephen Gelman wrote:
> >
> > > It seems that the "Missing Man Pages Project" [1] linked to from the 
> > > missing manpages qa page [2] is no longer an active project.  The project 
> > > page linked is gone (and seems to have been gone since 2013 at least) and 
> > > I can't seem to find any replacement for it.  Therefore, it seems that 
> > > the link, along with the suggestion to submit man pages to it, should be 
> > > removed.
> > >
> > > [1] http://www.netmeister.org/misc/m2p2/index.html
> > > [2] http://qa.debian.org/man-pages.html
> >
> > The link is 403, which implies that this is caused by (umask)
> > misconfiguration rather than removal. Instead of removing the link, I
> > suggest contacting the maintainer of the page and asking them about
> > the status. Their blog is active and they list their contact
> > information on the front page of their website.
> >
> > --
> > bye,
> > pabs
> >
> > https://wiki.debian.org/PaulWise



Bug#930759: mokutil(1) refers to non-existent "--enroll-validation"

2019-06-19 Thread Antoine Beaupre
Package: mokutil
Version: 0.3.0+1538710437.fb6250f-1
Severity: minor

mokutil(1) has this to say about "validation":

   mokutil [--disable-validation]
   mokutil [--enable-validation]
   
   [...]
   
   --disable-validation
  Disable the validation process in shim

   --enrolled-validation
  Enable the validation process in shim

This seems like a contradiction: is it `enrolled` or `enable`? I tried
`enable` and it worked, so maybe it's the first? In any case, it seems
the manpage should be fixed.

For some mysterious reason, `mokutil --enable-validation` is the magic
thing I had to do to get secureboot working here. I have no idea what
it does and the manpage doesn't really explain that beyond saying "it
enables the validation, duh". It would be great if the docs would
actually say what that thing actually does so I'm not totally in the
dark about what i'm doing with this uber secure thing. :)

Why does that thing prompt for a password anyways?

A.

-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental'), (1, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages mokutil depends on:
ii  libc6   2.28-10
ii  libefivar1  37-2
ii  libssl1.1   1.1.1c-1

mokutil recommends no packages.

mokutil suggests no packages.

-- debconf-show failed



Bug#906518: qa.debian.org: Missing manpages webpage links to seemingly dead project

2019-06-19 Thread Stephen Gelman
Great point I totally missed that before.  I'll contact them!

On Wed, Jun 19, 2019 at 9:02 PM Paul Wise  wrote:
>
> On Sat, Aug 18, 2018 at 5:03 AM Stephen Gelman wrote:
>
> > It seems that the "Missing Man Pages Project" [1] linked to from the 
> > missing manpages qa page [2] is no longer an active project.  The project 
> > page linked is gone (and seems to have been gone since 2013 at least) and I 
> > can't seem to find any replacement for it.  Therefore, it seems that the 
> > link, along with the suggestion to submit man pages to it, should be 
> > removed.
> >
> > [1] http://www.netmeister.org/misc/m2p2/index.html
> > [2] http://qa.debian.org/man-pages.html
>
> The link is 403, which implies that this is caused by (umask)
> misconfiguration rather than removal. Instead of removing the link, I
> suggest contacting the maintainer of the page and asking them about
> the status. Their blog is active and they list their contact
> information on the front page of their website.
>
> --
> bye,
> pabs
>
> https://wiki.debian.org/PaulWise



Bug#906518: qa.debian.org: Missing manpages webpage links to seemingly dead project

2019-06-19 Thread Paul Wise
On Sat, Aug 18, 2018 at 5:03 AM Stephen Gelman wrote:

> It seems that the "Missing Man Pages Project" [1] linked to from the missing 
> manpages qa page [2] is no longer an active project.  The project page linked 
> is gone (and seems to have been gone since 2013 at least) and I can't seem to 
> find any replacement for it.  Therefore, it seems that the link, along with 
> the suggestion to submit man pages to it, should be removed.
>
> [1] http://www.netmeister.org/misc/m2p2/index.html
> [2] http://qa.debian.org/man-pages.html

The link is 403, which implies that this is caused by (umask)
misconfiguration rather than removal. Instead of removing the link, I
suggest contacting the maintainer of the page and asking them about
the status. Their blog is active and they list their contact
information on the front page of their website.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



Bug#926884: distcc: Does not work with clang

2019-06-19 Thread Shawn Landden
severity -1 serious
Message-ID: 
<156099516006.31749.3126069341315892890.reportbug@big-daddy.novalocal>
X-Mailer: reportbug 7.5.2
Date: Wed, 19 Jun 2019 21:46:00 -0400
X-Debbugs-Cc: sh...@git.icu

Package: distcc
Followup-For: Bug #926884

This package should not be released in Buster with this bug,
clang is an important compiler (and much easier for cross-compiling)
and not working with it is too big of a bug.

Your Upstream,

Shawn Landden

-- System Information:
Debian Release: 10.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: ppc64el (ppc64le)

Kernel: Linux 4.19.0-5-powerpc64le (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages distcc depends on:
ii  adduser3.118
ii  debconf [debconf-2.0]  1.5.72
ii  init-system-helpers1.56+nmu1
ii  libavahi-client3   0.7-4+b1
ii  libavahi-common3   0.7-4+b1
ii  libc6  2.28-10
ii  libgssapi-krb5-2   1.17-2
ii  libpopt0   1.16-12
ii  lsb-base   10.2019051400
ii  netbase5.6

distcc recommends no packages.

Versions of packages distcc suggests:
ii  ccache   3.7.1-1
ii  dbus 1.12.16-1
pn  distcc-pump  
pn  distccmon-gnome  
pn  dmucs



Bug#930721: vim: Syntax highlighting breaks if buffer is reopened/reused or `:syntax on` is repeated

2019-06-19 Thread Rob Wiesler
Control: severity -1 normal
Control: merge -1 930718
Control: notfound -1 2:8.0.0197-4+deb9u1
Control: tags -1 patch fixed-upstream

(I believe this bug, as annoying as it is, fits the definition of a
"normal" severity bug.  I wouldn't have changed it, but AFAIK merging
multiple bugs requires their severity to be the same.)

Looks to me like patch 8.0.0066 (which was part of the mass backporting
to fix CVE-2019-12735) causes this bug, and patch [8.1.0067] fixes it,
but was missed.

[8.1.0067] 
https://github.com/vim/vim/commit/a5616b0136cea2104a475d143a1685d71e9b2d3d

I've built up a local copy of this package with the patch added, and the
bug is gone.

As an aside, are the vim unit tests fun to watch or what?



Bug#818046: cwidget: keybindings::get(std::string tag) should use tag as case-insensitive

2019-06-19 Thread Manuel A. Fernandez Montecelo

Control: tags -1 + pending


2016-03-13 02:37 Manuel A. Fernandez Montecelo:

Source: cwidget
Version: 0.5.17-4
Severity: important

When inserting with set() the tag it's stored as uppercase, so get() should do
the same transformation, otherwise it's confusing and appears to be buggy.


This has been committed for 0.5.19, marking as pending.

--
Manuel A. Fernandez Montecelo 



Bug#928032: Default configuration for USBGuard

2019-06-19 Thread Antoine Beaupre
On Fri, Apr 26, 2019 at 03:10:19PM +0200, Thiébaud Weksteen wrote:
> Does anyone have any preference?

I think minimizing the number of prompts to the user would be
preferable, honestly.

I would do the following changes in the Debian package:

 1. PresentDevicePolicy=keep - just to avoid breaking existing setups
will still providing *some* security for new devices (although the
rule generation thing does that, this is easier to implement in the
Debian package). Note that I am not clear on the difference between
=keep and =allow, so take this with a grain of salt. Upstream says
this is preferably kept to apply-policy because an attacker might
crash the USBguard daemon to get their device rejected, but I'm not
sure it's that much of a threat model.

 2. Add `plugdev` to the IPCAllowedGroups setting. It's commonly the
group that is allowed to deal with pluggable devices, and it's not a
big compromise to allow them to decide what gets plugged in or not.
This ensures that normal users can interact with the USBguard daemon
and do stuff in case the above fails.

I think enforcing new devices confirmation then becomes safe enough and
meaningful, without having to otherwise prompt the user.

A.



Bug#930758: runit: Add a test for switching init (systemd-->runit)

2019-06-19 Thread Lorenzo Puliti
Package: runit
Version: 2.1.2-31
Severity: wishlist
Tags: patch



-- System Information:
Debian Release: 10.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.20.3-van (SMP w/4 CPU cores; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: runit (via /run/runit.stopit)

Versions of packages runit depends on:
ii  libc6   2.28-10
ii  runit-helper2.8.10
ii  sysuser-helper  1.3.3

Versions of packages runit recommends:
ii  runit-init  2.1.2-30

runit suggests no packages.

-- Configuration Files:
/etc/runit/3 changed [not included]

-- no debconf information

Hi,

while experimenting with autopkgtest i manage to write a small test
that, starting from a systemd qemu machine, installs runit-init and reboot into
it, checking if there is a working getty to login with and if essential 
services (syslog, udev ..) are up.
While the test is very simple it could be useful to have something like
this around to make sure that the compat layer in /run/initctl will not 
get broken (by systemd) and that some future development in stage1/2 will not
break the runit-init boot.
I have tested it on my pc, the last attach is the output of the test

Lorenzo
>From d02fbb0e7e3a66ca463bf96b9f5fb1057856fe60 Mon Sep 17 00:00:00 2001
From: Lorenzo Puliti 
Date: Thu, 20 Jun 2019 00:47:17 +0200
Subject: [PATCH 1/3] Provide a service for a getty on serial tty

Provide a getty-ttyS0 service; this is needed by autopkgtest
for connecting with the testbed (qemu), otherwise a reboot into
a runit-init VM will fail the test.
---
 debian/getty-ttyS0/run | 8 
 debian/runit.install   | 1 +
 2 files changed, 9 insertions(+)
 create mode 100755 debian/getty-ttyS0/run

diff --git a/debian/getty-ttyS0/run b/debian/getty-ttyS0/run
new file mode 100755
index 000..31dccf6
--- /dev/null
+++ b/debian/getty-ttyS0/run
@@ -0,0 +1,8 @@
+#!/bin/sh
+NAME=getty-ttyS0
+if pgrep -x agetty -t ttyS0; then
+sv d getty-ttyS0
+echo "already another getty on ttyS0"
+fi
+exec 2>&1
+exec chpst -P fgetty /dev/ttyS0
diff --git a/debian/runit.install b/debian/runit.install
index 40a9466..a9a72fe 100644
--- a/debian/runit.install
+++ b/debian/runit.install
@@ -21,5 +21,6 @@ runit-2.1.2/src/runit   /sbin
 debian/contrib/shutdown /lib/runit
 debian/contrib/runlevel /lib/runit
 debian/sulogin/run  /etc/runit/runsvdir/single/sulogin
+debian/getty-ttyS0/run  /etc/sv/getty-ttyS0
 debian/contrib/lib/async-timeout/lib/runit
 debian/contrib/lib/run_sysv_scripts /lib/runit
-- 
2.20.1

>From 374b79ae1c811b668668f22f57e77a6d352670a4 Mon Sep 17 00:00:00 2001
From: Lorenzo Puliti 
Date: Mon, 17 Jun 2019 14:43:55 +0200
Subject: [PATCH 2/3] Prepare source for autopkgtest

Add a stanza in debian/control and a debian/tests directory
needed for autopkgtest
---
 debian/control   | 1 +
 debian/tests/control | 1 +
 2 files changed, 2 insertions(+)
 create mode 100644 debian/tests/control

diff --git a/debian/control b/debian/control
index 23300e5..0764231 100644
--- a/debian/control
+++ b/debian/control
@@ -13,6 +13,7 @@ Build-Depends: bash-completion,
doc-base,
 Vcs-Browser: https://salsa.debian.org/debian/runit
 Vcs-Git: https://salsa.debian.org/debian/runit.git
+Testsuite: autopkgtest
 
 Package: runit
 Architecture: any
diff --git a/debian/tests/control b/debian/tests/control
new file mode 100644
index 000..8d1c8b6
--- /dev/null
+++ b/debian/tests/control
@@ -0,0 +1 @@
+ 
-- 
2.20.1

>From b37238455025ca36c7795c96d934205016cde026 Mon Sep 17 00:00:00 2001
From: Lorenzo Puliti 
Date: Mon, 17 Jun 2019 16:05:00 +0200
Subject: [PATCH 3/3] add a test for switching to runit-init

Add a smoke test for the switch systemd --> runit-init
---
 debian/tests/control |  8 +-
 debian/tests/init-switch | 60 
 2 files changed, 67 insertions(+), 1 deletion(-)
 create mode 100755 debian/tests/init-switch

diff --git a/debian/tests/control b/debian/tests/control
index 8d1c8b6..02565b5 100644
--- a/debian/tests/control
+++ b/debian/tests/control
@@ -1 +1,7 @@
- 
+Tests: init-switch
+Depends: runit,
+  runit-init,
+  getty-run,
+  fgetty,
+  psmisc,
+Restrictions: needs-root, isolation-machine, breaks-testbed
diff --git a/debian/tests/init-switch b/debian/tests/init-switch
new file mode 100755
index 000..1e09238
--- /dev/null
+++ b/debian/tests/init-switch
@@ -0,0 +1,60 @@
+ #!/bin/sh
+ set -e
+ 
+ 
+ if [ -z "$AUTOPKGTEST_REBOOT_MARK" ]; then
+if [ -d /run/systemd/system ]; then
+init=systemd
+elif [ -e /run/initctl ]; then
+init=sysv
+else
+init=unknown-init
+fi
+echo "testbed is running with $init"
+
+if [ -e /tmp/autopkgtest-reboot ]; then
+echo "enabling the serial getty"
+ 

Bug#896181: cwidget: [PATCH] Use %p for pointers instead of %x

2019-06-19 Thread Manuel A. Fernandez Montecelo

Control: tags -1 + pending


2018-04-20 16:42 Manuel A. Fernandez Montecelo:

Source: cwidget
Version: 0.5.17-7
Severity: normal
Tags: patch upstream

Hi,

Attaching patch from Ahmed Charles sent to the mailing list a while ago:

 
https://alioth-lists-archive.debian.net/pipermail/cwidget-devel/2016-March/000251.html


Applied now in the upstream branch for 0.5.19.

--
Manuel A. Fernandez Montecelo 



Bug#930691: s-nail chops off two characters off of the Kerberos hostname when using gssapi auth

2019-06-19 Thread Steffen Nurpmeso
Ach, sigh,

Steffen Nurpmeso wrote in <20190619234414.zvcpd%stef...@sdaoden.eu>:
  ...
 |Dear Ivan.  If you are willing to test once again, at [1] there is
 |a complete ball, but you could also simply apply the attached
 |patch instead, which is very much smaller.
 |
 |I am sorry for the inconvenience, and i hope this fixes GSSAPI.
 ...

the patch was reversed; here is the right one.

Ciao!

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
diff --git a/src/mx/obs-imap-gssapi.h b/src/mx/obs-imap-gssapi.h
index 18d0844a..4a961b2b 100644
--- a/src/mx/obs-imap-gssapi.h
+++ b/src/mx/obs-imap-gssapi.h
@@ -299,14 +299,13 @@ jebase64:
/* First octet: bit-mask with protection mechanisms (1 = no protection
 *mechanism).
 * Second to fourth octet: maximum message size in network byte order.
-* Fifth and following octets: user name string.
-*/
+* Fifth and following octets: user name string */
+   su_mem_copy(&o[4], ccred->cc_user.s, ccred->cc_user.l +1);
o[0] = 1;
o[1] = 0;
-   o[2] = o[3] = (char)0377;
-   snprintf(&o[4], sizeof o - 4, "%s", ccred->cc_user.s);
+   o[2] = o[3] = S(char,0xFF);
+   send_tok.length = 4 + ccred->cc_user.l;
send_tok.value = o;
-   send_tok.length = su_cs_len(&o[4]) -1 + 4;
maj_stat = gss_wrap(&min_stat, gss_context, 0, GSS_C_QOP_DEFAULT, &send_tok,
  &conf_state, &recv_tok);
f |= a_F_RECV_TOK;


Bug#930691: s-nail chops off two characters off of the Kerberos hostname when using gssapi auth

2019-06-19 Thread Steffen Nurpmeso
Hello and good evening, Ivan.

Ivan Vučica wrote in :
 |On Wed, Jun 19, 2019 at 2:56 PM Steffen Nurpmeso  \
 |wrote:
 |>> What would be further useful debugging or tracing information to
 |>> share?
 |>
 |> In general our -d or -vv switches would be nice. ^_^
 |
 |Here's with -d:
 ...
 |>>> T2 AUTHENTICATE GSSAPI
 |>>> SERVER: +
 |>>> YIIFhgOMITTING-WHAT-LOOKS-LIKE-CREDENTIALS3tM=
 |>>> SERVER: + YIGVBOMITTING-WHAT-LOOKS-LIKE-CREDENTIALSZIXw=
 |[6655] 1560952720.212835: Read AP-REP, time 1560952720.212831, subkey
 |aes256-cts/B91D, seqnum 73895367
 |>>>
 |>>> SERVER: + BQOMITTINGu58=
 |>>> BQCREDENTIALS8E=
 |>>> SERVER: T2 NO [AUTHENTICATIONFAILED] Authentication failed.
 |IMAP error: [AUTHENTICATIONFAILED] Authentication failed.
 |
 |It is really hard to follow the debug info given, and the amount of
 |info changed between the old and new s-nail. But eyeballing the
 |credentials sent in both versions, there is nothing obviously damaged
 |in authentication lines.

I should have warned you that the password and credentials will be
included in the debug output.
You could of course do "set verbose" twice when in interactive
mode, then the entire load phase would not be logged.
Doing logging right is hard; maybe, some day, it will be possible
to have some log filter, which can select by source, or so.
In days where you can inspect/adjust running kernels via DTrace
and BPF, almost anything is very primitive in comparison.

Hm.  I am sorry, but i think there was another false length
calculation.

Yes, the thing is that i had "implemented" SMTP GSSAPI, and that
uses string buffers etc. and not (sn)printf(3) on a stack buffer
to do simple string concatenations, and when i "fixed" the GSSAPI
token length calculation in commit [384c8e2e] (before we included
the C string terminator NUL, which is not valid according to
GSSAPI standard, yet it worked for almost two decades), i did that
by having the IMAP and the SMTP GSSAPI headers side-by-side.  I am
afraid that i got pi.s.d when seeing the snprintf()s and the
string length calls (even if the length is known) in the IMAP one.
Also, you know, IMAP code had been removed from the codebase for
over a year, it was reinstantiated on user request only.  (Again
signal jumps and blocking I/O, and IMAP being the largest piece of
code going that route.  And that is not the way i want this
software to go, as it means the entire codebase is stuck at
a single place, it is entirely sequential, whereas i want the
possibility to have multiple boxes open at the same time, for
example.  Which does not work, currently.  For example.)

Dear Ivan.  If you are willing to test once again, at [1] there is
a complete ball, but you could also simply apply the attached
patch instead, which is very much smaller.

I am sorry for the inconvenience, and i hope this fixes GSSAPI.
It would be great if you could report success! (I will not be able
to setup a GSSAPI box before the 22nd, when my internet limit is
refreshed.  (I have exceeded my limit and the ISDN that i should
get nonetheless seems to be implemented virtually via some kind of
scheduler, and that is a killer.))

  [1] 
https://git.sdaoden.eu/cgit/s-nail.git/snapshot/s-nail-6b070335d77251308e1910f9efb2e08754a1f176.tar.xz

 |I could be wrong, of course.

No, i think there was another mutilated length involved.

 |>   ...
 |>|ivucica@myhostname:~$ klist
 |>|Credentials cache: FILE:/tmp/krb5cc_501
 |>|Principal: ivuc...@ds.mydomainname.net
 |>|
 |>|  IssuedExpires   Principal
 |>|Jun 19 11:25:37 2019  Jun 19 21:25:37 2019  krbtgt/DS.MYDOMAINNAME.NET@D\
 |>|S.MYDOMAINNAME.NET \
 |>  ...
 |>  fail
 |>  ...
 |
 |No, this is actually success. I kdestroyed the ticket cache
 |beforehand, and kinited.

And isn't that cooler than OAUTH?  And no advertising, neither
yesterday nor today and very likely also tomorrow not.

 |This is the 'krbtgt' - 'kerberos ticket-granting-ticket' which is used
 |to get service-specific tickets.
 |
 |I pasted this to demonstrate that GSSAPI is invoked correctly to
 |obtain the service-specific ticket when launching the newly-built
 |s-nail. That is: GSSAPI manages to get
 |imap/myhostname.ds.mydomain@ds.mydomainname.net ticket, usable to
 |authenticate against Dovecot.

Thank you.  Yes, a pity.  All my fault.

 |>|ivucica@myhostname:~$ klist
 |>|Credentials cache: FILE:/tmp/krb5cc_501
 |>|Principal: ivuc...@ds.mydomainname.net
 |>|
 |>|  IssuedExpires   Principal
 |>|Jun 19 11:25:37 2019  Jun 19 21:25:37 2019  krbtgt/DS.MYDOMAINNAME.NET@D\
 |>|S.MYDOMAINNAME.NET \
 |>|
 |>|Jun 19 11:25:42 2019  Jun 19 21:25:37 2019  imap/myhostname.ds.mydomainn\
 |>|ame@ds.mydomainname.net\
 |>  ...
 |>  ok
 |>  ...
 |>
 |> But say, the succeeding klist shows one more issued principal?
 |> I must admit that for the last four

Bug#930757: Acknowledgement (unblock: grub2/2.02+dfsg1-19)

2019-06-19 Thread Colin Watson
I forgot to mention that there are -signed source packages that must go
with this, so the unblock lines should in fact be:

unblock grub2/2.02+dfsg1-19
unblock grub-efi-amd64-signed/1+2.02+dfsg1+19
unblock grub-efi-arm64-signed/1+2.02+dfsg1+19
unblock grub-efi-ia32-signed/1+2.02+dfsg1+19

(The -signed packages are a couple of days too young at the moment.)

Thanks,

-- 
Colin Watson   [cjwat...@debian.org]


signature.asc
Description: PGP signature


Bug#930757: unblock: grub2/2.02+dfsg1-19

2019-06-19 Thread Colin Watson
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock grub2.

I hope this is the final grub2 update for the buster release.  It
consists mainly of a number of patches from Steve McIntyre to clean up
problems with our UEFI Secure Boot support.

diff -Nru grub2-2.02+dfsg1/debian/.git-dpm grub2-2.02+dfsg1/debian/.git-dpm
--- grub2-2.02+dfsg1/debian/.git-dpm2019-05-04 22:58:32.0 +0100
+++ grub2-2.02+dfsg1/debian/.git-dpm2019-06-14 19:04:01.0 +0100
@@ -1,6 +1,6 @@
 # see git-dpm(1) from git-dpm package
-9569221816a2a1a832be106440375a612e0121b7
-9569221816a2a1a832be106440375a612e0121b7
+6ee5cc98ec6ca10e00d9cd23a969f0b12ae7ab2e
+6ee5cc98ec6ca10e00d9cd23a969f0b12ae7ab2e
 59aeb1cfaa3d5bfd7bb0f0d37f6d9eed51fe
 59aeb1cfaa3d5bfd7bb0f0d37f6d9eed51fe
 grub2_2.02+dfsg1.orig.tar.xz
diff -Nru grub2-2.02+dfsg1/debian/build-efi-images 
grub2-2.02+dfsg1/debian/build-efi-images
--- grub2-2.02+dfsg1/debian/build-efi-images2019-05-04 22:58:32.0 
+0100
+++ grub2-2.02+dfsg1/debian/build-efi-images2019-06-14 19:04:01.0 
+0100
@@ -20,16 +20,17 @@
 
 # Make EFI boot images for signing.
 
-if [ $# -lt 5 ]; then
-   echo "usage: $0 GRUB-MKIMAGE GRUB-CORE OUTPUT-DIRECTORY PLATFORM 
EFI-NAME [EFI-VENDOR]"
+if [ $# -lt 6 ]; then
+   echo "usage: $0 GRUB-MKIMAGE GRUB-CORE OUTPUT-DIRECTORY DEB-ARCH 
PLATFORM EFI-NAME [EFI-VENDOR]"
 fi
 
 grub_mkimage="$1"
 grub_core="$2"
 outdir="$3"
-platform="$4"
-efi_name="$5"
-efi_vendor="${6:-$(dpkg-vendor --query vendor | tr '[:upper:]' '[:lower:]')}"
+deb_arch="$4"
+platform="$5"
+efi_name="$6"
+efi_vendor="${7:-$(dpkg-vendor --query vendor | tr '[:upper:]' '[:lower:]')}"
 
 # mkfs.msdos may not be on the default PATH.
 export PATH="$PATH:/sbin:/usr/sbin"
@@ -115,6 +116,7 @@
memdisk
minicmd
normal
+   ntfs
part_apple
part_msdos
part_gpt
@@ -141,7 +143,9 @@
 case $platform in
 x86_64-efi|i386-efi)
CD_MODULES="$CD_MODULES
+   cpuid
linuxefi
+   play
"
;;
 esac
@@ -181,15 +185,29 @@
tftp
"
 
+# CD boot image
 "$grub_mkimage" -O "$platform" -o "$outdir/gcd$efi_name.efi" \
-d "$grub_core" \
-c "$workdir/grub-bootstrap.cfg" -m "$workdir/memdisk.fat" \
-p /boot/grub \
$CD_MODULES
+
+# Normal disk boot image
 "$grub_mkimage" -O "$platform" -o "$outdir/grub$efi_name.efi" \
-d "$grub_core" -p "/EFI/$efi_vendor" $GRUB_MODULES
+
+# Normal network boot image
 "$grub_mkimage" -O "$platform" -o "$outdir/grubnet$efi_name.efi" \
-d "$grub_core" -c "$workdir/grub-bootstrap.cfg" \
-   -m "$workdir/memdisk-netboot.fat" -p /grub $NET_MODULES
+   -m "$workdir/memdisk-netboot.fat" \
+   -p /grub $NET_MODULES
+
+# Special network boot image for d-i to use. Just the same as the
+# normal network boot image, but with a different value baked in for
+# the prefix setting
+"$grub_mkimage" -O "$platform" -o "$outdir/grubnet$efi_name-installer.efi" \
+   -d "$grub_core" -c "$workdir/grub-bootstrap.cfg" \
+   -m "$workdir/memdisk-netboot.fat" \
+   -p "${efi_vendor}-installer/$deb_arch/grub" $NET_MODULES
 
 exit 0
diff -Nru grub2-2.02+dfsg1/debian/changelog grub2-2.02+dfsg1/debian/changelog
--- grub2-2.02+dfsg1/debian/changelog   2019-05-04 22:58:32.0 +0100
+++ grub2-2.02+dfsg1/debian/changelog   2019-06-14 19:04:01.0 +0100
@@ -1,3 +1,18 @@
+grub2 (2.02+dfsg1-19) unstable; urgency=medium
+
+  [ Colin Watson ]
+  * Fix format of debian/copyright.
+
+  [ Steve McIntyre ]
+  * Add the ntfs module to signed UEFI images. Closes: #923855
+  * Add the cpuid module to signed UEFI images. Closes: #928628
+  * Add the play module to signed UEFI images. Closes: #930290
+  * Add an extra di-specific version of the UEFI netboot image with a
+different baked-in prefix value. Helps to fix #928750.
+  * Deal with --force-extra-removable with signed shim too. Closes: #930531
+
+ -- Colin Watson   Fri, 14 Jun 2019 19:04:01 +0100
+
 grub2 (2.02+dfsg1-18) unstable; urgency=medium
 
   * Apply patches from Alexander Graf to fix grub-efi-arm crash (closes:
diff -Nru grub2-2.02+dfsg1/debian/copyright grub2-2.02+dfsg1/debian/copyright
--- grub2-2.02+dfsg1/debian/copyright   2019-05-04 22:58:32.0 +0100
+++ grub2-2.02+dfsg1/debian/copyright   2019-06-14 19:04:01.0 +0100
@@ -1,4 +1,5 @@
-Name: GNU GRUB
+Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
+Upstream-Name: GNU GRUB
 Source: https://www.gnu.org/software/grub/
 Files-Excluded: grub-core/lib/libgcrypt*/cipher/crc.c
 
diff -Nru grub2-2.02+dfsg1/debian/patches/grub-install-removable-shim.patch 
grub2-2.02+dfsg1/debian/patches/grub-install-removable-shim.patch
--- grub2-2.02+dfsg1/debian/patches/grub-install-removable-shim.patch   
1970-01-01 01:00:00.0 +0100
+++ grub2-2.02+dfsg1/debian/patches/grub-install-removable-shim.

Bug#929318: [pcp] Bug#929318: unblock: papi/5.7.0+dfsg-1

2019-06-19 Thread Nathan Scott
Hi Paul, Andreas,

Apologies for the slow response - I'm in meetings all week this week
and I'm a bit behind as a result.

On Thu, Jun 20, 2019 at 9:17 AM Andreas Beckmann  wrote:
>
> On 18/06/2019 23.05, Paul Gevers wrote:
>
> pcp was completely off my radar since it has (silently) dropped all papi
> dependencies in unstable.

The PAPI metrics in PCP have been transitioned to using perfevent -
one of the several reasons for this was to help resolve this Debian
bug.

The best outcome for Debian PCP user base here would be to use the
bugfix PCP update that has been in unstable for several weeks now -
this provides a clean upgrade path for pmdapapi users, and removes the
PCP dependency on PAPI completely.

> I'll do a 0-day NMU of pcp on Thursday (36 hours from now) unless we
> heard from Nathan till then.

If we cannot use the tested, stable, upstream bugfix update provided
earlier due to the release constraints, please go ahead and NMU as
needed Andreas - thanks.

> Just thinking ... lazy removal of libpapi5 from testing does not work,
> since libpapi5.7 breaks it, and pcp-dev probably depends transitively on

FWIW, the PCP development packages do not depend on any PAPI (and
never have) - it is only older versions of the 'pcp' package itself,
which contain the pmdapapi binary - now retired to help resolve this
issue.

cheers.

--
Nathan



Bug#927667: gnome: please confirm or revert choice of Wayland for default desktop

2019-06-19 Thread Michael Biebl
On Wed, 19 Jun 2019 22:16:58 +0200 Ansgar Burchardt  wrote:
> Jonathan Dowland writes:
> > So far as I am aware there is still radio silence from active GNOME
> > packaging team members regarding this issue. No comment yet on the
> > patch I adapted, positive or negative; this bug (#927667) remains
> > at an RC severity.
> >
> > I've not yet read all the thread that Samuel linked to[1] but it looks
> > like it leans in favour of preserving the current default (xorg).
> >
> > I'm copying -release team to see if they have any (new) opinions on
> > the matter. Otherwise I guess it's up to someone to prepare an NMU
> > upload, which I will *try* to look at in the next few days, but can't
> > make any guarantees.
> 
> I'm just a GNOME user, but from gdm3's changelog the default was
> switched to Wayland in July 2017 (or August 2017 for unstable).  I
> myself only noticed the switch after reading it happened somewhere on
> the internet shortly after it happened.

gdm was switched over to use Wayland before the main session was and in
Debian we kept that default for gdm (even for stretch, and still true
for buster).
gdm runs in a much more limited environment though, so some of the
limitations (like screen sharing) do not really affect the gdm session.
I suppose the a11y issues that were pointed out for Wayland do affect
the gdm wayland session though?

What kind of display technology gdm is using is a separate discussion
though from what kind of desktop session is started as default: GNOME on
Xorg or GNOME on Wayland.
When you talk about "gdm3's default", what exactly do you mean: the
display technology gdm is using or the type of GNOME session that is
started as default?




-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#930756: unblock: movit/1.6.2-2

2019-06-19 Thread Steinar H. Gunderson
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package movit

It contains a single, focused fix for a severity=important bug that I found,
backported from upstream git.

It's a bit unclear to me whether “corrupted display” would count as appropriate
for buster unblocks, but I thought it might go under the “crashes etc.” heading
(it's technically undefined behavior with a thread race, but I don't think
there are any real GL drivers where this actually causes _crashes_ per se).
If not, please let me know.

From the upstream commit message; especially the part about ABI stability at
the end should be relevant:

Fix an issue where temporary textures could be reused too early by a 
different thread.

When an EffectChain is done rendering (ie., has submitted all of the GL
rendering commands that it needs to), it releases all of the temporary
textures it's used back to a common freelist.

However, if another thread needs a texture of the same size and format,
it could be picking it off of the freelist before the GPU has actually
completed rendering the first thread's command list, and start uploading
into it. This is undefined behavior in OpenGL, and can create garbled
output depending on timing and driver. (I've seen this on at least the
classic Intel Mesa driver.)

Fix by setting fences, so that getting a texture from the freelist
will have an explicit ordering versus the previous work. This increases the
size of ResourcePool::TextureFormat, but it is only ever used in a private
std::map. std::map is node-based (it has to, since the C++ standard requires
iterators to it to be stable), and thus, sizeof(TextureFormat) does not 
factor
into sizeof(ResourcePool), and thus, there is no ABI break. Verified by
checking on libstdc++.

diff -Nru movit-1.6.2/debian/changelog movit-1.6.2/debian/changelog
--- movit-1.6.2/debian/changelog2018-03-18 16:25:30.0 +0100
+++ movit-1.6.2/debian/changelog2019-06-15 20:08:45.0 +0200
@@ -1,3 +1,11 @@
+movit (1.6.2-2) unstable; urgency=high
+
+  * fix-temporary-texture-race-issue.diff: New patch backported from upstream
+git, fixes a threading issue where a thread could start reusing a temporary
+texture while it's still being used in rendering. (Closes: #930570)
+
+ -- Steinar H. Gunderson   Sat, 15 Jun 2019 20:08:45 +0200
+
 movit (1.6.2-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru movit-1.6.2/debian/patches/fix-temporary-texture-race-issue.diff 
movit-1.6.2/debian/patches/fix-temporary-texture-race-issue.diff
--- movit-1.6.2/debian/patches/fix-temporary-texture-race-issue.diff
1970-01-01 01:00:00.0 +0100
+++ movit-1.6.2/debian/patches/fix-temporary-texture-race-issue.diff
2019-06-15 20:08:37.0 +0200
@@ -0,0 +1,50 @@
+Index: movit-1.6.2/resource_pool.cpp
+===
+--- movit-1.6.2.orig/resource_pool.cpp
 movit-1.6.2/resource_pool.cpp
+@@ -42,6 +42,7 @@ ResourcePool::~ResourcePool()
+   for (GLuint free_texture_num : texture_freelist) {
+   assert(texture_formats.count(free_texture_num) != 0);
+   texture_freelist_bytes -= 
estimate_texture_size(texture_formats[free_texture_num]);
++  glDeleteSync(texture_formats[free_texture_num].no_reuse_before);
+   texture_formats.erase(free_texture_num);
+   glDeleteTextures(1, &free_texture_num);
+   check_error();
+@@ -337,7 +338,10 @@ GLuint ResourcePool::create_2d_texture(G
+   format_it->second.height == height) {
+   texture_freelist_bytes -= 
estimate_texture_size(format_it->second);
+   texture_freelist.erase(freelist_it);
++  GLsync sync = format_it->second.no_reuse_before;
+   pthread_mutex_unlock(&lock);
++  glWaitSync(sync, 0, GL_TIMEOUT_IGNORED);
++  glDeleteSync(sync);
+   return texture_num;
+   }
+   }
+@@ -449,12 +453,14 @@ void ResourcePool::release_2d_texture(GL
+   texture_freelist.push_front(texture_num);
+   assert(texture_formats.count(texture_num) != 0);
+   texture_freelist_bytes += 
estimate_texture_size(texture_formats[texture_num]);
++  texture_formats[texture_num].no_reuse_before = 
glFenceSync(GL_SYNC_GPU_COMMANDS_COMPLETE, 0);
+ 
+   while (texture_freelist_bytes > texture_freelist_max_bytes) {
+   GLuint free_texture_num = texture_freelist.back();
+   texture_freelist.pop_back();
+   assert(texture_formats.count(free_texture_num) != 0);
+   texture_freelist_bytes -= 
estimate_texture_size(texture_formats[free_texture_num]);
++  glDeleteSync(texture_formats[free_texture_num].no_reuse_before);

Bug#930735: WireGuard: Add resolvconf as optional dependency

2019-06-19 Thread Daniel Kahn Gillmor
Control: tags 930735 + moreinfo

Hi Willem--

On Wed 2019-06-19 15:01:53 +0200, Willem van den Akker wrote:
> Add resolvconf as an optional dependency.
> If the DNS option is used in the config file and resolvconf is not installed
> wg-quick will return an
> error and the interface is not created.
>
> [#] ip link add wg0 type wireguard
> [#] wg setconf wg0 /dev/fd/63
> [#] ip -4 address add 192.168.3.21/32 dev wg0
> [#] ip link set mtu 1420 up dev wg0
> [#] resolvconf -a wg0 -m 0 -x
> /usr/bin/wg-quick: line 31: resolvconf: command not found
> [#] ip link delete dev wg0

Thanks for this suggestion!  I'm willing to update the Suggests: of the
wireguard package if i understand more about what actually works in this
case.

Are you certain that debian's resolvconf will work for this?  Upstream
has complained in the past about debian's implementation of resolvconf
being broken (iirc, about the -x flag, but i'm not sure).  Would
openresolv's resolvconf be better?

What about when resolvectl(1) from systemd is symlinked as resolvconf
(see the resolvectl man page for more details) -- would that be
preferable?  according to its documentation, it has partial support for
-x, plausible support for -a, and silently ignores -m.  is that
sufficient?  If that's ok, maybe there are other adjustments we can make
so that it integrates nicely with systemd-resolved.

More details about what configurations you've tested and how well they
work to do what you expect from wg-quick would help me understand how to
make this system integration work better for you.

all the best,

 --dkg


signature.asc
Description: PGP signature


Bug#929949: New upstream version 0.8 available, compatible with python3

2019-06-19 Thread Sebastien Bacher

Le 18/06/2019 à 20:10, Alexander Zangerl a écrit :

yes. so far i can't make duplicity 0.8.0 work with python 2.7 which is still
the default version in debian and hence important in my opinion.
(by "does not work" i mean: the built-in test suite fails quite a lot,
and after patching that part basic functionality is still very very broken.)

no promises as to when i will find time and mental strength to wade
through this (upstream-induced) mess.


Oh, also could you share your current packaging work? It would make 
easier to trigger the problem and help with upstream reporting...




Bug#928882: unblock: [pre-approval] ghc/8.4.4+dfsg1-3

2019-06-19 Thread Emanuele Olivetti
On Wed, Jun 19, 2019 at 11:33 PM Ilias Tsitsimpis 
wrote:

>
> On Mon, Jun 17, 2019 at 12:00AM, Emanuele Olivetti wrote:
> > Let me know if I can help more.
>
> Dear Emanuele,
>
> Thank you for taking the time to test and verify my packages. Can I ping
> you one last time to test that git-annex will work after we rebuild it?
>
>
>
Dear Ilias,

Indeed, I'll be very happy to test git-annex!
Looking forward to receiving your message. And thanks again for taking care
of this issue.

Best,

Emanuele


Bug#906518: qa.debian.org: Missing manpages webpage links to seemingly dead project

2019-06-19 Thread Alban Vidal
Control: tag -1 confirmed
Control: user -1 qa.debian@packages.debian.org
Control: usertags -1 webpages

Dear QA team,

I confirm this bug.
The link has 403 (Forbidden) return code.

Regards,
Alban




signature.asc
Description: OpenPGP digital signature


Bug#927667: gnome: please confirm or revert choice of Wayland for default desktop

2019-06-19 Thread Sebastien Bacher

Hey there,

Le 19/06/2019 à 22:19, Simon McVittie a écrit :

- Ubuntu GNOME team: which recent Ubuntu versions, if any, are using
   Wayland for their GNOME-based desktop?


We don't have any supported Ubuntu version using Wayland by default, our 
motivations for sticking to Xorg were mostly desktop sharing/rdp support 
and the fact that under wayland a gnome-shell segfault takes the whole 
session down without giving user a chance to save their work.
While screen sharing is being actively being worked on, our metrics show 
that gnome-shell errors are still quite common, even in recent versions 
so it's not likely that we change our default for the next LTS.


Cheers,
Sebastien Bacher



Bug#930754: Warnings when using bzip2 or lzma

2019-06-19 Thread Uwe Kleine-König
Control: tag -1 + patch

Hello,

On Wed, Jun 19, 2019 at 11:09:28PM +0200, Uwe Kleine-König wrote:
> I tested the different options for the COMPRESS variable in initramfs.conf
> and noticed that when using bzip2 or lzma I get a warning when an
> initramfs is created:
> 
>   "W: Unknown compression command bzip2"
> 
> . It is harmless though, compression succeeds just fine. So it's just
> irritating.

Before someone starts fixing this bug, I already created a patch:

https://deb.li/i4uby

Best regards
Uwe


signature.asc
Description: PGP signature


Bug#930755: ITP: q2-metadata -- QIIME 2 plugin for working with and visualizing Metadata

2019-06-19 Thread Liubov Chuprikova
Package: wnpp
Owner: Liubov Chuprikova 
Severity: wishlist

* Package name: q2-metadata
  Version : 2019.4.0
  Upstream Author : QIIME 2 development team
* URL : https://qiime2.org/
* License : BSD-3-clause
  Programming Lang: Python
  Description : QIIME 2 plugin for working with and visualizing Metadata
 QIIME 2 is a powerful, extensible, and decentralized microbiome analysis
 package with a focus on data and analysis transparency. QIIME 2 enables
 researchers to start an analysis with raw DNA sequence data and finish with
 publication-quality figures and statistical results.
 Key features:
  * Integrated and automatic tracking of data provenance
  * Semantic type system
  * Plugin system for extending microbiome analysis functionality
  * Support for multiple types of user interfaces (e.g. API, command line,
 graphical)
 .
 QIIME 2 is a complete redesign and rewrite of the QIIME 1 microbiome
analysis
 pipeline. QIIME 2 will address many of the limitations of QIIME 1, while
 retaining the features that makes QIIME 1 a powerful and widely-used
analysis
 pipeline.
 .
 QIIME 2 currently supports an initial end-to-end microbiome analysis
pipeline.
 New functionality will regularly become available through QIIME 2 plugins.
You
 can view a list of plugins that are currently available on the QIIME 2
plugin
 availability page. The future plugins page lists plugins that are being
 developed.

Remark: This package is maintained by Debian Med Packaging Team at
   https://salsa.debian.org/med-team/q2-metadata


Bug#80268: net-tools: missing man page for ipmaddr

2019-06-19 Thread Alban Vidal
Control: tag -1 patch

On Fri, 22 Dec 2000 00:28:01 -0500 c.ruf...@ieee.org wrote:

> Package: net-tools
> ipmaddr has no man page.

Dear Maintainer,

Please find attached the manpage for the ipmaddr(8) command.

Best regards,
Alban



ipmaddr.8.gz
Description: application/gzip


signature.asc
Description: OpenPGP digital signature


Bug#929946: Can not reproduce anymore

2019-06-19 Thread Yvan Masson

Hi,

I had to re-install my workstation, I can not reproduce the issue 
anymore: I suppose you can close this bug report.


Regards,
Yvan



Bug#930754: Warnings when using bzip2 or lzma

2019-06-19 Thread Uwe Kleine-König
Package: initramfs-tools
Version: 0.133
Severity: minor

Hello,

I tested the different options for the COMPRESS variable in initramfs.conf
and noticed that when using bzip2 or lzma I get a warning when an
initramfs is created:

"W: Unknown compression command bzip2"

. It is harmless though, compression succeeds just fine. So it's just
irritating.

Best regards
Uwe

-- Package-specific info:
-- initramfs sizes
-rw-r--r-- 1 root root 3.2M Nov 29  2018 /boot/initrd.img-4.18.0-2-armmp
-rw-r--r-- 1 root root 3.3M Nov 29  2018 /boot/initrd.img-4.18.0-3-armmp
-rw-r--r-- 1 root root0 Nov 29  2018 /boot/initrd.img-4.18.0-3.new
-rw-r--r-- 1 root root 3.5M Jan 23 19:06 /boot/initrd.img-4.19.0-1-armmp
-rw-r--r-- 1 root root 3.5M Apr 28 22:18 /boot/initrd.img-4.19.0-4-armmp
-rw-r--r-- 1 root root 4.6M Jun 19 22:58 /boot/initrd.img-4.19.0-5-armmp
-rw-r--r-- 1 root root 6.0M Jun 19 22:56 
/boot/initrd.img-4.19.0-5-armmp.dpkg-bak
-rw-r--r-- 1 root root 3.2M Dec 15  2018 /boot/initrd.img-4.19.0-trunk-armmp
-- /proc/cmdline
console=ttyS0,115200 root=/dev/sda1 rootfstype=btrfs rootflags=subvol=@ 
mtdparts=armada-nand:0x18@0(u-boot),0x2@0x18(u-boot-env),0x60@0x20(uImage),0x40@0x80(minirootfs),-(ubifs)
 reason=normal bdtype=rn104

-- resume
RESUME=UUID=c56038a1-acbf-49b7-bdfc-95ffdbf6b6dc
-- /proc/filesystems
btrfs

-- lsmod
Module  Size  Used by
8021q  28672  0
garp   16384  1 8021q
mrp20480  1 8021q
stp16384  1 garp
llc16384  2 garp,stp
ofpart 16384  0
xhci_pci   16384  0
xhci_hcd  200704  1 xhci_pci
ehci_orion 16384  0
ehci_hcd   77824  1 ehci_orion
marvell20480  1
sg 32768  0
marvell_cesa   40960  0
usbcore   212992  4 ehci_orion,ehci_hcd,xhci_pci,xhci_hcd
mvneta 49152  0
mvneta_bm  16384  1 mvneta
des_generic28672  1 marvell_cesa
marvell_nand   32768  0
phylink24576  1 mvneta
mvmdio 16384  0
g762   20480  0
orion_wdt  16384  0
evdev  24576  1
leds_gpio  16384  0
nfsd  335872  13
auth_rpcgss57344  1 nfsd
nfs_acl16384  1 nfsd
lockd  86016  1 nfsd
grace  16384  2 nfsd,lockd
sunrpc307200  18 auth_rpcgss,nfsd,nfs_acl,lockd
ip_tables  24576  0
x_tables   24576  1 ip_tables
autofs440960  2
btrfs1224704  1
libcrc32c  16384  1 btrfs
crc32c_generic 16384  1
xor16384  1 btrfs
zstd_decompress61440  1 btrfs
zstd_compress 159744  1 btrfs
xxhash 20480  2 zstd_compress,zstd_decompress
zlib_deflate   28672  1 btrfs
raid6_pq   98304  1 btrfs
sd_mod 49152  3
gpio_pca953x   20480  4
ahci   36864  2
libahci32768  1 ahci
libata208896  2 ahci,libahci
scsi_mod  196608  3 sd_mod,libata,sg
i2c_mv64xxx20480  0

-- /etc/initramfs-tools/modules

-- /etc/kernel-img.conf
# Kernel image management overrides
# See kernel-img.conf(5) for details
do_symlinks = yes
do_bootloader = no
do_initrd = yes
link_in_boot = yes

-- /etc/initramfs-tools/initramfs.conf
MODULES=dep
BUSYBOX=auto
KEYMAP=n
COMPRESS=xz
DEVICE=
NFSROOT=auto
RUNSIZE=10%

-- /etc/initramfs-tools/update-initramfs.conf
update_initramfs=yes
backup_initramfs=no

-- /sys/block
sda

-- mkinitramfs hooks
/etc/initramfs-tools/hooks/:

/usr/share/initramfs-tools/hooks:
btrfs
dmsetup
flash_kernel_set_root
fsck
keymap
klibc-utils
kmod
resume
thermal
udev
zz-busybox


-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (700, 'testing'), (600, 'unstable'), (499, 'experimental')
Architecture: armhf (armv7l)

Kernel: Linux 4.19.0-4-armmp (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages initramfs-tools depends on:
ii  initramfs-tools-core  0.133
ii  linux-base4.6

initramfs-tools recommends no packages.

Versions of packages initramfs-tools suggests:
ii  bash-completion  1:2.8-6

-- no debconf information



Bug#930753: RFS: streamlink/1.1.1+dfsg-1~exp1

2019-06-19 Thread Alexis Murzeau
Package: sponsorship-requests
Severity: wishlist

Dear mentors,

I am looking for a sponsor for my package "streamlink" for a new
upstream version 1.1.1 targeting experimental distribution which was
requested by an user as twitch-gui require a newer streamlink.

 * Package name: streamlink
   Version : 1.1.1+dfsg-1~exp1
   Upstream Author : Streamlink Team
 * URL : https://streamlink.github.io/
 * License : BSD-2-clause, Apache-2.0, MIT/Expat, SIL-OFL-1.1
   Section : python

It builds those binary packages:

  livestreamer - transitional package - streamlink
  python3-streamlink - Python module for extracting video streams from
various websites
  python3-streamlink-doc - CLI for extracting video streams from various
websites (documentation)
  streamlink - CLI for extracting video streams from various websites to
a video player

To access further information about this package, please visit the
following URL:
  https://mentors.debian.net/package/streamlink


Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/s/streamlink/streamlink_1.1.1+dfsg-1~exp1.dsc

More information about streamlink can be obtained at
https://streamlink.github.io/

Changes since the last upload in unstable:
streamlink (1.1.1+dfsg-1~exp1) experimental; urgency=low

  * New upstream version 1.1.1+dfsg
  * Update patch remove_new_version_check

 -- Alexis Murzeau   Wed, 19 Jun 2019 21:58:59 +0200


Regards,
-- 
Alexis Murzeau
PGP: B7E6 0EBB 9293 7B06 BDBC  2787 E7BD 1904 F480 937F





signature.asc
Description: OpenPGP digital signature


Bug#930681: stretch-backports kernel unable to execute (some) older (e.g., CentOS 6) binaries

2019-06-19 Thread Ben Hutchings
On Wed, 2019-06-19 at 00:37 +0200, Mihai Moldovan wrote:
> * On 6/18/19 3:22 PM, Bastian Blank wrote:
> > See #847154 for the workaround.
> Thanks. Seems to work fine.
> 
> This triggered another question, though: can I assume that buster kernels are
> also affected by that problem by default? Given that the shipped user space is
> new enough, I figure that option will be disabled there as well?

Yes, the configuration used in buster is the same.

Ben.

-- 
Ben Hutchings
We get into the habit of living before acquiring the habit of thinking.
 - Albert Camus




signature.asc
Description: This is a digitally signed message part


Bug#930752: increases size of initrd considerably since linking with OpenSSL

2019-06-19 Thread Uwe Kleine-König
Package: libkmod2
Version: 26-1
Severity: normal
File: /usr/lib/arm-linux-gnueabihf/libkmod.so.2

Hello,

some time ago I wanted to install a kernel update on my NAS (Netgear
ReadyNAS 104/armhf). However that failed with:

...
update-initramfs: Generating /boot/initrd.img-4.19.0-5-armmp
Using DTB: armada-370-netgear-rn104.dtb
Installing 
/usr/lib/linux-image-4.19.0-5-armmp/armada-370-netgear-rn104.dtb into 
/boot/dtbs/4.19.0-5-armmp/./armada-370-netgear-rn104.dtb
Taking backup of armada-370-netgear-rn104.dtb.
Installing new armada-370-netgear-rn104.dtb.
Installing 
/usr/lib/linux-image-4.19.0-5-armmp/armada-370-netgear-rn104.dtb into 
/boot/dtbs/4.19.0-5-armmp/./armada-370-netgear-rn104.dtb
Taking backup of armada-370-netgear-rn104.dtb.
Installing new armada-370-netgear-rn104.dtb.
flash-kernel: installing version 4.19.0-5-armmp

The initial ramdisk is too large. This is often due to the unnecessary 
inclusion
of all kernel modules in the image. To fix this set MODULES=dep in one 
or both
/etc/initramfs-tools/conf.d/driver-policy (if it exists) and
/etc/initramfs-tools/initramfs.conf and then run 'update-initramfs -u 
-k 4.19.0-5-armmp'

Not enough space for initrd in MTD 'minirootfs' (need 4821508 but is 
actually 4194304).
run-parts: /etc/initramfs/post-update.d//flash-kernel exited with 
return code 1
dpkg: error processing package initramfs-tools (--configure):
 installed initramfs-tools package post-installation script subprocess 
returned error exit status 1
Errors were encountered while processing:
 initramfs-tools
E: Sub-process /usr/bin/dpkg returned an error code (1)

Looking at the difference between the working initrd for 4.19.0-4 and
the to big one for 4.19.0-5:

$ diff -u <(lsinitramfs /boot/initrd.img-4.19.0-4-armmp | sed 
s/4.19.0-4-armmp/uname-r/ | sort) <(lsinitramfs /boot/initrd.img-4.19.0-5-armmp 
| sed s/4.19.0-5-armmp/uname-r/ | sort) | grep ^[-+]
--- /dev/fd/63  2019-06-19 22:22:31.764750895 +0200
+++ /dev/fd/62  2019-06-19 22:22:31.764750895 +0200
+usr/bin/arch
+usr/bin/bc
+usr/bin/svok
-usr/lib/arm-linux-gnueabihf/libacl.so.1.1.0
+usr/lib/arm-linux-gnueabihf/libacl.so.1.1.2253
-usr/lib/arm-linux-gnueabihf/libattr.so.1.1.0
+usr/lib/arm-linux-gnueabihf/libattr.so.1.1.2448
+usr/lib/arm-linux-gnueabihf/libcrypto.so.1.1
-usr/lib/arm-linux-gnueabihf/libkmod.so.2.3.3
+usr/lib/arm-linux-gnueabihf/libkmod.so.2.3.4
-usr/lib/arm-linux-gnueabihf/liblzma.so.5.2.2
+usr/lib/arm-linux-gnueabihf/liblzma.so.5.2.4
+usr/lib/arm-linux-gnueabihf/libresolv-2.28.so
+usr/lib/arm-linux-gnueabihf/libresolv.so.2
+usr/lib/arm-linux-gnueabihf/libssl.so.1.1
-usr/lib/arm-linux-gnueabihf/libudev.so.1.6.12
+usr/lib/arm-linux-gnueabihf/libudev.so.1.6.13
-usr/lib/klibc-COogfK2xWPg3hPxojsQE86cGErM.so
+usr/lib/klibc-Tm5Kcygh62Zsrgmh7J5q50y2Vn8.so
+usr/sbin/nologin
+usr/sbin/run-init

Looking at the differences in more detail, the files only in the old initrd are:
$ lsinitramfs -l /boot/initrd.img-4.19.0-4-armmp | grep -E 
'usr/lib/arm-linux-gnueabihf/lib(acl.so.1.1.0|attr.so.1.1.0|kmod.so.2.3.3|lzma.so.5.2.2|udev.so.1.6.12)|usr/lib/klibc-COogfK2xWPg3hPxojsQE86cGErM.so'
-rw-r--r--   1 root root0 Feb  6  2016 
usr/lib/arm-linux-gnueabihf/libacl.so.1.1.0
-rw-r--r--   1 root root13884 Sep  8  2014 
usr/lib/arm-linux-gnueabihf/libattr.so.1.1.0
-rw-r--r--   1 root root62904 Nov 17  2018 
usr/lib/arm-linux-gnueabihf/libkmod.so.2.3.3
-rw-r--r--   1 root root   104260 Jun 28  2017 
usr/lib/arm-linux-gnueabihf/liblzma.so.5.2.2
-rw-r--r--   1 root root95828 Jan 12 21:49 
usr/lib/arm-linux-gnueabihf/libudev.so.1.6.12
-rwxr-xr-x   1 root root53812 Jan  6 20:33 
usr/lib/klibc-COogfK2xWPg3hPxojsQE86cGErM.so

And the files only in the new are:

$ lsinitramfs -l /boot/initrd.img-4.19.0-5-armmp | grep -E 
'usr/bin/(arch|bc|svok)|usr/lib/arm-linux-gnueabihf/lib(acl.so.1.1.2253|attr.so.1.1.2448|crypto.so.1.1|kmod.so.2.3.4|lzma.so.5.2.4|resolv-2.28.so|resolv.so.2|ssl.so.1.1|udev.so.1.6.13)|usr/lib/klibc-Tm5Kcygh62Zsrgmh7J5q50y2Vn8.so|usr/sbin/(nologin|run-init)'
-rw-r--r--   1 root root21864 Mar  1 23:22 
usr/lib/arm-linux-gnueabihf/libacl.so.1.1.2253
-rw-r--r--   1 root root13632 Mar  1 23:03 
usr/lib/arm-linux-gnueabihf/libattr.so.1.1.2448
-rw-r--r--   1 root root  1708448 Apr 16 21:31 
usr/lib/arm-linux-gnueabihf/libcrypto.so.1.1
-rw-r--r--   1 root root62904 Feb 10 00:00 
usr/lib/arm-linux-gnueabihf/libkmod.so.2.3.4
-rw-r--r--   1 root root   104220 Jan 28 02:

Bug#928185: unblock: openjdk-11/11.0.3+7-4

2019-06-19 Thread Matthias Klose
On 19.06.19 22:03, Paul Gevers wrote:
> Hi Tony,
> 
> On 18-06-2019 22:14, tony mancill wrote:
>> Things are looking good so far with 11.0.4+4+really11.0.3+7 in unstable,
>> and so I would like to prepare the t-p-u upload.  At the moment, the
>> version I have is 11.0.3+7-5, since that would have been the "next"
>> 11.0.3+7 Debian revision for unstable.  The 11.0.3+7 orig.tar.xz already
>> in the archive is the same one used for the "really" to unstable and
>> this build, and this versioning makes it clear to users what they are
>> getting.  The resulting changelog would be:
>>
>>> diff -Nru openjdk-11-11.0.4+4+really11.0.3+7/debian/changelog 
>>> openjdk-11-11.0.3+7/debian/changelog
>>> --- openjdk-11-11.0.4+4+really11.0.3+7/debian/changelog 2019-06-14 
>>> 12:28:25.0 -0700
>>> +++ openjdk-11-11.0.3+7/debian/changelog2019-06-16 11:24:19.0 
>>> -0700
>>> @@ -1,3 +1,10 @@
>>> +openjdk-11 (11.0.3+7-5) buster; urgency=medium
>>> +
>>> +  * Team upload.
>>> +  * Upload 11.0.4+4+realy11.0.3+7-2 to buster t-p-u.
>>> +
>>> + -- tony mancill   Sun, 16 Jun 2019 11:24:19 -0700
>>
>> Is this acceptable to the Release Team?  If not, (and I know there have
>> been some differing opinions), how shall we version the t-p-u package?
> 
> I think the most logical version would be 11.0.3+7-4+deb10u1, as this is
> a targeted upload to buster.

let's use a version which also can be nicely used for the backports upload.

> I don't have a strong opinion on it. I
> still don't like it we go via tpu but I understand the ranting argument.

this will be very short-lived until the final 11.0.4 release to be uploaded into
security.

> Let's end this saga.

please do.



Bug#930748: [Pkg-samba-maint] Bug#930748: samba: CVE-2019-12435: Samba AD DC Denial of Service in DNS management server (dnsserver)

2019-06-19 Thread Salvatore Bonaccorso
Hey,

On Wed, Jun 19, 2019 at 10:12:15PM +0200, Mathieu Parent wrote:
> > The following vulnerability was published for samba.
> >
> > CVE-2019-12435[0]:
> > | Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer
> > | dereference, leading to Denial of Service. This is related to the AD
> > | DC DNS management server (dnsserver) RPC server process.
> >
> >
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> >
> > For further information see:
> >
> > [0] https://security-tracker.debian.org/tracker/CVE-2019-12435
> > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
> > [1] https://www.samba.org/samba/security/CVE-2019-12435.html
> 
> I've just created a pre-approval unblock request to choose between
> uploading 4.9.9 (including stability fixes) or 4.9.5+patch.

Ack! Thank you Mathieu.

Regards,
Salvatore



Bug#930552: xserver-xorg-video-radeon: X-server regularily fails to start while booting

2019-06-19 Thread Bernhard Übelacker
Dear Maintainer,
looks like the submitter opened in response to the last
mail bug #930649 against src:linux.
Therefore this one might be closed?

Kind regards,
Bernhard

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930649



Bug#929469: systemd-networkd: systemd-networkd: fails with "could not set address: Permission denied"

2019-06-19 Thread Michael Biebl
Hi Raphael,

On Tue, 11 Jun 2019 15:51:14 +0200 Raphael Hertzog 
wrote:
> Hi,
> 
> On Wed, 05 Jun 2019, Michael Biebl wrote:
> > systemd-networkd.service in v241 is locked down more tightly then v232.
> > It might be worth a try to comment out the hardening features one by one
> > to see if one of them causes your problem.
> 
> Thanks for the idea! I tried that but it did not help. I found the issue
> after a few more tries tweaking the network configuration file. It's
> simply that the system has IPv6 disabled in the kernel policy while the
> .network file instructs to configure an IPv6 address.
> 
> Both are contradictory but they happily lived together up-to-now.
> I don't know what changed but if we don't improve systemd-networkd
> to just skip IPv6 configuration when the kernel has a policy disabling
> IPv6, then we will have plenty of servers broken on upgrades because
> it's quite common to keep the network configuration file provided by
> the hoster and just disable IPv6 at the kernel level with sysctl:
> 
> $ grep ipv6 /etc/sysctl.conf
> # Disable ipv6
> net.ipv6.conf.all.disable_ipv6 = 1
> net.ipv6.conf.default.disable_ipv6 = 1
> net.ipv6.conf.lo.disable_ipv6 = 1

Ok, thanks for figuring out the root cause.
Given that this only happens under very special circumstances and
networkd not being enabled by default, I'm not entirely sure if this
issue should qualify as RC.
Cherry-picking the 6 upstream commits leads to a merge conflict when
applied on top of v241 and I haven't yet investigated if those can
easily be resolved.
TBH, I feel a bit uneasy doing this change so late in the release cycle
and personally I would downgrade this issue to non-RC and fix this via a
v243 upload to buster-backports.

If you feel strongly about this though, please feel free ask the release
team if the change is ok. A tested patch set would be great in this case.

Regards,
Michael



-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#930750: jackson-databind: CVE-2019-12384 CVE-2019-12814

2019-06-19 Thread Salvatore Bonaccorso
Source: jackson-databind
Version: 2.9.8-2
Severity: important
Tags: security upstream

Hi,

The following vulnerabilities were published for jackson-databind.

CVE-2019-12384[0]:
| Another issue (exploitable using polymorphic deserialization), cf.
| [2].

CVE-2019-12814[1]:
| A Polymorphic Typing issue was discovered in FasterXML jackson-
| databind 2.x through 2.9.9. When Default Typing is enabled (either
| globally or for a specific property) for an externally exposed JSON
| endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an
| attacker can send a specifically crafted JSON message that allows them
| to read arbitrary local files on the server.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-12384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
[1] https://security-tracker.debian.org/tracker/CVE-2019-12814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814
[2] https://github.com/FasterXML/jackson-databind/issues/2334
[3] https://github.com/FasterXML/jackson-databind/issues/2341

Regards,
Salvatore



Bug#926501: xpdf: continuous memory leak

2019-06-19 Thread Greg Alexander
I experience this same problem.  When browsing around the end of an 800
page PDF, xpdf will consume 250MB/sec!  Also, it is very slow.  I have
manually downgraded xpdf from 3.04-13 several times on different
computers because of this bug.  Is xpdf abandoned?  I understand if it's
difficult to update to 4.0x but xpdf has been essentially unusable since
January.

If I go through the trouble of generating the one-line patch that will
fix this bug, is there anyone out there that might apply it and issue
3.04-14?

- Greg



Bug#930751: wpasupplicant: Please enable support for 802.11s (mesh)

2019-06-19 Thread Sebastian Muszytowski
Package: wpasupplicant
Version: 2:2.7+git20190128+0c1e29f-6
Severity: wishlist

Dear Maintainer,

please enable the IEEE 802.11s (mesh networking) support in wpasupplicant by 
uncommenting "CONFIG_MESH=y" in the build configuration.
Without this option users of authenticated mesh networks are required to 
compile wpasupplicant on their own or probably use no encryption at all. 

Thank you for considering this request.

-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/1 CPU core)
Kernel taint flags: TAINT_CRAP
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages wpasupplicant depends on:
ii  adduser3.118
ii  libc6  2.28-10
ii  libdbus-1-31.12.16-1
ii  libnl-3-2003.4.0-1
ii  libnl-genl-3-200   3.4.0-1
ii  libnl-route-3-200  3.4.0-1
ii  libpcsclite1   1.8.24-1
ii  libreadline7   7.0-5
ii  libssl1.1  1.1.1c-1
ii  lsb-base   10.2019051400

wpasupplicant recommends no packages.

Versions of packages wpasupplicant suggests:
pn  libengine-pkcs11-openssl  
pn  wpagui

-- no debconf information



Bug#927667: gnome: please confirm or revert choice of Wayland for default desktop

2019-06-19 Thread Simon McVittie
On Wed, 19 Jun 2019 at 17:33:55 +0100, Jonathan Dowland wrote:
> So far as I am aware there is still radio silence from active GNOME
> packaging team members regarding this issue. No comment yet on the
> patch I adapted, positive or negative; this bug (#927667) remains
> at an RC severity.

(Adding debian-gtk-gnome, debian-desktop and some people who might have
useful input to Cc)

In case anyone else in the GNOME team has got the wrong idea from my
involvement in #927667: I don't think I am the right person to make a
decision on this. So if GNOME team members are waiting for me to either
make an upload changing the default back to X11, or veto such an upload:
don't wait for that, it is unlikely to happen (unless the team cannot
make a decision and punts this to the technical committee, but I hope
we don't have to resort to that).

I would very much appreciate input from the rest of the team, particularly:

- Laurent: I know you've had strong opinions about using Wayland for GNOME.
  Do you feel strongly that Debian should be defaulting to Wayland? Are
  there any reasons for that default that are missing from my attempt to
  summarize earlier on the bug?
- Ubuntu GNOME team: which recent Ubuntu versions, if any, are using
  Wayland for their GNOME-based desktop?

I've left some comments on
https://salsa.debian.org/gnome-team/gdm/merge_requests/8 regarding the
technical side of the proposed change.

Thanks,
smcv



Bug#927667: gnome: please confirm or revert choice of Wayland for default desktop

2019-06-19 Thread Ansgar Burchardt
Jonathan Dowland writes:
> So far as I am aware there is still radio silence from active GNOME
> packaging team members regarding this issue. No comment yet on the
> patch I adapted, positive or negative; this bug (#927667) remains
> at an RC severity.
>
> I've not yet read all the thread that Samuel linked to[1] but it looks
> like it leans in favour of preserving the current default (xorg).
>
> I'm copying -release team to see if they have any (new) opinions on
> the matter. Otherwise I guess it's up to someone to prepare an NMU
> upload, which I will *try* to look at in the next few days, but can't
> make any guarantees.

I'm just a GNOME user, but from gdm3's changelog the default was
switched to Wayland in July 2017 (or August 2017 for unstable).  I
myself only noticed the switch after reading it happened somewhere on
the internet shortly after it happened.

Switching the default back two weeks before the release seems too late
for me.  The largest issue seems to be accessibility, but as far as I
understand we already recommend a different desktop environment for
that.  I don't think that warrants changes that would only see very
little testing by now :-/

Ansgar



Bug#930749: unblock: samba/2:4.9.9+dfsg-1

2019-06-19 Thread Mathieu Parent
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

This is a pre-approval request about samba.

A new Samba security version was released today to address
CVE-2019-12435: 4.9.9.

Sid/buster currently has 4.9.5. I'm tempted to upload 4.9.9 to sid
(targeting buster).
This would add a big diff of stability fixes. The d/changelog would look like:

samba (2:4.9.9+dfsg-1) unstable; urgency=high

  * This is a security release in order to address the following defect:
- CVE-2019-12435 zone operations can crash rpc server (Closes: #930748)
  * New upstream release
- Remove security patches, included in release
- libsamba-passdb.so bumped to 0.27.2
  * Add missing Breaks+Replace found by piuparts (Closes: #929217)
Thanks Andreas Beckmann!

Without an ack from you, I will only add the patch for CVE-2019-12435 (and
maybe #929217?) and delay the other fixes for buster-proposed-updates.

What is you opinion?

(not including the debdiff against the package in testing, which is huge)

unblock samba/2:4.9.9+dfsg-1

-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-5-amd64 (SMP w/2 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8),
LANGUAGE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#930748: [Pkg-samba-maint] Bug#930748: samba: CVE-2019-12435: Samba AD DC Denial of Service in DNS management server (dnsserver)

2019-06-19 Thread Mathieu Parent
Le mer. 19 juin 2019 à 21:51, Salvatore Bonaccorso  a écrit :
>
> Source: samba
> Version: 2:4.9.5+dfsg-4
> Severity: important
> Tags: security upstream
>
> Hi,

Hi,

> The following vulnerability was published for samba.
>
> CVE-2019-12435[0]:
> | Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer
> | dereference, leading to Denial of Service. This is related to the AD
> | DC DNS management server (dnsserver) RPC server process.
>
>
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>
> For further information see:
>
> [0] https://security-tracker.debian.org/tracker/CVE-2019-12435
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
> [1] https://www.samba.org/samba/security/CVE-2019-12435.html

I've just created a pre-approval unblock request to choose between
uploading 4.9.9 (including stability fixes) or 4.9.5+patch.


Regards

-- 
Mathieu Parent



Bug#913222: journalctl: bash-completion: incorrect sorting of --priority arguments

2019-06-19 Thread Michael Biebl
Will be fixed in v243.
-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#930696: [pkg-cryptsetup-devel] Bug#930696: Keyfiles specified by KEYFILE_PATTERN are not added to the initramfs

2019-06-19 Thread Jernej Jakob
On Wed, 19 Jun 2019 01:36:22 +0200
Guilhem Moulin  wrote:

> Control: severity -1 minor
> 
> Hi,
> 
> On Tue, 18 Jun 2019 at 20:35:47 +0200, Jernej Jakob wrote:
> > Any keyfiles configured in /etc/cryptsetup-initramfs/conf-hook
> > KEYFILE_PATTERN are not added to the initramfs if the target in
> > /etc/crypttab also has keyscript set.  
> 
> As crypttab(5) reads,
> 
>“In case of a keyscript, the value of [the third] field is given as
>argument to the keyscript.”
> 
> This could probably be made clearer, but the behavior is intentional: it is
> *not* treated as a key file, hence not compared against the KEYFILE_PATTERN
> glob(7) expansion.

Makes sense. Seems good to add this explanation to the documentation,
maybe adding "and is *not* added to the initramfs". Otherwise it may be
assumed it would still be added, since it's a file, and is passed as an
argument to the keyscript (the argument of which could be a file), and
the field is normally used as the path to a keyfile, which is added.
It all seems very complex to understand to a novice, in particular due
to the dual function of the third field.

> 
> > This may prevent the system from booting if the target has a
> > keyscript=/bin/cat set (as is in PureOS which is based on buster).  
> 
> Setting ‘keyscript=/bin/cat’ is useless for unlocking by key file, and
> is discouraged as it's incompatible with setups not supporting
> keyscripts, like systemd's systemd-cryptsetup@.service.  The same entry
> without the key script should work just fine.
> 
> > Perhaps cryptroot should print out a warning that the keyfile set in
> > crypttab wasn't added due to a set keyscript. That way the users would
> > know something may be misconfigured.  
> 
> I'm reluctant to do that due to false positives.  Consider a setup with
> two devices unlocked at initramfs stage, one opened by key file (copied
> to the initramfs image), one by key script, and KEYFILE_PATTERN set to
> "*".  Nothing wrong with that setup, KEYFILE_PATTERN="*" indicates that
> all key files should be copied to the initramfs image; crypttab(5)
> entries with a ‘keyscript=’ option are intentionally excluded from
> glob(7)'ing printing any warning would be a false positive.
> 
> Cheers,

I agree.

Thanks



Bug#904913: systemd: systemctl cat 'foo*' (using shellglob patterns) only lists active units

2019-06-19 Thread Michael Biebl
Should be fixed in v243.

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#851402: failed unmounting /var during shutdown

2019-06-19 Thread Michael Biebl
Will be fixed in v243.

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#928185: unblock: openjdk-11/11.0.3+7-4

2019-06-19 Thread Paul Gevers
Hi Tony,

On 18-06-2019 22:14, tony mancill wrote:
> Things are looking good so far with 11.0.4+4+really11.0.3+7 in unstable,
> and so I would like to prepare the t-p-u upload.  At the moment, the
> version I have is 11.0.3+7-5, since that would have been the "next"
> 11.0.3+7 Debian revision for unstable.  The 11.0.3+7 orig.tar.xz already
> in the archive is the same one used for the "really" to unstable and
> this build, and this versioning makes it clear to users what they are
> getting.  The resulting changelog would be:
> 
>> diff -Nru openjdk-11-11.0.4+4+really11.0.3+7/debian/changelog 
>> openjdk-11-11.0.3+7/debian/changelog
>> --- openjdk-11-11.0.4+4+really11.0.3+7/debian/changelog  2019-06-14 
>> 12:28:25.0 -0700
>> +++ openjdk-11-11.0.3+7/debian/changelog 2019-06-16 11:24:19.0 
>> -0700
>> @@ -1,3 +1,10 @@
>> +openjdk-11 (11.0.3+7-5) buster; urgency=medium
>> +
>> +  * Team upload.
>> +  * Upload 11.0.4+4+realy11.0.3+7-2 to buster t-p-u.
>> +
>> + -- tony mancill   Sun, 16 Jun 2019 11:24:19 -0700
> 
> Is this acceptable to the Release Team?  If not, (and I know there have
> been some differing opinions), how shall we version the t-p-u package?

I think the most logical version would be 11.0.3+7-4+deb10u1, as this is
a targeted upload to buster. I don't have a strong opinion on it. I
still don't like it we go via tpu but I understand the ranting argument.
Let's end this saga.

Paul



signature.asc
Description: OpenPGP digital signature


Bug#930120: init: Documentation error for telinit/init - does not use 'systemctl isolate xxx'

2019-06-19 Thread Michael Biebl
On Fri, 7 Jun 2019 17:32:00 +0200 Michael Biebl  wrote:
> Control: tags -1 + moreinfo
> 
> Am 07.06.19 um 15:51 schrieb J. Pfennig:
> > The man page of telinit/init says (for 'telinit N'):
> > 
> >Change the SysV runlevel. This is translated into an activation request 
> > for runlevel2.target,
> >runlevel3.target, ... and is equivalent to systemctl isolate 
> > runlevel2.target, systemctl isolate
> >runlevel3.target, ...
> > 
> > But when using telinit 2 or init 2 (or event booting the kernel with "2"
> > as an argument), the effective operation is:
> > 
> > 'systemctl start runlevel2.target'
> > ### but not 'sytemctl isolate runlevel2.target' ### as documented
> > 
> 
> I'm pretty sure "telinit" uses isolate.
> See
> https://github.com/systemd/systemd/blob/master/src/initctl/initctl.c#L101
> 
> So the documentation looks correct to me.
> Please elaborate


I still don't see the problem here, that said if you feel strongly about
this and think this needs to be addressed, please raise this upstream at
https://github.com/systemd/systemd/issues

After all, this doesn't look like a Debian specific issue.

Regards,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#930748: samba: CVE-2019-12435: Samba AD DC Denial of Service in DNS management server (dnsserver)

2019-06-19 Thread Salvatore Bonaccorso
Source: samba
Version: 2:4.9.5+dfsg-4
Severity: important
Tags: security upstream

Hi,

The following vulnerability was published for samba.

CVE-2019-12435[0]:
| Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer
| dereference, leading to Denial of Service. This is related to the AD
| DC DNS management server (dnsserver) RPC server process.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-12435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12435
[1] https://www.samba.org/samba/security/CVE-2019-12435.html

Regards,
Salvatore



Bug#930746: bind9: CVE-2019-6471: A race condition when discarding malformed packets can cause BIND to exit with an assertion failure

2019-06-19 Thread Salvatore Bonaccorso
Source: bind9
Version: 1:9.11.5.P4+dfsg-5
Severity: grave
Tags: security upstream
Control: clone -1 -2
Control: reassign -2 src:bind 1:9.13.3-1
Control: retitle -2 bind: CVE-2019-6471: A race condition when discarding 
malformed packets can cause BIND to exit with an assertion failure

Hi,

The following vulnerability was published for bind9.

CVE-2019-6471[0]:
|A race condition when discarding malformed packets can cause BIND to
|exit with an assertion failure

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-6471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6471
[1] https://kb.isc.org/docs/cve-2019-6471

Please adjust the affected versions in the BTS as needed, I think the
version back in stretch is not affected but this needs
double-checking.

Regards,
Salvatore



Bug#930745: new upstream (2.0)

2019-06-19 Thread Daniel Baumann
Package: haproxy
Severity: wishlist

Hi,

thank you for maintaining haproxy in Debian. It would be nice if you
could upgrade to the current upstream version (2.0).

Regards,
Daniel



Bug#929720: hkl: FTBFS: ../../hkl/ccan/generator/generator.h:23:2: error: #error Generators require coroutines

2019-06-19 Thread Andreas Tille
Control: severity -1 important

Hi Lucas,

I confirm that I'm the third one who can not reproduce this issue.  
Can we agree that this bug is maximum of severity important (just
set this - feel free to reset to serious if you have good reasons
for it).

Do you have any further hints how this FTBFS could be reproduced?

Kind regards

  Andreas.

-- 
http://fam-tille.de



Bug#930674: automatically generated menus prevent some applications from running

2019-06-19 Thread Jeremy Sowden
On 2019-06-19, at 19:39:12 +0200, Andreas Metzler wrote:
> On 2019-06-19 Jeremy Sowden  wrote:
> [...]
> > Your patch truncates any string value at the first %.  I don't think
> > that's the right way to go.
> [...]
>
> https://repo.or.cz/wmaker-crm.git/commit/e037ae3684928a2fbf4a3994562a322f5d3b0c71
>
> is supposed to fix this.

That patch seems to be intended to stop parsing after the first section
of a desktop file like this:

  [Desktop Entry]
  Name=Rxvt Color Unicode Terminal
  Comment=Use the command line
  TryExec=urxvt
  Exec=urxvt
  Icon=urxvt_48x48.xpm
  Type=Application
  Categories=Utility;TerminalEmulator;
  StartupNotify=true
  Keywords=Run;
  Actions=New
  StartupWMClass=URxvt

  [Desktop Action New]
  Name=New Rxvt Color Unicode Terminal
  Exec=urxvt
  OnlyShowIn=Unity

This bug is about what to do with an Exec like this:

  Exec=/usr/bin/chromium %U

The comments in the source file suggest trying TryExec in preference to
Exec and discarding the arguments from the latter if used.  However, in
fact, if Exec is used, it is used as-is.

For %U and %F, I think we can replace them with an empty list, i.e.,
"".  For %u and %f, I think we can _probably_ do likewise.

J.


signature.asc
Description: PGP signature


Bug#930674: automatically generated menus prevent some applications from running

2019-06-19 Thread E. Serradilla




On 6/19/19 10:20 AM, Jeremy Sowden wrote:
[...]

Clearly this is not what the code actually does.  The quick hack would
be to change xdg_to_wm() to truncate the command-line at the first
instance of white-space (which is what is done to derive (*wm)->Name
from (*xdg)->Exec or (*xdg)->TryExec); the right thing to do would be to
implement the FDO quoting rules first:



maybe something like this:

else /* (*xdg)->TryExec */
(*wm)->Name = wstrdup((*xdg)->TryExec);

-   p = strchr((*wm)->Name, ' ');
+   p = strchr((*wm)->Name, '%');
if (p)
*p = '\0';
}
@@ -225,6 +225,11 @@
(*wm)->CmdLine = (*xdg)->Exec;
else/* (*xdg)->TryExec */
(*wm)->CmdLine = (*xdg)->TryExec;
+
+   p = strchr((*wm)->CmdLine, '%');
+   if (p)
+   *p = '\0';
+

(*wm)->SubMenu = (*xdg)->Category;
(*wm)->Flags = (*xdg)->Flags;


and then maybe first (*xdg)->TryExec than (*xdg)->Exec?



Bug#921347:

2019-06-19 Thread Dawid Dziurla
That's nice. Hope we can get that to unstable soon.

On June 19, 2019 8:40:47 PM GMT+02:00, Peter Zahradnik 
 wrote:
>On 6/18/19 3:52 PM, Dawid Dziurla wrote:
>> What's the status of packaging?
>>
>> I would love to see this software in Debian.
>Hi,
>
>I've uploaded new version to mentors, there are still some lintians 
>warnings which needs to be fixed
>https://mentors.debian.net/package/platformio
>
>Peter


Bug#717666: Quotation Inquiry #RFQ170619E - New Supplier

2019-06-19 Thread Hidroconta Trading Ltd .
Hello,

Our partners referred your company to us. Regarding your great products.
Please see required products, quantity and specifications as attached.

Kindly give us your lowest possible prices for FCL shipment.


Best Regards,

Wanda Rodriguez
Purchase Assistant

Hidroconta Trading Ltd.
Av. de Sta. Catalina,
60, 30012 Murcia, Spain
Phone: +34 968 26 77 66
Fax: +34 968 26 77 06



Bug#921347:

2019-06-19 Thread Peter Zahradnik

On 6/18/19 3:52 PM, Dawid Dziurla wrote:

What's the status of packaging?

I would love to see this software in Debian.

Hi,

I've uploaded new version to mentors, there are still some lintians 
warnings which needs to be fixed

https://mentors.debian.net/package/platformio

Peter



Bug#843050: Quotation Inquiry #RFQ170619E - New Supplier

2019-06-19 Thread Hidroconta Trading Ltd .
Hello,

Our partners referred your company to us. Regarding your great products.
Please see required products, quantity and specifications as attached.

Kindly give us your lowest possible prices for FCL shipment.


Best Regards,

Wanda Rodriguez
Purchase Assistant

Hidroconta Trading Ltd.
Av. de Sta. Catalina,
60, 30012 Murcia, Spain
Phone: +34 968 26 77 66
Fax: +34 968 26 77 06



Bug#654545: Quotation Inquiry #RFQ170619E - New Supplier

2019-06-19 Thread Hidroconta Trading Ltd .
Hello,

Our partners referred your company to us. Regarding your great products.
Please see required products, quantity and specifications as attached.

Kindly give us your lowest possible prices for FCL shipment.


Best Regards,

Wanda Rodriguez
Purchase Assistant

Hidroconta Trading Ltd.
Av. de Sta. Catalina,
60, 30012 Murcia, Spain
Phone: +34 968 26 77 66
Fax: +34 968 26 77 06



Bug#929682: libqt5qml5: QQmlEngine segfaults on ia64

2019-06-19 Thread Jason Duerstock
Investigating now.

On Wed, Jun 19, 2019 at 1:56 PM Dmitry Shachnev  wrote:

> Hi Jason!
>
> On Tue, May 28, 2019 at 11:58:38AM -0400, Jason Duerstock wrote:
> > As reported in bug #894726, qtdeclarative-opensource-src has a bug on
> > systems that use 64-bit pointers with any bits from 63-50 set.  The
> > attached patch addresses this issue on ia64 by shifting bits 63-61
> > (which are the "virtual region number" on ia64) into bits 49-47.  Please
> > include it in the next release.
>
> I have applied the patch (the version that was merged upstream), but
> unfortunately most of the tests are still failing.
>
> In the build log, I can count 149 FAIL!s and 42 Segmentation faults.
>
> It is much more than 57 failures you mentioned in the upstream bug [1].
> Looking at the log, *most* of the tests are failing. Passing ones are
> mostly the qmlMinify ones, which do not use the QML engine at all.
>
> Can you please look what happened there?
>
> [1]:
> https://bugreports.qt.io/browse/QTBUG-56264?focusedCommentId=462440#comment-462440
>
> --
> Dmitry Shachnev
>


Bug#860087: Quotation Inquiry #RFQ170619E - New Supplier

2019-06-19 Thread Hidroconta Trading Ltd .
Hello,

Our partners referred your company to us. Regarding your great products.
Please see required products, quantity and specifications as attached.

Kindly give us your lowest possible prices for FCL shipment.


Best Regards,

Wanda Rodriguez
Purchase Assistant

Hidroconta Trading Ltd.
Av. de Sta. Catalina,
60, 30012 Murcia, Spain
Phone: +34 968 26 77 66
Fax: +34 968 26 77 06



Bug#930674: automatically generated menus prevent some applications from running

2019-06-19 Thread E. Serradilla



On 6/19/19 7:39 PM, Andreas Metzler wrote:

On 2019-06-19 Jeremy Sowden  wrote:
[...]

Your patch truncates any string value at the first %.  I don't think
that's the right way to go.

[...]

https://repo.or.cz/wmaker-crm.git/commit/e037ae3684928a2fbf4a3994562a322f5d3b0c71

is supposed to fix this.

cu Andreas



this the case of my libreoffice-writer.desktop that it has two entries

Exec=libreoffice --writer %U

and

Exec=libreoffice --writer

but I also have others with just one e.g. medit.desktop

Exec=medit %F

and with two commands e.g. vlc.desktop

Exec=/usr/bin/vlc --started-from-file %U
TryExec=/usr/bin/vlc

but instead of using "TryExec" for the generated menu it uses "Exec" ...



Bug#930744: linux-image-4.19.0-5-amd64: wlan/wifi not working

2019-06-19 Thread nkiesel
Package: src:linux
Version: 4.19.37-4
Severity: normal

Dear Maintainer,

my WiFi stopped working after the kernel upgrade.

When booting 4.19.0.4, I see
lt-nkiesel kernel: wl: loading out-of-tree module taints kernel.
lt-nkiesel kernel: wl: module license 'MIXED/Proprietary' taints kernel.
lt-nkiesel kernel: wl: module verification failed: signature and/or required
key missing - tainting kernel
lt-nkiesel kernel: wlan0: Broadcom BCM43b1 802.11 Hybrid Wireless Controller
6.30.223.271 (r587334)
lt-nkiesel NetworkManager[771]:   [1560965780.6047] wifi-nl80211:
(wlan0): using nl80211 for WiFi device control

When booting 4.19.0.5, I see
lt-nkiesel kernel: wl: loading out-of-tree module taints kernel.
lt-nkiesel kernel: wl: module license 'MIXED/Proprietary' taints kernel.
lt-nkiesel kernel: wl: module verification failed: signature and/or required
key missing - tainting kernel
lt-nkiesel kernel: wl: disagrees about version of symbol
cfg80211_inform_bss_frame_data
lt-nkiesel kernel: wl: Unknown symbol cfg80211_inform_bss_frame_data (err -22)
lt-nkiesel kernel: wl: disagrees about version of symbol skb_put
lt-nkiesel kernel: wl: Unknown symbol skb_put (err -22)
(more complaining about other symbols)



-- Package-specific info:
** Kernel log: boot messages should be attached

** Model information
sys_vendor: Dell Inc.
product_name: Precision M4800
product_version: 00
chassis_vendor: Dell Inc.
chassis_version: 
bios_vendor: Dell Inc.
bios_version: A19
board_vendor: Dell Inc.
board_name: 0WJNC2
board_version: A00

** Network interface configuration:

source /etc/network/interfaces.d/*

auto lo
iface lo inet loopback

** PCI devices:
00:00.0 Host bridge [0600]: Intel Corporation Xeon E3-1200 v3/4th Gen Core 
Processor DRAM Controller [8086:0c04] (rev 06)
Subsystem: Dell Xeon E3-1200 v3/4th Gen Core Processor DRAM Controller 
[1028:05cc]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel modules: ie31200_edac

00:01.0 PCI bridge [0604]: Intel Corporation Xeon E3-1200 v3/4th Gen Core 
Processor PCI Express x16 Controller [8086:0c01] (rev 06) (prog-if 00 [Normal 
decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: 
Kernel driver in use: pcieport

00:02.0 VGA compatible controller [0300]: Intel Corporation 4th Gen Core 
Processor Integrated Graphics Controller [8086:0416] (rev 06) (prog-if 00 [VGA 
controller])
Subsystem: Dell 4th Gen Core Processor Integrated Graphics Controller 
[1028:05cc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: i915
Kernel modules: i915

00:03.0 Audio device [0403]: Intel Corporation Xeon E3-1200 v3/4th Gen Core 
Processor HD Audio Controller [8086:0c0c] (rev 06)
Subsystem: Dell Xeon E3-1200 v3/4th Gen Core Processor HD Audio 
Controller [1028:05cc]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: snd_hda_intel
Kernel modules: snd_hda_intel

00:14.0 USB controller [0c03]: Intel Corporation 8 Series/C220 Series Chipset 
Family USB xHCI [8086:8c31] (rev 04) (prog-if 30 [XHCI])
Subsystem: Dell 8 Series/C220 Series Chipset Family USB xHCI [1028:05cc]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- 
SERR- 
Kernel driver in use: xhci_hcd
Kernel modules: xhci_pci

00:16.0 Communication controller [0780]: Intel Corporation 8 Series/C220 Series 
Chipset Family MEI Controller #1 [8086:8c3a] (rev 04)
Subsystem: Dell 8 Series/C220 Series Chipset Family MEI Controller 
[1028:05cc]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: mei_me
Kernel modules: mei_me

00:19.0 Ethernet controller [0200]: Intel Corporation Ethernet Connection 
I217-LM [8086:153a] (rev 04)
Subsystem: Dell Ethernet Connection I217-LM [1028:05cc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: e1000e
Kernel modules: e1000e


Bug#929682: libqt5qml5: QQmlEngine segfaults on ia64

2019-06-19 Thread Dmitry Shachnev
Hi Jason!

On Tue, May 28, 2019 at 11:58:38AM -0400, Jason Duerstock wrote:
> As reported in bug #894726, qtdeclarative-opensource-src has a bug on
> systems that use 64-bit pointers with any bits from 63-50 set.  The
> attached patch addresses this issue on ia64 by shifting bits 63-61
> (which are the "virtual region number" on ia64) into bits 49-47.  Please
> include it in the next release.

I have applied the patch (the version that was merged upstream), but
unfortunately most of the tests are still failing.

In the build log, I can count 149 FAIL!s and 42 Segmentation faults.

It is much more than 57 failures you mentioned in the upstream bug [1].
Looking at the log, *most* of the tests are failing. Passing ones are
mostly the qmlMinify ones, which do not use the QML engine at all.

Can you please look what happened there?

[1]: 
https://bugreports.qt.io/browse/QTBUG-56264?focusedCommentId=462440#comment-462440

--
Dmitry Shachnev


signature.asc
Description: PGP signature


Bug#930671: libauthen-radius-perl: most basic usage stopped working

2019-06-19 Thread Niko Tyni
Control: severity -1 serious

On Tue, Jun 18, 2019 at 10:52:03AM +0200, Ferenc Wágner wrote:
> Package: libauthen-radius-perl
> Version: 0.29-1
> Severity: important
 
> I recently upgraded to buster and noticed that our RADIUS test plugin
> does not work anymore.  Downgrading libauthen-radius-perl to 0.27-1
> fixes the issue.  Take the first example from the top of the man page:
> 
>   use Authen::Radius;
>   $r = new Authen::Radius(Host => 'myserver', Secret => 'mysecret');
>   print "auth result=", $r->check_pwd('myname', 'mypwd'), "\n";
> 
> If I substitute the correct IPv4 address, secret, user name and password
> into the above, the result is 1 (success) with 0.27-1, but upgrading to
> 0.29-1 gives an error message instead:
> 
>   unknown attr name 1 at /usr/share/perl5/Authen/Radius.pm line 865.
> 
> There might be a workaround via using the lower level operations instead
> of the check_pwd method, but I haven't found it yet.  Please advise.

Thanks for reporting this. I can reproduce this just by pointing a query
towards localhost, even with no server available.

The check_pwd() method is indeed just a small wrapper around the lower
lever operations. It looks like this wrapper calls the add_attributes()
method in a way that broke recently:

$self->add_attributes (
{ Name => 1, Value => $name, Type => 'string' },
{ Name => 2, Value => $pwd, Type => 'string' },
{ Name => 4, Value => $nas || '127.0.0.1', Type => 'ipaddr' }
);

>From the documentation of the add_attributes() method:

Adds any number of Radius attributes to the current Radius object.
Attributes are specified as a list of anon hashes. They may be
"Name"d with their dictionary name (provided a dictionary has been
loaded first), or with their raw Radius attribute-type values.

so this does not seem intentional.

This needs to be reported and fixed upstream; I'll look at it in the
next few days unless someone else beats me to it.

I'm raising the severity of this; if we cannot get it fixed in time
for the Debian Buster release, it should at least be fixed in a stable
release update later.
-- 
Niko Tyni   nt...@debian.org



Bug#930743: ABI changed without an ABI bump

2019-06-19 Thread Ben Hutchings
Package: src:linux
Version: 4.19.37-4
Severity: important

We forgot to add an ABI reference for 4.19.0-5 after the last ABI
bump, and many symbol versions have changed between versions 4.19.37-3
and -4.

I don't yet understand why that is, as the corresponding versions
for stretch-backports have the same ABI (except in mwifiex, which
is ignored).

Ben.

-- System Information:
Debian Release: 10.0
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 
'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#930674: automatically generated menus prevent some applications from running

2019-06-19 Thread Andreas Metzler
On 2019-06-19 Jeremy Sowden  wrote:
[...]
> Your patch truncates any string value at the first %.  I don't think
> that's the right way to go.
[...]

https://repo.or.cz/wmaker-crm.git/commit/e037ae3684928a2fbf4a3994562a322f5d3b0c71

is supposed to fix this.

cu Andreas



Bug#930314: MariaDB 10.3.16 ready for upload

2019-06-19 Thread Otto Kekäläinen
Hello!

I've prepared the 10.3.16 release for upload to unstable, and I will
proceed with it in a couple of days.

If there is something you want to have a chance to get into next
stable Debian release, now is your chance to act on it.

There are no new pending merge requests at
https://salsa.debian.org/mariadb-team/mariadb-10.3/merge_requests nor
any critical open bugs.

There is however one old MR as a suggested solution to #930314
https://salsa.debian.org/mariadb-team/mariadb-10.3/merge_requests/19
but I have not merged it yet since I am unsure if this is a good fix
that will also be accepted by upstream some day or if we will get
stuck with delta that we need to maintain for a long time. Comments
welcome.



Bug#930217: Please provide support for alternative network bootloaders

2019-06-19 Thread Faidon Liambotis
On Wed, Jun 19, 2019 at 04:54:33PM +0100, Steve McIntyre wrote:
> There's a fair amount of work going on in Grub, but yes - it looks
> like nobody's tending their bug tracker. :-(
> 
> Network booting is clearly not the highest priority for the current
> developers, but I'm sure that can be fixed with developer effort. It
> works well enough for common cases, in my experience - I've just been
> doing testing of this for #928750.

Depends on the definition of "common case" I suppose... Attempting to
netboot, reboot and netboot again in succession (without waiting 1-4
minutes) throws GRUB's TCP stack into an unrecoverable mayhem and
results into a user-visible "connection timed out". Easily reproducible
e.g. with QEMU.

Not to mention the potentially exploitable overflows :/

> There's no way we're going to sign syslinux, I'm afraid - there has
> been no support added for locking down boot (i.e. only booting a
> signed kernel). Without that, Secure Boot would be a total joke. And
> if you're worried about Grub development, I'd be even more worried
> about syslinux. I'm on both mailing lists, and there's massively more
> development happening in the Grub world.

Right... That makes sense.

> >An alternative to this proposal would be for Debian to submit e.g. iPXE
> >separately to Microsoft for signatures and not use this in combination
> >with shim. I believe this doesn't fit with the overall strategy that
> >Debian and other distributions have chosen around Secure Boot with shim,
> >but... I am really not an expert :)
> 
> iPXE at least appears to be currently under development, but again I
> don't see any obvious lockdown patches at all. Feel free to correct me
> if you know of any work for that - I've only had a cursory look. SB
> without restricting loading of kernels etc. is pointless.

(disclaimer: I'm -at best- an SB novice)

iPXE does support validating signatures[1][2] but not with the EFI
signing protocol and not without using a custom embedded script. More
importantly, however, I found this explanation at the iPXE mailing
list[3]:
> iPXE loads the binary and then calls the firmware LoadImage - meaning
> that it is up to the firmware LoadImage function to validate the
> signature, and return error to iPXE if the signature is not valid.
> iPXE itself does not have any code to check the signature, and by
> using the firmware to check it, it isn't needed.  In this case it
> seems that the image is not valid according to Firmware functions?
> Could you validate that the kernel loads fine from the efi_shell, or
> without having iPXE in between?

I suppose that means that a shim -> iPXE -> Linux load would be
pointless in this case, unless one were to construct a shim -> iPXE ->
shim -> Linux chain. Would that even work, and would it be sensible?

Upstream has mentioned that they have gotten Microsoft to sign some of
their builds[4], and have included an "sb" variant in their buildsystem
that disabled dubious subsystems like NFS and 802.11. So I suppose
Microsoft does consider this secure enough and thus so could Debian?

Thanks!
Faidon

1: http://ipxe.org/crypto#code_signing
2: http://ipxe.org/cmd/imgtrust
3: http://lists.ipxe.org/pipermail/ipxe-devel/2018-September/006288.html
4: http://lists.ipxe.org/pipermail/ipxe-devel/2017-December/005924.html



Bug#690705: virtualbox-dkms: module not installed/loaded without reinstalling the package

2019-06-19 Thread Vincas Dargis
Looks like it's still the case on Unstable. Just upgraded linux-image-4.19.0-5-amd64:amd64 4.19.37-4 
and VBox'es failed to start with some NS.. error. Reinstalling -dkms fixes the issue.




Bug#930742: parted: fix MacOS boot support

2019-06-19 Thread Jason Duerstock
Source: parted
Severity: normal
Tags: patch

Dear Maintainer,

parted does not properly handle MacOS partitions.  The attached (from upstream) 
fixes this.

See 
http://git.savannah.gnu.org/cgit/parted.git/commit/?id=43b061e90dcdab799ecd1e822852de110673bf7e
for more detail.

-- System Information:
Debian Release: 10.0
  APT prefers unreleased
  APT policy: (500, 'unreleased'), (500, 'unstable'), (1, 'experimental')
Architecture: ia64

Kernel: Linux 5.0.0-trunk-mckinley (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff --git a/libparted/labels/mac.c b/libparted/labels/mac.c
index d8da941..fa4e43f 100644
--- a/libparted/labels/mac.c
+++ b/libparted/labels/mac.c
@@ -411,14 +411,14 @@ _rawpart_has_driver (const MacRawPartition* raw_part, 
MacDiskData* mac_disk_data
 {
MacDeviceDriver *driverlist;
uint16_t i;
-   uint32_t driver_bs, driver_be, part_be;
+   uint32_t start_block, block_count;
 
+   start_block = PED_BE32_TO_CPU(raw_part->start_block);
+   block_count = PED_BE32_TO_CPU(raw_part->block_count);
driverlist = &mac_disk_data->driverlist[0];
for (i = 0; i < mac_disk_data->driver_count; i++) {
-   driver_bs = driverlist->block;
-   driver_be = driver_bs + driverlist->size;
-   part_be = raw_part->start_block + raw_part->block_count;
-   if (driver_bs >= raw_part->start_block && driver_be <= part_be)
+   if (start_block == PED_BE32_TO_CPU(driverlist->block) &&
+block_count == PED_BE16_TO_CPU(driverlist->size))
return 1;
driverlist++;
}
@@ -751,11 +751,12 @@ mac_read (PedDisk* disk)
if (!ped_disk_delete_all (disk))
goto error;
 
-   if (raw_disk->driver_count && raw_disk->driver_count < 62) {
+   if (PED_BE16_TO_CPU(raw_disk->driver_count) &&
+PED_BE16_TO_CPU(raw_disk->driver_count) < 62) {
memcpy(&mac_disk_data->driverlist[0], &raw_disk->driverlist[0],
sizeof(mac_disk_data->driverlist));
-   mac_disk_data->driver_count = raw_disk->driver_count;
-   mac_disk_data->block_size = raw_disk->block_size;
+   mac_disk_data->driver_count = 
PED_BE16_TO_CPU(raw_disk->driver_count);
+   mac_disk_data->block_size = 
PED_BE16_TO_CPU(raw_disk->block_size);
}
 
/* If _disk_analyse_block_size has increased the sector_size,
@@ -877,17 +878,16 @@ static void
 _update_driver_count (MacRawPartition* part_map_entry,
  MacDiskData *mac_driverdata, const MacDiskData* 
mac_disk_data)
 {
-   uint16_ti, count_orig, count_cur;
-   uint32_tdriver_bs, driver_be, part_be;
-
-   count_cur = mac_driverdata->driver_count;
-   count_orig = mac_disk_data->driver_count;
-   for (i = 0; i < count_orig; i++) {
-   driver_bs = mac_disk_data->driverlist[i].block;
-   driver_be = driver_bs + mac_disk_data->driverlist[i].size;
-   part_be = part_map_entry->start_block + 
part_map_entry->block_count;
-   if (driver_bs >= part_map_entry->start_block
-   && driver_be <= part_be) {
+   uint16_ti;
+   uint32_tstart_block, block_count;
+
+   start_block = PED_BE32_TO_CPU(part_map_entry->start_block);
+   block_count = PED_BE32_TO_CPU(part_map_entry->block_count);
+
+   for (i = 0; i < mac_disk_data->driver_count; i++) {
+   if (start_block == 
PED_BE32_TO_CPU(mac_disk_data->driverlist[i].block) &&
+   block_count == 
PED_BE16_TO_CPU(mac_disk_data->driverlist[i].size)) {
+   uint16_t count_cur = mac_driverdata->driver_count;
mac_driverdata->driverlist[count_cur].block
= mac_disk_data->driverlist[i].block;
mac_driverdata->driverlist[count_cur].size
@@ -934,7 +934,6 @@ _generate_raw_part (PedDisk* disk, PedPartition* part,
strncpy (part_map_entry->type, mac_part_data->system_name, 32);
 
if (mac_part_data->is_driver) {
-   mac_part_data->boot_region_length = part->geom.length;
if (mac_part_data->has_driver)
_update_driver_count(part_map_entry, mac_driverdata,
mac_disk_data);
@@ -1042,7 +1041,7 @@ write_block_zero (PedDisk* disk, MacDiskData* 
mac_driverdata)
raw_disk->block_size = PED_CPU_TO_BE16 (dev->sector_size);
raw_disk->block_count = PED_CPU_TO_BE32 (dev->length);
 
-   raw_disk->driver_count = mac_driverdata->driver_count;
+   raw_disk->driver_count = PED_CPU_TO_BE16(mac_driverdata->driver_count);
memcpy(&raw_disk->driv

Bug#927667: gnome: please confirm or revert choice of Wayland for default desktop

2019-06-19 Thread Jonathan Dowland

Hi Andrew

So far as I am aware there is still radio silence from active GNOME
packaging team members regarding this issue. No comment yet on the
patch I adapted, positive or negative; this bug (#927667) remains
at an RC severity.

I've not yet read all the thread that Samuel linked to[1] but it looks
like it leans in favour of preserving the current default (xorg).

I'm copying -release team to see if they have any (new) opinions on
the matter. Otherwise I guess it's up to someone to prepare an NMU
upload, which I will *try* to look at in the next few days, but can't
make any guarantees.

Further testers of the patch on this bug would be most welcome.

[1] https://lists.debian.org/debian-accessibility/2019/02/threads.html#4



Bug#930042: [pkg-gnupg-maint] Bug#930042: FTBFS when building arch-dep only

2019-06-19 Thread Daniel Baumann
On 6/19/19 2:01 PM, Daniel Kahn Gillmor wrote:
> https://bugs.debian.org/930689

oh, nice.. thanks!

Regards,
Daniel



Bug#928758: [debian-mysql] Bug#928758: mariadb-server: mysql_install_db fails if basedir option isn't set, expecting resolveip to be present in /usr/sbin/

2019-06-19 Thread Otto Kekäläinen
Hello!

I filed https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929257 a
month ago to get permission to upload .40 to Stretch. If you are in
favor of it, please let the release team know by replying to that
issue.



Bug#929877: installation-reports: Buster installer hangs at hard disk step with arabic language

2019-06-19 Thread ButterflyOfFire
Hi,
I think it is okay for those diacritics.
Regards,

‐‐‐ Original Message ‐‐‐
Le mardi 18 juin 2019 22:26, Holger Wansing  a écrit :

> Hi,
>
> Samuel Thibault sthiba...@debian.org wrote:
>
> > Hello,
> > Holger Wansing, le mar. 04 juin 2019 20:59:12 +, a ecrit:
> >
> > > Am Sonntag, 2. Juni 2019 schrieb Holger Wansing:
> > >
> > > > Am Sonntag, 2. Juni 2019 schrieb Samuel Thibault:
> > > >
> > > > > ButterflyOfFire, le dim. 02 juin 2019 15:43:41 +, a ecrit:
> > > > >
> > > > > > > > "لاحقاً"
> > > > > >
> > > > > > This word means "later" and can be replaced by "لاحقا".
> > > > >
> > > > > That avoids the issue here indeed. I however see it used in various
> > > >
> > > > Hmm.
> > > > There has been no changing in the ar.po of partman-auto
> > > > for 3 years now (JFTR), thus the real problem seems to be
> > > > sitting somewhere else ...
> > >
> > > How should we proceed here?
> > > Since we are late in the freeze, and it's most probably not that
> > > easy to find out what happened and what the real issue is:
> > > should we go with the "work-around" proposed by
> > > Butterflyoffire and confirmed to fix the issue by Samuel?
> >
> > Personally, I don't think I'll have the time to debug what is actually
> > happening inside gtk until the release, so even if it's ugly, I guess
> > the browntape fix is the least worst I can come up with.
>
> That looks fair.
> I have committed the proposed fix now.
>
> @butterflyoffire: could you please take a look at
> https://salsa.debian.org/installer-team/d-i/commit/fa17b7afffb2ee4888a371efa4153c5c075915e7
> to double-check if the fix is fine by you?
> Thanks!
>
> Holger
>
>
> -
>
> Holger Wansing hwans...@mailbox.org
> PGP-Fingerprint: 496A C6E8 1442 4B34 8508 3529 59F1 87CA 156E B076



Bug#930741: unblock: debian-electronics/0.3

2019-06-19 Thread Andreas Tille
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package debian-electronics


As in every release process I have updated several Blends metapackages
which needed updates due to package removals to reflect the package pool
of the release.  These metapackages are created using the latest
blends-dev package.

The changes in the debian-electronics package are to a large extend auto
generated by blends-dev and the full debdiff (attached
debian-electronics_0.2-0.3.diff.gz) is a bit hard to read because the files
in tasks/ are serving at the same time used as documentation for the Debian
Med web sentinel.  There is no reasonable way to maintain this in a
separate source so the diff is larger than you would usually accept
these days.  This was done in the same way for several previous
releases.

To enable you concentrating on the *relevant* changes which are caused
due to changes in the package pool I added 

   wdiff debian-electronics-0.2/debian/control 
debian-electronics-0.3/debian/control > debian-electronics_control_0.2-0.3.wdiff

which is more easy to inspect to see what relevant changes in the
dependencies have actually happended (see
debian-electronics_control_0.2-0.3.wdiff.gz).

Kind regards

   Andreas.

unblock debian-electronics/0.3

-- System Information:
Debian Release: 9.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


debian-electronics_0.2-0.3.diff.gz
Description: application/gzip


debian-electronics_control_0.2-0.3.wdiff.gz
Description: application/gzip


Bug#930728: pg_cltlcluster leaks logfile descriptor into PostgreSQL backends

2019-06-19 Thread Andrey Borodin


> 19 июня 2019 г., в 20:57, Christoph Berg  написал(а):
> 
> Control: tags -1 moreinfo
> 
> Re: Andrey Borodin 2019-06-19 
> <3fd6aec7-55c8-4129-a46c-0bb3e4296...@yandex-team.ru>
>> Package: postgresql-common
>> Version: 199
>> 
>> When I execute
>> service postgresql start
>> I observe that logfile descriptor will leak into postmaster and every 
>> backend. This is not fd opened by PG's syslogger.
> 
> That's because we use logging to stderr.
> 
>> -my $fd = POSIX::open($info{'logfile'}, 
>> POSIX::O_WRONLY|POSIX::O_APPEND|POSIX::O_CREAT) or error "Could not open 
>> logfile $info{'logfile'}";
>> -dup2($fd, 1);
>> -dup2($fd, 2);
>> +open(STDOUT, ">>$info{logfile}") or die $!;
>> +open(STDERR,  '>&STDOUT')  or die $!;
> 
> Does that actually do things differently? Does stderr logging still
> work with that patch?
On my observation - yes, descriptor 4 is no longer in lsof.
I looked that I see some lines of pg_ctl output like "output will be redirected 
etcetc" in pglog. But not from stderr.

But I've checked only on Yandex.Cloud clusters. I think I'll do repro on fresh 
Ubuntu...

I'm not an expert in Perl, these two lines were my first experience, and even 
in them I needed a lot of help from colleagues with Perl background.


Best regards, Andrey Borodin.


Bug#930728: pg_cltlcluster leaks logfile descriptor into PostgreSQL backends

2019-06-19 Thread Christoph Berg
Control: tags -1 moreinfo

Re: Andrey Borodin 2019-06-19 
<3fd6aec7-55c8-4129-a46c-0bb3e4296...@yandex-team.ru>
> Package: postgresql-common
> Version: 199
> 
> When I execute
> service postgresql start
> I observe that logfile descriptor will leak into postmaster and every 
> backend. This is not fd opened by PG's syslogger.

That's because we use logging to stderr.

> -my $fd = POSIX::open($info{'logfile'}, 
> POSIX::O_WRONLY|POSIX::O_APPEND|POSIX::O_CREAT) or error "Could not open 
> logfile $info{'logfile'}";
> -dup2($fd, 1);
> -dup2($fd, 2);
> +open(STDOUT, ">>$info{logfile}") or die $!;
> +open(STDERR,  '>&STDOUT')  or die $!;

Does that actually do things differently? Does stderr logging still
work with that patch?

Christoph



Bug#930217: Please provide support for alternative network bootloaders

2019-06-19 Thread Steve McIntyre
Hey Faidon,

Control: tags -1 +wontfix

On Sat, Jun 08, 2019 at 03:43:37PM +0300, Faidon Liambotis wrote:
>Package: src:shim
>Version: 15+1533136590.3beb971-7
>Severity: wishlist
>
>(I'm Cc'ing the syslinux and iPXE maintainers here for their information
>and to seek their opinion. I haven't discussed this matter with neither
>of them and do not speak for them.)
>
>Currently, the only way to network boot a Debian EFI system with Secure
>Boot via shim is to use GRUB, as this is the only combination that's
>SB-signed (bootnetx64.efi even hardcodes grubx64.efi). This is what
>Debian's own netboot.tar.gz ship with as well
>
>However, GRUB's TCP/IP + DNS + HTTP stack is... to put it politely,
>severely lacking. I've managed to crash it[1], find serious TCP[2] or
>HTTP[3] implementation bugs, run into very basic limitations (e.g. on
>dual-stack hostnames[5]), all within a few hours. For some reason
>they've decided to build a TCP/IP stack from scratch (rather than use
>EFI's, or something like lwIP), but their code, to this day, has
>comments like "/* FIXME: overflow. */". I've tried to build a sane
>netboot configuration with GRUB, and work around its bugs, but
>ultimately failed -- it's just too buggy for anything but just booting a
>kernel + initramfs, and if even that.
>
>1: 52408aa94604466bdd80f48fa8d68378a1ffab31
>2: https://savannah.gnu.org/bugs/?56391
>3: https://savannah.gnu.org/bugs/?49531
>4: https://savannah.gnu.org/bugs/?56390
>
>Despite these having been reported upstream, I don't have high hopes;
>their bug tracker is a dumpster fire. Noone is responding to old or new
>bugs, no matter their severity. I was looking into SMBIOS support as
>well, and it looks someone has written a working patch that other
>distributions ship; that person has been submitting it once a year since
>2013, and never received a response. I filed this as a bug in their bug
>tracker[5] but that has not received a response either.
>
>5: https://savannah.gnu.org/bugs/?56164
>
>All in all, I think there are two compounding issues here: 1) the GRUB
>project's overall health 2) network boot not being a priority for them.

There's a fair amount of work going on in Grub, but yes - it looks
like nobody's tending their bug tracker. :-(

Network booting is clearly not the highest priority for the current
developers, but I'm sure that can be fixed with developer effort. It
works well enough for common cases, in my experience - I've just been
doing testing of this for #928750.

>However, this being free software, there are alternatives :) The two
>most popular network bootloaders are:
>
>1) SYSLINUX (syslinux.efi specifically): this is much more restricted in
>terms of features, but good enough for many use cases and more reliable
>than GRUB. syslinux.efi uses the EFI stack's TCP/IP implementation
>(Tcp4ServiceBindingProtocol) and doesn't roll its own, which at least
>makes it more secure than GRUB's (albeit without IPv6 support right
>now). The other advantage here is that this is fully compatible with a
>PXELINUX config which most people are used to. Debian's own d-i images
>ship with such a configuration to this day and this could be an
>out-of-the box alternative.
>
>2) iPXE: this is widely used in both PXE and EFI configurations. QEMU is
>even using it to netboot by default. It has a flexible configuration
>language, lots of features out of the box, and a much, much, much
>cleaner codebase than GRUB.  Their documentation is far more superior
>too. They even have a page with instructions for how one can submit iPXE
>to Microsoft to get it SB-signed[6] and there are reports on the web
>that Microsoft has actually signed[7] of their versions.
>
>6: http://ipxe.org/appnote/etoken
>7: https://twitter.com/ipxe/status/331176286972157953
>
>The request here is for Debian w/ Shim to support an alternative to GRUB
>out of the box, and to sign iPXE and/or syslinux. These are alternatives
>that are clearly superior in features, stability -and, dare I say,
>security- over GRUB and Debian shouldn't artificially limit our choices
>to just one.

There's no way we're going to sign syslinux, I'm afraid - there has
been no support added for locking down boot (i.e. only booting a
signed kernel). Without that, Secure Boot would be a total joke. And
if you're worried about Grub development, I'd be even more worried
about syslinux. I'm on both mailing lists, and there's massively more
development happening in the Grub world.

>An alternative to this proposal would be for Debian to submit e.g. iPXE
>separately to Microsoft for signatures and not use this in combination
>with shim. I believe this doesn't fit with the overall strategy that
>Debian and other distributions have chosen around Secure Boot with shim,
>but... I am really not an expert :)

iPXE at least appears to be currently under development, but again I
don't see any obvious lockdown patches at all. Feel free to correct me
if you know of any work for that - I've only had a cursory look. SB
wit

Bug#930356: CVE-2019-12760

2019-06-19 Thread Andreas Tille
Hi Piotr

> Please see https://bugzilla.redhat.com/show_bug.cgi?id=1718212
> 
> Patch is at https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7

I know you are usually pretty quick in solving serious issues.  I tried
to check the issue and think the link provided for a patch is just
pointing to a proof of concept exploit.  When reading the discussion
here

   https://github.com/davidhalter/parso/issues/75

I understand that it is not fixed but the authors do not consider the
issue serious.  Could you please give some comment from an insiders
point of view (which I'm not).  I'm just caring since several Debian
Science dependencies are about to be removed from testing due to this
bug.

Kind regards

   Andreas.

PS: Is there any reason why this package is not on Salsa and not
team maintained?

-- 
http://fam-tille.de



Bug#846935: inadyn: New upstream release available, v2.1

2019-06-19 Thread jim_p
Package: inadyn
Followup-For: Bug #846935

I was about to file a bug report about updating inadyn. The version on the repo
is ~6 years old and even this bug report is ~2 years old.
Today, inadyn is on v2.5. In fact, It has been at v2.5 since September 2018! So
please update it.



-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/2 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages inadyn depends on:
ii  adduser  3.118
ii  libc62.28-10

inadyn recommends no packages.

inadyn suggests no packages.



Bug#930740: unblock: debian-junior/1.29

2019-06-19 Thread Andreas Tille
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package debian-junior


As in every release process I have updated several Blends metapackages
which needed updates due to package removals to reflect the package pool
of the release.  These metapackages are created using the latest
blends-dev package.

The changes in the debian-junior package are to a large extend auto
generated by blends-dev and the full debdiff (attached
debian-junior_1.28-1.29.diff.gz) is a bit hard to read because the files in
tasks/ are serving at the same time used as documentation for the Debian
Med web sentinel.  There is no reasonable way to maintain this in a
separate source so the diff is larger than you would usually accept
these days.  This was done in the same way for several previous
releases.

To enable you concentrating on the *relevant* changes which are caused
due to changes in the package pool I added 

   wdiff debian-junior-1.28/debian/control debian-junior-1.29/debian/control > 
debian-junior_control_1.28-1.29.wdiff

which is more easy to inspect to see what relevant changes in the
dependencies have actually happended (see
debian-junior_control_1.28-1.29.wdiff.gz).

Kind regards

   Andreas.

unblock debian-junior/1.29

-- System Information:
Debian Release: 9.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


debian-junior_1.28-1.29.diff.gz
Description: application/gzip


debian-junior_control_1.28-1.29.wdiff.gz
Description: application/gzip


Bug#929129: [Pkg-xen-devel] Bug#929129: closed by Hans van Kranenburg (Bug#929129: fixed in xen 4.11.1+92-g6c33308a8d-1)

2019-06-19 Thread Hans van Kranenburg
On 6/19/19 4:43 PM, Wiebe Cazemier wrote:
> This is an update to the unstable release. What is one running Debian
> stable (9), with Xen Hypervisor 4.8, to do?

This is not meant as a middle finger to users of stable.

All of the bug numbers will be closed twice, also by the 4.8 upload,
which also has to mention them. This is confusing, however the automated
behaviour after uploading any of them is to close the bug with that report.

At least the 4.11 is out now, last thing I heard about 4.8 was that
there are issues compiling the current 4.8-stable upstream branch in
Stretch, and that's quite an important prerequisite for continuing. :|
Ian needs to work on that.

I will see if I can manipulate them a bit. All the other ones mentioned
in the changelog should also have the info that it's found in current
version in stable attached to them, so that the version graph shows both.

Hans



Bug#930691: s-nail chops off two characters off of the Kerberos hostname when using gssapi auth

2019-06-19 Thread Ivan Vučica
On Wed, Jun 19, 2019 at 2:56 PM Steffen Nurpmeso  wrote:
> > What would be further useful debugging or tracing information to
> > share?
>
> In general our -d or -vv switches would be nice. ^_^

Here's with -d:

```
s-nail: No such file to load: /usr/local/etc/s-nail.rc
s-nail: Loading /home/ivucica/.mailrc
s-nail: LOAD 0 bytes <>
s-nail: LOAD 22 bytes <#set imap-use-starttls>
s-nail: LOAD 0 bytes <>
s-nail: LOAD 17 bytes 
s-nail: COMMAND  mydomain {
s-nail: LOAD 52 bytes <  set folder=imap://ivuc...@myhostname.ds.mydomain.net>
s-nail: LOAD 18 bytes <  set record=+Sent>
s-nail: LOAD 22 bytes <  set imap-auth=gssapi>
s-nail: LOAD 45 bytes <  ##set from="myname@myisp.example (My Name)">
s-nail: LOAD 33 bytes <  #  #set smtp=smtp.myisp.example>
s-nail: LOAD 1 bytes <}>
s-nail: LOAD 15 bytes 
s-nail: COMMAND  mydomain
s-nail: MACRO 50 bytes 
s-nail: COMMAND  folder=imap://ivuc...@myhostname.ds.mydomain.net
s-nail: MACRO 16 bytes 
s-nail: COMMAND  record=+Sent
s-nail: MACRO 20 bytes 
s-nail: COMMAND  imap-auth=gssapi
s-nail: MACRO 43 bytes <##set from="myname@myisp.example (My Name)">
s-nail: MACRO 31 bytes <#  #set smtp=smtp.myisp.example>
s-nail: LOAD 0 bytes <>
s-nail: LOAD 31 bytes <#set MAIL=/home/ivucica/Maildir>
s-nail: LOAD 16 bytes <#set folder mail>
s-nail: LOAD 0 bytes <>
s-nail: Obsoletion warning: no more expansion of *folder* in "%":
please set *inbox*
s-nail: Obsoletion warning: Use of old-style credentials, which will
vanish in v15!
  Please read the manual section "On URL syntax and credential lookup"
s-nail: Credentials: host ivuc...@myhostname.ds.mydomain.net, user ivucica, pass
s-nail: Resolving host myhostname.ds.mydomain.net:imap ... done
s-nail: Connecting to 10.0.0.150:imap ...  connected.
s-nail: P(seudo)R(andom)N(umber)G(enerator): *TLS RAND_*
s-nail: >>> SERVER: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR
LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=GSSAPI
AUTH=LOGIN] Dovecot ready.
>>> T1 CAPABILITY
>>> SERVER: * CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE 
>>> IDLE STARTTLS AUTH=PLAIN AUTH=GSSAPI AUTH=LOGIN
>>> SERVER: T1 OK Pre-login capabilities listed, post-login capabilities have 
>>> more.
[6655] 1560952720.212825: ccselect module realm chose cache
FILE:/tmp/krb5cc_501 with client principal ivuc...@ds.mydomain.net for
server principal imap/myhostname.ds.mydomain@ds.mydomain.net
[6655] 1560952720.212826: Getting credentials ivuc...@ds.mydomain.net
-> imap/myhostname.ds.mydomain@ds.mydomain.net using ccache
FILE:/tmp/krb5cc_501
[6655] 1560952720.212827: Retrieving ivuc...@ds.mydomain.net ->
imap/myhostname.ds.mydomain@ds.mydomain.net from
FILE:/tmp/krb5cc_501 with result: 0/Success
[6655] 1560952720.212829: Creating authenticator for
ivuc...@ds.mydomain.net ->
imap/myhostname.ds.mydomain@ds.mydomain.net, seqnum 920437301,
subkey rc4-hmac/47F8, session key rc4-hmac/6715
[6655] 1560952720.212830: Negotiating for enctypes in authenticator:
aes256-cts, aes128-cts, aes256-sha2, aes128-sha2, des3-cbc-sha1,
rc4-hmac, camellia128-cts, camellia256-cts
>>> T2 AUTHENTICATE GSSAPI
>>> SERVER: +
>>> YIIFhgOMITTING-WHAT-LOOKS-LIKE-CREDENTIALS3tM=
>>> SERVER: + YIGVBOMITTING-WHAT-LOOKS-LIKE-CREDENTIALSZIXw=
[6655] 1560952720.212835: Read AP-REP, time 1560952720.212831, subkey
aes256-cts/B91D, seqnum 73895367
>>>
>>> SERVER: + BQOMITTINGu58=
>>> BQCREDENTIALS8E=
>>> SERVER: T2 NO [AUTHENTICATIONFAILED] Authentication failed.
IMAP error: [AUTHENTICATIONFAILED] Authentication failed.
```

It is really hard to follow the debug info given, and the amount of
info changed between the old and new s-nail. But eyeballing the
credentials sent in both versions, there is nothing obviously damaged
in authentication lines.

I could be wrong, of course.

>   ...
>  |ivucica@myhostname:~$ klist
>  |Credentials cache: FILE:/tmp/krb5cc_501
>  |Principal: ivuc...@ds.mydomainname.net
>  |
>  |  IssuedExpires   Principal
>  |Jun 19 11:25:37 2019  Jun 19 21:25:37 2019  krbtgt/DS.MYDOMAINNAME.NET@D\
>  |S.MYDOMAINNAME.NET \
>  ...
>  fail
>  ...

No, this is actually success. I kdestroyed the ticket cache
beforehand, and kinited.

This is the 'krbtgt' - 'kerberos ticket-granting-ticket' which is used
to get service-specific tickets.

I pasted this to demonstrate that GSSAPI is invoked correctly to
obtain the service-specific ticket when launching the newly-built
s-nail. That is: GSSAPI manages to get
imap/myhostname.ds.mydomain@ds.mydomainname.net ticket, usable to
authenticate against Dovecot.

>  |ivucica@myhostname:~$ klist
>  |Credentials cache: FILE:/tmp/krb5cc_501
>  |Principal: ivuc...@ds.mydomainname.net
>  |
>  |  IssuedExpires   Principal
>  |Jun 19 11:25:37 2019  Jun 19 21:25:37 2019  krbtgt/DS.MYDOMAINNAME.NET@D\
>  |S.MYDOMAINNAME.NET \
>  |
>  |Jun 19 11:25:42 2019  Jun 19 21:25:37 2019  i

Bug#930739: unblock: debichem/0.0.8

2019-06-19 Thread Andreas Tille
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package debichem


As in every release process I have updated several Blends metapackages
which needed updates due to package removals to reflect the package pool
of the release.  These metapackages are created using the latest
blends-dev package.

The changes in the debichem package are to a large extend auto
generated by blends-dev and the full debdiff (attached
debichem_0.0.7-0.0.8.diff.gz) is a bit hard to read because the files in
tasks/ are serving at the same time used as documentation for the Debian
Med web sentinel.  There is no reasonable way to maintain this in a
separate source so the diff is larger than you would usually accept
these days.  This was done in the same way for several previous
releases.

To enable you concentrating on the *relevant* changes which are caused
due to changes in the package pool I added 

   wdiff debichem-0.0.7/debian/control debichem-0.0.8/debian/control > 
debichem_control_0.0.7-0.0.8.wdiff

which is more easy to inspect to see what relevant changes in the
dependencies have actually happended (see
debichem_control_0.0.7-0.0.8.wdiff.gz).

Kind regards

   Andreas.

unblock debichem/0.0.8

-- System Information:
Debian Release: 9.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#930720: Dependency "linux-headers-xyz" missing, needed for BPF compilation

2019-06-19 Thread Ritesh Raj Sarraf
On Wed, 2019-06-19 at 14:30 +, Cirujano Cuesta, Silvano wrote:
> Hi Ritesh,
> 
> Thanks for quick answers and the link to the enlightening bug report!
> 
> I'm nevertheless the opinion, that some kind of more helpful
> reporting should be used.

If you care for it, you can come up with something similar to what
systemtap does. It is good enough but it would still need to be
documented somewhere to use the prep tool.

rrs@priyasi:~$ stap-prep 
You need package linux-image-4.19.0-5-amd64-dbgsym but it does not seem to be 
available
 Debian -dbgsym packages are typically in a separate repository
 Follow https://wiki.debian.org/AutomaticDebugPackages to add this repository
Be root or adduser rrs stapusr
Be root or adduser rrs stapdev
20:26 ♒♒♒   ☺ 😄

PS: And now, as of today, this tool has become incorrect in its reporting. 
Something I need to fix again
and push upstream to systemtap. One more reason why I rather prefer to document 
and instruct people to
find the relevant files rather than hardcoding their names.

> Perhaps upstream?

I am not sure about upstream's view but you can check with them.


-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System


signature.asc
Description: This is a digitally signed message part


Bug#930738: unblock: debian-science/1.10

2019-06-19 Thread Andreas Tille
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package debian-science

As in every release process I have updated several Blends metapackages
which needed updates due to package removals to reflect the package pool
of the release.  These metapackages are created using the latest
blends-dev package.

The changes in the debian-science package are to a large extend auto
generated by blends-dev and the full debdiff (attached
debian-science_1.9-1.10.diff.gz) is a bit hard to read because the files in
tasks/ are serving at the same time used as documentation for the Debian
Med web sentinel.  There is no reasonable way to maintain this in a
separate source so the diff is larger than you would usually accept
these days.  This was done in the same way for several previous
releases.

To enable you concentrating on the *relevant* changes which are caused
due to changes in the package pool I added 

   wdiff debian-science-1.9/debian/control debian-science-1.10/debian/control > 
debian-science_control_1.9-1.10.wdiff

which is more easy to inspect to see what relevant changes in the
dependencies have actually happended (see
debian-science_control_1.9-1.10.wdiff.gz).

Kind regards

   Andreas.

unblock debian-science/1.10

-- System Information:
Debian Release: 9.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


debian-science_1.9-1.10.diff.gz
Description: application/gzip


debian-science_control_1.9-1.10.wdiff.gz
Description: application/gzip


Bug#930720: Dependency "linux-headers-xyz" missing, needed for BPF compilation

2019-06-19 Thread Cirujano Cuesta, Silvano
Hi Ritesh,

Thanks for quick answers and the link to the enlightening bug report!

I'm nevertheless the opinion, that some kind of more helpful reporting should 
be used.
Perhaps upstream?

BR,
  Silvano

On Wed, 2019-06-19 at 17:39 +0530, Ritesh Raj Sarraf wrote:
> On Wed, 2019-06-19 at 09:21 +, Cirujano Cuesta, Silvano wrote:
> > IMHO it should be a "Depends" dependency, or at least a "Recommends"
> > dependency.
> 
> We can't do that. The same is explained in the following bug report:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877925
> 
> That is the reason I documented it into the README.Debian file. This is
> similar to the case of the systemtap package. Both of which serve
> similar purposes.
> 
> Thanks,
> Ritesh
> 


Bug#930670: unblock: rabbitmq-server/3.7.8-5

2019-06-19 Thread Thomas Goirand
On 6/19/19 6:47 AM, Paul Gevers wrote:
> Hi Thomas,
> 
> On 18-06-2019 09:42, Thomas Goirand wrote:
>> This last Debian release adds the packaging of rabbitmq-diagnostic in
>> /usr/sbin, which is a very useful tool. It'd be a diss-service to our
>> users to not have it in Buster, and I don't think this is controvertial
>> at all. Not counting the removal of debian/gbp.conf (which we don't use
>> anymore), the attached debdiff is a one-liner.
>>
>> unblock rabbitmq-server/3.7.8-5
> 
> Sorry, too late. We want to release in two weeks and adding new features
> is a station long past.
> 
> I spent quite some time thinking about it as this particular change
> seems acceptable as an exception, however I fear the precedent will make
> our future work more difficult as it will invite more request that don't
> qualify and need careful analysis. People are reading these reports.
> 
> Paul
> 

I do understand it's not a nice timing for such an update, even if it's
very minimal. Maybe it will be accepted as a buster-proposed-update for
the first point release, then?

FYI, monitoring of RabbitMQ is a mission-critical thing, and I just
missed this new binary from upstream which simplifies A LOT the
monitoring of RabbitMQ, which is the source of 99% of the troubles on an
OpenStack cluster. I really want to bring this to Buster users.

Cheers,

Thomas Goirand (zigo)



  1   2   >