Bug#1016509: libgetfem-dev,libgetfem5,libgmm-dev: missing Breaks+Replaces on their getfem++ counterparts

2022-08-01 Thread Andreas Beckmann
Followup-For: Bug #1016509

Do not forget python3-getfem:

  Unpacking python3-getfem (5.4.1+dfsg1-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/python3-getfem_5.4.1+dfsg1-1_amd64.deb (--unpack):
   trying to overwrite '/usr/lib/python3/dist-packages/getfem/__init__.py', 
which is also in package python3-getfem++ 5.3+dfsg1-4.2
  dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/libgetfem5_5.4.1+dfsg1-1_amd64.deb
   /var/cache/apt/archives/python3-getfem_5.4.1+dfsg1-1_amd64.deb


Andreas



Bug#1016511: python3-pydevd: missing Breaks+Replaces: python3-omegaconf (<< ???)

2022-08-01 Thread Andreas Beckmann
Package: python3-pydevd
Version: 2.8.0+git20220714.32dee0b+dfsg-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Control: block -1 with 1016510

Hi,

during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#overwriting-files-and-replacing-packages-replaces

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package python3-pydevd.
  Preparing to unpack 
.../python3-pydevd_2.8.0+git20220714.32dee0b+dfsg-2_amd64.deb ...
  Unpacking python3-pydevd (2.8.0+git20220714.32dee0b+dfsg-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/python3-pydevd_2.8.0+git20220714.32dee0b+dfsg-2_amd64.deb
 (--unpack):
   trying to overwrite 
'/usr/lib/python3/dist-packages/pydevd_plugins/__init__.py', which is also in 
package python3-omegaconf 2.1.0~rc1-3
  Errors were encountered while processing:
   
/var/cache/apt/archives/python3-pydevd_2.8.0+git20220714.32dee0b+dfsg-2_amd64.deb

python3-omegaconf still needs to drop the conflicting files (#1016510),
so my guess would be that you need to add

  Breaks+Replaces: python3-omegaconf (<< 2.1.0~rc1-4~)


cheers,

Andreas


python3-omegaconf=2.1.0~rc1-3_python3-pydevd=2.8.0+git20220714.32dee0b+dfsg-2.log.gz
Description: application/gzip


Bug#1016510: python3-omegaconf: ships /usr/lib/python3/dist-packages/pydevd_plugins/__init__.py, now in python3-pydevd, too

2022-08-01 Thread Andreas Beckmann
Package: python3-omegaconf
Version: 2.1.0~rc1-3
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package python3-pydevd.
  Preparing to unpack 
.../python3-pydevd_2.8.0+git20220714.32dee0b+dfsg-2_amd64.deb ...
  Unpacking python3-pydevd (2.8.0+git20220714.32dee0b+dfsg-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/python3-pydevd_2.8.0+git20220714.32dee0b+dfsg-2_amd64.deb
 (--unpack):
   trying to overwrite 
'/usr/lib/python3/dist-packages/pydevd_plugins/__init__.py', which is also in 
package python3-omegaconf 2.1.0~rc1-3
  Errors were encountered while processing:
   
/var/cache/apt/archives/python3-pydevd_2.8.0+git20220714.32dee0b+dfsg-2_amd64.deb

python3-pydevd was recently introduced into the archive, please stop
shipping the conflicting files:

usr/lib/python3/dist-packages/pydevd_plugins/__init__.py
usr/lib/python3/dist-packages/pydevd_plugins/extensions/__init__.py


cheers,

Andreas


python3-omegaconf=2.1.0~rc1-3_python3-pydevd=2.8.0+git20220714.32dee0b+dfsg-2.log.gz
Description: application/gzip


Bug#1016509: libgetfem-dev,libgetfem5,libgmm-dev: missing Breaks+Replaces on their getfem++ counterparts

2022-08-01 Thread Andreas Beckmann
Package: libgetfem-dev,libgetfem5,libgmm-dev
Version: 5.4.1+dfsg1-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#overwriting-files-and-replacing-packages-replaces

>From the attached log (scroll to the bottom...):

  Preparing to unpack .../libgetfem5_5.4.1+dfsg1-1_amd64.deb ...
  Unpacking libgetfem5:amd64 (5.4.1+dfsg1-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/libgetfem5_5.4.1+dfsg1-1_amd64.deb (--unpack):
   trying to overwrite '/usr/lib/x86_64-linux-gnu/libgetfem.so.5', which is 
also in package libgetfem5++:amd64 5.3+dfsg1-4.2
  Preparing to unpack .../libgmm-dev_5.4.1+dfsg1-1_amd64.deb ...
  Unpacking libgmm-dev (5.4.1+dfsg1-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/libgmm-dev_5.4.1+dfsg1-1_amd64.deb (--unpack):
   trying to overwrite '/usr/include/gmm/getfem_arch_config.h', which is also 
in package libgmm++-dev 5.3+dfsg1-4.2
  dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
  Preparing to unpack .../libgetfem-dev_5.4.1+dfsg1-1_amd64.deb ...
  Unpacking libgetfem-dev (5.4.1+dfsg1-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/libgetfem-dev_5.4.1+dfsg1-1_amd64.deb (--unpack):
   trying to overwrite '/usr/bin/getfem-config', which is also in package 
libgetfem++-dev 5.3+dfsg1-4.2
  dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/libgetfem5_5.4.1+dfsg1-1_amd64.deb
   /var/cache/apt/archives/libgmm-dev_5.4.1+dfsg1-1_amd64.deb
   /var/cache/apt/archives/libgetfem-dev_5.4.1+dfsg1-1_amd64.deb


cheers,

Andreas


libgetfem++-dev=5.3+dfsg1-4.2_libgetfem-dev=5.4.1+dfsg1-1.log.gz
Description: application/gzip


Bug#1016508: rapiddisk,rapiddisk-dkms: both ship /usr/src/rapiddisk-8.2.0-2/*

2022-08-01 Thread Andreas Beckmann
Package: rapiddisk,rapiddisk-dkms
Version: 8.2.0-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package rapiddisk-dkms.
  Preparing to unpack .../rapiddisk-dkms_8.2.0-2_all.deb ...
  Unpacking rapiddisk-dkms (8.2.0-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/rapiddisk-dkms_8.2.0-2_all.deb (--unpack):
   trying to overwrite '/usr/src/rapiddisk-8.2.0-2/Makefile', which is also in 
package rapiddisk 8.2.0-2
  Errors were encountered while processing:
   /var/cache/apt/archives/rapiddisk-dkms_8.2.0-2_all.deb

BTW, you should only use the upstream version without Debian revision
for the path in /usr/src, i.e. /usr/src/rapiddisk-8.2.0/

cheers,

Andreas


rapiddisk=8.2.0-2_rapiddisk-dkms=8.2.0-2.log.gz
Description: application/gzip


Bug#1016507: ITP: python-intervals -- tools for handling intervals (ranges of comparable objects) in python

2022-08-01 Thread Joseph Nahmias
Package: wnpp
Severity: wishlist
Owner: Joseph Nahmias 
X-Debbugs-Cc: debian-de...@lists.debian.org, debian-pyt...@lists.debian.org, 
j...@nahmias.net, kon...@fastmonkeys.com

* Package name: python-intervals
  Version : 0.9.2
  Upstream Author : Konsta Vesterinen 
* URL : https://github.com/kvesteri/intervals
* License : BSD
  Programming Lang: Python
  Description : tools for handling intervals (ranges of comparable objects) 
in python

 This package provides objects, methods, constructors and functions for
 representing and manipulating mathematical intervals. Included are
 factory methods for creating intervals objects, comparison operators,
 set operators, and arithmetic functions.



Bug#1016506: libghc-shake-{doc,dev,data}: all ship /usr/lib/haskell-packages/extra-packages/shake-0.19.6

2022-08-01 Thread Andreas Beckmann
Package: libghc-shake-doc,libghc-shake-dev,libghc-shake-data
Version: 0.19.6-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files.

>From the attached log (scroll to the bottom...):

...
  Selecting previously unselected package libghc-shake-data.
  Preparing to unpack .../12-libghc-shake-data_0.19.6-1_all.deb ...
  Unpacking libghc-shake-data (0.19.6-1) ...
  dpkg: error processing archive 
/tmp/apt-dpkg-install-2iAjjB/12-libghc-shake-data_0.19.6-1_all.deb (--unpack):
   trying to overwrite '/usr/lib/haskell-packages/extra-packages/shake-0.19.6', 
which is also in package libghc-shake-doc 0.19.6-1
  Selecting previously unselected package libghc-unordered-containers-dev.
  Preparing to unpack 
.../13-libghc-unordered-containers-dev_0.2.17.0-2+b1_amd64.deb ...
  Unpacking libghc-unordered-containers-dev (0.2.17.0-2+b1) ...
  Selecting previously unselected package libghc-utf8-string-dev.
  Preparing to unpack .../14-libghc-utf8-string-dev_1.0.2-1+b1_amd64.deb ...
  Unpacking libghc-utf8-string-dev (1.0.2-1+b1) ...
  Selecting previously unselected package libghc-shake-dev.
  Preparing to unpack .../15-libghc-shake-dev_0.19.6-1_amd64.deb ...
  Unpacking libghc-shake-dev (0.19.6-1) ...
  dpkg: error processing archive 
/tmp/apt-dpkg-install-2iAjjB/15-libghc-shake-dev_0.19.6-1_amd64.deb (--unpack):
   trying to overwrite '/usr/lib/haskell-packages/extra-packages/shake-0.19.6', 
which is also in package libghc-shake-doc 0.19.6-1
  Errors were encountered while processing:
   /tmp/apt-dpkg-install-2iAjjB/12-libghc-shake-data_0.19.6-1_all.deb
   /tmp/apt-dpkg-install-2iAjjB/15-libghc-shake-dev_0.19.6-1_amd64.deb
...


cheers,

Andreas


libghc-shake-doc=0.19.6-1_libghc-shake-dev=0.19.6-1.log.gz
Description: application/gzip


Bug#1016505: patch: Fix `Incorrect netdev->dev_addr` errors in linux-5.17+ patch

2022-08-01 Thread Diego Escalante Urrelo
Source: broadcom-sta
Version: 6.30.223.271-20
Severity: important
Tags: patch
X-Debbugs-Cc: die...@gnome.org

Dear Maintainer,

The patch for linux-5.17 deprecations incorrectly inverted the src/dest
of the copying of MAC addresses.

I have pushed a branch with the gbp-processed patch:
  https://salsa.debian.org/diegoe/broadcom-sta/-/tree/debian-diegoe-202208

I _think_ this potentially fixes two recent bugs that have the trace/bug
in the logs, but my card is a different PHY so I can't confirm that.

Here's the commit log for further explanation:

```
  d/patches: Fix the linux-5.17 deprecations patch

  The patch was enough to get things to build, but it accidentally
  inverted the direction of the copy of a few addresses.

  This was causing traces when the device address was set in the driver:

  ```
  wl :03:00.0 wlp3s0: Current addr:  NN NN NN NN NN NN 00 00 00 00 00 
00 00 00 00
  wl :03:00.0 wlp3s0: Expected addr: 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00
  [ cut here ]
  netdevice: wlp3s0: Incorrect netdev->dev_addr
  WARNING: CPU: 3 PID: 1178 at net/core/dev_addr_lists.c:517 
dev_addr_check.cold+0x43/0x7d
  (...)
  ```

  (where NN is the device MAC)

  Apparently this might be enough in some cards to make it impossible to
  connect to a network. See bugs below.

  See: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011529
  See: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016426
```

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.18.0-3-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_USER, TAINT_WARN, 
TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=UTF-8 (charmap=UTF-8) (ignored: LC_ALL set 
to en_US.UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1016504: ITP: wtforms-components -- various additional fields, validators and widgets for WTForms

2022-08-01 Thread Joseph Nahmias
Package: wnpp
Severity: wishlist
Owner: Joseph Nahmias 
X-Debbugs-Cc: debian-de...@lists.debian.org, debian-pyt...@lists.debian.org, 
j...@nahmias.net, kon...@fastmonkeys.com

* Package name: wtforms-components
  Version : 0.10.5
  Upstream Author : Konsta Vesterinen 
* URL : https://github.com/kvesteri/wtforms-components
* License : BSD
  Programming Lang: Python
  Description : various additional fields, validators and widgets for 
WTForms

 WTForms-Components provides enhanced versions of some WTForms HTML5
 fields and some additional new fields and validatiors.
 These enhancements include:
 .
  * DateTimeField
  * IntegerField
  * SelectField
  * SelectMultipleField
  * ColorField
  * NumberRangeField
  * PassiveHiddenField
  * Read-only fields
  * DateRange validator
  * Email validator
  * If validator
  * Unique Validator



Bug#1016482: jamulus: please add support for riscv64

2022-08-01 Thread Bo YU

Hi,
On Mon, Aug 01, 2022 at 03:31:36PM +, Thorsten Glaser wrote:

It can also be built successfully on big-endian platforms, but that
doesn’t mean it works correctly.

Upstream’s custom build for opus custom modes precludes adding more
architectures, but as #686777 seems to have been fixed I was intending
on permitting all architectures in an upload that can use this (I’ll
have to figure out how to use it first).

But as-is, this patch isn’t suitable.


Ok, thanks for let me know that. This is also what I worry about.
Maybe some packages can be built on riscv64 arch, but they may not work
as our imagination.

--
Regards,
--
  Bo YU



signature.asc
Description: PGP signature


Bug#1008816: ITP: kwin-bismuth -- KDE Plasma extension for tiling windows

2022-08-01 Thread Blake Lee
Hello!

I've moved over the repository into Salsa, updated it for the latest release 
`3.1.2`.

I've built it on my Sid desktop with sbuild, lintian reports no errors, and it 
the software is working as expected.

Let me know if you see anything you would change.

Thanks,
Blake

On Mon, Jul 25, 2022, at 12:32 PM, Blake Lee wrote:
> Okay sounds good, I'll get it moved over when I get some time.
> 
> I've been personally using and maintaining it for about 5 months now with no 
> issues. It's the best solution I've found for a good tiling experience in 
> KDE, previously I was using i3-gaps and picom, but there are a lot of minor 
> inconveniences with this route.
> 
> Additionally my packaging was officially included in Ubuntu 22.04, with some 
> changes to the debian files that I backported. I know there are at least some 
> users of it as it's posted on bismuth's official GitHub. I've only ever 
> received requests to update the package to a new upstream version.
> 
> On Mon, Jul 25, 2022, at 11:46 AM, Didier Raboud wrote:
>> Le lundi, 25 juillet 2022, 17.35:43 h CEST Blake Lee a écrit :
>> > As for the repo should I just mirror my current work from GitLab over to
>> > Salsa?
>> 
>> If that's working well for you, I'd say yes; having team-maintained packages 
>> in a common location makes most things easier; including common CI test 
>> scripts, team-at-large changes, etc.
>> 
>> *Attachments:*
>>  * signature.asc
> 


Bug#1016502: Acknowledgement (libsecret: FTBFS on hppa - test-session timeout is too small)

2022-08-01 Thread John David Anglin

Patch.

--
John David Anglin  dave.ang...@bell.net
Index: libsecret-0.20.5/libsecret/test-session.c
===
--- libsecret-0.20.5.orig/libsecret/test-session.c
+++ libsecret-0.20.5/libsecret/test-session.c
@@ -164,7 +164,7 @@ test_ensure_async_aes (Test *test,
gboolean ret;
 
secret_service_ensure_session (test->service, NULL, 
on_complete_get_result, );
-   egg_test_wait_until (500);
+   egg_test_wait_until (5000);
 
g_assert_true (G_IS_ASYNC_RESULT (result));
ret = secret_service_ensure_session_finish (test->service, result, 
);


Bug#1016502: libsecret: FTBFS on hppa - test-session timeout is too small

2022-08-01 Thread John David Anglin
Source: libsecret
Version: 0.20.5-2
Severity: normal
Tags: patch

Dear Maintainer,

The program test-session fails on hppa:
 6/21 libsecret:libsecret / test-session  FAIL 4.52s   
killed by signal 6 SIGABRT

See log:
https://buildd.debian.org/status/fetch.php?pkg=libsecret=hppa=0.20.5-2=1659391609=0

This can be fixed by increasing the timeout in test_ensure_async_aes:
https://buildd.debian.org/status/fetch.php?pkg=libsecret=hppa=0.20.5-2=1659395930=0

Regards,
Dave Anglin

-- System Information:
Debian Release: bookworm/sid
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable')
Architecture: hppa (parisc64)

Kernel: Linux 5.18.15+ (SMP w/4 CPU threads)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#1016055: fmtutil failed. Output has been stored in

2022-08-01 Thread Hilmar Preuße

Am 01.08.2022 um 09:22 teilte Klaus Ethgen mit:

Am So den 31. Jul 2022 um 22:02 schrieb Hilmar Preuße:


Hi Klaus,


This sounds like a full file system during installation, which can lead to
various issues like this. I suggest to close the issue as "caused by full
file system".


Could be but I suspect apt/dpkg to take care of that and fail graceful.

The install script of a package fails, hence apt declares the whole 
package installation to be not successful. apt can't do much in this 
situation except trying the script of the later version in the hope a 
script bug was fixed in the new version. This was not the case, the 
script failed (probably) due to a full file system. This is not uncommon 
when doing TL upgrades.


So, what do you expect? Should apt delete some random files and start 
over? apt could try to do some random system checks like "df -h", show 
users the results, so they get an idea why the installation failed. 
However this is an wishlist bug for apt, not a serious bug for "tex-common".


Can we close the issue here?

Hilmar
--
sigfault



OpenPGP_signature
Description: OpenPGP digital signature


Bug#990047: timeshift: Not possible to browse content of snapshot via the gui

2022-08-01 Thread Ludovic Poujol

Steeve,

Good question. And, you're right, thanks !

I thought it was some kind of "internal browser" provided with 
timeshift. But after looking more closely, it was actually trying to 
start VSCode ! :s And it's the one that do not like to be run as root.


Not sure why or how it decided to use it instead of the Gnome file 
browser. But apt remove of it "fixed" the issue.


I don't see any settings for that in the timeshift GUI. I'm not sure how 
I can force it to use the default gnome file browser :(



Thanks

--
Ludovic Poujol



Bug#1014633: linux-headers-5.19.0-rc4-common: file check-local-export does not exist

2022-08-01 Thread Ben Hutchings
On Sun, 2022-07-31 at 23:02 +0200, Andreas Beckmann wrote:
> Followup-For: Bug #1014633
> 
> What about adding a superficial autopkgtest that tries to compile a
> dummy third-party kernel module using kbuild? That should help noticing
> such breakage earlier.

This is such an obviously good idea that I already did it in version
5.18.14-1. :-)

Ben.

-- 
Ben Hutchings
Life would be so much easier if we could look at the source code.


signature.asc
Description: This is a digitally signed message part


Bug#1016486: wayfire: please make the build reproducible

2022-08-01 Thread Boyuan Yang
Control: forwarded -1 https://github.com/WayfireWM/wayfire/issues/1534

Bug forwarded upstream to have WF_SRC_DIR macro removed.

Thanks,
Boyuan Yang

在 2022-08-01星期一的 09:39 -0700,Chris Lamb写道:
> Source: wayfire
> Version: 0.7.4-1
> Severity: wishlist
> Tags: patch
> User: reproducible-bui...@lists.alioth.debian.org
> Usertags: buildpath
> X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org
> 
> Hi,
> 
> Whilst working on the Reproducible Builds effort [0] we noticed that
> wayfire could not be built reproducibly.
> 
> This is because it embedded an absolute build path into a config.h
> file. A patch is attached that fixes this value to a known/fixed
> value — the absolute build path won't exist at runtime anyway, so
> this is at least "no worse".
> 
>  [0] https://reproducible-builds.org/


signature.asc
Description: This is a digitally signed message part


Bug#1016500: README.Debian documents KillUserProcesses but not Linger

2022-08-01 Thread chrysn
Package: systemd
Version: 251.3-1
Severity: normal
File: /usr/share/doc/systemd/README.Debian.gz

The README.Debian file duefully documents the surprising[1] effects that
happen when using tmux or similar under in a logind session. However, it
only covers the KillUserProcesses part of things (a mechanism that
Debian thankfully disables by default), and not the linger part, which
has a similar (if not the same) effect and is set to kill by default.

Suggested new text, based on the current one:

> KillUserProcesses and linger behavior in Debian
> ===
> 
> If KillUserProcesses=yes is configured in logind.conf(5), the session scope
> will be terminated when the user logs out of that session.
>
> Likewise, processes launched by users configured as Linger=no (see
> loginctl(1)) are terminated.
> 
> See logind.conf(5):
> 
> | Note that setting KillUserProcesses=yes will break tools like screen(1) and
> | tmux(1), unless they are moved out of the session scope.
> 
> The default for KillUserProcesses in /etc/systemd/logind.conf is set
> to "yes" in upstream systemd, though Debian defaults to "no" (see #825394).
>
> The default Linger value for users is set to "no", and may need to be
> altered with `loginctl enable-linger ${USER}` to keep screen and tmux
> useful.

[1]: https://bugs.debian.org/1016475


-- Package-specific info:

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.18.0-3-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii  adduser3.123
ii  libacl12.3.1-1
ii  libaudit1  1:3.0.7-1+b1
ii  libblkid1  2.38-6
ii  libc6  2.33-8
ii  libcap21:2.44-1
ii  libcryptsetup122:2.5.0-1
ii  libfdisk1  2.38-6
ii  libgcrypt201.10.1-2
ii  libkmod2   30+20220630-3
ii  liblz4-1   1.9.3-2
ii  liblzma5   5.2.5-2.1
ii  libmount1  2.38-6
ii  libseccomp22.5.4-1+b1
ii  libselinux13.4-1+b1
ii  libssl33.0.5-1
ii  libsystemd-shared  251.3-1
ii  libsystemd0251.3-1
ii  libzstd1   1.5.2+dfsg-1
ii  mount  2.38-6

Versions of packages systemd recommends:
ii  dbus [default-dbus-system-bus]  1.14.0-2
ii  ntpsec [time-daemon]1.2.1+dfsg1-7+b1

Versions of packages systemd suggests:
ii  libfido2-11.11.0-1+b1
ii  libtss2-esys-3.0.2-0  3.2.0-1+b1
ii  libtss2-mu0   3.2.0-1+b1
ii  libtss2-rc0   3.2.0-1+b1
ii  policykit-1   0.105-33
pn  systemd-boot  
ii  systemd-container 251.3-1
pn  systemd-homed 
pn  systemd-userdbd   

Versions of packages systemd is related to:
ii  dbus-user-session  1.14.0-2
pn  dracut 
ii  initramfs-tools0.142
pn  libnss-systemd 
ii  libpam-systemd 251.3-1
ii  udev   251.3-1

-- no debconf information

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom


signature.asc
Description: PGP signature


Bug#1016474: [pkg-cryptsetup-devel] Bug#1016474: cryptsetup: The system installed on encrypted LVM (both root and swap partitions) freezes during massive writes

2022-08-01 Thread Christoph Anton Mitterer
On Mon, 2022-08-01 at 23:00 +0200, Wojciech Zabołotny wrote:
> BTW, that problem gives even more "interesting" results when one
> copies 
> a lot of data from or to the USB disc. The freeze of the system may 
> break the USB communication (unmounting the filesystem or remounting
> it 
> read-only due to errors) which may result in partially copied data.

I don't think I've ever observed that (though I simply might not have
copied data to USB, when I put heavy IO load on my dm-crypt).


Maybe a better place for this would be the cryptsetup mailing list
(though cryptsetup itself, is likely not the problem but rather dm-
crypt)... but there one may simply meet quite a number of experienced
people.

Cheers,
Chris.



Bug#1016499: cctbx: autopkgtest failure: Please run this program in an empty directory.

2022-08-01 Thread Paul Gevers

Source: cctbx
Version: 2021.12+ds1-7
Severity: serious
User: debian...@lists.debian.org
Usertags: fails-always

Dear maintainer(s),

You recently added an autopkgtest to your package cctbx, great. However, 
it fails. Currently this failure is blocking the migration to testing 
[1]. Can you please investigate the situation and fix it?


I copied some of the output at the bottom of this report.

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=cctbx

https://ci.debian.net/data/autopkgtest/testing/amd64/c/cctbx/23732580/log.gz

Testing with python3.10:
Sorry: Please run this program in an empty directory.
autopkgtest [21:14:13]: test command1



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1010469: [pkg-lxc-devel] Bug#1010469: Bug#1010437: autopkgtest: autopkgtest-build-lxc fails to build working lxc environment

2022-08-01 Thread Pierre-Elliott Bécue
Julian Gilbey  wrote on 08/06/2022 at 10:50:18+0200:

> notfixed 1010469 1:4.0.11-1
> thanks
>
>> I decided to reinstall my system from scratch, and now this bug has
>> gone away.  So as no-one else could reproduce it and I have no idea
>> what has changed on my system as a result of reinstalling, I'm closing
>> it with an "unreproducible" tag.
>
> Oh dear, oh dear, oh dear.  It's just happened again.
>
> I am so completely stumped by this one.

What apparmor profile are you trying to run your container with?

-- 
PEB


signature.asc
Description: PGP signature


Bug#1016496: nmu: abinit_9.6.2-1

2022-08-01 Thread Sebastiaan Couwenberg

On 8/1/22 22:34, Paul Gevers wrote:

On 01-08-2022 22:18, Bas Couwenberg wrote:
nmu abinit_9.6.2-1 . ANY . unstable . -m "Rebuild with libnetcdff7 (>= 
4.6.0+ds-1)"


To resolve the autopkgtest failure reported in #1016414, the package 
needs to be rebuilt.


That normally means it's papering over the real issue. Are you sure 
libnetcdff shouldn't have bumped it's SONAME?


Based on the symbols changes I'd say no, only a few new symbols were 
introduced.


But it's fortran of which I know little to nothing, so...

I don't want to diverge from upstream nor go through NEW for an issue I 
don't understand, so feel free to close this issue and we'll wait for 
autoremoval or a new upload.


Kind Regards,

Bas

--
 GPG Key ID: 4096R/6750F10AE88D4AF1
Fingerprint: 8182 DE41 7056 408D 6146  50D1 6750 F10A E88D 4AF1



Bug#1016498: rope: autopkgtest regression: No module named 'pkg_resources'

2022-08-01 Thread Paul Gevers

Source: rope
Version: 1.2.0-1
Severity: serious
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of rope the autopkgtest of rope fails in testing 
when that autopkgtest is run with the binary packages of rope from 
unstable. It passes when run with only packages from testing. In tabular 
form:


   passfail
rope   from testing1.2.0-1
all others from testingfrom testing

I copied some of the output at the bottom of this report. It seems to me 
you're just missing a new (test) dependency.


Currently this regression is blocking the migration to testing [1]. Can 
you please investigate the situation and fix it?


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=rope

https://ci.debian.net/data/autopkgtest/testing/amd64/r/rope/24208691/log.gz

Testing with python3.10:
Traceback (most recent call last):
  File "", line 1, in 
  File "/usr/lib/python3/dist-packages/rope/__init__.py", line 3, in 


from pkg_resources import get_distribution
ModuleNotFoundError: No module named 'pkg_resources'
autopkgtest [16:13:00]: test command1



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016496: nmu: abinit_9.6.2-1

2022-08-01 Thread Paul Gevers

Hi Bas,

On 01-08-2022 22:18, Bas Couwenberg wrote:

nmu abinit_9.6.2-1 . ANY . unstable . -m "Rebuild with libnetcdff7 (>= 
4.6.0+ds-1)"

To resolve the autopkgtest failure reported in #1016414, the package needs to 
be rebuilt.


That normally means it's papering over the real issue. Are you sure 
libnetcdff shouldn't have bumped it's SONAME?


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016497: node-fetch: CVE-2022-2596

2022-08-01 Thread Salvatore Bonaccorso
Source: node-fetch
Version: 3.2.9+~cs18.4.14-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for node-fetch.

CVE-2022-2596[0]:
| Denial of Service in GitHub repository node-fetch/node-fetch prior to
| 3.2.10.

TTBOMK it has introduced in v3.1.0 only so affects only the version in
experimental, but please double-check again.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-2596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2596

Regards,
Salvatore



Bug#937234: trying to remove python2.7 from bookworm

2022-08-01 Thread Paul Gevers

Hi all,

This is a heads up that we are trying to remove python2.7 from bookworm. 
Please either fix pam-python to use python3 or drop the dependency from 
debian-edu-config.


Paul
[Release Team member hat on]


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016495: mediathekview: fills up /var/log/syslog, /var/log/messages and /var/log/user.log with debug info

2022-08-01 Thread Michael Below
Package: mediathekview
Version: 13.2.1-4
Severity: important
X-Debbugs-Cc: be...@judiz.de

Dear Maintainer,

I have tried to use MediathekView again, after some time. First it would
not start, showing the logo with a progress bar at maybe 30% for maybe
10 minutes on several attempts. Then I moved my old .mediathek3 config
directory away. Now MediathekView started as expected. I chose the
detailed setup process, and before it had even downloaded all TV
programs I got a message that my log partition was full. It looks like
MediathekView is writing detailed java debug info to all available log
files. I have not touched any debug logging options.

IMHO flooding the log files is a security risk. MediathekView should
not write to system log files by default, and especially not debug info
to /var/log/syslog.

Thanks for your work!

Michael

-- System Information:
Debian Release: bookworm/sid
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'testing'), (500, 'stable'), (50, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.18.0-2-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages mediathekview depends on:
ii  default-jre [java9-runtime] 2:1.11-72
ii  java-wrappers   0.3
ii  libcommons-compress-java1.21-1
ii  libcommons-configuration2-java  2.8.0-1
ii  libcommons-dbcp2-java   2.9.0-1
ii  libcommons-lang3-java   3.12.0-2
ii  libcommons-pool2-java   2.11.1-1
ii  libcontrolsfx-java  11.0.0-1
ii  libguava-java   29.0-6
ii  libh2-java  2.1.212-1
ii  libjackson2-core-java   2.13.0-2
ii  libjchart2d-java3.2.2+dfsg2-3
ii  libjiconfont-font-awesome-java  4.7.0.0-2
ii  libjiconfont-java   1.0.0-2
ii  libjiconfont-swing-java 1.0.1-2
ii  libjide-oss-java3.7.6+dfsg-2
ii  liblog4j2-java  2.17.2-1
ii  libmbassador-java   1.3.1-2
ii  libmiglayout-java   5.1-3
ii  libokhttp-java  3.13.1-3
ii  libopenjfx-java 11.0.11+0-1
ii  libswingx-java  1:1.6.2-4
ii  libxz-java  1.9-1
ii  openjdk-11-jre [java9-runtime]  11.0.16+8-1
ii  openjdk-18-jre [java9-runtime]  18.0.2+9-2

Versions of packages mediathekview recommends:
ii  flvstreamer  2.1c1-1+b2
ii  mplayer  2:1.4+ds1-3+b1
ii  mpv  0.34.1-1+b4
ii  vlc  3.0.17.4-4+b1

Versions of packages mediathekview suggests:
ii  ffmpeg  7:5.0.1-3+b1

-- no debconf information



Bug#1016414: abinit: autopkgtest failure

2022-08-01 Thread Sebastiaan Couwenberg
Installing the dbgsym packages makes the backtrace a little more 
informative:


 Backtrace for this error:
 #0  0x7f889dd4b93f in ???
 at ./signal/../sysdeps/unix/sysv/linux/x86_64/sigaction.c:0
 #1  0x7f889e3c5518 in __netcdf_nc_interfaces_MOD_addcnullchar
 at ./fortran/module_netcdf_nc_interfaces.F90:2587
 #2  0x7f889e3b33b0 in nf_def_var_
 at ./fortran/nf_genvar.F90:63
 #3  0x7f889e427b8e in __netcdf_MOD_nf90_def_var_onedim
 at ./fortran/netcdf4_variables.F90:61
 #4  0x559ee1f317bf in __m_nctk_MOD_write_var_netcdf
 at ./shared/common/src/27_toolbox_oop/m_nctk.F90:2941
 #5  0x559ee1c23cd0 in __m_parser_MOD_prttagm
 at ./src/42_parser/m_parser.F90:3538
 #6  0x559ee1c2588f in __m_parser_MOD_prttagm_images
 at ./src/42_parser/m_parser.F90:3668
 #7  0x559ee18ae96f in __m_outvar_a_h_MOD_outvar_a_h
 at ./src/57_iovars/m_outvar_a_h.F90:191
 #8  0x559ee18ad8fa in __m_outvars_MOD_outvars
 at ./src/57_iovars/m_outvars.F90:371
 #9  0x559ee0bbfffd in abinit
 at ./src/98_main/abinit.F90:323
 #10  0x559ee0bbd88e in main
 at ./src/98_main/abinit.F90:88

Rebuilding with netcdf-fortan (4.6.0+ds-1) resolves the issue.

Kind Regards,

Bas

--
 GPG Key ID: 4096R/6750F10AE88D4AF1
Fingerprint: 8182 DE41 7056 408D 6146  50D1 6750 F10A E88D 4AF1



Bug#1016496: nmu: abinit_9.6.2-1

2022-08-01 Thread Bas Couwenberg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

nmu abinit_9.6.2-1 . ANY . unstable . -m "Rebuild with libnetcdff7 (>= 
4.6.0+ds-1)"

To resolve the autopkgtest failure reported in #1016414, the package needs to 
be rebuilt.

Kind Regards,

Bas



Bug#1015897: gobby: Gobby is crashing right after calling it

2022-08-01 Thread Andreas Tille
Hi Philipp,

Am Sun, Jul 31, 2022 at 06:12:55PM +0200 schrieb Philipp Kern:
> > It existed - but if I remove it no such dir is create newly.
> 
> And how about ~/.infinote-records and your homedir?

That dir existed in my homedir from former DebConfs when gobby worked.
If I rename it now and try gobby again it grashes as well.  When trying
under strace I get:


...
openat(AT_FDCWD, "/home/tillea/.infinote/", O_RDONLY|O_NOFOLLOW) = -1 ENOENT 
(No such file or directory)
openat(AT_FDCWD, "/home/tillea/.infinote/", O_RDONLY|O_NOFOLLOW) = -1 ENOENT 
(No such file or directory)
--- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0x7ffc14a99fe8} ---
+++ killed by SIGSEGV +++


I think I understand that issue now.  I have copied the configuration of
my current box from a former laptop where I used a symlink

   ln -s /home/andreas  /home/tillea

since ages ago I was using user tillea.  Currently I am

   $ whoami
   andreas
   $ echo $HOME
   /home/andreas

Since /home/tillea does not exist gobby can't create that dir.

OK, I think we found the reason - but IMHO gobby is buggy in two ways:

   1. It should simply use $HOME to create the dirs it needs (and not some
  "random" config which I would like to know to fix / remove it)
  and more importantly
   2. it should not crash SIGSEGV but rather print "can't create dir XY"

> FWIW, it does not crash for me on a new installation on bookworm.

I believe this now since I think I understood that issue (which I could
probably fix by the said symlink but I guess its better to find a real
solution. 

Kind regards

 Andreas.

-- 
http://fam-tille.de



Bug#1016184: additional information

2022-08-01 Thread Tim McConnell
I rebooted the system after getting the information requested and there
was messages when rebooting (while shutting down) about dpkg-exe and
percent completed. That process had to finish before it would finish
the reboot. 
-- 
Tim McConnell 



Bug#1016494: python2-pip: don't ship python2.7 with bookworm

2022-08-01 Thread Paul Gevers
Source: python2-pip
Version: 20.3.4+dfsg-4
Severity: serious

Dear maintainers,

I'm surprised to see there's no RC bug against python2-pip yet, but
we're trying to not ship python2.7 with bookworm, which means this
package has to go too, right?

Paul



Bug#1016474: [pkg-cryptsetup-devel] Bug#1016474: cryptsetup: The system installed on encrypted LVM (both root and swap partitions) freezes during massive writes

2022-08-01 Thread Christoph Anton Mitterer
On Mon, 2022-08-01 at 15:42 +0200, Guilhem Moulin wrote:
> Pretty sure most systems don't freeze under heavy
> write anyway :-)

I have that too... on basically every system with dm-crypt and high
memory.
I just thought it was a known issue of dm-crypt and never really digged
any deeper into it ^^

Also I don't use LVM anymore.


Whenever I write a lot of data it first goes fast (as if some buffer
would first be filled up) and then easily freezes the whole system
(until all data has been encrypted and written).
Sometimes it even freezes stuff which one would assume shouldn't need
any IO (clock applet in the desktop environment or even the mouse
cursor).


Cheers,
Chris.



Bug#1015873: libtirpc: diff for NMU version 1.3.2-2.1

2022-08-01 Thread Salvatore Bonaccorso
Control: tags 1015873 + patch
Control: tags 1015873 + pending


Dear maintainer,

I've prepared an NMU for libtirpc (versioned as 1.3.2-2.1) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

The corresponding merge request is at
https://salsa.debian.org/debian/libtirpc/-/merge_requests/1 .

Regards,
Salvatore
diff -Nru libtirpc-1.3.2/debian/changelog libtirpc-1.3.2/debian/changelog
--- libtirpc-1.3.2/debian/changelog	2021-08-17 17:16:38.0 +0200
+++ libtirpc-1.3.2/debian/changelog	2022-08-01 16:26:18.0 +0200
@@ -1,3 +1,10 @@
+libtirpc (1.3.2-2.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix DoS vulnerability in libtirpc (CVE-2021-46828) (Closes: #1015873)
+
+ -- Salvatore Bonaccorso   Mon, 01 Aug 2022 16:26:18 +0200
+
 libtirpc (1.3.2-2) unstable; urgency=medium
 
   * Upload to unstable
diff -Nru libtirpc-1.3.2/debian/patches/Fix-DoS-vulnerability-in-libtirpc.patch libtirpc-1.3.2/debian/patches/Fix-DoS-vulnerability-in-libtirpc.patch
--- libtirpc-1.3.2/debian/patches/Fix-DoS-vulnerability-in-libtirpc.patch	1970-01-01 01:00:00.0 +0100
+++ libtirpc-1.3.2/debian/patches/Fix-DoS-vulnerability-in-libtirpc.patch	2022-08-01 16:26:18.0 +0200
@@ -0,0 +1,180 @@
+From: Dai Ngo 
+Date: Sat, 21 Aug 2021 13:16:23 -0400
+Subject: Fix DoS vulnerability in libtirpc
+Origin: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=86529758570cef4c73fb9b9c4104fdc510f701ed
+Bug-Debian: https://bugs.debian.org/1015873
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2021-46828
+
+Currently svc_run does not handle poll timeout and rendezvous_request
+does not handle EMFILE error returned from accept(2 as it used to.
+These two missing functionality were removed by commit b2c9430f46c4.
+
+The effect of not handling poll timeout allows idle TCP conections
+to remain ESTABLISHED indefinitely. When the number of connections
+reaches the limit of the open file descriptors (ulimit -n) then
+accept(2) fails with EMFILE. Since there is no handling of EMFILE
+error this causes svc_run() to get in a tight loop calling accept(2).
+This resulting in the RPC service of svc_run is being down, it's
+no longer able to service any requests.
+
+RPC service rpcbind, statd and mountd are effected by this
+problem.
+
+Fix by enhancing rendezvous_request to keep the number of
+SVCXPRT conections to 4/5 of the size of the file descriptor
+table. When this thresold is reached, it destroys the idle
+TCP connections or destroys the least active connection if
+no idle connnction was found.
+
+Fixes: 44bf15b8 rpcbind: don't use obsolete svc_fdset interface of libtirpc
+Signed-off-by: dai@oracle.com
+Signed-off-by: Steve Dickson 
+---
+ INSTALL  | 371 +--
+ src/svc.c|  17 ++-
+ src/svc_vc.c |  62 -
+ 3 files changed, 78 insertions(+), 372 deletions(-)
+ mode change 100644 => 12 INSTALL
+
+diff --git a/src/svc.c b/src/svc.c
+index 6db164bbd76b..3a8709fe375c 100644
+--- a/src/svc.c
 b/src/svc.c
+@@ -57,7 +57,7 @@
+ 
+ #define max(a, b) (a > b ? a : b)
+ 
+-static SVCXPRT **__svc_xports;
++SVCXPRT **__svc_xports;
+ int __svc_maxrec;
+ 
+ /*
+@@ -194,6 +194,21 @@ __xprt_do_unregister (xprt, dolock)
+ rwlock_unlock (_fd_lock);
+ }
+ 
++int
++svc_open_fds()
++{
++	int ix;
++	int nfds = 0;
++
++	rwlock_rdlock (_fd_lock);
++	for (ix = 0; ix < svc_max_pollfd; ++ix) {
++		if (svc_pollfd[ix].fd != -1)
++			nfds++;
++	}
++	rwlock_unlock (_fd_lock);
++	return (nfds);
++}
++
+ /*
+  * Add a service program to the callout list.
+  * The dispatch routine will be called when a rpc request for this
+diff --git a/src/svc_vc.c b/src/svc_vc.c
+index f1d9f001fcdc..3dc8a75787e1 100644
+--- a/src/svc_vc.c
 b/src/svc_vc.c
+@@ -64,6 +64,8 @@
+ 
+ 
+ extern rwlock_t svc_fd_lock;
++extern SVCXPRT **__svc_xports;
++extern int svc_open_fds();
+ 
+ static SVCXPRT *makefd_xprt(int, u_int, u_int);
+ static bool_t rendezvous_request(SVCXPRT *, struct rpc_msg *);
+@@ -82,6 +84,7 @@ static void svc_vc_ops(SVCXPRT *);
+ static bool_t svc_vc_control(SVCXPRT *xprt, const u_int rq, void *in);
+ static bool_t svc_vc_rendezvous_control (SVCXPRT *xprt, const u_int rq,
+    	 void *in);
++static int __svc_destroy_idle(int timeout);
+ 
+ struct cf_rendezvous { /* kept in xprt->xp_p1 for rendezvouser */
+ 	u_int sendsize;
+@@ -313,13 +316,14 @@ done:
+ 	return (xprt);
+ }
+ 
++
+ /*ARGSUSED*/
+ static bool_t
+ rendezvous_request(xprt, msg)
+ 	SVCXPRT *xprt;
+ 	struct rpc_msg *msg;
+ {
+-	int sock, flags;
++	int sock, flags, nfds, cnt;
+ 	struct cf_rendezvous *r;
+ 	struct cf_conn *cd;
+ 	struct sockaddr_storage addr;
+@@ -379,6 +383,16 @@ again:
+ 
+ 	gettimeofday(>last_recv_time, NULL);
+ 
++	nfds = svc_open_fds();
++	if (nfds >= (_rpc_dtablesize() / 5) * 4) {
++		/* destroy idle connections */
++		cnt = __svc_destroy_idle(15);
++		if (cnt == 0) {
++			/* destroy least active */
++			

Bug#1015742: libspdlog1: ABI breakage without SONAME bump

2022-08-01 Thread Andreas Tille
Hi,

Am Tue, Aug 02, 2022 at 01:38:58AM +0800 schrieb Shengjing Zhu:
> To fix the ABI breakage in spdlog/1.10, I request the fmt/9 transition
> afterwards.
> Since with fmt/9 translation, spdlog ABI will bump to
> libspdlog1-fmt9(from libspdlog1-fmt8) anyway.

A, OK, I missed that point.  Feel free to revert my change.
 
> See my comments on #1016418.
> I'm not sure if the release team will be happy with that.

I see the situation is more complex than I've thought.

Thanks a lot for caring for it

  Andreas.

-- 
http://fam-tille.de



Bug#994704: timeshift: Unable to init server: connection refused. possible pkexec misconfiguration for timeshift-laucher command

2022-08-01 Thread Steve M
Bruno,

I've not been able to reproduce this problem. Does it still happen for
you?

Thanks
-Steve



Bug#1016493: unbound: CVE-2022-30698 CVE-2022-30699

2022-08-01 Thread Salvatore Bonaccorso
Source: unbound
Version: 1.16.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerabilities were published for unbound.

CVE-2022-30698[0]:
| NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable
| to a novel type of the "ghost domain names" attack. The vulnerability
| works by targeting an Unbound instance. Unbound is queried for a
| subdomain of a rogue domain name. The rogue nameserver returns
| delegation information for the subdomain that updates Unbound's
| delegation cache. This action can be repeated before expiry of the
| delegation information by querying Unbound for a second level
| subdomain which the rogue nameserver provides new delegation
| information. Since Unbound is a child-centric resolver, the ever-
| updating child delegation information can keep a rogue domain name
| resolvable long after revocation. From version 1.16.2 on, Unbound
| checks the validity of parent delegation records before using cached
| delegation information.


CVE-2022-30699[1]:
| NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable
| to a novel type of the "ghost domain names" attack. The vulnerability
| works by targeting an Unbound instance. Unbound is queried for a rogue
| domain name when the cached delegation information is about to expire.
| The rogue nameserver delays the response so that the cached delegation
| information is expired. Upon receiving the delayed answer containing
| the delegation information, Unbound overwrites the now expired
| entries. This action can be repeated when the delegation information
| is about to expire making the rogue delegation information ever-
| updating. From version 1.16.2 on, Unbound stores the start time for a
| query and uses that to decide if the cached delegation information can
| be overwritten.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-30698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30698
[1] https://security-tracker.debian.org/tracker/CVE-2022-30699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30699
[2] https://www.nlnetlabs.nl/downloads/unbound/CVE-2022-30698_CVE-2022-30699.txt
[3] 
https://github.com/NLnetLabs/unbound/commit/f6753a0f1018133df552347a199e0362fc1dac68

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1016090: python-django breaks lots of autopkgtests

2022-08-01 Thread Paul Gevers

Hi Chris,

On 01-08-2022 21:24, Chris Lamb wrote:

b) Wait for the 4.x stream to become designated LTS. I believe this
should happen with version 4.2, due for release in about 6 or 7
months:

   https://www.djangoproject.com/download/


That seems to happen after the Debian freeze starts. So please don't do 
that.


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1001776: yt-dlp: error message

2022-08-01 Thread Unit 193

Howdy,

On Mon, 1 Aug 2022, michel wrote:


Package: yt-dlp
Version: 2022.07.18-1~bpo11+1
Followup-For: Bug #1001776
X-Debbugs-Cc: okgomdjgbm...@gmail.com

Dear Maintainer,

I don't know if you care about this, but an error message asks to do a "yt-dlp 
-U"

please report this issue on  https://github.com/yt-dlp/yt-dlp/issues?q= , 
filling out the appropriate issue template. Confirm you are on the latest 
version using  yt-dlp -U


I wouldn't say that I wouldn't care, but yes my goal is to greatly limit 
patches added to yt-dlp.  That being said, I don't think it's even needed 
here at all.


When you run `yt-dlp -U` it checks online if you're running the current 
version and will print out the latest version online and your local 
version.  If you install via pip/package manager, it detects this and 
tells you to upgrade using those methods:


Latest version: 2022.07.18, Current version: 2022.07.17
ERROR: It looks like you installed yt-dlp with a package manager, pip or 
setup.py; Use that to update


As such, the initial error message basically just tells you to check your 
local version and that it matches the current release, which seems ideal 
to me.



 ~Unit 193
Unit193 @ Libera
Unit193 @ OFTC



Bug#990047: timeshift: Not possible to browse content of snapshot via the gui

2022-08-01 Thread Steve M
Ludovic,

This sounds to me like an issue with not being allowed to run your file
browser with root permissions. If this is still a problem for you,
which file browser are you using?

Thanks
-Steve



Bug#937085: [Pkg-mozext-maintainers] Bug#937085: mozilla-devscripts: Python2 removal in sid/bullseye

2022-08-01 Thread Paul Gevers

Hi Håvard, all,

On Wed, 27 Jul 2022 10:37:25 +0200 =?UTF-8?Q?H=c3=a5vard_F=2e_Aasen?= 
 wrote:

I have continued working on the redland-bindings package, cleaned it up a
bit, and enabled the Python 3 testsuite. I created an MR [1]. I believe 
redland-bindings is ready to be uploaded to NEW/unstable.


I just uploaded it to NEW/experimental. Which means that once accepted 
we can iron out mozilla-devscripts there too.



> To test that the Python 3 migration did not break anything, I would
> take a bunch of webext package (that build depend on mozilla-
> devscripts) and rebuild them (once with the current package and once
> with the Python 3 port). Then use diffoscope to compare the content of
> the two builds to be identical (same generated dependencies, same
> paths, etc). That should give us confidence to not break anything.

Did I look in the wrong place? when doing:
$ apt-cache rdepends mozilla-devscripts
Reverse Depends:
  devscripts

Which is only in the suggests section.


You need the reverse *build* depends.

paul@mulciber ~ $ reverse-depends -b mozilla-devscripts
Reverse-Testsuite-Triggers
* devscripts

Reverse-Build-Depends
* autofill-forms
* devscripts
* dispmua
* mozilla-noscript
* tinyjsd
* tree-style-tab
* umatrix

Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016090: python-django breaks lots of autopkgtests

2022-08-01 Thread Chris Lamb
Raphael Hertzog wrote:

> I'm surprised that we uploaded an non-LTS release to unstable.
>
> Chris, why did you do that?

Hmpf, this is deeply unfortunate. I was working under the incorrect
belief that the 4.0.x series was now the LTS branch. A number of
things encouraged this interpretation, including that the 4.0.x and
4.1.x were the release streams that were receiving security and
targeted bugfix releases, and this was happening as a relatively
consistent pair. (As in, not the 3.x stream.)

Regardless of that though, I think we have two options:

a) Revert back to the 3.2.14 LTS version in Debian unstable.

b) Wait for the 4.x stream to become designated LTS. I believe this
   should happen with version 4.2, due for release in about 6 or 7
   months:

  https://www.djangoproject.com/download/


Best wishes,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



Bug#1016491: freerdp2: Please package 2.8.0

2022-08-01 Thread Jeremy Bicha
Source: freerdp2
Version: 2.7.0+dfsg1-1
Severity: wishlist

Please package freerdp2 2.8.0. It's required by gnome-remote-desktop
43 for a new audio feature.

Thank you,
Jeremy Bicha



Bug#1016490: gnome-core: Switch default terminal app to gnome-console

2022-08-01 Thread Jeremy Bicha
Package: gnome-core
Version: 1:42+4
X-Debbugs-CC: debian-gtk-gn...@lists.debian.org

GNOME switched its default terminal app from gnome-terminal to
gnome-console in GNOME 42. We briefly discussed doing this in for
instance https://bugs.debian.org/1008805

Now that we are nearly at the end of the GNOME 43 development cycle,
we can continue the discussion.

The good news is that the blockers for basic Debian integration
(x-terminal-emulator and new tabs opening in current working
directory) are either fixed in 43 or there is a working merge proposal
available.

However, the upstream Console developers (and designers) were busy
with other things this cycle and there still isn't a preferences
dialog nor have there really been additions to the gsettings options
either. Therefore, I believe Fedora 37 will continue to use GNOME
Terminal by default. I also think our users will be happier with GNOME
Terminal for Debian 12 too.

Ubuntu 22.10 may switch to Console by default, but Ubuntu is at the
start of their LTS development cycle while Debian is at the end.

Thank you,
Jeremy Bicha



Bug#1010421: gir-to-d: FTBFS with ldc 1.29

2022-08-01 Thread Matthias Klumpp

severity 1010421 important
thankyou

Hi!
I'm reducing the severity since an easy-ish workaround is available and 
keeping this at a blocking severity prevents the workaround-included 
gir-to-d version to migrate.


This is still an important issue though which should be fixed for the 
release, as it might be triggered by pretty much any D code at compile-time.




Bug#1016475: tmux sessions do not persist through logout

2022-08-01 Thread Romain Francoise
Hi,

There’s nothing tmux can do right now about systemd killing user
sessions without lingering enabled; just run `sudo loginctl
enable-linger $USER`.

Thanks.



Bug#1016003: yt-dlp: little script

2022-08-01 Thread michel
Package: yt-dlp
Version: 2022.07.18-1~bpo11+1
Followup-For: Bug #1016003
X-Debbugs-Cc: okgomdjgbm...@gmail.com

Dear Maintainer,


I fleshed out the proposal a bit more. The simplest possibillity is to make 
symlinks, of both
the executable and module, to pretend they are youtube-dl and the module 
youyube_dl. This way,
also python programs that load the module could work.

A little bit better is this little wraper. you link the exec and module to it.

--
#!/usr/bin/python3

import sys
from yt_dlp import *

if __name__ == "__main__":

args=sys.argv.copy()
args.pop(0)
args=['--compat-options','youtube-dl']+args

main(args)



The compat options should improve the compatibility. Also, by using the cli 
options, it would
risk less of breaking over time and keeping a fix stupid proof. Maybe a final 
improvement,
would be to initialise the appropriate variable for the compatibility options, 
so that they
are active in the module also. This would have a higher risk of breaking.

I tested this with pafy(has an unrelated bug) and mpv on stable.

This should stay relevent, for a whille.



Bug#1004628: qtav: FTBFS with ffmpeg 5.0

2022-08-01 Thread Steven Robbins
Heads up for those following this bug: qtav appears to be unmaintained 
upstream.  

My only interest in the package was to enable video playback in digikam.  
Digikam upstream has taken most of the qtav  code, incorporated into digikam 
source tree and fixed it up.  The next release of digikam will not need qtav 
and therefore I will no longer be maintaining qtav. 

The only other usage in Debian I can find is "matrix-mirage" (which is itself 
orphaned).

My suggestion is to simply remove qtav from Debian.  If you do need qtav for 
some other purpose, please respond here and consider yourself the new 
maintainer.

Best,
-Steve


signature.asc
Description: This is a digitally signed message part.


Bug#1015742: libspdlog1: ABI breakage without SONAME bump

2022-08-01 Thread Shengjing Zhu
FTR,

To fix the ABI breakage in spdlog/1.10, I request the fmt/9 transition
afterwards.
Since with fmt/9 translation, spdlog ABI will bump to
libspdlog1-fmt9(from libspdlog1-fmt8) anyway.

See my comments on #1016418.
I'm not sure if the release team will be happy with that.

--
Shengjing Zhu



Bug#1016489: opendht: Prepare for new upstream version 2.4.9

2022-08-01 Thread Amin Bandali
Source: opendht
Version: 2.3.1-1
Severity: important
Tags: patch

Hello,

Please find attached the patch for preparing for new upstream version
2.4.9.  Please pull in the latest release after merging this.

>From 19922ba06d462b6af7873f8889ec39a41d99b857 Mon Sep 17 00:00:00 2001
From: Amin Bandali 
Date: Mon, 1 Aug 2022 12:29:29 -0400
Subject: [PATCH] Prepare for new upstream version 2.4.9

* d/watch: Tweak opts to use newly-suggested format in the current
  uscan(1) manual for GitHub repositories, helping correctly detect
  the new 2.4.9 release.
* d/patches: Refresh pkgconfig-static.patch for latest upstream
  release.
---
 debian/changelog  | 14 ++
 debian/patches/pkgconfig-static.patch |  2 +-
 debian/watch  |  4 ++--
 3 files changed, 17 insertions(+), 3 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index e8d06fe..46925d8 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,17 @@
+opendht (2.4.9-1) UNRELEASED; urgency=medium
+
+  [ Amin Bandali ]
+  * d/watch: Tweak opts to use newly-suggested format in the current
+uscan(1) manual for GitHub repositories, helping correctly detect
+the new 2.4.9 release.
+  * d/patches: Refresh pkgconfig-static.patch for latest upstream
+release.
+
+  [ Alexandre Viau ]
+  * New upstream version.
+
+ -- Alexandre Viau   Mon, 01 Aug 2022 12:12:12 -0500
+
 opendht (2.3.1-1) unstable; urgency=medium
 
   [ Amin Bandali ]
diff --git a/debian/patches/pkgconfig-static.patch b/debian/patches/pkgconfig-static.patch
index 9955b84..ff82a1b 100644
--- a/debian/patches/pkgconfig-static.patch
+++ b/debian/patches/pkgconfig-static.patch
@@ -8,7 +8,7 @@ Author: Alexandre Viau 
 +++ b/opendht.pc.in
 @@ -5,7 +5,7 @@
  Name: OpenDHT
- Description: C++14 Distributed Hash Table library
+ Description: C++17 Distributed Hash Table library
  Version: @VERSION@
 -Libs: -L${libdir} -lopendht
 +Libs: -L${libdir} -lopendht -lnettle -lgnutls -largon2 -lhttp_parser
diff --git a/debian/watch b/debian/watch
index b42aa67..31ca925 100644
--- a/debian/watch
+++ b/debian/watch
@@ -1,4 +1,4 @@
 version=4
-opts="filenamemangle=s%(?:.*?)?v?(\d[\d.]*)\.tar\.gz%@PACKAGE@-$1.tar.gz%" \
+opts="filenamemangle=s%(?:.*?)?v?(\d[\d.]*@ARCHIVE_EXT@)%@PACKAGE@-$1%" \
   https://github.com/savoirfairelinux/opendht/tags \
-  (?:.*?/)?@ANY_VERSION@@ARCHIVE_EXT@
+  (?:.*?/)?v?@ANY_VERSION@@ARCHIVE_EXT@
-- 
2.36.1



Bug#982459: mdadm examine corrupts host ext4

2022-08-01 Thread Håkan T Johansson


On Sun, 31 Jul 2022, Chris Hofstaedtler wrote:


I can't see a difference that should matter from userspace.

I have stared a bit at the kernel code... there have been quite some
changes and fixes in this area. Which kernel version were you
running when testing this?

Could you retry on something >= 5.9? I.e. some version with patch
   08fc1ab6d748ab1a690fd483f41e2938984ce353.


Dear Chris,

I believe that I was running 5.10 (bullseye).

It looks like 5.18 (from backports) does not show the issue!  (i.e. works)

Some more details:

I have now tried again:

host:
  linux-image-5.10.0-16-amd64   5.10.127-2
  mdadm 4.2-1~bpo11+1
chroot:
  mdadm 4.1-11

  Some more details:

  This time I did get some dmesg BUG output as well (attached).
  It does not seem to be the same backtrace on two occurances.

  I also noticed that the BUG: report in dmesg does not happen directly
  when doing 'mdadm --examine --scan --config=partitions'.  It rather
  occurs when some activity happens on the host filesystem, e.g.
  a 'touch /root/a' command.

host:
  linux-image-5.18.0-0.bpo.1-amd64  5.18.2-1~bpo11+1

  (did not re-install anything else, except upgraded zfs, also from
  backports (since pure bullseye would not compile with 5.18))

  Does not exhibit the problem.

I have tried with both kernels several times, and it was repeatable that 
5.10 got stuck while 5.18 does not show issues.


Reminder: to get the issue, /dev/ should not be mounted in the chroot.
With /dev/ mounted, 5.10 also works.

Best regards,
Håkan[mÃ¥n aug  1 15:53:08 2022] BUG: kernel NULL pointer dereference, address: 
0010
[mån aug  1 15:53:08 2022] #PF: supervisor read access in kernel mode
[mån aug  1 15:53:08 2022] #PF: error_code(0x) - not-present page
[mån aug  1 15:53:08 2022] PGD 0 P4D 0 
[mån aug  1 15:53:08 2022] Oops:  [#1] SMP PTI
[mån aug  1 15:53:08 2022] CPU: 2 PID: 284256 Comm: cron Tainted: P   
OE 5.10.0-16-amd64 #1 Debian 5.10.127-2
[mån aug  1 15:53:08 2022] Hardware name: Dell Computer Corporation PowerEdge 
2850/0T7971, BIOS A04 09/22/2005
[mån aug  1 15:53:08 2022] RIP: 
0010:__ext4_journal_get_write_access+0x29/0x120 [ext4]
[mån aug  1 15:53:08 2022] Code: 00 0f 1f 44 00 00 41 57 41 56 41 89 f6 41 55 
41 54 49 89 d4 55 48 89 cd 53 48 83 ec 10 48 89 3c 24 e8 ab d7 bb e1 48 8b 45 
30 <4c> 8b 78 10 4d 85 ff 74 2f 49 8b 87 e0 00 00 00 49 8b 9f 88 03 00
[mån aug  1 15:53:08 2022] RSP: 0018:ae27c059fd60 EFLAGS: 00010246
[mån aug  1 15:53:08 2022] RAX:  RBX: 9d1b94505480 RCX: 
9d1bc52e5e38
[mån aug  1 15:53:08 2022] RDX: 9d1bc13782d8 RSI: 0c14 RDI: 
c096feb0
[mån aug  1 15:53:08 2022] RBP: 9d1bc52e5e38 R08: 9d1be04d5230 R09: 
0001
[mån aug  1 15:53:08 2022] R10: 9d1bc985f000 R11: 001d R12: 
9d1bc13782d8
[mån aug  1 15:53:08 2022] R13: 9d1be04d5000 R14: 0c14 R15: 
9d1bc13782d8
[mån aug  1 15:53:08 2022] FS:  7fed5ecb1840() 
GS:9d1cd7c8() knlGS:
[mån aug  1 15:53:08 2022] CS:  0010 DS:  ES:  CR0: 80050033
[mån aug  1 15:53:08 2022] CR2: 0010 CR3: 0001a46d8000 CR4: 
06e0
[mån aug  1 15:53:08 2022] Call Trace:
[mån aug  1 15:53:08 2022]  ext4_orphan_del+0x23f/0x290 [ext4]
[mån aug  1 15:53:08 2022]  ext4_evict_inode+0x31f/0x630 [ext4]
[mån aug  1 15:53:08 2022]  evict+0xd1/0x1a0
[mån aug  1 15:53:08 2022]  __dentry_kill+0xe4/0x180
[mån aug  1 15:53:08 2022]  dput+0x149/0x2f0
[mån aug  1 15:53:08 2022]  __fput+0xe4/0x240
[mån aug  1 15:53:08 2022]  task_work_run+0x65/0xa0
[mån aug  1 15:53:08 2022]  exit_to_user_mode_prepare+0x111/0x120
[mån aug  1 15:53:08 2022]  syscall_exit_to_user_mode+0x28/0x140
[mån aug  1 15:53:08 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[mån aug  1 15:53:08 2022] RIP: 0033:0x7fed5eea2d77
[mån aug  1 15:53:08 2022] Code: 44 00 00 48 8b 15 19 a1 0c 00 f7 d8 64 89 02 
b8 ff ff ff ff eb bc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 03 00 00 00 0f 
05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 e9 a0 0c 00 f7 d8 64 89 02 b8
[mån aug  1 15:53:08 2022] RSP: 002b:7ffd50452818 EFLAGS: 0202 
ORIG_RAX: 0003
[mån aug  1 15:53:08 2022] RAX:  RBX: 55dab4578910 RCX: 
7fed5eea2d77
[mån aug  1 15:53:08 2022] RDX: 7fed5ef6e8a0 RSI:  RDI: 
0006
[mån aug  1 15:53:08 2022] RBP:  R08:  R09: 
7fed5ef6dbe0
[mån aug  1 15:53:08 2022] R10: 006f R11: 0202 R12: 
7fed5ef6f4a0
[mån aug  1 15:53:08 2022] R13:  R14:  R15: 
0001
[mån aug  1 15:53:08 2022] Modules linked in: msr autofs4 nfsd auth_rpcgss 
nfsv3 nfs_acl nfs lockd grace sunrpc nfs_ssc fscache xt_mac xt_length xt_recent 
xt_multiport xt_tcpudp xt_state xt_conntrack 

Bug#1016394: column_family.cc:1494: rocksdb::ColumnFamilySet::~ColumnFamilySet(): Assertion `last_ref' failed.

2022-08-01 Thread GCS
Control: tags -1 +moreinfo

Hi,

On Sun, Jul 31, 2022 at 4:09 AM Linas Vepstas  wrote:
> Software that I maintain is generating the error message
> ```
> ./db/column_family.cc:1494: rocksdb::ColumnFamilySet::~ColumnFamilySet(): 
> Assertion `last_ref' failed.
> ```
[...]
> I think the bug is benign, in that it only happens when shutting down,
> and I assume there is no data corruption as the result of it, but ...
> I dunno.
 Version 7.3.1 of RocksDB will migrate to testing this week. Please
test your software with this version and report back.
But honestly, I don't know what to do with this. I'm not a developer
of RocksDB itself. Don't know what caused this message you reported.

Regards,
Laszlo/GCS



Bug#1016184: unattended-upgrades: Unattended-upgrades has file lock after completion

2022-08-01 Thread Tim McConnell
Hi Michael,
Ask and ye shall receive:

apt-get dist-upgrade -y -m 
E: Could not get lock /var/lib/dpkg/lock-frontend. It is held by
process 629520 (unattended-upgr)
N: Be aware that removing the lock file is not a solution and may break
your system.
E: Unable to acquire the dpkg frontend lock (/var/lib/dpkg/lock-
frontend), is another process using it?


ps afx | grep /proc/629520/
1263559 pts/0S+ 0:00  |   |   \_ grep /proc/629520/


lsof -p 629520
lsof: WARNING: can't stat() fuse.gvfsd-fuse file system
/run/user/1000/gvfs
  Output information may be incomplete.
lsof: WARNING: can't stat() fuse.portal file system /run/user/1000/doc
  Output information may be incomplete.
COMMAND  PID USER   FD  TYPE DEVICE SIZE/OFF   
NODE NAME
unattende 629520 root  cwd   DIR8,5 4096
2359297 /var/backups
unattende 629520 root  rtd   DIR8,4 4096  
2 /
unattende 629520 root  txt   REG8,4  5900104
3154250 /usr/bin/python3.10
unattende 629520 root  DEL   REG8,5 
7082389 /var/cache/apt/pkgcache.bin
unattende 629520 root  DEL   REG8,5 
7077991 /var/cache/apt/pkgcache.bin
unattende 629520 root  mem   REG8,4  4713720
3152806 /usr/lib/x86_64-linux-gnu/libcrypto.so.3
unattende 629520 root  mem   REG8,4   700448
3152807 /usr/lib/x86_64-linux-gnu/libssl.so.3
unattende 629520 root  mem   REG8,463568
3673413 /usr/lib/python3.10/lib-dynload/_hashlib.cpython-310-x86_64-
linux-gnu.so
unattende 629520 root  mem   REG8,4   212304
3673415 /usr/lib/python3.10/lib-dynload/_ssl.cpython-310-x86_64-linux-
gnu.so
unattende 629520 root  mem   REG8,4   161864
3146718 /usr/lib/x86_64-linux-gnu/libgpg-error.so.0.33.0
unattende 629520 root  mem   REG8,438864
3146762 /usr/lib/x86_64-linux-gnu/libcap.so.2.44
unattende 629520 root  mem   REG8,4  1332480
3146730 /usr/lib/x86_64-linux-gnu/libgcrypt.so.20.4.1
unattende 629520 root  DEL   REG8,4 
3156120 /usr/lib/x86_64-linux-gnu/libsystemd.so.0.34.0
unattende 629520 root  DEL   REG8,4 
3149630 /usr/lib/x86_64-linux-gnu/libudev.so.1.7.4
unattende 629520 root  mem   REG8,4   751840
3145954 /usr/lib/x86_64-linux-gnu/libzstd.so.1.5.2
unattende 629520 root  mem   REG8,4   137568
3146757 /usr/lib/x86_64-linux-gnu/liblz4.so.1.9.3
unattende 629520 root  mem   REG8,4  2190408
3151362 /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.30
unattende 629520 root  mem   REG8,4   158400
3146118 /usr/lib/x86_64-linux-gnu/liblzma.so.5.2.5
unattende 629520 root  mem   REG8,4   125320
3149167 /usr/lib/x86_64-linux-gnu/libgcc_s.so.1
unattende 629520 root  mem   REG8,4  2055472
3149284 /usr/lib/x86_64-linux-gnu/libapt-pkg.so.6.0.0
unattende 629520 root  mem   REG8,422728
3152663 /usr/lib/x86_64-linux-gnu/libXdmcp.so.6.0.0
unattende 629520 root  mem   REG8,435888
3172444 /usr/lib/x86_64-linux-gnu/librt-2.33.so
unattende 629520 root  mem   REG8,4   351024
3674340 /usr/lib/python3/dist-packages/apt_pkg.cpython-310-x86_64-
linux-gnu.so
unattende 629520 root  mem   REG8,4   206984
3157107 /usr/lib/x86_64-linux-gnu/girepository-1.0/GLib-2.0.typelib
unattende 629520 root  mem   REG8,4   362276
3157110 /usr/lib/x86_64-linux-gnu/girepository-1.0/Gio-2.0.typelib
unattende 629520 root  mem   REG8,4   215704
3675617 /usr/lib/python3/dist-packages/cairo/_cairo.cpython-310-x86_64-
linux-gnu.so
unattende 629520 root  mem   REG8,447312
3169945 /usr/lib/x86_64-linux-gnu/libmd.so.0.0.5
unattende 629520 root  mem   REG8,484840
3150673 /usr/lib/x86_64-linux-gnu/libbsd.so.0.11.6
unattende 629520 root  mem   REG8,4   137376
3167131 /usr/lib/x86_64-linux-gnu/libbrotlicommon.so.1.0.9
unattende 629520 root  mem   REG8,414496
3152661 /usr/lib/x86_64-linux-gnu/libXau.so.6.0.0
unattende 629520 root  mem   REG8,451360
3167133 /usr/lib/x86_64-linux-gnu/libbrotlidec.so.1.0.9
unattende 629520 root  mem   REG8,430776
3149260 /usr/lib/x86_64-linux-gnu/libuuid.so.1.3.0
unattende 629520 root  mem   REG8,481568
3152672 /usr/lib/x86_64-linux-gnu/libXext.so.6.4.0
unattende 629520 root  mem   REG8,4  1322504
3152669 /usr/lib/x86_64-linux-gnu/libX11.so.6.4.0
unattende 629520 root  mem   REG8,447608
3167671 /usr/lib/x86_64-linux-gnu/libXrender.so.1.3.0
unattende 629520 root  mem   REG8,4   170936
3152665 

Bug#1015742: Reverted droping symbols

2022-08-01 Thread Shengjing Zhu
Hi Andreas,

On Sun, Jul 31, 2022 at 02:48:20PM +0200, Andreas Tille wrote:
> Hi Boyuan Yang,
> 
> I admit symbols files are a maintenance burden for C++ libraries.
> However, it helps to spot ABI changes for new upstream versions.  To
> reduce the maintenance burden while keeping that ABI change detection
> functionality I frequently maintain amd64 symbols only.  Motivated by
> this bug report I have re-added the symbols you droped in your last
> upload.

Please also see my last attemp to drop the symbol.
https://salsa.debian.org/med-team/spdlog/-/commit/2eb3ef1436723302070f753bbed3c0bea745a9d1

symbol file for spdlog doesn't work.

spdlog abi is tracked manually in d/rules,
https://salsa.debian.org/med-team/spdlog/-/blob/master/debian/rules#L12



Bug#1016385: asn1c-doc: trying to overwrite '/usr/share/doc/asn1c/BUGS', which is also in package asn1c 0.9.28+dfsg-3

2022-08-01 Thread Andreas Beckmann
Followup-For: Bug #1016385

The existing Breaks+Replaces must be bumped to (<< 0.9.28+dfsg-4)
since more files were moved into the -doc package.

Andreas



Bug#1016488: openvpn: OpenVPN client prevents shutdown process.

2022-08-01 Thread Jean-Marc Spaggiari
Package: openvpn
Version: 2.6.0~git20220518+dco-3
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate
***

   * What led up to the situation?

When openVPN client is connecter and tyring to shutdown the computer using
init
0 command.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

Waiting 90s gets the client killed.  However, client should not be hanging.
Issue is that network is down and client can't reconnect (expected)

   * What was the outcome of this action?
   * What outcome did you expect instead?
Client should exit quickly instead of waiting for timeout and get killed.

Here is an extract of the journalctl:
sep 07 04:39:11 t460s NetworkManager[9152]:   [1631003951.8511] device
(wlp4s0): no secrets: No ag>
sep 07 04:39:11 t460s NetworkManager[9152]:   [1631003951.8522] device
(wlp4s0): Activation: faile>
sep 07 04:39:15 t460s ovpn-client[8902]: write UDP: Network is unreachable
(code=101)
sep 07 04:39:15 t460s ovpn-client[8902]: Network unreachable, restarting
sep 07 04:39:15 t460s ovpn-client[8902]: SIGUSR1[soft,network-unreachable]
received, process restarting
sep 07 04:39:15 t460s ovpn-client[8902]: Restart pause, 300 second(s)
sep 07 04:40:38 t460s systemd[1]: session-2.scope: Stopping timed out.
Killing.


-- System Information:
Debian Release: 11.4
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable'), (100, 'bullseye-
fasttrack'), (100, 'bullseye-backports-staging')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-16-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8),
LANGUAGE=fr_CA:fr
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openvpn depends on:
ii  debconf [debconf-2.0]  1.5.77
ii  libc6  2.31-13+deb11u3
ii  liblz4-1   1.9.3-2
ii  liblzo2-2  2.10-2
ii  libnl-3-2003.4.0-1+b1
ii  libnl-genl-3-200   3.4.0-1+b1
ii  libpam0g   1.4.0-9+deb11u1
ii  libpkcs11-helper1  1.27-1
pn  libssl3
ii  libsystemd0247.3-7
ii  lsb-base   11.1.0
ii  systemd247.3-7

Versions of packages openvpn recommends:
ii  easy-rsa  3.0.8-1

Versions of packages openvpn suggests:
ii  openssl   1.1.1n-0+deb11u3
pn  openvpn-dco-dkms  
pn  openvpn-systemd-resolved  
ii  resolvconf1.87

-- debconf information:


Bug#1016487: rust-rustls: please make the build reproducible

2022-08-01 Thread Chris Lamb
Source: rust-rustls
Version: 0.20.6-6
Severity: wishlist
Tags: patch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: randomness
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Hi,

Whilst working on the Reproducible Builds effort [0] we noticed that
rust-rustls could not be built reproducibly.

This is because, whilst the package does attempt to clean up the
offending sslkeylogfile.txt file, this file is actually generated
under the rustls/ directory.

Patch attached.

 [0] https://reproducible-builds.org/


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-
--- a/debian/rules  2022-08-01 09:43:13.283451411 -0700
--- b/debian/rules  2022-08-01 09:46:54.628158679 -0700
@@ -10,7 +10,7 @@
 
 # cleanup after test
 execute_after_dh_auto_test:
-   rm -rf sslkeylogfile.txt
+   rm -rf rustls/sslkeylogfile.txt
 
 # mangle system-shared code to use system-shared test-ca and fuzz data
 execute_after_dh_auto_install:


Bug#1001776: yt-dlp: error message

2022-08-01 Thread michel
Package: yt-dlp
Version: 2022.07.18-1~bpo11+1
Followup-For: Bug #1001776
X-Debbugs-Cc: okgomdjgbm...@gmail.com

Dear Maintainer,

I don't know if you care about this, but an error message asks to do a "yt-dlp 
-U"

please report this issue on  https://github.com/yt-dlp/yt-dlp/issues?q= , 
filling out the appropriate issue template. Confirm you are on the latest 
version using  yt-dlp -U



Bug#1016486: wayfire: please make the build reproducible

2022-08-01 Thread Chris Lamb
Source: wayfire
Version: 0.7.4-1
Severity: wishlist
Tags: patch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: buildpath
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Hi,

Whilst working on the Reproducible Builds effort [0] we noticed that
wayfire could not be built reproducibly.

This is because it embedded an absolute build path into a config.h
file. A patch is attached that fixes this value to a known/fixed
value — the absolute build path won't exist at runtime anyway, so
this is at least "no worse".

 [0] https://reproducible-builds.org/


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-
--- a/debian/patches/reproducible-build.patch   1969-12-31 16:00:00.0 
-0800
--- b/debian/patches/reproducible-build.patch   2022-08-01 09:32:24.630250887 
-0700
@@ -0,0 +1,15 @@
+Description: Make the build reproducible
+Author: Chris Lamb 
+Last-Update: 2022-08-01
+
+--- wayfire-0.7.4.orig/config.h.in
 wayfire-0.7.4/config.h.in
+@@ -3,7 +3,7 @@
+ 
+ #define INSTALL_PREFIX "@INSTALL_PREFIX@"
+ #define PLUGIN_PATH "@PLUGIN_PATH@"
+-#define WF_SRC_DIR "@WF_SRC_DIR@"
++#define WF_SRC_DIR "/nonexistent"
+ #define PLUGIN_XML_DIR "@PLUGIN_XML_DIR@"
+ #define SYSCONFDIR "@SYSCONFDIR@"
+ #define WF_DEFAULT_CONFIG_BACKEND "@DEFAULT_CONFIG_BACKEND@"
--- a/debian/patches/series 1969-12-31 16:00:00.0 -0800
--- b/debian/patches/series 2022-08-01 09:32:23.738249510 -0700
@@ -0,0 +1 @@
+reproducible-build.patch


Bug#1014391: scilab: CVE-2022-30045 incorrect memory handling in ezml support leading to a heap out-of-bounds read

2022-08-01 Thread Sylvestre Ledru

Hello,

Le 05/07/2022 à 11:19, Neil Williams a écrit :

Source: scilab
Version: 6.1.1+dfsg2-3
Severity: important
Tags: security
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team 


Hi,

The following vulnerability was published for scilab.

CVE-2022-30045[0]:
| An issue was discovered in libezxml.a in ezXML 0.8.6. The function
| ezxml_decode() performs incorrect memory handling while parsing
| crafted XML files, leading to a heap out-of-bounds read.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-30045
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30045

Please adjust the affected versions in the BTS as needed.




While Scilab indeed ships ezxml.c, I am not sure how this can be exploited.

The code is probably only used to load scicos/xcos schema.
https://github.com/scilab/scilab/blob/b0937f19e4b8ddf416ca9a9a433bcbbd3f4ef2c0/scilab/modules/scicos/src/c/ezxml.c


Cheers
Sylvestre



Bug#1016357: Fails tests with insufficient network connectivity

2022-08-01 Thread Shengjing Zhu
On Mon, Aug 1, 2022 at 11:50 PM Nilesh Patra  wrote:
>
> On 8/1/22 8:38 PM, Shengjing Zhu wrote:
> > On Mon, Aug 1, 2022 at 11:05 PM Nilesh Patra  wrote:
> >>
> >> On Mon, Aug 01, 2022 at 10:54:20PM +0800, Shengjing Zhu wrote:
> > The package fails tests (see log of failing test below) when run on a
> > machine with limited network (in this case: Can only reach the
> > relevant APT repository server). This is a policy violation, which
> > says that package tests must only access local resources services that
> > were also spun up by the test. This tests tries to reach
> > stun1.l.google.com though. And fails with a nil pointer dereference...
> 
>  I am not aware of any such policy -- can you please point me to it?
> >>>
> >>> Debian policy 4.9:
> >>>
> >>> For packages in the main archive, required targets must not attempt
> >>> network access, except, via the loopback interface, to services on the
> >>> build host that have been started by the build.
> >>
> >> Thanks for the link. I was under the impression that network access is 
> >> already
> >> forbidden in the buildd environment, and package would not build if it 
> >> tries
> >> to do so -- not sure when that changed?
> >
> > Because schroot doesn't implement network isolation.
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802849
>
> I am aware that this does not work locally because of the bug.
> But one quick question - I was talking about the buildd (buildd.debian.org) 
> machines
> here. In the wiki, it says there is 'no network' in the machines[1]. However 
> when I see the
> setup using schroot[2]. Is it the same bug affecting it or do I miss 
> something (since the
> package was building fine earlier anyway)
>
> [1]: https://wiki.debian.org/buildd#buildd_Differences
> [2]: https://wiki.debian.org/BuilddSetup

Wiki is not always up to date. If you want the details, you'd better
ask buildd admins, and I'm not.

-- 
Shengjing Zhu



Bug#1016357: Fails tests with insufficient network connectivity

2022-08-01 Thread Nilesh Patra

On 8/1/22 8:38 PM, Shengjing Zhu wrote:

On Mon, Aug 1, 2022 at 11:05 PM Nilesh Patra  wrote:


On Mon, Aug 01, 2022 at 10:54:20PM +0800, Shengjing Zhu wrote:

The package fails tests (see log of failing test below) when run on a
machine with limited network (in this case: Can only reach the
relevant APT repository server). This is a policy violation, which
says that package tests must only access local resources services that
were also spun up by the test. This tests tries to reach
stun1.l.google.com though. And fails with a nil pointer dereference...


I am not aware of any such policy -- can you please point me to it?


Debian policy 4.9:

For packages in the main archive, required targets must not attempt
network access, except, via the loopback interface, to services on the
build host that have been started by the build.


Thanks for the link. I was under the impression that network access is already
forbidden in the buildd environment, and package would not build if it tries
to do so -- not sure when that changed?


Because schroot doesn't implement network isolation.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802849


I am aware that this does not work locally because of the bug.
But one quick question - I was talking about the buildd (buildd.debian.org) 
machines
here. In the wiki, it says there is 'no network' in the machines[1]. However 
when I see the
setup using schroot[2]. Is it the same bug affecting it or do I miss something 
(since the
package was building fine earlier anyway)

[1]: https://wiki.debian.org/buildd#buildd_Differences
[2]: https://wiki.debian.org/BuilddSetup

--
Best,
Nilesh



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016485: libnl3: please upgrade to release 3.7.0

2022-08-01 Thread Matthieu Baerts
Source: libnl3
Version: 3.5.0-0.1
Severity: wishlist
Tags: upstream

Dear Maintainer,

Upstream has released two new versions this year: 3.6.0 and 3.7.0.

Is it possible to upgrade to the latest one to get the new features and
bug fixes please?

Kind regards,
Matt



Bug#1016482: jamulus: please add support for riscv64

2022-08-01 Thread Thorsten Glaser
# bts-close because of the reason below
close 1016482
thanks

Bo YU dixit:

>The jamulus can be built on real riscv64 hardware successfully with the
>change attached, so could you please add riscv64 as a build target in
>new upload? thanks

It can also be built successfully on big-endian platforms, but that
doesn’t mean it works correctly.

Upstream’s custom build for opus custom modes precludes adding more
architectures, but as #686777 seems to have been fixed I was intending
on permitting all architectures in an upload that can use this (I’ll
have to figure out how to use it first).

But as-is, this patch isn’t suitable.

bye,
//mirabilos
-- 
Solange man keine schmutzigen Tricks macht, und ich meine *wirklich*
schmutzige Tricks, wie bei einer doppelt verketteten Liste beide
Pointer XORen und in nur einem Word speichern, funktioniert Boehm ganz
hervorragend.   -- Andreas Bogk über boehm-gc in d.a.s.r



Bug#1010777: Packaging qflipper - comaintainers wanted

2022-08-01 Thread Jakob Haufe
I just pushed some initial packaging work to salsa[1].

This is still unclean and not exactly tested. Two main points need to be
taken care of before uploading:

- Proper d/copyright. Any help here is highly appreciated
- Disable the builtin autoupdater

Comaintenance or a team umbrella to put this under would also be very welcome.

Cheers,
sur5r

[1] https://salsa.debian.org/debian/qflipper

-- 
ceterum censeo microsoftem esse delendam.


pgpSTv7urvt80.pgp
Description: OpenPGP digital signature


Bug#1016484: Frequent kernel panics following update 5.10.120-1 -> 5.10.127-1

2022-08-01 Thread Vincent Van Houtte

Package: LINUX-IMAGE-5.10.0-16-AMD64
Version: 5.10.127-1

Debian Bullseye, fully up to date.

After an unattended upgrade on 10 July 2022, the system started locking 
up multiple times per day. This machine is a small office server, 
including mail, web, database, etc. services and serving files from a 
zfs pool over NTFSv4 to 5-10 clients on premise.


Some of the kernel panic lines seem to be related to openzfs, others to 
kvm, which is why I file the bug to this package. Below a list of the 
kernel panic information extracted from the journals. Since I have 
downgraded the kernel to 5.10.0.13, the machine is running reliably 
again.


First kernel panic:
jul 11 16:58:17 luke kernel: VERIFY3(hdr->b_type == type) failed 
(1426261535 == 2)

jul 11 16:58:17 luke kernel: PANIC at arc.c:1571:arc_buf_type()
jul 11 16:58:17 luke kernel: Showing stack for process 599
jul 11 16:58:17 luke kernel: CPU: 13 PID: 599 Comm: dbuf_evict Tainted: 
P  IOE 5.10.0-16-amd64 #1 Debian 5.10.127-1
jul 11 16:58:17 luke kernel: Hardware name: HPE ProLiant DL160 
Gen10/ProLiant DL160 Gen10, BIOS U31 11/13/2019

jul 11 16:58:17 luke kernel: Call Trace:
jul 11 16:58:17 luke kernel:  dump_stack+0x6b/0x83
jul 11 16:58:17 luke kernel:  spl_panic+0xd4/0xfc [spl]
jul 11 16:58:17 luke kernel:  ? __slab_free+0x3b0/0x430
jul 11 16:58:17 luke kernel:  ? __vunmap+0x228/0x290
jul 11 16:58:17 luke kernel:  ? spl_kmem_cache_free+0x13d/0x1b0 [spl]
jul 11 16:58:17 luke kernel:  ? spl_kmem_cache_free+0x13d/0x1b0 [spl]
jul 11 16:58:17 luke kernel:  remove_reference.constprop.0+0x9b/0xa0 
[zfs]

jul 11 16:58:17 luke kernel:  arc_buf_destroy+0x7e/0x100 [zfs]
jul 11 16:58:17 luke kernel:  dbuf_destroy+0x2e/0x430 [zfs]
jul 11 16:58:17 luke kernel:  dbuf_evict_one+0xfb/0x120 [zfs]
jul 11 16:58:17 luke kernel:  dbuf_evict_thread+0x128/0x1d0 [zfs]
jul 11 16:58:17 luke kernel:  ? dbuf_evict_one+0x120/0x120 [zfs]
jul 11 16:58:17 luke kernel:  thread_generic_wrapper+0x6f/0x80 [spl]
jul 11 16:58:17 luke kernel:  ? __thread_exit+0x20/0x20 [spl]
jul 11 16:58:17 luke kernel:  kthread+0x11b/0x140
jul 11 16:58:17 luke kernel:  ? __kthread_bind_mask+0x60/0x60
jul 11 16:58:17 luke kernel:  ret_from_fork+0x1f/0x30
[...]
jul 11 17:00:00 luke kernel: list_add corruption. prev->next should be 
next (96737bbd12f0), but was 2d766e206e676953. 
(prev=966e06c0ec88).

jul 11 17:00:00 luke kernel: [ cut here ]
jul 11 17:00:00 luke kernel: kernel BUG at lib/list_debug.c:26!
jul 11 17:00:00 luke kernel: invalid opcode:  [#1] SMP NOPTI
jul 11 17:00:00 luke kernel: CPU: 0 PID: 596 Comm: arc_evict Tainted: P  
IOE 5.10.0-16-amd64 #1 Debian 5.10.127-1
jul 11 17:00:00 luke kernel: Hardware name: HPE ProLiant DL160 
Gen10/ProLiant DL160 Gen10, BIOS U31 11/13/2019

jul 11 17:00:00 luke kernel: RIP: 0010:__list_add_valid.cold+0x3d/0x3f
jul 11 17:00:00 luke kernel: Code: f2 4c 89 c1 48 89 fe 48 c7 c7 10 1f 
b2 a7 e8 31 14 ff ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 b8 1e b2 
a7 e8 1a 14 ff ff <0f> 0b 48 89 fe 48 c7 c7 48 1>

jul 11 17:00:00 luke kernel: RSP: 0018:b3048096bd60 EFLAGS: 00010246
jul 11 17:00:00 luke kernel: RAX: 0075 RBX: 96737bbd12f0 
RCX: 
jul 11 17:00:00 luke kernel: RDX:  RSI: 96749fc1ca00 
RDI: 96749fc1ca00
jul 11 17:00:00 luke kernel: RBP: 9673ce89b438 R08:  
R09: b3048096bb88
jul 11 17:00:00 luke kernel: R10: b3048096bb80 R11: a80cb448 
R12: 966e06c0ec88
jul 11 17:00:00 luke kernel: R13: 9673ce89b438 R14: 966da1539680 
R15: c1cf8a10
jul 11 17:00:00 luke kernel: FS:  () 
GS:96749fc0() knlGS:
jul 11 17:00:00 luke kernel: CS:  0010 DS:  ES:  CR0: 
80050033
jul 11 17:00:00 luke kernel: CR2: 0296a8dbd000 CR3: 00060700a002 
CR4: 007726f0
jul 11 17:00:00 luke kernel: DR0:  DR1:  
DR2: 
jul 11 17:00:00 luke kernel: DR3:  DR6: fffe0ff0 
DR7: 0400

jul 11 17:00:00 luke kernel: PKRU: 5554
jul 11 17:00:00 luke kernel: Call Trace:
jul 11 17:00:01 luke kernel:  multilist_sublist_move_forward+0x7c/0xa0 
[zfs]

jul 11 17:00:01 luke kernel:  arc_evict_state+0x1e3/0x900 [zfs]
jul 11 17:00:01 luke kernel:  arc_evict_cb+0x754/0x7d0 [zfs]
jul 11 17:00:01 luke kernel:  zthr_procedure+0x139/0x150 [zfs]
jul 11 17:00:01 luke kernel:  ? zrl_is_locked+0x20/0x20 [zfs]
jul 11 17:00:01 luke kernel:  thread_generic_wrapper+0x6f/0x80 [spl]
jul 11 17:00:01 luke kernel:  ? __thread_exit+0x20/0x20 [spl]
jul 11 17:00:01 luke kernel:  kthread+0x11b/0x140
jul 11 17:00:01 luke kernel:  ? __kthread_bind_mask+0x60/0x60
jul 11 17:00:01 luke kernel:  ret_from_fork+0x1f/0x30
jul 11 17:00:01 luke kernel: Modules linked in: cbc cts rpcsec_gss_krb5 
xt_conntrack nf_conntrack_netlink xt_multiport xt_nat xt_tcpudp 
xt_addrtype xt_mark nft_chain_nat xt_MASQUERADE nf_nat >

Bug#1016357: Fails tests with insufficient network connectivity

2022-08-01 Thread Shengjing Zhu
On Mon, Aug 1, 2022 at 11:05 PM Nilesh Patra  wrote:
>
> On Mon, Aug 01, 2022 at 10:54:20PM +0800, Shengjing Zhu wrote:
> > > > The package fails tests (see log of failing test below) when run on a
> > > > machine with limited network (in this case: Can only reach the
> > > > relevant APT repository server). This is a policy violation, which
> > > > says that package tests must only access local resources services that
> > > > were also spun up by the test. This tests tries to reach
> > > > stun1.l.google.com though. And fails with a nil pointer dereference...
> > >
> > > I am not aware of any such policy -- can you please point me to it?
> >
> > Debian policy 4.9:
> >
> > For packages in the main archive, required targets must not attempt
> > network access, except, via the loopback interface, to services on the
> > build host that have been started by the build.
>
> Thanks for the link. I was under the impression that network access is already
> forbidden in the buildd environment, and package would not build if it tries
> to do so -- not sure when that changed?

Because schroot doesn't implement network isolation.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802849

>
> Also I presume that this policy is only for build, and not autopkgtests?

Yes.

-- 
Shengjing Zhu



Bug#1016357: Fails tests with insufficient network connectivity

2022-08-01 Thread Nilesh Patra
On Mon, Aug 01, 2022 at 10:54:20PM +0800, Shengjing Zhu wrote:
> > > The package fails tests (see log of failing test below) when run on a
> > > machine with limited network (in this case: Can only reach the
> > > relevant APT repository server). This is a policy violation, which
> > > says that package tests must only access local resources services that
> > > were also spun up by the test. This tests tries to reach
> > > stun1.l.google.com though. And fails with a nil pointer dereference...
> >
> > I am not aware of any such policy -- can you please point me to it?
> 
> Debian policy 4.9:
> 
> For packages in the main archive, required targets must not attempt
> network access, except, via the loopback interface, to services on the
> build host that have been started by the build.

Thanks for the link. I was under the impression that network access is already
forbidden in the buildd environment, and package would not build if it tries
to do so -- not sure when that changed?

Also I presume that this policy is only for build, and not autopkgtests?

> > I've seen several packages in debian that access external URLs, and have
> > never seen them as any sort of policy violation, no such bugs either.
> >
> 
> Please open bugs when you see that.

There are a couple of python packages that I can think of doing so. Will open.

-- 
Best,
Nilesh


signature.asc
Description: PGP signature


Bug#1016483: pkg-js-tools: pkgjs-depends eats all memory and dies (probably by linux OOM Killer)

2022-08-01 Thread Jonas Smedegaard
Package: pkg-js-tools
Version: 0.14.31
Severity: important

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I tries run the following command in a pristine Sid environment:

  pkgjs-depends @solid/community-server

After hanging at 4% for 5-6 minutes, the process ate all available
memory (16+ GB!) and then died (probably killed by the linux OOM
Killer).


 - Jonas

-BEGIN PGP SIGNATURE-
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=3hin
-END PGP SIGNATURE-



Bug#1016357: Fails tests with insufficient network connectivity

2022-08-01 Thread Shengjing Zhu
On Mon, Aug 1, 2022 at 9:12 PM Nilesh Patra  wrote:
>
> Control: severity -1 normal
>
> On Fri, 29 Jul 2022 15:11:10 -0700 Sven Mueller  
> wrote:
> > Package: golang-github-pion-turn.v2
> > Version: 2.0.8-2
> > Severity: Serious
> >
> > The package fails tests (see log of failing test below) when run on a
> > machine with limited network (in this case: Can only reach the
> > relevant APT repository server). This is a policy violation, which
> > says that package tests must only access local resources services that
> > were also spun up by the test. This tests tries to reach
> > stun1.l.google.com though. And fails with a nil pointer dereference...
>
> I am not aware of any such policy -- can you please point me to it?

Debian policy 4.9:

For packages in the main archive, required targets must not attempt
network access, except, via the loopback interface, to services on the
build host that have been started by the build.

> I've seen several packages in debian that access external URLs, and have
> never seen them as any sort of policy violation, no such bugs either.
>

Please open bugs when you see that.

-- 
Shengjing Zhu



Bug#1016482: jamulus: please add support for riscv64

2022-08-01 Thread Bo YU
Source: jamulus
Version: 3.8.2+dfsg-1
Severity: wishlist
Tags: patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: debian-ri...@lists.debian.org

Dear jamulus Maintainer,

The jamulus can be built on real riscv64 hardware successfully with the
change attached, so could you please add riscv64 as a build target in
new upload? thanks

-- 
Regards,
--
  Bo YU

diff -Nru jamulus-3.8.2+dfsg/debian/control jamulus-3.8.2+dfsg/debian/control
--- jamulus-3.8.2+dfsg/debian/control	2022-02-25 18:24:21.0 +
+++ jamulus-3.8.2+dfsg/debian/control	2022-02-25 18:52:53.0 +
@@ -16,7 +16,7 @@
 Package: jamulus
 # will be "any" once #686777 is fixed
 # armel might work but better safe than crash
-Architecture: amd64 arm64 armhf i386
+Architecture: amd64 arm64 armhf i386 riscv64
 Multi-Arch: foreign
 Pre-Depends: ${misc:Pre-Depends}
 Depends: ${shlibs:Depends}, ${misc:Depends}


signature.asc
Description: PGP signature


Bug#1001214: Getting EFI Boot Guard into Debian

2022-08-01 Thread Gylstorff Quirin

Control: retitle -1 ITP: efibootguard -- UEFI-based bootloader
Control: owner -1 Quirin Gylstorff 




After an internal discuss I would step up as the Maintainer for 
efibootguard.


Thanks,
Quirin



Bug#1016474: cryptsetup: The system installed on encrypted LVM (both root and swap partitions) freezes during massive writes

2022-08-01 Thread Guilhem Moulin
On Mon, 01 Aug 2022 at 15:32:19 +0200, Wojciech Zabołotny wrote:
> BTW. I'm really amused that no one else complained about that issue.
> The problem exists for at least a few years.

Not claiming that no one would benefit from --perf-*, but as the link
from the cloudflare blog suggests it appears most users don't suffer
from the overhead.  Pretty sure most systems don't freeze under heavy
write anyway :-)

-- 
Guilhem.


signature.asc
Description: PGP signature


Bug#922545: [pkg-lxc-devel] Bug#922545: Bug#922545: lxc: FTBFS on hppa -

2022-08-01 Thread Tom Turelinckx
Bonjour,

> > The same error occurs on alpha, m68k, sh4 and sparc64.
> >
> > libseccomp-dev is available on hppa but not on the other arches.  lxc build 
> > successfully on hppa if I include the libseccomp-dev
> > dependency.  Wasn't able to fix symbol issue.
> 
> I am not sure about how I can make the symbols file vary for
> architectures. I'll ask to other developers.
> 
> If you have recommendations I'm eager to take them! :)

Architecture-specific symbols files can be supplied by naming them 
liblxc1.symbols., for example liblxc1.symbols.sparc64. The attached 
liblxc1.symbols.sparc64 was created by copying liblxc1.symbols and then 
applying the attached symbols.diff. I think the same file could be used for 
liblxc1.symbols.alpha, liblxc1.symbols.m68k, liblxc1.symbols.sh4 and 
liblxc1.symbols.sparc64. I have verified that building lxc 4.0.11-1 against sid 
on sparc64 succeeds when the attached liblxc1.symbols.sparc64 is included in 
the debian directory.

Another approach could be to lower DPKG_GENSYMBOLS_CHECK_LEVEL to 0 on 
architectures where libseccomp-dev is not available. This will still log the 
symbol differences but without failing the build. This can be achieved by 
applying the attached rules.diff against debian/rules. This approach avoids 
having to maintain architecture-specific symbols files. I have verified that 
building lxc 4.0.11-1 against sid on sparc64 succeeds with the attached 
rules.diff applied.

Both approaches are documented at [1].

Could you please consider adopting either one of these approaches? Thanks!

For hppa, as described by Dave Anglin above, libseccomp-dev is actually 
available and changing the dependency from libseccomp-dev [!alpha !hppa !m68k 
!sh4 !sparc64] to libseccomp-dev [!alpha !m68k !sh4 !sparc64] should allow the 
build to succeed there.

Merci!

Tom

[1]: https://manpages.debian.org/unstable/dpkg-dev/dpkg-gensymbols.1.en.html



rules.diff
Description: Binary data


symbols.diff
Description: Binary data


liblxc1.symbols.sparc64
Description: Binary data


Bug#1016357: Fails tests with insufficient network connectivity

2022-08-01 Thread Nilesh Patra
Control: severity -1 normal

On Fri, 29 Jul 2022 15:11:10 -0700 Sven Mueller  
wrote:
> Package: golang-github-pion-turn.v2
> Version: 2.0.8-2
> Severity: Serious
> 
> The package fails tests (see log of failing test below) when run on a
> machine with limited network (in this case: Can only reach the
> relevant APT repository server). This is a policy violation, which
> says that package tests must only access local resources services that
> were also spun up by the test. This tests tries to reach
> stun1.l.google.com though. And fails with a nil pointer dereference...

I am not aware of any such policy -- can you please point me to it?
I've seen several packages in debian that access external URLs, and have
never seen them as any sort of policy violation, no such bugs either.

-- 
Best,
Nilesh


signature.asc
Description: PGP signature


Bug#1016453: python-tornado breaks python-bonsai autopkgtest: 'TornadoLDAPConnectionTest' object has no attribute 'should_close_asyncio_loop'

2022-08-01 Thread Robin Jarry
Hi Paul,

I have checked in bonsai code base, and there is no reference to
should_close_asyncio_loop. It looks like a tornado thing.

However, looking at the full error trace, I can see that:

> ldapwhoami: unrecognized option -�
> Issue LDAP Who am I? operation to request user's authzid
>
> usage: ldapwhoami [options]
> Common options:
>   -d level   set LDAP debugging level to `level'
>   -D binddn  bind DN
> [...]

Which may cause the tests to be aborted early and cause
should_close_asyncio_loop to be accessed[1] before it is defined[2] in
tornado.

[1]: 
https://salsa.debian.org/python-team/packages/python-tornado/-/blob/master/tornado/testing.py#L282
[2]: 
https://salsa.debian.org/python-team/packages/python-tornado/-/blob/master/tornado/testing.py#L204-230

There were a few unreleased patches from bonsai[3], I'll make a new
release.

[3]: 
https://salsa.debian.org/python-team/packages/python-bonsai/-/commit/22d2533ab8094a299d1816a46917070e2b251265

In the meantime, I think that the should_close_asyncio_loop attribute
should be defined in tornado.testing.AsyncTestCase.__init__() instead of
in tornado.testing.AsyncTestCase.setUp().



Bug#1016363: libx11-6 1.8.1 also breaks glxinfo

2022-08-01 Thread Hermann Meyer

With libx11-6 1.8.1 I get:

|glxinfo name of display: :0 glxinfo: ../nptl/pthread_mutex_lock.c:424:
__pthread_mutex_lock_full: Assertion `e != ESRCH || !robust' failed.
Abgebrochen|

rebuilding libx11 with the --disable-thread-safety-constructor flag
solved the issue.


|System:   Host: box Kernel: 5.18.0-rt11 arch: x86_64 bits: 64 compiler:
gcc v: 12.1.0     Desktop: Cinnamon v: 5.2.7 Distro: siduction 18.3.0
Patience - cinnamon -     (201805132102) base: Debian GNU/Linux
bookworm/sid Machine:   Type: Desktop System: Dell product: Inspiron
3668 v: N/A     serial:    Mobo: Dell model: 07KY25
v: A00 serial:  UEFI: Dell     v: 1.4.0 date:
07/19/2017 CPU:   Info: quad core model: Intel Core i5-7400 bits: 64
type: MCP     arch: Kaby Lake rev: 9 cache: L1: 256 KiB L2: 1024 KiB L3:
6 MiB   Speed (MHz): avg: 3300 min/max: 800/3001 boost: enabled cores:
1: 3300     2: 3300 3: 3300 4: 3300 bogomips: 24000   Flags: avx avx2 ht
lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx Graphics:   Device-1:
Intel HD Graphics 630 vendor: Dell driver: i915 v: kernel     arch:
Gen-9.5 bus-ID: 00:02.0   Device-2: NVIDIA GP108 [GeForce GT 1030]
vendor: Dell driver: nvidia     v: 470.129.06 arch: Pascal bus-ID:
01:00.0   Display: x11 server: X.Org v: 1.21.1.4 with: Xwayland v:
22.1.3 driver:     X: loaded: modesetting,nvidia unloaded:
fbdev,nouveau,vesa gpu: i915,nvidia     resolution: 1920x1080~60Hz|


Bug#1016474: cryptsetup: The system installed on encrypted LVM (both root and swap partitions) freezes during massive writes

2022-08-01 Thread Guilhem Moulin
On Mon, 01 Aug 2022 at 14:10:26 +0200, Wojciech Zabołotny wrote:
> Modifying the mapping parameters with:
>  # cryptsetup  --perf-no_write_workqueue refresh name_of_the_mapping
> 
> indeed eliminates the problem.
> Isn't it then the problem with default mapping parameters used in
> cryptsetup?

IMHO not: if setting up these flags were desirable in all cases then the
better place to change the defaults would be the dm-crypt subsystem (ie
the kernel).  Note that if the --perf-* flag(s) improve performance on
your system you can set them in /etc/crypttab too, so the wrappers pass
them along when mapping the volume (like for discard).

-- 
Guilhem.


signature.asc
Description: PGP signature


Bug#1016090: python-django breaks lots of autopkgtests

2022-08-01 Thread Raphael Hertzog
On Tue, 26 Jul 2022, Paul Gevers wrote:
> Source: python-django
> Control: found -1 python-django/2:4.0.6-1

I'm surprised that we uploaded an non-LTS release to unstable.

Chris, why did you do that? 

> I note that the changelog has this:
> "This security release mitigates the issue, but we have identified
> improvements to the Database API methods related to date extract and
> truncate that would be beneficial to add to Django 4.1 before it's final
> release. This will impact 3rd party database backends using Django 4.1
> release candidate 1 or newer, until they are able to update to the API
> changes. We apologize for the inconvenience."
> 
> I guess that means that these breakages might be intentional, but even if
> all this is to be expected, it would be good to add a *versioned* Breaks to
> python-django3 for all the packages that it really breaks (not just the
> autopkgtest).

I don't think that the above changelog entry is relevant. The issue is
broader, it's more likely that we moved from 3.2 to 4.0 and that many
packages have not been prepared for that switch.

Cheers,
-- 
  ⢀⣴⠾⠻⢶⣦⠀   Raphaël Hertzog 
  ⣾⠁⢠⠒⠀⣿⡁
  ⢿⡄⠘⠷⠚⠋The Debian Handbook: https://debian-handbook.info/get/
  ⠈⠳⣄   Debian Long Term Support: https://deb.li/LTS


signature.asc
Description: PGP signature


Bug#1014052: ibus:After rebooted, I must do `ibus-daemon -rxd` change japanese to anthy with kanji key.

2022-08-01 Thread Gunnar Hjalmarsson

On 2022-07-31 10:39, Osamu Aoki wrote:

im-config has gone through several changes last several years to
accommodate non-ibus for GNOME on wayland.  We may have introduced
some regression for X based system.


It's possible, of course. OTOH I just installed an XFCE system (Xubuntu 
22.04), installed ibus-anthy, and things just work. Even if my keyboard 
does not include any special Japanese keys...



`ctrl+j` key-binding sounds like something ibus-anthy preference menu
sets if you ever set it so or it is the default. (I may have changed
it on my system so I can't check for you ...)


It is the default.


That's after having working ibus-anthy and using anthy as input
method.  It only changs operational mode of anthy.  You set it
through anthy's preference menu.

Switching between "日本語 - anthy" and "日本語 - japanese" sounds like
switching between different ibus engines.  That's usually SUPER-SPACE
and its binding is set by  ibus- setup for pure classic X system.


That distinction is important. Ctrl+J for toggling between Hiragana and 
latin typing, while the active input method is Anthy, vs. Super+Space 
for switching to some other input source.


--
Gunnar



Bug#1016395: linux-image-5.18.0-2-amd64: kernel 5.18: rtw_8821ce wireless fails to suspend/wake from suspend

2022-08-01 Thread Diederik de Haas
On maandag 1 augustus 2022 02:07:02 CEST Linas Vepstas wrote:
> I just attempted a hand-build of kernel 5.18.15 and it exhibits exactly the
> same failure, the same stack traces.

It's probably best to bring this to the attention of the upstream developers 
at linux-wirel...@vger.kernel.org
When you do, please reference that thread in this bug report.

signature.asc
Description: This is a digitally signed message part.


Bug#1016480: ubuntu-dev-tools: can't run anymore ubuntu-build --batch --retry from cmdline due to wrong login() call in Python

2022-08-01 Thread Gianfranco Costamagna

Source: ubuntu-dev-tools
Version: 0.190
tags: patch
severity: important


As said on irc:


some changes you did on ubuntu-dev-tools broke launchpad login
http://launchpadlibrarian.net/520965621/ubuntu-dev-tools_0.178_0.178ubuntu1.diff.gz
in specific, reverting this change in jammy
-self.login()
+self.login_anonymously()
works as expected and my ubuntu-build is back
otherwise...
ubuntu-build --batch --retry openimageio
Traceback (most recent call last):
   File "/usr/bin/ubuntu-build", line 282, in 
 main()
   File "/usr/bin/ubuntu-build", line 260, in main
can_retry = options.retry and me.canUploadPackage(ubuntu_archive,
AttributeError: 'NoneType' object has no attribute 'canUploadPackage'
can you please have a look?
I fixed by changing that line login_anonymously into login
/usr/lib/python3/dist-packages/ubuntutools/lp/lpapicache.py line 108


G.



Bug#1016479: python3-pafy: [minor] refresh package information

2022-08-01 Thread michel
Package: python3-pafy
Version: 0.5.2-2.1
Severity: minor
X-Debbugs-Cc: okgomdjgbm...@gmail.com

Dear Maintainer,


Some information of the package are outdated.
The curent home page is "https://github.com/mps-youtube/pafy;

youtube-dl should be a recomended dependency.

updated feature list from the home page

  • Retreive metadata such as viewcount, duration, rating, author, thumbnail, 
keywords
  • Download video or audio at requested resolution / bitrate / format / 
filesize
  • Command line tool (ytdl) for downloading directly from the command line
  • Retrieve the URL to stream the video in a player such as vlc or mplayer
  • Works with age-restricted videos and non-embeddable videos
  • Small, standalone, single importable module file (pafy.py)
  • Select highest quality stream for download or streaming
  • Download video only (no audio) in m4v or webm format
  • Download audio only (no video) in ogg or m4a format
  • Retreive playlists and playlist metadata
  • Works with Python 2.6+ and 3.3+
  • Optionally depends on youtube-dl (recommended; more stable)


Bug#1016478: gnome-passwordsafe: Sometimes freezing after entering data in field and directly pressing ctrl + s

2022-08-01 Thread Krassy Boykinov

Package: gnome-passwordsafe
Version: 5.1-3
Severity: normal


Random freezes after pressing ctrl + s having entered some info into a 
textfield.


How to reproduce:
(1) Enter anything into a login data field
(2) Press ctrl + s
(3) Go to (1) if it does not freeze (yet)

Sometimes multiple fields have to be edited first

I haven't found any relevant bug in Gnome's GitLab.


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.18.0-3-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gnome-passwordsafe depends on:
ii  dconf-gsettings-backend [gsettings-backend]  0.40.0-3
ii  gir1.2-handy-1   1.6.3-1
ii  python3  3.10.5-3
ii  python3-construct2.10.68+dfsg1-1
ii  python3-dateutil 2.8.1-6
ii  python3-gi   3.42.2-1
ii  python3-pwquality1.4.4-1+b1
ii  python3-pycryptodome 3.11.0+dfsg1-3
ii  python3-pykeepass4.0.1-1

gnome-passwordsafe recommends no packages.

gnome-passwordsafe suggests no packages.

-- no debconf information



Bug#1016477: seafile-gui: Can't perform SSO Login: ERR_CERT_AUTHORITY_INVALID

2022-08-01 Thread Moritz Schlarb
Package: seafile-gui
Version: 8.0.7+ds1-1
Severity: important

Trying to use the Login with SSO function just leads to:

This site can’t be reached

The webpage at https://seafile.rlp.net/shib-
login?shib_client_version=8.0.7_platform=linux_device_name=blurb_platform_version=_device_id=blurb
might be temporarily down or it may have moved permanently to a new web
address.
ERR_CERT_AUTHORITY_INVALID

...


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.18.0-2-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages seafile-gui depends on:
ii  libc62.33-8
ii  libgcc-s112.1.0-7
ii  libglib2.0-0 2.72.3-1
ii  libjansson4  2.14-2
ii  libqt5core5a 5.15.4+dfsg-4
ii  libqt5dbus5  5.15.4+dfsg-4
ii  libqt5gui5   5.15.4+dfsg-4
ii  libqt5network5   5.15.4+dfsg-4
ii  libqt5webenginewidgets5  5.15.10+dfsg-4
ii  libqt5widgets5   5.15.4+dfsg-4
ii  libquazip5-1 0.9.1-2
ii  libseafile0  8.0.7-1
ii  libsearpc1   3.2.0-8+really3.2+git20220425.54145b0-1
ii  libsqlite3-0 3.39.2-1
ii  libstdc++6   12.1.0-7
ii  seafile-daemon   8.0.7-1

seafile-gui recommends no packages.

Versions of packages seafile-gui suggests:
ii  seafile-cli  8.0.7-1

-- no debconf information


Bug#1011284: popularity-contest: d/postinst: remove bash dependency, fix shellcheck

2022-08-01 Thread наб
Hi!

Sorry, I had a brain-fart last time. Instead of trying to do something
weird, we can just use The Program That Generates Random Numbers:
shuf appeared in coreutils 6.1 (2006-08-19) and is available under busybox.

Attached is a much simpler patchset that does the same thing but just
uses shuf -n1 -r0-$top_of_mod_range.

Best,
наб
From d46fe12c6161f3329c933514b1ac89c3c5e783da Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?= 
Date: Thu, 19 May 2022 16:52:23 +0200
Subject: [PATCH v3 1/2] Use shuf instead of bash to generate random numbers in
 d/postinst
X-Mutt-PGP: OS

---
 debian/changelog |  6 ++
 debian/postinst  | 10 +++---
 2 files changed, 13 insertions(+), 3 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index 063d6a9..200cfb8 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+popularity-contest (1.75) UNRELEASED; urgency=medium
+
+  * Use shuf instead of bash to generate random numbers in d/postinst
+
+ -- наб   Thu, 19 May 2022 16:52:49 +0200
+
 popularity-contest (1.74) unstable; urgency=medium
 
   * debian/rules: add missing targets. Closes: #999319 Thanks Lucas Nussbaum
diff --git a/debian/postinst b/debian/postinst
index 1501d5c..6737fd9 100755
--- a/debian/postinst
+++ b/debian/postinst
@@ -36,14 +36,18 @@ generate_id() {
 fi;
 }
 
+random_number() {
+	shuf -i 0-"$(( $1 - 1 ))" -n1
+}
+
 # Select a random day to submit on, to spread the load over time, unless it is already set.
 select_random_day() {
-DAY=`bash -c 'echo $(($RANDOM % 7))'`
+	DAY=$(random_number 7)
 }
 
 generate_crond() {
-  MIN=`bash -c 'echo $(($RANDOM % 60))'`
-  HOUR=`bash -c 'echo $(($RANDOM % 24))'`
+  MIN=$(random_number 60)
+  HOUR=$(random_number 24)
   FILE=/etc/cron.daily/popularity-contest
   cat > /etc/cron.d/popularity-contest /dev/null 2>&1; then
-MY_HOSTID=`uuidgen -r | tr -d -`
+MY_HOSTID=$(uuidgen -r | tr -d -)
 elif test -r /proc/sys/kernel/random/uuid; then
-MY_HOSTID=`tr -d - < /proc/sys/kernel/random/uuid`
+MY_HOSTID=$(tr -d - < /proc/sys/kernel/random/uuid)
 else
-MY_HOSTID=`od -x -An -N16 /dev/urandom | tr -d ' '`
+MY_HOSTID=$(od -x -An -N16 /dev/urandom | tr -d ' ')
 fi;
 }
 
@@ -102,7 +102,7 @@ case "$1" in
 # Workaround for bug #237874 triggered on hurd.  The
 # problem was fixed in version 1.15, 2004-03-20.
 
-  $EMPTYID) generate_id;;
+  "$EMPTYID") generate_id;;
 # Workaround for bug #240603 triggered by md5sums change
 # of behaviour with stdin. version 1.17, 2004-04-12.
   *-)  MY_HOSTID="${MY_HOSTID%  -}";;
-- 
2.30.2



signature.asc
Description: PGP signature


Bug#1016476: mod-wsgi: CVE-2022-2255: Trusted Proxy Headers Removing Bypass

2022-08-01 Thread Salvatore Bonaccorso
Source: mod-wsgi
Version: 4.9.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for mod-wsgi.

CVE-2022-2255[0]:
| Trusted Proxy Headers Removing Bypass

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-2255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2255
[1] 
https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#1016475: tmux sessions do not persist through logout

2022-08-01 Thread chrysn
Package: tmux
Version: 3.3a-1
Severity: normal

Under some starting conditions (eg. "starting from an xterm in Gnome"),
the tmux server gets killed when the user logs off (or, more
practically, gets logged off by the X server crashing). This damages one
of tmux's strong points: keeping whatever is launched in it running no
matter how unstable the terminal connection is.

Steps to reproduce:

* In a fresh sid installation, start Gnome under X11 (Wayland not
  tested).
* Alt+F2, xterm
* tmux
* Ensure you recognize the screen again later on
* Log out
* Log in back again, open xterm again
* tmux attach: "no sessions" -- the session was killed

Note that this is sentitive to the precise way tmux is being launched;
for example, if gnome-terminal were used, things would behave as normal.
That indicates that there is something processes can do to protect
themselves from getting killed (possibly with cgroups involved).

I've originally reported this against systemd as
https://bugs.debian.org/946645 assuming it's an error in
`KillUserProcesses=no` (whose default has caused similar grief), but
maintainers there insist it's not about that. The issue and discussion
around it may have valuable material, also w/rt other things I've
tested.

Please enable tmux to persist in the rough desktop environment. If you
think that it's not tmux's fault but tmux sessions should still persist,
please reassign to where you think this should be fixed.


Thanks
chrysn

PS. The issue appears to also exist in 3.4, which I've tested for
unrelated reasons.

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.18.0-3-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages tmux depends on:
ii  libc62.33-8
ii  libevent-core-2.1-7  2.1.12-stable-5+b1
ii  libtinfo66.3+20220423-2
ii  libutempter0 1.2.1-2

tmux recommends no packages.

tmux suggests no packages.

-- no debconf information

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom


signature.asc
Description: PGP signature


Bug#1016474: cryptsetup: The system installed on encrypted LVM (both root and swap partitions) freezes during massive writes

2022-08-01 Thread Guilhem Moulin
Control: tag -1 + moreinfo

Hi,

On Mon, 01 Aug 2022 at 12:27:39 +0200, Wojciech Zabołotny wrote:
> That configuration generally works, but if a massive write operations
> are performed, the syste, practically freezes.

What makes you think that is a src:cryptsetup issue?  Nothing in this
package is involved once the device has been mapped.

-- 
Guilhem.


signature.asc
Description: PGP signature


Bug#1005309: (no subject)

2022-08-01 Thread Lorenzo


Dear mentors,

A new version of the package is uploaded at mentors with the
following changes compared with the previous version uploaded:

  * maintscript are simplified by using the cpsv tool from runit package
  * README (explain how to use the package) is updated
  * git VCS moved under my salsa namespace
  * git history of the old package is preserved

I am looking for a sponsor for my package "runit-services":

 * Package name: runit-services
   Version : 0.5.0
   Upstream Author : [fill in name and email of upstream]
 * URL : [fill in URL of upstream's web site]
 * License : CC0-1.0, BSD-3-Clause
 * Vcs : https://salsa.debian.org/Lorenzo.ru.g-guest/runit-services
   Section : admin

The source builds the following binary packages:

  runit-services - UNIX init scheme with service supervision (services)

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/runit-services/

Alternatively, you can download the package with 'dget' using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/r/runit-services/runit-services_0.5.0.dsc

Git repo:

  https://salsa.debian.org/Lorenzo.ru.g-guest/runit-services/-/tree/next


Changes since the last upload:

 runit-services (0.5.0) experimental; urgency=medium
 .
   * Reintroduce the package (closes: #986656)
   * new maintainer
   * Overall package update:
 - 3.0 native format, use dh sequencer
 - build with dh-runit >= 2.14.0
 - dep5 copyright
 - bump S-V to 4.6.1
 - set Rules-requires-root to no
 - update package description
   * Enable the standard Salsa CI
   * Update/rewrite old services:
 - add apache2, remove apache;
 - update cron, chrony, postfix, xdm,
   dhclient;
 - rename dhcp to isc-dhcpd-server
   * Add new services:
   acpi-fakekey, anacron, atd, cups, dbus, elogind,
   gdomap (gnustep), haveged, lightdm, lircd,
   mariadb, mdadm, openntpd, preload, proftpd,
   rsyslog, sddm, slim, wicd
   * Remove obsolete services:
  - ssh (already included in openssh-server package);
  - portmap (no longer in Debian)
  - nfs-kernel-server, rpc.statd, squid, exim,
gdm (further work is needed)
   * Update copyright for new runscripts
   * Sync runscript at postinstall, by using 'cpsv --sync'
   * Add triggers to watch systemd and sysv services
 so that installed runit services are kept in sync
 with systemd/sysv services
   * Stop running services on package removal
   * postrm: disable services when the package is removed;
  remove service and log dirs when purge is requested
   * Update README
   * Add lintian override for empty log directories

Regards,
-- 
  Lorenzo Puliti



Bug#1001084: ITP: meli -- terminal mail client

2022-08-01 Thread Jonas Smedegaard
0.7.2 draft 1 needs embedding 66 crates (25 missing, 39 ahead); builds in ~35 
minutes;
runs and seems to work from a brief test use.

Main tasks now are to keep package up-to-date with upstream releases, and
to package more of the crates currently embedded.

Here's how you can help:

As user running Debian, you can test this draft package: Either build it
yourself from source or tell (by posting to this bugreport) if you
prefer testing the binary packages I built - then I will share those.

As developer (but no need to be official member of Debian!), you can
join the Debian Rust team and help package these missing crates:
https://salsa.debian.org/debian/meli/-/blob/debian/latest/debian/TODO


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Bug#910111: ITP: node-solid-server - Solid server on top of the file-system

2022-08-01 Thread Jonas Smedegaard
Control: retitle -1 ITP: node-solid-server - Solid server on top of the 
file-system
Control: owner -1 !

Solid is a concept and a collection of data specifications.
Implementation of Solid are what should be packaged.

I have for some time now made slow progress towards packaging the
Expat-licensed Node.js implementation "solid-server":
https://github.com/nodeSolidServer/node-solid-server

Breakdown of dependencies are tracked here:
https://wiki.debian.org/Javascript/Nodejs/Tasks/solid-server

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Bug#1016466: ImportError: /usr/lib/x86_64-linux-gnu/libgnuradio-runtime.so.3.10.3: undefined symbol

2022-08-01 Thread Chris Hofstaedtler
Control: reassign -1 libspdlog1
Control: affects -1 gnuradio

* Jan - PE0SAT :
> ImportError: /usr/lib/x86_64-linux-gnu/libgnuradio-runtime.so.3.10.3: 
> undefined symbol: 
> _ZN6spdlog5sinks15basic_file_sinkINS_7details10null_mutexEEC1ERKNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEEb

libspdlog1 has changed its ABI without bumping the SONAME. Probably
related/same as #1015742.



Bug#910111: ITP: node-solid-community-server - open and modular implementation of Solid specs

2022-08-01 Thread Jonas Smedegaard
Control: clone -1 -2
Control: retitle -2 ITP: node-solid-community-server - open and modular 
implementation of Solid specs
Control: owner -2 !

Solid is a concept and a collection of data specifications.
Implementation of Solid are what should be packaged.

I have for some time now made slow progress towards packaging the
Expat-licensed Node.js implementation "@solid/community-server":
https://github.com/CommunitySolidServer/CommunitySolidServer/

Breakdown of dependencies are tracked here:
https://wiki.debian.org/Javascript/Nodejs/Tasks/solid-community-server


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Bug#983146: 983146 RFS: bung/3.2.5-2 [ITP] -- backup next generation

2022-08-01 Thread Charles

Dear Bastian

Thank you for your help

The mentors upload has been fixed.  I had accidentally uploaded to 
ftp.upload.debian.org instead of mentors.debian.net


https://mentors.debian.net/package/bung/ QA information shows 'The 
uploader is not in the package's "Maintainer" or "Uploaders" fields'.  I 
will fix that on the next upload


The QA information shows lintian messages in the package and the source

I will fix
* The uploader is not in the package's "Maintainer" or "Uploaders"
  fields
* The W messages
* I extra-license-file
* I typo-in-manual-page
* I out-of-date-standards-version
* P silent-on-rules-requiring-root
* P uses-debhelper-compat-file
* X debian-watch-does-not-check-gpg-signature
* X upstream-metadata-file-is-missing

I will consider fixing
* X prefer-uscan-symlink

I cannot fix
* E source-is-missing
  Backup scripts next generation 3.2.x User Guide.htm is created by
  saving the .odt file in HTML format

Best

Charles



Bug#1016467: python3-configobj: places "private" files in top level of /usr/lib/python3/dist-packages

2022-08-01 Thread stefanor
Control: forwarded -1 https://github.com/DiffSK/configobj/issues/32
Control: tag -1 + upstream

Hi Julian (2022.08.01_06:26:09_+)
> A package should not be placing "_version.py" or "validate.py" in the
> top directory of this hierarchy.  Instead, the layout should be
> something like:

Yeah, this has always been a bit annoying for validate.py. And yes,
unacceptable for _version.py

The good news is that upstream fixed it *years* ago.
https://github.com/DiffSK/configobj/issues/32
https://github.com/DiffSK/configobj/issues/72

There is a separate package for validate now:
https://pypi.org/project/validate/

And the new configobj release (when it comes) will have a shim to push
users to it.

The bad news is that they haven't cut a release in many years:
https://github.com/DiffSK/configobj/issues/105
https://github.com/DiffSK/configobj/issues/160
https://github.com/DiffSK/configobj/issues/197
https://github.com/DiffSK/configobj/issues/204
https://github.com/DiffSK/configobj/issues/213

I'm a little hesitant to apply a package layout change without upstream
cutting a release for PyPI etc.

However, I see arch linux has done this.
https://bugs.archlinux.org/task/68893

It did cause some breakage for other modules, until they added a
compatibility shim:
https://bugs.archlinux.org/task/69057

So, we could do the same thing. But it'll need some testing with
reverse-deps.

SR

-- 
Stefano Rivera
  http://tumbleweed.org.za/
  +1 415 683 3272



Bug#1016251: python-lark: FTBFS: Handler for event 'source-read' threw an exception (exception: TableProcessor.__init__() missing 1 required positional argu

2022-08-01 Thread Peter Wienemann

Control: reassign -1 src:sphinx-markdown-tables
Control: found -1 0.0.15-3
Control: tags -1 + fixed-upstream
Control: affects -1 src:python-lark
thanks

Dear Lucas,

thanks for reporting this problem. It seems that the root cause of this 
FTBFS issue is a breaking change in python-markdown 3.4 which in turn 
requires changes in sphinx-markdown-tables which in turn is a build 
dependency of python-lark. More information on this issue can be found 
in the following sphinx-markdown-tables issue:


https://github.com/ryanfox/sphinx-markdown-tables/issues/36

Best regards,

Peter



Bug#1016470: RFP: muon-meson -- an implementation of the meson build system

2022-08-01 Thread Stephan Lachnit
Package: wnpp
Severity: wishlist
X-Debbugs-Cc: stephanlach...@debian.org

* Package name: muon-meson
  Version : any
  Upstream Author : https://git.sr.ht/~lattis/
* URL : https://muon.build/
* License : GPL v3
  Programming Lang: C99
  Description : an implementation of the meson build system

muon is an implementation of the meson build system in c99 with minimal
dependencies.

It is interesting because it has some features that meson does not:

- muon analyze - a static analyzer for meson.build files. Capable of doing type
inference, checking unused variables, undeclared variables, etc.
- muon fmt_unstable - a meson.build code formatter
- An interactive stepping debugger with the dbg() function.

muon is close to feature-complete with the core of meson for C and C++ (but
still in early development IMHO).


I think it should be fairly easy to package due to using meson and the minimal
dependencies, but I won't put the time into packaging it (yet).



Bug#1016469: qemu-web-desktop: please add support for riscv64

2022-08-01 Thread Bo YU
Source: qemu-web-desktop
Version: 22.04.22-1+ds1-1
Severity: wishlist
Tags: patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: debian-ri...@lists.debian.org

Dear qemu-web-desktop Maintainer,

The package has built on my real riscv64 hardware successfully with
change attached, so could you please add support for riscv64 arch as 
a build target in next upload? thanks.


-- 
Regards,
--
  Bo YU

diff -Nru qemu-web-desktop-22.04.22-1+ds1/debian/control qemu-web-desktop-22.04.22-1+ds1/debian/control
--- qemu-web-desktop-22.04.22-1+ds1/debian/control	2022-05-02 22:53:54.0 +0800
+++ qemu-web-desktop-22.04.22-1+ds1/debian/control	2022-05-02 22:55:59.0 +0800
@@ -10,7 +10,7 @@
 Homepage: https://gitlab.com/soleil-data-treatment/soleil-software-projects/remote-desktop
 
 Package: qemu-web-desktop
-Architecture: amd64 ppc64el arm64
+Architecture: amd64 ppc64el arm64 riscv64
 Depends: ${shlibs:Depends}, ${misc:Depends},
   apache2,
   libapache2-mod-perl2,


signature.asc
Description: PGP signature


Bug#1016468: android-platform-tools: do not override dwz

2022-08-01 Thread Gianfranco Costamagna

Source: android-platform-tools
Version: 29.0.6-20
tags: patch

Hello, I added a better patch instead of ignoring dwz call.
Its about exporting gdwarf-4, until new dwz starts understanding dwarf-5 format 
(so we should in the future re-evaluate this cflag and remove it).
Also, it would be nice to disable lto, I don't think it makes any sense in 
android toolchain.

trivial patch is:

diff -Nru android-platform-tools-29.0.6/debian/rules 
android-platform-tools-29.0.6/debian/rules
--- android-platform-tools-29.0.6/debian/rules  2022-07-28 16:01:55.0 
+
+++ android-platform-tools-29.0.6/debian/rules  2022-08-01 07:31:57.0 
+
@@ -4,10 +4,10 @@
 include /usr/share/dpkg/pkg-info.mk
 
 ## Security Hardening

-export DEB_BUILD_MAINT_OPTIONS = hardening=+all
+export DEB_BUILD_MAINT_OPTIONS = hardening=+all optimize=-lto
 # 
https://android.googlesource.com/platform/build/soong/+/refs/tags/platform-tools-29.0.6/cc/config/global.go#121
-export DEB_CFLAGS_MAINT_APPEND = -fPIC
-export DEB_CXXFLAGS_MAINT_APPEND = -fPIC
+export DEB_CFLAGS_MAINT_APPEND = -fPIC -gdwarf-4
+export DEB_CXXFLAGS_MAINT_APPEND = -fPIC -gdwarf-4
 export DEB_LDFLAGS_MAINT_APPEND = -fPIC
 export DEB_CPPFLAGS_MAINT_APPEND = -DNDEBUG -UDEBUG \
   -fmessage-length=0 \
@@ -205,6 +205,3 @@
dh_gencontrol -pandroid-sdk-libsparse-utils -- -v1:$(DEB_VERSION)
dh_gencontrol -pfastboot -- -v1:$(DEB_VERSION)
dh_gencontrol -pmkbootimg -- -v1:$(DEB_VERSION)
-
-override_dh_dwz:
-   dh_dwz || true


G.



  1   2   >