Bug#1026199: release.debian.org: Is the toolchain list updated for bookworm

2022-12-16 Thread Paul Gevers

Dear Sam,

On 16-12-2022 02:40, Sam Hartman wrote:

I was looking at 
https://release.debian.org/testing/essential-and-build-essential.txt

trying to figure out which packages I'm involved in are covered by the
toolchain freeze.  I am wondering what's still pulling
libgssapi-krb5-2 and friends into build-essential.  It used to be
pulled in via pam via libtirpc, but that should have gone away with
the pam upload of 1.4.0-13.


I'm wondering if that list hasn't been recently updated or if there's some 
other dependency cycle pulling in krb5?


I just refreshed the list, it's still there. I used a script on udd, 
essentially this:


essentials = {'build-essential'}

def add_sql_packages(con, essentials, query):
cur = con.cursor()

cur.execute(query)
items = cur.fetchall()
cur.close()

for item in items:
if item[0] is not None:
no_alt = re.sub(alternatives, "", item[0])
no_ver = re.sub(version, "", no_alt)

for x in no_ver.split(','):
essentials.add(re.sub(multiarch, "", x.strip()))

query = "SELECT DISTINCT package FROM packages WHERE release = 
'bookworm' and essential = 'yes'"


add_sql_packages(con, essentials, query)

done = False
while not done:
ess_org = copy.copy(essentials)
query = """SELECT DISTINCT depends FROM packages WHERE release = 
'bookworm' and

package in ('%s')""" % "','".join(essentials)
add_sql_packages(con, essentials, query)
if essentials == ess_org:
done = True

I haven't checked yet what pulled it in.

Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1026247: Acknowledgement (Spyder shows a popup message on start: "You have missing dependencies! Mandatory: qdarkstyle")

2022-12-16 Thread local10
More info:

Operating System: Debian 12 Bookworm GNU/Linux
KDE Plasma Version: 5.26.4  KDE Frameworks Version: 5.100.0  Qt Version: 5.15.6
Kernel Version: 6.0.0-5-amd64 (64-bit)
Graphics Platform: X11



Bug#1026247: Spyder shows a popup message on start: "You have missing dependencies! Mandatory: qdarkstyle"

2022-12-16 Thread local10
Package: spyder
Version: 5.3.3+dfsg-3


Every time I start Spyder the following popup shows up:

    You have missing dependencies!

    # Mandatory:
    qdarkstyle >=3.0.2;<3.1.0 : 3.1 (NOK)

    Please install them to avoid this message.

    Note: Spyder could work without some of these dependencies, however to have 
a smooth experience when using Spyder we strongly recommend you to install all 
the listed missing dependencies.


Other than this message the Spyder IDE seems to functions without issues.

Where do I get that qdarkstyle package?

# aptitude search qdarkstyle
i A python3-qdarkstyle


Regards,



Bug#1026246: ITP: ruby-telesign -- TeleSign Ruby SDK

2022-12-16 Thread Vinay

package: wnpp
Severity: wishlist
Owner: Vinay Keshava

*Package Name  : ruby-telesign
 Version   : 2.2.3
 Upstream Author   : 2017 TeleSign Corp
*URL   :https://github.com/TeleSign/ruby_telesign
*License   : Expat
 Programming Lang  : Ruby
*Description   : TeleSign Ruby SDK

 TeleSign Ruby SDK lets you easily integrate with our REST API

.

This gem is required for gitlab.

- Vinay Keshava


Bug#1010740: ruby-bootsnap: FTBFS on ppc64el: test suite hangs

2022-12-16 Thread Paul Gevers

Hi,

On Sun, 8 May 2022 20:59:08 -0300 Antonio Terceiro  
wrote:

The ruby-bootsnap test suite hangs forever on ppc64el. This has been
reported upstream at the link above, and happens on both the version in
testing and the one in unstable.


There have been several successful builds since this bug was reported. 
Should this bug be closed?


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1026245: gm2-12-doc,gm2-13-doc: ships unversioned /usr/share/info/gm2.info.gz

2022-12-16 Thread Andreas Beckmann
Package: gm2-12-doc,gm2-13-doc
Severity: serious
Control: found -1 12.2.0-10
Control: found -1 13-20221214-1

Hi,

there is a file conflict between gm2-12-doc and gm2-13-doc:

  Preparing to unpack .../gm2-13-doc_13-20221214-1_all.deb ...
  Unpacking gm2-13-doc (13-20221214-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/gm2-13-doc_13-20221214-1_all.deb (--unpack):
   trying to overwrite '/usr/share/info/gm2.info.gz', which is also in package 
gm2-12-doc 12.2.0-10
  Errors were encountered while processing:
   /var/cache/apt/archives/gm2-13-doc_13-20221214-1_all.deb

Please rename that to gm2-XX.info.gz and provide a symlink
in gm2-doc (does not yet exist) like for e.g. gcc-doc.
Do not forget versioned Breaks+Replaces in gm2-doc for taking over
gm2.info.gz from these two packages.


Andreas


gm2-12-doc=12.2.0-10_gm2-13-doc=13-20221214-1.log.gz
Description: application/gzip


Bug#1025176: libicu71 missing on SH4 port

2022-12-16 Thread Rob Landley



On 12/16/22 20:43, Jeffrey Walton wrote:
> On Fri, Dec 16, 2022 at 9:23 PM Rob Landley  wrote:
>> [...]
>> How does one do an 'entirely from source' debootstrap, anyway? (If I wanted 
>> to
>> reproduce your current sh4 build on my system, where would I start?)
> 
> For SH-4 I use a Debian Chroot and follow
> https://cryptopp.com/wiki/Debian_Chroot#SH-4 .
> 
> Start with Debian Unstable/Sid.
> 
> Then add the following packages:
> 
> # apt install qemu qemu-user-static binfmt-support debootstrap
> debian-archive-keyring debian-ports-archive-keyring
> 
> And then setup the SH-4 guest:
> 
> # qemu-debootstrap --arch=sh4 --keyring
> /usr/share/keyrings/debian-ports-archive-keyring.gpg \
>   --variant=buildd --exclude=debfoster unstable debian-sh4
> http://ftp.ports.debian.org/debian-ports

$ sudo apt-get install debian-ports-archive-keyring
...
$ sudo qemu-debootstrap --arch=sh4 --keyring
/usr/share/keyrings/debian-ports-archive-keyring.gpg   --variant=buildd
--exclude=debfoster unstable debian-sh4 http://ftp.ports.debian.org/debian-ports
I: Running command: debootstrap --arch sh4 --foreign --keyring
/usr/share/keyrings/debian-ports-archive-keyring.gpg --variant=buildd
--exclude=debfoster unstable debian-sh4 http://ftp.ports.debian.org/debian-ports
I: Retrieving InRelease
I: Checking Release signature
E: Release signed by unknown key (key id E852514F5DF312F6)
   The specified keyring /usr/share/keyrings/debian-ports-archive-keyring.gpg
may be incorrect or out of date.
   You can find the latest Debian release key at
https://ftp-master.debian.org/keys.html

Nope, doesn't work from devuan beowulf. Oh well.

Thanks, off to other things...

Rob



Bug#1025176: libicu71 missing on SH4 port

2022-12-16 Thread Jeffrey Walton
On Fri, Dec 16, 2022 at 9:23 PM Rob Landley  wrote:
> [...]
> How does one do an 'entirely from source' debootstrap, anyway? (If I wanted to
> reproduce your current sh4 build on my system, where would I start?)

For SH-4 I use a Debian Chroot and follow
https://cryptopp.com/wiki/Debian_Chroot#SH-4 .

Start with Debian Unstable/Sid.

Then add the following packages:

# apt install qemu qemu-user-static binfmt-support debootstrap
debian-archive-keyring debian-ports-archive-keyring

And then setup the SH-4 guest:

# qemu-debootstrap --arch=sh4 --keyring
/usr/share/keyrings/debian-ports-archive-keyring.gpg \
  --variant=buildd --exclude=debfoster unstable debian-sh4
http://ftp.ports.debian.org/debian-ports

Finally, enter the SH-4 guest with:

# chroot debian-sh4

Jeff



Bug#1025176: libicu71 missing on SH4 port

2022-12-16 Thread Rob Landley



On 12/16/22 13:02, John Paul Adrian Glaubitz wrote:
> 
> 
>> On Dec 16, 2022, at 7:29 PM, John Paul Adrian Glaubitz
>>  wrote:
>>
>> 
>>
>>
>>> On Dec 16, 2022, at 7:18 PM, Jérémy Lal  wrote:
>>>
>>> Source: icu
>>> Followup-For: Bug #1025176
>>> X-Debbugs-Cc: debian-sup...@lists.debian.org
>>>
>>> Considering the needed porting work is only a few lines:
>>> https://github.com/python-greenlet/greenlet/tree/master/src/greenlet/platform
>>>
>>> sh4 porters might be able to help here.
>>
>> icu or python-greenlet? The former has been built on sh4:
> 
> Looking at the rest of the bug report
> 
> The reason why boost1.74 is not up to date is this bug:
> 
>> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016904

I note you can run a debian root filesystem under qemu-system-sh4 with a large
swap file on your media image. It's not great (the board only has 64 megs
emulated ram so the swap file gets a bit hammered, although the host disk cache
covers for it), but it works better than application emulation doing dodgy
things with system calls?

How does one do an 'entirely from source' debootstrap, anyway? (If I wanted to
reproduce your current sh4 build on my system, where would I start?)

Rob



Bug#1024322: transition: dpdk

2022-12-16 Thread Luca Boccassi
Control: tags -1 -moreinfo

On Wed, 23 Nov 2022 at 19:49, Sebastian Ramacher  wrote:
>
> Control: tags -1 moreinfo
>
> On 2022-11-17 14:27:25 +, Luca Boccassi wrote:
> > Package: release.debian.org
> > Severity: normal
> > User: release.debian@packages.debian.org
> > Usertags: transition
> > X-Debbugs-CC: pkg-dpdk-de...@lists.alioth.debian.org z...@debian.org
> >
> > Hello Thomas and Release Team,
> >
> > As we did for Bullseye, we are proposing the following plan to allow
> > Bookworm to ship with the latest LTS versions of DPDK and OVS. This
> > will let us make use of the full LTS support windows for both projects,
> > as we have done for the past few releases.
> >
> > Upload OVS built from git (with new sonames/package renames if
> > necessary), new OVN, DPDK 22.11 in early-to-mid December to unstable,
> > ideally before the 16th as we go on vacation after that, to finish the
> > transition.
> >
> > Then, after OVS 3.1 releases in February, upload it unstable (no
> > soname/transition required, as only bug fixes will go in at that
> > point). The upstream release might happen before or after the
> > 2023/02/12 soft freeze, and if it is after we will ask for an
> > exception.
> >
> > Would this plan work for everyone?
>
> Sounds like that should work like last time. Please remove the moreinfo
> tag once dpdk is ready for the upload to unstable.

Hi,

We are now ready. dpdk, openvswitch and ovn are ready in experimental.
uhd and collectd in unstable will need a simple binary rebuild and are
already compatible.

Kind regards,
Luca Boccassi



Bug#1026244: gnome-remote-desktop: No support for VNC

2022-12-16 Thread Ben Westover
Package: gnome-remote-desktop
X-Debbugs-Cc: m...@benthetechguy.net
Version: 43.2-1
Severity: important

Dear Maintainer,

When I run grdctl, none of the VNC-related options are available. I see
that the Debian packaging has chosen not to build it. Why is this? I
need to use VNC for my job, and gnome-remote-desktop is the only
solution I know of that supports Wayland well.

At the very least, if adding VNC back to the package isn't an option,
can it at least be removed from the package description?

 > This daemon enables GNOME to offer remote desktop sharing using VNC
 > with PipeWire.

It's a bit misleading to say your package supports VNC when it doesn't.

Thanks,
- --
Ben Westover

-- System Information:
Debian Release: bookworm/sid
   APT prefers testing
   APT policy: (500, 'testing')
Architecture: arm64 (aarch64)

Kernel: Linux 6.1.0-asahi (SMP w/8 CPU threads)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=C.UTF-8, LCCTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gnome-remote-desktop depends on:
ii  dconf-gsettings-backend [gsettings-backend]  0.40.0-3
ii  fuse33.12.0-1
ii  init-system-helpers  1.65.2
ii  libc62.36-6
ii  libcairo21.16.0-7
ii  libepoxy01.5.10-1
ii  libfreerdp-server2-2 2.9.0+dfsg1-1
ii  libfreerdp2-22.9.0+dfsg1-1
ii  libfuse3-3   3.12.0-1
ii  libglib2.0-0 2.74.2-1
ii  libmutter-11-0   43.0-2
ii  libnotify4   0.8.1-1
ii  libpipewire-0.3-00.3.62-1
ii  libsecret-1-00.20.5-3
ii  libtss2-esys-3.0.2-0 3.2.0-4
ii  libtss2-mu0  3.2.0-4
ii  libtss2-rc0  3.2.0-4
ii  libtss2-tctildr0 3.2.0-4
ii  libwinpr2-2  2.9.0+dfsg1-1
ii  libxkbcommon01.4.1-1
ii  pipewire 0.3.62-1
ii  wireplumber  0.4.12-1+b1

gnome-remote-desktop recommends no packages.

gnome-remote-desktop suggests no packages.

-- no debconf information


OpenPGP_signature
Description: PGP signature


Bug#1026243: fwupd: please remove old .gz cache files on upgrade (now using .xz)

2022-12-16 Thread Alexandre Detiste
Package: fwupd
Version: 1.8.8-1
Severity: minor
User: cruft...@packages.debian.org
Usertags: cruft
X-Debbugs-Cc: p...@debian.org

Hi,

Since a recent upgrade, fwupd has changed it's compression scheme.
So please in a next upload include preinst/posting these two lines:

rm -f /var/lib/fwupd/metadata/lvfs/metadata.xml.gz
rm -f /var/lib/fwupd/metadata/lvfs/metadata.xml.gz.jcat

to keep systems clean of old stale data.

Greetings,



tchet@brix ~ $ ls -l  /var/lib/fwupd/metadata/lvfs/
total 1544
-rw-r--r-- 1 root root 758839  9 déc 01:59 metadata.xml.gz
-rw-r--r-- 1 root root   2228  9 déc 01:59 metadata.xml.gz.jcat
-rw-r--r-- 1 root root 807792 16 déc 17:14 metadata.xml.xz
-rw-r--r-- 1 root root   2205 16 déc 17:14 metadata.xml.xz.jcat


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (501, 'testing'), (450, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.0-5-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_BE:fr
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages fwupd depends on:
ii  adduser3.129
ii  libarchive13   3.6.0-1
ii  libc6  2.36-6
ii  libcbor0.8 0.8.0-2+b1
ii  libcurl3-gnutls7.86.0-2
ii  libefiboot137-6
ii  libflashrom1   1.2-5
ii  libfwupd2  1.8.8-1
ii  libgcab-1.0-0  1.5-1
ii  libglib2.0-0   2.74.2-1
ii  libgnutls303.7.8-4
ii  libgudev-1.0-0 237-2
ii  libgusb2   0.3.10-1
ii  libjcat1   0.1.9-1
ii  libjson-glib-1.0-0 1.6.6-1
ii  liblzma5   5.2.9-0.0
ii  libmbim-glib4  1.28.0-1
ii  libmbim-proxy  1.28.0-1
ii  libmm-glib01.20.0-1
ii  libpolkit-gobject-1-0  122-1
ii  libprotobuf-c1 1.4.1-1+b1
ii  libqmi-glib5   1.32.0-1
ii  libqmi-proxy   1.32.0-1
ii  libsmbios-c2   2.4.3-1
ii  libsqlite3-0   3.40.0-1
ii  libsystemd0252.2-2
ii  libtss2-esys-3.0.2-0   3.2.0-4
ii  libxmlb2   0.3.8-1
ii  shared-mime-info   2.2-1

Versions of packages fwupd recommends:
pn  bolt   
ii  dbus   1.14.4-1
pn  fwupd-signed   
ii  jq 1.6-2.1
ii  python33.10.6-1
pn  secureboot-db  
ii  udisks22.9.4-4

Versions of packages fwupd suggests:
pn  gir1.2-fwupd-2.0  

-- Configuration Files:
/etc/fwupd/redfish.conf [Errno 13] Permission non accordée: 
'/etc/fwupd/redfish.conf'

-- no debconf information


Bug#1026242: ITP : node-seek-bzip -- Pure Javascript Node.Js module for random-access decoding bzip2 data

2022-12-16 Thread Sandra Uwah
Package: wnppX-Debbugs-Cc:debian-de...@lists.debian.org
Owner: Sandra Uwah 

X-Debbugs-Cc:sandrauwah...@gmail.com

Severity: wishlist

* Package name: node-seek-bzip
  Version : 2.0.0
  Upstream Author : C. Scott Ananian
* URL :https://github.com/cscott/seek-bzip#readme
* License : Expat
  Programming Lang: Javascript
  Description : Pure-Javascript Node.Js module for random-access
decoding bzip2 data


Bug#1026241: [python3-cryptography] new version breaks deluge

2022-12-16 Thread Sandro Tosi
control: reassign -1 python3-openssl
control: forcemerge 1026215 -1

On Fri, Dec 16, 2022 at 6:42 PM Lyndon Brown  wrote:
>
> Package: python3-cryptography
> Version: 38.0.4-1
> Severity: important
>
> Please be aware that the new version breaks deluge, see bug #1026240.

the error is in pyopenssl, which im about to upgrade

-- 
Sandro "morph" Tosi
My website: http://sandrotosi.me/
Me at Debian: http://wiki.debian.org/SandroTosi
Twitter: https://twitter.com/sandrotosi



Bug#1025618: cloud-init and firewalld systemd unit files have ordering cycles

2022-12-16 Thread Ross Vandegrift
On Mon, Dec 12, 2022 at 05:41:46PM -0800, Noah Meyerhans wrote:
> On 12/12/2022 6:44 AM, Sam Hartman wrote:
> >  >> From my quick read: Michael Biebl proposes dropping
> >  >> network-pre.target
> >  Ross> from cloud-init's After=, and replacing it with each of the
> >  Ross> config backends that cloud-init supports.  This sounds pretty
> >  Ross> reasonable, but also like something that upstream should
> >  Ross> address first.
> > 
> > Why wait for upstream?
> > It's a bug affecting Debian users, our systemd maintainer has a solution
> > that you (and I) think is reasonable.
> > The symptom is quite serious.
> > We often make changes before upstream in situations like that,
> > especially when the alternative is:
> > 
> >  Ross> Should we consider adding "Conflicts: firewalld" to cloud-init
> >  Ross> before the freeze?  That's not optimal of course, but it'd
> >  Ross> prevent a user from ending up in this situation for now.
> > 
> > I'd much rather see Debian local changes than conflicts.
> 
> We should simply move this discussion to an upstream pull request rather
> than wait passively for their response. I agree that diverging from upstream
> is preferable to unnecessary conflicts, but it shouldn't be done without
> first consulting with upstream on our proposed solution.

I played with the suggested solution and was unable to get it working:
cloud-init.service doesn't have a /direct/ Before=network-pre.target to remove.
The ordering is implicit in the combination of units.

Probably, I think Michael knew that when he made the suggestion - but I had to
play with it for a few hours first. :)

At a high level the issue is: firewalld.service forces network-pre.target after
sysinit.target, but cloud-init.service forces the other way around.  In detail,
using < to represent Before, the imposed orderings look like:

- from firewalld:
  sysinit.target < dbus.service < firewalld.service < network-pre.target
- from cloud-init:
  cloud-init-local.service < network-pre.target < 
systemd-networkd-wait-online.service < cloud-init.service < sysinit.target

There's a few approaches to resolving this.  As far as I can tell, the only
immediately viable one (at the bottom) requires users to manually fix this
and accept some trade-offs.  Anyone have any better ideas?



Modify firewalld to run before sysinit.target 
-

This would let cloud-init and firewalld agree to do network-pre.target before
sysinit.target.

This is probably not possible since firewalld requires dbus, which starts after
sysinit.target.  There's a thread at [1] about why moving firewalld to be an
early boot service is difficult.
   

Modify cloud-init to run after sysinit.target
-

This would let cloud-init and firewalld agree to do network-pre.target after
sysinit.target.  This might not be advisable (see comments in [1] about running
network management services in late boot), but it looks like this is how RHEL
does it [2].

>From [3], I think cloud-init.service added Before=basic.target (which
eventually became Before=sysinit.target) to ensure cloud-init configured block
device mounts were ready early enough in boot process.  The network needs to be
online for this, since some block device config can come from network sources.
So changing this in the Debian package seems risky to me.


Locally override firewalld.service's order
--

If you need to use both together, create an override unit that removes
Before=network-pre.target.  This eliminates the cycle by allowing cloud-init's
order to win.  But it the network will be up without firewalld for a period.
Unfortunately, dependencies can't be removed in a drop-in - so I think you need
to copy the unit to /etc/systemd/system and modify it.

Ross

[1] - 
https://lists.freedesktop.org/archives/systemd-devel/2022-March/047538.html
[2] - 
https://github.com/canonical/cloud-init/blob/main/systemd/cloud-init.service.tmpl#L4-L6
[3] - 
https://github.com/canonical/cloud-init/commit/80f5ec4be0f781b26eca51d90d51abfab396b3f6



Bug#1026241: [python3-cryptography] new version breaks deluge

2022-12-16 Thread Lyndon Brown
Package: python3-cryptography
Version: 38.0.4-1
Severity: important

Please be aware that the new version breaks deluge, see bug #1026240. 

Presumably needs the deluge maintainer to just update the packaged
version rather than a bug fix being needed on this package. (Deluge is
at v2.0.3; there's been 2.0.4, 2.0.5, 2.1.0 and 2.1.1 since).

Filing this bug primarily to raise awareness.



Bug#1026240: Acknowledgement ([deluge] crashes on load)

2022-12-16 Thread Lyndon Brown
Downgrading python3-cryptography from 38.0.4-1 to 3.4.8-2 is a
temporary workaround.



Bug#1026240: [deluge] crashes on load

2022-12-16 Thread Lyndon Brown
Package: deluge
Version: 2.0.3-3.2
Severity: grave

Worked yesterday, now won't start.

Loading in a terminal reveals the following output:

Traceback (most recent call last):
  File "/usr/bin/deluge", line 33, in 
sys.exit(load_entry_point('deluge==2.0.3', 'gui_scripts', 'deluge')())
  File "/usr/lib/python3/dist-packages/deluge/ui/ui_entry.py", line 143, in 
start_ui
ui.start()
  File "/usr/lib/python3/dist-packages/deluge/ui/gtk3/__init__.py", line 43, in 
start
from .gtkui import GtkUI
  File "/usr/lib/python3/dist-packages/deluge/ui/gtk3/gtkui.py", line 27, in 

from twisted.internet import defer, gtk3reactor
  File "/usr/lib/python3/dist-packages/twisted/internet/gtk3reactor.py", line 
22, in 
from twisted.internet import gireactor
  File "/usr/lib/python3/dist-packages/twisted/internet/gireactor.py", line 27, 
in 
from twisted.internet import _glibbase
  File "/usr/lib/python3/dist-packages/twisted/internet/_glibbase.py", line 19, 
in 
from twisted.internet import base, posixbase, selectreactor
  File "/usr/lib/python3/dist-packages/twisted/internet/posixbase.py", line 19, 
in 
from twisted.internet import error, tcp, udp
  File "/usr/lib/python3/dist-packages/twisted/internet/tcp.py", line 38, in 

from twisted.internet._newtls import (
  File "/usr/lib/python3/dist-packages/twisted/internet/_newtls.py", line 18, 
in 
from twisted.protocols.tls import TLSMemoryBIOFactory, TLSMemoryBIOProtocol
  File "/usr/lib/python3/dist-packages/twisted/protocols/tls.py", line 50, in 

Connection(Context(TLSv1_METHOD), None)
  File "/usr/lib/python3/dist-packages/OpenSSL/SSL.py", line 674, in __init__
res = _lib.SSL_CTX_set_ecdh_auto(context, 1)
AttributeError: module 'lib' has no attribute 'SSL_CTX_set_ecdh_auto'



Bug#1026137: gobgp: switch B-D to golang-github-golang-protobuf-1-5-dev

2022-12-16 Thread Mathias Gibbens
Control: block 1026137 by 1026139

  Updating the B-D to golang-github-golang-protobuf-1-5-dev conflicts
with golang-github-golang-protobuf-1-3-dev that is pulled in by the
version of golang-google-grpc-dev in experimental or one of its
dependencies. Once that's resolved it should be pretty straightforward
to resolve the issue with gobgp in experimental.

Mathias


signature.asc
Description: This is a digitally signed message part


Bug#1026235: tar: ftbfs with recent glibc

2022-12-16 Thread John David Anglin

On 2022-12-16 5:33 p.m., Florian Weimer wrote:

* John David Anglin:


On 2022-12-16 4:24 p.m., Florian Weimer wrote:

* John David Anglin:


I think __USE_TIME_BITS64 should be defined when _FILE_OFFSET_BITS==64
This would avoid the overflow converting tv_sec from 64 to 32 bits.

It's an ABI break.  You probably can enable it in the tar build safely
because it's not a library.  But doing it by default across the
distribution is difficult because it changes the meaning of time_t in
header files.

But it seems we already have an ABI break since tar built before the
recent glibc changes.

No, not an ABI break.  A regression.  I suspect the glibc bugfix exposed
that the tar test was failing all along.

If we are sure that the glibc bugfix just exposed the tar problem, then this 
issue can be closed.

Dave

--
John David Anglin  dave.ang...@bell.net



Bug#1026239: transition: proftpd-dfsg

2022-12-16 Thread Hilmar Preusse
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: proftpd-d...@packages.debian.org
Control: affects -1 + src:proftpd-dfsg

This transition was already started by the recent proftpd upload, but is
not caught caught automatically since it is a virtual package name that
has changed.

Ben file:

title = "proftpd-dfsg";
is_affected = .depends ~ "proftpd-abi-1.3.7d" | .depends ~ "proftpd-abi-1.3.8";
is_good = .depends ~ "proftpd-abi-1.3.8";
is_bad = .depends ~ "proftpd-abi-1.3.7d";

Hilmar

-- 
sigmentation fault


signature.asc
Description: PGP signature


Bug#1026235: tar: ftbfs with recent glibc

2022-12-16 Thread Florian Weimer
* John David Anglin:

> On 2022-12-16 4:24 p.m., Florian Weimer wrote:
>> * John David Anglin:
>>
>>> I think __USE_TIME_BITS64 should be defined when _FILE_OFFSET_BITS==64
>>> This would avoid the overflow converting tv_sec from 64 to 32 bits.
>> It's an ABI break.  You probably can enable it in the tar build safely
>> because it's not a library.  But doing it by default across the
>> distribution is difficult because it changes the meaning of time_t in
>> header files.

> But it seems we already have an ABI break since tar built before the
> recent glibc changes.

No, not an ABI break.  A regression.  I suspect the glibc bugfix exposed
that the tar test was failing all along.

Thanks,
Florian



Bug#1025873: snac2: Crashes after a seconds with segfault since another account mentioned an account on this instance

2022-12-16 Thread James Valleroy

On Sun, 11 Dec 2022 02:17:59 +0100 Axel Beckert  wrote:
> It might help to first try to package the most recent upstream version
> (2.15 as of this writing) because 2.12 and 2.14 at least do fix some
> crashes according to the release notes. So maybe these crashes I
> experience are already fixed upstream.
>
> Feel free to ping me for testing the new version.

2.15 is now in experimental. Please check if the issue still happens.


OpenPGP_signature
Description: OpenPGP digital signature


Bug#990560: Error message "Value too large for defined data type"

2022-12-16 Thread James McCoy
On Tue, Dec 13, 2022 at 07:08:29PM +0100, Helge Deller wrote:
> tag: hppa, lfs, patch
> 
> This bug usually indicates that a 32-bit application uses
> functions like readdir() which (by default on a 32bit platform)
> can only handle 32-bit values for inode numbers.
> You can overcome that issue by recompiling the code while providing
> "-D_FILE_OFFSET_BITS=64" on the gcc command line.

Thanks for the investigation.  Subversion is using libapr to perform the
directory listing, which builds with -D_LARGEFILE64_SUPPORT but not
-D_FILE_OFFSET_BITS=64.

Subversion itself also builds with -D_LARGEFILE64_SUPPORT and (for the
Perl bindings) -D_FILE_OFFSET_BITS=64.  It should probably be consistent
about that, which your suggestion would enforce.

> In this specific case I suggest to add the "future=+lfs" option
> to debian/rules  like this (copy/pasted here - may not apply cleanly but you 
> get the idea):

I'll need to double check whether this affects the ABI of subversions
library.  Hopefully not, since it tends to defer to APR for OS-specific
things.

However, I'm not sure changing subversion's build alone will address the
problem.  APR may need a similar change.

Cheers,
-- 
James
GPG Key: 4096R/91BF BF4D 6956 BD5D F7B7  2D23 DFE6 91AE 331B A3DB



Bug#965990: Won't fix

2022-12-16 Thread Jeremy Sowden
Control: tags -1 +wontfix

The `export` command was removed in nftables v0.9.1.

J.


signature.asc
Description: PGP signature


Bug#1026234: linux-image-6.0.0-5-amd64: i915 driver fails on resume

2022-12-16 Thread Salvatore Bonaccorso
Hi Floris,

On Fri, Dec 16, 2022 at 10:34:08PM +0100, Floris Bruynooghe wrote:
> Hi Salvatore,
> 
> On Fri 16 Dec 2022 at 21:50 +0100, Salvatore Bonaccorso wrote:
> 
> > Hi Floris,
> >
> > On Fri, Dec 16, 2022 at 09:28:35PM +0100, Floris Bruynooghe wrote:
> >> Package: src:linux
> >> Version: 6.0.10-2
> >> Severity: important
> >> 
> >> Dear Maintainer,
> >> 
> >> Since the 6.0.0-5 kernel the i915 graphics driver often fails on resume.
> >> Downgrading to the 6.0.0-4 kernel fixes it and the driver works
> >> flawlessly across resume, changing displays etc.
> >> 
> >> On the -5 kernel the following errors are observed when the driver
> >> crashes:
> >> 
> >> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-9: PM: parent card0 should 
> >> not be sleeping
> >> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-10: PM: parent card0 
> >> should not be sleeping
> >> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-11: PM: parent card0 
> >> should not be sleeping
> >> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: [drm] *ERROR* 
> >> Sending link address failed with -5
> >> Dec 13 11:26:58 fredriksen kernel: [ cut here ]
> >> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 
> >> drm_WARN_ON(dig_port->tc_mode != TC_PORT_DISCONNECTED)
> >> Dec 13 11:26:58 fredriksen kernel: WARNING: CPU: 0 PID: 27095 at 
> >> drivers/gpu/drm/i915/display/intel_tc.c:711 int>
> >> Dec 13 11:26:58 fredriksen kernel: Modules linked in: usblp ctr ccm rfcomm 
> >> cmac algif_hash algif_skcipher af_alg>
> >> Dec 13 11:26:58 fredriksen kernel:  snd_sof_utils ecdh_generic 
> >> snd_soc_hdac_hda ecc snd_hda_ext_core snd_soc_acp>
> >> Dec 13 11:26:58 fredriksen kernel:  configfs efivarfs ip_tables x_tables 
> >> autofs4 btrfs blake2b_generic libcrc32c>
> >> Dec 13 11:26:58 fredriksen kernel: CPU: 0 PID: 27095 Comm: kworker/u32:101 
> >> Not tainted 6.0.0-5-amd64 #1  Debian >
> >> Dec 13 11:26:58 fredriksen kernel: Hardware name: LENOVO 
> >> 21CBCTO1WW/21CBCTO1WW, BIOS N3AET67W (1.32 ) 09/27/2022
> >> Dec 13 11:26:58 fredriksen kernel: Workqueue: events_unbound 
> >> async_run_entry_fn
> >> Dec 13 11:26:58 fredriksen kernel: RIP: 
> >> 0010:intel_tc_port_sanitize+0x2d2/0x490 [i915]
> >> Dec 13 11:26:58 fredriksen kernel: Code: 4c 8b 6f 50 4d 85 ed 75 03 4c 8b 
> >> 2f e8 a7 44 42 e3 48 c7 c1 f8 a6 d6 c0>
> >> Dec 13 11:26:58 fredriksen kernel: RSP: 0018:a84dc5debc08 EFLAGS: 
> >> 00010286
> >> Dec 13 11:26:58 fredriksen kernel: RAX:  RBX: 
> >> 9c812065 RCX: 
> >> Dec 13 11:26:58 fredriksen kernel: RDX: 0001 RSI: 
> >> a4b7eeea RDI: 
> >> Dec 13 11:26:58 fredriksen kernel: RBP:  R08: 
> >> a5262260 R09: a5b5348a
> >> Dec 13 11:26:58 fredriksen kernel: R10:  R11: 
> >> 004a R12: 9c81101a2000
> >> Dec 13 11:26:58 fredriksen kernel: R13: 9c8101f19900 R14: 
> >>  R15: 9c81101a2000
> >> Dec 13 11:26:58 fredriksen kernel: FS:  () 
> >> GS:9c883f40() knlGS:
> >> Dec 13 11:26:58 fredriksen kernel: CS:  0010 DS:  ES:  CR0: 
> >> 80050033
> >> Dec 13 11:26:58 fredriksen kernel: CR2: 55710e140b16 CR3: 
> >> 0002db810003 CR4: 00770ef0
> >> Dec 13 11:26:58 fredriksen kernel: PKRU: 5554
> >> Dec 13 11:26:58 fredriksen kernel: Call Trace:
> >> Dec 13 11:26:58 fredriksen kernel:  
> >> Dec 13 11:26:58 fredriksen kernel:  intel_ddi_sync_state+0x3f/0x90 [i915]
> >> Dec 13 11:26:58 fredriksen kernel:  
> >> intel_modeset_setup_hw_state+0x3b1/0x1410 [i915]
> >> Dec 13 11:26:58 fredriksen kernel:  ? _raw_spin_lock_irq+0x19/0x40
> >> Dec 13 11:26:58 fredriksen kernel:  ? wait_for_completion+0x91/0x160
> >> Dec 13 11:26:58 fredriksen kernel:  ? drm_modeset_lock+0x63/0xd0 [drm]
> >> Dec 13 11:26:58 fredriksen kernel:  ? ww_mutex_lock+0x14/0x80
> >> Dec 13 11:26:58 fredriksen kernel:  ? __intel_display_resume+0x1a/0xe0 
> >> [i915]
> >> Dec 13 11:26:58 fredriksen kernel:  __intel_display_resume+0x1a/0xe0 [i915]
> >> Dec 13 11:26:58 fredriksen kernel:  intel_display_resume+0xfc/0x140 [i915]
> >> Dec 13 11:26:58 fredriksen kernel:  i915_drm_resume+0xba/0x130 [i915]
> >> Dec 13 11:26:58 fredriksen kernel:  ? pci_pm_poweroff_noirq+0x100/0x100
> >> Dec 13 11:26:58 fredriksen kernel:  dpm_run_callback+0x47/0x150
> >> Dec 13 11:26:58 fredriksen kernel:  device_resume+0x88/0x190
> >> Dec 13 11:26:58 fredriksen kernel:  async_resume+0x19/0x30
> >> Dec 13 11:26:58 fredriksen kernel:  async_run_entry_fn+0x2d/0x130
> >> Dec 13 11:26:58 fredriksen kernel:  process_one_work+0x1c4/0x380
> >> Dec 13 11:26:58 fredriksen kernel:  worker_thread+0x4d/0x380
> >> Dec 13 11:26:58 fredriksen kernel:  ? rescuer_thread+0x3a0/0x3a0
> >> Dec 13 11:26:58 fredriksen kernel:  kthread+0xe6/0x110
> >> Dec 13 11:26:58 fredriksen kernel:  ? kthread_complete_and_exit+0x20/0x20
> >> Dec 13 11:26:58 fredriksen kernel:  

Bug#1025953: Reassigning to libhmsbeagle

2022-12-16 Thread Pierre Gruet

Control: reassign -1 libhmsbeagle 3.1.2+dfsg-12
Control: affects -1 beast-mcmc beast2-mcmc
Control: tags -1 pending

Hi,

Thanks to Remco Bouckaert, the author of beast2, I could find the issue 
is in libhmsbeagle. Passing --without-opencl to the configure step of 
libhmsbeagle allows one to avoid errors such as the one you reported.


This change does not seem to affect the other reverse dependency of 
libhmsbeagle, so I am endorsing it.


Cheers,

--
Pierre


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1026238: tea: "The tea.desktop file has an error", desktop-file-validate said

2022-12-16 Thread Joerg Schiermeier, Bielefeld/Germany
Package: tea
Version: 61.2.0-1
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi there!

The application "desktop-file-validate" told me this about tea's desktop file:

desktop-file-validate /usr/share/applications/tea.desktop

/usr/share/applications/tea.desktop: error: (will be fatal in the future): 
value 
"text/plain;application/epub+zip;application/fb2;application/vnd.openxmlformats-officedocument.wordprocessingml.document;application/vnd.oasis.opendocument.text;application/rtf;application/x-tex;
 " for key "MimeType" in group "Desktop Entry" contains value " " which is an 
invalid MIME type: " " does not contain a subtype
root@Archimedes:~/work# mcedit /usr/share/applications/tea.desktop

There is a space character at the end of the "MimeType" line.
After I removed this space, desktop-file-validate didn't said anything again.
This bug should be fixed in next version.

- -- 
Yours sincerely
Joerg Schiermeier



- -- System Information:
Debian Release: bookworm/sid
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.0-6-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.utf-8, LC_CTYPE=de_DE.utf-8 (charmap=UTF-8), 
LANGUAGE=de:en_GB
Shell: /bin/sh linked to /usr/bin/dash
Init: OpenRC (via /run/openrc), PID 1: init

Versions of packages tea depends on:
ii  libaspell150.60.8-4+b1
ii  libc6  2.36-6
ii  libdjvulibre21 3.5.28-2
ii  libgcc-s1  12.2.0-10
ii  libhunspell-1.7-0  1.7.1-1
ii  libpoppler-qt5-1   22.08.0-2.1
ii  libqt5core5a   5.15.6+dfsg-5
ii  libqt5gui5 5.15.6+dfsg-5
ii  libqt5widgets5 5.15.6+dfsg-5
ii  libstdc++6 12.2.0-10
ii  tea-data   61.2.0-1
ii  zlib1g 1:1.2.13.dfsg-1

Versions of packages tea recommends:
ii  antiword  0.37-16
ii  aspell0.60.8-4+b1
ii  bzip2 1.0.8-5+b1
ii  hunspell  1.7.1-1

tea suggests no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
Comment: This was created by GnuPG for Linux.
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=APhd
-END PGP SIGNATURE-



Bug#1026235: tar: ftbfs with recent glibc

2022-12-16 Thread John David Anglin

On 2022-12-16 4:24 p.m., Florian Weimer wrote:

* John David Anglin:


I think __USE_TIME_BITS64 should be defined when _FILE_OFFSET_BITS==64
This would avoid the overflow converting tv_sec from 64 to 32 bits.

It's an ABI break.  You probably can enable it in the tar build safely
because it's not a library.  But doing it by default across the
distribution is difficult because it changes the meaning of time_t in
header files.

But it seems we already have an ABI break since tar built before the recent 
glibc changes.

Regards,
Dave

--
John David Anglin  dave.ang...@bell.net



Bug#1026237: tcl-fitstcl: FTBFS with cfitsio 4.2.0 / new upstream version 2.5

2022-12-16 Thread Aurelien Jarno
Source: tcl-fitstcl
Version: 2.4-4
Severity: important
Tags: ftbfs patch upstream

Hi Ole,

A new version of cfitsio has been released recently, and it fixes a few
security issues, but it also includes a soname change, meaning we have
to do a transition. I would like to try to get it into bookworm. So far
the version 4.2.0 is already in experimental.

I have tried to rebuild all the reverse dependencies and it appears that
unfortunately tcl-fitstcl fails to build against it. It is not fully
surprising, given it accesses internal cfitsio structures. However NASA
just released version 2.5 [1] which adds support for cfitsio 4.2.0 (but
removes support for older versions). The debian package also need some
changes to make it working, I have attached the debdiff I ended up with.

Would it be possible to upload this new version to experimental asap,
and if we can still get a transition slot, synchronize the upload to
unstable with cfitsio?

Thanks,
Aurelien


[1] 
https://heasarc.gsfc.nasa.gov/docs/software/lheasoft/ftools/fv/fitsTcl_home.html
diff -Nru tcl-fitstcl-2.4/debian/control tcl-fitstcl-2.5/debian/control
--- tcl-fitstcl-2.4/debian/control  2019-02-28 21:06:35.0 +
+++ tcl-fitstcl-2.5/debian/control  2022-12-16 21:17:19.0 +
@@ -5,7 +5,7 @@
 Uploaders: Ole Streicher 
 Build-Depends: debhelper (>= 12),
dh-autoreconf,
-   libcfitsio-dev | libcfitsio3-dev,
+   libcfitsio-dev (>= 4.2.0), 
tcl-dev,
wcslib-dev
 Standards-Version: 4.3.0
diff -Nru 
tcl-fitstcl-2.4/debian/patches/Propagate-CPPFLAGS-and-LDFLAGS-for-hardening.patch
 
tcl-fitstcl-2.5/debian/patches/Propagate-CPPFLAGS-and-LDFLAGS-for-hardening.patch
--- 
tcl-fitstcl-2.4/debian/patches/Propagate-CPPFLAGS-and-LDFLAGS-for-hardening.patch
   2019-02-28 21:03:49.0 +
+++ 
tcl-fitstcl-2.5/debian/patches/Propagate-CPPFLAGS-and-LDFLAGS-for-hardening.patch
   2022-12-16 21:17:19.0 +
@@ -19,7 +19,7 @@
 +  ${CC} -c -o ${
 +#include 
 +#include 
@@ -134,15 +134,19 @@
 +#endif
 +#include "fitsio2.h"
 +
-+#ifndef FFBISON
-+#include "eval_tab.h"
-+#endif
-+
 +#define MAXDIMS   5
 +#define MAXSUBS  10
 +#define MAXVARNAME   80
 +#define CONST_OP  -1000
 +#define pERROR   -1
++#define MAX_STRLEN  256
++#define MAX_STRLEN_S "255"
++
++typedef struct ParseData_struct ParseData;
++typedef void* yyscan_t;
++#ifndef FFBISON
++#include "eval_tab.h"
++#endif
 +
 +
 +typedef struct {
@@ -164,7 +168,7 @@
 + double dbl;
 + long   lng;
 + char   log;
-+ char   str[256];
++ char   str[MAX_STRLEN];
 + double *dblptr;
 + long   *lngptr;
 + char   *logptr;
@@ -175,17 +179,17 @@
 +
 +typedef struct Node {
 +  intoperation;
-+  void   (*DoOp)(struct Node *this);
++void   (*DoOp)(ParseData *, struct Node *this);
 +  intnSubNodes;
 +  intSubNodes[MAXSUBS];
 +  inttype;
 +  lval   value;
 +} Node;
 +
-+typedef struct {
++struct ParseData_struct {
 +  fitsfile*def_fptr;
-+  int (*getData)( char *dataName, void *dataValue );
-+  int (*loadData)( int varNum, long fRow, long nRows,
++int (*getData)( ParseData *, char *dataName, void 
*dataValue );
++int (*loadData)( ParseData *, int varNum, long fRow, 
long nRows,
 + void *data, char *undef );
 +
 +  int compressed;
@@ -201,11 +205,14 @@
 +  int nNodes;
 +  int nNodesAlloc;
 +  int resultNode;
-+
++  
 +  longfirstRow;
 +  longnRows;
 +
 +  int nCols;
++  long  nElements;
++  int nAxis;
++  longnAxes[MAXDIMS];
 +  iteratorCol *colData;
 +  DataInfo*varData;
 +  PixelFilter *pixFilter;
@@ -213,12 +220,13 @@
 +  longfirstDataRow;
 +  longnDataRows;
 +  longtotalRows;
++  longnPrevDataRows;
 +
 +  int datatype;
 +  int hdutype;
 +
 +  int status;
-+} ParseData;
++};
 +
 +typedef enum {
 +  rnd_fct = 1001,
@@ -263,68 +271,196 @@
 +nonnull_fct,
 +angsep_fct,
 +gasrnd_fct,
-+poirnd_fct
++poirnd_fct,
++

Bug#1025213: DRM platform with kms_swrast

2022-12-16 Thread Gert van de Kraats

If the i915 dri driver is present gnome-shell is using the DRM platform
(not the Wayland platform?) with this driver.
If i915 is not present gnome-shell uses the DRM platform with the
kms_swrast-driver!
I did not see this with the lsof-command, because the name of the 
"zink"-driver was
shown which is hard-linked to the other dri-drivers and was opened and 
checked

unsuccessfully before the "kms_swrast" driver.

I tried an old version 22.0.5-1 of kms_swrast driver, but that did not help.
I will open an issue upstream.



Bug#1026234: linux-image-6.0.0-5-amd64: i915 driver fails on resume

2022-12-16 Thread Floris Bruynooghe
Hi Salvatore,

On Fri 16 Dec 2022 at 21:50 +0100, Salvatore Bonaccorso wrote:

> Hi Floris,
>
> On Fri, Dec 16, 2022 at 09:28:35PM +0100, Floris Bruynooghe wrote:
>> Package: src:linux
>> Version: 6.0.10-2
>> Severity: important
>> 
>> Dear Maintainer,
>> 
>> Since the 6.0.0-5 kernel the i915 graphics driver often fails on resume.
>> Downgrading to the 6.0.0-4 kernel fixes it and the driver works
>> flawlessly across resume, changing displays etc.
>> 
>> On the -5 kernel the following errors are observed when the driver
>> crashes:
>> 
>> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-9: PM: parent card0 should 
>> not be sleeping
>> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-10: PM: parent card0 should 
>> not be sleeping
>> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-11: PM: parent card0 should 
>> not be sleeping
>> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: [drm] *ERROR* Sending 
>> link address failed with -5
>> Dec 13 11:26:58 fredriksen kernel: [ cut here ]
>> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 
>> drm_WARN_ON(dig_port->tc_mode != TC_PORT_DISCONNECTED)
>> Dec 13 11:26:58 fredriksen kernel: WARNING: CPU: 0 PID: 27095 at 
>> drivers/gpu/drm/i915/display/intel_tc.c:711 int>
>> Dec 13 11:26:58 fredriksen kernel: Modules linked in: usblp ctr ccm rfcomm 
>> cmac algif_hash algif_skcipher af_alg>
>> Dec 13 11:26:58 fredriksen kernel:  snd_sof_utils ecdh_generic 
>> snd_soc_hdac_hda ecc snd_hda_ext_core snd_soc_acp>
>> Dec 13 11:26:58 fredriksen kernel:  configfs efivarfs ip_tables x_tables 
>> autofs4 btrfs blake2b_generic libcrc32c>
>> Dec 13 11:26:58 fredriksen kernel: CPU: 0 PID: 27095 Comm: kworker/u32:101 
>> Not tainted 6.0.0-5-amd64 #1  Debian >
>> Dec 13 11:26:58 fredriksen kernel: Hardware name: LENOVO 
>> 21CBCTO1WW/21CBCTO1WW, BIOS N3AET67W (1.32 ) 09/27/2022
>> Dec 13 11:26:58 fredriksen kernel: Workqueue: events_unbound 
>> async_run_entry_fn
>> Dec 13 11:26:58 fredriksen kernel: RIP: 
>> 0010:intel_tc_port_sanitize+0x2d2/0x490 [i915]
>> Dec 13 11:26:58 fredriksen kernel: Code: 4c 8b 6f 50 4d 85 ed 75 03 4c 8b 2f 
>> e8 a7 44 42 e3 48 c7 c1 f8 a6 d6 c0>
>> Dec 13 11:26:58 fredriksen kernel: RSP: 0018:a84dc5debc08 EFLAGS: 
>> 00010286
>> Dec 13 11:26:58 fredriksen kernel: RAX:  RBX: 
>> 9c812065 RCX: 
>> Dec 13 11:26:58 fredriksen kernel: RDX: 0001 RSI: 
>> a4b7eeea RDI: 
>> Dec 13 11:26:58 fredriksen kernel: RBP:  R08: 
>> a5262260 R09: a5b5348a
>> Dec 13 11:26:58 fredriksen kernel: R10:  R11: 
>> 004a R12: 9c81101a2000
>> Dec 13 11:26:58 fredriksen kernel: R13: 9c8101f19900 R14: 
>>  R15: 9c81101a2000
>> Dec 13 11:26:58 fredriksen kernel: FS:  () 
>> GS:9c883f40() knlGS:
>> Dec 13 11:26:58 fredriksen kernel: CS:  0010 DS:  ES:  CR0: 
>> 80050033
>> Dec 13 11:26:58 fredriksen kernel: CR2: 55710e140b16 CR3: 
>> 0002db810003 CR4: 00770ef0
>> Dec 13 11:26:58 fredriksen kernel: PKRU: 5554
>> Dec 13 11:26:58 fredriksen kernel: Call Trace:
>> Dec 13 11:26:58 fredriksen kernel:  
>> Dec 13 11:26:58 fredriksen kernel:  intel_ddi_sync_state+0x3f/0x90 [i915]
>> Dec 13 11:26:58 fredriksen kernel:  
>> intel_modeset_setup_hw_state+0x3b1/0x1410 [i915]
>> Dec 13 11:26:58 fredriksen kernel:  ? _raw_spin_lock_irq+0x19/0x40
>> Dec 13 11:26:58 fredriksen kernel:  ? wait_for_completion+0x91/0x160
>> Dec 13 11:26:58 fredriksen kernel:  ? drm_modeset_lock+0x63/0xd0 [drm]
>> Dec 13 11:26:58 fredriksen kernel:  ? ww_mutex_lock+0x14/0x80
>> Dec 13 11:26:58 fredriksen kernel:  ? __intel_display_resume+0x1a/0xe0 [i915]
>> Dec 13 11:26:58 fredriksen kernel:  __intel_display_resume+0x1a/0xe0 [i915]
>> Dec 13 11:26:58 fredriksen kernel:  intel_display_resume+0xfc/0x140 [i915]
>> Dec 13 11:26:58 fredriksen kernel:  i915_drm_resume+0xba/0x130 [i915]
>> Dec 13 11:26:58 fredriksen kernel:  ? pci_pm_poweroff_noirq+0x100/0x100
>> Dec 13 11:26:58 fredriksen kernel:  dpm_run_callback+0x47/0x150
>> Dec 13 11:26:58 fredriksen kernel:  device_resume+0x88/0x190
>> Dec 13 11:26:58 fredriksen kernel:  async_resume+0x19/0x30
>> Dec 13 11:26:58 fredriksen kernel:  async_run_entry_fn+0x2d/0x130
>> Dec 13 11:26:58 fredriksen kernel:  process_one_work+0x1c4/0x380
>> Dec 13 11:26:58 fredriksen kernel:  worker_thread+0x4d/0x380
>> Dec 13 11:26:58 fredriksen kernel:  ? rescuer_thread+0x3a0/0x3a0
>> Dec 13 11:26:58 fredriksen kernel:  kthread+0xe6/0x110
>> Dec 13 11:26:58 fredriksen kernel:  ? kthread_complete_and_exit+0x20/0x20
>> Dec 13 11:26:58 fredriksen kernel:  ret_from_fork+0x1f/0x30
>> Dec 13 11:26:58 fredriksen kernel:  
>> Dec 13 11:26:58 fredriksen kernel: ---[ end trace  ]---
>> Dec 13 11:26:58 fredriksen kernel: [ cut here ]
>> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 

Bug#1026235: tar: ftbfs with recent glibc

2022-12-16 Thread Florian Weimer
* John David Anglin:

> I think __USE_TIME_BITS64 should be defined when _FILE_OFFSET_BITS==64
> This would avoid the overflow converting tv_sec from 64 to 32 bits.

It's an ABI break.  You probably can enable it in the tar build safely
because it's not a library.  But doing it by default across the
distribution is difficult because it changes the meaning of time_t in
header files.

Thanks,
Florian



Bug#1026236: tracker: Please increase test timeouts for "riscv64" arch

2022-12-16 Thread Manuel A. Fernandez Montecelo
Source: tracker
Version: 3.4.2-1
Severity: wishlist
Tags: ftbfs patch
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: debian-ri...@lists.debian.org, m...@debian.org

Hi,

I built this package with the attached changes in the .debdiff.

Basically it's setting the timeout multiplier to 3, as one of the tests (23/37:
tracker:core / service) takes around 67 seconds.


Thanks and cheers.
--
Manuel A. Fernandez Montecelo 
diff -Nru tracker-3.4.2/debian/changelog tracker-3.4.2/debian/changelog
--- tracker-3.4.2/debian/changelog  2022-12-06 21:51:16.0 +
+++ tracker-3.4.2/debian/changelog  2022-12-16 15:11:36.0 +
@@ -1,3 +1,10 @@
+tracker (3.4.2-1+0.riscv64.1) unreleased; urgency=medium
+
+  * Non-maintainer upload.
+  * riscv64: test timeouts, use multiplier x3
+
+ -- Manuel A. Fernandez Montecelo   Fri, 16 Dec 2022 15:11:36 
+
+
 tracker (3.4.2-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru tracker-3.4.2/debian/rules tracker-3.4.2/debian/rules
--- tracker-3.4.2/debian/rules  2022-12-06 21:51:16.0 +
+++ tracker-3.4.2/debian/rules  2022-12-16 15:11:36.0 +
@@ -26,4 +26,4 @@
dh_makeshlibs -V -X/usr/lib/$(DEB_HOST_MULTIARCH)/tracker-3.0/ -- -c4
 
 override_dh_auto_test:
-   dbus-run-session -- dh_auto_test --no-parallel
+   dbus-run-session -- dh_auto_test --no-parallel -- --timeout-multiplier 3


Bug#1026234: linux-image-6.0.0-5-amd64: i915 driver fails on resume

2022-12-16 Thread Salvatore Bonaccorso
Hi Floris,

On Fri, Dec 16, 2022 at 09:28:35PM +0100, Floris Bruynooghe wrote:
> Package: src:linux
> Version: 6.0.10-2
> Severity: important
> 
> Dear Maintainer,
> 
> Since the 6.0.0-5 kernel the i915 graphics driver often fails on resume.
> Downgrading to the 6.0.0-4 kernel fixes it and the driver works
> flawlessly across resume, changing displays etc.
> 
> On the -5 kernel the following errors are observed when the driver
> crashes:
> 
> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-9: PM: parent card0 should 
> not be sleeping
> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-10: PM: parent card0 should 
> not be sleeping
> Dec 13 11:26:58 fredriksen kernel: drm card0-DP-11: PM: parent card0 should 
> not be sleeping
> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: [drm] *ERROR* Sending 
> link address failed with -5
> Dec 13 11:26:58 fredriksen kernel: [ cut here ]
> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 
> drm_WARN_ON(dig_port->tc_mode != TC_PORT_DISCONNECTED)
> Dec 13 11:26:58 fredriksen kernel: WARNING: CPU: 0 PID: 27095 at 
> drivers/gpu/drm/i915/display/intel_tc.c:711 int>
> Dec 13 11:26:58 fredriksen kernel: Modules linked in: usblp ctr ccm rfcomm 
> cmac algif_hash algif_skcipher af_alg>
> Dec 13 11:26:58 fredriksen kernel:  snd_sof_utils ecdh_generic 
> snd_soc_hdac_hda ecc snd_hda_ext_core snd_soc_acp>
> Dec 13 11:26:58 fredriksen kernel:  configfs efivarfs ip_tables x_tables 
> autofs4 btrfs blake2b_generic libcrc32c>
> Dec 13 11:26:58 fredriksen kernel: CPU: 0 PID: 27095 Comm: kworker/u32:101 
> Not tainted 6.0.0-5-amd64 #1  Debian >
> Dec 13 11:26:58 fredriksen kernel: Hardware name: LENOVO 
> 21CBCTO1WW/21CBCTO1WW, BIOS N3AET67W (1.32 ) 09/27/2022
> Dec 13 11:26:58 fredriksen kernel: Workqueue: events_unbound 
> async_run_entry_fn
> Dec 13 11:26:58 fredriksen kernel: RIP: 
> 0010:intel_tc_port_sanitize+0x2d2/0x490 [i915]
> Dec 13 11:26:58 fredriksen kernel: Code: 4c 8b 6f 50 4d 85 ed 75 03 4c 8b 2f 
> e8 a7 44 42 e3 48 c7 c1 f8 a6 d6 c0>
> Dec 13 11:26:58 fredriksen kernel: RSP: 0018:a84dc5debc08 EFLAGS: 00010286
> Dec 13 11:26:58 fredriksen kernel: RAX:  RBX: 
> 9c812065 RCX: 
> Dec 13 11:26:58 fredriksen kernel: RDX: 0001 RSI: 
> a4b7eeea RDI: 
> Dec 13 11:26:58 fredriksen kernel: RBP:  R08: 
> a5262260 R09: a5b5348a
> Dec 13 11:26:58 fredriksen kernel: R10:  R11: 
> 004a R12: 9c81101a2000
> Dec 13 11:26:58 fredriksen kernel: R13: 9c8101f19900 R14: 
>  R15: 9c81101a2000
> Dec 13 11:26:58 fredriksen kernel: FS:  () 
> GS:9c883f40() knlGS:
> Dec 13 11:26:58 fredriksen kernel: CS:  0010 DS:  ES:  CR0: 
> 80050033
> Dec 13 11:26:58 fredriksen kernel: CR2: 55710e140b16 CR3: 
> 0002db810003 CR4: 00770ef0
> Dec 13 11:26:58 fredriksen kernel: PKRU: 5554
> Dec 13 11:26:58 fredriksen kernel: Call Trace:
> Dec 13 11:26:58 fredriksen kernel:  
> Dec 13 11:26:58 fredriksen kernel:  intel_ddi_sync_state+0x3f/0x90 [i915]
> Dec 13 11:26:58 fredriksen kernel:  intel_modeset_setup_hw_state+0x3b1/0x1410 
> [i915]
> Dec 13 11:26:58 fredriksen kernel:  ? _raw_spin_lock_irq+0x19/0x40
> Dec 13 11:26:58 fredriksen kernel:  ? wait_for_completion+0x91/0x160
> Dec 13 11:26:58 fredriksen kernel:  ? drm_modeset_lock+0x63/0xd0 [drm]
> Dec 13 11:26:58 fredriksen kernel:  ? ww_mutex_lock+0x14/0x80
> Dec 13 11:26:58 fredriksen kernel:  ? __intel_display_resume+0x1a/0xe0 [i915]
> Dec 13 11:26:58 fredriksen kernel:  __intel_display_resume+0x1a/0xe0 [i915]
> Dec 13 11:26:58 fredriksen kernel:  intel_display_resume+0xfc/0x140 [i915]
> Dec 13 11:26:58 fredriksen kernel:  i915_drm_resume+0xba/0x130 [i915]
> Dec 13 11:26:58 fredriksen kernel:  ? pci_pm_poweroff_noirq+0x100/0x100
> Dec 13 11:26:58 fredriksen kernel:  dpm_run_callback+0x47/0x150
> Dec 13 11:26:58 fredriksen kernel:  device_resume+0x88/0x190
> Dec 13 11:26:58 fredriksen kernel:  async_resume+0x19/0x30
> Dec 13 11:26:58 fredriksen kernel:  async_run_entry_fn+0x2d/0x130
> Dec 13 11:26:58 fredriksen kernel:  process_one_work+0x1c4/0x380
> Dec 13 11:26:58 fredriksen kernel:  worker_thread+0x4d/0x380
> Dec 13 11:26:58 fredriksen kernel:  ? rescuer_thread+0x3a0/0x3a0
> Dec 13 11:26:58 fredriksen kernel:  kthread+0xe6/0x110
> Dec 13 11:26:58 fredriksen kernel:  ? kthread_complete_and_exit+0x20/0x20
> Dec 13 11:26:58 fredriksen kernel:  ret_from_fork+0x1f/0x30
> Dec 13 11:26:58 fredriksen kernel:  
> Dec 13 11:26:58 fredriksen kernel: ---[ end trace  ]---
> Dec 13 11:26:58 fredriksen kernel: [ cut here ]
> Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 
> drm_WARN_ON(dig_port->tc_lock_wakeref)
> Dec 13 11:26:58 fredriksen kernel: WARNING: CPU: 0 PID: 27095 at 
> drivers/gpu/drm/i915/display/intel_tc.c:712 int>
> Dec 13 

Bug#1026235: tar: ftbfs with recent glibc

2022-12-16 Thread John David Anglin
Source: libc6
Version: 2.36-6
Severity: normal

Dear Maintainer,

See the following BZ for tar:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026204

__USE_TIME_BITS64 now needs to be defined on most 32-bit
architectures to build tar even when _FILE_OFFSET_BITS=64
is selected. The folowing error occurs from glibc:
+tar: dir/f2038-01-19T03\:14\:08.9: Cannot stat: Value too large for defined 
data type

The following two commits changed the handling of file times:

commit dd4131c8322891a0ad7cfb661efa41aecc02b581
Author: Aurelien Jarno 
Date:   Tue Nov 1 20:43:55 2022 +0100

linux: Fix fstatat on MIPSn64 (BZ #29730)

Commit 6e8a0aac2f883 ("time: Fix overflow itimer tests on 32-bit
systems") changed in_time_t_range to assume a 32-bit time_t. This broke
fstatat on MIPSn64 that was using it with a 64-bit time_t due to
difference between stat and stat64. This commit fix that by adding a
MIPSn64 specific version, which bypasses the EOVERFLOW tests.

Resolves: BZ #29730

Reviewed-by: Adhemerval Zanella  
(cherry picked from commit 7457b7eef8dfe8cc48e55b9f9837df6dd397b80d)

commit 7b7dfbb0cbdffebf0233c650627a4861212fbb60
Author: Adhemerval Zanella 
Date:   Wed Oct 19 19:14:04 2022 -0300

linux: Fix generic struct_stat for 64 bit time (BZ# 29657)

The generic Linux struct_stat misses the conditionals to use
bits/struct_stat_time64_helper.h in the __USE_TIME_BITS64 for
architecture that uses __TIMESIZE == 32 (currently csky and nios2).

Since newer ports should not support 32 bit time_t, the generic
implementation should be used as default.

For arm, hppa, and sh a copy of default struct_stat is added,
while for csky and nios a new one based on generic is used, along
with conditionals to use bits/struct_stat_time64_helper.h.

The default struct_stat is also replaced with the generic one.

Checked on aarch64-linux-gnu and arm-linux-gnueabihf.

(cherry picked from commit 7a6ca82f8007ddbd43e2b8fce806ba7101ee47f5)

I think __USE_TIME_BITS64 should be defined when _FILE_OFFSET_BITS==64
This would avoid the overflow converting tv_sec from 64 to 32 bits.

Regards,
Dave

-- System Information:
Debian Release: bookworm/sid
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable')
Architecture: hppa (parisc64)

Kernel: Linux 6.0.12 (SMP w/4 CPU threads)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

-- debconf information excluded



Bug#1026234: linux-image-6.0.0-5-amd64: i915 driver fails on resume

2022-12-16 Thread Floris Bruynooghe
Package: src:linux
Version: 6.0.10-2
Severity: important

Dear Maintainer,

Since the 6.0.0-5 kernel the i915 graphics driver often fails on resume.
Downgrading to the 6.0.0-4 kernel fixes it and the driver works
flawlessly across resume, changing displays etc.

On the -5 kernel the following errors are observed when the driver
crashes:

Dec 13 11:26:58 fredriksen kernel: drm card0-DP-9: PM: parent card0 should not 
be sleeping
Dec 13 11:26:58 fredriksen kernel: drm card0-DP-10: PM: parent card0 should not 
be sleeping
Dec 13 11:26:58 fredriksen kernel: drm card0-DP-11: PM: parent card0 should not 
be sleeping
Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: [drm] *ERROR* Sending 
link address failed with -5
Dec 13 11:26:58 fredriksen kernel: [ cut here ]
Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 
drm_WARN_ON(dig_port->tc_mode != TC_PORT_DISCONNECTED)
Dec 13 11:26:58 fredriksen kernel: WARNING: CPU: 0 PID: 27095 at 
drivers/gpu/drm/i915/display/intel_tc.c:711 int>
Dec 13 11:26:58 fredriksen kernel: Modules linked in: usblp ctr ccm rfcomm cmac 
algif_hash algif_skcipher af_alg>
Dec 13 11:26:58 fredriksen kernel:  snd_sof_utils ecdh_generic snd_soc_hdac_hda 
ecc snd_hda_ext_core snd_soc_acp>
Dec 13 11:26:58 fredriksen kernel:  configfs efivarfs ip_tables x_tables 
autofs4 btrfs blake2b_generic libcrc32c>
Dec 13 11:26:58 fredriksen kernel: CPU: 0 PID: 27095 Comm: kworker/u32:101 Not 
tainted 6.0.0-5-amd64 #1  Debian >
Dec 13 11:26:58 fredriksen kernel: Hardware name: LENOVO 21CBCTO1WW/21CBCTO1WW, 
BIOS N3AET67W (1.32 ) 09/27/2022
Dec 13 11:26:58 fredriksen kernel: Workqueue: events_unbound async_run_entry_fn
Dec 13 11:26:58 fredriksen kernel: RIP: 0010:intel_tc_port_sanitize+0x2d2/0x490 
[i915]
Dec 13 11:26:58 fredriksen kernel: Code: 4c 8b 6f 50 4d 85 ed 75 03 4c 8b 2f e8 
a7 44 42 e3 48 c7 c1 f8 a6 d6 c0>
Dec 13 11:26:58 fredriksen kernel: RSP: 0018:a84dc5debc08 EFLAGS: 00010286
Dec 13 11:26:58 fredriksen kernel: RAX:  RBX: 9c812065 
RCX: 
Dec 13 11:26:58 fredriksen kernel: RDX: 0001 RSI: a4b7eeea 
RDI: 
Dec 13 11:26:58 fredriksen kernel: RBP:  R08: a5262260 
R09: a5b5348a
Dec 13 11:26:58 fredriksen kernel: R10:  R11: 004a 
R12: 9c81101a2000
Dec 13 11:26:58 fredriksen kernel: R13: 9c8101f19900 R14:  
R15: 9c81101a2000
Dec 13 11:26:58 fredriksen kernel: FS:  () 
GS:9c883f40() knlGS:
Dec 13 11:26:58 fredriksen kernel: CS:  0010 DS:  ES:  CR0: 
80050033
Dec 13 11:26:58 fredriksen kernel: CR2: 55710e140b16 CR3: 0002db810003 
CR4: 00770ef0
Dec 13 11:26:58 fredriksen kernel: PKRU: 5554
Dec 13 11:26:58 fredriksen kernel: Call Trace:
Dec 13 11:26:58 fredriksen kernel:  
Dec 13 11:26:58 fredriksen kernel:  intel_ddi_sync_state+0x3f/0x90 [i915]
Dec 13 11:26:58 fredriksen kernel:  intel_modeset_setup_hw_state+0x3b1/0x1410 
[i915]
Dec 13 11:26:58 fredriksen kernel:  ? _raw_spin_lock_irq+0x19/0x40
Dec 13 11:26:58 fredriksen kernel:  ? wait_for_completion+0x91/0x160
Dec 13 11:26:58 fredriksen kernel:  ? drm_modeset_lock+0x63/0xd0 [drm]
Dec 13 11:26:58 fredriksen kernel:  ? ww_mutex_lock+0x14/0x80
Dec 13 11:26:58 fredriksen kernel:  ? __intel_display_resume+0x1a/0xe0 [i915]
Dec 13 11:26:58 fredriksen kernel:  __intel_display_resume+0x1a/0xe0 [i915]
Dec 13 11:26:58 fredriksen kernel:  intel_display_resume+0xfc/0x140 [i915]
Dec 13 11:26:58 fredriksen kernel:  i915_drm_resume+0xba/0x130 [i915]
Dec 13 11:26:58 fredriksen kernel:  ? pci_pm_poweroff_noirq+0x100/0x100
Dec 13 11:26:58 fredriksen kernel:  dpm_run_callback+0x47/0x150
Dec 13 11:26:58 fredriksen kernel:  device_resume+0x88/0x190
Dec 13 11:26:58 fredriksen kernel:  async_resume+0x19/0x30
Dec 13 11:26:58 fredriksen kernel:  async_run_entry_fn+0x2d/0x130
Dec 13 11:26:58 fredriksen kernel:  process_one_work+0x1c4/0x380
Dec 13 11:26:58 fredriksen kernel:  worker_thread+0x4d/0x380
Dec 13 11:26:58 fredriksen kernel:  ? rescuer_thread+0x3a0/0x3a0
Dec 13 11:26:58 fredriksen kernel:  kthread+0xe6/0x110
Dec 13 11:26:58 fredriksen kernel:  ? kthread_complete_and_exit+0x20/0x20
Dec 13 11:26:58 fredriksen kernel:  ret_from_fork+0x1f/0x30
Dec 13 11:26:58 fredriksen kernel:  
Dec 13 11:26:58 fredriksen kernel: ---[ end trace  ]---
Dec 13 11:26:58 fredriksen kernel: [ cut here ]
Dec 13 11:26:58 fredriksen kernel: i915 :00:02.0: 
drm_WARN_ON(dig_port->tc_lock_wakeref)
Dec 13 11:26:58 fredriksen kernel: WARNING: CPU: 0 PID: 27095 at 
drivers/gpu/drm/i915/display/intel_tc.c:712 int>
Dec 13 11:26:58 fredriksen kernel: Modules linked in: usblp ctr ccm rfcomm cmac 
algif_hash algif_skcipher af_alg>
Dec 13 11:26:58 fredriksen kernel:  snd_sof_utils ecdh_generic snd_soc_hdac_hda 
ecc snd_hda_ext_core snd_soc_acp>
Dec 13 11:26:58 fredriksen kernel:  configfs 

Bug#1026231: debian-policy: document droppage of support for legacy locales

2022-12-16 Thread Bill Allombert
On Fri, Dec 16, 2022 at 07:21:37PM +0100, Adam Borowski wrote:
> Package: debian-policy
> Version: 4.6.1.1
> Severity: wishlist
> 
> Hi!
> As of Bookworm, legacy locales are no longer officially supported.  In order
> to not break testsuites, they're mostly working if you install locales-all,
> and you may manually request their generation by editing /etc/locale.gen --
> but functionality is expected to bit rot and/or be removed in the future.

Hi Adam,

How do you define a legacy locale ?
What do you mean by "officially supported" ?  By whom ?

Cheers,
-- 
Bill. 

Imagine a large red swirl here. 



Bug#1021341: autopkgtest-build-qemu: add dependency on zerofree

2022-12-16 Thread Christian Kastner
Control: reassign -1 vmdb2/0.25-1
Control: retitle -1 vmdb2: Add dependency on zerofree

On 2022-10-06 11:19, Emanuele Rocca wrote:
> autopkgtest-build-qemu assumes that zerofree is installed, but it does
> not depend on the relevant package.

It's actually missing in vmdb2, the utility that autopkgtest uses to
build the actual images.

> [...]
> 2022-09-23 20:26:11 INFO Calling  >
> 2022-09-23 20:26:11 DEBUG Unmounting /tmp/tmp4a9yk5hg and everything on top 
> of it
> 2022-09-23 20:26:12 DEBUG Finished unmounting /tmp/tmp4a9yk5hg
> 2022-09-23 20:26:12 INFO Exec: ['zerofree', '-v', '/dev/mapper/loop0p1']
> 2022-09-23 20:26:12 ERROR [Errno 2] No such file or directory: 'zerofree'



Bug#1017780: Version bump: 1.4.230

2022-12-16 Thread Jonas Smedegaard
Hi Diederik,

Quoting Diederik de Haas (2022-12-16 15:57:37)
> On Tuesday, 13 December 2022 10:55:18 CET Jonas Smedegaard wrote:
> > perhaps I can point you to other examples as well
> 
> I'd love to have several examples to look at :-)
> Especially if you know of one (or more) who write extensive commit messages 
> explaining the reasons/rational of their changes. This should help me get an 
> understanding of how, what and why to do (packaging) things.

Sorry, what I have intimate knowledge on (and therefore can offer to
select amongst) are packages that I maintain myself - and while I try
hard to make the packaging tight and include comments for unusual
details, I almost never write multi-line commit messages.

Feel free to ask, and I shall elaborate on details...

 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/
 * Sponsorship: https://ko-fi.com/drjones

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

signature.asc
Description: signature


Bug#864795: brave-less Debian

2022-12-16 Thread Karl Schmidt
On Fri, 16 Dec 2022 08:53:49 + =?UTF-8?B?RGFuaWFsIEJlaHphZGkg2K/Yp9mG24zYp9mEINio2YfYstin2K/bjA==?= 
 wrote:

Brave always looked malware to me.
Maybe that's why it's always in RFP and there's no ITP. I personally prefer a 
brave-less Debian.


I've come to think the same thing.  I suppose more than half of the 'secure' apps/programs/VPNs are really honeypots by 
the three letter guys. If you use secure setups you probably end up on a list.



--

Karl Schmidt  EMail k...@lrak.net
3209 West 9th Street  Ph (785) 841-3089
Lawrence, KS 66049

Few things are more dangerous to humanity
than a failed and humiliated ruling class
that still clings to power.
-kps




Bug#1021728: tracker.debian.org: Please include the new "non-free-firmware" section

2022-12-16 Thread Raphael Hertzog
Hello Gunnar,

On Thu, 13 Oct 2022, Gunnar Wolf wrote:
> Last week I uploaded raspi-firmware to non-free-firmware (and was
> promptly processed through NEW, whee!).
> 
> Two days ago, it successfully migrated to Texting.
> 
> I am now building the Raspberry Pi images for Bookworm , and
> raspi-firmware is correctly downloaded from non-free-firmware.
> 
> However, tracker.debian.org misleadingly shows the package as if it
> was removed from Debian («package is gone. This package is not in any
> development repository. (...)», and no longer lists it for testing and
> unstable.

Please update me on the official plans... will this section be entirely
disjoint from non-free? Or will packages from non-free-firmware also
appear in non-free?

Will we move all firmwares from non-free in that new section before
the release of bookworm?

In any case, I have tweaked the configuration of tracker.debian.org
so that it knows (and monitors) that new section in
bookworm/sid/experimental at this point. Hopefully that should
be sufficient to fix this initial issue. We will have to monitor this
for other possible side-effects.

Cheers,
-- 
  ⢀⣴⠾⠻⢶⣦⠀   Raphaël Hertzog 
  ⣾⠁⢠⠒⠀⣿⡁
  ⢿⡄⠘⠷⠚⠋The Debian Handbook: https://debian-handbook.info/get/
  ⠈⠳⣄   Debian Long Term Support: https://deb.li/LTS



Bug#844741: [ristretto] Segafault when run as root

2022-12-16 Thread Philipp Klaus Krause
Using the current version in Debian testing (0.12.3), I can no longer 
reproduce the bug.


Philipp



Bug#1026233: bookkeeper: CVE-2022-32531

2022-12-16 Thread Moritz Mühlenhoff
Source: bookkeeper
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for bookkeeper.

CVE-2022-32531[0]:
| The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does
| not close the connection to the bookkeeper server when TLS hostname
| verification fails. This leaves the bookkeeper client vulnerable to a
| man in the middle attack. The problem affects BookKeeper client prior
| to versions 4.14.6 and 4.15.1.

https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-32531
https://www.cve.org/CVERecord?id=CVE-2022-32531

Please adjust the affected versions in the BTS as needed.



Bug#1025176: libicu71 missing on SH4 port

2022-12-16 Thread John Paul Adrian Glaubitz


> On Dec 16, 2022, at 7:29 PM, John Paul Adrian Glaubitz 
>  wrote:
> 
> 
> 
> 
>>> On Dec 16, 2022, at 7:18 PM, Jérémy Lal  wrote:
>>> 
>> Source: icu
>> Followup-For: Bug #1025176
>> X-Debbugs-Cc: debian-sup...@lists.debian.org
>> 
>> Considering the needed porting work is only a few lines:
>> https://github.com/python-greenlet/greenlet/tree/master/src/greenlet/platform
>> 
>> sh4 porters might be able to help here.
> 
> icu or python-greenlet? The former has been built on sh4:

Looking at the rest of the bug report

The reason why boost1.74 is not up to date is this bug:

> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016904

The reason why gdb is missing is this bug report:

> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576242

See also:

> https://github.com/glaubitz/binutils-gdb/tree/linux-sh

There is no known issue with icu on sh4.

Adrian

Bug#1026232: RFP: label-studio -- multi-type data labeling and annotation tool with standardized output format

2022-12-16 Thread Yaroslav Halchenko
Package: wnpp
Severity: wishlist

* Package name: label-studio
  Version : 1.7.0
  Upstream Author : Heartexlabs
* URL : https://github.com/heartexlabs/label-studio
* License : Apache 2.0
  Programming Lang: Python
  Description : multi-type data labeling and annotation tool with 
standardized output format

Label Studio is an open source data labeling tool. It lets you label data
types like audio, text, images, videos, and time series with a simple and
straightforward UI and export to various model formats. It can be used to
prepare raw data or improve existing training data to get more accurate ML
models.

In my case I am considering to try it for a project to automate data entry QC
(see https://github.com/con/noisseur/issues/1) -- if you know anything like
that already, please let me know.

Notes:

- that git repository is a bit "suboptimal" -- >1GB of .git/objects
(likely mistakes made in prior history, checkout tree is only about 200MB with
all the docs/ images per each release etc).  watchout while cloning, might want 
a shallow clone



Bug#1025176: libicu71 missing on SH4 port

2022-12-16 Thread John Paul Adrian Glaubitz


> On Dec 16, 2022, at 7:18 PM, Jérémy Lal  wrote:
> 
> Source: icu
> Followup-For: Bug #1025176
> X-Debbugs-Cc: debian-sup...@lists.debian.org
> 
> Considering the needed porting work is only a few lines:
> https://github.com/python-greenlet/greenlet/tree/master/src/greenlet/platform
> 
> sh4 porters might be able to help here.

icu or python-greenlet? The former has been built on sh4:

> https://buildd.debian.org/status/package.php?p=icu=sid

Adrian

Bug#1026213: [Pkg-shadow-devel] Bug#1026213: login: $HOME created as 0755 by default

2022-12-16 Thread Mason Loring Bliss
This would violate POLA and break, among other things already noted, things
like fingerd, which wants to run with least-privilege but still access
.plan and .project files.

Security is a process and requires conscious thought by an administrator,
and default permissions on home directories are no different and easily
tailored away from the expected defaults.

-- 
Mason Loring Bliss  ((   If I have not seen as far as others, it is because
 ma...@blisses.org   ))   giants were standing on my shoulders. - Hal Abelson



Bug#1026231: debian-policy: document droppage of support for legacy locales

2022-12-16 Thread Adam Borowski
Package: debian-policy
Version: 4.6.1.1
Severity: wishlist

Hi!
As of Bookworm, legacy locales are no longer officially supported.  In order
to not break testsuites, they're mostly working if you install locales-all,
and you may manually request their generation by editing /etc/locale.gen --
but functionality is expected to bit rot and/or be removed in the future.

Thus, what about spelling this in the Policy?:

* Software may assume they always run in an UTF-8 locale, and emit or
  require UTF-8 input/output without checking.
* The execution environment (usually init system or a container) must
  default to UTF-8 encoding unless explicitly configured otherwise.
* Legacy locales are no longer officially supported, and packages may
  drop support for them and/or exclude them from their testsuites.
* Packages may retain support for legacy locales, but related bug reports
  (unless security related) are considered to be of wishlist severity.
* Filesystems may be configured to reject file names that are not valid
  printable UTF-8 encoded Unicode.
* So-called BOM (U+FEFF) must not be added to plain-text output, and if
  present, editors/viewers customarily used for editing code should not
  hide its presence.
* Human-readable files outside of packages' private data must be encoded
  in UTF-8.  This applies especially to files in /usr/share/doc and /etc
  but applies to eg. executable scripts in /bin or /sbin as well.

Rationale: it takes non-trivial amount of code to support diverse encodings;
Unicode is a strict superset of all legacy charsets thus there's no loss of
functionality by switching to it exclusively.  In todays Unicode world, text
files of other encodings present a barrier to being read by the user.

While data received from outside the network may legitimately use legacy
locales, requiring all of stdin/stdout/stderr and filesystem data to use
UTF-8 would simplify code.  It's not like we pay more than lip service to
other encodings anymore...

While diversity in software is welcome, diversity in standards is not:
UTF-8 will not damage your pinky finger nor require Alt-F2 kill -9 to
exit; will not make your computer fail to boot or require a trip to the
data center; nor infect your K desktop with gnomeitis.  [Of course, there's
no plausible reason to use Postfix, ever!].  In other words, having multiple
phone vendors is essential but having multiple charging connectors is bad.

As for BOM, it is explicitly discouraged by the Unicode Consortium, and can
cause security vulnerabilities where scripts that pass human review act
different than it appears.  #!/bin/perl gets executed by bash, and
this is just one of examples.

As for inits/containers declaring LC_CTYPE=C.UTF-8, systemd has been doing
this for a while, in sysvinit land we debated whether that's still needed
when glibc started to consider unset locale to mean C.UTF-8 rather than C
-- but then, some language compilers do not use glibc.  debootstrap doesn't
configure a default locale, while not all higher-level tools do so,
rendering a system installed in non-standard but reasonable way to lack
the setting, to the surprise of the admin.


Meow!



Bug#1025176: libicu71 missing on SH4 port

2022-12-16 Thread Jérémy Lal
Source: icu
Followup-For: Bug #1025176
X-Debbugs-Cc: debian-sup...@lists.debian.org

Considering the needed porting work is only a few lines:
https://github.com/python-greenlet/greenlet/tree/master/src/greenlet/platform

sh4 porters might be able to help here.


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-6-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#1026230: debhelper: Unable to successfully build in read-only source directory.

2022-12-16 Thread Garrett Kajmowicz
Package: debhelper
Version: 13.6ubuntu1
Severity: wishlist

Dear Maintainer,

I'm working on a use-case which can be generalized as wanting to be able to 
perform a build with debhelper in a read-only source directory. Not simply 
that the files themselves are read-only, but that the full directory
tree is read-only. Think of building source from a directory on a CD-ROM,
a NFS mount with read-only permissions, or in my case a Docker container with
the source code on a read-only bind mount.

Many of the required capabilities are already supported. For example, the 
--builddirectory flag allows the building step to be placed in a different
directory. The autotools like automake and autoconf support building
out-of-tree. However, I'm left with debhelper and related scripts themselves.

The debhelper scripts are causing a few issues. The immediate issue which has
led me to file this ticket is that debhelper really wants to write log files
into the source directory. This results in an error such as:

dh_autoreconf_clean: error: failed to write to debian/.debhelper.log: 
Read-only file system

I tried to work around this by hacking up the debhelper scripts in the Docker
image by doing:

RUN sed -i -e 
's!"debian/${ext}debhelper.log"!"/working/debian/${ext}debhelper.log"!g' 
/usr/share/perl5/Debian/Debhelper/Dh_Lib.pm
RUN sed -i -e 's!debian/\*.debhelper.log!/working/debian/\*.debhelper.log!g' 
/usr/share/perl5/Debian/Debhelper/SequencerUtil.pm
RUN sed -i -e 's!debian/\*.debhelper.log!/working/debian/\*.debhelper.log!g' 
/usr/bin/dh_clean

This failed because the script was unable to find the log file to delete, with
error message:

dh_autoreconf_clean: error: failed to write to 
/working/debian/.debhelper.log: No such file or directory

The changes required are clearly more extensive than a little string
substitution. And if the work involved is going to be extensive, it should
probably be handled by someone with knowledge of (and the wisdom to) alter the
architecture as well.

One other possibly-related item of note (I can file a separate bug if you like)
and which may have an existing solution:
Passing in --buildinfo-option=-u/out still results in a -O option which
  refers to the wrong directory. That is, I get the following:
dpkg-genbuildinfo -u/out --build=binary 
-O../_2.0.6-1_amd64.buildinfo
dpkg-genbuildinfo: error: cannot write 
../_2.0.6-1_amd64.buildinfo.new: Permission denied

This resulted from an experiment where I was copying the source code to a 
temporary directory with read/write permissions, but where the parent
directory was not writable.

Thank you for your time,

- Garrett


*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***



Bug#1026229: efibootguard: missing Breaks+Replaces: libebgenv-dev (<< 0.12-2)

2022-12-16 Thread Andreas Beckmann
Package: efibootguard
Version: 0.12-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'testing'.
It installed fine in 'testing', then the upgrade to 'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#overwriting-files-and-replacing-packages-replaces

>From the attached log (scroll to the bottom...):

  Preparing to unpack .../efibootguard_0.12-2_amd64.deb ...
  Unpacking efibootguard (0.12-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/efibootguard_0.12-2_amd64.deb (--unpack):
   trying to overwrite 
'/usr/lib/x86_64-linux-gnu/efibootguard/efibootguardx64.efi', which is also in 
package libebgenv-dev 0.12-1+b1
  Errors were encountered while processing:
   /var/cache/apt/archives/efibootguard_0.12-2_amd64.deb


cheers,

Andreas


libebgenv-dev=0.12-1+b1_efibootguard=0.12-2.log.gz
Description: application/gzip


Bug#1026228: emacs-common 1:28.2+1-8 and emacs-bin-common 1:27.1+1-3.1+b1 both contain /usr/lib/systemd/user/emacs.service

2022-12-16 Thread Daniel Kahn Gillmor
Package: emacs-common
Version: 1:28.2+1-8

Upgrading emacs from 27.1 to 28.2 today on my debian testing system, i
ran into this problem with the upgrade:


Unpacking emacs-common (1:28.2+1-8) over (1:27.1+1-3.1) ...
dpkg: error processing archive 
/tmp/apt-dpkg-install-nVWWVc/05-emacs-common_1%3a28.2+1-8_all.deb (--unpack):
 trying to overwrite '/usr/lib/systemd/user/emacs.service', which is also in 
package emacs-bin-common 1:27.1+1-3.1+b1
dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)


this eventually caused "apt upgrade" to fail, but a subsequent "apt -f
install" succeeded without issue, presumably because emacs-bin-common
had also already been upgraded to 1:28.2+1-8 in the meantime.

Moving a file from one package to another should be done more
cautiously, along these lines:

  https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

Thanks for maintaining emacs in debian!

   --dkg


signature.asc
Description: PGP signature


Bug#1012890: android-platform-frameworks-base: ftbfs with GCC-12

2022-12-16 Thread Andreas Beckmann
Followup-For: Bug #1012890
Control: found -1 13~beta3-1~exp1

Hi,

I now see this failure while building
android-platform-frameworks-base/experimental:

clang++ -c -o libs/androidfw/LoadedArsc.o libs/androidfw/LoadedArsc.cpp -g -O2 
-ffile-prefix-map=/build/android-platform-frameworks-base-13~beta3=. 
-fstack-protector-strong -Wformat -Werror=format-security -fPIC -std=gnu++17 
-Wno-missing-field-initializers -Wunreachable-code  -Wdate-time 
-D_FORTIFY_SOURCE=2 -DNDEBUG -UDEBUG -I/usr/include/android -Wno-c99-designator 
-Wno-gnu-designator -Wno-gnu-folding-constant -fmessage-length=0 
-fno-exceptions -fno-strict-aliasing -no-canonical-prefixes  
-DSTATIC_ANDROIDFW_FOR_TOOLS -Ilibs/androidfw/include
In file included from libs/androidfw/LoadedArsc.cpp:19:
In file included from libs/androidfw/include/androidfw/LoadedArsc.h:20:
In file included from 
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/map:60:
In file included from 
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/bits/stl_tree.h:63:
In file included from 
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/bits/stl_algobase.h:66:
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/bits/stl_iterator_base_funcs.h:192:2:
 error: cannot decrement value of type 
'android::incfs::map_ptr::const_iterator'
--__i;
^ ~~~
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/bits/stl_iterator_base_funcs.h:222:12:
 note: in instantiation of function template specialization 
'std::__advance::const_iterator, long>' requested here
  std::__advance(__i, __d, std::__iterator_category(__i));
   ^
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/bits/stl_algobase.h:1462:9:
 note: in instantiation of function template specialization 
'std::advance::const_iterator, long>' requested here
  std::advance(__middle, __half);
   ^
/usr/bin/../lib/gcc/x86_64-linux-gnu/12/../../../../include/c++/12/bits/stl_algo.h:2004:19:
 note: in instantiation of function template specialization 
'std::__lower_bound::const_iterator, unsigned short, 
__gnu_cxx::__ops::_Iter_comp_val<(lambda at 
libs/androidfw/LoadedArsc.cpp:255:36)>>' requested here
  return std::__lower_bound(__first, __last, __val,
  ^
libs/androidfw/LoadedArsc.cpp:254:24: note: in instantiation of function 
template specialization 
'std::lower_bound::const_iterator, unsigned short, (lambda at 
libs/androidfw/LoadedArsc.cpp:255:36)>' requested here
auto result = std::lower_bound(sparse_indices, sparse_indices_end, 
entry_index,
   ^
1 error generated.
make[2]: *** [debian/libandroidfw.mk:57: libs/androidfw/LoadedArsc.o] Error 1


Andreas



Bug#1026055: lapack breaks openturns autopkgtest: undefined reference to `ztrsyl3_' (and 3 more)

2022-12-16 Thread Jochen Sprickerhof

* Sébastien Villemot  [2022-12-16 16:26]:

In the current system, in which the BLAS and LAPACK implementation are
decided through the alternatives system, it’s not possible to solve the
problem through versioned provides. Because even if the dependency on
the versioned provides is satisfied, this does not prevent another
flavour of LAPACK (not satisfying the dependency) to be installed and
selected through the alternatives system.


I think those alternatives names would need to be per ABI version (of 
the virtual package) anyhow.



So indeed the only clean way of solving this issue seems to forbid
coinstallability of several BLAS or LAPACK flavours. But the latter is
considered as a feature, not as a bug. I agree that using the
alternatives system for a shared library is a bit ugly and does not
play well with our tooling, but that’s a choice that was made long ago
and it also brings some flexibility for the user (it’s easy to switch
from one implementation to the other).


Is ease of switching the only reason for using the alternatives system 
here?


Maybe we should rethink this decision as it really does not play well 
with our tooling and you could just as well use apt to switch the 
implementation.


Cheers Jochen


signature.asc
Description: PGP signature


Bug#999724: ruby-omniauth-salesforce: FTBFS with ruby-omniauth 2.0.x: ERROR: Test "ruby2.7" failed: /usr/lib/ruby/vendor_ruby/rubygems/specification.rb:1404:in `rescue in block in activate_dependencie

2022-12-16 Thread Andreas Beckmann
Followup-For: Bug #999724
Control: found -1 1.0.5-3

The version in sid now fails with
  Could not find 'omniauth' (~> 1.0) - did find: [omniauth-2.1.0]
and the version in experimental fails with
  Could not find 'omniauth-oauth2' (~> 1.7.1) - did find: 
[omniauth-oauth2-1.8.0]

Andreas



Bug#1026227: vagrant: Uninstallable in sid with VirtualBox 7.0.x

2022-12-16 Thread Guillem Jover
Package: vagrant
Version: 2.2.19+dfsg-2
Severity: serious

Hi!

Since virtualbox 7.0.4 got uploaded, vagrant is no longer installable
in Debian sid. I assume this will require packaging a new upstream
release to support the new virtualbox version 7.0.x series.

Thanks,
Guillem



Bug#975326: dash: inconsistency between ulimit -r and ulimit -a

2022-12-16 Thread наб
Control: tags -1 + upstream patch
Control: forwarded -1 
https://lore.kernel.org/dash/20221216172019.upb425kmpx75e...@tarta.nabijaczleweli.xyz/t/

Your analysis is right, this is oddly missing from the original addition
of ulimit -r in 2012.

Forwarded the diff to dash@, archived at forwarded-to.

наб


signature.asc
Description: PGP signature


Bug#1026226: emacs: Emacs ignores extended file attributes (xattr)

2022-12-16 Thread olaf
Package: emacs
Version: 1:28.2+1-8
Severity: normal

Dear Maintainer,

If a file has extended attributes and is edited with Emacs, the extended 
attributes are lost.

The easiest and most common way to do this is to assign keywords, comments or 
ratings to a file with the file manager Dolphin* and then open this file with 
Emacs and change it so that it can be "written" under the same name.
(* Or alternatively: setfattr -n user.xdg.tags -v "keyword")

On the homepage of Emacs I think I read that Emacs can handle extended 
attributes. This is obviously still not the case here. However, should this 
behavior be desired in the form, consider this letter as irrelevant.



-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (990, 'testing'), (99, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-5-amd64 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de:en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages emacs depends on:
ii  emacs-gtk  1:28.2+1-8

emacs recommends no packages.

emacs suggests no packages.

-- debconf-show failed



Bug#1026225: /bin/cp: "cp update" ignores "extended attributes".

2022-12-16 Thread olaf
Package: coreutils
Version: 9.1-1
Severity: normal
File: /bin/cp

Dear Maintainer,

"cp update" ignores "extended attributes".

The underlying "cp" command reads:
#+begin_src sh
\cp --preserve=all --reflink=always -au
#+end_src
If an attribute is subsequently changed or newly set in the source file, e.g. 
the "user.baloo.rating" with KDE's Dophin, this change is not recognized by 
"cp".



-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (990, 'testing'), (99, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-5-amd64 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de:en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages coreutils depends on:
ii  libacl1  2.3.1-2
ii  libattr1 1:2.5.1-3
ii  libc62.36-6
ii  libgmp10 2:6.2.1+dfsg1-1.1
ii  libselinux1  3.4-1+b3

coreutils recommends no packages.

coreutils suggests no packages.

-- debconf-show failed



Bug#1026205: Unpaper errors for every scanned page

2022-12-16 Thread Jeff

Thanks for the report.

On 16/12/2022 11:05, martin f krafft wrote:

for every page processed by unpaper, I get two errors:

 1. [image2 @ 0x558772ceee40] The specified filename
'/home/ssd/madduck/.tmp/gscan2pdf-SMFz/OHSkXwKy5v.pnm' does not
contain an image sequence pattern or a pattern is invalid.
 2. [image2 @ 0x558772ceee40] Use a pattern such as %03d for an image
sequence or use the -update option (with -frames:v 1 if needed) to
write a single image.


I think that this is this bug in unpaper:

https://github.com/unpaper/unpaper/issues/113



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1026224: live-build: Option "-b netboot" fails on arm64 architecture

2022-12-16 Thread Juri Grabowski
Package: live-build
Version: 1:20220505
Severity: normal
X-Debbugs-Cc: deb...@jugra.de

Dear Maintainer,

lb config -d bookworm --chroot-filesystem squashfs --apt-indices false
--cache-packages false --config
https://gitlab.x2go.org/x2go/live-build-x2go.git::feature/bookworm-fvwm
--archive-areas "main contrib non-free" --apt-recommends false
--firmware-binary false --updates true --backports false --win32-loader
false --loadlin false --security false  --initsystem systemd  -b netboot
--bootappend-live toram live-config
lb build

run through on amd64 architecture, but fails with following error on
arm64:
[2022-12-15 02:11:12] lb binary_netboot 
P: Begin building binary netboot image...
mv: cannot stat 'tftpboot': No such file or directory
E: An unexpected failure occurred, exiting...
P: Begin unmounting filesystems...
P: Saving caches...

Best Regards,
Juri Grabowski



Bug#1026223: golang-github-google-cel-spec: switch B-D to golang-github-golang-protobuf-1-5-dev

2022-12-16 Thread Andreas Beckmann
Source: golang-github-google-cel-spec
Version: 0.5.1-1
Severity: serious

golang-github-google-cel-spec/experimental has a
  B-D: golang-goprotobuf-dev (>= 1.4.3~)
which is no longer available but has been superseded by
golang-github-golang-protobuf-1-5-dev.


Andreas



Bug#1026131: Merging and marking as closed

2022-12-16 Thread Pierre Gruet

Control: forcemerge 1025838 -1

Hello,

This is the same as #1025838, which version 1.11.9+dfsg-3 properly closes.

Best,

--
Pierre


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1026222: golang-google-genproto: switch B-D to golang-github-golang-protobuf-1-5-dev

2022-12-16 Thread Andreas Beckmann
Source: golang-google-genproto
Version: 0.0~git20210726.e7812ac-1~exp0
Severity: serious

golang-google-genproto/experimental has a
  B-D: golang-goprotobuf-dev (>= 1.4.1~)
which is no longer available but has been superseded by
golang-github-golang-protobuf-1-5-dev.


Andreas



Bug#1026221: rust-sequoia-octopus-librnp: B-D on no longer available librust-libgit2-sys-0.12+default-dev

2022-12-16 Thread Andreas Beckmann
Source: rust-sequoia-octopus-librnp
Version: 1.4.1-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source

Hi,

rust-sequoia-octopus-librnp/experimental has a no longer satisfiable
  Build-Depends: librust-libgit2-sys-0.12+default-dev
librust-libgit2-sys-dev now provides (among others)
  librust-libgit2-sys+default-dev (= 0.13.2-2)
  librust-libgit2-sys-0+default-dev (= 0.13.2-2)
  librust-libgit2-sys-0.13+default-dev (= 0.13.2-2)
  librust-libgit2-sys-0.13.2+default-dev (= 0.13.2-2)

Andreas



Bug#811087: qemu-user-static: qemu-arm-static segfaults in armhf chroot on 'aptitude -u'

2022-12-16 Thread Michael Tokarev

Control: tag -1 + confirmed upstream patch
Control: forwarded -1 
https://lore.kernel.org/qemu-devel/20221216152006.2838195-1-...@msgid.tls.msk.ru/T

Just sent a patch fixing this issue to the qemu list.

/mjt



Bug#1026055: lapack breaks openturns autopkgtest: undefined reference to `ztrsyl3_' (and 3 more)

2022-12-16 Thread Sébastien Villemot
Le vendredi 16 décembre 2022 à 13:47 +0100, Jochen Sprickerhof a
écrit :
> Hi Sébastien,
> 
> * Sébastien Villemot  [2022-12-16 10:30]:
> > Le jeudi 15 décembre 2022 à 21:16 +0100, Paul Gevers a écrit :
> > > On 13-12-2022 21:59, Sébastien Villemot wrote:
> > > > The problem is that atlas needs to be recompiled against lapack 3.11.0.
> > > > Which has been done in atlas 3.10.3-13. But atlas itself cannot migrate
> > > > to testing because of #1025699.
> > > 
> > > While I understand recompiling "solves" the issue, normally this error
> > > "undefined reference" hints at removal of symbols. Normally that should
> > > be handled by a SONAME bump which would trigger auto trackers to be
> > > generated for the transition. Such trackers notify the release team of
> > > transitions and they can trigger rebuilds (you know that drill,
> > > including the transition bug filing for coordination). Why do you think
> > > that a SONAME bump wasn't the right solution in this case?
> > 
> > Actually the error is not due to a symbol removed, but to a symbol
> > *added*. So no SONAME bump is warranted.
> > 
> > Let me explain:
> > 
> > In lapack 3.11.0, several new symbols ({z,c,d,s}trsyl3_) were added to
> > liblapack.so.3 (a linear algebra library with a Fortran interface).
> > As a consequence, new wrapper functions around these symbols were also
> > added to liblapacke.so.3 (note the “e”), which is a C wrapper around
> > liblapack.so.3, and which is also shipped by src:lapack. Hence the
> > latest liblapacke.so.3 depends on the new symbols in liblapack.so.3.
> > 
> > Now, libatlas3-base (compiled from src:atlas) also provides its own
> > version of liblapack.so.3 (through the alternatives system¹). But,
> > until it is recompiled against lapack 3.11.0, that version of
> > liblapack.so.3 does not contain the new symbols. Hence, when
> > liblapack.so.3 is provided by libatlas3-base, loading liblapacke.so.3
> > produces the error that is seen in the failing test.
> > 
> > Essentially, what is missing is a restriction which would forbid the
> > co-installation of liblapacke ⩾ 3.11 and libatlas3-base compiled
> > against lapack < 3.11. I don’t know how to express that using our
> > tooling, but maybe I’m unimaginative.
> 
> I think you can get that with a virtual abi package, something like:
> 
> Provides: libblas-abi (= 3.11)
> 
> And have downstream packages shlibs depend on that virtual package:
> 
> override_dh_makeshlibs:
>   dh_makeshlibs -plibfoo -V 'libblas-abi (= 3.11)'
>   dh_makeshlibs --remaining-packages
> 
> Maybe also add a:
> 
> Conflicts: libblas-abi (= 3.11)
> 
> So only one lib can be installed at the same time and drop the 
> alternatives system.

In the current system, in which the BLAS and LAPACK implementation are
decided through the alternatives system, it’s not possible to solve the
problem through versioned provides. Because even if the dependency on
the versioned provides is satisfied, this does not prevent another
flavour of LAPACK (not satisfying the dependency) to be installed and
selected through the alternatives system.

So indeed the only clean way of solving this issue seems to forbid
coinstallability of several BLAS or LAPACK flavours. But the latter is
considered as a feature, not as a bug. I agree that using the
alternatives system for a shared library is a bit ugly and does not
play well with our tooling, but that’s a choice that was made long ago
and it also brings some flexibility for the user (it’s easy to switch
from one implementation to the other).

-- 
⢀⣴⠾⠻⢶⣦⠀  Sébastien Villemot
⣾⠁⢠⠒⠀⣿⡁  Debian Developer
⢿⡄⠘⠷⠚⠋⠀  https://sebastien.villemot.name
⠈⠳⣄  https://www.debian.org



signature.asc
Description: This is a digitally signed message part


Bug#1026216: pkg-conf: breaking build with latest m4 fixes

2022-12-16 Thread Andrej Shadura
Hi,

On Fri, 16 Dec 2022, at 15:12, Gianfranco Costamagna wrote:
> Source: pkgconf
> Version: 1.8.0-11
> Severity: serious
> Forwarded: https://github.com/pkgconf/pkgconf/issues/260
>
> Hello, after the change in 
> https://github.com/pkgconf/pkgconf/commit/8d9d3de6eb8f0ffdbb859fce79cff89038e513c4
> The pkg-config automake module is broken if the pkg-config is called 
> with multiple parameters.
> See the upstream ticket for more information.
>
> thanks for considering disabling patch 
> debian/patches/pkg.m4/0002-pkg.m4-PKG_CHECK_MODULES-provides-modversion.patch
> for now

Thanks for reporting. Disabling it now.

-- 
Cheers,
  Andrej



Bug#1026220: graphicsmagick: Missing JPEG XL support

2022-12-16 Thread Davide G. Borin

Package: graphicsmagick
Version: 1.4+really1.3.38+hg16870-1
Severity: normal

Dear Maintainer,
 according to:

http://www.graphicsmagick.org/formats.html

GraphicsMagick'd support JPEG XL format, but it's missing in Debian 
packaged version.



-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-5-amd64 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:it

Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages graphicsmagick depends on:
ii  libc62.36-6
ii  libgraphicsmagick-q16-3  1.4+really1.3.38+hg16870-1

graphicsmagick recommends no packages.

Versions of packages graphicsmagick suggests:
pn  graphicsmagick-dbg  

-- no debconf information



Bug#1017780: Version bump: 1.4.230

2022-12-16 Thread Diederik de Haas
Hi Jonas,

On Tuesday, 13 December 2022 10:55:18 CET Jonas Smedegaard wrote:
> perhaps I can point you to other examples as well

I'd love to have several examples to look at :-)
Especially if you know of one (or more) who write extensive commit messages 
explaining the reasons/rational of their changes. This should help me get an 
understanding of how, what and why to do (packaging) things.

TIA,
  Diederik

signature.asc
Description: This is a digitally signed message part.


Bug#1026219: FTBFS: ruby-nokogiri fails to build

2022-12-16 Thread Andrey Feofilaktov
Package: ruby-nokogiri
Version: 1.13.8+dfsg-1

The package fails to build due to the `test_large_cdata_is_handled` test
failure.

The test fails because https://tracker.debian.org/pkg/libxml2 had a
security patch upload that hides handling huge data behind a flag (also see
upstream https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.3).
The flag (XML_PARSE_HUGE) is listed in
https://gnome.pages.gitlab.gnome.org/libxml2/devhelp/libxml2-parser.html#xmlParserOption
and can be set in the context using the corresponding function
https://gitlab.gnome.org/GNOME/libxml2/-/blob/master/parser.c#L14949.

-- 
Regards,
Andrey


Bug#1026218: ITP: python3-scrape-schema-recipe -- extracts cooking recipe from HTML structured data

2022-12-16 Thread Christian Marillat
Package: wnpp
Severity: wishlist
Owner: Christian Marillat 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: python3-scrape-schema-recipe
  Version : 0.2.0
  Upstream Contact: Micah Cochra
* URL : https://github.com/micahcochran/scrape-schema-recipe
* License : Apache-2.0
  Programming Lang: Python
  Description : extracts cooking recipe from HTML structured data

Scrapes recipes from HTML https://schema.org/Recipe
(Microdata/JSON-LD) into Python dictionaries.

This python module is needed by gourmand to import recipes from internet.



Bug#1026213: [Pkg-shadow-devel] Bug#1026213: login: $HOME created as 0755 by default

2022-12-16 Thread Serge E. Hallyn
On Fri, Dec 16, 2022 at 04:14:56PM +0300, Michael Tokarev wrote:
> On Fri, 16 Dec 2022 11:50:18 + debian user  wrote:
> > Package: login
> > Version: 1:4.13+dfsg1-1
> > Severity: grave
> > Tags: security
> > Justification: user security hole
> > X-Debbugs-Cc: r...@localhost.lan, Debian Security Team 
> > 
> > 
> > Dear Maintainer,
> > 
> > please uncomment the line in /etc/login.defs that currently says:
> > 
> > #HOME_MODE  0700
> > 
> > to say:
> > 
> > HOME_MODE  0700
> > 
> > The current settings makes user $HOME directories be created with
> > permissions where other users can read the contents by default.
> 
> I tend to disagree, the default is just fine, all the sensitive
> data (eg, .bash_history, .ssh/ etc) is already protected, there's
> absolutely nothing wrong if the files in home dirs are accessible
> by default, - for example my users complain if they can't show content
> of their own files to other users by default.  On the other hand,
> it is trivial to uncomment the HOME_MODE setting locally if the local
> policy is that users should be paranoid against each other.  It is
> just as easy to set perms of your own home dir at any time, too.
> 
> /mjt

Agreed with mjt.  As an example, unprivileged containers cannot be
started if your subuids cannot at least 'x' $HOME.  And in all the
systems I set up to share with family/friends I want to encourage
not limit sharing.

-serge



Bug#1026217: libunwind 1.6.2-2.1 assumes 4k page sizes and crashes on systems with bigger page sizes

2022-12-16 Thread Thomas Glanzmann
Package: libunwind8
Version: 1.6.2-2.1
Severity: important
Tags: patch
X-Debbugs-Cc: as...@lists.linux.dev

Hello,
the recent libunwind8 update 1.6.2-2.1 breaks for architectures which have a
pagesize bigger than 4096 on arm64. The issue is fixed upstream. But no
release has been made with the patch included. libunwind8 1.6.2-2.1 crashes
Xorg on startup for systems with a pagesize bigger than 4096 on arm64. Linux on
apple silicon (m1/m2) uses a 16 KB page size.

https://github.com/libunwind/libunwind/commit/2d004eafc77f3c6a4bd9a44b1c35735273fd4e97

Please apply the above patch.

Cheers,
Thomas

-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: arm64 (aarch64)

Kernel: Linux 6.1.0-asahi (SMP w/8 CPU threads)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libunwind8 depends on:
ii  libc6 2.36-6
ii  liblzma5  5.2.9-0.0

libunwind8 recommends no packages.

libunwind8 suggests no packages.

-- no debconf information



Bug#1026216: pkg-conf: breaking build with latest m4 fixes

2022-12-16 Thread Gianfranco Costamagna


Source: pkgconf
Version: 1.8.0-11
Severity: serious
Forwarded: https://github.com/pkgconf/pkgconf/issues/260

Hello, after the change in 
https://github.com/pkgconf/pkgconf/commit/8d9d3de6eb8f0ffdbb859fce79cff89038e513c4
The pkg-config automake module is broken if the pkg-config is called with 
multiple parameters.
See the upstream ticket for more information.

thanks for considering disabling patch 
debian/patches/pkg.m4/0002-pkg.m4-PKG_CHECK_MODULES-provides-modversion.patch
for now

G.


OpenPGP_signature
Description: OpenPGP digital signature


Bug#811087: qemu-user-static: qemu-arm-static segfaults in armhf chroot on 'aptitude -u'

2022-12-16 Thread Michael Tokarev

On Sun, 14 Feb 2021 21:29:20 +0100 Andreas Beckmann  wrote:

Version: 1:5.2+dfsg-3~bpo10+1

On 2/14/21 4:46 PM, Michael Tokarev wrote:
> Before I was able to hit this issue with almost any invocation of aptitude.
> But in 5.0 or current 5.2 I can't reproduce this issue anymore, now matter
> how I try.

a simple 'aptitude -u' does the job for me :-(

The core file I get inside the chroot is actually from the qemu binary on the 
host,
perhaps this backtrace helps:

Reading symbols from /usr/bin/qemu-aarch64-static...Reading symbols from 
/usr/lib/debug/.build-id/30/efd3930fb9519b21470b113679376f2ffbb41a.debug...done.
done.

warning: core file may not match specified executable file.
[New LWP 23784]
[New LWP 23772]
[New LWP 23774]
[New LWP 23777]
[New LWP 23776]
[New LWP 23775]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/bin/qemu-aarch64-static /usr/bin/aptitude -u'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x0059a1eb in getgroups (__list=0x7f867be79cc0, __size=65536) at 
/usr/include/x86_64-linux-gnu/bits/unistd.h:275


This comes from the following code, linux-user/syscall.c:11757 in qemu version 
7.2:

case TARGET_NR_getgroups32:
{
int gidsetsize = arg1;
uint32_t *target_grouplist;
gid_t *grouplist;
int i;

grouplist = alloca(gidsetsize * sizeof(gid_t));
11757   ret = get_errno(getgroups(gidsetsize, grouplist));

gidsetsize as coming from aptitude is 65536. Grouplist is allocated on the 
stack...

/mjt



Bug#1022068: Still found

2022-12-16 Thread Mathieu Parent
found  1022068 6.1~rc8-1~exp1
upstream 1022068 https://gitlab.freedesktop.org/drm/nouveau/-/issues/188
thanks

Still in latest experimental kernel. :-(

I've found an upstream bug (every distro affected).

Cheers
-- 
Mathieu



Bug#1026213: login: $HOME created as 0755 by default

2022-12-16 Thread Michael Tokarev

On Fri, 16 Dec 2022 11:50:18 + debian user  wrote:

Package: login
Version: 1:4.13+dfsg1-1
Severity: grave
Tags: security
Justification: user security hole
X-Debbugs-Cc: r...@localhost.lan, Debian Security Team 


Dear Maintainer,

please uncomment the line in /etc/login.defs that currently says:

#HOME_MODE  0700

to say:

HOME_MODE  0700

The current settings makes user $HOME directories be created with
permissions where other users can read the contents by default.


I tend to disagree, the default is just fine, all the sensitive
data (eg, .bash_history, .ssh/ etc) is already protected, there's
absolutely nothing wrong if the files in home dirs are accessible
by default, - for example my users complain if they can't show content
of their own files to other users by default.  On the other hand,
it is trivial to uncomment the HOME_MODE setting locally if the local
policy is that users should be paranoid against each other.  It is
just as easy to set perms of your own home dir at any time, too.

/mjt



Bug#1026055: lapack breaks openturns autopkgtest: undefined reference to `ztrsyl3_' (and 3 more)

2022-12-16 Thread Jochen Sprickerhof

Hi Sébastien,

* Sébastien Villemot  [2022-12-16 10:30]:

Le jeudi 15 décembre 2022 à 21:16 +0100, Paul Gevers a écrit :

On 13-12-2022 21:59, Sébastien Villemot wrote:
> The problem is that atlas needs to be recompiled against lapack 3.11.0.
> Which has been done in atlas 3.10.3-13. But atlas itself cannot migrate
> to testing because of #1025699.

While I understand recompiling "solves" the issue, normally this error
"undefined reference" hints at removal of symbols. Normally that should
be handled by a SONAME bump which would trigger auto trackers to be
generated for the transition. Such trackers notify the release team of
transitions and they can trigger rebuilds (you know that drill,
including the transition bug filing for coordination). Why do you think
that a SONAME bump wasn't the right solution in this case?


Actually the error is not due to a symbol removed, but to a symbol
*added*. So no SONAME bump is warranted.

Let me explain:

In lapack 3.11.0, several new symbols ({z,c,d,s}trsyl3_) were added to
liblapack.so.3 (a linear algebra library with a Fortran interface).
As a consequence, new wrapper functions around these symbols were also
added to liblapacke.so.3 (note the “e”), which is a C wrapper around
liblapack.so.3, and which is also shipped by src:lapack. Hence the
latest liblapacke.so.3 depends on the new symbols in liblapack.so.3.

Now, libatlas3-base (compiled from src:atlas) also provides its own
version of liblapack.so.3 (through the alternatives system¹). But,
until it is recompiled against lapack 3.11.0, that version of
liblapack.so.3 does not contain the new symbols. Hence, when
liblapack.so.3 is provided by libatlas3-base, loading liblapacke.so.3
produces the error that is seen in the failing test.

Essentially, what is missing is a restriction which would forbid the
co-installation of liblapacke ⩾ 3.11 and libatlas3-base compiled
against lapack < 3.11. I don’t know how to express that using our
tooling, but maybe I’m unimaginative.


I think you can get that with a virtual abi package, something like:

Provides: libblas-abi (= 3.11)

And have downstream packages shlibs depend on that virtual package:

override_dh_makeshlibs:
dh_makeshlibs -plibfoo -V 'libblas-abi (= 3.11)'
dh_makeshlibs --remaining-packages

Maybe also add a:

Conflicts: libblas-abi (= 3.11)

So only one lib can be installed at the same time and drop the 
alternatives system.


Cheers Jochen


signature.asc
Description: PGP signature


Bug#1026215: python3-openssl: Fails using deprecated SSL_CTX_set_ecdh_auto which ultimately has been removed w/ p-cryptography 38

2022-12-16 Thread Stephan Sürken
Package: python3-openssl
Version: 21.0.0-1
Severity: important

Dear Maintainer,

since p-cryptography 38 hit unstable, this fails somewhere here

  File "/usr/lib/python3/dist-packages/OpenSSL/SSL.py", line 674, in __init__

using SSL_CTX_set_ecdh_auto, which is deprecated w/ at least openssl3 afaiu, and
python3-cryptography 38 seem to to have that binding now removed for good.

Newest release versions of pyopenssl have this depcrecated call just removed, 
so maybe
updating upstream is the way to go here.

Hth, and thanks!

Stephan

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-0.deb11.2-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to C.UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect

Versions of packages python3-openssl depends on:
ii  python3   3.10.6-3
ii  python3-cryptography  38.0.4-1
ii  python3-six   1.16.0-4

python3-openssl recommends no packages.

Versions of packages python3-openssl suggests:
pn  python-openssl-doc   
pn  python3-openssl-dbg  

-- no debconf information

-- debsums errors found:
debsums: changed file /usr/lib/python3/dist-packages/OpenSSL/SSL.py (from 
python3-openssl package)



Bug#1006179: [Pkg-clamav-devel] Bug#1006179: Bug#1006179: Bug#1006179: Bug#1006179: ClamAV 1.0.0 release candidate now available

2022-12-16 Thread Andrew C Aitchison

On Tue, 13 Dec 2022, Sebastian Andrzej Siewior wrote:


On 2022-12-12 22:45:57 [-0500], Scott Kitterman wrote:


That doesn't sound too bad.  I'll see if I can find some time to work on the
split, but probably not until Wednesday or Friday.


So I managed to tell cmake to use the tfm library instead of the bundled
code and the testsuite fails now but I think this is due to the limit
in "our" libtfm.

I noticed libclammspack/libclammspack.so which appears
to be the libmspack and I hope that this is a typo somewhere and we can
exclude the bundled library.


INSTALL.md lists a CMake option
ENABLE_EXTERNAL_MSPACK
so there should be no problem there.


Then I had to throw up a little. It might me be nothing and I'm just
stupid and don't know things but there is a lot of rust code in
libclamav_rust/.cargo/vendor/

and it appears to me that they bundled a bunch of rust libraries. It
*might* be enough to just install librust-jpeg-decoder-dev as
dependency and then libclamav_rust/.cargo/vendor/jpeg-decoder will be
ignored but I just wanted point that out. I don't have any rust skills
at this time.


ClamAV are moving towards Rust being a major part of the project.
https://docs.clamav.net/faq/faq-rust.html

Sadly, from our point of view, they use cpack (part of cmake)
to build their .deb (and .rpm) packages rather than a "debian"
tree.

They also use an in-house tool - Mussels
  https://blog.clamav.net/2019/12/introducing-mussels-application.html
to manage library dependencies. Not sure whther this will be an issue.

CMakeLists.txt has
set(LLVM_MAX_VER "13")
set(LLVM_MIN_VER "8")
I don't know about Debian, but Ubuntu Kinetic/22.10
has LLVM v15 by default. We can hope that 13 is not a hard
limit, just that it is the latest tested version ...

--
Andrew C. Aitchison  Kendal, UK
   and...@aitchison.me.uk



Bug#1026165: cmd2: diff for NMU version 2.4.2+ds-3

2022-12-16 Thread Jochen Sprickerhof

Control: tags 1026165 + patch
Control: tags 1026165 + pending


Dear maintainer,

I've prepared an NMU for cmd2 (versioned as 2.4.2+ds-3) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

Regards.

diff -Nru cmd2-2.4.2+ds/debian/changelog cmd2-2.4.2+ds/debian/changelog
--- cmd2-2.4.2+ds/debian/changelog	2022-09-12 10:16:17.0 +0200
+++ cmd2-2.4.2+ds/debian/changelog	2022-12-16 12:59:38.0 +0100
@@ -1,3 +1,16 @@
+cmd2 (2.4.2+ds-3) unstable; urgency=medium
+
+  * Team upload.
+
+  [ Debian Janitor ]
+  * Remove constraints unnecessary since buster
+  * Trim trailing whitespace.
+
+  [ Jochen Sprickerhof ]
+  * Drop unused build dependency (Closes: #1026165)
+
+ -- Jochen Sprickerhof   Fri, 16 Dec 2022 12:59:38 +0100
+
 cmd2 (2.4.2+ds-2) unstable; urgency=medium
 
   * Team upload.
@@ -37,7 +50,7 @@
  - Removed line without effect: rm -f tests/scripts/binary.bin
  - Remove doctrees files to documentation sphinx
  - Remove all file '.js' sphinx documentation
- - Iclude test Ignore: test_utils.py 
+ - Iclude test Ignore: test_utils.py
   * debian/source:
  - Remove lintian-overrides
   * debian/watch:
diff -Nru cmd2-2.4.2+ds/debian/control cmd2-2.4.2+ds/debian/control
--- cmd2-2.4.2+ds/debian/control	2022-09-11 16:54:15.0 +0200
+++ cmd2-2.4.2+ds/debian/control	2022-12-15 16:36:32.0 +0100
@@ -6,7 +6,6 @@
 Build-Depends-Indep: dh-python,
  python3-all,
  python3-attr,
- python3-contextlib2,
  python3-pyperclip,
  python3-pytest,
  python3-pytest-cov,
@@ -24,13 +23,11 @@
 
 Package: python3-cmd2
 Architecture: all
-Pre-Depends: dpkg (>= 1.15.6~)
 Depends: python3-wcwidth,
  ${misc:Depends},
  ${python3:Depends},
 Recommends: ${python3:Recommends}
 Provides: ${python3:Provides}
-Breaks: python3-pyperclip (<< 1.6.0-1)
 Suggests: python-cmd2-doc
 Description: Enhanced Python cmd module - Python 3.x
  Drop-in replacement adds several features for command-prompt tools, like


signature.asc
Description: PGP signature


Bug#968495: ITP: c-evo-dh -- C-evo: Distant Horizon, Empire building game

2022-12-16 Thread Peter B



New Upstream version

 * Package name : c-evo-dh
   Version  : 1.6.0-1
   Upstream contact : Peter 
 * URL  : https://sourceforge.net/projects/c-evo-eh/
 * License  : CC-BY-3.0, CC-BY-SA-3.0-US, CC0-1.0, GPL-2+
 * Vcs  : https://salsa.debian.org/PeterB/c-evo-dh
   Section  : games


Changes since 1.1

c-evo-dh (1.6)
  Restore CityType drag cursor (lost with Lazarus 2.2.0)
  Remove binary cursor files
  Change package & folder names from c-evo to c-evo-dh
  Update Docs

 --  Wed, 14 Dec 2022

c-evo-dh (1.5)
  More fixes to internationalisations (es, de, it, pt, ru)
  Update Appstream metadata
  Remove example maps that have missing special resources

 --  Mon, 12 Dec 2022

c-evo-dh (1.4)
  Fixes to internationalisation of in game help

 --  Sun, 11 Dec 2022

c-evo-dh (1.3)
  Fixes to Windows build
  Include Spanish and Portuguese translations

 --  Sun, 04 Dec 2022

c-evo-dh (1.2)
  Reduce Spaceship costs to 50% of original
  Support random resource placement by external map generators
  Include Windows build
  Remove example game (incompatible due to Spaceship costs)

 --  Tue, 27 Sep 2022



Bug#1026214: libpcre3: Lower Priority

2022-12-16 Thread Bastian Germann

Package: libpcre3
Severity: important
Version: 2:8.39-14

libpcre3 and libpcre3-udeb have Priority: important. They are considered obsolete, so please lower 
their priority to optional so they are not necessarily installed on a standard installation.




Bug#1026213: login: $HOME created as 0755 by default

2022-12-16 Thread debian user
Package: login
Version: 1:4.13+dfsg1-1
Severity: grave
Tags: security
Justification: user security hole
X-Debbugs-Cc: r...@localhost.lan, Debian Security Team 


Dear Maintainer,

please uncomment the line in /etc/login.defs that currently says:

#HOME_MODE  0700

to say:

HOME_MODE  0700

The current settings makes user $HOME directories be created with
permissions where other users can read the contents by default.


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-19-amd64 (SMP w/4 CPU threads)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect

Versions of packages login depends on:
ii  libaudit1   1:3.0.7-1.1+b2
ii  libc6   2.36-6
ii  libcrypt1   1:4.4.33-1
ii  libpam-modules  1.5.2-5
ii  libpam-runtime  1.5.2-5
ii  libpam0g1.5.2-5

login recommends no packages.

login suggests no packages.

-- no debconf information



Bug#828903: auditd embeds a copy of libev

2022-12-16 Thread Bastian Germann

Am 16.12.22 um 12:20 schrieb Laurent Bigonville:

Do you think you could bring that upstream?


Usually, projects have their reasons to vendor libraries (mostly, convenience 
or CI-related).
The patch is not complete in the sense that it still reads the .m4 file from 
the vendored library.
So I do not think this has a high chance to be considered for upstream 
inclusion.
However, I can try to hand in one that gets rid of the vendoring completely (not happening in a 
timeframe before bookworm freeze).


If you do not want to include the patch for now then please at least make sure the embedded libev is 
registered with the Security Team.




Bug#1026212: FTBFS: haskell-wide-word fails to build on i386

2022-12-16 Thread Andrey Feofilaktov
Package: haskell-wide-word
Version: 0.1.1.2-3

Package fails to build on i386 due to using platform-specific type aliases.

There is a new version available on
https://hackage.haskell.org/package/wide-word which starts to use explicit
types in
https://hackage.haskell.org/package/wide-word-0.1.3.0/src/src/Data/WideWord/Compat.hs
(e.g. see plusWord# implementation).

Reproducibility logs:
https://tests.reproducible-builds.org/debian/rb-pkg/bookworm/i386/haskell-wide-word.html

-- 
Regards,
Andrey


Bug#828903: auditd embeds a copy of libev

2022-12-16 Thread Laurent Bigonville

Hello,

Le 15/12/22 à 17:08, Bastian Germann a écrit :


On Tue, 28 Jun 2016 22:28:07 +0200 Nicolas Braud-Santoni 
 wrote:

The audit source package ships a (custom, patched) copy of libev.

Moreover, it is not listed in the security team's list of code copies:

https://anonscm.debian.org/viewvc/secure-testing/data/embedded-code-copies?view=markup


I discovered the issue while preparing a DEP5 copyright file for
the audit source package, and more generally fixing all Lintian
warnings while preparing a patch for #759604.


I think this is an important issue and have included a patch.
Would you please consider to apply this before the bookworm freeze?


Do you think you could bring that upstream?

Not sure we want to carry this patch forever



Bug#1026211: RM: astap [mipsel] -- ROM; FTBFS on mipsel

2022-12-16 Thread Thorsten Alteholz

Package: ftp.debian.org
Severity: normal

The pascal compiler seems to have a problem on mipsel, so please remove 
this package from that architecture for now.


  Thorsten



Bug#1026210: scipy: autopkgtest regression due to invalid test function returns

2022-12-16 Thread Timo Röhling
Source: scipy
Version: 1.8.1-14
Severity: serious
Control: affects -1 src:pytest

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear maintainers,

the autopkgtest of your package started failing because some of the
tests return values. This has always been incorrect (tests are expected
to assert, not return anything), but recently, pytest 7.2 started
issuing warnings [1], which are turned into hard errors by your
pytest.ini filterwarnings directive.


Cheers
Timo


[1] 
https://docs.pytest.org/en/7.2.x/deprecations.html#returning-non-none-value-in-test-functions

-BEGIN PGP SIGNATURE-
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=A9xu
-END PGP SIGNATURE-



Bug#811087: closed by Michael Tokarev (Re: Bug#811087: qemu-user-static: qemu-arm-static segfaults in armhf chroot on 'aptitude -u')

2022-12-16 Thread Michael Tokarev

Control: tag -1 - moreinfo
Control: found -1 1:7.2+dfsg-1

On Sun, 14 Feb 2021 21:29:20 +0100 Andreas Beckmann  wrote:

Version: 1:5.2+dfsg-3~bpo10+1

On 2/14/21 4:46 PM, Michael Tokarev wrote:
> Before I was able to hit this issue with almost any invocation of aptitude.
> But in 5.0 or current 5.2 I can't reproduce this issue anymore, now matter
> how I try.

a simple 'aptitude -u' does the job for me :-(


This is still happening with current sid and qemu 7.2.  That's fantastic!.. :)


The core file I get inside the chroot is actually from the qemu binary on the 
host,
perhaps this backtrace helps:


How does one gets the core inside a ch

/mjt



Bug#1026209: python3-pytest-asyncio: deprecated use of markers for hook implementations

2022-12-16 Thread Timo Röhling
Package: python3-pytest-asyncio
Version: 0.19.0-1
Severity: important
Tags: fixed-upstream
Control: affects -1 src:opendrop

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear maintainer,

recently, pytest 7.2 started issuing a warning about deprecated marker
use [1], which in turn causes stderr output in packages using the asyncio
plugin, thereby failing autopkgtests [2]

This problem has been addressed in upstream release 0.20.2, with yet
another deprecation-related fix in the very latest 0.20.3. As this
currently prevents pytest from migrating to testing, it would be awesome
if you could update the package ASAP. I would also do an NMU, but the
VCS is not up-to-date. :/

By the way, have you considered moving this package to the Python Team?


Cheers
Timo

[1] 
https://docs.pytest.org/en/7.2.x/deprecations.html#configuring-hook-specs-impls-using-markers
[2] 
https://ci.debian.net/data/autopkgtest/testing/amd64/o/opendrop/29435557/log.gz


-BEGIN PGP SIGNATURE-
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=TCge
-END PGP SIGNATURE-



Bug#972099: CVE-2019-12067

2022-12-16 Thread Michael Tokarev

Control: severity -1 normal

Since this issue is questioned upstream and in a few years there was
no activity (neither upstream nor in debian), let's downgrade severity
at least to normal.

/mjt



Bug#971390: qemu: CVE-2020-25742

2022-12-16 Thread Michael Tokarev

Control: severity -1 normal

Since this issue is questioned upstream and in a few years there was
no activity (neither upstream nor in debian), let's downgrade severity
at least to normal.

/mjt



Bug#970939: qemu: CVE-2020-25741

2022-12-16 Thread Michael Tokarev

Control: severity -1 normal

Since this issue is questioned upstream and in a few years there was
no activity (neither upstream nor in debian), let's downgrade severity
at least to normal.

/mjt



Bug#970940: qemu: CVE-2020-25743

2022-12-16 Thread Michael Tokarev

Control: severity -1 normal

Since this issue is questioned upstream and in a few years there was
no activity (neither upstream nor in debian), let's downgrade severity
at least to normal.

/mjt



Bug#1025140: diffutils: define SIGSEGV_FAULT_STACKPOINTER for loongarch

2022-12-16 Thread Santiago Vila

El 16/12/22 a las 5:17, 张丹丹 escribió:

Hi,maintainers,

Hello. I believe you need a similar change for m4.
Please submit a bug for m4 as well.


I have added a change for m4.
Please consider it.


I meant "please submit a bug to the Debian bug system".
I don't see your bug report here:

https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=m4

Thanks.



Bug#1026208: RM: recipe-scrapers -- ROM; Upstream switched to scrape-schema-recipe

2022-12-16 Thread Christian Marillat
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove

Hi,

I did an ITP for recipe-scrapers module #1001313 (package already in
NEWS) but upstream (gourmand package) changed to the
scrape-schema-recip python module.

So I no longer need this package.

Christian



Bug#1026207: python-ase: autopkgtest regression because test functions return values

2022-12-16 Thread Timo Röhling
Source: python-ase
Version: 3.22.1-2
Severity: serious
Control: affects -1 src:pytest

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear maintainers,

the autopkgtest of your package started failing because some of the
tests return values. This has always been incorrect (tests are expected
to assert, not return anything), but recently, pytest 7.2 started
issuing warnings to stderr [1].

As a simple workaround, you could set "Restrictions: allow-stderr" until
upstream has fixed their tests properly.


Cheers
Timo

[1] 
https://docs.pytest.org/en/7.2.x/deprecations.html#returning-non-none-value-in-test-functions


-BEGIN PGP SIGNATURE-
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=Ysj+
-END PGP SIGNATURE-



  1   2   >