Bug#1062209: should not block migration to testing

2024-05-21 Thread Hans-Christoph Steiner



control: severity -1 normal

Thanks for reporting!  In the Android Tools case, the shared libs and packages 
that use them are packaged together, often from the same source package, so I 
can't see why we'd need special versions of it. And when we need to, we can use 
strictly versioned depends, so it should be fine. I'm going to set the bug to 
normal for now.




Bug#1062110: should not block migration to testing

2024-05-21 Thread Hans-Christoph Steiner



control: severity -1 normal

Thanks for reporting!  In the Android Tools case, the shared libs and packages 
that use them are packaged together, often from the same source package, so I 
can't see why we'd need special versions of it. And when we need to, we can use 
strictly versioned depends, so it should be fine. I'm going to set the bug to 
normal for now.




Bug#1062209: should not block migration to testing

2024-05-21 Thread Hans-Christoph Steiner



control: severity -1 normal

Thanks for reporting!  In the Android Tools case, the shared libs and packages 
that use them are packaged together, often from the same source package, so I 
can't see why we'd need special versions of it. And when we need to, we can use 
strictly versioned depends, so it should be fine. I'm going to set the bug to 
normal for now.




Bug#1071335: upstream commits

2024-05-18 Thread Christoph Biedl
Control: tags 1071335 pending

James Cameron wrote...

> You may be interested in these upstream commits;
> 
> b01478d ("Fix some parts of macro expansion are not guarded")
> 0194b80 ("strerror and memset require string.h")

Thanks a lot for having an eye on the Debian packaging. As you'd expect,
version 1.5 builds fine again, will do some more checks and upload
during the weekend.

Christoph


signature.asc
Description: PGP signature


Bug#761820: RFP: tsmuxer -- mux video to TS/M2TS files or create BD disks

2024-05-17 Thread Christoph Anton Mitterer
Hey.

Just a note:

In 2019, tsmuxer has been released under Apache 2.0 license.
See https://github.com/justdan96/tsMuxer .

Cheers,
Chris.



Bug#1070891: apt-show-versions: Permission denied on a bad pathname

2024-05-15 Thread Christoph Martin



Am 14.05.24 um 10:39 schrieb Vincent Lefevre:


This could explain the error.

I'm wondering why apt plays with the permissions. This is confusing.
Or should there be a locking mechanism?



This reminds me about the long due rewrite to use the apt-API to access 
these files and not read them directly.


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1071030: postgresql-15: Drop database hang.

2024-05-15 Thread Christoph Berg
Re: Владимир Ступин
> Trouble solved with restarting PostgreSQL.

Hi,

I'm glad you solved it.

My guess would be that there was something (likely a background
worker) still connected to that database and DROP DATABASE couldn't
get the proper lock on it.

I guess there is nothing to actually fix (at least on the PG side),
can we close the bug?

Christoph



Bug#1070891: apt-show-versions: Permission denied on a bad pathname

2024-05-14 Thread Christoph Martin

Hi Vincent,

Am 13.05.24 um 19:59 schrieb Vincent Lefevre:

On 2024-05-13 17:12:57 +0200, Christoph Martin wrote:


Please try to access the file e.g. 'less 
/var/lib/apt/lists//debug.mirrors.debian.org_debian-debug_dists_stable-debug_InRelease'


No problems.



You could try to prepend strace to your cron call like:

strace -o /tmp/asv.$$ -e trace=file apt-show-versions -u

and look for the failed syscall.

Did you look for selinux or apparmor messages in syslog?

Christoph


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1070891: apt-show-versions: Permission denied on a bad pathname

2024-05-13 Thread Christoph Martin

Hi Vincent,

Am 13.05.24 um 15:34 schrieb Vincent Lefevre:


I don't know why could cause the error, but the pathname with "//"
is incorrect.


// in the path should not be a problem.


zsh completion cannot handle it, so I was wondering.


Please try to access the file e.g. 'less 
/var/lib/apt/lists//debug.mirrors.debian.org_debian-debug_dists_stable-debug_InRelease'



Can you do a 'ls -l /var/lib/apt/lists/' to see the permissions?


lrwxrwxrwx 1 root root   25 2024-05-11 22:36:06 _var_local_apt_._Packages 
-> /var/local/apt/./Packages
drwxr-xr-x 2 _apt root 4096 2023-10-07 13:42:54 auxfiles
-rw-r--r-- 1 root root52957 2024-05-11 16:15:34 
debug.mirrors.debian.org_debian-debug_dists_proposed-updates-debug_InRelease
-rw-r--r-- 1 root root   308541 2024-05-08 22:34:42 
debug.mirrors.debian.org_debian-debug_dists_proposed-updates-debug_main_binary-amd64_Packages
-rw-r--r-- 1 root root49779 2024-02-10 12:17:11 
debug.mirrors.debian.org_debian-debug_dists_stable-debug_InRelease
-rw-r--r-- 1 root root 14314273 2024-02-10 10:44:17 
debug.mirrors.debian.org_debian-debug_dists_stable-debug_main_binary-amd64_Packages


What is _var_local_apt_._Packages?

Can you access this files content?

Apart from that, I can't spot a problem.

Christoph


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1070891: apt-show-versions: Permission denied on a bad pathname

2024-05-13 Thread Christoph Martin

Hi Vincent,

Am 11.05.24 um 11:53 schrieb Vincent Lefevre:

Package: apt-show-versions
Version: 0.22.15
Severity: normal

When running "apt-show-versions -u" in a cron script, I got

Failed to open file 
/var/lib/apt/lists//debug.mirrors.debian.org_debian-debug_dists_stable-debug_InRelease
 for reading: Permission denied

I don't know why could cause the error, but the pathname with "//"
is incorrect.



// in the path should not be a problem. Can you do a 'ls -l 
/var/lib/apt/lists/' to see the permissions?


Which user does the cronjob run with?

Christoph


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1071051: bash-completion: new upstream version

2024-05-13 Thread Christoph Anton Mitterer
Package: bash-completion
Version: 1:2.13.0-1
Severity: wishlist

Hey.

2.14.0 is out which allegedly fixes the bug[0] that remote scp file
completion was no longer working.

Thanks,
Chris.

[0] https://github.com/scop/bash-completion/issues/1157



Bug#1071030: postgresql-15: Drop database hang.

2024-05-13 Thread Christoph Berg
Re: Vladimir Stupin
> Package: postgresql-15
> Version: 15.6-0+deb12u1
> 
> dropdb on any database hangs up. pg_activity shows query DROP DATABASE
> ; in state ProcSignalBarrier.
> 
> I found fix for the trouble at 
> https://www.postgresql.org/message-id/E1pKAd5-005BKs-Vr%40gemulon.postgresql.org
> 
> I use apt-source to check sources to found fix described at link above.
> Sources was not fixed. Please update package to fix the trouble.

Hi,

the fix you link to was included in 15.2 as 
267135d01d79c63dfba7fe69dd3b40c125c49a6f.
How did you determine it wasn't included?

Can you pull a backtrace of the hanging process?
https://wiki.postgresql.org/wiki/Getting_a_stack_trace_of_a_running_PostgreSQL_backend_on_Linux/BSD

Christoph



Bug#1055989: Bug reproduced in 1:29.3+1-2

2024-05-09 Thread Christoph Reichenbach
Hello again,

  just to keep the records up to date: the bug is still present in
1:29.3+1-2, and the same patch still works around it (for me).

  All the best,

-- Christoph


signature.asc
Description: PGP signature


Bug#1062105: should not block migration to testing

2024-05-08 Thread Hans-Christoph Steiner



control: severity -1 normal

Thanks for reporting!  In the Android Tools case, the shared libs and packages 
that use them are packaged together, often from the same source package, so I 
can't see why we'd need special versions of it. And when we need to, we can use 
strictly versioned depends, so it should be fine. I'm going to set the bug to 
normal for now.




Bug#1070386: ITP: pass-import - MediaWiki API client in Python

2024-05-04 Thread Hans-Christoph Steiner

Package: wnpp
Severity: wishlist
Owner: Hans-Christoph Steiner 

* Package name: remarkable
  Version : 1.87+git20240504.e8cc99d
  Upstream Author : Jamie McGowan 
* URL : https://github.com/roddhjav/pass-import
* License : BSD-2 GPL-2+ LGPL-2.1+ MIT
  Programming Lang: Python
  Package source  : https://salsa.debian.org/python-team/packages/remarkable
  Description: A free fully featured Markdown editor.

 Remarkable is a free fully featured Markdown editor. It has a syntax
 like Github flavoured Markdown. With it you can write Markdown and view
 the changes as you make them in the live preview window. You can export
 your files to a variety of formats. There are multiple styles available
 along with extensive configuration options so you can set it up exactly
 how you like.

Also on:

AUR: https://aur.archlinux.org/packages/remarkable
Gentoo: https://github.com/gentoo/gentoo/tree/824b749/app-editors/remarkable



Bug#1070331: RFS: nq/0.5-0.1 [NMU] -- Lightweight queue system

2024-05-03 Thread Christoph Biedl
Preuße, Hilmar wrote...

> On 03.05.2024 22:29, Christoph Biedl wrote:
> > Hilmar Preusse wrote...

> > > * Bump Standards and dh compat version, no changes needed.
> >
> > I'm a little surprised why you would change that in a NMU.
> >
> Well, this was reported by lintian. As they were no further changes needed,
> I though it would be a good idea.

Likely there are different opinions here - I prefer to make changes in an NMU
as small as possible. And was about to break my own rule by suggesting
an autopkgtest in #1038937.

> > > * Add "Conflicts: fq".
> >
> > We have a problem. Conflicts: is not enough, with both nq and fq
> > providing /usr/bin/fq, they are in violation of policy 10.1:
> >
> > | Two different packages must not install programs with different
> > | functionality but with the same filenames.
> >
>
> Thanks for pointing this out. The solution in the pull request (which
> introduced the Conflict) looked weird, but in the end #1005961 was solved
> the same (wrong) way, hence I thought it would be OK.

Yeah, to be honest, earlier I had assumed Conflicts: was sufficient to
deal with such a file name clash, too. Only to learn it the hard way in
#919697 policy is pretty straight in that regard.

And I'm not sure policy is the best way to handle this but changing it
is a different story.

> As I'm not the maintainer of either of these package I don't really feel
> responsible to solve the conflict. At first I'd reopen the bug above and
> state it as wrongly solved quoting the policy entry.

That would be necessary - although I don't know how to solve this in a
sensible way.

Sorry for disturbing your best intentions to bring nq back in shape -
but this problem will not disappear by ignoring it.

Christoph


signature.asc
Description: PGP signature


Bug#1070331: RFS: nq/0.5-0.1 [NMU] -- Lightweight queue system

2024-05-03 Thread Christoph Biedl
Hilmar Preusse wrote...

> Changes since the last upload:
> 
>  nq (0.5-0.1) unstable; urgency=medium
>  .
>* Non-maintainer upload.
>  .
>* New upstream version (Closes: #1038937).

>* Bump Standards and dh compat version, no changes needed.

I'm a little surprised why you would change that in a NMU.

>* Add upstream metadata file.
>* Add "Conflicts: fq".

We have a problem. Conflicts: is not enough, with both nq and fq
providing /usr/bin/fq, they are in violation of policy 10.1:

| Two different packages must not install programs with different
| functionality but with the same filenames.

Christoph


signature.asc
Description: PGP signature


Bug#1038937: nq package out of date with upstream, 0.5 was released more than a year ago

2024-05-03 Thread Christoph Biedl
Control: tags 1038937 pending

E Harris wrote...

> nq 0.5 was released March 26, 2022 and contains several bug fixes and 
> improvements.
> nq 0.3.1 was released March 7, 2018, and is what is in all of stable, 
> testing, and unstable.
> Please update this package.

Upon request by upstream and following the statements given in
<https://github.com/leahneukirchen/nq/issues/48#issuecomment-2091077937>,
also there's the LowNMU flag ... I'll upload 0.5-0.1 in the next days.
To improve quality and as it was a no-brainer, I'll also add an autopkgtest.

Christoph



signature.asc
Description: PGP signature


Bug#998627: linux: please enable the new NTFS3 driver in 5.15

2024-05-02 Thread Christoph Anton Mitterer
Hey.

Seems there were at least a series of commits from upstream last
November and few again this January.
And there even seem to be some more in their dev branch.


The number of CVEs mentioned by Salvatore is worrying, but it looks
even much worse over the years for ntfs-3g:
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ntfs-3g

Plus it seems ntfs-3g upstream is even less active than ntfs3's:
https://github.com/tuxera/ntfs-3g/
Last commit June 2023.


Of course this could also just mean that ntfs-3g is simply more mature
and less issues are found - dunno.
Security-wise the same, could mean that they've no ironed out all
issues, or simply no-one looks at it anymore.


What I did notice in this bug is that quite some people pushed for
enabling it, with email addresses that look in style similar to those
that where used in the XZ social engineering or like throw away
addresses.



Cheers,
Chris.



Bug#1070064: separate columns by 2 spaces in lists

2024-04-29 Thread Christoph Berg
Package: apt
Version: 2.9.2
Severity: wishlist

Hi,

I like the output to format lists of packages into ls-style tables
very much, thanks.

A suggestion: I would prefer if the columns were separated by 2 spaces
instead of just one, to make the spacing visually better. ls does that
as well, and my eyes are trained to reading that.

What makes it perhaps worse is that a lot of package names have - dashes
in them, which look a bit like (single) spaces on first glance. Using
double spaces would fix that problem as well.

Last instance of the problem here was this:

REMOVING:
  libhwy1 python3-editables

... which looked like libhwy1-python3-editables to me.

Thanks for considering,
Christoph



Bug#1069890: Resignation & call for votes to elect the Chair

2024-04-29 Thread Christoph Berg
Re: Sean Whitton
> ===BEGIN
> 
> A: Christoph Berg 
> B: Matthew Garrett 
> C: Helmut Grohne 
> D: Stefano Rivera 
> E: Timo Röhling 
> F: Craig Small 
> G: Matthew Vernon 
> H: Sean Whitton 
> 
> ===END

I vote

  H > ABCDEG > F

Christoph


signature.asc
Description: PGP signature


Bug#1069915: file: wrong Breaks/Replaces in libmagic-mgc

2024-04-28 Thread Christoph Biedl
Control: tags 1069915 pending

Steve Langasek wrote...

> The time_t transition automation scripts incorrectly changed the versioned
> Breaks/Replaces against old libmagic1 to point to libmagic1t64, which
> clearly never had a package version (<< 1:5.28-4~).

... and your fellow maintainer didn't notice either.

> The attached patch fixes this mistake, although since the version in
> oldoldstable is 1:5.35-4+deb10u2, perhaps you would prefer to drop the
> fields instead.

Indeed, this was needed in 2016, will remove it in the next upload.

Christoph


signature.asc
Description: PGP signature


Bug#1068849: cryptsetup: Fails to unlock the filesystem with missing libgcc_s.so.1

2024-04-26 Thread Christoph Anton Mitterer
On Sat, 2024-04-27 at 03:15 +0200, Guilhem Moulin wrote:
> Yup that'd make sense to me (and I see you did that already), thanks!

:-)

Unfortunately I doubt it will be possibly to do some fully generic
solution.

So best we'll get is probably either an unconditional inclusion or some
simpler copy_* function.


Thanks for your help with the hint on the 2.34 change... I had already
been at my wits end, why pthread didn't show up at ldd ^^

Best wishes,
Chris.



Bug#1069912: argon2 tool doesn't properly link against pthread

2024-04-26 Thread Christoph Anton Mitterer
Control: reassign -1 initramfs-tools
Control: severity -1 important
Control: retitle -1 copy_exec doesn't detect libgcc dependency anymore when 
pthread is used

Hey.


I think I found the root cause (thanks to Guilhem Moulin, who
pointed[0] me to it).

Apparently (which wasn't on my radar at all ^^), glibc since 2.34
dropped libpthread. So the whole check you do in hook-functions[2] will
probably never work anymore, which hit me with my argon2 (the tool not
the lib).

Now pthread apparently dlopen()s stuff from gcc, so in my case
pthread_exit fails.

Guilhem already remembered that you've been reluctant to
unconditionally include libgcc - which I can understand (I also want to
keep my initramfs as small as possible) - but this breaks stuff and
apart from ugly manual hacks I don't see an easy way around it.

Could you please either reconsider adding it unconditionally, or is
there some other way to find out whether a binary uses pthread stuff?

If not, would it be possible to provide at least some simpler to use
interface to copy_libgcc? Where e.g. I'd just say:
copy_libgcc /usr/bin/argon2 and it would automatically find the right
libdir for the right arch?

Thanks,
Chris.


[0] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068849#89
[1] https://lists.gnu.org/archive/html/info-gnu/2021-08/msg1.html
[2] 
https://salsa.debian.org/kernel-team/initramfs-tools/-/blob/cf964bfb4362019fd7fba1e839e403ff950dca8e/hook-functions#L248-L249



Bug#1068849: cryptsetup: Fails to unlock the filesystem with missing libgcc_s.so.1

2024-04-26 Thread Christoph Anton Mitterer
On Sat, 2024-04-27 at 01:48 +0200, Guilhem Moulin wrote:
> built using glibc ≥2.34.  AFAICT the “if the ldd output includes
> libpthread then run copy_libgcc()” logic from initramfs-tools is
> mostly moot
> now

Ah, I just realised glibc "merged" libpthread ^^

Therefore...

> but despite what I promised elbrus in
> https://bugs.debian.org/1032235#87 it
> looks like I didn't file a bug.

... I helped you fulfilling your promise and re-assigned my #1069912,
making it the bug that asks for some more generic solution :-)


Thanks,
Chris.



Bug#1068849: cryptsetup: Fails to unlock the filesystem with missing libgcc_s.so.1

2024-04-26 Thread Christoph Anton Mitterer
Hey Guilhem

On Sat, 2024-04-27 at 01:48 +0200, Guilhem Moulin wrote:
> Even it weren't, libpthread wouldn't show up since src:argon2 from
> bookworm
> and later is built using glibc ≥2.34.

When argon2 builds, it uses -pthread ... not really sure what that does
exactly, the manpage merely says it links against pthread, but
statically? Dynamically?

Anyway, when building it manually and even with -lpthread, it doesn't
show up - just as you say.

Tried now for an hour or so to make it show up (eventually gave up and
filed #1069912).

So you say it's a glibc thingy, that this doesn't show up anymore?


>   AFAICT the “if the ldd output includes
> libpthread then run copy_libgcc()” logic from initramfs-tools is
> mostly moot
> now, see https://bugs.debian.org/1032235#97 .

Shouldn't initramfstools then not simply generally include libgcc?



> We used the following workaround to manually call copy_libgcc()
> 
>    
> https://salsa.debian.org/cryptsetup-team/cryptsetup/-/commit/4cade1eae57abd93e0d6491eebce5f5f163ef186#a630d04e2df57150e6a092fc23f955c6ea0ce412
>    
> https://salsa.debian.org/cryptsetup-team/cryptsetup/-/commit/369cb651abad11a3844fa38ea86ece40f4f40078

As a workaround I've used now:
copy_libgcc /lib/x86_64-linux-gnu

with the libpath hardcoded... but I have no idea how I should get that
path properly.
As far as I can see from your commit, you simply used the path that
libargon2 was using?

But I don't have that since argon2 doesn't link against it ;-)
Any idea what would be the best solution in my case?


> for Bookworm, but removed it with 2:2.7.2-1 since src:cryptsetup no
> longer uses libargon.  There is no stability guaranty for transitive
> dependencies so I'd indeed argue the regression is not
> src:cryptsetup's
> fault :-)  Adapting the above workarounds to your custom hookfile
> should
> solve the issue, though.

Hmm yes, but I'm not sure if that would be a more proper solution than
mine (with the hardcoded path), cause:

In principle, my argon2 binary tool, might be from another arch as the
installed libargon2 (if it's installed at all, which isn't necessarily
the case).
So not sure, but maybe:

$ ldd /usr/bin/argon2
linux-vdso.so.1 (0x7ffcc67d4000)
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x7f1a1ee48000)
/lib64/ld-linux-x86-64.so.2 (0x7f1a1f058000)

I should use libc for determination?

> 



> > Did anyone of your report this issue anywhere else?
> 
> Some years ago I asked the initramfs-tools maintainers to
> inconditionally copy
> libgcc_s to the initramfs image, but IIRC Ben argued it was too
> seldom used to
> justify the cost in size and impemented the libpthread detection
> logic +
> copy_libgcc() instead.
> 
> I don't know if the detection logic can be improved/fixed in
> initramfs-tools,
> but despite what I promised elbrus in
> https://bugs.debian.org/1032235#87 it
> looks like I didn't file a bug.

So... I assume the change in glibc is proper then... and a fix (if at
all) would rather need to go to initramfs-tools?
Would you recommend me to reassign #1069912 to initramfs-tools, asking
for a more user-friendly solution?


Thanks,
Chris.



Bug#1069912: argon2: argon2 tool doesn't properly link against pthread

2024-04-26 Thread Christoph Anton Mitterer
Package: argon2
Version: 0~20190702+dfsg-4+b1
Severity: wishlist


Hey.

I stumbled over some odd issue, originally described here:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068849#84

In short:
I use the argon2 tool inside the initramfs, into which I copy it via
initramfs-tools’ copy_exec function (defined in
/usr/share/initramfs-tools/hook-functions).

Now that function uses ldd to find out whether a binary is linked
against libpthread and if so, also includes libgcc because of #950254
(in short: pthread seems to dlopen() libgcc).

Now argon2 somehow doesn't indicate it uses libpthread:
$ ldd /usr/bin/argon2
linux-vdso.so.1 (0x7ffedb996000)
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x7f90666bb000)
/lib64/ld-linux-x86-64.so.2 (0x7f90668cb000)

which I don't quite understand why.
Actually, even when building it manually, an explicitly -lpthread it never
shows up there.

No idea why... perhaps some linker optimisation that goes wrong?
I tried with -Wl,--no-as-needed, but that doesn't help either.
I can only force it to link if using
   gcc … -Wl,--no-as-needed /usr/lib/x86_64-linux-gnu/libpthread.so.0
i.e. the real path of the .so.


So in my case, pthread_exit() fails eventually (in the initramfs), with
an error that libgcc cannot be found.


Any ideas what to do?


Thanks,
Chris.


Bug#1068849: [pkg-cryptsetup-devel] Bug#1068849: cryptsetup: Fails to unlock the filesystem with missing libgcc_s.so.1

2024-04-26 Thread Christoph Anton Mitterer
Hey guys.

I kinda ran into a similar issue.

I use my own OpenPGP keyscript which is highly improved upon that
("decrypt_gnupg") shipped by the package.

One thing that I do is offer optionally feeding the entered passphrase
trough argon2 (the standalone tool from the package of the same name)
which I copy via copy_exec.

Now the problem is that argon2 is statically linked, so there's no
libpthread showing up in its ldd, and thus copy_exec doesn't realise it
needs to invoke copy_libgcc.


Did anyone of your report this issue anywhere else? I mean it's
obviously not crypsetup.
But I cannot really blame argon2 either, nor can I really blame update-
initramfs.


Cheers,
Chris.



Bug#1069692: nfs-ganesha: FTBFS on arm{el,hf}: /usr/include/features-time64.h:26:5: error: #error "_TIME_BITS=64 is allowed only with _FILE_OFFSET_BITS=64"

2024-04-23 Thread Christoph Martin

Hi Sebastian,

this is interesting. If you take a look into the commandline you see

-D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64

there is -D_FILE_OFFSET_BITS=64 even twice. ..

But the GPFS code has:


/* _FILE_OFFSET_BITS macro causes F_GETLK/SETLK/SETLKW to be defined to
 * F_GETLK64/SETLK64/SETLKW64. Currently GPFS kernel module doesn't work
 * with these 64 bit macro values through ganesha interface. Undefine it
 * here to use plain F_GETLK/SETLK/SETLKW values.
 */
#undef _FILE_OFFSET_BITS


I'll exclude the GPFS module for armel and armhf.

Regards
Christoph



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1069705: lilypond man-page has defective link on Debian

2024-04-23 Thread Christoph Brinkhaus
Source: lilypond
Version: 2.24.1-2
Severity: minor
X-Debbugs-Cc: bug-lilyp...@gnu.org

Dear Maintainer,

on https://manpages.debian.org/testing/lilypond/abc2ly.1.en.html is a
reference to the abc standard applicable for this software. The related
sentence is 

"abc2ly converts ABC music files (see
http://abcnotation.com/abc2mtex/abc.txt) to LilyPond input."

The correct link is "http://abcnotation.com/abc2mtex/abc.txt; which
leads the reader to a wiki page and a text file.

On Debian the link is "http://abcnotation.com/abc2mtex/abc.txt)". I felt
free to check the Arch man-page where the link is correct. Therefore I
guess that this little issue is related to Debian and not to LilyPond.
On Debian the link is incorrect for different languages and not just
English.

Using a browser it is almost no effort to remove the trailing ")" but a
correct link sould be better. Please fix the issue in one of the next
updates.

Thank you very much for taking care of the project,
Christoph Brinkhaus



Bug#1069183: [Aptitude-devel] Bug#1069183: aptitude: already running package installs/upgrade get interrupted because of lost dpkg lock

2024-04-22 Thread Christoph Anton Mitterer
Hey.

Just upgraded (via aptitude) to the most recent apt in sid on a number
of nodes (this time, all *without* any Icinga/Prometheus stuff)... and
on all nodes the locking issue showed up:

# aptitude
Performing actions...
Retrieving bug reports... Done
Parsing Found/Fixed information... Done
Reading changelogs... Done

(Reading database ... 94829 files and directories currently installed.)
Preparing to unpack .../libapt-pkg6.0t64_2.9.2_amd64.deb ...
Unpacking libapt-pkg6.0t64:amd64 (2.9.2) over (2.9.1) ...
Setting up libapt-pkg6.0t64:amd64 (2.9.2) ...
(Reading database ... 94829 files and directories currently installed.)
Preparing to unpack .../archives/apt_2.9.2_amd64.deb ...
Unpacking apt (2.9.2) over (2.9.1) ...
Setting up apt (2.9.2) ...
dpkg: error: dpkg frontend lock was locked by another process with pid
59222
Note: removing the lock file is always wrong, can damage the locked
area
and the entire system. See
.
Scanning processes... 
Scanning candidates...
Scanning processor microcode...   
Scanning linux images...  

Running kernel seems to be up-to-date.

The processor microcode seems to be up-to-date.

No services need to be restarted.

No containers need to be restarted.

User sessions running outdated binaries:
 root @ session #2: aptitude[57943], bash[1142]

No VM guests are running outdated hypervisor (qemu) binaries on this
host.
E: Sub-process /usr/bin/dpkg returned an error code (2)
Processing triggers for man-db (2.12.1-1) ...
Processing triggers for libc-bin (2.37-18) ...
Press Return to continue, 'q' followed by Return to quit.

Performing actions...
Retrieving bug reports... Done
Parsing Found/Fixed information... Done
Reading changelogs... Done
(Reading database ... 94829 files and directories currently installed.)
Preparing to unpack .../apt-utils_2.9.2_amd64.deb ...
Unpacking apt-utils (2.9.2) over (2.9.1) ...
Setting up apt-utils (2.9.2) ...
Processing triggers for man-db (2.12.1-1) ...
Scanning processes... 
Scanning candidates...
Scanning processor microcode...   
Scanning linux images...  

Running kernel seems to be up-to-date.

The processor microcode seems to be up-to-date.

No services need to be restarted.

No containers need to be restarted.

User sessions running outdated binaries:
 root @ session #2: aptitude[57943], bash[1142]

No VM guests are running outdated hypervisor (qemu) binaries on this
host.
Press Return to continue, 'q' followed by Return to quit.



So as David already said, it seems to be frontend lock related... but I
guess this indicates now that the process that gets in its way may
after all *not* be check_apt or the exporter for Prometheus.


Cheers,
Chris.



Bug#1064293: less: CVE-2022-48624

2024-04-20 Thread Christoph Anton Mitterer
On Sat, 2024-04-20 at 07:54 -0400, P. J. McDermott wrote:
> Then the salvage procedure can play out for the full 28+ days
> specified
> by developers-reference (21 days to allow the maintainer to object
> followed by a DELAYED/7 adoption upload).  I've already soft-proposed
> to
> salvage in bug #1069280 yesterday.  And as mentioned there I'm not
> yet a
> DD or DM, so I'd need to find a sponsor (and access to
> debian/less.git).

In the light of the recent XZ backdoor, wouldn't it generally be more
desirable to get more co-maintainers, rather than replacing an existing
one?


Cheers,
Chris.



Bug#1068024: revert to version that does not contain changes by bad actor

2024-04-19 Thread Christoph Anton Mitterer
Hey.


On Sun, 2024-03-31 at 01:46 +, Thorsten Glaser wrote:
> Yes, a multi-team task force is working on it and will inform users
> once it is known how to proceed, inclusing how much to throw away
> and rebuild.

Kindly wanted to ask whether anything has come out meanwhile of that?


I've tried to follow quite extensively what the various reverse
engineering efforts (e.g. [0], [1], [2], [3]) found out or what's
revealed on index pages like [4] or [5].

It feels as if there are still many discussions about how to prevent
such things in the future, but less so about the concrete fallout of
the particular backdoor, where it seems most people were lead to
conclude from media reports, that an attack was only possible if sshd
was actually running an reachable.

This may of course be true, which would mean that most people are
actually safe and we had quite some luck this time:
- servers, because they run stable distros that haven't had the
  backdoor
- workstations/laptops, because they typically don't run a publicly
  listending sshd

But there are still new findings about the backdoor every now and then,
like that it may read/write on IPC sockets (contained in [2]) and I've
read similar[6] without the restriction on IPC.
Also I've seen some vague statements[7] that it might "install" public
keys (didn't really grasp what was meant there - something like "in
authorized_keys"). And one report[8] talked about it collecting
usernames and IPs and passing the on to some function with unknown
purpose.

It also seems like these effort focus mostly on the 5.6.1 version and
while it's said that the 5.6.0 version is quite similar, who knows the
exact details!?


In any case and (too) long story short:

It would be nice to know whether there's still work done about finding
out whether people who had the malicious code on their systems (in any
version of the backdoor), but
- had sshd not running at all
and/or
- it was not reachable from the internet

can feel safe.

Or whether it may be possible that:
- the backdoor did call home (loaded commands from there, leaked
  private keys or so from the system)
- used completely different vectors not involving sshd
- or somehow else infested the system


Right now people might still have backups to torch their possibly
compromised systems and start over from a safe sate.


So Thorsten, in case you or someone else is aware of any [intermediate]
results from these task forces ([9[) it would be nice to hear about
them or better even in form of some "official" statement from Debian.


Thanks,
Chris.


[0] https://discord.gg/u6MzmQm5
[1] https://github.com/smx-smx/xzre
[2] 
https://github.com/binarly-io/binary-risk-intelligence/tree/master/xz-backdoor
[3] https://securelist.com/xz-backdoor-story-part-1/112354/
[4] https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
[5] https://github.com/przemoc/xz-backdoor-links
https://przemoc.github.io/xz-backdoor-links/  (rendering of that)
[6] 
https://discord.com/channels/1223666474091020432/1223666474972090430/1230974749522530304
[7] 
https://discord.com/channels/1223666474091020432/1223666474972090430/1230173131746840606
[8] https://isc.sans.edu/diary/30802
[9] E.g. on d-d https://lists.debian.org/debian-devel/2024/03/msg00338.html
Moritz Mühlenhoff has mentioned that some company was working on it
and results were expected in some time.



Bug#1069251: ca-certificates-java: keystore is not updated

2024-04-18 Thread Christoph Anton Mitterer
Package: ca-certificates-java
Version: 20230710~deb12u1
Severity: important


Hey.

Actually I think this should have a higher severity, since the
trusted certs may very well be quit security critical.

Nevertheless:
I just traced a bug for some hours, where it eventually turned out
that dpkg-reconfigure ca-certificates doesn't cause the changes to
be picked up by ca-certificates-java.


In the following I do the opposite (where it appens, too):
# dpkg-reconfigure ca-certificates
Updating certificates in /etc/ssl/certs...
rehash: warning: skipping ca-certificates.crt,it does not contain exactly one 
certificate or CRL
0 added, 140 removed; done.
Processing triggers for ca-certificates (20230311) ...
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
Processing triggers for ca-certificates-java (20230710~deb12u1) ...
done.

As you can see, I removed (actually all certs).

But looking at the actual JKS:
# keytool -list -v -keystore /etc/ssl/certs/java/cacerts 2>/dev/null | grep -i 
^Owner:

Owner: OU=AC RAIZ FNMT-RCM, O=FNMT-RCM, C=ES
...
Owner: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, 
OU=www.xrampsecurity.com, C=US

One sees they're still all in.


When I remove it:
# rm /etc/ssl/certs/java/cacerts

# dpkg-reconfigure ca-certificates-java
done.
# ls /etc/ssl/certs/java/cacerts
ls: cannot access '/etc/ssl/certs/java/cacerts': No such file or directory
# dpkg-reconfigure ca-certificates
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Processing triggers for ca-certificates (20230311) ...
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
Processing triggers for ca-certificates-java (20230710~deb12u1) ...
done.
# ls /etc/ssl/certs/java/cacerts
ls: cannot access '/etc/ssl/certs/java/cacerts': No such file or directory

It's not recreated.


Only if I configure new certs, it actually decides to recreate the JKS, too:
# dpkg-reconfigure ca-certificates
Updating certificates in /etc/ssl/certs...
rehash: warning: skipping ca-certificates.crt,it does not contain exactly one 
certificate or CRL
2 added, 0 removed; done.
Processing triggers for ca-certificates (20230311) ...
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
Processing triggers for ca-certificates-java (20230710~deb12u1) ...
Adding debian:USERTrust_ECC_Certification_Authority.pem
Adding debian:USERTrust_RSA_Certification_Authority.pem
done.
# keytool -list -v -keystore /etc/ssl/certs/java/cacerts 2>/dev/null | grep -i 
^Owner:

Owner: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, 
L=Jersey City, ST=New Jersey, C=US
Owner: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, 
L=Jersey City, ST=New Jersey, C=US

this time with the correct content.


If I now add yet another cert:
# dpkg-reconfigure ca-certificates
Updating certificates in /etc/ssl/certs...
rehash: warning: skipping ca-certificates.crt,it does not contain exactly one 
certificate or CRL
1 added, 0 removed; done.
Processing triggers for ca-certificates (20230311) ...
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
Processing triggers for ca-certificates-java (20230710~deb12u1) ...
done.
# keytool -list -v -keystore /etc/ssl/certs/java/cacerts 2>/dev/null | grep -i 
^Owner:

Owner: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, 
L=Jersey City, ST=New Jersey, C=US
Owner: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, 
L=Jersey City, ST=New Jersey, C=US


That is again not added to the JKS.


Cheers,
Chris.



Bug#1069183: [Aptitude-devel] Bug#1069183: aptitude: already running package installs/upgrade get interrupted because of lost dpkg lock

2024-04-17 Thread Christoph Anton Mitterer
Hey David.

Thanks for your elaborate mail

On Wed, 2024-04-17 at 21:55 +0200, David Kalnischkies wrote:
> > Unpacking util-linux-extra (2.38.1-5+deb12u1) over (2.38.1-5+b1)
> > ...
> > Setting up util-linux-extra (2.38.1-5+deb12u1) ...
> > dpkg: error: dpkg frontend lock was locked by another process with
> > pid 1064194
> > Note: removing the lock file is always wrong, can damage the locked
> > area
> > and the entire system. See
> > .
> > E: Sub-process /usr/bin/dpkg returned an error code (2)
> 
> I am assuming here that unpacking and setting up of util-linux-extra
> worked fine and that dpkg run ended. The dpkg run after that, which
> would probably have installed other things failed due to a lock being
> held by something else…

I'd have expected the same, with perhaps the difference that my blind
assumption was that *everything* is done in one dpkg run, and thus it
would hold the lock over everything.


> 
> > Scanning processes...
> > Scanning processor microcode...
> > Scanning linux images...
> > Running kernel seems to be up-to-date.
> > The processor microcode seems to be up-to-date.
> > No services need to be restarted.
> > No containers need to be restarted.
> > No user sessions are running outdated binaries.
> > No VM guests are running outdated hypervisor (qemu) binaries on
> > this host.
> 
> This output (that I trimmed slightly) is from needrestart

Sure that output was all clear (also apt's retry),.. I merely included
it to show that when starting over, it simply moves one with the next
packages.
That is, I also don't think that this issue ever left a single package
back in half-configured state or so.
Actually I cannot even remember that I'd have ever seen broken packages
because of this (e.g. because other deps were no longer fulfilled).



> > Unfortunately it doesn't tell the name of pid 1064194 and the
> > offending process
> > is typically always already gone by then.
> 
> (Maybe report that as a feature request for dpkg to show some info
>  about the pid instead of just the number, but that might be hard to
>  implement.)
You think so? I'd have thought if it already knows the PID, it could
just print the `comm` line of that?



> 
> > But in any case, shouldn't apitude/apt/dpkg just permantenly hold
> > the lock
> > once the process has started until it finishes?
> 
> That is how it is supposed to be, but I think aptitude was never
> changed
> to make full use of the frontend lock. Probably unrelated to this
> issue,
> but a quick grep on aptitude shows me:
> > $ git grep -A 2 -- '->ReleaseLock' src/generic/apt/aptcache.cc
> > :1006:  apt_cache_file->ReleaseLock();
> > -1007-  bool dpkg_selections_saved =
> > dpkg_selections.save_selections();
> > -1008-  if (! apt_cache_file->GainLock())
> which is the old pattern of releasing the lock and calling dpkg in
> the
> hopes that nothing grabs it in the meantime, which was the practice
> before dpkg gained the frontend lock (these are aptitudes own methods
> that wrap _system->Lock() from libapt that does acquire the frontend
> and the dpkg lock – and also releases both if told so).
> 
> The solution here should be to hold onto the frontend lock for the
> entire run and do the lock dance for compatibility with the
> dpkg
> lock only. _system->LockInner() is part of that and grep has no hits
> for it in aptitude.
> 
> So, my suspicion is that aptitude doesn't use the frontend lock and
> is
> hence prune to other front ends grabbing the dpkg (and front end)
> lock
> the moment it releases the dpkg lock for dpkg. Hence the two fails
> and
> the run of needrestart takes long enough for the other front end to
> finish so that the last dpkg call aptitude makes succeeds again.

Well that sounds like a probably cause then. Though I still don't know
*what* then steals the lock. I can only think of the Icinga/Prometheus
probes.
There should be nothing else on my systems that doesn't come out-of-the
box (like apt systemd.timers or so).


Thanks,
Chris.



Bug#994220: base-files: add /etc/local and /usr/local/libexec

2024-04-17 Thread Christoph Anton Mitterer
On Thu, 2024-04-18 at 00:34 +0200, Santiago Vila wrote:
> > 
> I think you might be overestimating the importance of this.

Well I haven't said it would be super important (not at least that the
dirs are created - what might be more important is, if e.g. owners are
changed, like when stuff was owned by staff (pun intended ;-) ).


> Regarding your idea of writing a script which "updates" all those
> minor things: Feel free to do so, but I don't think it belongs
> to base-files. In fact, there are a lot of things which differ
> between
> an upgraded system and a newly installed system, and the differences
> due to more or less empty directories in /usr/local are probably
> the least important of all of them.

I don't think that a tool from some nobody:nogroup on github would help
a lit here. At least I wouldn't trust such a thing ;-)




> I often had additional recipes to achieve exactly what you
> mention: that an upgraded system is as close as possible to a newly
> installed system.

I do basically the same, and even in the more recent stable releases,
the steps needed were actually quite a lot.

In general I think that it would be best that if people do upgrade,
they should get a system which is a close to fresh one as reasonable
possible.

And such things like changed owners/permissions or not cleaned up left
over dirs/files *may* actually become important at some point.

Take for example the :staff thing. IIRC, that's no longer done. So
people may have left over dirs still owned by :staff.

Maybe in 10 years from now, staff itself has become complete obsolete,
like e.g. the gnats was stopped from being created (but not removed,
obviously).
In 10 further years, someone might think that it's time that that UID
can be reused.

Which might be an issue for people who still have it because of only
ever having upgraded, and which never even realised that they might
need to clean up.


Cheers,
Chris.



Bug#994220: base-files: add /etc/local and /usr/local/libexec

2024-04-17 Thread Christoph Anton Mitterer
On Wed, 2024-04-17 at 23:43 +0200, Santiago Vila wrote:
> Yes. An empty $2 means that the package is installed for the
> very first time, i.e. installed by debootstrap.
> 
> This is actually explained in the last question here:
> 
> /usr/share/doc/base-files/FAQ

Isn't that quite unfortunate?

It leaves out any legacy installations (and many people never re-
install Debian, but just continuously upgrade it).


I mean I can fully understand if it's to fragile to automatically
update base-files (not just creating new dirs, but e.g. also changed
directories), but:
- Wouldn't it be possible to have a small tool that is manually run and
  which e.g. compare the current situation with what a pristine
  installation would get and that spits out some commands that would
  adapt this... or per default be like --dry-run and only with some
  extra param do everything?

- Or at least *if* something changes - which is anyway quite rate - it
  should IMO into NEWS.Debian and the release notes, so that people
  that upgrade can catch up.



Cheers,
Chris.



Bug#994220: base-files: add /etc/local and /usr/local/libexec

2024-04-17 Thread Christoph Anton Mitterer
Hey.

FYI: I have upgraded to 13.1, but still didn't get a
/usr/local/libexec.

Guess that's because $2 in the script is not empty?

Cheers,
Chris.



Bug#1069198: RFS: chr/0.1.78-1 [RC] -- terminal-based text editor

2024-04-17 Thread Christoph Hueffelmann

Package: sponsorship-requests
Severity: important
X-Debbugs-CC:textsh...@uchuujin.de

Dear mentors,

I am looking for a sponsor for my package "chr":

 * Package name : chr
   Version  : 0.1.78-1
   Upstream contact : Christoph Hueffelmann
 * URL  :https://github.com/istoph/editor
 * License  : BSL-1.0, Expat
 * Vcs  :https://salsa.debian.org/chr/chr
   Section  : editors

The source builds the following binary packages:

  chr - terminal-based text editor
  chr-tiny - terminal-based text editor - without syntax highlighting

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/chr/

Alternatively, you can download the package with 'dget' using this command:

  dget -xhttps://mentors.debian.net/debian/pool/main/c/chr/chr_0.1.78-1.dsc

Changes since the last upload:

 chr (0.1.78-1) unstable; urgency=medium
 .
   * New upstream version 0.1.78
   * remove: Hardcode build-depends on library pkg libqt5concurrent5, blocks
 time_64 transition
 (Closes: #1069055)

Regards,
--
  Christoph Hueffelmann


Bug#1069183: aptitude: already running package installs/upgrade get interrupted because of lost dpkg lock

2024-04-17 Thread Christoph Anton Mitterer
btw: There already is #586486 but to me it looked rather like a
different issue.



Bug#1069185: xserver-xorg-core: new upstream version (which has a nice fix)

2024-04-17 Thread Christoph Anton Mitterer
Package: xserver-xorg-core
Version: 2:21.1.12-1
Severity: wishlist


Hey.

Joking:
" Debin's xorg lacks critical security patches, I demand make me maintainer 
immediately "

Too soon for XZ jokes? O:-P


Seriously, there's a new upstream version out (21.1.13), which incorporates
not only the fix for a security issue (which you've already cherry picked
thanks for being so fast :-) ), but also the backported:
https://gitlab.freedesktop.org/xorg/xserver/-/commit/f54647dfa6e45481282c3650019449379059f113

That fixes a long standing and particula annoying (but in no way critical)
GTK 3 issue, where, when the mouse pointer is e.g. at the leftmost position,
it's not recognised as being there, and thus e.g. click and select
on a maximised terminal window fails.

This happens not always but often (so sometimes you select lines, it works
sometimes not).
It does not happen at all with e.g. xterm.

The above patch would fix that.


Since xorg releases happen very sporadically these days (only when there are
security holes?) I wanted to ask whether you might consider upgrading to
that version (despite no securiy issue being fixed by it, that's not already
fixed in Debian).

But... no hurry needed... that issue has been open for quite a while, so will
be able to live with it for a bit longer. :-)


Thanks,
Chris.



Bug#1069183: aptitude: already running package installs/upgrade get interrupted because of lost dpkg lock

2024-04-17 Thread Christoph Anton Mitterer
Package: aptitude
Version: 1.21.22
Severity: important


Hey.

May very well be an issue in APT or rather dpkg, still, since I always see it
from aptitude, I report it here. Please re-assign accordingly.


I'm seeing this since quite some releases and also every now and then in 
unstable
(though probably far less there, as I only run my workstation on unstable, but
all servers on stable).

When I concurrently upgrade my servers (~60) via aptitude, out of that number
arround 10 see the already running install/upgrade process suddenly interrupted
with message like:
Unpacking util-linux-extra (2.38.1-5+deb12u1) over (2.38.1-5+b1) ...
Setting up util-linux-extra (2.38.1-5+deb12u1) ...
dpkg: error: dpkg frontend lock was locked by another process with pid 1064194
Note: removing the lock file is always wrong, can damage the locked area
and the entire system. See .
dpkg: error: dpkg frontend lock was locked by another process with pid 1064194
Note: removing the lock file is always wrong, can damage the locked area
and the entire system. See .
Scanning processes...   
   
Scanning processor microcode... 
   
Scanning linux images...
   

Running kernel seems to be up-to-date.

The processor microcode seems to be up-to-date.

No services need to be restarted.

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.
E: Sub-process /usr/bin/dpkg returned an error code (2)
E: Sub-process dpkg --set-selections returned an error code (2)
E: Couldn't revert dpkg selection for approved remove/purge after an error was 
encountered!
Processing triggers for man-db (2.11.2-2) ...
Processing triggers for libc-bin (2.36-9+deb12u4) ...
Press Return to continue, 'q' followed by Return to quit.

Performing actions...
Retrieving bug reports... Done

(and then I continue in a new run).


Unfortunately it doesn't tell the name of pid 1064194 and the offending process
is typically always already gone by then.

Could be check_apt from Icinga or could be 
/usr/share/prometheus-node-exporter-collectors/apt_info.py
from prometheus-node-exporter-collectors .

But in any case, shouldn't apitude/apt/dpkg just permantenly hold the lock
once the process has started until it finishes?

Or could this be a case where something ignores and subsequently breaks the 
lock?


Thanks,
Chris.



Bug#1069176: debhelper: Issues in Debhelper documentation strings

2024-04-17 Thread Christoph Brinkhaus
Package: debhelper
Version: 13.15.3
Severity: minor

Dear Maintainer,
while updating the strings in the debhelper documentation the l10
documentation team noticed a few issues in the text which I report 
in the attached text file. Some issues are related to the presentation
of text in the final documents.  Others are simple typos. A few
sentences are unclear.

Just for reference: The update of the german translation has been
reported in a separate report as
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069112. The remarks
listed below appear in the po template as FIXME, too.

In case the documentation is updated I will be happy to update the
translation accordingly.

Thank you very much for maintaining this huge project,
Christoph Brinkhaus
1. Issue: s/source/B/
Explanation: The fix should correct the appearance to be bold.
Occurance: debhelper.pod:517
Current string:
"Note that debhelper does not provide debhelper-compat for experimental or "
"beta compatibility levels; packages experimenting with those compatibility "
"levels should put the compat level in the B field of the source "
"stanza of the F file (or, if only for selected commands, the "
"B environment variable)."

2. Issue: s/source/B/
Explanation: The fix should correct the appearance to be bold.
Occurance: debhelper-compat-upgrade-checklist.pod:271
Current string:
"The F file is no longer accepted as a source for specifying "
"the debhelper compat level. Put the compat level in the B field "
"of the source stanza of F."

3. Issue: s/autoconf/B/
Explanation: The fix should correct the appearance to be bold.
Occurance: debhelper-compat-upgrade-checklist.pod:827
Current string:
"Multiarch support. In particular, B passes multiarch "
"directories to autoconf in --libdir and --libexecdir."

4. Issue: s/autoconf/B/
Explanation: The fix should correct the appearance to be bold.
Occurance: debhelper-compat-upgrade-checklist.pod:844
Current string:
"B does not include the source package name in --"
"libexecdir when using autoconf."

5. Issue: s/that has/that have/
Explanation: The fix should correct singular/plural
Occurance: debhelper-compat-upgrade-checklist.pod:107
Current string:
"I<< This item only applies to source packages that has exactly one "
"B stanza in F. >>"

6. Issue: s/This change changes/This change/
Explanation: There should be one word as "change" only.
Occurance: debhelper-compat-upgrade-checklist.pod:198
Current string:
"Note: This change changes will cause false-positives from an unfixed "
"B. Please check L<https://bugs.debian.org/1067653> for B "
"support for this change."

7. Issue: would no longer installs → no longer installs
Explanation: Make the description more precise.
Occurance: debhelper-compat-upgrade-checklist.pod:504
Current string:
"The B tool would no longer installs the maintainer provided "
"F file as it was deemed unnecessary.  However, the B from dpkg/1.20 made the file relevant again and B "
"now installs it again in compat levels 12+."

8. Issue s/can emulate it/can get an emulation of it/ (or emulate it)
Explanation: I am not 100% sure, but it should make the description more 
precise.
Occurance: debhelper-compat-upgrade-checklist.pod:637
Current string:
"The B and B build systems no longer pass B<-I.> "
"to perl.  Packages that still need this behaviour can emulate it by using "
"the B environment variable.  E.g. by adding B "
"in their debian/rules file (or similar)."

9. Issue: First sentence does not make sense to me.
Explanation: If possible please re-phrase to make it clear.
Occurance: dh_strip:78
Current string:
"Debug symbols will be retained, but split into an independent file in F in the package build directory. B<--dbg-package> is easier to "
"use than this option, but this option is more flexible."


Bug#1069175: Mention "megacli" in Description

2024-04-17 Thread Christoph Berg
Package: megactl
Version: 0.4.4-1
Severity: wishlist

Hi,

when looking for megacli replacements in Debian, this package doesn't
show up. I think the description could mention it.

Description-en: LSI Megaraid Control and Monitoring Tools
 Reports diagnostics on megaraid and megaraid_sas adapters and
 attached disks. The adapters are also known as Dell PERC2, PERC3,
 PERC4 and PERC5.  Permits dumping of controller log pages for
 inspection of error, temperature, and self-test conditions, initiates
 self-test diagnostics, and documents adapter and logical drive
 configuration. Target devices may be adapters, (e.g. a0), enclosures
 (e.g. a0e0), or individual disks (e.g. a0e0s0). If no target is
 specified, reports configuration and drive state on all adapters.

Perhaps like this?

 Reports diagnostics on megaraid and megaraid_sas adapters and
 attached disks, similar to the original "megacli" tool. ...

Christoph



Bug#1067831: libaio: the t64 package slipped through and is in testing

2024-04-15 Thread Christoph Berg
Re: Raphael Hertzog
> There are (proprietary) software out there that link against it and we
> happen to ship some in Kali's non-free (oracle-instantclient-*).
> 
> https://pkg.kali.org/pkg/oracle-instantclient-basic
> https://pkg.kali.org/pkg/oracle-instantclient-devel
> 
> It would be nice if we could continue to keep compabitility with binaries
> compiled against upstream's SONAME.

Fwiw I've now stumbled over this for the same reason - the
Oracle-interfacing packages on apt.postgresql.org are now
uninstallable on Ubuntu 24.04 noble which has already picked up this
rename.

I tried to paper over the problem by making them depend on
"libaio1 | libaio1t64" but since the .so file was also renamed, this
doesn't work.

The installation instructions for Oracle on Linux have been "install
libaio1 and then run this giant installer" for the past few decades,
so this rename is going to confuse quite a few people if not reverted.

Christoph



Bug#1069037: less: new upstream version

2024-04-15 Thread Christoph Anton Mitterer
Package: less
Version: 590-2
Severity: wishlist

Hey.

Less 590 is quite outdated (from somewhere mid 2021)... would be
nice to have the current version. There's been quite some changes
meanwhile including improvements to follow mode.

Cheers,
Chris.



Bug#632868: base-files: derive PATH in /etc/profile from /etc/login.defs

2024-04-15 Thread Christoph Anton Mitterer
Hey.

I mostly forgot the details of this issue ^^

On Mon, 2024-04-15 at 13:08 +0200, Santiago Vila wrote:
> I'd like to be sure that things will not break horribly
> for somebody.

What I can say at least (which is of course not a definite answer) is,
that I personally run my systems since quite some years now without
touching PATH in any of .profile, .bashrc, /etc/profile,
/etc/bash.bashrc.


Some people want to add e.g. ~/bin to their PATH, but I think the
default profile didn't do that out of the box, or did it?

I personally found that (adding ~/bin/ anyway) rather unclean, as it
will get inherited by all programs started by my session, but what most
of the time I actually want is some additional commands or overrides
for just my interactive sessions.
So instead of ever adding ~/bin to the PATH, I do set up any executable
in there as an alias (which won't get exported to other shells).


Cheers,
Chris.



Bug#1064293: less: CVE-2022-48624

2024-04-12 Thread Christoph Anton Mitterer
Hey.

There seems to be a somewhat similar issue reported by Jakub Wilk on
oss-security:
https://www.openwall.com/lists/oss-security/2024/04/12/5

where quoting causes troubles (though I couldn't replay the demo).

Any chance to get both fixed in Debian unstable?


Cheers,
Chris.



Bug#1068825: apt: possible super minor security issue in apt-get source

2024-04-11 Thread Christoph Anton Mitterer
On Thu, 2024-04-11 at 22:12 +0200, Julian Andres Klode wrote:
> >   => First, I'm not sure whether this is the right behaviour, as
> > the
> >  "original/modified" file seems to get removed, but it - being
> > a
> >  local file - may actually be something of value to the user.
> >  So maybe it should just move the file to foo.FAILED and error
> >  with non-zero exit status?

and about that?


> I think I'm fine just exiting 1 if the directory already exists,
> after doing the download dance.

At least I'd suggest to also give a human readable error message or
warning.
Just a non-zero exit status will be fine for scripts, but will look
like an erroneous non-zero for humans.


Cheers,
Chris.



Bug#1068826: vobcopy: homepage seems dead

2024-04-11 Thread Christoph Anton Mitterer
Source: vobcopy
Version: 1.2.1-4
Severity: minor

Hey.

The site listed in the homepage field:
  Homepage: http://vobcopy.org
seems dead and links eventually to some (I guess) Turikish football website.

Should perhaps be removed and replaced with the github repo:
  https://github.com/barak/vobcopy
*if* that is the actual upstream (which I haven't checked).

Cheers,
Chris.



Bug#1068825: apt: possible super minor security issue in apt-get source

2024-04-11 Thread Christoph Anton Mitterer
Package: apt
Version: 2.7.14
Severity: normal
Tags: security


Hey.

I noted the following behaviour - which may or may not be regarded as
security relevant.
So this is rather a heads up, and in case you think it's fine as it is,
just close it.

I always remembered that apt-get source was ought to verify hashes of
the downloaded files (i.e. secure APT as signed by the repo).

Likewise, I thought to remember that at least at one point in time,
downloads of binary packages (via e.g. apt-get download or aptitude
download) were NOT verified.
Because of that I never trusted these which was quite unhandy.

So I though I'd simply test that (using a local package repo and simply
changing one byte of the files to download), and turns out that apt-get
download DOES also verify the binary packages and exit with non-zero
status of the don't match.
Nice.


So just to be sure I did the same with the source package files.
And here I noted some things:
- It does check freshly downloaded files and exit with non-zero in case
  their hashes mismatch.
- But it does so as well, with *already* downloaded files, and if they
  don't match it silently downloads (also verified) fresh files.
  => First, I'm not sure whether this is the right behaviour, as the
 "original/modified" file seems to get removed, but it - being a
 local file - may actually be something of value to the user.
 So maybe it should just move the file to foo.FAILED and error
 with non-zero exit status?


Then I made some particular tries:
a) On a previously (valid) downloaded source package I modified a byte
   in the local .dsc and modified a byte in the remote .orig.tar.xz.
   apt again notcies the valid local .orig.tar.xz and does nothing and
   notices the invalid local .dsc and re-downloads it (which succeeds
   as I haven't mangled the remote .dsc).

   In principle I'd say this is fine, and there's no direct security
   issue ... and probably not even an indirect one.
   What does however happen - due to the skipped download of the already
   present+valid files - is that the remote corruption of he .orig.tar.xz
   isn't notice.

   I'd say, not an issue, but nevertheless wanted to give a heads up.


b) What may now be the “super minor security issue” is the following:
   apt *does* check already downloaded files for validity and exits
   with zero if they match, right?

   So conceptuall one could have gone two ways:
   - anything local is already trusted because it was verified before
 or the user somehow manually brought it to the system and should
 know what he's doing
   - `apt-get source` acts also like a checker and if the exit status is
 one can assume that the files present are valid

   It seems to be the 2nd, given that it verifies the local files.

   It does however NOT again verify any already unpacked tree.

   So in some super obscure scenarios, a user could come to assume that
   exit status zero means that all the stuff is verified, while in fact
   only the non unpacked files are.

   Again of course, for an attack, there would need to be some way to
   introduce a modified unpacked tree, where one could say that if an
   attacker can do that, it's anyway already too late.

   But simply from that conceptual PoV, it seems to me as if that
   behaviour is unfortunate.

   I do however have no idea for a better behaviour.
   Checking would anyway mean that we need to unpack it - therefore
   wasting further resources.
   And the tree may differ simply because of user modifications, what
   then? Move the dir to xx.NON-PRISTINE?


HTH,
Chris.


Bug#1002458: "version in VCS newer than in repository" might be a bit overzealous

2024-04-11 Thread Christoph Berg
Control: reassign -1 qa.debian.org
Control: retitle -1 vcswatch: ignore changelog-only commits

Re: Holger Levsen
> > For starters, an early release could classify changelog-only commits as
> > "housekeeping".
> 
> *that*!
> 
> additionally you could also only classify d/changelog changing commits
> with "Gbp-Dch: ignore" in them as such, but I'd guess Marc's suggestion
> really is good enough.

I don't understand, if debian/changelog-only commits are already
ignored, what should vcswatch do additionally?

> Please reconsider, IOW, Myon: my I reassign this back to qa.debian.org
> for vcswatch?

Done.

Christoph



Bug#1068730: Fails to build from source since removal of liblz4-tool

2024-04-09 Thread Christoph Biedl
Source: systemd
Severity: serious
Tags: patch
X-Debbugs-Cc: debian.a...@manchmal.in-ulm.de

Greetings,

systemd build-depends on liblz4-tool but that package is no longer build
from src:lz4 (since 1.9.4-2, uploaded about a week ago). Just replacing
the dependency with lz4 seems to fix this problem (build passes, didn't
check further).

Cheers,

Christoph

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.6.23 (SMP w/8 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)



signature.asc
Description: PGP signature


Bug#1068722: aapt: symbol lookup error: libandroidfw.so.0: undefined symbol: _Z18ExtractEntryToFileP10ZipArchiveP8ZipEntryi

2024-04-09 Thread Hans-Christoph Steiner



Package: aapt
Version: 1:10.0.0+r36-10
Severity: important

Dear Maintainer,

When adb/fastboot is installed from bookworm-backports, those pull in 
android-libziparchive 1:33.0.3-2~bpo12+1, which does not have the symbols that 
bookworm's aapt needs to run:


$ aapt
aapt: symbol lookup error: /usr/lib/x86_64-linux-gnu/android/libandroidfw.so.0: 
undefined symbol: _Z18ExtractEntryToFileP10ZipArchiveP8ZipEntryi/


I guess the solution would be to also backport android-platform-frameworks-base?

-- System Information:
Debian Release: 12.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable'), (1, 'experimental'), (1, 'unstable')

Architecture: amd64 (x86_64)

Kernel: Linux 6.6.13+bpo-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages aapt depends on:
ii  android-libaapt1:10.0.0+r36-10
ii  android-libandroidfw   1:10.0.0+r36-10
ii  android-libbase1:33.0.3-2~bpo12+1
ii  android-liblog 1:33.0.3-2~bpo12+1
ii  android-libutils   1:33.0.3-2~bpo12+1
ii  android-libziparchive  1:33.0.3-2~bpo12+1
ii  libc6  2.36-9+deb12u4
ii  libexpat1  2.5.0-1
ii  libgcc-s1  13.1.0-9
ii  libpng16-161.6.39-2
ii  libprotobuf-lite32 3.21.12-3
ii  libstdc++6 13.1.0-9

aapt recommends no packages.

aapt suggests no packages.

-- no debconf information



Bug#1068674: Document pam_umask change in release notes

2024-04-09 Thread Christoph Anton Mitterer
Hey.

Also with respect to having this documented in the release note, you
may want to have a look at my comment:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065806#47

I.e. I think it might be usefull to not just indicate that/how people
may use "nousergroups" again, but also to refer to alternatives (like
setting a per-user default UMASK via GECOS) by referring to the
pam_umask(8) manpage.


Cheers,
Chris.



Bug#1065806: fixed in pam 1.5.3-7

2024-04-09 Thread Christoph Anton Mitterer
My I suggest one further improvement:

I think it would be nice if there was a sentence like:

"See the pam_umask(8) manpage for alternative means to change the
UMASK, for example per-user only."


I guess there are users that would actually want to keep the new
default, but have it e.g. overridden only for their own user (like on
single user systems).

For that, setting it via the GECOS field seems a good way?

Tough unfortunately, clear documentation seems missing on how to
actually do this[0].
It seems umask= must be set in the "other" field (= the 5th) of the
GECOS field, e.g. via chfn --other .


HTH,
Chris.


[0] I've filed https://github.com/linux-pam/linux-pam/pull/786 to
improve on that.
Assuming that will be merged, it's IMO enough to just refer to the
manpage, so that people even know that there are finer grained means.



Bug#1065806: fixed in pam 1.5.3-7

2024-04-09 Thread Christoph Anton Mitterer
Hey Sam.

There's a typ in the NEWS enty:
>this user a group name that differs from the user name or add
 |
  should probably be "use"


Also, I had to think twice what's meant by "pat" ;-)
> matches their primary user name (user pat's default group is also
>called pat), then files will be group writable by default. To disable

Perhaps placing the two "pat"s in quotes?

Cheers,
Chris.



Bug#1068569: RM: nfs-ganesha-ceph [armel armhf i386] -- NBS; ceph dropped 32 bit support

2024-04-08 Thread Christoph Martin

Hi Adam,

Am 08.04.24 um 19:15 schrieb Adam D. Barratt:

On Mon, 2024-04-08 at 11:42 +0200, Christoph Martin wrote:

Hi Sebastian,

the packages are already removed from testing and unstable.
Where do you see a problem?


I'm not Sebastian, but the archive disagrees with you about the
packages having been removed from unstable.

adsb@coccia:~$ dak ls -s unstable -a armel,armhf,i386 nfs-ganesha-ceph 
nfs-ganesha-rados-grace nfs-ganesha-rgw
nfs-ganesha-ceph| 4.3-5 | unstable   | armel, armhf, i386
nfs-ganesha-rados-grace | 4.3-5 | unstable   | armel, armhf, i386
nfs-ganesha-rgw | 4.3-5 | unstable   | armel, armhf, i386


Thanks for your reply. I only took a look at the current version in 
unstable and testing. And this is 4.3-8 with binaries for amd64 arm64 
mips64el ppc64el riscv64 s390x.


So the issue is, that the leftover binaries from version 4.3-5 are still 
in the archive.


Regards
Christoph


OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1068640: clevis-initramfs: clevis early boot DNS fail, no resolv.conf created by ipconfig

2024-04-08 Thread Christoph Biedl
anon2529 wrote...

> The early boot fails to unlock a volume automatically. We get a
> prompt to unlock a volume (it's a swap volume) but clevis is
> unable to unlock it automatically because it cannot resolve
> the Tang server's hostname.

That ought to be fixed in clevis 20 (not uploaded yet, will do in the
next days). If you have the skills and the time, you could try to
backport

https://github.com/latchset/clevis/commit/bebb037d664185769c12cd061c2221c2d2bdb432

    Christoph


signature.asc
Description: PGP signature


Bug#1068569: RM: nfs-ganesha-ceph [armel armhf i386] -- NBS; ceph dropped 32 bit support

2024-04-08 Thread Christoph Martin

Hi Sebastian,

the packages are already removed from testing and unstable.
Where do you see a problem?

Regards
Christoph

Am 07.04.24 um 13:21 schrieb Sebastian Ramacher:

Package: ftp.debian.org
Severity: normal
X-Debbugs-Cc: nfs-gane...@packages.debian.org, sramac...@debian.org
User: ftp.debian@packages.debian.org
Usertags: remove
Control: affects -1 + src:nfs-ganesha
Control: block 1065470 by -1
Control: clone -1 -2
Control: clone -1 -3
Control: retitle -2 RM: nfs-ganesha-grace [armel armhf i386] -- NBS; ceph 
dropped 32 bit support
Control: retitle -3 RM: nfs-ganesha-rgw [armel armhf i386] -- NBS; ceph dropped 
32 bit support

  nfs-ganesha (4.3-6) unstable; urgency=medium
  .
* only configure with ceph for some 64bit archs

So please remove the old nfs-ganesha-ceoph, nfs-ganesha-rados-grace, and
nfs-genesha-rgw binaries from armel, armhf and i386.



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1068373: RM: libzia/experimental -- ROM; Merged into tucnak

2024-04-04 Thread Christoph Berg
Package: ftp.debian.org
Severity: normal
X-Debbugs-Cc: lib...@packages.debian.org
Control: affects -1 + src:libzia
User: ftp.debian@packages.debian.org
Usertags: remove

Hi,

I had somehow assumed that #1064844 would result in the removal of
libzia from both unstable and experimental, but of course it only got
removed from unstable. So, here I am again:

Please remove libzia from experimental.

The library is now part of the tucnak source since it doesn't get
released (and used) independently.

Thanks,
Christoph



Bug#1064708: pygame: FTBFS: AssertionError: "No video mode" does not match "Parameter 'surface' is invalid"

2024-04-02 Thread Christoph Berg
Control: severity -1 serious

Re: Peter Michael Green
> > severity 1064708 important
> Can you explain why you downgraded this bug? it looks rc to me
> and is blocking the time_t transition.

I think I mistakenly downgraded it along with some other "t64 nmu diff" bugs.

Christoph



Bug#1067237: ngircd: missing ssl security patch in debian's ngircd package

2024-03-31 Thread Christoph Biedl
Control: tags 1067237 pending

jose wrote...

> The master branch of the upstream ngircd changelog informs about an 
> SSL security related patch [1] that is missing in the -26-1 ngircd debian
> package patches.

Thanks, this is on radar and I'm in contact with upstream on how to deal
with this.

Christoph


signature.asc
Description: PGP signature


Bug#1068139: miniflux: [L10N,DE] miniflux_2.1.1-1: german translation

2024-03-31 Thread Christoph Brinkhaus
Package: miniflux
Version: miniflux 2.1.2-1
Severity: wishlist
X-Debbugs-Cc: maytha8the...@gmail.com

Dear Maintainer,

please find attached the german translation of the miniflux_2.1.1-1 template.
Thank you for taking care of the package!

Kind regards,
Christoph Brinkhaus
# German translation of manpages
# This file is distributed under the same license as the miniflux package.
# Copyright © of this file:
# Christoph Brinkhaus , 2024.
#
msgid ""
msgstr ""
"Project-Id-Version: miniflux\n"
"Report-Msgid-Bugs-To: minif...@packages.debian.org\n"
"POT-Creation-Date: 2024-03-23 15:28+0800\n"
"PO-Revision-Date: 2024-03-29 16:30+0200\n"
"Last-Translator: Christoph Brinkhaus \n"
"Language-Team: German \n"
"Language: de\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"

#. Type: boolean
#. Description
#: ../templates:1001
msgid "Would you like to create an admin account?"
msgstr "Möchten Sie ein Administratorkonto einrichten?"

#. Type: boolean
#. Description
#: ../templates:1001
msgid ""
"By default, miniflux comes with no user accounts. You can choose to create "
"an administrator account for miniflux here, or do it manually afterwards "
"(see /usr/share/doc/miniflux/README.Debian)."
msgstr ""
"In der Voreinstellung hat miniflux keine Benutzerkonten. Sie können jetzt "
"ein Administratorkonto einrichten, oder Sie machen das später manuell "
"(siehe /usr/share/doc/miniflux/README.Debian)."

#. Type: string
#. Description
#: ../templates:2001
msgid "Username:"
msgstr "Benutzername:"

#. Type: string
#. Description
#: ../templates:2001
msgid "Username for the new admin account on miniflux."
msgstr "Benutzername für das neue Administratorkonto von miniflux."

#. Type: password
#. Description
#: ../templates:3001
msgid "Password:"
msgstr "Passwort:"

#. Type: password
#. Description
#: ../templates:3001
msgid "Password for the new admin account on miniflux."
msgstr "Passwort für das neue Administratorkonto von miniflux."


Bug#1068024: revert to version that does not contain changes by bad actor

2024-03-30 Thread Christoph Anton Mitterer
One more thing:


Is anyone on the Debian side trying to figure out how far we've been
practically affected?

I mean let's assume we're "lucky", and the backdoor is only in
5.6.0/5.6.1... and that none of the adversary's earlier commits
introduced any serious holes[0] which wouldn't be known yet.

Then many servers running Debian (which is then typically Debian
stable), would be sill safe.

However, many people (and I'd guess that includes DDs/DMs) run their
workstations/laptops with testing/unstable.
So IMO it's not enough to know that Debian stable is likely not
affected - I'd be rather relieved if I'd knew that there's a good
chance that the personal computers of most DDs/DMs (who push uploads,
etc. pp.) were (at least practically) safe.

Some guy decrypted[1] the strings from the maleware's binary payload:
https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01#file-hashes-txt-L115
where only /usr/sbin/sshd would be named.

Should(!) it turn out, that the actual binary payload actually only
affects sshd and especially does not on it's own pull in evil code, it
might at least be that all people who hadn't sshd running (or not
directly accessible because a router/firewall/etc. was in front of it),
would effectively still be safe.
No idea whether or not this is really the case - but if so, it might at
least mean that many workstations/laptops are safe, because they're not
usually directly accessible from the internet.


But even then, it would probably need to be checked whether all the
versions that Debian ever used/shipped in
testing/unstable(/experimental) were actually fully identical to the
versions that are now analysed by forensic folks.

Is the security team doing anything like that?


Cheers,
Chris.


PS: if someone from the security team reads along,
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
which is from Sam James of Gentoo, seems to collect good information on
what is known so far.
Might be worth to add to the links in the security tracker.


[0] There are reports about an added '.' in the CMakeLists.txt
disabling some sandboxing, but AFAICS at least the current version uses
autotools for building?!

[1] He also provided the code he used to do so.
https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01?permalink_comment_id=5006546#gistcomment-5006546



Bug#1068024: revert to version that does not contain changes by bad actor

2024-03-30 Thread Christoph Anton Mitterer
Hey.

Can we be confidently sure that going back to 5.4.5 is enough?

At least the git tag for that seems to be still signed by the
adversary:
https://git.tukaani.org/?p=xz.git;a=tag;h=9e4835399118b98954f110f76af2a0d504d2f531

The last one, still from Lasse Collin seems to be 5.4.1:
https://git.tukaani.org/?p=xz.git;a=tag;h=f52502e78bf84f516a739e8d8a1357f27eeea75f


Cheers,
Chris.



Bug#1067838: Please provide a trivial working example

2024-03-27 Thread Christoph Biedl
Package: libresolv-wrapper
Version: 1.1.8-2+b1
Severity: normal
Tags: upstream
X-Debbugs-Cc: debian.a...@manchmal.in-ulm.de

Greetings,

while looking for a way to overload hostname resolution as non-root
(part of a test suite and/or autopkgtest), I came across your package.
However, *nothing* works, not even in the stable releases.

Assuming this is rather a "you're holding it wrong" than a grave bug in
libresolv-wrapper, I guess usage is not as easy as it seems. So can
you please provide an as-simple-as-possible example, in the tradition
of "Hello, world"?

It could be like

echo "A server1.example.com 192.0.2.1" >/tmp/hosts
LD_PRELOAD=libresolv_wrapper.so \
RESOLV_WRAPPER_HOSTS=/tmp/hosts \
$MAGIC

where the output signalizes the hostname server1.example.com was indeed
resolved into the given IP address.

These are the things I've tried without success:

* getent hosts server1.example.com
* host server1.example.com
* wget -O /dev/null http://server1.example.com/
* the actual application, using a gnutls linkage

According to strace, libresolv_wrapper.so is loaded but there is no
access to the mocked hosts file.

According to ltrace, none of the RESOLV_WRAPPER_* variables are checked
via getenv.

Not a big surpise then: Setting RESOLV_WRAPPER_DEBUGLEVEL had no effect
either.

Using <https://github.com/figiel/hosts>, the above checks work except
for the second one. However, this project is not in Debian.

Christoph

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.6.22 (SMP w/8 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libresolv-wrapper depends on:
ii  libc6  2.37-15.1

libresolv-wrapper recommends no packages.

libresolv-wrapper suggests no packages.

-- no debconf information



signature.asc
Description: PGP signature


Bug#1067457: jose: CVE-2023-50967

2024-03-21 Thread Christoph Biedl
Control: forwarded 1067457 https://github.com/latchset/jose/issues/151


signature.asc
Description: PGP signature


Bug#1066067: cl-plus-ssl: hardcoded libssl3 dependency

2024-03-21 Thread Christoph Berg
Re: Sebastian Ramacher
> Source: cl-plus-ssl
> Version: 20220328.git8b91648-4
> Severity: serious
> X-Debbugs-Cc: sramac...@debian.org
> 
> cl-plus-ssl hardcodeds a dependency on libssl3. Due to the time_t
> transition, the package name changed and the dependency needs to be
> updated.

It actually doesn't hard-code the dependency but correctly extracts it
from libssl-dev. But since we don't have arch:all binnmus, a new
upload was needed anyway. Just did that.

Once cl-plus-ssl is installed, please binnmu pgloader to have it pick
up the changed dependency.

Christoph



Bug#980150: RFA: cyrus-imspd -- Internet Message Support Protocol daemon

2024-03-21 Thread Christoph Berg
Control: reassign -1 ftp.debian.org
Control: retitle -1 RM: cyrus-imspd -- RoM; FTBFS and probably full of CVEs

> I request an adopter for the cyrus-imspd package as I am not using it
> myself.
> 
> The package description is:
>  This package contains the cyrus-imspd daemon for the Internet Message Support
>  Protocol (imsp), providing central storage for addressbooks and application
>  config.

This didn't have any takers in 3 years, and the package is now
FTBFSing (#1066480) with C code so ancient it's a PITA to fix, so
let's get it removed.

Christoph



Bug#1067144: [3dprinter-general] Bug#1067144: uranium: missing depend on python3-all for autopkgtest

2024-03-21 Thread Christoph Berg
Re: Gregor Riepl
> I pushed a simple patch to add the dependency, would be nice if you could
> release it, @myon? Thanks in advance.

On its way, thanks for the update!

Christoph



Bug#1064697: flask-babelex: FTBFS: ImportError: cannot import name '_request_ctx_stack' from 'flask' (/usr/lib/python3/dist-packages/flask/__init__.py)

2024-03-21 Thread Christoph Berg
Control: clone -1 -2
Control: reassign -2 ftp.debian.org
Control: retitle -2 RM: flask-babelex -- obsolete

Re: Colin Watson
> Should we just remove this package from Debian?  I'm CCing everyone
> who's uploaded it in the past just in case, but I suspect this is an
> easy decision.

Yeah, let's just do that. Thanks for looking into the details!

Christoph



Bug#1066980: Please include "notify-send" in package description

2024-03-16 Thread Christoph Berg
Package: libnotify-bin
Version: 0.8.3-1
Severity: wishlist

This package solely ships "notify-send", but doesn't mention it in the
package description, so "apt-cache search notify send" doesn't find
it.

Please consider mentioning it, perhaps like this:

Description-en: sends desktop notifications to a notification daemon (Utilities)
 A library that sends desktop notifications to a notification daemon, as
 defined in the Desktop Notifications spec. These notifications can be
 used to inform the user about an event or display some form of
 information without getting in the user's way.
 .
 This package contains the notify-send command line utility.

Thanks,
Christoph



Bug#1066850: don't hard-code the name of the shared library

2024-03-15 Thread Christoph Biedl
Control: tags 1066850 -moreinfo +pending

Matthias Klose wrote...

> On 14.03.24 21:38, Christoph Biedl wrote:

> > Do you have an idea, an existing solution how to do that?

> dep := $(shell dpkg-query '-f${Depends}' -W libmagic-dev | sed
> 's/.*\(libmagic[a-z0-9]*\).*/\1/')
> echo "magic:Depends=$(dep)" >> debian/python3-magic.substvars
> 
> and add ${magic:Depends} to the control file.

Thanks, this is usable information.

Christoph


signature.asc
Description: PGP signature


Bug#1066850: don't hard-code the name of the shared library

2024-03-14 Thread Christoph Biedl
After getting some help in IRC, I guess the problem boils down to:

1. All architectures provide the t64 variant (libmagic1t64).
2. Some architectures no longer provide the old variant (libmagic1), for
   example armhf.
3. Therefore, the install dependency of python3-magic must be the t64 variant.

> and derive the name of the shared library package from the
> libmagic-dev package.

Now replacing one hardcoded binary library dependency with a different
one is not quite the brightest move as this will introduce work should
the libmagic ABI ever change (hasn't happened in 20 years but still).
So it was nicer to do this dynamically during build. That step however
is optional.

Do you have an idea, an existing solution how to do that?

So far I found two ways, and dislike both:

* Derive from apt-cache:

override_dh_gencontrol:
perl -MDebian::Debhelper::Dh_Lib -e \
'addsubstvar ("python3-magic", "misc:Depends", $$ARGV[0])' \
"$$(apt-cache show libmagic-dev | awk '($$1=="Depends:"){print 
$$2}' | head -n 1)"
dh_gencontrol $@

Querying the apt database from inside a package build feels like a layer
violation.

* Abuse dpkg-shlibdeps:

override_dh_gencontrol:
dpkg-shlibdeps -e /usr/bin/file -Tdebian/python3-magic.substvars
dh_gencontrol $@

(Some tweaks to debian/control needed as well.)

This also introduces an install dependency on libc6, and my gut feeling
tells me this was the point to make python3-magic arch:any.

So, is all this worth the efforts? FWIW, I maintain the libmagic
package as well, so being lazy now will just hurt me later.

Christoph


signature.asc
Description: PGP signature


Bug#1066850: don't hard-code the name of the shared library

2024-03-14 Thread Christoph Biedl
Control: tags 1066850 moreinfo

Matthias Klose wrote...

> Package: src:python-magic
> Version: 2:0.4.27-2
> Severity: serious
> Tags: sid trixie
>
> the package build-depends on libmagic1, and depends on it. The name was
> recently changed to libmagic1t64.

This is not a real problem as libmagic1t64 provides libmagic1, so the
dependency can still be resolved.

> Please don't hard-code it, but try to b-d
> on libmagic-dev, (...)

About the build dependency src:python-magic -> libmagic1:

So that is ugly, and using libmagic-dev is a simple fix for it. Will do
in the next uplad.

> and derive the name of the shared library package from the
> libmagic-dev package.

Are you still talking about the build dependency here? Then it's no
issue as the -dev dependency will take care of that.


Question: What is the justifcation for the bug severity? To me, it
is rather "minor".

Christoph


signature.asc
Description: PGP signature


Bug#1036559: (no subject)

2024-03-13 Thread Hans-Christoph Steiner

control: fixed 1036559 3.4.0~a1-7



Bug#1066134: FTBFS due -Werror=implicit-function-declaration

2024-03-13 Thread Christoph Biedl
Control: merge 1066134 1065940

Ups, that had already been reported.


signature.asc
Description: PGP signature


Bug#1066134: FTBFS due -Werror=implicit-function-declaration

2024-03-13 Thread Christoph Biedl
Christoph Biedl wrote...

> So, assuming this is the cause here, the fix is pretty simple:
(...)
> +#ifdef INET6
>  if (if6_is_up)
> sif6down(0);
> +#endif

This was silently done as part of

commit 80b8744eb42c7493794f3e3fe0bf1ce14f53e6dd
Author: Eivind Næss 
Date:   Fri Aug 6 09:14:02 2021 -0700

Changing INET6 to PPP_WITH_IPV6CP and adding configure option

http://git.ozlabs.org/?p=ppp.git;a=blobdiff;f=pppd/sys-linux.c;h=94e5a19ed4c67cc44f97b2257c3b0d57b4ed15a0;hp=0ffc4277b2aa4b661fae8faac27ca450596f6599;hb=80b8744;hpb=a6622771e2dc03a2682c86c4bcf6bf6ae9e85df7

Christoph



signature.asc
Description: PGP signature


Bug#1066134: FTBFS due -Werror=implicit-function-declaration

2024-03-12 Thread Christoph Biedl
Source: ppp
Version: 2.4.9-1+1.1
Severity: serious
Tags: patch upstream ftbfs
Justification: fails to build from source (but built successfully in the past)
X-Debbugs-Cc: debian.a...@manchmal.in-ulm.de

Hi Chris,

ppp no longer builds in unstable here, tested in a minimal chroot. A
build in a testing chroot passes.

sys-linux.c: In function ‘sys_cleanup’:
sys-linux.c:357:9: error: implicit declaration of function ‘sif6down’; did 
you mean ‘sifdown’? [-Werror=implicit-function-declaration]
  357 | sif6down(0);
  | ^~~~
  | sifdown

Comparing the build logs, this is obviously caused by adding
-Werror=implicit-function-declaration to the default build options.

But looking closer, it seems sif6down is declared only of INET6 is
defined, and while all other *6 invocations are guarded accordingly in
sys-linux.c, this one is not. I'm a little disturbed why the code can
even be linked then.

So, assuming this is the cause here, the fix is pretty simple:

--- a/pppd/sys-linux.c
+++ b/pppd/sys-linux.c
@@ -353,8 +353,10 @@
if_is_up = 0;
sifdown(0);
 }
+#ifdef INET6
 if (if6_is_up)
sif6down(0);
+#endif

 /*
  * Delete any routes through the device.

This matches what sys-solaris.c does. Also, pppd 2.5.0 in
experimental seems to do something like this (PPP_WITH_IPV6CP).
The build now passes, I haven't checked further.

All the best,

Christoph

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)



signature.asc
Description: PGP signature


Bug#1000061: cfengine3: depends on obsolete pcre3 library

2024-03-12 Thread Christoph Martin

version 3.24.0 is not released yet but expected for mid 2024.

Am 18.12.23 um 15:14 schrieb Bastian Germann:

On Fri, 18 Aug 2023 12:01:17 +0200 Bastian Germann  wrote:

cfengine3 is a key package and requires pcre, so this has to be fixed.


Upstream claims that this is fixed with 3.24.0.



OpenPGP_signature.asc
Description: OpenPGP digital signature


Bug#1065435: aptitude: FTBFS on armhf and armel (probably -Werror=implicit-function-declaration related)

2024-03-11 Thread Christoph Biedl
Axel Beckert wrote...

> Citing from https://buildd.debian.org/status/package.php?p=aptitude:
(...)
> /usr/include/cppunit/TestAssert.h:161:6: note:   template argument 
> deduction/substitution failed:
> ../../tests/test_misc.cc:187:5: note:   deduced conflicting types for 
> parameter ‘const T’ (‘long int’ and ‘__suseconds64_t’ {aka ‘long long int’})
>   187 | CPPUNIT_ASSERT_EQUAL(static_cast(99), c.tv_usec);
>   | ^
> make[3]: *** [Makefile:869: test_misc.o] Error 1
(...)

This happens on armel, armhf, powerpc, and hppa. Guess which
architectures I'm using ... also, aptitude is configured as b-d resolver
here for a reason but the last, pre-t64 version is no longer
installable. So I'm somewhat stuck.

Therefore, any progress on this? Do you need help? I didn't get very far
at a first glance, aptitude's build dependencies are currently
uninstallable, at least in arm{el,hf}.

Christoph


signature.asc
Description: PGP signature


Bug#1066034: tech-ctte: proposed constitution fix and social contract chg to make documentation accessible to all people

2024-03-11 Thread Christoph Berg
Re: debbug.tech-c...@sideload.33mail.com
> # The DSC needs to become meaningful
> 
> Chuck Zmudzinski filed a bug report saying that the Debian Social
> Contract (DSC) is “meaningless”:

Hi,

I don't think the tech-ctte is the right body to address this.

Also, please file request using a name, we'd want to know who we
are talking to.

Christoph



Bug#1065810: tech-ctte: Call for votes on TC membership of Craig Small

2024-03-11 Thread Christoph Berg
> ===BEGIN
> The Technical Committee recommends that Craig Small  be
> appointed by the Debian Project Leader to the Technical Committee.
> 
> C: Recommend to Appoint Craig Small 
> F: Further Discussion
> ===END

I vote

  C > F

Christoph


signature.asc
Description: PGP signature


Bug#748880: closed by Steven Robbins (Re: ghostscript-doc: "Raw 'bit' devices" section missing in Devices.htm)

2024-03-10 Thread Christoph Biedl
> I'm not qualified to write the upstream documentation.  Suggest you open a 
> bug 
> in the upstream bugzilla: https://bugs.ghostscript.com/

This is one of the tasks of a package maintainer:

| If it's an upstream problem, you have to forward it to the upstream
| author.
[
"Bug housekeeping"
https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html
]

... and I'm very glad about that rule because it leaves the job to those
who are acquainted with upstream, their bugtracker, unwritten social
rules and so on.

Christoph


signature.asc
Description: PGP signature


Bug#1065870: Please add a hint to patch-not-forwarded-upstream

2024-03-10 Thread Christoph Biedl
Package: lintian
Version: 2.117.0
Severity: wishlist
Tags: patch
X-Debbugs-Cc: debian.a...@manchmal.in-ulm.de

Dear maintainer,

a few times too often I got annoyed by a "patch-not-forwarded-upstream"
warning from lintian where that wasn't actually sensible. Looking into
the lintian sources, then again into DEP-3, I realized lintian parses
the Origin: information, and people like previous-me could benefit if
lintian was a bit more clear about this.

So, I'm suggesting to enhance the Description with something like

If the patch was actually taken from upstream, prefix the Origin:
information with "upstream" or "backport", as documented in DEP-3

Kind regards,

Christoph


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Versions of packages lintian depends on:
ii  binutils2.42-3
ii  bzip2   1.0.8-5+b2
ii  diffstat1.66-1
ii  dpkg1.22.5
ii  dpkg-dev1.22.5
ii  file1:5.45-3
ii  gettext 0.21-14+b1
ii  gpg 2.2.40-1.1+b1
ii  intltool-debian 0.35.0+20060710.6
ii  iso-codes   4.16.0-1
ii  libapt-pkg-perl 0.1.40+b5
ii  libarchive-zip-perl 1.68-1
ii  libberkeleydb-perl  0.64-2+b3
ii  libcapture-tiny-perl0.48-2
ii  libclass-xsaccessor-perl1.19-4+b3
ii  libclone-perl   0.46-1+b2
ii  libconfig-tiny-perl 2.30-1
ii  libconst-fast-perl  0.014-2
ii  libcpanel-json-xs-perl  4.37-1+b2
ii  libdata-dpath-perl  0.59-1
ii  libdata-validate-domain-perl0.10-1.1
ii  libdata-validate-uri-perl   0.07-3
ii  libdevel-size-perl  0.83-2+b3
pn  libdigest-sha-perl  
ii  libdpkg-perl1.22.5
ii  libemail-address-xs-perl1.05-1+b3
ii  libfile-basedir-perl0.09-2
ii  libfile-find-rule-perl  0.34-3
ii  libfont-ttf-perl1.06-2
ii  libhtml-html5-entities-perl 0.004-3
ii  libhtml-tokeparser-simple-perl  3.16-4
ii  libio-interactive-perl  1.025-1
ii  libipc-run3-perl0.049-1
ii  libjson-maybexs-perl1.004005-1
ii  liblist-compare-perl0.55-2
ii  liblist-someutils-perl  0.59-1
ii  liblist-utilsby-perl0.12-2
ii  libmldbm-perl   2.05-4
ii  libmoo-perl 2.005005-1
ii  libmoox-aliases-perl0.001006-2
ii  libnamespace-clean-perl 0.27-2
ii  libpath-tiny-perl   0.144-1
ii  libperlio-gzip-perl 0.20-1+b3
ii  libperlio-utf8-strict-perl  0.010-1+b2
ii  libproc-processtable-perl   0.636-1+b2
ii  libregexp-wildcards-perl1.05-3
ii  libsereal-decoder-perl  5.004+ds-1+b2
ii  libsereal-encoder-perl  5.004+ds-1+b2
ii  libsort-versions-perl   1.62-3
ii  libsyntax-keyword-try-perl  0.29-2
ii  libterm-readkey-perl2.38-2+b3
ii  libtext-levenshteinxs-perl  0.03-5+b3
ii  libtext-markdown-discount-perl  0.16-1+b2
ii  libtext-xslate-perl 3.5.9-2
ii  libtime-duration-perl   1.21-2
ii  libtime-moment-perl 0.44-2+b3
ii  libtimedate-perl2.3300-2
ii  libunicode-utf8-perl0.62-2+b2
ii  liburi-perl 5.27-1
ii  libwww-mechanize-perl   2.18-1
ii  libwww-perl 6.76-1
ii  libxml-libxml-perl  2.0207+dfsg+really+2.0134-1+b3
ii  libyaml-libyaml-perl0.89+ds-1+b1
ii  lzip [lzip-decompressor]1.24.1-1
ii  lzop1.04-2
ii  man-db  2.12.0-3
ii  patchutils  0.4.2-1
ii  perl [libencode-perl]   5.38.2-3.2
ii  t1utils 1.41-4
ii  unzip   6.0-28
ii  xz-utils5.6.0-0.2

lintian recommends no packages.

Versions of packages lintian suggests:
pn  binutils-multiarch 
ii  libtext-template-perl  1.61-1

-- no debconf information



signature.asc
Description: PGP signature


Bug#1065806: pam: recent upgrade changes previous default umask

2024-03-09 Thread Christoph Anton Mitterer
Source: pam
Version: 1.5.3-6
Severity: normal

Hey.

Somwhere in between 1.5.2-9.1+b1 and 1.5.3-6 the default umask for non-root
users has changed from 0022 to 0002.
Interestingly, root doesn't seem to be affected.

Intially I suspected b01196659c785b04abc387d324fae61e2ec3b1aa, but at least
when re-commenting the:
> session optional  pam_umask.so
in both files again, it still stays at 0002.

I don't so much mind the change itself, but shouldn't such a big change
go at least into NEWS.Debian and probably also he release notes?

Cheers,
CHris.


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.7.7-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_DE.UTF-8, LC_CTYPE=en_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)



Bug#1065801: [pkg-cryptsetup-devel] Bug#1065801: cryptsetup: Crypttab man pages does not list option _netdev which is required for Network based unlocking via Tang

2024-03-09 Thread Christoph Anton Mitterer
On Sat, 2024-03-09 at 16:06 -0600, bigops wrote:
> The crypttab which is part of the cryptsetup package in its man page
> does not include the option _netdev.  _netdev is required for
> unlocking Luks volumes via Clevis/Tang.
> 
> Confirmed that the block device is not unlocked without this option
> in the crypttab even though it is not documented. The manpages in
> freedesktop.org has this option (_netdev)
> documented
> (https://www.freedesktop.org/software/systemd/man/latest/crypttab.htm
> l)

That's because it's from systemd's crypttab, which is a latter
development that is in incompatible but uses the same filename.

crypttab(5) manpage already contains a reference on that:
> ON DIFFERENT CRYPTTAB FORMATS
>Please note that there are several independent cryptsetup wrappers with
>their own crypttab format. This manpage covers Debian's implementation
>for initramfs scripts and SysVinit init scripts. systemd brings its own
>crypttab implementation. We try to cover the differences between the
>systemd and our implementation in this manpage, but if in doubt, better
>check the systemd crypttab(5) manpage, e.g. online at
>https://www.freedesktop.org/software/systemd/man/crypttab.html.


Cheers,
Chris.



Bug#1065101: ngircd: Depends on libident, which is NBS

2024-03-09 Thread Christoph Biedl
Control: tags 1065101 pending

Boyuan Yang wrote...

> Package ngircd depends on binary package libident, but this package has
> been renamed to libident0 due to time64 transition. Please fix the binary
> dependency relationship accordingly. You may need to rebuild the package.

The fix for #1065703 needs to reach unstable first.

Christoph


signature.asc
Description: PGP signature


Bug#1065703: t64 transition broke build of other packages

2024-03-09 Thread Christoph Biedl
Source: libident
Severity: serious
Tags: patch
Version: 0.32-2
X-Debbugs-Cc: by...@debian.org, efing...@packages.debian.org, 
vor...@debian.org, debian.a...@manchmal.in-ulm.de

Control: block 1065100 by -1
Control: block 1065101 by -1

For libident, the t64 transition was done in a slightly different way:
Instead of appending t64, the library package was renamed from libident
to libident0.

While technically being a library transition, the usual steps were
obviously not done, especially: Rebuilding the reverse build
dependencies to check for possible problems. Instead some bugs were
filed against those packages, severity serious. This is at least about:

efingerd: #1065100 (maintainer Cc'ed)
ngircd: #1065101 (maintained by yours truly)

If those test rebuilds had been done, the following error could not have
been overseen (for efingerd, likewise ngircd):

(...)
   dh_makeshlibs
   dh_shlibdeps
dpkg-shlibdeps: error: no dependency information found for 
/lib/x86_64-linux-gnu/libident.so.0 (used by debian/efingerd/usr/sbin/efingerd)
Hint: check if the library actually comes from a package.
dh_shlibdeps: error: dpkg-shlibdeps -Tdebian/efingerd.substvars 
debian/efingerd/usr/sbin/efingerd returned exit code 25
dh_shlibdeps: error: Aborting due to earlier error

After spending some hours in the related tooling to understand the root
cause without avail, I suggest to modernize src:libident by replacing
.shlibs with .symbols. If solves the problem for me, and it's how things
should be done anyway.

Aside, the change also triggers an "unused-override" from lintian.

    Christoph
diff --git a/debian/libident0.shlibs b/debian/libident0.shlibs
deleted file mode 100644
index f0da07c..000
--- a/debian/libident0.shlibs
+++ /dev/null
@@ -1 +0,0 @@
-libident0 0 libident0 (>= 0.32)
diff --git a/debian/libident0.symbols b/debian/libident0.symbols
new file mode 100644
index 000..550c842
--- /dev/null
+++ b/debian/libident0.symbols
@@ -0,0 +1,15 @@
+libident.so.0 libident0 #MINVER#
+* Build-Depends-Package: libident-dev
+ id_close@Base 0.32
+ id_open@Base 0.32
+ id_open_addr@Base 0.32
+ id_parse@Base 0.32
+ id_query@Base 0.32
+ id_strdup@Base 0.32
+ id_strtok@Base 0.32
+ id_version@Base 0.32
+ ident_free@Base 0.32
+ ident_id@Base 0.32
+ ident_lookup@Base 0.32
+ ident_query@Base 0.32
+ ident_query_addr@Base 0.32


signature.asc
Description: PGP signature


Bug#1032623: marked as done (vcswatch: should not raise error on repos > 1GiB in size)

2024-03-07 Thread Christoph Berg
> It looks like this broke for remotes that do not support filtering
> (yet?). The attached completely untested patch might make this work
> again. Affecting at least git.hadrons.org and git.dpkg.org, but there
> might be others too.

Thanks for spotting that, the patch seems to work.

Re-running the scan on the dpkg repo still takes around 3 minutes -
not sure what the client or the server are doing during that time, it
doesn't re-fetch the repo.

On acl and attr the scan is done in 2 or 3s.

Christoph



Bug#1065612: O: google-android-m2repository-installer -- Google Android support m2 repository

2024-03-07 Thread Hans-Christoph Steiner



Package: wnpp
Severity: normal
X-Debbugs-Cc: google-android-m2repository-instal...@packages.debian.org
Control: affects -1 + src:google-android-m2repository-installer

I intend to orphan the google-android-m2repository-installer package.
None of the current maintainers have an interest in it, and it is
non-free.

The package description is:
 This package will download the Google Android Support Library repository and
 create a Debian package. This is structured as a maven m2 repository of all the
 versions of the library.
 .
 The Android Support Library offers a number of features that are not built into
 the framework. These libraries offer backward-compatible versions of new
 features, provide useful UI elements that are not included in the framework,
 and provide a range of utilities that apps can draw on.
 .
 WARNING: Installing this Debian package causes android_m2repository_r35.zip to
 be downloaded from dl.google.com and/or from other suggested mirrors. The End
 User License Agreement of this binary package is available at
 developer.android.com.



Bug#1032623: fixed in qa.debian.org

2024-03-06 Thread Christoph Berg
Re: Diederik de Haas
> The pre-filter which was 1GB and was recently further reduced to 500MB is 
> still 
> in place AFAICT. So it seems to me that this bug would be fixed when the size 
> limitation is removed, which is not (yet) the case?

The checkouts are now a 1/1000th in size.

Christoph



Bug#1053004: CVE-2019-10784 and CVE-2023-40619

2024-03-06 Thread Christoph Berg
Re: Leandro Cunha
> The
> next job would be to make it available through backports and I would
> choose to remove this package from stable. But I would only leave
> bookworm backports due to other bugs found (this CVEs too) and fixed
> in 7.14.7.
> I have to search about the status of backports to oldstable. But I'm
> also studying the possibility of working with patches for these two
> versions.

Why would you want to remove it from stable? In closed environments,
CVEs are often not a problem.

Christoph



Bug#1055989: emacs-gtk: emacs rejects font preference, falls back to "Purisa" font

2024-03-05 Thread Christoph Reichenbach
Dear David,

  my sincere apologies for missing your mail-- fortunately the most
recent update breakage reminded me to check the bug tracker again.

>> Emacs used the "Purisa" font as default font.  This font has the same Font
>> Foundry as "Terminus (TTF)" but is a "Comic Sans"-like special-purpose font
>> and unsuitable for normal operations.
>
> For me, it is Fantasque Sans Mono, but I agree it is not selecting the correct
> font. The selected font seems non-deterministic, possibly state
> dependent. After some various choices of Mono font, I ended up with
>
> Can you duplicate the problem for other fonts?  I tried 4 or 5 other
> monospaced fonts and they all seemed to work, at least in a fresh "emacs
> -Q".

  I had no trouble with the other monospaced fonts that I tried.

> I observed that choosing some non-existing font name (e.g. FooBar) had
> more or less the same effect. So maybe the issue is just that emacs
> cannot find "Terminus (TTF)". A wild guess would be the parens in the
> name causing the problem.

  My working assumption at the time of my investigation was that default
font selection searches for fonts with some hardcoded default values and
only applies some user-requested properties after it has already
selected the font.

  Basically, font selection (for the default font only-- other fonts
take a different code path) seems to follow the following steps, as far
as I understood it:

- Set hardcoded default font settings, including:
  - weight = regular
  - slant = ...?  (probably also regular)
- Apply user preferences for:
  - font foundry
  - font family
- Search for a font in the current font foundry that satisfies the
  current font family, weight, and slant requirements
- Apply user preferences for:
  - weight
  - slant
- Return the font

  This is greatly simplified-- the search step returns a list of
possible matches, for instance, and there are several selection
heuristics involved that I don't remember much about.


  If my interpretation is correct, then another workaround could be to
change "Terminus (TTF)" to report a "regular" weight that is identical
to its "medium" weight, but I have not had the time to figure out how to
try this.

> Apologies if this is covered already in your extensive report.

  Apologies for the verbosity of my earlier report; had I understood the
problem fully, I would have kept it shorter...

  All the best,

-- Christoph


signature.asc
Description: PGP signature


Bug#1065425: Does not upgrade from libpam0t64

2024-03-04 Thread Christoph Berg
Package: libpam0g
Version: 1.5.3-6
Severity: serious

On my sid system, libpam0g doesn't get upgraded because apt thinks the
libpam0t64 package is good enough:

$ sudo apt dist-upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

$ apt-cache policy libpam0t64
libpam0t64:
  Installed: 1.5.3-4
  Candidate: 1.5.3-4
  Version table:
 *** 1.5.3-4 100
100 /var/lib/dpkg/status

$ apt-cache policy libpam0g
libpam0g:
  Installed: (none)
  Candidate: 1.5.3-6
  Version table:
 1.5.3-6 500
500 http://deb.debian.org/debian sid/main amd64 Packages
 1.5.2-9.1+b1 -1
100 /var/lib/dpkg/status

Christoph



Bug#1065415: grub2: Work around possible failure in cpio_test

2024-03-03 Thread Christoph Biedl
Source: grub2
Version: 2.12-1
Severity: normal
Tags: patch

Dear Maintainer,

Hello,

while rebuilding grub, I encountered two issues from the test suite.
Perhaps I've already reported them but cannot find any traces of that.


One is, things go downhill in util/grub-shell if an environment
variable "debug" is set, but it seems this was fixed in newer versions
of grub (no longer found with 2.12-1, currently in testing).


Still open however: There is a limitation in cpio, it cannot deal with
an user ID above 2^21-1. If the build is done using a bigger ID, it
will just fail:

FAIL: cpio_test
===
(...)
cpio: ./: value uid 3123456 out of allowed range 0..2097151
cpio: sdir/: value uid 3123456 out of allowed range 0..2097151
cpio: sdir/2.img: value uid 3123456 out of allowed range 0..2097151
(...)

Fix, as attached: Probe for that situation, and exit gracefully.

Another solution might be using fakeroot then.

Kind regards,

    Christoph

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

--- a/tests/cpio_test.in
+++ b/tests/cpio_test.in
@@ -7,6 +7,12 @@
exit 99
 fi
 
+uid="$(id -u)"
+if [ "$uid" -gt 2097151 ]; then
+   echo "User ID $uid is too big to run cpio tests"
+   exit 77
+fi
+
 "@builddir@/grub-fs-tester" cpio_bin
 "@builddir@/grub-fs-tester" cpio_odc
 "@builddir@/grub-fs-tester" cpio_newc


signature.asc
Description: PGP signature


Bug#1065312: RM: deborphan -- ROM; missing too many dpkg features, thus broken and unreliable

2024-03-03 Thread Christoph Biedl
Chris Hofstaedtler wrote...

> You are welcome to write a new tool or implement all the missing
> parts in deborphan and deal with users thinking deborphan is a magic
> tool that knows everything and its output can be used by
> non-thinking humans. Various people in the past have suggested its
> "trivial" and "obvious" how it should work, yet we don't seem to
> have a lot of these tools that are not "partially right but also
> wrong a lot".

That's not my point.

When we remove a package from Debian, we create a situation where
users lose a feature, and it is our task to keep the inconvenience
low.

For many packages we don't even have to care - packages with an
embedded version number like libraries or python have a natural
replacement, and in general it's drawn in automatically. Packages that
no longer work (dropped kernel feature, retired API usage), well, too
bad. Packages with a low popcon count, two digits at most, tell, too
bad as well.

Packages like deborphan (popcon high four digits) fall in neither
category. Users want it, big scale. So If you think is no longer good
for the job - I trust your judgement - the remaining task is to provide
users guidance how they get this job done in the future. And that should
be part of the initial RM request without being asked for.


You pointed to the release notes. The two methods suggested there fail
miserably: On an unstable chroot here, not updated without a week, so
before the beginning of the t64 transition, deborphan reports:

  # deborphan
  libb2-1
  libcanberra0
  libhiredis0.14
  liblua5.2-0
  libmpdec3
  libnewt0.52
  libpcre3
  libsigsegv2

Which alternative tool provides this list?

The suggested alternative "apt list" - note I have to enhance the
expression since my internal distribtion is okay as well:

  # apt list '?narrow(?installed, ?not(?or(?origin(Debian),?origin(local'
  Listing... Done
  #

So, nope. Also, 38 times slower.

The suggested "apt-forktracker" seems to do the same thing as the "apt
list" command, without being extensible for other origins. So, nope.
Also, 56 times slower.


Perhaps it can be done using debfoster, but that requires some
configuration which I didn't understand in a quick test.

The last thing I found was "apt list '?garbage'" - but this lists more
packages, and I fail to see the difference. Also, 38 times slower.


This is the kind of research users of deborphan will have to to,
or they look into the net, and will possibly not get the best adivce.


My objections against removing deborphan are mostly nostalgic ones as it
served me well for more than 20 years. Quite frankly, not a real point.
So, I can live without deborphan - if it was let go with dignity. Which
means I can have a different tool that serves the purpose, being telling
me which packages can be removed from the system because they are just
cruft from old times.

My point is solely about not giving users good advice how the get
deborphan's job done. And not giving it in the first place.

Christoph


signature.asc
Description: PGP signature


Bug#1065312: RM: deborphan -- ROM; missing too many dpkg features, thus broken and unreliable

2024-03-02 Thread Christoph Biedl
Chris Hofstaedtler wrote...

> please remove deborphan. It is stuck, featurewise, in a very old time
> and does not support many currently available dpkg features properly
> (multi-arch, versioned provides, etc).

FWIW, deborphan is part of my regular workflow, and while you claim
it has defects, it works for me pretty well.

> Given the C codebase and lack of any patches so far I do not see that
> deborphan will ever get these features, and we have other tools
> available that work, do not mess with dpkg internals and are actually
> maintained.

One day I'm going to propose to make the following a policy about
removing a package: A phrase like "alternatives exist" without further
explanation should result in an immediate -done/wontfix for lack of
information. As this is in violation of the social contract #4.

So: What are the alternatives? How do they work? Are they a drop-in
replacment or do they introduce new dependencies? Are there feature that
will be no longer supported?

Leaving users in the void about this is just bad style.

Christoph


signature.asc
Description: PGP signature


Bug#1065017: unuser: error while loading shared libraries: libpam.so.0

2024-03-01 Thread Christoph Anton Mitterer
On Thu, 2024-02-29 at 13:31 -0700, Sam Hartman wrote:
> > > > > 
> I tried to make the revert work either if you didn't have libpam0t64
> at
> all or if you did, but we're more focused on people who never
> upgraded.
> 
> If you do run into breakage, we'll work with you to find a solution.


I guess right now going back isn't anyway possible yet, as e.g. util-
linux and some others have already depended on the t64 package, and't
I'd assume those haven't been rebuilt yet with the reversion.

Means however also, that possibly more and more people (on unstable)
get the libpam0t64 installed, unless they completely wait until the
transition is over.


Cheers,
Chris.



  1   2   3   4   5   6   7   8   9   10   >