Bug#944697: security.debian.org: please bring back MD5Sum, at least for buster/updates

2019-11-13 Thread Cyril Brulebois
Package: ftp.debian.org
Severity: serious
Justification: breaks image generation tools

Hi,

I've mentioned this on #debian-ftp already, but filing a bug report in
addition to make sure it's not lost.

Assuming the FTP team is responsible for security's dak setup as well,
we'd like to get MD5Sum back in buster/updates.

python-apt relies on md5 fields internally, as documented in #944696,
and a current symptom is live-wrapper's tracebacking accordingly when
packages are available in security; this has been the case for the
intel-microcode package, for a few hours.

jessie/updates and stretch/updates seem fine (MD5Sum is present there).
I don't have an opinion regarding bulleyes/updates (MD5Sum is missing
there) at this point, but given at least some apt bindings don't support
missing MD5Sum, it would seem premature to remove it from there as well?


Cheers,
-- 
Cyril Brulebois -- Debian Consultant @ DEBAMAX -- https://debamax.com/



Bug#944696: python-apt: relies on MD5 internally to download packages

2019-11-13 Thread Cyril Brulebois
Package: python-apt
Version: 1.8.4
Severity: serious
Justification: some people want to get rid of MD5Sum in indices

Hi,

While debugging a live-wrapper (lwr) failure that started occurring
(literally) overnight, I ended up discovering it was triggered by the
intel-microcode package's getting a security upgrade.

live-wrapper 0.10 isn't affected, but live-wrapper's master branch has
an extra commit that automatically enables security sources for stable
releases.

Here's the traceback for a simple build (with a local mirror but anyone
would do) with that master branch:

$ sudo lwr -d buster -m http://wodi.home/debian -f intel-microcode
[…]
DEBUG environment: LWR_MIRROR = 'http://wodi.home/debian'
DEBUG environment: LWR_EXTRA_PACKAGES = ''
DEBUG environment: LWR_BASE_DEBS = ''
DEBUG environment: LWR_DISTRIBUTION = 'buster'
DEBUG environment: LWR_FIRMWARE_PACKAGES = 'intel-microcode'
DEBUG environment: LWR_TASK_PACKAGES = ''
[…]
Downloading udebs for Debian Installer...
INFO Downloading udebs for Debian Installer...
Updating a local cache for amd64 buster ...
DEBUG Updating local cache...
CRITICAL Traceback (most recent call last):
  File "/usr/lib/python2.7/dist-packages/cliapp/app.py", line 193, in _run
self.process_args(args)
  File "/usr/lib/python2.7/dist-packages/lwr/run.py", line 143, in 
process_args
self.start_ops()
  File "/usr/lib/python2.7/dist-packages/lwr/run.py", line 286, in start_ops
apt_udeb.download_udebs(exclude_list)
  File "/usr/lib/python2.7/dist-packages/lwr/apt_udeb.py", line 157, in 
download_udebs
self.download_apt_file(pkg_name, pool_dir, False)
  File "/usr/lib/python2.7/dist-packages/lwr/apt_udeb.py", line 141, in 
download_apt_file
version.fetch_binary(destdir=pkg_dir)
  File "/usr/lib/python2.7/dist-packages/apt/package.py", line 867, in 
fetch_binary
if _file_is_same(destfile, self.size, self._records.md5_hash):
SystemError: error return without exception set


After some debugging, it turned out that merely accessing the
self._records.md5_hash item is sufficient to reproduce this issue.

Looking at the current (as of 2019-11-14 00:27:00 UTC) indices for
buster/updates on security.debian.org, one can only see SHA256 entries
in Release and Packages files, which is likely the reason for
python-apt's explosion. I've asked #debian-ftp to add MD5Sum entries
back at least for buster/updates, and will file another bug report for
that in a moment to make sure it isn't lost.

Looking at even the most recent python-apt code in experimental (1.9.0),
MD5 still seems hardwired, e.g. in apt/packages.py's fetch_binary():


def fetch_binary(self, destdir='', progress=None):
# type: (str, AcquireProgress) -> str
"""Fetch the binary version of the package.

The parameter *destdir* specifies the directory where the package will
be fetched to.

The parameter *progress* may refer to an apt_pkg.AcquireProgress()
object. If not specified or None, apt.progress.text.AcquireProgress()
is used.

.. versionadded:: 0.7.10
"""
base = os.path.basename(self._records.filename)
destfile = os.path.join(destdir, base)
if _file_is_same(destfile, self.size, self._records.md5_hash):
logging.debug('Ignoring already existing file: %s' % destfile)
return os.path.abspath(destfile)
acq = apt_pkg.Acquire(progress or apt.progress.text.AcquireProgress())
acqfile = apt_pkg.AcquireFile(acq, self.uri, self._records.md5_hash,  # 
type: ignore # TODO: Do not use MD5 # nopep8
  self.size, base, destfile=destfile)
acq.run()

if acqfile.status != acqfile.STAT_DONE:
raise FetchError("The item %r could not be fetched: %s" %
 (acqfile.destfile, acqfile.error_text))

return os.path.abspath(destfile)


Notice the TODO on the apt_pkg.AcquireFile(), but it would probably
break in the same way as in the live-wrapper case a few lines before, on
the self._records.md5_hash item.

The same goes for fetch_source().


Since getting rid of MD5Sum entirely is a topic that comes up on a
regular fashion (with fingers being pointed at jigdo in particular), it
looks to me python-apt should get some attention as well; hence filing
at serious severity. Feel free to adjust as required.


Cheers,
-- 
Cyril Brulebois -- Debian Consultant @ DEBAMAX -- https://debamax.com/


Re: Kernel / modules version do not match in weekly testing install CD

2019-11-13 Thread Svante Signell
On Wed, 2019-11-13 at 14:58 +, Steve McIntyre wrote:
> On Sun, Nov 10, 2019 at 10:26:18AM +0100, Julien Bigot wrote:

> Hi guys,
> 
> We've had a spate of build failures in debian-installer recently that
> have triggered problems like this. I've just pushed a fix now thay
> should hopefully get things going again.

Thank you for your reply. However, poking around I don't find any updated iso
files (yet) :(




Missing November 11 2019 testing iso

2019-11-13 Thread JT Benton Jr.
To whom it may concern,

I could not find any testing iso in the November 11 2019  weekly build.

Thanks,
JT


Bug#944679: extlinux: Visual bugs while editing a long kernel command line

2019-11-13 Thread Mikhail Morfikov
Package: extlinux
Version: 3:6.04~git20190206.bf6db5b4+dfsg1-1
Severity: important

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Maintainer,

My current kernel command line is about 400-character long. When it was
shorter, I didn't have any issues when I wanted to edit this line in the
bootloader screen by selecting some entry and pressing "E".

I recently added some other kernel parameters to the cmd line, and I noticed
many visual bugs in the bootloader screen. Basically with each cursor movement
(back and forth), I get an extra text line in the screen output (copy of the
current line scrolled up). Also characters in the cmd line disappear or change
when I move the cursor back. The visual bugs make it almost impossible to edit
the kernel cmd line. Also When I press the backspace key (or the back arrow
key)
for a longer period of time (let's assume I want to delete some parameters
entirely from the line), I hear the hardware beeper which is really annoying.

I found out that the problem appears when I have more than 4 lines of text on
the screen when editing the cmd line. So fifth (and next ones) will trigger the
visual bugs, while 4 (and less) won't.

So what to do with it?



- -- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (130, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.3.11-amd64 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages extlinux depends on:
ii  libc6  2.29-3

Versions of packages extlinux recommends:
ii  syslinux-common  3:6.04~git20190206.bf6db5b4+dfsg1-1

extlinux suggests no packages.




-BEGIN PGP SIGNATURE-
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=QWGV
-END PGP SIGNATURE-



Re: Kernel / modules version do not match in weekly testing install CD

2019-11-13 Thread Steve McIntyre
On Sun, Nov 10, 2019 at 10:26:18AM +0100, Julien Bigot wrote:
>Hello again,
>
>After some digging I found this rather old (but still open?) bug that 
>describes something pretty similar to what I'm seeing (at least from the 
>symptoms point of view, I don't know about the root causes)
>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779616
>
>Is the behavior I'm observing a known one that is described by this bug or 
>should I open a new bug?


On Tue, Nov 12, 2019 at 11:20:54PM +0100, Svante Signell wrote:
>Hello,
>
>Downloading both the latest weekly (20191028) and daily build (2019110) of
>debian-testing-amd64-netinst.iso the following error message is displayed:
>"No kernel modules were found. This is probably due to a mismatch between the
>kernel used by this version of the installer and the version of the kernel
>version available in the archive. etc"
> 
>Other people, Julien Bigot, on this list have also seen the problem. Where can 
>I
>find the latest netinst iso not having this problem. An yes, a bug should be
>filed for this problem.

Hi guys,

We've had a spate of build failures in debian-installer recently that
have triggered problems like this. I've just pushed a fix now thay
should hopefully get things going again.

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"The whole problem with the world is that fools and fanatics are
 always so certain of themselves, and wiser people so full of doubts."
   -- Bertrand Russell



Re: missing debian iso files in cdimage.debian.org (weekly-live-builds)

2019-11-13 Thread Steve McIntyre
On Wed, Nov 13, 2019 at 03:06:33PM +0100, Saverio Brancaccio wrote:
>Dear Debian CD Team,
>
>since a couple of weeks, looking at the path below, there are no iso image
>files anymore but only meta files updates (.log, checksums, packagelists,
>etc.).
>Is there any reason for not uploading/updating also debian testing iso images?
>(e.g. CI breaks?)
>
>https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/
>weekly-live-builds/amd64/iso-hybrid/

We've had a spate of broken d-i builds lately. I've just pushed a fix
now. Assuming that works, I'll trigger a rebuild of the weeklies
tomorrow.

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
Google-bait:   https://www.debian.org/CD/free-linux-cd
  Debian does NOT ship free CDs. Please do NOT contact the mailing
  lists asking us to send them to you.



missing debian iso files in cdimage.debian.org (weekly-live-builds)

2019-11-13 Thread Saverio Brancaccio
Dear Debian CD Team,

since a couple of weeks, looking at the path below, there are no iso image
files anymore but only meta files updates (.log, checksums, packagelists,
etc.).
Is there any reason for not uploading/updating also debian testing iso
images? (e.g. CI breaks?)

https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/weekly-live-builds/amd64/iso-hybrid/

Many thanks in advance for the information, regards.
Saverio