Processed: unblock: mitmproxy/8.1.1-2

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + mitmproxy
Bug #1032863 [release.debian.org] unblock: mitmproxy/8.1.1-2
Added indication that 1032863 affects mitmproxy

-- 
1032863: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032863
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032863: unblock: mitmproxy/8.1.1-2

2023-03-12 Thread Aron Xu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: mitmpr...@packages.debian.org
Control: affects -1 + mitmproxy

Dear Release Team,

Could you unblock package mitmproxy/8.1.1-2, in this version it applies an
upstream patch to fix Python 3.11 compatibility, otherwise the package would
fail to start, although the original bug report (#1031787) wasn't marked RC.

Regards,
Aron
diff -Nru mitmproxy-8.1.1/debian/changelog mitmproxy-8.1.1/debian/changelog
--- mitmproxy-8.1.1/debian/changelog2023-02-06 00:00:42.0 +0800
+++ mitmproxy-8.1.1/debian/changelog2023-03-03 01:21:00.0 +0800
@@ -1,3 +1,10 @@
+mitmproxy (8.1.1-2) unstable; urgency=medium
+
+  * Team upload.
+  * Add upstream patch to fix Python 3.11 compatibility (Closes: #1031787)
+
+ -- Aron Xu   Fri, 03 Mar 2023 01:21:00 +0800
+
 mitmproxy (8.1.1-1) unstable; urgency=high
 
   * Team upload
diff -Nru 
mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch
 
mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch
--- 
mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch
 1970-01-01 08:00:00.0 +0800
+++ 
mitmproxy-8.1.1/debian/patches/0007-use-default_factory-for-parser_options-field-5476.patch
 2023-03-03 01:20:48.0 +0800
@@ -0,0 +1,34 @@
+From 55a64b7ad993fd52fbff19f33e3c6e153b3e8d9b Mon Sep 17 00:00:00 2001
+From: rathann 
+Date: Sat, 23 Jul 2022 10:15:03 +0200
+Subject: [PATCH] use default_factory for parser_options field (#5476)
+
+* use default_factory for field parser_options
+
+When running mitmproxy under python 3.11, the following exception
+is thrown otherwise:
+```
+ValueError: mutable default  for field 
parser_options is not allowed: use default_factory
+```
+
+Fixes #5474.
+---
+ mitmproxy/contentviews/grpc.py | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/mitmproxy/contentviews/grpc.py b/mitmproxy/contentviews/grpc.py
+index a5ef99708..5c73220c8 100644
+--- a/mitmproxy/contentviews/grpc.py
 b/mitmproxy/contentviews/grpc.py
+@@ -951,7 +951,7 @@ def format_grpc(
+ 
+ @dataclass
+ class ViewConfig:
+-parser_options: ProtoParser.ParserOptions = ProtoParser.ParserOptions()
++parser_options: ProtoParser.ParserOptions = 
field(default_factory=ProtoParser.ParserOptions)
+ parser_rules: list[ProtoParser.ParserRule] = field(default_factory=list)
+ 
+ 
+-- 
+2.30.2
+
diff -Nru mitmproxy-8.1.1/debian/patches/series 
mitmproxy-8.1.1/debian/patches/series
--- mitmproxy-8.1.1/debian/patches/series   2023-02-06 00:00:42.0 
+0800
+++ mitmproxy-8.1.1/debian/patches/series   2023-03-03 01:19:49.0 
+0800
@@ -3,3 +3,4 @@
 0004-Remove-test_cibuild.py.patch
 0005-Remove-test_readfile.py.patch
 0006-Delete-asciinema-for-which-we-only-have-minified-ver.patch
+0007-use-default_factory-for-parser_options-field-5476.patch


signature.asc
Description: PGP signature


Bug#1032862: unblock: golang-github-tidwall-gjson/1.14.4-2 (pre-approval)

2023-03-12 Thread Cyril Brulebois
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian...@lists.debian.org

Hi,

Please consider ACKing a golang-github-tidwall-gjson upload catching up
with newer upstream releases.

[ Reason ]
The golang-github-tidwall-gjson package currently in testing and
unstable suffers from at least two CVEs (#1000225, #1011616).

Currently, we have a 1.6.7 version, those bugs are supposed to be fixed
in 1.9.x, and upstream is at 1.14.4…

This library is about parsing JSON, is basically one big Go file (along
with another one for the tests).

Since that's about parsing things, I suppose it wouldn't be trivial to
backport the security fixes from 1.9.2 and 1.9.3 without understanding
how parsing works, and why it was buggy in 1.6.7. Shipping the latest
1.9.x would probably be safer. But then, if we're going to have a bump
in upstream releases, it seemed (at least to Thorsten Alteholz on the
debian-go@ list and to me) that considering the latest would make most
sense. We would get those fixes, possible other ones, and that would
minimize the delta whenever other security fixes come up.

The reverse dependencies are somewhat limited:
 - dak lists 3 packages via Depends;
 - dak lists 5 packages via Build-Depends;
 - ratt finds 14 packages when it's time to rebuild all the things.

[ Impact ]
I'm not sure I would be able to backport security fixes (at all, or
properly), and failing to get a fixed package into testing might get a
bunch of packages kicked out. This includes crowdsec, which is my
primary concern when it comes to Go packages.

[ Tests ]
ratt has been used to check that all 14 identified packages still build
fine. Those are Go packages, so they usually come with a test suite (but
I must admit I didn't check each one individually).

Additionally, I've uploaded 1.14.4-1 to experimental to benefit from the
automated autopkgtest runs (for Go packages that means building/testing
on the considered arch), and those haven't uncovered any issues on any
of the ci.debian.net archs, which is an extra reassurance compared to my
initial build tests via ratt, only on amd64.

[ Risks ]
No regressions have been spotted thus far, either in the package or its
reverse dependencies, and I'm signing up for investigating anything that
might come up as a side effect of this update.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
This is a Go package, so reverse dependencies will need to be rebuilt
against the updated code. That being said, with the binNMU rounds
happening to avoid keeping too many `Extra-Source-Only: yes` packages
in testing, that might just happen automatically without requiring
manual scheduling.

unblock golang-github-tidwall-gjson/1.14.4-2


Cheers,
-- 
Cyril Brulebois -- Debian Consultant @ DEBAMAX -- https://debamax.com/
diff --git a/README.md b/README.md
index 8553273..c8db11f 100644
--- a/README.md
+++ b/README.md
@@ -4,7 +4,9 @@
 width="240" height="78" border="0" alt="GJSON">
 
 https://godoc.org/github.com/tidwall/gjson;>https://img.shields.io/badge/api-reference-blue.svg?style=flat-square; 
alt="GoDoc">
-http://tidwall.com/gjson-play;>https://img.shields.io/badge/%F0%9F%8F%90-playground-9900cc.svg?style=flat-square;
 alt="GJSON Playground">
+https://tidwall.com/gjson-play;>https://img.shields.io/badge/%F0%9F%8F%90-playground-9900cc.svg?style=flat-square;
 alt="GJSON Playground">
+https://img.shields.io/badge/{}-syntax-33aa33.svg?style=flat-square; 
alt="GJSON Syntax">
+   
 
 
 get json values quickly
@@ -14,6 +16,10 @@ It has features such as [one line retrieval](#get-a-value), 
[dot notation paths]
 
 Also check out [SJSON](https://github.com/tidwall/sjson) for modifying json, 
and the [JJ](https://github.com/tidwall/jj) command line tool.
 
+This README is a quick overview of how to use GJSON, for more information 
check out [GJSON Syntax](SYNTAX.md).
+
+GJSON is also available for [Python](https://github.com/volans-/gjson-py) and 
[Rust](https://github.com/tidwall/gjson.rs)
+
 Getting Started
 ===
 
@@ -123,11 +129,12 @@ nil, for JSON null
 To directly access the value:
 
 ```go
-result.Type// can be String, Number, True, False, Null, or JSON
-result.Str // holds the string
-result.Num // holds the float64 number
-result.Raw // holds the raw json
-result.Index   // index of raw value in original json, zero means index unknown
+result.Type   // can be String, Number, True, False, Null, or JSON
+result.Str// holds the string
+result.Num// holds the float64 number
+result.Raw// holds the raw json
+result.Index  // index of raw value in original json, zero means index 
unknown
+result.Indexes// indexes of all the elements that match on a path 
containing the '#' query character.
 ```
 
 There are a 

Bug#1031325: marked as done (e2fsprogs 1.47.0 introduces a breaking change into Bookworm, breaking grub and making installations of Ubuntu and Debian releases via debootstrap impossible)

2023-03-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 Mar 2023 23:23:29 +0100
with message-id 
and subject line Re: Bug#1031325: e2fsprogs 1.47.0 introduces a breaking change 
into Bookworm, breaking grub and making installations of Ubuntu and Debian 
releases via debootstrap impossible
has caused the Debian Bug report #1031325,
regarding e2fsprogs 1.47.0 introduces a breaking change into Bookworm, breaking 
grub and making installations of Ubuntu and Debian releases via debootstrap 
impossible
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1031325: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031325
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: serious

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

A week ago, Theodore Ts'o uploaded e2fsprogs 1.47.0 into Debian unstable. This
version contains a unannounced change that basically breaks grub2 (and
grub-install). This issue has been reported as #1030939 [1] and #1030846 [2].
To "fix" the issue, instead of turning the feature off, a patch to grub2 in Sid
has been committed recently. Unfortunately, that only fixes grub in Sid. Grub
in Bullseye or any current Ubuntu release *cannot* deal with a filesystem
created by this version of e2fsprogs. This basically breaks the debootstrap
method of installing a Debian or Ubuntu. If e2fsprogs 1.47.0 is allowed into
Testing, we can no longer use the debootstrap method to install a Debian
Bullseye (or older) or any Ubuntu release. It requires to manually change the
filesystem features before it can be used again. It also makes e.g. vmdb2 in
Sid unusable to create images of Bullseye or older Debian releases, or Ubuntu
releases.

The gain of enabling the metadata_csum_seed feature by default is not
noteworthy. It is a feature that hardly anybody needs. I have not seen one
use-case nor even relevant search hits. But the loss is heavy. User's can no
longer simply follow [3] to install any Debian or Ubuntu system if the
filesystem has been created with e2fsprogs 1.47.0. It also breaks software in
the midst of the freeze.

I hereby ask the release team to step in and either make sure that the
metadata_csum_seed feature is not turned on by default in e2fsprogs in Bookworm
or that version 1.47.0 is not shipped as part of Bookworm.

Reasons:

- - this breaks existing tools for no apparant reason

- - introducing this breaking change is too late in the release cycle to deal
  with it properly

- - the metadata_csum_seed feature is hardly useful or requested; it can be
  turned on if necessary; no need to make it the default in Bookworm

- - there is no grub upstream release with support for it; only patched grub
  versions can cope with it

- - the change makes it impossible to create filesystems with this version of
  e2fsprogs and then run a grub-install from a target system that does not cope
  with that feature; basically breaking the debootstrap method of installing
  Debian or Ubuntu onto a server (violating #4 of the Debian social contract)

- - to cope with the former issues, users will have to know about that
  incompatibility and ways to deal with it; none of that is prepared; the
  package maintainer even refuses a NEWS entry

- - it breaks vmdb2, only allowing to make images of Debian Bookworm and Sid (if
  grub is involved)

- - pushing this metadata_csum_seed feature violates #4 of the Debian social
  contract

Instead, turning on this feature should be postponed for the next release cycle
where a proper transition can be done.

[1] https://bugs.debian.org/1030939
[2] https://bugs.debian.org/1030846
[3] https://www.debian.org/releases/stable/amd64/apds03

Daniel Leidert

-BEGIN PGP SIGNATURE-
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=bKh7
-END PGP SIGNATURE-
--- End Message ---
--- Begin Message ---
On 2023-02-22 21:36:05 +0100, Paul Gevers 

Bug#1032855: unblock: scilab/6.1.1+dfsg2-5

2023-03-12 Thread Pierre Gruet
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: sci...@packages.debian.org
Control: affects -1 + src:scilab

Dear Release Team,

Could you please unblock the key package scilab/6.1.1+dfsg2-5?

[ Reason ]
- scilab/6.1.1+dfsg2-4 is absolutely unusable as it cannot even start.
- It FTBFS.
- It looks for versioned artifacts so it breaks everytime a dependency is
  updated.

[ Impact ] Staying with version 6.1.1+dfsg2-4 does not allow one to use scilab
even in the naked CLI flavor.

[ Tests ]
I installed the version 6.1.1+dfsg2-5 on a Bookworm system:
- scilab-cli and scilab-adv-cli work plainly, except for plots (bugs in
  dependencies);
- the GUI scilab does not work. Blockers: bugs in dependency libjogl2-java and
  others still to investigate, as log messages are terse.

[ Risks ]
The changes are simple, can be easily grasped through the documented patches I
added. scilab has only one reverse dependency which is not a Blends
metapackage: cantor-backend-scilab, which is already broken as
scilab/6.1.1+dfsg2-4 does not start.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock scilab/6.1.1+dfsg2-5

Best,

-- 
Pierre
diff -Nru scilab-6.1.1+dfsg2/debian/changelog 
scilab-6.1.1+dfsg2/debian/changelog
--- scilab-6.1.1+dfsg2/debian/changelog 2022-08-16 11:55:44.0 +0200
+++ scilab-6.1.1+dfsg2/debian/changelog 2023-03-11 16:23:07.0 +0100
@@ -1,3 +1,25 @@
+scilab (6.1.1+dfsg2-5) unstable; urgency=medium
+
+  * Team upload
+  * Raising Standards version to 4.6.2 (no change)
+  * Adding missing dependencies on libfreehep-graphicsio-java and
+libfreehep-util-java
+  * Fixing the FTBFS occurring during the doc build
+  * Enabling starting with OpenJDK 17 (Closes: #1012099)
+  * Selecting unversioned jars instead of versioned ones in the configure phase
+(Closes: #1030205)
+  * Refreshing patches
+  * Removing unneeded older-than versioned dependencies
+  * Update lintian override info to new format:
++ debian/source/lintian-overrides: line 2, 4
++ debian/scilab-minimal-bin.lintian-overrides: line 4
+  * debian/copyright: use spaces rather than tabs to start continuation lines.
+  * Update renamed lintian tag names in lintian overrides.
+  * Set upstream metadata fields: Repository-Browse.
+  * Fix day-of-week for changelog entry 5.0.3-1.
+
+ -- Pierre Gruet   Sat, 11 Mar 2023 16:23:07 +0100
+
 scilab (6.1.1+dfsg2-4) unstable; urgency=medium
 
   * Add patch to disambiguate pause (Closes: #1017283).
@@ -1348,7 +1370,7 @@
   * Package moved to main since Scilab is free (CeCILL license)
   * modelicac, intersci and scilab manpages added
 
- -- Sylvestre Ledru   Fri, 1 Oct 2008 13:37:08 +0200
+ -- Sylvestre Ledru   Wed, 01 Oct 2008 13:37:08 +0200
 
 scilab (4.1.2-6) unstable; urgency=low
 
diff -Nru scilab-6.1.1+dfsg2/debian/control scilab-6.1.1+dfsg2/debian/control
--- scilab-6.1.1+dfsg2/debian/control   2022-08-16 11:55:44.0 +0200
+++ scilab-6.1.1+dfsg2/debian/control   2023-03-10 23:21:05.0 +0100
@@ -3,38 +3,36 @@
 Priority: optional
 Maintainer: Debian Science Team 

 Uploaders: Julien Puydt 
-Build-Depends: debhelper-compat (= 13), gfortran, time,
- default-jdk, chrpath, ocaml-nox (>= 3.11.2-3), libnum-ocaml-dev, fakeroot,
- tcl-dev, tk-dev, libxml2-dev, libpcre3-dev, libcurl4-openssl-dev,
- gettext, libreadline-dev, pkg-config, procps, dpkg-dev (>= 1.16.0),
+Build-Depends: debhelper-compat (= 13), gfortran, time, default-jdk, chrpath,
+ ocaml-nox, libnum-ocaml-dev, fakeroot, tcl-dev, tk-dev, libxml2-dev,
+ libpcre3-dev, libcurl4-openssl-dev, gettext, libreadline-dev, pkg-config,
+ procps, dpkg-dev,
 # numerical libraries
  libblas-dev | librefblas3-dev | libatlas-base-dev, liblapack-dev,
- libarpack2-dev (>= 3.0), libeigen3-dev,
+ libarpack2-dev, libeigen3-dev,
 # Java deps
- default-jre-headless, libflexdock-java (>= 1.2.3), libjogl2-java (>= 2.3.2),
- libgl1-mesa-dev, libjrosetta-java (>= 1.0.1), ant, libjgoodies-looks-java,
- libskinlf-java, liblucene4.10-java, libactivation-java, libjaxb-java,
+ default-jre-headless, libflexdock-java, libjogl2-java, libgl1-mesa-dev,
+ libjrosetta-java, ant, libjgoodies-looks-java, libskinlf-java,
+ liblucene4.10-java, libactivation-java, libjaxb-java,
 # graphic
- libfreehep-graphics2d-java, libfreehep-graphicsio-java, 
libfreehep-graphicsio-emf-java,
- libfreehep-util-java,
+ libfreehep-graphics2d-java, libfreehep-graphicsio-java,
+ libfreehep-graphicsio-emf-java, libfreehep-util-java,
 # Documentation
- libjeuclid-core-java (>= 3.1.3), libbatik-java (>= 1.7), fop (>= 0.95),
- javahelp2, libsaxon-java, libavalon-framework-java, docbook-xsl,
- libxml-commons-external-java,
+ libjeuclid-core-java, libbatik-java, fop, javahelp2, libsaxon-java,
+ libavalon-framework-java, docbook-xsl, libxml-commons-external-java,
 # Optional Scilab features
- 

Processed: unblock: scilab/6.1.1+dfsg2-5

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:scilab
Bug #1032855 [release.debian.org] unblock: scilab/6.1.1+dfsg2-5
Added indication that 1032855 affects src:scilab

-- 
1032855: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032855
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032853: unblock: isenkram/0.50

2023-03-12 Thread Petter Reinholdtsen


Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package isenkram

The changes between the version in testing (0.49) and in unstable (0.51)
are all related to changes in the Debian archive, and relates to files
with content extracted from the Debian archve.  In addition I adjusted a
lintian override to match the latest message structure.

This version update the list of firmware file to reflect the latest
updates in the Debian archive, as well as hardware mappings extracted
using appstream from the Debian archive.

[ Reason ]
The isenkram package is a key package.

[ Impact ]
The update make sure isenkram users get package proposals relecting the
current status of the packages in the ARchive.

[ Tests ]
The change can be tested using /usr/sbin/isenkram-autoinstall-firmware
and isenkram-lookup on relevant hardware platforms.

[ Risks ]
The risks are low, as this only is making already existing information
in the archive easlier available.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing


unblock isenkram/0.50

diff --git a/debian/changelog b/debian/changelog
index 71ef7e3..0e2c3f3 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,18 @@
+isenkram (0.51) unstable; urgency=medium
+
+  * Bump version number in python library to fix build problem.
+
+ -- Petter Reinholdtsen   Sun, 12 Mar 2023 22:03:04 +0100
+
+isenkram (0.50) unstable; urgency=medium
+
+  * Adjusted lintian override to match current versions.
+  * Corrected comment in lookup code.
+  * Updated modaliases file from appstream data in sid using 
appstream2modaliases.
+  * Updated generated firmware lists.
+
+ -- Petter Reinholdtsen   Sun, 12 Mar 2023 09:56:32 +0100
+
 isenkram (0.49) unstable; urgency=medium
 
   * Updated Standards-Version from 4.5.1 to 4.6.2.
diff --git a/debian/isenkram-cli.lintian-overrides 
b/debian/isenkram-cli.lintian-overrides
index 7b3f0c9..db6242d 100644
--- a/debian/isenkram-cli.lintian-overrides
+++ b/debian/isenkram-cli.lintian-overrides
@@ -1,2 +1,2 @@
 isenkram-cli: no-debconf-config
-isenkram-cli: debconf-is-not-a-registry usr/sbin/isenkram-pkginstall
+isenkram-cli: debconf-is-not-a-registry [usr/sbin/isenkram-pkginstall:27]
diff --git a/generated/Fw-Contents-all-bookworm-main 
b/generated/Fw-Contents-all-bookworm-main
index 0b34313..38c54ca 100644
--- a/generated/Fw-Contents-all-bookworm-main
+++ b/generated/Fw-Contents-all-bookworm-main
@@ -1,5 +1,5 @@
-lib/firmware/ath9k_htc/htc_7010-1.dev.0.fw  misc/firmware-ath9k-htc
-lib/firmware/ath9k_htc/htc_9271-1.dev.0.fw  misc/firmware-ath9k-htc
+lib/firmware/ath9k_htc/htc_7010-1.4.0.fwmisc/firmware-ath9k-htc
+lib/firmware/ath9k_htc/htc_9271-1.4.0.fwmisc/firmware-ath9k-htc
 lib/firmware/av7110/bootcode.bin
kernel/firmware-linux-free
 lib/firmware/carl9170-1.fw  
kernel/firmware-linux-free
 lib/firmware/cis/3CCFEM556.cis  
kernel/firmware-linux-free
diff --git a/generated/Fw-Contents-all-bookworm-non-free 
b/generated/Fw-Contents-all-bookworm-non-free
deleted file mode 100644
index 00d7a66..000
--- a/generated/Fw-Contents-all-bookworm-non-free
+++ /dev/null
@@ -1,10 +0,0 @@
-lib/firmware/zd1211/zd1211_ub   
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211_uph  
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211_uphm 
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211_uphr 
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211_ur   
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211b_ub  
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211b_uph 
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211b_uphm
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211b_uphr
non-free/kernel/firmware-zd1211
-lib/firmware/zd1211/zd1211b_ur  
non-free/kernel/firmware-zd1211
diff --git a/generated/Fw-Contents-all-bookworm-non-free-firmware 
b/generated/Fw-Contents-all-bookworm-non-free-firmware
index 6d5d912..c34c0b3 100644
--- a/generated/Fw-Contents-all-bookworm-non-free-firmware
+++ b/generated/Fw-Contents-all-bookworm-non-free-firmware
@@ -77,9 +77,11 @@ lib/firmware/amdgpu/cyan_skillfish2_pfp.bin 
non-free-firmware/kernel
 lib/firmware/amdgpu/cyan_skillfish2_rlc.bin 
non-free-firmware/kernel/firmware-amd-graphics
 lib/firmware/amdgpu/cyan_skillfish2_sdma.bin
non-free-firmware/kernel/firmware-amd-graphics
 lib/firmware/amdgpu/cyan_skillfish2_sdma1.bin   
non-free-firmware/kernel/firmware-amd-graphics

Bug#1032848: marked as done (unblock: network-manager-pptp/1.2.12-1)

2023-03-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 Mar 2023 19:07:15 +
with message-id 
and subject line unblock network-manager-pptp
has caused the Debian Bug report #1032848,
regarding unblock: network-manager-pptp/1.2.12-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032848: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032848
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: network-manager-p...@packages.debian.org
Control: affects -1 + src:network-manager-pptp

Please unblock package network-manager-pptp

The latest upload of network-manager-pptp is a minor update, consisting
of 90% translation updates and a bit of build system cleanups.

The regression potential is close to zero as there are not code related
changes.

Regards,
Michael
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Processed: Re: Bug#1032849: unblock: shim/15.7-1 (etc.)

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 pending
Bug #1032849 [release.debian.org] unblock: shim/15.7-1 (etc.)
Added tag(s) pending.

-- 
1032849: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032849
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032849: unblock: shim/15.7-1 (etc.)

2023-03-12 Thread Paul Gevers

Control: tags -1 pending

Hi Steve,

On 12-03-2023 19:56, Steve McIntyre wrote:

Please unblock our stack of shim and shim-signed packages.


As mentioned on IRC, I like to age it one or two days more, but the 
hints are already in my hints file (commented out), so I'll do that 
tomorrow or on Tuesday.


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1032849: unblock: shim/15.7-1 (etc.)

2023-03-12 Thread Steve McIntyre
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-...@lists.debian.org

Hi!

Please unblock our stack of shim and shim-signed packages. We finally
have new signed shim binaries and there's a lot of major bugfixes
included which cascade down:

shim (15.7-1) unstable; urgency=medium

  * New upstream release fixing more bugs
  * Add further patches from upstream:
+ Make sbat_var.S parse right with buggy gcc/binutils
+ Enable NX support at build time, as required by policy for signing
  new shim binaries.
  * Switch to using gcc-12. Closes: #1022180
  * Update to Standards-Version 4.6.2 (no changes needed)
  * Block Debian grub binaries with sbat < 4 (see #1024617)

shim-signed (1.39) unstable; urgency=medium

  * Build against new signed binaries corresponding to 15.7-1
+ This syncs up build-deps again. Closes: #1016280
+ We now have arm64 signed shims again \o/
  Undo the hacky unsigned arm64 build
  Closes: #1008942, #992073, #991478
Pulls multiple other bugfixes in for the signed version:
+ Make sbat_var.S parse right with buggy gcc/binutils
+ Enable NX support at build time, as required by policy for signing
  new shim binaries.
+ Fixes argument handling bug with some firmware implementations.
  Closes: #995940
  * Update build-dep on shim-unsigned to use 15.7-1
  * Block Debian grub binaries with sbat < 4 (see #1024617)
+ Update Depends on grub2-common to match.
  * postinst/postrm: make config_item() more robust
  * Add pt_BR translation, thanks to Paulo Henrique de Lima
Santana. Closes: #1026415
  * Tweak dependencies

unblock shim/15.7-1
unblock shim-signed/1.39
unblock shim-helpers-amd64-signed/1+15.7+1
unblock shim-helpers-arm64-signed/1+15.7+1
unblock shim-helpers-i386-signed/1+15.7+1



Processed: unblock: network-manager-pptp/1.2.12-1

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:network-manager-pptp
Bug #1032848 [release.debian.org] unblock: network-manager-pptp/1.2.12-1
Added indication that 1032848 affects src:network-manager-pptp

-- 
1032848: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032848
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032848: unblock: network-manager-pptp/1.2.12-1

2023-03-12 Thread Michael Biebl
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: network-manager-p...@packages.debian.org
Control: affects -1 + src:network-manager-pptp

Please unblock package network-manager-pptp

The latest upload of network-manager-pptp is a minor update, consisting
of 90% translation updates and a bit of build system cleanups.

The regression potential is close to zero as there are not code related
changes.

Regards,
Michael



Bug#1032847: unblock: intel-microcode/3.20230214.1

2023-03-12 Thread Tobias Frost
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: intel-microc...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:intel-microcode

I've uploaded intel-microcode to DELAYED/5, ETA will be Mar 17 ~18:00 CET
Please unblock package intel-microcode once it hits unstable.

The upload updates intel microcodes to target (See #1031334)
   - INTEL-SA-00700: CVE-2022-21216
   - INTEL-SA-00730: CVE-2022-33972
   - INTEL-SA-00738: CVE-2022-33196
   - INTEL-SA-00767: CVE-2022-38090

the CVEs are information disclosure via local access vulnerbilities and
potential privilege escalations.

I plan to provide updated packages for bullseye (security team in CC).
As well as LTS (buster) and ELTS (stretch an jessie) as part of the freexian 
LTS/ELTS project)

To keep the fixes consistent, I'd like to let them flow from sid -> jessie…

[ Tests ]
I've tested that the package works on Intel hardware that I have access to.


[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock intel-microcode/3.20230214.1

-- 
tobi
diff -Nru intel-microcode-3.20221108.2/debian/changelog 
intel-microcode-3.20230214.1/debian/changelog
--- intel-microcode-3.20221108.2/debian/changelog   2023-02-17 
01:12:52.0 +0100
+++ intel-microcode-3.20230214.1/debian/changelog   2023-03-12 
18:16:50.0 +0100
@@ -1,3 +1,52 @@
+intel-microcode (3.20230214.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * New upstream microcode datafile 20230214
+- Includes Fixes for: (Closes: #1031334)
+   - INTEL-SA-00700: CVE-2022-21216
+   - INTEL-SA-00730: CVE-2022-33972
+   - INTEL-SA-00738: CVE-2022-33196
+   - INTEL-SA-00767: CVE-2022-38090
+  * New Microcodes:
+sig 0x000806f4, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+sig 0x000806f4, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+sig 0x000806f5, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+sig 0x000806f5, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+sig 0x000806f6, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+sig 0x000806f6, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+sig 0x000806f7, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170
+sig 0x000806f8, pf_mask 0x10, 2022-12-19, rev 0x2c000170, size 600064
+sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181
+sig 0x000806f8, pf_mask 0x87, 2022-12-27, rev 0x2b000181, size 561152
+sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e
+sig 0x000b06a2, pf_mask 0xc0, 2022-12-08, rev 0x410e, size 212992
+sig 0x000b06a3, pf_mask 0xc0, 2022-12-08, rev 0x410e
+  * Updated Microcodes:
+sig 0x00050653, pf_mask 0x97, 2022-08-30, rev 0x1000161, size 36864
+sig 0x00050656, pf_mask 0xbf, 2022-08-26, rev 0x4003303, size 37888
+sig 0x00050657, pf_mask 0xbf, 2022-08-26, rev 0x5003303, size 37888
+sig 0x0005065b, pf_mask 0xbf, 2022-08-26, rev 0x7002503, size 29696
+sig 0x000606a6, pf_mask 0x87, 2022-10-09, rev 0xd000389, size 296960
+sig 0x000606c1, pf_mask 0x10, 2022-09-23, rev 0x1000211, size 289792
+sig 0x000706a1, pf_mask 0x01, 2022-09-16, rev 0x003e, size 75776
+sig 0x000706a8, pf_mask 0x01, 2022-09-20, rev 0x0022, size 76800
+sig 0x000706e5, pf_mask 0x80, 2022-08-31, rev 0x00b8, size 113664
+sig 0x000806a1, pf_mask 0x10, 2022-09-07, rev 0x0032, size 34816
+sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c
+sig 0x00090672, pf_mask 0x07, 2023-01-04, rev 0x002c, size 219136
+sig 0x00090675, pf_mask 0x07, 2023-01-04, rev 0x002c
+sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429
+sig 0x000906a3, pf_mask 0x80, 2023-01-11, rev 0x0429, size 218112
+sig 0x000906a4, pf_mask 0x80, 2023-01-11, rev 0x0429
+sig 0x000906c0, pf_mask 0x01, 2022-09-02, rev 0x2424, size 20480
+sig 0x000a0671, pf_mask 0x02, 2022-08-31, rev 0x0057, size 103424
+sig 0x000b0671, pf_mask 0x32, 2022-12-19, rev 0x0112, size 207872
+sig 0x000b06f2, pf_mask 0x07, 2023-01-04, rev 0x002c
+sig 0x000b06f5, pf_mask 0x07, 2023-01-04, rev 0x002c
+
+ -- Tobias Frost   Sun, 12 Mar 2023 18:16:50 +0100
+
 intel-microcode (3.20221108.2) unstable; urgency=medium
 
   * Move source and binary from non-free/admin to non-free-firmware/admin
Binary files /tmp/qNbFv9J1ty/intel-microcode-3.20221108.2/intel-ucode/06-55-03 
and /tmp/Ekjb2KZejs/intel-microcode-3.20230214.1/intel-ucode/06-55-03 differ
Binary files /tmp/qNbFv9J1ty/intel-microcode-3.20221108.2/intel-ucode/06-55-06 
and /tmp/Ekjb2KZejs/intel-microcode-3.20230214.1/intel-ucode/06-55-06 differ
Binary files /tmp/qNbFv9J1ty/intel-microcode-3.20221108.2/intel-ucode/06-55-07 
and /tmp/Ekjb2KZejs/intel-microcode-3.20230214.1/intel-ucode/06-55-07 differ
Binary files /tmp/qNbFv9J1ty/intel-microcode-3.20221108.2/intel-ucode/06-55-0b 

Processed: unblock: intel-microcode/3.20230214.1

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:intel-microcode
Bug #1032847 [release.debian.org] unblock: intel-microcode/3.20230214.1
Added indication that 1032847 affects src:intel-microcode

-- 
1032847: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032847
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032827: marked as done (unblock: golang-golang-x-text/0.7.0-1)

2023-03-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 Mar 2023 11:26:58 +
with message-id 
and subject line unblock golang-golang-x-text
has caused the Debian Bug report #1032827,
regarding unblock: golang-golang-x-text/0.7.0-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032827: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032827
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian...@lists.debian.org

[ Filing as suggested by Sebastian.]

Hi,

This package was uploaded to unstable a few days ago, with the following
changelog, which a cursory look at `d`'s output seems to confirm:

   * New upstream version 0.7.0
 (with fixes to README.md and comments; no code change from 0.5.0)

This is rather unfortunate because it doesn't fit the freeze guidelines,
and coupled with the ongoing “let's trigger binNMUs to lower the amount
of source packages kept in testing just to satisfy Built-Using” rounds
of binNMUs, this is keeping some packages out of testing.

That's the case for crowdsec 1.4.6-1 which was scheduled to migrate
yesterday evening, which now has 1.4.6-1+b1 for all archs, and will need
to wait on golang-golang-x-text (only 3/10).

I haven't conducted any kind of deeper analysis about possible other
packages being held back specifically due to a Built-Using on that
package, but a grep on excuses.yaml suggests 957 packages (counting
binNMUs for all archs included) and 108 unique source packages getting
impacted by that upload.

I'll leave it up to the release team to implement whatever they feel is
best at this point. An age-days would help clear that new dependency for
many packages, but it feels wrong to ask for it given the upload wasn't
quite appropriate… Keeping the reportbug-generated hint for now:

unblock golang-golang-x-text/0.7.0-1

Thanks for your help!


Cheers,
-- 
Cyril Brulebois -- Debian Consultant @ DEBAMAX -- https://debamax.com/
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Bug#1032827: unblock: golang-golang-x-text/0.7.0-1

2023-03-12 Thread Cyril Brulebois
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian...@lists.debian.org

[ Filing as suggested by Sebastian.]

Hi,

This package was uploaded to unstable a few days ago, with the following
changelog, which a cursory look at `d`'s output seems to confirm:

   * New upstream version 0.7.0
 (with fixes to README.md and comments; no code change from 0.5.0)

This is rather unfortunate because it doesn't fit the freeze guidelines,
and coupled with the ongoing “let's trigger binNMUs to lower the amount
of source packages kept in testing just to satisfy Built-Using” rounds
of binNMUs, this is keeping some packages out of testing.

That's the case for crowdsec 1.4.6-1 which was scheduled to migrate
yesterday evening, which now has 1.4.6-1+b1 for all archs, and will need
to wait on golang-golang-x-text (only 3/10).

I haven't conducted any kind of deeper analysis about possible other
packages being held back specifically due to a Built-Using on that
package, but a grep on excuses.yaml suggests 957 packages (counting
binNMUs for all archs included) and 108 unique source packages getting
impacted by that upload.

I'll leave it up to the release team to implement whatever they feel is
best at this point. An age-days would help clear that new dependency for
many packages, but it feels wrong to ask for it given the upload wasn't
quite appropriate… Keeping the reportbug-generated hint for now:

unblock golang-golang-x-text/0.7.0-1

Thanks for your help!


Cheers,
-- 
Cyril Brulebois -- Debian Consultant @ DEBAMAX -- https://debamax.com/


Processed: unblock: flask-security/5.1.1-1

2023-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:flask-security
Bug #1032824 [release.debian.org] unblock: flask-security/5.1.1-1
Added indication that 1032824 affects src:flask-security

-- 
1032824: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032824
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems