Bug#1016732: node-sockjs throws: TypeError: Cannot read properties of undefined (reading 'addEventListener') at WebSocketReceiver.setUp

2022-08-06 Thread Yadd

On 06/08/2022 14:59, Nilesh Patra wrote:

Yadd,

Since you added in coffeescript patch for this package, I'd highly appreciate if
you could consider taking a look.


Hi,

is there a test somewhere to see this error ?



Bug#968670: src:liboqs/0.7.2~rc1-1 not affected by #968670

2022-08-06 Thread Andrius Merkys
Control: affects - src:liboqs

Hello,

src:liboqs/0.7.2~rc1-1 is no longer affected by this bug anymore.

Andrius



Bug#1016771: nmu: liboqs_0.7.2~rc1-1

2022-08-06 Thread Andrius Merkys
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hello,

I want to request binNMU on amd64 for recently accepted new package.

  nmu liboqs_0.7.2~rc1-1 . amd64 . unstable . -m "Rebuild on buildd"

Thanks,
Andrius



Bug#983146: 983146 RFS: bung/3.2.6-3 [ITP] -- backup next generation

2022-08-06 Thread Charles

Dear Bastian

I have uploaded a fixed version to 
https://mentors.debian.net/package/bung,  The QA information now shows


+ Package uses debhelper-compat
+ Package is the latest upstream version
+ Package is not native
– "Maintainer" email is the same as the uploader
– Package has lintian errors
bung
[I class items snipped]
E source-is-missing
[usr/share/doc/bung/Backup scripts next generation 3.2.x 
User Guide.htm]

P very-long-line-length-in-source-file
[several, only for .odt and .pdf files]
[X class items snipped]
+ Package closes ITP bug
– No VCS field present
– Package is not in Debian
– Upstream-Contact missing from d/copyright

I do not understand the E class item. "usr/share/doc/bung/Backup scripts 
next generation 3.2.x User Guide.htm" is present in bung_3.2.6.orig.tar.gz


Is there anything else you need me to fix?

Best

Charles



Bug#1016770: module does not build

2022-08-06 Thread Wolfgang Sourdeau

package: apfs-dkms
version: 0+git20220214+ds-2


Hi,

The module does not build with kernel 5.18.0.

Here is the failure message:


/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2/build/inode.c:524:10: 
error: ‘const struct address_space_operations’ has no member named 
‘invalidatepage’; did you mean ‘invalidate_folio’?

  524 | .invalidatepage = apfs_noop_invalidatepage,
  |  ^~
  |  invalidate_folio
/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2/build/inode.c:524:27: 
error: initialization of ‘sector_t (*)(struct address_space *, 
sector_t)’ {aka ‘long long unsigned int (*)(struct address_space *, long 
long unsigned int)’} from incompatible pointer type ‘void (*)(struct 
page *, unsigned int,  unsigned int)’ 
[-Werror=incompatible-pointer-types]

  524 | .invalidatepage = apfs_noop_invalidatepage,
  |   ^~~~
/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2/build/inode.c:524:27: 
note: (near initialization for ‘apfs_aops.bmap’)

  CC [M]  /var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2/build/namei.o
cc1: some warnings being treated as errors
make[1]: *** 
[/usr/src/linux-headers-5.18.0-3-common/scripts/Makefile.build:294 : 
/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2/build/inode.o] Erreur 1

make[1]: *** Attente des tâches non terminées
make: *** [/usr/src/linux-headers-5.18.0-3-common/Makefile:1862 : 
/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2/build] Erreur 2

make : on quitte le répertoire « /usr/src/linux-headers-5.18.0-3-amd64 »



Bug#1016769: ITP: elpa-snakemake -- support for editing and running snakemake files in emacs

2022-08-06 Thread Diane Trout
Package: wnpp
Owner: Diane Trout 
Severity: wishlist

* Package name: elpa-snakemake
  Version : 2.0.0
  Upstream Author : Kyle Meyer 
* URL or Web page : https://git.kyleam.com/snakemake-mode/about
* License : GPL-3+
  Description : support for editing and running snakemake files in emacs

The source repository is broken up into providing two emacs packages.

One snakemake.el provides support for running snakemake in an emacs
transient mode, the other snakemake-model.el adds syntax highlighting
for editing snakemake files within emacs.



Bug#805357: cups-pdf: Print job with multiple input files doesn't work

2022-08-06 Thread наб
Control: found 805357 3.0.1-14

Got bit by this on bullseye cups + (backported) sid cups-pdf.

In this case i can only reproduce this with a postscript file,
I'm using the attached one: specifying it thrice hangs the PDF process
below cupsd -l; I managed to unstick it by removing the respective
/var/spool/cups/d$job-* files and restarting cups.service.

In the case of attached, the output (when using just one) is
horrifically mangled, as compared to using something like gv(1)
(or a plain gs -dSAFER -dBATCH -dNOPAUSE  -r600  -sDEVICE=pdfwrite),
but that's another issue, I'm assuming? Or is this some aspect of this
postscript that explodes it both ways? Please advise.

Best,
наб


p1-20.ps.Z
Description: Binary data


signature.asc
Description: PGP signature


Bug#1016761: libhttp-daemon-perl: FTBFS with newer HTTP::Tiny versions

2022-08-06 Thread Thorsten Alteholz



On Sat, 6 Aug 2022, gregor herrmann wrote:


On Sat, 06 Aug 2022 21:24:08 +0300, Niko Tyni wrote:


It looks like the recent security fix in libhttp-daemon-perl_6.14-1.1
(or at least the associated test case) has issues with newer versions
of the HTTP::Tiny module.

[…]

From my build log:
   Subroutine HTTP::Tiny::Handle::write_content_body redefined at 
t/content_length.t line 277.


Oh, that is bad, shall these new tests better be disabled than?

  Thorsten

Bug#1016768: dino-im: please include patch to resolve known xmpp: links

2022-08-06 Thread Andres Salomon

Package: dino-im
Version: 0.3.0-2~bpo11+1
Severity: wishlist
Tags: patch

I authored a patch that resolves XMPP links (ie, xmpp:f...@bar.com) in 
messages, if the body of the XMPP link match a user in the roster. The 
upstream pull request is here - https://github.com/dino/dino/pull/1212 
Upstream hasn't commented on the patch yet, and I'm trying to get it 
upstream, but in the meantime I'd love to see it included in Debian.


I've been personally using this patch for 5 months now, and have had no 
stability problems. If an XMPP link matches a user in the roster, a 
roster contact display name is shown. If it doesn't match a roster 
user, nothing is changed. It's not entirely complete (xmpp links in 
notifications aren't resolved to roster names, for example), but it 
makes using Dino with 3rd party services that use XMPP links a whole 
lot nicer.


Please consider including it. I've attached the patch that I included 
in my own builds at https://people.debian.org/~dilinger/dino-im/ , if 
that's helpful.


>From ec2e6192d6cf01ab57326ac4cc9ffc99eae89f95 Mon Sep 17 00:00:00 2001
From: Andres Salomon 
Date: Sat, 12 Mar 2022 17:23:14 -0500
Subject: [PATCH] Display friendlier xmpp: links when a jid is in the roster

In jabber chats, there may be cases where an xmpp link is a valid
jid that's in an account's roster. For example, Cheogram's jmp.chat
service uses xmpp: links to support SMS group chat over jabber. In
jmp.chat's case, that ends up looking like a message coming from a
jid that has combined multiple phone numbers with the format
"+11231231234,+13213214...@cheogram.com", and message body beginning
with " " or
" " (depending on which phone number
the message is coming from).

Those jids aren't particularly user-friendly, so we'd instead like to
display the roster name while still keeping the underlying link
clickable. In order to do that, we modify Util.parse_add_markup_theme()
(since that's where the  html tag markup is created) to add a
callback function that takes a uri and returns what the  tag
should display. If the callback returns null, we just stick with the
default behavior of just displaying the link. However, if the uri
includes a jid that's in the user's roster, we return the name that's
in the roster. Util.parse_add_markup_theme() then uses that returned
name in the  tag.

A callback is used in order to keep the lookup generic, for future
uses. While the call to Util.parse_add_markup_theme() inside of
MessageItemWidget::generate_markup_text()'s non-muc code has a
callback that specifically only checks for xmpp: links, there's no
reason that it needs to be limited to that. It could handle any link;
for example, translating an http:// link to that same link but with
" (insecure)" appended to the end.
---
 .../message_widget.vala   | 12 ++-
 main/src/ui/util/helper.vala  | 31 ---
 2 files changed, 31 insertions(+), 12 deletions(-)

--- a/main/src/ui/conversation_content_view/message_widget.vala
+++ b/main/src/ui/conversation_content_view/message_widget.vala
@@ -200,7 +200,17 @@ public class MessageItemWidget : SizeReq
 if (conversation.type_ == Conversation.Type.GROUPCHAT) {
 markup_text = Util.parse_add_markup_theme(markup_text, conversation.nickname, true, true, true, Util.is_dark_theme(this), ref theme_dependent);
 } else {
-markup_text = Util.parse_add_markup_theme(markup_text, null, true, true, true, Util.is_dark_theme(this), ref theme_dependent);
+Util.LinkDisplay roster_lookup = (uri) => {
+string? s = null;
+if (GLib.Uri.parse_scheme(uri) == "xmpp") {
+try {
+Jid? j = new Jid(uri["xmpp:".length:uri.length]);
+s = Dino.get_real_display_name(stream_interactor, conversation.account, j);
+} catch (InvalidJidError e) { /* it's fine */ }
+}
+return s;
+};
+markup_text = Util.parse_add_markup_theme(markup_text, null, true, true, true, Util.is_dark_theme(this), ref theme_dependent, false, roster_lookup);
 }
 
 if (message.body.has_prefix("/me ")) {
--- a/main/src/ui/util/helper.vala
+++ b/main/src/ui/util/helper.vala
@@ -242,7 +242,9 @@ public static string parse_add_markup(st
 return parse_add_markup_theme(s_, highlight_word, parse_links, parse_text_markup, parse_text_markup, false, ref ignore_out_var);
 }
 
-public static string parse_add_markup_theme(string s_, string? highlight_word, bool parse_links, bool parse_text_markup, bool parse_quotes, bool dark_theme, ref bool theme_dependent, bool already_escaped_ = false) {
+public delegate string? LinkDisplay(string uri);
+
+public static string parse_add_markup_theme(string s_, string? highlight_word, bool parse_links, bool parse_text_markup, bool parse_quotes, bool dark_theme, ref bool theme_dependent, bool already_escaped_ = false, 

Bug#1016391: bullseye-pu: libhttp-daemon-perl/6.12-1+deb11u1

2022-08-06 Thread Thorsten Alteholz




On Sat, 6 Aug 2022, Adam D. Barratt wrote:

Please go ahead.


... and uploaded.

Thanks!
 Thorsten



Bug#884829: Still present in Debian 11

2022-08-06 Thread Martin Pavelek
A small update: I managed to rebuild the xserver-xorg-core package with 
the patch applied, but the leak persists. So while it manifests the same 
way and can be triggered by the same application, my problem seems to 
have a different cause.


On a second thought, it makes sense: if I understand it correctly, XAA, 
EXA, UXA etc. were replaced by Glamor in recent years. And from the Xorg 
log it seems that that's what my laptop uses (Intel HD 5500), so I 
should not experience any issues coming from the EXA code, right?


I'm not very experienced with Valgrind, but I'll send an update if I 
manage to set it up and find anything of interest.


Martin

P.S. I had no clue about this transition to Glamor; Debian now generally 
works well out of the box, so I'm not learning about new stuff by 
constantly fixing stuff. :))




Bug#1016767: aardvark-dns: incomplete package description

2022-08-06 Thread Daniele Forsi
Package: aardvark-dns
Severity: normal
X-Debbugs-Cc: dfo...@gmail.com

Dear maintainer,

I think that the description of this package is missing the word "Podman", 
where it says 
"...designed to work with but is..." the README.md says "...designed to work 
with Podman but is..."

thanks for your work in Debian,
Daniele



Bug#1016761: libhttp-daemon-perl: FTBFS with newer HTTP::Tiny versions

2022-08-06 Thread gregor herrmann
On Sat, 06 Aug 2022 21:24:08 +0300, Niko Tyni wrote:

> It looks like the recent security fix in libhttp-daemon-perl_6.14-1.1
> (or at least the associated test case) has issues with newer versions
> of the HTTP::Tiny module.
[…]
> From my build log:
>Subroutine HTTP::Tiny::Handle::write_content_body redefined at 
> t/content_length.t line 277.

Just a quick note:

That's from debian/patches/CVE-2022-31081-testcase.patch:

#v+
+sub patch_http_tiny {
+
+# we need to patch write_content_body
+# this is part of HTTP::Tiny internal module HTTP::Tiny::Handle
+#
+# the below code is from the original HTTP::Tiny module, where just two 
lines
+# have been commented out
+
+no strict 'refs';
+
+*HTTP::Tiny::Handle::write_content_body = sub {
+@_ == 2 || die(q/Usage: $handle->write_content_body(request)/ . "\n");
+my ($self, $request) = @_;
+
+my ($len, $content_length) = (0, 
$request->{headers}{'content-length'});
+while () {
+my $data = $request->{cb}->();
+
+defined $data && length $data
+or last;
+
+if ( $] ge '5.008' ) {
+utf8::downgrade($data, 1)
+or die(qq/Wide character in write_content()\n/);
+}
+
+$len += $self->write($data);
+}
+
+#   this should not be checked during our tests, we want to forge bad 
requests
+#   
+#   $len == $content_length
+#   or die(qq/Content-Length mismatch (got: $len expected: 
$content_length)\n/);
+
+return $len;
+};
+}
#v-


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   


signature.asc
Description: Digital Signature


Bug#1014705: xtables-addons 3.13-1+deb11u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1014705 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: xtables-addons
Version: 3.13-1+deb11u1

Explanation: support both old and new versions of security_skb_classify_flow()



Bug#1015244: commons-daemon 1.0.15-8+deb11u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1015244 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: commons-daemon
Version: 1.0.15-8+deb11u1

Explanation: fix JVM detection



Bug#1014315: dnsproxy 1.16-0.1+deb11u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1014315 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: dnsproxy
Version: 1.16-0.1+deb11u1

Explanation: listen on localhost by defualt, rather than the possibly 
unavailable 192.168.168.1



Bug#1016766: gnome-initial-setup: Please upgrade to 43

2022-08-06 Thread Jeremy Bicha
Source: gnome-initial-setup
Version: 42.2-1
Severity: wishlist
Control: block -1 by 1016765

Packaging gnome-initial-setup 43 won't be possible until we get a gtk4
version of webkit2gtk.

We can cherry-pick useful fixes (except for the switch to GTK4) to our
gnome-initial-setup 42 series package.

Thank you,
Jeremy Bicha



Bug#1016765: webkit2gtk: Please enable gtk4 build

2022-08-06 Thread Jeremy Bicha
Source: webkit2gtk
Version: 2.37.1-2
Severity: wishlist

Please consider enabling the gtk4 build. It is required for
gnome-initial-setup 43:
https://gitlab.gnome.org/GNOME/gnome-initial-setup/-/blob/master/NEWS

On the other hand, I do understand that maintaining a 3rd full build
(in addition to GTK3 4.0 and GTK3 4.1) is a lot. I'm ok with keeping
gnome-initial-setup at version 42 for Debian 12 "Bookworm" if the
extra build option isn't enabled in Debian for webkit2gtk 2.38.

Epiphany 43 still uses GTK3 so it is not affected yet. Perhaps for
Epiphany 44 next year.

I am unaware of anything else using webkitgtk with gtk4 yet.

gnome-control-center will depend on it too after a new
gnome-online-accounts release with GTK4 support (unclear how long that
will take).

Thank you,
Jeremy Bicha



Bug#1013732:

2022-08-06 Thread Leonard Lausen
Dear Maintainer, 

please enable the CONFIG_IEEE80211AX option. WiFi-6 compatible USB WiFi 
Adapters like CF-953AX based on chipset mt7921au are now available and it would 
be unfortunate to keep requiring Debian users to recompile hostapd to use them.

Thank you

Bug#1014705: bullseye-pu: package xtables-addons/3.13-1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 -moreinfo +confirmed

On Sat, 2022-08-06 at 20:57 +0100, Jeremy Sowden wrote:
> On 2022-08-06, at 19:24:52 +0100, Adam D. Barratt wrote:
> > Control: tags -1 + moreinfo
> > 
> > On Sun, 2022-07-10 at 17:19 +0100, Jeremy Sowden wrote:
> > > The related xtables-addons bug is:
> > > 
> > >   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014680
> > > 
> > > [ Reason ]
> > > xtables-addons-dkms and xtables-addons-source contain sources for
> > > building
> > > kernel modules with DKMS and module-assistant, respectively.  The
> > > 5.10.0-16
> > > kernel introduced in the 11.4 point release included a patch
> > > back-
> > > ported from
> > > 5.11 to 5.10.121:
> > > 
> > 
> > The metadata of #1014680 implies that it affects the package in
> > unstable and is not yet fixed there - is that correct? If so, then
> > the
> > fix needs to happen in unstable first; if not, please add an
> > appropriate fixed version to make the situation clearer.
> 
> The problem arose because an API-changing patch was back-ported from
> 5.11 to 5.10 and this was picked up by the kernel released in 11.4.
> 

This part was clear...

> The version of xtables-addons in unstable at the time 11.4 was
> released
> (3.19-1) supported the new API for kernel versions >= 5.11, and so
> was
> unaffected wrt. the kernel in unstable.
> 

...but this was not, at least to me, hence the question. Thanks for
clarifying.

> I have since uploaded the latest upstream release to unstable (3.21-
> 1),
> and that includes support for the problematic 5.10 kernels.  The
> patch I
> have added in 3.13-1+deb11u1 is the one from upstream.  I have added
> a
> fixed version to #1014680.
> 

Thanks.

> If you are happy to accept this change, is it a suitable candidate
> for
> stable-updates given that the package has been broken since 11.4 came
> out?

Potentially.

Regards,

Adam



Bug#1016672: grub2 2.06-3~deb11u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1016672 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: grub2
Version: 2.06-3~deb11u1

Explanation: new upstream release



Bug#1016037: libreoffice 7.0.4-4+deb11u2 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1016037 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: libreoffice
Version: 7.0.4-4+deb11u2

Explanation: support EUR in .hr locale; add HRK<->EUR conversion rate to Calc 
and the Euro Wizard; security fixes [CVE-2021-25636 CVE-2022-26305 
CVE-2022-26306 CVE-2022-26307]



Bug#1016655: dbus-broker 26-1+deb11u2 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1016655 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: dbus-broker
Version: 26-1+deb11u2

Explanation: fix assertion failure when disconnecting peer groups; fix memory 
leak; fix null pointer dereference [CVE-2022-31213]



Bug#1016764: libzookeeper-mt-dev: zookeeper.jute.h missing

2022-08-06 Thread Sorin Manolache
Package: libzookeeper-mt-dev
Version: 3.8.0-6
Severity: important
X-Debbugs-Cc: sor...@gmail.com

Dear Maintainer,

Neither libzookeeper-mt-dev nor libzookeeper-st-dev contain zookeeper.jute.h. 
Therefore no C/C++ code can be built that uses the zookeeper client library.

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.18.0-2-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libzookeeper-mt-dev depends on:
ii  libzookeeper-mt2  3.8.0-6

libzookeeper-mt-dev recommends no packages.

libzookeeper-mt-dev suggests no packages.

-- no debconf information



Bug#1014705: bullseye-pu: package xtables-addons/3.13-1

2022-08-06 Thread Jeremy Sowden
On 2022-08-06, at 19:24:52 +0100, Adam D. Barratt wrote:
> Control: tags -1 + moreinfo
> 
> On Sun, 2022-07-10 at 17:19 +0100, Jeremy Sowden wrote:
> > The related xtables-addons bug is:
> > 
> >   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014680
> > 
> > [ Reason ]
> > xtables-addons-dkms and xtables-addons-source contain sources for
> > building
> > kernel modules with DKMS and module-assistant, respectively.  The
> > 5.10.0-16
> > kernel introduced in the 11.4 point release included a patch back-
> > ported from
> > 5.11 to 5.10.121:
> > 
> 
> The metadata of #1014680 implies that it affects the package in
> unstable and is not yet fixed there - is that correct? If so, then the
> fix needs to happen in unstable first; if not, please add an
> appropriate fixed version to make the situation clearer.

The problem arose because an API-changing patch was back-ported from
5.11 to 5.10 and this was picked up by the kernel released in 11.4.

The version of xtables-addons in unstable at the time 11.4 was released
(3.19-1) supported the new API for kernel versions >= 5.11, and so was
unaffected wrt. the kernel in unstable.

I have since uploaded the latest upstream release to unstable (3.21-1),
and that includes support for the problematic 5.10 kernels.  The patch I
have added in 3.13-1+deb11u1 is the one from upstream.  I have added a
fixed version to #1014680.

If you are happy to accept this change, is it a suitable candidate for
stable-updates given that the package has been broken since 11.4 came
out?

J.


signature.asc
Description: PGP signature


Bug#997024: [greek]babel + cleveref + Roman pagenumbering + label = ☇

2022-08-06 Thread Peter Müller

Dear Toby,

I greatly apologize for bothering you again on this issue (I believe 
having received no answer), and I hope this doesn't disturb you.  Might 
I kindly ask you to look into https://bugs.debian.org/997024 and/or 
https://tex.stackexchange.com/questions/619875 ?


Thanks in advance,
Peter



Bug#1016369: IO::Handle ->error does not work, always saying "fine"

2022-08-06 Thread Ian Jackson
Niko Tyni writes ("Re: Bug#1016369: IO::Handle ->error does not work, always 
saying "fine""):
> Hi, thanks Ian for the report and Damyan for looking into the issues.

Indeed, thanks to you and to Damyan.
> > > Actual output
> > > 
> > > 0 Bad file descriptor
> > > 0 No space left on device
> 
> 
> FWIW I get 
> 
> 0 Is a directory 
> 1 No space left on device 
> 
> on sid (perl_5.34.0-5). I'm not sure why you'd expect -1. The documentation
> for IO::Handle::error() only mentions it reporting a true value.

Interesting.  I forget the details (can't easily check now) but some
test that passed for me gave -1.  I agree that 1 is better.

> The first issue (reading a directory as a plain file) seems to be about
> the error flag getting cleared when reading past EOF or something like
> that.

I used reading from a directory as an example for two reason:

Firstly, it was the situation that actually happened to me.  I was
writing a program and it had a bug that caused it to erroneously read
a directory, rather than some file within it.  The program became
convinced the "file" was empty, leading to strange malfunctions.  I
would have expected the file reading error checks ought to have
detected this earlier.

Secondly, having discovered this bug, reading from a directory is one
of very few ways to get something you can open() for reading, which
then returns errors if you call read(2).

Another way to obtain this erroneous behaviour is to pass a perl
script a stdin which is not, in fact, open for reading (easily
achieved with shell redirection).  However, I didn't use that for my
bug report (even though it does repro the bug) because STDIN seems
like it will have special magic.

I would love a more portable name for something which can be opened
for reading, but which can't then be read.

I think the reasons so few people have reported this bug before are as
follows:

1. This can only occur if you have something open for reading but
which turns out not to be readable.  In the absence of strange bugs,
that usually means a hardware failure resulting in EIO, which is very
rare.

2. If and when someone does get data loss due to this bug in a
situation where they got EIO due to hardware failure, they are very
likely to (a) be preoccupied with the disaster that is no doubt
unfolding (b) unable to precisely reproduce the situation or indeed
have precise and accurate records.

3. Very few people are so careful about error handling anyway, sadly.

So IMO the fact that this bug has been rarely reported does not mean
that it isn't a data loss bug.  Rather, it's a data loss bug which
mostly has the effect of burning up more things when your system is
already on fire.

> Anyway, the data loss argument seems misplaced given we've read all the
> data there is when we are at EOF?

No.

The handle in the test case can never be successfully read, so it has
*not* reached EOF.  All the calls to read(2) return errors.  If perl
claims that the handle has reached EOF, that is itself a bug.  (A data
loss bug, because a fslse EOF causes the rest of the data to be
ignored.)

I am almost certain that this bug would trip if you got EIO while
trying to read a plain file.  (But this is hard to test.)

> See also https://github.com/Perl/perl5/issues/12782 which has not
> received attention in almost ten years.

Yikes.  That does seem like the very same bug.

> The second issue (writing to /dev/full) is indeed fixed in sid / Perl
> 5.34.  It was https://github.com/Perl/perl5/issues/6799 and reportedly
> only affects things like character devices (including /dev/full) and
> sockets. I've verified that trying to write to a normal file on a full
> filesystem does set the error() flag on stable / Perl 5.32.

I wonder what is different about plain files.  I suspect the fact that
it "works" (correctly returning errors) for you in this case may be
due to luck (the precise series of calls).

> I think that makes the issue less severe, and I'm not very inclined to
> fix it in stable.  But in case we end up doing that anyway, these would
> be the commits needed:
> 
> 
> https://github.com/Perl/perl5/commit/89341f87f9fc65c4d7133e497bb04586e86b8052
> 
> https://github.com/Perl/perl5/commit/8a2562bec7cd9f8eff6812f340f99028bb33
> 
> Downgrading the severity, but let me know what you think based on the above.

I still think this is a data loss bug.  (Two bugs.)

I will think about trying to produce more convincing repros.  Would
you convinced by something involving an LD_PRELOAD to cause "syscalls"
to fail ?  Something involving ptrace ?

Damyan writes:
> Note that the recommended way to read files line by line is (perldoc 
> -f readline):
> 
> while ( ! eof($fh) ) {
> defined( $_ = readline $fh ) or die "readline failed: $!";
> ...
> }

I don't find this particularly convincing.  This argument seems to be
saying "never use <> to read lines" which is pretty strange.  Surely
it should be possible to use 

Bug#942399: rxvt-unicode: server lockup making all clients unresponsive

2022-08-06 Thread Marcin Szewczyk
On Tue, 15 Oct 2019 13:49:07 -0400 rharw...@club.cc.cmu.edu wrote:
> Occasionally, I will see urxvtc process become unresponsive to keyboard
> input.  It seems like processes may still be able to update their panes - my
> mosh session keeps updating the screen, for instance.

Hi,

after upgrading to bullseye I started experiencing a similar thing. This
might be a problem of urxvt interacting with ibus. Apparently this has a
long history.

See:
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753611
- http://lists.schmorp.de/pipermail/rxvt-unicode/2010q2/001177.html
- 
https://askubuntu.com/questions/746119/upgrade-ibus-or-export-ibus-enable-sync-mode-1-to-fix-intellij-android-studio
  because of the IBUS_ENABLE_SYNC_MODE remark

I do not use the daemon mode and it seems I did not have ibus daemon
installed before bullseye.

In my case input hangs from time to time after closing a tab using ^D.
>From technical point of view XFilterEvent() in rxvttoolkit.C starts
returning true for all key presses so urxvt stops processing them.

Running `ibus restart` unfreezes my terminals.

-- 
Marcin Szewczyk
http://wodny.org



Bug#1015717: gajim: crashes at startup: KeyError: 'proxies' in optparser.py

2022-08-06 Thread Stefan Kropp
Hello,

the upstream project solved this in Release 1.4.7 (see upstream
issue). gajim 1.4.7 is available in debian unstable, testing and
stable-bpo.

-- 
Stefan
Diese E-Mail wurde von einem Debian GNU/Linux System gesendet



Bug#1016763: transition: foonathan-memory

2022-08-06 Thread Timo Röhling
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Release Team,

I'd like to transition foonathan-memory after a SONAME bump.
Its reverse dependency fastdds builds fine on amd64.

The auto-generated transition
https://release.debian.org/transitions/html/auto-foonathan-memory.html
also looks good.


Cheers
Timo


-BEGIN PGP SIGNATURE-
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=oEaE
-END PGP SIGNATURE-



Bug#1016719: dask: test_query_with_meta fails on 32 bit arches

2022-08-06 Thread Diane Trout
On Sat, 2022-08-06 at 03:15 +0200, Drew Parsons wrote:
> Source: dask
> Version: 2022.02.0+dfsg-1
> Severity: normal
> Control: forwarded -1 https://github.com/dask/dask/issues/8620
> 
> dask 2022.02.0 is failing two CI tests on 32 bit arches (armhf,
> i386), 
> one in test_query_with_meta, the other in test_categorize_info
> 
> The test_query_with_meta error is reported upstream at
> https://github.com/dask/dask/issues/8620
> 
> The test_categorize_info error was dealt with upsteam with your patch
> applied in https://github.com/dask/dask/pull/8851 which should be
> applied in the 2022.04.0 release.

Those seem reasonable things to backport, I'll try to get to it soon.

> 
> Since we've got the pyarrow dependency getting in the way of
> upgrading
> to the more recent dask releases as noted in Bug#1013080, should we
> pull
> in the PR#8851 patch to debian/patches to fix test_categorize_info ?
> 
> 

I did learn someone started packaging arrow and looks like they got
somewhere, but I'm not sure how much more is needed to get it into NEW.

https://salsa.debian.org/science-team/arrow/

Diane



Bug#1016726: ITP: libcommuni -- A cross-platform IRC framework written with Qt

2022-08-06 Thread Tobias Frost
Package: wnpp
Followup-For: Bug #1016726
Control: tags -1 pending

Uploaded and it is now in NEW.



Bug#1003911: ITA: xplanet -- planetary body renderer

2022-08-06 Thread Alexander Reichle-Schmehl
retitle 1003911 ITA: xplanet -- planetary body renderer
owner 1003911 !
thanks

I intent to addopt xplanet.



Bug#1014705: bullseye-pu: package xtables-addons/3.13-1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + moreinfo

On Sun, 2022-07-10 at 17:19 +0100, Jeremy Sowden wrote:
> The related xtables-addons bug is:
> 
>   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014680
> 
> [ Reason ]
> xtables-addons-dkms and xtables-addons-source contain sources for
> building
> kernel modules with DKMS and module-assistant, respectively.  The
> 5.10.0-16
> kernel introduced in the 11.4 point release included a patch back-
> ported from
> 5.11 to 5.10.121:
> 

The metadata of #1014680 implies that it affects the package in
unstable and is not yet fixed there - is that correct? If so, then the
fix needs to happen in unstable first; if not, please add an
appropriate fixed version to make the situation clearer.

Regards,

Adam



Bug#1016761: libhttp-daemon-perl: FTBFS with newer HTTP::Tiny versions

2022-08-06 Thread Niko Tyni
Source: libhttp-daemon-perl
Version: 6.14-1.1
Severity: important
Tags: ftbfs
User: debian-p...@lists.debian.org
Usertags: perl-5.36-transition
X-Debbugs-Cc: Thorsten Alteholz 

It looks like the recent security fix in libhttp-daemon-perl_6.14-1.1
(or at least the associated test case) has issues with newer versions
of the HTTP::Tiny module. This includes the separately packaged one
in sid (libhttp-tiny-perl_0.082-1) and the one bundled with Perl 5.36
(currently in experimental).

Reproducible in current sid by passing something like
  --add-depends='libhttp-tiny-perl (>= 0.080)'
to sbuild, triggering the installation of the separate package.

>From my build log:

   Subroutine HTTP::Tiny::Handle::write_content_body redefined at 
t/content_length.t line 277.
   
   #   Failed test '... and has expected status'
   #   at t/content_length.t line 36.
   #  got: '200'
   # expected: '400'
   
   #   Failed test '... and body does match'
   #   at t/content_length.t line 40.
   #   ''
   # doesn't match '(?^:value must be an unsigned integer)'
   
   #   Failed test '... and has expected status'
   #   at t/content_length.t line 36.
   #  got: '200'
   # expected: '400'
   
   #   Failed test '... and body does match'
   #   at t/content_length.t line 40.
   #   ''
   # doesn't match '(?^:value must be an unsigned integer)'
   
   #   Failed test '... and has expected status'
   #   at t/content_length.t line 36.
   #  got: '200'
   # expected: '400'
   
   #   Failed test '... and body does match'
   #   at t/content_length.t line 40.
   #   ''
   # doesn't match '(?^:value must be an unsigned integer)'
   # Looks like you failed 6 tests of 30.
   t/content_length.t . 
   ok 1 - Hello World Request ... it works as expected
   ok 2 - ... and has expected status
   ok 3 - ... and body does match
   ok 4 - Positive Content Length
   not ok 5 - ... and has expected status
   not ok 6 - ... and body does match
   ok 7 - Negative Content Length
   not ok 8 - ... and has expected status
   not ok 9 - ... and body does match
   ok 10 - Non Integer Content Length
   not ok 11 - ... and has expected status
   not ok 12 - ... and body does match
   ok 13 - Explicit Content Length ... with exact length
   ok 14 - ... and has expected status
   ok 15 - ... and body does match
   ok 16 - Implicit Content Length ... will always pass
   ok 17 - ... and has expected status
   ok 18 - ... and body does match
   ok 19 - Shorter Content Length ... gets truncated
   ok 20 - ... and has expected status
   ok 21 - ... and body does match
   ok 22 - Different Content Length ... must fail
   ok 23 - ... and has expected status
   ok 24 - ... and body does match
   ok 25 - Underscore Content Length ... must match
   ok 26 - ... and has expected status
   ok 27 - ... and body does match
   ok 28 - Longer Content Length ... gets timeout
   ok 29 - ... and has expected status
   ok 30 - ... and body does match
   1..30
   Dubious, test returned 6 (wstat 1536, 0x600)
   Failed 6/30 subtests 

-- 
Niko Tyni   nt...@debian.org



Bug#1016760: RM: golang-github-templexxx-xor -- ROM; superseded by templexxx-xorsimd

2022-08-06 Thread Nilesh Patra
Package: ftp.debian.org
Severity: normal
X-Debbugs-Cc: debian...@lists.debian.org

Hi,

golang-github-templexxx-xor has been superseeded by 
golang-github-templexxx-xorsimd.
Its only reverse dep golang-github-audriusbutkevicius-kcp-go-dev has been asked
to be removed in #1016705.
Rest reverse-deps have migrated to xorsimd.

The removal has been ACK'ed by its uploader here[1]

Hence, please consider removing this package from the archive.

[1]: https://lists.debian.org/debian-go/2022/08/msg00015.html

Best,
Nilesh



Bug#1002956: New debdiff

2022-08-06 Thread Adam D. Barratt
On Sat, 2022-01-29 at 22:53 +0100, Thomas Goirand wrote:
> On 1/29/22 20:31, Salvatore Bonaccorso wrote:
> > Control: tags -1 + moreinfo
> > 
> > Hi Thomas,
> > 
> > On Sat, Jan 29, 2022 at 07:55:15PM +0100, Thomas Goirand wrote:
> > > My appologies for opening a new bug. I didn't realize #1002956
> > > was still
> > > pending my input. I merged both bugs.
> > > 
> > > Please see, attached to this message, the new debdiff, adding the
> > > fix for
> > > CVE-2021-22116 as well.
> > 
> > See my comment from
> > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002956#10 .
> > Isn't
> > the the debian/patches/series missing the listing of
> > CVE-2021-32718_Escape_username_before_displaying_it.patch to
> > actually
> > apply the patch?
> > 
> > Regards,
> > Salvatore
> 
> Correct, fixed, thanks and sorry for the mistake.
> 

+  * Stop moving mv /etc/rabbitmq/rabbitmq.conf /etc/rabbitmq/rabbitmq-env.conf.

This could do with an explanation as to _why_ this move should not be
happening.

+   if ! [ -e /var/lib/rabbitmq/.erlang.cookie ] ; then
+   OLD_UMASK=$(umask)
+   umask 077; openssl rand -base64 -out 
/var/lib/rabbitmq/.erlang.cookie 42
+   umask ${OLD_UMASK}
+   else
+   # This matches an Erlang generated cookie file: 20 upper case 
chars
+   if grep -q -E '^[A-Z]{20}$' /var/lib/rabbitmq/.erlang.cookie ; 
then
+   OLD_UMASK=$(umask)
+   umask 077; openssl rand -base64 -out 
/var/lib/rabbitmq/.erlang.cookie 42
+   umask ${OLD_UMASK}
+   if [ ""$(ps --no-headers -o comm 1) = "systemd" ] ; then
+   if systemctl is-active --quiet 
rabbitmq-server.service ; then
+   systemctl restart 
rabbitmq-server.service
[...]
+Since 3.9.8-3, the rabbitmq-server node will use openssl to generate a
+cryptographically-secure cookie during first installation, mitigating
+this vulnerability.
+
+Servers which installed a prior version, and are upgrading to 3.9.8-3
+or higher, ARE STILL VULNERABLE, as the package will not regenerate
+the secret if it exists already.  This is because the secret is
+designed to be shared between nodes in a cluster, and thus
+regenerating it would break existing clusters.

This seems to be inaccurate. The latter block quoted above specifically
*does* regenerate an existing secret if it deems it to be not "good
enough", so far as I can tell?

Regards,

Adam



Bug#1016369: IO::Handle ->error does not work, always saying "fine"

2022-08-06 Thread Niko Tyni
Control: severity -1 normal

Hi, thanks Ian for the report and Damyan for looking into the issues.

On Sun, Jul 31, 2022 at 11:37:09AM +0300, Damyan Ivanov wrote:
> -=| Ian Jackson, 30.07.2022 13:42:05 +0100 |=-
> > Package: perl
> > Version: 5.34.0-4
> > Severity: grave
> > 
> > To reproduce
> > 
> > perl -MIO::Handle -e 'open X, "<", "." or die $!; $_ = ; printf "%s 
> > %s %s\n", X->error(), $!;'
> > perl -MIO::Handle -e 'open X, ">", "/dev/full" or die $!; print X 1; 
> > flush X; printf "%s %s %s\n", X->error(), $!; close X'
> > 
> > Expected output
> > 
> > -1 Bad file descriptor
> > -1 No space left on device
> > 
> > Actual output
> > 
> > 0 Bad file descriptor
> > 0 No space left on device


FWIW I get 

0 Is a directory 
1 No space left on device 

on sid (perl_5.34.0-5). I'm not sure why you'd expect -1. The documentation
for IO::Handle::error() only mentions it reporting a true value.

The first issue (reading a directory as a plain file) seems to be about
the error flag getting cleared when reading past EOF or something like
that. According to my meager debugger skills, the clearing happens around

  https://sources.debian.org/src/perl/5.34.0-5/pp_hot.c/#L3278

As Damyan notes, you can detect this by checking for EOF before reading,
although

   perl -MIO::Handle -e 'open X, "<", "." or die $!; $_ =  if !X->eof(); 
printf "%s %s\n", X->error(), $!;'
   1 Inappropriate ioctl for device 

is not quite what I'd expect either.

Anyway, the data loss argument seems misplaced given we've read all the
data there is when we are at EOF?

I can see there is probably a bug around here, but it would be good
to have an example test case that doesn't involve treating a directory
as a plain file (which can have very varying results between different
platforms) before taking this upstream. Particularly so if you want to
argue it's as serious as claimed here.

See also https://github.com/Perl/perl5/issues/12782 which has not
received attention in almost ten years.


The second issue (writing to /dev/full) is indeed fixed in sid / Perl
5.34.  It was https://github.com/Perl/perl5/issues/6799 and reportedly
only affects things like character devices (including /dev/full) and
sockets. I've verified that trying to write to a normal file on a full
filesystem does set the error() flag on stable / Perl 5.32.

I think that makes the issue less severe, and I'm not very inclined to
fix it in stable.  But in case we end up doing that anyway, these would
be the commits needed:


https://github.com/Perl/perl5/commit/89341f87f9fc65c4d7133e497bb04586e86b8052


https://github.com/Perl/perl5/commit/8a2562bec7cd9f8eff6812f340f99028bb33

Downgrading the severity, but let me know what you think based on the above.
-- 
Niko



Bug#1016759: easy-rsa: regression?: Conflicting 'vars' files found

2022-08-06 Thread Daniel Shahaf
Package: easy-rsa
Version: 3.1.0-0.1
Severity: normal

Dear Maintainer,

Consider the following sequence of commands:

% make-cadir foo
% cd foo
% ./easyrsa init-pki
% ./easyrsa build-ca

In a fresh bullseye chroot (3.0.8-1), that sequence succeeds:

CA creation complete and you may now import and sign cert requests.
Your new CA certificate file for publishing is at:
…/pki/ca.crt

In a sid chroot from today (3.1.0-0.1), that sequence fails with:

# ./easyrsa build-ca 
Found: …/pki/vars
Found: …/vars

Easy-RSA error:

Conflicting 'vars' files found.

Priority should be given to your PKI vars file:
* /root/sid/pki/vars

I don't use easy-rsa, but this seems like a regression.

HTH,

Daniel

P.S. The changelog of this version includes the item "autopkgtests: Remove
conflicting vars file", which may be related.


Bug#1015254: transition: opencascade

2022-08-06 Thread Tobias Frost
Hi,

On Mon, Aug 01, 2022 at 08:29:45AM +0100, Graham Inggs wrote:
> Control: tags -1 confirmed
> 
> Hi Tobi
> 
> On Sun, 31 Jul 2022 at 16:51, Tobias Frost  wrote:
> > I've uploading 7.6.3 right now to experimental; as I removed the confirmed 
> > tag, please reACK
> > the "go ahead" -- I've tested that all r-depends that worked before are 
> > still compiling
> 
> reACK

opencascade has now built on all release archs.

I'd suggest to start binNMU freecad

and maybe then proceed to remove netgen together with gmsh and deal.ii 
temporarily from testing.
(the later two need an updated netgen…)

(I'll poked the maintainer of netgen already, but no respons… 
As netgen has a "+really" version without really documenting the reason, I fear 
if I NMU
a newer version I could break stuff…)

-- 
Cheers,
tobi 



Bug#848578: Also running into this problem

2022-08-06 Thread Francois Marier
I can also reproduce this problem with `ts` while `date` works fine:

  $ date | ts
  ao� 06 10:33:36 sam 06 aoû 2022 10:33:36 PDT

  $ date
  sam 06 aoû 2022 10:35:39 PDT

  $ echo test | ts
  ao� 06 10:36:04 test

This is what my locale is set to:

  $ locale
  LANG=fr_CA.utf8
  LANGUAGE=
  LC_CTYPE="fr_CA.utf8"
  LC_NUMERIC="fr_CA.utf8"
  LC_TIME="fr_CA.utf8"
  LC_COLLATE="fr_CA.utf8"
  LC_MONETARY="fr_CA.utf8"
  LC_MESSAGES="fr_CA.utf8"
  LC_PAPER="fr_CA.utf8"
  LC_NAME="fr_CA.utf8"
  LC_ADDRESS="fr_CA.utf8"
  LC_TELEPHONE="fr_CA.utf8"
  LC_MEASUREMENT="fr_CA.utf8"
  LC_IDENTIFICATION="fr_CA.utf8"
  LC_ALL=

  $ cat /etc/locale.gen | grep -v '^#'
  en_CA.UTF-8 UTF-8
  en_NZ.UTF-8 UTF-8
  fr_CA.UTF-8 UTF-8

Let me know if there's anything else I can provide to help reproduce the
problem.

Francois

-- 
https://fmarier.org/



Bug#1014447: bullseye-pu: package lwip/2.1.2+dfsg1-8

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Wed, 2022-07-06 at 11:26 +0200, Joan Lledó wrote:
> This patch fixes  CVE-2020-22283 and  CVE-2020-22284 in bullseye.
> 

Please go ahead.

Regards,

Adam



Bug#1014315: bullseye-pu: package dnsproxy/1.16-0.1+deb11u1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2022-07-03 at 18:01 -0300, Marcos Talau wrote:
> The dnsproxy package fails to install when you do not have the IP
> address "192.168.168.1" configured on the machine. This bug remains
> since its initial release.
> 

Please go ahead.

Regards,

Adam



Bug#1014571: bullseye-pu: package node-log4js/6.3.0+~cs8.3.10-1+deb11u1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Fri, 2022-07-08 at 07:49 +0200, Yadd wrote:
> node-log4js creates log files with permissive rights (644). This
> causes
> a security issue (CVE-2022-21704)
> 

Please go ahead.

Regards,

Adam



Bug#1015244: bullseye-pu: package commons-daemon/1.0.15-8

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2022-07-18 at 12:10 +0200, Chris Hofstaedtler wrote:
> Running a java daemon using jsvc and the JVM from (old)stable does
> not
> work. It appears no java programs inside Debian still use jsvc,
> otherwise people would have noticed earlier. This is bug #935336,
> and I want to fix it in oldstable/buster (#1015243) and
> stable/bullseye
> (this bug).
> 
> [ Impact ]
> 
> jsvc just does not work except if on upgrades one keeps the JVM from
> oldoldstable (openjdk 8).
> 

Please go ahead.

Regards,

Adam



Bug#1014900: bullseye-pu: package node-moment/2.29.1+ds-2+deb11u2

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Thu, 2022-07-14 at 07:44 +0200, Yadd wrote:
> node-moment is vulnerable to ReDoS (#1014845, CVE-2022-31129)
> 

Please go ahead.

Regards,

Adam



Bug#1016199: bullseye-pu: package gif2apng/1.9+srconly-3+deb11u1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Fri, 2022-07-29 at 08:59 +0200, Håvard F.Aasen wrote:
> This upload fixes three CVE's;
> * CVE-2021-45909, Closes: #1002668:
>   heap based buffer overflow in the DecodeLZW
> * CVE-2021-45910, Closes: #1002667:
>   heap-based buffer overflow within the main function
> * CVE-2021-45911, Closes: #1002687:
>   heap based buffer overflow in processing of delays in the main
> function
> 

Please go ahead.

Regards,

Adam



Bug#1016458: bullseye-pu: package dovecot/2.3.13+dfsg1-2+deb11u1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2022-07-31 at 18:06 -0700, Noah Meyerhans wrote:
> Dovecot 2.3.13+dfsg1-2+deb11u1 contains a backported fix for #1016351
> (CVE-2022-30550).  The fix is cherry-picked from upstream and is
> identical
> to the fix recently uploaded to unstable in dovecot_2.3.19.1+dfsg1-
> 2.  The
> stable security team and the package maintainers have determined that
> this
> issue does not warrant a DSA and should be fixed in the next bullseye
> point release.
> 

Please go ahead.

Regards,

Adam



Bug#1016391: bullseye-pu: libhttp-daemon-perl/6.12-1+deb11u1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sat, 2022-07-30 at 22:11 +, Thorsten Alteholz wrote:
> The attached debdiff for libhttp-daemon-perl fixes CVE-2022-31081 in 
> Bullseye. This CVE has been marked as no-dsa by the security team.
> 
> The patch is accompanied by a new test and should not create any
> issue.
> 

Please go ahead.

Regards,

Adam



Bug#991120: buster-pu: package postsrsd/1.5-2+deb10u2

2022-08-06 Thread Adam D. Barratt
Control: tags -1 -moreinfo +confirmed

On Sun, 2021-07-18 at 18:29 +0100, Adam D. Barratt wrote:
> Control: tags -1 + moreinfo
> 
> On Wed, 2021-07-14 at 22:00 +0200, Oxan van Leeuwen wrote:
> > [ Checklist ]
> >   [x] *all* changes are documented in the d/changelog
> >   [x] I reviewed all changes and I approve them
> >   [x] attach debdiff against the package in (old)stable
> >   [ ] the issue is verified as fixed in unstable
> > 
> > As of writing the fix isn't in unstable yet, since I don't have
> > upload rights. 
> > I've asked my sponsor to upload the fix for both stable and
> > unstable
> > at the 
> > same time -- it seemed unnecessary to add another roundtrip delay,
> > as
> > it's 
> > exactly the same fix.
> 
> Tagging as "moreinfo" for now on that basis. Please remove the tag
> once
> the upload has happened.
> 

Apparently the unstable upload happened at some point, but the tag was
never removed.

If this is still something you're interested in fixing in buster,
please go ahead.

Regards,

Adam



Bug#983841: buster-pu: package libvirt-php/0.5.4-3+deb10u1

2022-08-06 Thread Adam D. Barratt
Control: tags -1 -moreinfo + confirmed

On Wed, 2021-03-17 at 18:32 +, Adam D. Barratt wrote:
> Control: tags -1 + moreinfo
> 
> On Tue, 2021-03-02 at 08:47 +0100, Ondřej Surý wrote:
> > [ Reason ]
> > The package update fixes segmentation fault caused by incomplete
> > PHP
> > 7.3 support
> > in the upstream package.
> > 
> > [ Impact ]
> > The PHP crashes when calling libvirt_node_get_cpu_stats (See
> > #982804)
> 
> The metadata for that bug implies that it affects the package in
> unstable, and is not yet fixed there. Is that correct?
> 

That appears to have been resolved in the meantime.

If this is something that you're still interested in fixing in buster,
please go ahead.

Regards,

Adam



Bug#983531: buster-pu: package python2.7/2.7.16-2+deb10u2

2022-08-06 Thread Adam D. Barratt
Hi Moritz,

On Thu, 2021-03-18 at 20:17 +0100, Moritz Mühlenhoff wrote:
> Am Sat, Mar 13, 2021 at 06:46:38PM + schrieb Adam D. Barratt:
> > On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote:
> > > On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> > > > On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> > > > > +  * CVE-2021-3177
> > > > 
> > > > are all the ctypes tests passing with this patch? See #983516.
> > > 
> > > I'll have a look at Marc' updated patch and revise if needed.
> > 
> > Was there a conclusion on that?
> 
> I won't have time for preparing/testing a revised update, this will
> need to wait for 10.10

Are you still looking at getting this fixed in buster?

Regards,

Adam



Bug#1015243: commons-daemon 1.0.15-8+deb10u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1015243 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: commons-daemon
Version: 1.0.15-8+deb10u1

Explanation: fix JVM detection



Bug#1016671: grub2 2.06-3~deb10u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1016671 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: grub2
Version: 2.06-3~deb10u1

Explanation: new upstream release



Bug#1012048: composer 1.8.4-1+deb10u2 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1012048 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: composer
Version: 1.8.4-1+deb10u2

Explanation: fix code injection vulnerability [CVE-2022-24828]; update GitHub 
token pattern; use Authorization header instead of deprecated access_token 
query parameter



Bug#1011943: php-guzzlehttp-psr7 1.4.2-0.1+deb10u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1011943 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: php-guzzlehttp-psr7
Version: 1.4.2-0.1+deb10u1

Explanation: fix improper header parsing [CVE-2022-24775]



Bug#1011030: htmldoc 1.9.3-1+deb10u4 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1011030 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: htmldoc
Version: 1.9.3-1+deb10u4

Explanation: fix infinite loop [CVE-2022-24191], integer overflow issues 
[CVE-2022-27114] and heap buffer overflow issue [CVE-2022-28085]



Bug#1010858: unrar-nonfree 5.6.6-1+deb10u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1010858 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: unrar-nonfree
Version: 5.6.6-1+deb10u1

Explanation: fix directory traversal issue [CVE-2022-30333]



Bug#1010380: flac 1.3.2-3+deb10u2 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1010380 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: flac
Version: 1.3.2-3+deb10u2

Explanation: fix out-of-bounds write issue [CVE-2021-0561]



Bug#1010060: mutt 1.10.1-2.1+deb10u6 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1010060 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: mutt
Version: 1.10.1-2.1+deb10u6

Explanation: fix uudecode buffer overflow [CVE-2022-1328]



Bug#1009652: nvidia-graphics-drivers 418.226.00-3 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1009652 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: nvidia-graphics-drivers
Version: 418.226.00-3

Explanation: new upstream release



Bug#1009076: minidlna 1.2.1+dfsg-2+deb10u3 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1009076 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: minidlna
Version: 1.2.1+dfsg-2+deb10u3

Explanation: validate HTTP requests to protect against DNS rebinding attacks 
[CVE-2022-26505]



Bug#1009251: fribidi 1.0.5-3.1+deb10u2 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1009251 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: fribidi
Version: 1.0.5-3.1+deb10u2

Explanation: fix buffer overflow issues [CVE-2022-25308 CVE-2022-25309]; fix 
crash [CVE-2022-25310]



Bug#1008578: golang-github-russellhaering-goxmldsig 0.0~git20170911.b7efc62-1+deb10u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1008578 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: golang-github-russellhaering-goxmldsig
Version: 0.0~git20170911.b7efc62-1+deb10u1

Explanation: fix NULL pointer dereference issue [CVE-2020-7711]



Bug#1009065: dropbear 2018.76-5+deb10u1 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1009065 = buster pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian buster.

Thanks for your contribution!

Upload details
==

Package: dropbear
Version: 2018.76-5+deb10u1

Explanation: fix possible username enumeration issue [CVE-2019-12953]



Bug#1016756: transition: meshoptimizer

2022-08-06 Thread Timo Röhling
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Release Team,

I'd like to transition meshoptimizer after a SONAME bump.
The only reverse dependency, filament, builds fine on amd64.

The auto-generated transition
https://release.debian.org/transitions/html/auto-meshoptimizer.html
also looks good.


Cheers
Timo


-BEGIN PGP SIGNATURE-
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=HMqu
-END PGP SIGNATURE-



Bug#1003911: RFA: xplanet -- planetary body renderer

2022-08-06 Thread Alexander Reichle-Schmehl
Hi Steve!

I noticed you are searching someone to adopt xplanet. I'm still using it
from time to time and am also looking for something to slowly getting
back.  Would you mind if I adtopt it?

I think one of the first stept would be, to check (and upload) the 1.3.1
release.


Best regards,
  Alexander



Bug#1003911: RFA: xplanet -- planetary body renderer

2022-08-06 Thread Steve McIntyre
Hey! Nice to see you back around! :-)

On Sat, Aug 06, 2022 at 06:16:53PM +0200, Alexander Reichle-Schmehl wrote:
>
>I noticed you are searching someone to adopt xplanet. I'm still using it
>from time to time and am also looking for something to slowly getting
>back.  Would you mind if I adtopt it?
>
>I think one of the first stept would be, to check (and upload) the 1.3.1
>release.

Sure, all yours! Have fun. :-)

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"Every time you use Tcl, God kills a kitten." -- Malcolm Ray



Bug#1014324: rustc-mozilla 1.59.0+dfsg1-1~deb11u3 flagged for acceptance

2022-08-06 Thread Adam D Barratt
package release.debian.org
tags 1014324 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: rustc-mozilla
Version: 1.59.0+dfsg1-1~deb11u3

Explanation: fix use of mips stage0 binaries



Bug#1010338: autopkgtest: Option --test-name and debian/tests/control test-name raise exception

2022-08-06 Thread Guilhem Moulin
Control: tag -1 patch

The trivial patch attached fixes the exception.  Seems it was a
regression caused by the fix for #960267.

cheers
-- 
Guilhem.
diff --git a/lib/testdesc.py b/lib/testdesc.py
index 3e696a2..39e1ecb 100644
--- a/lib/testdesc.py
+++ b/lib/testdesc.py
@@ -678,7 +678,7 @@ def parse_debian_source(srcdir, testbed_caps, testbed_arch, control_path=None,
 raise InvalidControl('*', 'missing "Tests" or "Test-Command"'
  ' field')
 except Unsupported as u:
-if testname is None or n == testname:
+if testname is None:
 u.report()
 some_skipped = True
 


signature.asc
Description: PGP signature


Bug#1016695: po4a: Strange behaviour with repeated strings (in halibut backend)

2022-08-06 Thread Helge Kreutzmann
Hello Martin,
On Sat, Aug 06, 2022 at 05:24:48PM +0200, Martin Quinson wrote:
> Hello,

thanks for the analysis and the hints for sgt-puzzles.

> Le samedi 06 août 2022 à 06:20 +0200, Helge Kreutzmann a écrit :
> > 
> > On Sat, Aug 06, 2022 at 12:23:48AM +0200, Martin Quinson wrote:
> > > the short answer is that po4a-gettextize is not intended to be used on a
> > > regular
> > > basis. It's only intended for the first run when you want to convert an
> > > existing
> > > translation to the po-based workflow. Once it's done, you're supposed to 
> > > use
> > > po4a-updatepo to create an empty PO file. Even better, you should use po4a
> > > directly instead of the deprecated atomic commands.
> > 
> > Ok, so this would be incorrect usage in sgt-puzzles? It did work for
> > the past ~ 13 years. Then it might be helpful to add a note that
> > certain use cases are not working anymore.
> > 
> > Should this bug be cloned to sgt-puzzles for updating its
> > infrastructure?
> 
> The fact is that I never imagined that someone would use po4a-gettextize on a
> regular basis, to create the empty POT file. I would have added a note in the
> changelog if I knew. I see the intend now, but this is not a usecase that I 
> plan
> to maintain. I just added a check to po4a-gettextize which makes it break if 
> you
> call it without localized files, as you would do to generate the empty POT
> files.
> 
> My rational here is that the gettextization (ie, the resynchronization of a
> master file and a localized file to generate a valid PO file that can be used
> afterward in a po4a-based workflow) is a really tedious process. I prefer the
> po4a-gettextize script to dedicate to this usage, trying to smooth it as much 
> as
> possible. This is not really compatible with its use as in sgt-puzzles.
> 
> So, yes, the infrastructure of sgt-puzzles should be updated as it will fail
> with the next upcoming release of po4a. Sorry about that. The easiest should 
> be
> to simply use po4a-updatepo with an unexistant POT file instead of po4a-
> gettextize, but the best would be to write a simple po4a.conf file and switch 
> to
> the integrated po4a program. Invoking `make -f Makefile.doc update-po` now 
> fails
> with the following error message:
> 
> | You must provide both master files and localized files to po4a-gettextize, 
> as 
> | it is intended to synchronize master files and previously existing 
> translations.
> | If just want to extract POT files of your master files, please 
> po4a-updatepo.
> | But the most convenient way of using po4a is to write a po4a.conf file and 
> use
> | the integrated po4a(1) program.
> 
> Changing po4a-gettextize to po4a-updatepo seems to fix everything.
> 
> > > The extra spaces that you see are intended to help the gettextization
> > > process, as explained in the po4a-gettextize manpage.
> > 
> > At least I don't fully understand this text, even though I translated
> > it. (See below)
> > 
> > > I'm not sure of how I can help you here. What piece of documentation 
> > > should
> > > be updated?
> > 
> > 
> > What is missing here is how and when these strings are merged back, i.e. 
> > what
> > the translator or package maintainer should do to get to the desired
> > situation (i.e. each string only appearing once). 
> 
> I tried to rewrite the documentation and apply your comments. Please check the
> new version and report any remaining issue.
> https://github.com/mquinson/po4a/blob/master/po4a-gettextize#L24

Thanks, this explains it better.

> Thanks for your precious feedback,

And thanks for your speedy and efficient handling.

Greetings

   Helge


-- 
  Dr. Helge Kreutzmann deb...@helgefjell.de
   Dipl.-Phys.   http://www.helgefjell.de/debian.php
64bit GNU powered gpg signed mail preferred
   Help keep free software "libre": http://www.ffii.de/


signature.asc
Description: PGP signature


Bug#1016695: po4a: Strange behaviour with repeated strings (in halibut backend)

2022-08-06 Thread Martin Quinson
Hello,

Le samedi 06 août 2022 à 06:20 +0200, Helge Kreutzmann a écrit :
> 
> On Sat, Aug 06, 2022 at 12:23:48AM +0200, Martin Quinson wrote:
> > the short answer is that po4a-gettextize is not intended to be used on a
> > regular
> > basis. It's only intended for the first run when you want to convert an
> > existing
> > translation to the po-based workflow. Once it's done, you're supposed to use
> > po4a-updatepo to create an empty PO file. Even better, you should use po4a
> > directly instead of the deprecated atomic commands.
> 
> Ok, so this would be incorrect usage in sgt-puzzles? It did work for
> the past ~ 13 years. Then it might be helpful to add a note that
> certain use cases are not working anymore.
> 
> Should this bug be cloned to sgt-puzzles for updating its
> infrastructure?

The fact is that I never imagined that someone would use po4a-gettextize on a
regular basis, to create the empty POT file. I would have added a note in the
changelog if I knew. I see the intend now, but this is not a usecase that I plan
to maintain. I just added a check to po4a-gettextize which makes it break if you
call it without localized files, as you would do to generate the empty POT
files.

My rational here is that the gettextization (ie, the resynchronization of a
master file and a localized file to generate a valid PO file that can be used
afterward in a po4a-based workflow) is a really tedious process. I prefer the
po4a-gettextize script to dedicate to this usage, trying to smooth it as much as
possible. This is not really compatible with its use as in sgt-puzzles.

So, yes, the infrastructure of sgt-puzzles should be updated as it will fail
with the next upcoming release of po4a. Sorry about that. The easiest should be
to simply use po4a-updatepo with an unexistant POT file instead of po4a-
gettextize, but the best would be to write a simple po4a.conf file and switch to
the integrated po4a program. Invoking `make -f Makefile.doc update-po` now fails
with the following error message:

| You must provide both master files and localized files to po4a-gettextize, as 
| it is intended to synchronize master files and previously existing 
translations.
| If just want to extract POT files of your master files, please po4a-updatepo.
| But the most convenient way of using po4a is to write a po4a.conf file and use
| the integrated po4a(1) program.

Changing po4a-gettextize to po4a-updatepo seems to fix everything.

> > The extra spaces that you see are intended to help the gettextization
> > process, as explained in the po4a-gettextize manpage.
> 
> At least I don't fully understand this text, even though I translated
> it. (See below)
> 
> > I'm not sure of how I can help you here. What piece of documentation should
> > be updated?
> 
> 
> What is missing here is how and when these strings are merged back, i.e. what
> the translator or package maintainer should do to get to the desired
> situation (i.e. each string only appearing once). 

I tried to rewrite the documentation and apply your comments. Please check the
new version and report any remaining issue.
https://github.com/mquinson/po4a/blob/master/po4a-gettextize#L24


> Could you add an example here? I.e. like I did below with my example?
> In your text above (in the e-mail) you state that you should use 
> po4a-updatepo or po4a, here you mention msgmerge. Probably clarifying 
> this would help as well.

I didn't add any example, but the new text is much more detailed so maybe that's
enough?

Thanks for your precious feedback,
Mt
> 



signature.asc
Description: This is a digitally signed message part


Bug#1016752: developers-reference: Chapter 3.2.6. "Returning after retirement" refers to alioth.debian.org

2022-08-06 Thread Alexander Reichle-Schmehl
Package: developers-reference
Version: 12.5
Severity: minor

Dear Maintainers,


In the bullet point list of chapter 3.2.6. "Returning after retirement" the old 
alioth system is
referenced.  Should probably now be a refernece to salsa.debian.org?


See 
https://www.debian.org/doc/manuals/developers-reference/developer-duties.en.html#returning-after-retirement.


Best regards,
  Alexander



-- System Information:
Debian Release: 10.12
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-18-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

developers-reference depends on no packages.

Versions of packages developers-reference recommends:
pn  debian-policy  

Versions of packages developers-reference suggests:
pn  doc-base  



Bug#1016653: gm(1): targa (.tga) files are read and written upside-down

2022-08-06 Thread Bob Friesenhahn

On Thu, 4 Aug 2022, Bob Friesenhahn wrote:

Testing with ImageMagick 6.9.12-38 on an Illumos system shows the image the 
other way around with the bright pink cone laying on what might be a gray 
floor.  Due to the nature of the image, it is difficult to tell what the 
right way up is.


It appears that ImageMagick 6.9.10-23 and 6.9.12-38 do not display the same 
output!


Thankfully this issue brought my attention back to TGA format.  I 
found that an unnecessary security check was blocking reading some 
files entirely.  I also noticed that the code could be optimized a 
bit.


However, I believe that this bug report is incorrect.

What has actually happened is that ImageMagick changed what it 
returns and more recent ImageMagick also changed what it does when it 
displays an image.


GraphicsMagick always returns an image in the common normal form 
(TopLeft).  ImageMagick changed so that it returns an image in the 
same form as the file, but it sets an orientation option so that the 
user needs to use -auto-orient to see a correct image.


In the older version of ImageMagick, the 'display' program does not 
appear to automatically adjust the orientation where as the newer 
version does.


This morning I committed the TGA improvements and created a new 
development snapshot release.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
Public Key, http://www.simplesystems.org/users/bfriesen/public-key.txt



Bug#1016751: gsasl: autopkgtest regression on armel: new test has dependency that isn't available

2022-08-06 Thread Paul Gevers

Source: gsasl
Version: 2.0.1-2
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of gsasl the autopkgtest of gsasl fails in testing 
when that autopkgtest is run with the binary packages of gsasl from 
unstable on armel. It passes when run with only packages from testing. 
In tabular form:


   passfail
gsasl  from testing2.0.1-2
all others from testingfrom testing

After checking your changelog, I noticed you added a test and exactly 
this test fails because the test dependencies can't be installed. Please 
add a "Architecture: !armel" line to the third test definition.


Paul
PS: for now, I have accepted the regression on armel, but please fix 
nevertheless.


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1011165: org.h2.jdbc.JdbcSQLSyntaxErrorException: schema "MEDIATHEKVIEW" not found

2022-08-06 Thread Helge Kreutzmann
Hello Markus,
On Tue, May 17, 2022 at 10:09:08PM +0200, Markus Koschany wrote:
> Control: severity -1 serious
> 
> Am Dienstag, dem 17.05.2022 um 21:59 +0200 schrieb mt...@nurfuerspam.de:
> > Package: mediathekview
> > Version: 13.2.1-4
> > Severity: important
> > 
> > Dear Maintainer,
> > 
> > after libh2-java was updated from version 2.1.210+really1.4.197-1 to 
> > 2.1.212-
> > 1
> > there is an enormous occurrence of the following error exceptions when
> > starting mediathekview:
> 
> Hello and thanks for the report. Currently this cannot be avoided because we
> had to move forward with the h2 database in Debian. The latest version of
> mediathekview should not require h2 anymore. I don't have the time to package 
> a
> new upstream release right now but if someone wants to beat me to it, please 
> go
> ahead and mark yourself as the owner of this bug report.

I hope that you'll have some time so that mediathekview is shipped in
Testing/Futures stables again.

I tried to have a look at it (though I've really no clue about java
and building java progs) and unfortunately the situation is worse than
I thought.

To save others time, that's what I tried:

1) Using the existing debian directory with or without applying
   patches no longer works (this is what I expected).

2) A direct ("upstream") build also fails (and the documentation on
   building is very terse) and on a quick search I could not find a
   workaround.


Direct build:
./mvnw compile

…
Downloaded from central: 
https://repo.maven.apache.org/maven2/org/openjfx/javafx-graphics/19-ea+7/javafx-graphics-19-ea+7-linux.jar
 (4.8 MB at 1.3 MB/s)
[INFO] 
[INFO] BUILD FAILURE
[INFO] 
[INFO] Total time:  10.034 s
[INFO] Finished at: 2022-07-20T14:49:04+02:00
[INFO] 
[ERROR] Failed to execute goal on project MediathekView: Could not resolve 
dependencies for project de.mediathekview:MediathekView:jar:13.9.1: Could not 
find artifact airsquared:JMacNotification:jar:1.1 in local-maven-repository 
(file:tmp/mtvb2/MediathekView-13.9.1/maven-repository) -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e 
switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please 
read the following articles:
[ERROR] [Help 1] 
http://cwiki.apache.org/confluence/display/MAVEN/DependencyResolutionException

and indeed, 
/tmp/mtvb2/MediathekView-13.9.1/maven-repository/airsquared/JMacNotification/1.1/JMacNotification-1.1.jar
does not exists, and even worse (explaining the failure):
https://repo.maven.apache.org/maven2/airsquared/JMacNotification/1.1/JMacNotification-1.1.jar
 is 404 (does not exist)

I could find maybe a read only copy here:
https://github.com/mediathekview/MediathekViewArchiv/blob/master/maven-repository/airsquared/JMacNotification/1.1/JMacNotification-1.1.jar

So this would require verification and then somehow to be included 
into the build. 

Maybe this helps getting the ball rolling …

Greetings

  Helge

P.S. Besides the errors the current version still seems to work

-- 
  Dr. Helge Kreutzmann deb...@helgefjell.de
   Dipl.-Phys.   http://www.helgefjell.de/debian.php
64bit GNU powered gpg signed mail preferred
   Help keep free software "libre": http://www.ffii.de/


signature.asc
Description: PGP signature


Bug#1016750: sbcl breaks cl-ironclad autopkgtest on armhf: Heap exhausted, game over.

2022-08-06 Thread Paul Gevers

Source: sbcl, cl-ironclad
Control: found -1 sbcl/2:2.2.6-2
Control: found -1 cl-ironclad/0.57-1
Severity: serious
Tags: sid bookworm
User: debian...@lists.debian.org
Usertags: breaks needs-update

Dear maintainer(s),

With a recent upload of sbcl the autopkgtest of cl-ironclad fails in 
testing when that autopkgtest is run with the binary packages of sbcl 
from unstable. It passes when run with only packages from testing. In 
tabular form:


   passfail
sbcl   from testing2:2.2.6-2
cl-ironcladfrom testing0.57-1
all others from testingfrom testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration of sbcl to testing 
[1]. Due to the nature of this issue, I filed this bug report against 
both packages. Can you please investigate the situation and reassign the 
bug to the right package?


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=sbcl

https://ci.debian.net/data/autopkgtest/testing/armhf/c/cl-ironclad/24381695/log.gz

; wrote 
/tmp/autopkgtest-lxc.d2c27h4h/downtmp/autopkgtest_tmp/usr/share/common-lisp/source/ironclad/src/ciphers/tea-tmp93OFNPHA.fasl

; compilation finished in 0:00:00.160
; compiling file 
"/usr/share/common-lisp/source/ironclad/src/ciphers/threefish.lisp" 
(written 18 FEB 2022 01:39:10 PM):

Heap exhausted during garbage collection: 16 bytes available, 48 requested.
Immobile Object Counts
 Gen   GF type  fdefn symbol   code  Boxed   ConsRaw   Code  SmMix 
 Mixed  LgRaw LgCode  LgMix Waste%   AllocTrig   Dirty GCs 
Mem-age
  1 00  0  0  0   7121939   9668  5273 
   827  0  0 17   19.96186748032499253   18850   1 
 1.1503
  2 00  0  0  0  19865   2766  12586 84836 
  1681 10 34127   11.7   137430448 5368709   23089   0 
 0.9496
  3 00  0  0  0  45116   7190   7447604   3552 
  16732394673311.0   270091288 2007806   0 
 0.4559
  4 00  0  0  0  0  0  0  0  0 
 0  0  0  00.0   0 200   0   0 
 0.
  5 00  0  0  0  0  0  0  0  0 
 0  0  0  00.0   0 200   0   0 
 0.
  6 00  0  0  0   1370471   1242   3507314 
402551342811.930584464 200 251   0 
 0.
Tot 00  0  0  0  73472  11366  30943   4200   4975 
 42215046357566.9   499973680 [93.1% of 536870912 max]

GC control variables:
   *GC-INHIBIT* = true
   *GC-PENDING* = true
fatal error encountered in SBCL pid 1357:
Heap exhausted, game over.

   0: 0xf746478c pc=0x98 {0x4f0380b8+b0fc7fe0} {code_serialno=3901}
   1: 0xf7464730 pc=0x4f005760 {0x4f005000+0760} (FLET 
"WITHOUT-GCING-BODY-5" :IN SB-KERNEL::SUB-GC)
   2: 0xf74646d4 pc=0x4f0053f8 {0x4f005000+03f8} (FLET 
"WITHOUT-INTERRUPTS-BODY-1" :IN SB-KERNEL::SUB-GC)

   3: 0xf7464678 pc=0x4f005108 {0x4f005000+0108} SB-KERNEL::SUB-GC
   4: 0xf746466c pc=(nil) LRA=0x3e2e75: [I]0xf7464654 
pc=0x3e4d8 {0x4fb3f240+b04ff298} {code_serialno=f5f}

   6: 0xf7464634 pc=0x5028c858 {0x5028c4b0+03a8} SB-C::MAKE-WIRED-TN
   7: 0xf7464604 pc=0x4fd9a348 {0x4fd9a030+0318} 
SB-C::IR2-CONVERT-FULL-CALL-ARGS
   8: 0xf74645c4 pc=0x4f8506f8 {0x4f8505c8+0130} 
SB-C::IR2-CONVERT-FIXED-FULL-CALL
   9: 0xf74645b4 pc=0x4f3d8b18 {0x4f3d8990+0188} 
SB-C::IR2-CONVERT-FULL-CALL
  10: 0xf7464598 pc=0x4f6fe720 {0x4f6fda90+0c90} 
SB-C::IR2-CONVERT-BLOCK

  11: 0xf7464584 pc=0x4f2c8f58 {0x4f2c8dc8+0190} SB-C::IR2-CONVERT
  12: 0xf7464550 pc=0x504637a8 {0x50463198+0610} 
SB-C::%COMPILE-COMPONENT
  13: 0xf7464538 pc=0x5041c820 {0x5041c258+05c8} 
SB-C::COMPILE-COMPONENT

  14: 0xf7464514 pc=0x5037ca10 {0x5037c7b8+0258} SB-C::COMPILE-TOPLEVEL
  15: 0xf7464500 pc=0x503f0eb8 {0x503f0c28+0290} 
SB-C::CONVERT-AND-MAYBE-COMPILE
  16: 0xf74644b4 pc=0x50393270 {0x50392a10+0860} 
SB-C::PROCESS-TOPLEVEL-FORM
  17: 0xf746449c pc=0x50457490 {0x504573a0+00f0} 
SB-C::PROCESS-TOPLEVEL-PROGN
  18: 0xf7464450 pc=0x50393188 {0x50392a10+0778} 
SB-C::PROCESS-TOPLEVEL-FORM
  19: 0xf7464404 pc=0x50393408 {0x50392a10+09f8} 
SB-C::PROCESS-TOPLEVEL-FORM
  20: 0xf74643b8 pc=0x50393408 {0x50392a10+09f8} 
SB-C::PROCESS-TOPLEVEL-FORM
  21: 0xf7464334 pc=0x502f60e0 {0x502f3b20+25c0} (LAMBDA 
(SB-KERNEL::FORM  :CURRENT-INDEX ) :IN 
SB-C::SUB-COMPILE-FILE)
  22: 0xf74642c0 pc=0x4f0c5038 {0x4f0c49a8+0690} 
SB-C::%DO-FORMS-FROM-INFO
  23: 0xf7464244 pc=0x502f3ea0 {0x502f3b20+0380} (FLET "LAMBDA0" 
:IN "SYS:SRC;COMPILER;MAIN.LISP")
  24: 

Bug#1016749: pytango: autopkgtest failure on armel

2022-08-06 Thread Paul Gevers

Source: pytango
Version: 9.3.4-2
Severity: serious
User: debian...@lists.debian.org
Usertags: fails-always

Dear maintainer(s),

You recently added an autopkgtest to your package pytango, great. 
However, it fails on armel. Currently this failure is blocking the 
migration to testing [1]. Can you please investigate the situation and 
fix it?


I copied some of the output at the bottom of this report.

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=pytango

https://ci.debian.net/data/autopkgtest/testing/armel/p/pytango/23495376/log.gz

=== FAILURES 
===
___ test_subscribe_change_event[Synchronous] 
___

event_device = EventDevice(test/nodb/eventdevice)

def test_subscribe_change_event(event_device):
results = []
def callback(evt):
results.append(evt.attr_value.value)
# Subscribe
eid = event_device.subscribe_event(
"attr", EventType.CHANGE_EVENT, callback, wait=True)
assert eid == 1
# Trigger an event
event_device.command_inout("send_event", wait=True)
# Wait for tango event
retries = 20
for _ in range(retries):
event_device.read_attribute("state", wait=True)
if len(results) > 1:
break
time.sleep(0.05)
# Test the event values

  assert results == [0., 1.]

E   assert [0.0] == [0.0, 1.0]
E Right contains one more item: 1.0
E Full diff:
E - [0.0, 1.0]
E + [0.0]

tests/test_event.py:115: AssertionError
 Captured stdout setup 
-

Ready to accept request
 Captured stderr setup 
-

Can't create notifd event supplier. Notifd event not available
_ test_push_event_with_timestamp[Synchronous] 
__

event_device = EventDevice(test/nodb/eventdevice)

def test_push_event_with_timestamp(event_device):
string = StringIO()
ec = EventCallback(fd=string)
# Subscribe
eid = event_device.subscribe_event(
"attr", EventType.CHANGE_EVENT, ec, wait=True)
assert eid == 1
# Trigger an event
event_device.command_inout("send_event_with_timestamp", wait=True)
# Wait for tango event
retries = 20
for _ in range(retries):
event_device.read_attribute("state", wait=True)
if len(ec.get_events()) > 1:
break
time.sleep(0.05)
# Test the event values and timestamp
results = [evt.attr_value.value for evt in ec.get_events()]

  assert results == [0., 2.]

E   assert [0.0] == [0.0, 2.0]
E Right contains one more item: 2.0
E Full diff:
E - [0.0, 2.0]
E + [0.0]

tests/test_event.py:191: AssertionError
 Captured stdout setup 
-

Ready to accept request
 Captured stderr setup 
-

Can't create notifd event supplier. Notifd event not available
=== warnings summary 
===

tests/test_client.py:19

/tmp/autopkgtest-lxc.q395dj8v/downtmp/autopkgtest_tmp/tests/test_client.py:19: 
DeprecationWarning: The distutils package is deprecated and slated for 
removal in Python 3.12. Use setuptools or check PEP 632 for potential 
alternatives

from distutils.spawn import find_executable

-- Docs: https://docs.pytest.org/en/stable/warnings.html
=== short test summary info 


FAILED tests/test_event.py::test_subscribe_change_event[Synchronous]
FAILED tests/test_event.py::test_push_event_with_timestamp[Synchronous]
== 2 failed, 1033 passed, 26 xfailed, 1 warning in 263.04s (0:04:23) 
===

autopkgtest [07:52:48]: test command1



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1003255: (no subject)

2022-08-06 Thread Hilmar Preusse
Control: retitle -1 PSTricks requests to use -dALLOWPSTRANSPARENCY even if not 
needed.

On 07.01.22 Peter Mueller (petermuel...@ro.ru) wrote:

Hi,

giving that bug a sane title.

Hilmar

> From: Peter Mueller 
> Reply-To: Peter Mueller , 1003...@bugs.debian.org
> To: submit 
> Subject: Bug#1003255: (no subject)
> Date: Fri, 07 Jan 2022 01:40:48 +
> Message-Id: <3f04cf95e7eb5c42dc3e1d590f348...@mail.rambler.ru>
> X-Mailer: Rambler Compose (2.1.0), https://mail.rambler.ru
> X-Mailing-List:  archive/latest/35254
>
> Package: texlive-pstricks
> Version: 2021.20211217-1
> Let's construct mwe.tex containing
> \documentclass{article} \usepackage{pstricks} \begin{document} test 
> \end{document}
> and run
> latex mwe && dvipdf mwe
> or
> latex mwe && dvips mwe && ps2pdf mwe.ps
>



Bug#1016748: mathcomp-analysis: FTBFS: test failure: Error: apply-w-params

2022-08-06 Thread Sebastian Ramacher
Source: mathcomp-analysis
Version: 0.5.2-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)

Rebuilds of mathcomp-analysis failed:

COQC theories/realfun.v
COQC theories/exp.v
COQC theories/lebesgue_measure.v
File "./theories/lebesgue_measure.v", line 133, characters 0-76:
Warning: Casts are ignored in patterns [cast-in-pattern,automation]
File "./theories/lebesgue_measure.v", line 133, characters 0-76:
Warning: Casts are ignored in patterns [cast-in-pattern,automation]
COQC theories/lebesgue_integral.v
COQC theories/trigo.v
File "./theories/lebesgue_integral.v", line 201, characters 0-51:
Error: apply-w-params

make[3]: *** [Makefile.coq:764: theories/lebesgue_integral.vo] Error 1
make[3]: *** Waiting for unfinished jobs
make[2]: *** [Makefile.coq:387: all] Error 2


Cheers
-- 
Sebastian Ramacher



Bug#1016747: kea: Adjust log file in default config to match Debian config

2022-08-06 Thread Thomas D.

Package: kea
Version: 2.0.2-3
Severity: normal

Dear Maintainer,

the package will install 
/etc/kea/kea-{ctrl-agent,dhcp4,dhcp6,dhcp-ddns}.conf

files which all have set

> "loggers": [
> {
> "output_options": [
> {
> // Specifies the output file. There are several 
special values

> // supported:
> // - stdout (prints on standard output)
> // - stderr (prints on standard error)
> // - syslog (logs to syslog)
> // - syslog:name (logs to syslog using specified name)
> // Any other value is considered a name of the file
> "output": 
"/var/log/kea-{ctrl-agent,dhcp4,dhcp6,dhcp-ddns}.log"

> }
> ]
> }
> ]

However, default kea services cannot write to this location because they
are running as "_kea" user on Debian by default.

You are already creating /var/log/kea so I would suggest to update 
default config to use that directory by default.


I run into this when I increased severity of log messages to debug an
issue but didn't find any logs. After adjusting paths I got the logs
I was looking for.

Thanks!


-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.18.0-3-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en

Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages kea depends on:
ii  kea-admin 2.0.2-3
ii  kea-ctrl-agent2.0.2-3
ii  kea-dhcp-ddns-server  2.0.2-3
ii  kea-dhcp4-server  2.0.2-3
ii  kea-dhcp6-server  2.0.2-3

kea recommends no packages.

kea suggests no packages.

-- no debconf information



Bug#997024: [greek]babel + cleveref + pagenumbering + label = ☇

2022-08-06 Thread Hilmar Preuße

Am 29.06.2022 um 02:53 teilte Peter Müller mit:

Hi,


I've just tested it, and the answer is no.  The bug is still there with

- pdfTeX, Version 3.141592653-2.6-1.40.22 (TeX Live 2022/dev/Debian)



Yes, correct, else I'd have closed it already. I keep the bug open plase 
be so kind to contact the author of cleveref if not done yet.


Hilmar
--
sigfault



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016746: sbcl breaks cffi autopkgtest: /usr/bin/ld: cannot find -lzstd: No such file or directory

2022-08-06 Thread Paul Gevers

Source: sbcl, cffi
Control: found -1 sbcl/2:2.2.6-2
Control: found -1 cffi/1:0.24.1-2
Severity: serious
Tags: sid bookworm
User: debian...@lists.debian.org
Usertags: breaks needs-update

Dear maintainer(s),

With a recent upload of sbcl the autopkgtest of cffi fails in testing 
when that autopkgtest is run with the binary packages of sbcl from 
unstable. It passes when run with only packages from testing. In tabular 
form:


   passfail
sbcl   from testing2:2.2.6-2
cffi   from testing1:0.24.1-2
all others from testingfrom testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration of sbcl to testing 
[1]. Due to the nature of this issue, I filed this bug report against 
both packages. Can you please investigate the situation and reassign the 
bug to the right package?


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=sbcl

https://ci.debian.net/data/autopkgtest/testing/amd64/c/cffi/24381426/log.gz

; wrote 
/tmp/autopkgtest-lxc.qpgu5j9b/downtmp/autopkgtest_tmp/usr/share/common-lisp/source/cl-cffi/tests/grovel-tmpFNKDE5XP.fasl

; compilation finished in 0:00:00.015
;;; running tests (uncompiled)
Doing 332 pending tests of 332 tests total.
 LOAD-CORE-FOUNDATION FUNCALL.CHAR FUNCALL.INT.1 FUNCALL.INT.2 FUNCALL.LONG
 FUNCALL.LONG-LONG FUNCALL.UNSIGNED-LONG-LONG FUNCALL.FLOAT FUNCALL.DOUBLE
 FUNCALL.STRING.1 FUNCALL.STRING.2 FUNCALL.STRING.3 
FUNCALL.VARARGS.NOSTDLIB

 FUNCALL.VARARGS.CHAR FUNCALL.VARARGS.INT FUNCALL.VARARGS.LONG
 FUNCALL.VARARGS.DOUBLE FUNCALL.VARARGS.STRING FUNCALL.DOUBLE26 
FUNCALL.FLOAT26

 FUNCALL.F-S-P.1 FUNCALL.NIL-SKIP FUNCALL.POINTER-NOT-NIL
 DEFCFUN.PARSE-NAME-AND-OPTIONS.1 DEFCFUN.PARSE-NAME-AND-OPTIONS.2
 DEFCFUN.PARSE-NAME-AND-OPTIONS.3 DEFCFUN.PARSE-NAME-AND-OPTIONS.4
 DEFCFUN.PARSE-NAME-AND-OPTIONS.5 DEFCFUN.PARSE-NAME-AND-OPTIONS.6
 DEFCFUN.PARSE-NAME-AND-OPTIONS.7 DEFCFUN.PARSE-NAME-AND-OPTIONS.8
 TRANSLATE-UNDERSCORE-SEPARATED-NAME.TO-SYMBOL
 TRANSLATE-UNDERSCORE-SEPARATED-NAME.TO-STRING
 TRANSLATE-CAMELCASE-NAME.TO-SYMBOL TRANSLATE-CAMELCASE-NAME.TO-STRING
 TRANSLATE-CAMELCASE-NAME.TO-STRING-UPPER
 TRANSLATE-CAMELCASE-NAME.TO-SYMBOL-SPECIAL
 TRANSLATE-CAMELCASE-NAME.TO-STRING-SPECIAL 
TRANSLATE-NAME-FROM-FOREIGN.FUNCTION

 TRANSLATE-NAME-FROM-FOREIGN.VAR TRANSLATE-NAME-TO-FOREIGN.FUNCTION
 TRANSLATE-NAME-TO-FOREIGN.VAR DEFCFUN.CHAR DEFCFUN.DOCSTRING DEFCFUN.INT
 DEFCFUN.LONG DEFCFUN.LONG-LONG DEFCFUN.UNSIGNED-LONG-LONG DEFCFUN.FLOAT
 DEFCFUN.DOUBLE DEFCFUN.STRING.1 DEFCFUN.STRING.2 DEFCFUN.STRING.3
 DEFCFUN.NOARGS DEFCFUN.NOOP DEFCFUN.VARARGS.NOSTDLIB 
DEFCFUN.VARARGS.DOCSTRINGS

 DEFCFUN.VARARGS.CHAR DEFCFUN.VARARGS.SHORT DEFCFUN.VARARGS.INT
 DEFCFUN.VARARGS.LONG DEFCFUN.VARARGS.FLOAT DEFCFUN.VARARGS.DOUBLE
 DEFCFUN.VARARGS.STRING DEFCFUN.BFF.1 DEFCFUN.BFF.2 DEFCFUN.UNDEFINED
 DEFCFUN.DOUBLE26 DEFCFUN.FLOAT26 CALLBACKS.CHAR CALLBACKS.UNSIGNED-CHAR
 CALLBACKS.SHORT CALLBACKS.UNSIGNED-SHORT CALLBACKS.INT 
CALLBACKS.UNSIGNED-INT

 CALLBACKS.LONG CALLBACKS.UNSIGNED-LONG CALLBACKS.LONG-LONG
 CALLBACKS.UNSIGNED-LONG-LONG CALLBACKS.FLOAT CALLBACKS.DOUBLE 
CALLBACKS.POINTER

 CALLBACKS.STRING CALLBACKS.STRING-NOT-DOCSTRING CALLBACKS.NIL-FOR-NULL
 CALLBACKS.QSORT CALLBACKS.VOID CALLBACKS.FUNCALL.1 CALLBACKS.FUNCALL.2
 CALLBACKS.BFF.1 CALLBACKS.BFF.2 CALLBACKS.NON-EXISTANT CALLBACKS.DOUBLE26
 CALLBACKS.DOUBLE26.FUNCALL CALLBACKS.FLOAT26 CALLBACKS.FLOAT26.FUNCALL
 CALLBACKS.UNINTERNED FOREIGN-GLOBALS.REF.CHAR 
FOREIGN-GLOBALS.REF.UNSIGNED-CHAR

 FOREIGN-GLOBALS.REF.SHORT FOREIGN-GLOBALS.REF.UNSIGNED-SHORT
 FOREIGN-GLOBALS.REF.INT FOREIGN-GLOBALS.REF.UNSIGNED-INT
 FOREIGN-GLOBALS.REF.LONG FOREIGN-GLOBALS.REF.UNSIGNED-LONG
 FOREIGN-GLOBALS.REF.FLOAT FOREIGN-GLOBALS.REF.DOUBLE
 FOREIGN-GLOBALS.REF.POINTER FOREIGN-GLOBALS.REF.STRING
 FOREIGN-GLOBALS.REF.LONG-LONG FOREIGN-GLOBALS.REF.UNSIGNED-LONG-LONG
 FOREIGN-GLOBALS.SET.INT FOREIGN-GLOBALS.SET.STRING
 FOREIGN-GLOBALS.SET.LONG-LONG FOREIGN-GLOBALS.GET-VAR-POINTER.1
 FOREIGN-GLOBALS.GET-VAR-POINTER.2 FOREIGN-GLOBALS.REF.UPPERCASEINT1
 FOREIGN-GLOBALS.REF.UPPER-CASE-INT1 FOREIGN-GLOBALS.REF.MIXEDCASEINT1
 FOREIGN-GLOBALS.REF.MIXED-CASE-INT1 FOREIGN-GLOBALS.REF.UPPERCASEINT2
 FOREIGN-GLOBALS.REF.UPPER-CASE-INT2 FOREIGN-GLOBALS.REF.MIXEDCASEINT2
 FOREIGN-GLOBALS.REF.MIXED-CASE-INT2 FOREIGN-GLOBALS.REF.UPPERCASEINT3
 FOREIGN-GLOBALS.REF.UPPER-CASE-INT3 FOREIGN-GLOBALS.REF.MIXEDCASEINT3
 FOREIGN-GLOBALS.REF.MIXED-CASE-INT3 FOREIGN-GLOBALS.SYMBOL-NAME
 FOREIGN-GLOBALS.READ-ONLY.1 DEFCVAR.DOCSTRING FOREIGN-GLOBALS.UNDEFINED.1
 FOREIGN-GLOBALS.ERROR.1 DEREF.CHAR DEREF.UNSIGNED-CHAR DEREF.SHORT
 DEREF.UNSIGNED-SHORT DEREF.INT DEREF.UNSIGNED-INT DEREF.LONG
 DEREF.UNSIGNED-LONG DEREF.LONG-LONG DEREF.UNSIGNED-LONG-LONG DEREF.FLOAT.1
 DEREF.FLOAT.2 

Bug#1016745: tracker-miner-fs: at 100% CPU activity for long minutes

2022-08-06 Thread Patrice Duroux
Package: tracker-miner-fs
Version: 3.3.1-2
Severity: important

Dear Maintainer,

I am facing something very similar to the following:
https://gitlab.gnome.org/GNOME/tracker/-/issues/373

What can I do to see what is going on?

Trying:
$ tracker status
but without success, the command was blocked maybe
until the tracker-miner-fs finished.

Its removal is also not possible as Nautilus depends on it.
So I just tried to mask its .service

Note that login into a text console (tty) starts also some services
among which is the tracker-miner-fs one.

Thanks,
Patrice


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 
'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.19.0-trunk-amd64 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages tracker-miner-fs depends on:
ii  init-system-helpers  1.64
ii  libc62.33-8
ii  libglib2.0-0 2.72.3-1
ii  libtracker-sparql-3.0-0  3.3.2-1
ii  libupower-glib3  0.99.20-1
ii  procps   2:3.3.17-7+b1
ii  tracker  3.3.2-1
ii  tracker-extract  3.3.1-2

tracker-miner-fs recommends no packages.

tracker-miner-fs suggests no packages.



Bug#637127: biblatex: Version 1.6-1 breaks "refsection=part" functionality

2022-08-06 Thread Hilmar Preuße

Am 08.08.2011 um 18:53 teilte Gunnar Wolf mit:

Hi Gunnar,

just a gentle reminder.

I do not understand so much about biblatex and biber. On [1] (see 
comment from PLK) it is recommended to run biber on the aux file to 
generate the bibliography. I could download your document from [2] and 
processed the aux file using biber (bibtex fails to run anyway). I'm not 
sure how the resulting pdf is expected to look like, but each the part 
doesn't contain the full bibliography and the generated seco3.bbl 
contains the information which part of the bib belongs to which document 
part.


So my conclusion would be: when using biber the bibliography is in one 
files instead of partial blx.aux files.


Can we close the issue?

Hilmar

[1] https://tex.stackexchange.com/questions/19326/section-bibliographies
[2] https://gitlab.com/gunnarwolf/seco3


Upon installing biblatex 1.6-1, my book (which includes a references
section per part) no longer generates the partial *.blx.aux files when
being built. My preamble includes:

\usepackage[style=authoryear, backref=true, backrefstyle=two,
 refsection=part, block=ragged]{biblatex}
\ExecuteBibliographyOptions{ autocite=inline, sortcites=true,
 labelyear=true, uniquename=true}
\bibliography{seco3}

So, from the seco3.bib file, four files (one per part --
seco31.blx.aux, seco32.blx.aux, seco33.blx.aux, seco34.blx.aux) should
be generated, and bibtex is run for each. Of course, if I run bibtex
on the core seco3.aux file, the complete reference section is repeated
at the end of each part.

Downgrading to 1.4c-1 fixes the problem.

Full sources for the book are available on request (of course, I'm not
inlining them here in order not to bloat the BTS and your mailbox)




--
sigfault



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016744: vim-ultisnips: autopkgtest failure on arm64, i386 and ppc64el

2022-08-06 Thread Paul Gevers

Source: vim-ultisnips
Version: 3.2-1
Severity: serious
User: debian...@lists.debian.org
Usertags: fails-always

Dear maintainer(s),

You recently added an autopkgtest to your package vim-ultisnips, great. 
However, it fails on arm64, i386 and ppc64el. Currently this failure is 
blocking the migration to testing [1]. Can you please investigate the 
situation and fix it?


I copied some of the output at the bottom of this report.

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=vim-ultisnips

https://ci.debian.net/data/autopkgtest/testing/arm64/v/vim-ultisnips/23984911/log.gz


==
FAIL: runTest (test_ParseSnippets.ParseSnippets_ExtendsWithoutFiletype)
--
Traceback (most recent call last):
  File 
"/tmp/autopkgtest-lxc.p149hn5f/downtmp/build.kSM/src/test/vim_test_case.py", 
line 53, in runTest

self.assertRegexpMatches(self.output, self.expected_error)
AssertionError: Regex didn't match: "'extends' without file types in 
\\S+:2" not found in 'An error occured. This is either a bug in 
UltiSnips or a bug in a\nsnippet definition. If you think this is a bug, 
please report it 
to\nhttps://github.com/SirVer/ultisnips/issues/new\nPlease read and 
follow:\nhttps://github.com/SirVer/ultisnips/blob/master/CONTRIBUTING.md#reproducing-bugs\n\nFollowing 
is the full stack trace:\nTraceback (most recent call last):\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/err_to_scratch_buffer.py", 
line 18, in wrapper\nreturn func(self, *args, **kwds)\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/snippet_manager.py", 
line 905, in _track_change\n 
self._try_expand(autotrigger_only=True)\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/snippet_manager.py", 
line 749, in _try_expand\nsnippets = self._snips(before, False, 
autotrigger_only)\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/snippet_manager.py", 
line 629, in _snips\nsource.ensure(filetypes)\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/snippet/source/file/base.py", 
line 31, in ensure\nself._load_snippets_for(ft)\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/snippet/source/file/base.py", 
line 53, in _load_snippets_for\nself._parse_snippets(ft, fn)\n  File 
"/usr/share/nvim/site/pack/dist-bundle/opt/ultisnips/pythonx/UltiSnips/snippet/source/file/base.py", 
line 69, in _parse_snippets\nraise SnippetSyntaxError(filename, 
line_index, msg)\nUltiSnips.snippet.source.file.base.SnippetSyntaxError: 
\'extends\' without file types in 
/tmp/p\tautopkgtest-lxc.p149hn5f/downtmp/autopkgtest_tmp/UltiSnipsTest_Casenir0duuw/us/all.snippets:2'


--
Ran 560 tests in 1259.152s

FAILED (failures=1, skipped=4)
autopkgtest [05:49:55]: test with-neovim



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016743: zalign: autopkgtest failure on 32 bit architectures: Segmentation fault

2022-08-06 Thread Paul Gevers

Source: zalign
Version: 0.9.1-6
Severity: serious
User: debian...@lists.debian.org
Usertags: fails-always

Dear maintainer(s),

You recently added an autopkgtest to your package zalign, great. 
However, it fails. Currently this failure is blocking the migration to 
testing [1]. Can you please investigate the situation and fix it?


I copied some of the output at the bottom of this report.

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=zalign

https://ci.debian.net/data/autopkgtest/testing/armhf/z/zalign/23914703/log.gz

Running Tests
Test 1

Stage 1: Distribute data to all nodes
-

 # File parameters

 S sequence: 104 characters
 Filename:   dd

 T sequence: 104 characters
 Filename:   rt

 # Performance parameters

 Number of 'split' submatrices:  1
 Available nodes:1
 Horizontal block divisions:10
 Vertical block divisions:  10

 # Scoring parameters

 Match:  1
 Mismatch:  -3
 Gap Opening:   -5
 Gap Extension: -2


Stage 2: Find best scores
-

  Showing progress information for root node (rank 0):
split 1/1: ||   0%* 
  |   1%* 
  |   2%** 
 |   3%** 
 |   4%** 
 |   5%*** 
|   6%*** 
|   7% 
   |   8% 
   |   9% 
   |  10%* 
  |  11%* 
  |  12%** 
 |  13%** 
 |  14%** 
 |  15%*** 
|  16%*** 
|  17% 
   |  18% 
   |  19% 
   |  20%* 
  |  21%* 
  |  22%** 
 |  23%** 
 |  24%** 
 |  25%*** 
|  26%*** 
|  27% 
   |  28% 
   |  29% 
   |  30%* 
  |  31%* 
  |  32%** 
 |  33%** 
 |  34%** 
 |  35%*** 
|  36%*** 
|  37% 
   |  

Bug#1016742: libcereal: autopkgtest regression: add_subdirectory given source "sandbox" which is not an existing directory

2022-08-06 Thread Paul Gevers

Source: libcereal
Version: 1.3.2+dfsg-1
Severity: serious
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of libcereal the autopkgtest of libcereal fails in 
testing when that autopkgtest is run with the binary packages of 
libcereal from unstable. It passes when run with only packages from 
testing. In tabular form:


   passfail
libcereal  from testing1.3.2+dfsg-1
all others from testingfrom testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration to testing [1]. Can 
you please investigate the situation and fix it?


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=libcereal

https://ci.debian.net/data/autopkgtest/testing/amd64/libc/libcereal/24396353/log.gz

-- The CXX compiler identification is GNU 11.3.0
-- Detecting CXX compiler ABI info
-- Detecting CXX compiler ABI info - done
-- Check for working CXX compiler: /usr/bin/c++ - skipped
-- Detecting CXX compile features
-- Detecting CXX compile features - done
-- Found Boost: 
/usr/lib/x86_64-linux-gnu/cmake/Boost-1.74.0/BoostConfig.cmake (found 
version "1.74.0") found components: serialization -- boost_variant.cpp

CMake Error at CMakeLists.txt:123 (add_subdirectory):
  add_subdirectory given source "sandbox" which is not an existing 
directory.



-- Configuring incomplete, errors occurred!
See also 
"/tmp/autopkgtest-lxc.q81fqk9c/downtmp/autopkgtest_tmp/CMakeFiles/CMakeOutput.log".

make: *** No targets specified and no makefile found.  Stop.
autopkgtest [03:11:34]: test run-unit-test



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016741: Wrong paths to nm-initrd-generator

2022-08-06 Thread Michel Dänzer
Package: dracut-network
Version: 056-3
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


/usr/lib/dracut/modules.d/35network-manager/module-setup.sh and
/usr/lib/dracut/modules.d/35network-manager/nm-lib.sh look for
nm-initrd-generator in /usr/libexec and /usr/lib. However, network-manager
actually ships it in /usr/lib/NetworkManager/.

This prevents the network-manager module from working in the initrd.


- -- System Information:
Debian Release: bookworm/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'stable-security'), (500, 
'buildd-unstable'), (500, 'unstable'), (102, 'experimental-debug'), (102, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.19.0+ (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN, TAINT_UNSIGNED_MODULE
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_CA:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dracut-network depends on:
pn  dracut-core  
ii  iputils-arping   3:20211215-1
ii  isc-dhcp-client  4.4.3-2

Versions of packages dracut-network recommends:
ii  curl7.84.0-2
pn  nbd-client  
pn  nfs-common  
pn  open-iscsi  

dracut-network suggests no packages.

-BEGIN PGP SIGNATURE-

iHEEARECADEWIQSwn681vpFFIZgJURRaga+OatuyAAUCYu5tbhMcbWljaGVsQGRh
ZW56ZXIubmV0AAoJEFqBr45q27IA8YQAnRTdZ0xH9LqUxjWrucgjVyoCCopQAJ9e
RmC2sgy9r9egd531hAZwopf0FA==
=lxbV
-END PGP SIGNATURE-



Bug#1016740: golang-github-cli-go-gh: autopkgtest regression: TestGQLClientDoWithContext/http_fail_request_timed_out

2022-08-06 Thread Paul Gevers

Source: golang-github-cli-go-gh
Version: 0.0.3+git20220623.91ca4ef-1
Severity: serious
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of golang-github-cli-go-gh the autopkgtest of 
golang-github-cli-go-gh fails in testing when that autopkgtest is run 
with the binary packages of golang-github-cli-go-gh from unstable. It 
passes when run with only packages from testing. In tabular form:


   passfail
golang-github-cli-go-gh from testing0.0.3+git20220623.91ca4ef-1
all others from testingfrom testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration to testing [1]. Can 
you please investigate the situation and fix it?


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=golang-github-cli-go-gh

https://ci.debian.net/data/autopkgtest/testing/amd64/g/golang-github-cli-go-gh/24389592/log.gz


=== RUN   TestGQLClientDoWithContext/http_fail_request_canceled
gql_client_test.go:170: Error Trace:gql_client_test.go:170
Error:  An error is expected but got nil.
Test:   
TestGQLClientDoWithContext/http_fail_request_canceled
=== RUN   TestGQLClientDoWithContext/http_fail_request_timed_out
gql_client_test.go:170: Error Trace:gql_client_test.go:170
Error:  An error is expected but got nil.
	Test: 
TestGQLClientDoWithContext/http_fail_request_timed_out

--- FAIL: TestGQLClientDoWithContext (0.00s)
--- FAIL: TestGQLClientDoWithContext/http_fail_request_canceled (0.00s)
--- FAIL: TestGQLClientDoWithContext/http_fail_request_timed_out 
(0.00s)




=== RUN   TestRESTClientDoWithContext/http_fail_request_canceled
rest_client_test.go:341:Error Trace:rest_client_test.go:341
Error:  An error is expected but got nil.
	Test: 
TestRESTClientDoWithContext/http_fail_request_canceled

=== RUN   TestRESTClientDoWithContext/http_fail_request_timed_out
rest_client_test.go:341:Error Trace:rest_client_test.go:341
Error:  An error is expected but got nil.
	Test: 
TestRESTClientDoWithContext/http_fail_request_timed_out

--- FAIL: TestRESTClientDoWithContext (0.00s)
--- FAIL: TestRESTClientDoWithContext/http_fail_request_canceled 
(0.00s)
--- FAIL: TestRESTClientDoWithContext/http_fail_request_timed_out 
(0.00s)



=== RUN   TestRESTClientRequestWithContext
=== RUN   TestRESTClientRequestWithContext/http_fail_request_canceled
rest_client_test.go:394:Error Trace:rest_client_test.go:394
Error:  An error is expected but got nil.
	Test: 
TestRESTClientRequestWithContext/http_fail_request_canceled

=== RUN   TestRESTClientRequestWithContext/http_fail_request_timed_out
rest_client_test.go:394:Error Trace:rest_client_test.go:394
Error:  An error is expected but got nil.
	Test: 
TestRESTClientRequestWithContext/http_fail_request_timed_out

--- FAIL: TestRESTClientRequestWithContext (0.00s)
--- FAIL: 
TestRESTClientRequestWithContext/http_fail_request_canceled (0.00s)
--- FAIL: 
TestRESTClientRequestWithContext/http_fail_request_timed_out (0.00s)

=== RUN   TestRestPrefix
=== RUN   TestRestPrefix/github
=== RUN   TestRestPrefix/localhost
=== RUN   TestRestPrefix/enterprise
--- PASS: TestRestPrefix (0.00s)
--- PASS: TestRestPrefix/github (0.00s)
--- PASS: TestRestPrefix/localhost (0.00s)
--- PASS: TestRestPrefix/enterprise (0.00s)
FAIL
FAILgithub.com/cli/go-gh/internal/api   0.007s




OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016739: rust-serde: please update to v1.0.142

2022-08-06 Thread Jonas Smedegaard
Source: rust-serde
Version: 1.0.130-2
Severity: normal
Tags: upstream

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Please update to upstream release 1.0.142, needed by projcts I am
preparing for Debian.

 - Jonas

-BEGIN PGP SIGNATURE-
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=c7mH
-END PGP SIGNATURE-



Bug#1016736: nvidia-kernel-dkms: Fail to build with linux 5.19 (patch available in Ubuntu)

2022-08-06 Thread Christian Marillat
On 06 août 2022 15:31, Andreas Beckmann  wrote:

> On 06/08/2022 15.20, Christian Marillat wrote:
>> Package: nvidia-kernel-dkms
>> Version: 470.129.06-6
>
> There is a new upstream release fixing this as well as some CVEs, I'm
> currently working through the driver variants ... 390xx-legacy is 
> already done.

Ha, OK, then sorry for the bug report.

Christian



Bug#1016738: dt-schema: autopkgtest failure: No module named 'libfdt'

2022-08-06 Thread Paul Gevers

Source: dt-schema
Version: 2022.07-1
Severity: serious
User: debian...@lists.debian.org
Usertags: fails-always

Dear maintainer(s),

You recently added an autopkgtest to your package dt-schema, great. 
However, it fails. Currently this failure is blocking the migration to 
testing [1]. Can you please investigate the situation and fix it?


I copied some of the output at the bottom of this report. It seems you 
are missing a dependency.


More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=dt-schema

https://ci.debian.net/data/autopkgtest/testing/amd64/d/dt-schema/24372986/log.gz

=== python3.10 ===
Traceback (most recent call last):
  File 
"/tmp/autopkgtest-lxc.ard1nynt/downtmp/autopkgtest_tmp/test/test-dt-validate.py", 
line 20, in 

import dtschema
  File "/usr/lib/python3/dist-packages/dtschema/__init__.py", line 1, 
in 

from dtschema.lib import (
  File "/usr/lib/python3/dist-packages/dtschema/lib.py", line 18, in 


import dtschema.dtb
  File "/usr/lib/python3/dist-packages/dtschema/dtb.py", line 9, in 


import libfdt
ModuleNotFoundError: No module named 'libfdt'
autopkgtest [08:11:46]: test unittests



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016736: nvidia-kernel-dkms: Fail to build with linux 5.19 (patch available in Ubuntu)

2022-08-06 Thread Andreas Beckmann

On 06/08/2022 15.20, Christian Marillat wrote:

Package: nvidia-kernel-dkms
Version: 470.129.06-6


There is a new upstream release fixing this as well as some CVEs, I'm 
currently working through the driver variants ... 390xx-legacy is 
already done.


Andreas



Bug#1016737: Loop in POST when using --removable option in grub-install

2022-08-06 Thread Sugu

Package: grub-efi-amd64
Version: 2.04-20
Severity: normal
X-Debbugs-Cc: none

Dear Maintainer,

*** Reporter, please consider answering these questions, where 
appropriate ***


I run grub-install --target=x86_64-efi --efi-directory=/boot/efi 
--removable and reboot, it repeats POST forever and loops.

This bug does not occur on Arch Linux, so it appears to be Debian-specific.

*** End of the template - remove these template lines ***


-- Package-specific info:

*** BEGIN /proc/mounts
/dev/sda2 / ext4 rw,relatime,errors=remount-ro 0 0
/dev/sda1 /boot/efi vfat 
rw,relatime,fmask=0077,dmask=0077,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro 
0 0

*** END /proc/mounts

*** BEGIN /boot/grub/grub.cfg
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#

### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
  set have_grubenv=true
  load_env
fi
if [ "${next_entry}" ] ; then
   set default="${next_entry}"
   set next_entry=
   save_env next_entry
   set boot_once=true
else
   set default="0"
fi

if [ x"${feature_menuentry_id}" = xy ]; then
  menuentry_id_option="--id"
else
  menuentry_id_option=""
fi

export menuentry_id_option

if [ "${prev_saved_entry}" ]; then
  set saved_entry="${prev_saved_entry}"
  save_env saved_entry
  set prev_saved_entry=
  save_env prev_saved_entry
  set boot_once=true
fi

function savedefault {
  if [ -z "${boot_once}" ]; then
    saved_entry="${chosen}"
    save_env saved_entry
  fi
}
function load_video {
  if [ x$feature_all_video_module = xy ]; then
    insmod all_video
  else
    insmod efi_gop
    insmod efi_uga
    insmod ieee1275_fb
    insmod vbe
    insmod vga
    insmod video_bochs
    insmod video_cirrus
  fi
}

if [ x$feature_default_font_path = xy ] ; then
   font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 
--hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 
4ac6e20f-f814-426a-9de9-b33d490010a6

else
  search --no-floppy --fs-uuid --set=root 
4ac6e20f-f814-426a-9de9-b33d490010a6

fi
    font="/usr/share/grub/unicode.pf2"
fi

if loadfont $font ; then
  set gfxmode=auto
  load_video
  insmod gfxterm
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
  set timeout=30
else
  if [ x$feature_timeout_style = xy ] ; then
    set timeout_style=menu
    set timeout=5
  # Fallback normal timeout code in case the timeout_style feature is
  # unavailable.
  else
    set timeout=5
  fi
fi
### END /etc/grub.d/00_header ###

### BEGIN /etc/grub.d/05_debian_theme ###
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 
--hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 
4ac6e20f-f814-426a-9de9-b33d490010a6

else
  search --no-floppy --fs-uuid --set=root 
4ac6e20f-f814-426a-9de9-b33d490010a6

fi
insmod png
if background_image 
/usr/share/desktop-base/homeworld-theme/grub/grub-4x3.png; then

  set color_normal=white/black
  set color_highlight=black/white
else
  set menu_color_normal=cyan/blue
  set menu_color_highlight=white/blue
fi
### END /etc/grub.d/05_debian_theme ###

### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
    set gfxpayload="${1}"
}
set linux_gfx_mode=
export linux_gfx_mode
menuentry 'Debian GNU/Linux' --class debian --class gnu-linux --class 
gnu --class os $menuentry_id_option 
'gnulinux-simple-4ac6e20f-f814-426a-9de9-b33d490010a6' {

    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    set root='hd0,gpt2'
    if [ x$feature_platform_search_hint = xy ]; then
      search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 
--hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 
4ac6e20f-f814-426a-9de9-b33d490010a6

    else
      search --no-floppy --fs-uuid --set=root 
4ac6e20f-f814-426a-9de9-b33d490010a6

    fi
    echo    'Loading Linux 5.10.0-16-amd64 ...'
    linux    /boot/vmlinuz-5.10.0-16-amd64 
root=UUID=4ac6e20f-f814-426a-9de9-b33d490010a6 ro  quiet

    echo    'Loading initial ramdisk ...'
    initrd    /boot/initrd.img-5.10.0-16-amd64
}
submenu 'Advanced options for Debian GNU/Linux' $menuentry_id_option 
'gnulinux-advanced-4ac6e20f-f814-426a-9de9-b33d490010a6' {
    menuentry 'Debian GNU/Linux, with Linux 5.10.0-16-amd64' --class 
debian --class gnu-linux --class gnu --class os $menuentry_id_option 
'gnulinux-5.10.0-16-amd64-advanced-4ac6e20f-f814-426a-9de9-b33d490010a6' {

        load_video
        insmod gzio
        if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
        insmod part_gpt
        insmod ext2
        set root='hd0,gpt2'
        if [ x$feature_platform_search_hint = xy ]; then
          search 

Bug#1016732: node-sockjs throws: TypeError: Cannot read properties of undefined (reading 'addEventListener') at WebSocketReceiver.setUp

2022-08-06 Thread Nilesh Patra
Yadd,

Since you added in coffeescript patch for this package, I'd highly appreciate if
you could consider taking a look.

On Sat, 06 Aug 2022 17:54:13 +0530 Nilesh Patra  wrote:
> Package: node-sockjs
> Version: 0.3.24+~0.3.33-1
> Severity: serious
> X-Debbugs-Cc: e...@ericebrown.com
> 
> Hi,
> 
> On running shiny-server with 0.3.24+~0.3.33-1 it chokes with:
> 
> | [2022-08-06T04:59:03.613] [ERROR] shiny-server - Uncaught exception: 
> TypeError: Cannot read properties of undefined (reading 'addEventListener')
> | [2022-08-06T04:59:03.614] [ERROR] shiny-server - TypeError: Cannot read 
> properties of undefined (reading 'addEventListener')
> |at WebSocketReceiver.setUp 
> (/usr/share/nodejs/sockjs/lib/trans-websocket.js:76:24)
> |at new GenericReceiver (/usr/share/nodejs/sockjs/lib/transport.js:313:12)
> |at new WebSocketReceiver 
> (/usr/share/nodejs/sockjs/lib/trans-websocket.js:63:9)
> |at ws.onopen (/usr/share/nodejs/sockjs/lib/trans-websocket.js:31:55)
> |at WebSocket.dispatchEvent 
> (/usr/share/nodejs/faye-websocket/lib/faye/websocket/api/event_target.js:24:30)
> |at WebSocket._open 
> (/usr/share/nodejs/faye-websocket/lib/faye/websocket/api.js:144:10)
> |at Hybi. 
> (/usr/share/nodejs/faye-websocket/lib/faye/websocket/api.js:35:49)
> |at Hybi.emit (node:events:513:28)
> |at Hybi._open 
> (/usr/share/nodejs/websocket-driver/lib/websocket/driver/base.js:148:10)
> |at Hybi.start 
> (/usr/share/nodejs/websocket-driver/lib/websocket/driver/base.js:105:34)
> | [2022-08-06T04:59:03.615] [INFO] shiny-server - Stopping listener on 
> http://[::]:3838
> | [2022-08-06T04:59:03.615] [INFO] shiny-server - Shutting down worker 
> processes (with notification)
> | /usr/lib/shiny-server/lib/main.js:391
> |  throw err;
> |  ^
> |
> | TypeError: Cannot read properties of undefined (reading 'addEventListener')
> |at WebSocketReceiver.setUp 
> (/usr/share/nodejs/sockjs/lib/trans-websocket.js:76:24)
> |at new GenericReceiver (/usr/share/nodejs/sockjs/lib/transport.js:313:12)
> |at new WebSocketReceiver 
> (/usr/share/nodejs/sockjs/lib/trans-websocket.js:63:9)
> |at ws.onopen (/usr/share/nodejs/sockjs/lib/trans-websocket.js:31:55)
> |at WebSocket.dispatchEvent 
> (/usr/share/nodejs/faye-websocket/lib/faye/websocket/api/event_target.js:24:30)
> |at WebSocket._open 
> (/usr/share/nodejs/faye-websocket/lib/faye/websocket/api.js:144:10)
> |at Hybi. 
> (/usr/share/nodejs/faye-websocket/lib/faye/websocket/api.js:35:49)
> |at Hybi.emit (node:events:513:28)
> |at Hybi._open 
> (/usr/share/nodejs/websocket-driver/lib/websocket/driver/base.js:148:10)
> |at Hybi.start 
> (/usr/share/nodejs/websocket-driver/lib/websocket/driver/base.js:105:34)
> |
> | Node.js v18.6.0
> 
> 
> While it is running perfectly ok _with 0.3.24-2_. Since this is
> not a new release, there is a regression with the new changelog revision.
> 
> In particular, it seems that something is off with the coffeescript
> generated files.
> 
> -- System Information:
> Debian Release: bookworm/sid
>   APT prefers testing
>   APT policy: (990, 'testing'), (500, 'unstable')
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 5.14.0-2-amd64 (SMP w/8 CPU threads)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not 
> set
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled
> 

-- 
Best,
Nilesh


signature.asc
Description: PGP signature


Bug#1016735: O: safe-iop -- Safe integer operation library

2022-08-06 Thread Kai-Chung Yan

Package: wnpp
Severity: normal

This is a dependency of Android SDK components.

I am no longer active in Debian. Therefore, I orphan this package.


OpenPGP_0xDD1FAB8937FE9825.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1016731: dictionaries-common: Badly generated /var/cache/dictionaries-common/emacsen-ispell-dicts.el for Hebrew

2022-08-06 Thread Agustin Martin
El sáb, 6 ago 2022 a las 14:09, Itaï BEN YAACOV () escribió:
>
> Package: dictionaries-common
> Version: 1.28.15
> Severity: normal
>
> Dear Maintainer,
>
> With hunspell-he installed, starting emacs I get the following error message :
>
> Loading /var/cache/dictionaries-common/emacsen-ispell-dicts.el (source)...
> Error while loading 50dictionaries-common: Invalid read syntax: "] in a list"
>
> Without that package, no problem.
> The origin seems to be in the file 
> /var/cache/dictionaries-common/emacsen-ispell-dicts.el , that contains the 
> following lines :
>
> (add-to-list 'debian-hunspell-only-dictionary-alist
>   '("hebrew"
>  
> "[a-zA-Z\327\231\327\225\327\224\327\220\327\242\327\227\327\233\327\247\327\251\327\241\327\226\327\223\327\222\327\221\327\250\327\240\327\236\327\230\327\246\327\252\327\244\327\235\327\243\327\232\327\245\327\237\327\234]"
>  
> "[^a-zA-Z\327\231\327\225\327\224\327\220\327\242\327\227\327\233\327\247\327\251\327\241\327\226\327\223\327\222\327\221\327\250\327\240\327\236\327\230\327\246\327\252\327\244\327\235\327\243\327\232\327\245\327\237\327\234]"
>  "[אבגדהוזחטיכלמנסעפצקרשתםןךףץ'"]"
>  nil
>  ("-d" "he_IL")
>  nil
>  utf-8))
>
> You will notice the unescaped " in the fifth line, followed indeed by the  
> character ] ...
> Since the file is generated by perl (if I understand correctly, it is 
> generated by /usr/share/perl5/Debian/DictionariesCommon.pm), this is where I 
> stopped digging.
>
> Can that perl script be repaired so as to escape double quotes when 
> appropriate ?

Hi, thanks for the info.

It should not be hard to fix once I find some time for that. Will let you know.

Regards,

..
Agustin



Bug#1001261: rclone: new upstream release 1.57.0

2022-08-06 Thread Daniel Baumann
retitle 1001261 new upstream release (1.59)
thanks

...and by now it it's 1.59. it would be really nice to have the bugfixes
of the newer versions.

Regards,
Daniel



Bug#537284: Ligature fi becoming ø in avant garde

2022-08-06 Thread Hilmar Preuße

Control: severity -1 minor
Control: notforwarded -1

Am 16.07.2009 um 19:27 teilte Anthony DeRobertis mit:

Hi,

As explained the issue is now solved, except for "chancery". I lower to 
minor for now. Please not that I had to change the command to "mk4ht 
htlatex a.tex", else the compilation fails. As I don't understand 
anything of tex4ht I can't tell if this is a new bug.


Hilmar


The following input:

\documentclass{article}
\usepackage{avant}
\usepackage[T1]{fontenc}
\begin{document}

first

\textsf{first}

\end{document}

with the following command:

mk4ht htlatex a.tex "html,uni-html4,css2,charset=utf-8,info" " -cunihtf 
-utf8"

gets the following HTML output:

first

ørst

Notice how the fi (fi; U+FB01) ligature becomes ø (small o stroke; U+00F8).



--
sigfault



OpenPGP_signature
Description: OpenPGP digital signature


  1   2   >