Bug#1050929: marked as done (telegram-desktop: System window decorations disabled on Wayland after 4.9.3)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 09:32:57 +0300
with message-id <3f2326ae0309f021654431f3be9abf4707962d5f.ca...@guriev.su>
and subject line Bug#1050929: fixed in telegram-desktop 4.9.7+ds-1
has caused the Debian Bug report #1050929,
regarding telegram-desktop: System window decorations disabled on Wayland after 
4.9.3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050929: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050929
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: telegram-desktop
Version: 4.9.3+ds-1
Severity: normal

Dear Maintainer,

I use KDE Plasma under Wayland and I've always used the window system
decorations option in order to make my desktop visually consistent.

But after updating to 4.9.3, this option has suddenly disappeared. I
asked upstream and they said the option was still there but it was most
probably disabled by the package maintainer, so I come here to humbly ask
to re-enable it if possible.

   * What led up to the situation?
   Updating from 4.8.1 to 4.9.3 under Plasma+Wayland
   * What was the outcome of this action?
   The "Use system window decorations" option is now disabled
   * What outcome did you expect instead?
   Being able to use the option, it's been there before the update

Thank you for your time.

-- Package-specific info:

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-3-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages telegram-desktop depends on:
ii  libabsl2022062320220623.1-3
ii  libavcodec60   7:6.0-6
ii  libavfilter9   7:6.0-6
ii  libavformat60  7:6.0-6
ii  libavutil587:6.0-6
ii  libc6  2.37-7
ii  libgcc-s1  13.2.0-2
ii  libglib2.0-0   2.77.2-1
ii  libglibmm-2.68-1   2.77.0-1
ii  libhunspell-1.7-0  1.7.2+really1.7.2-10
ii  libjpeg62-turbo1:2.1.5-2
ii  libkf5coreaddons5  5.107.0-1
ii  liblz4-1   1.9.4-1
ii  libminizip11:1.2.13.dfsg-3
ii  libopenal1 1:1.23.1-3
ii  libopus0   1.4-1
ii  libqrcodegencpp1   1.8.0-1.1
ii  libqt5core5a [qtbase-abi-5-15-10]  5.15.10+dfsg-3
ii  libqt5gui5 5.15.10+dfsg-3
ii  libqt5network5 5.15.10+dfsg-3
ii  libqt5svg5 5.15.10-2
ii  libqt5widgets5 5.15.10+dfsg-3
ii  librlottie0-1  0.1+dfsg-4
ii  libsigc++-3.0-03.4.0-7
ii  libsrtp2-1 2.5.0-3
ii  libssl33.0.10-1
ii  libstdc++6 13.2.0-2
ii  libswresample4 7:6.0-6
ii  libswscale77:6.0-6
ii  libvpx71.12.0-1
ii  libx11-6   2:1.8.6-1
ii  libxcb-keysyms10.4.0-1+b2
ii  libxcb-record0 1.15-1
ii  libxcb-screensaver01.15-1
ii  libxcb11.15-1
ii  libxcomposite1 1:0.4.5-1
ii  libxdamage11:1.1.6-1
ii  libxext6   2:1.3.4-1+b1
ii  libxfixes3 1:6.0.0-2
ii  libxrandr2 2:1.5.2-2+b1
ii  libxtst6   2:1.2.3-1.1
ii  libxxhash0 0.8.1-1
ii  libyuv00.0~git20230616.a366ad7-1
ii  qt5-image-formats-plugins  5.15.10-2
ii  zlib1g 1:1.2.13.dfsg-3

Versions of packages telegram-desktop recommends:
pn  fonts-open-sans 
pn  libwebkit2gtk-4.0-37 | libwebkit2gtk-4.1-0  

telegram-desktop suggests no packages.

Versions of packages telegram-desktop is related to:
ii  xdg-desktop-portal   1.16.0-3
ii  xdg-desktop-portal-kde [xdg-desktop-portal-backend]  5.27.7-1

-- no debconf information
[2023.08.31 09:11:32] Launched version: 4009003, install beta: [FALSE], alpha: 
0, debug mode: [FALSE]
[2023.08.31 09:11:32] Exec

Bug#1051885: marked as done (kdevelop: FTBFS with llvm-toolchain-16 as default)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 06:21:05 +
with message-id 
and subject line Bug#1051885: fixed in kdevelop 4:22.12.2-3
has caused the Debian Bug report #1051885,
regarding kdevelop: FTBFS with llvm-toolchain-16 as default
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051885
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: kdevelop
Version: 4:22.12.2-2
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)
X-Debbugs-Cc: sramac...@debian.org

https://buildd.debian.org/status/fetch.php?pkg=kdevelop&arch=amd64&ver=4%3A22.12.2-2%2Bb1&stamp=1694630976&raw=0

Typical components:
  all   All LLVM libraries (default).
  engineEither a native JIT or a bitcode interpreter.
CMake Error at cmake/modules/FindClang.cmake:113 (message):
  Could not find Clang builtin directory
Call Stack (most recent call first):
  plugins/CMakeLists.txt:39 (find_package)


-- Configuring incomplete, errors occurred!
cd obj-x86_64-linux-gnu && tail -v -n \+0 CMakeCache.txt

Cheers
-- 
Sebastian Ramacher
--- End Message ---
--- Begin Message ---
Source: kdevelop
Source-Version: 4:22.12.2-3
Done: Pino Toscano 

We believe that the bug you reported is fixed in the latest version of
kdevelop, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pino Toscano  (supplier of updated kdevelop package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 14 Sep 2023 07:35:46 +0200
Source: kdevelop
Architecture: source
Version: 4:22.12.2-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Qt/KDE Maintainers 
Changed-By: Pino Toscano 
Closes: 1051885
Changes:
 kdevelop (4:22.12.2-3) unstable; urgency=medium
 .
   * Backport upstream commit 1a92bed73ae31e6f90c3bffe455f8e3c46ac4905,
 commit 9913f734d8aab75ea2e97c699cd926e9fd7a40b6, and
 commit 1c7bdc2e0f8dcf2aeb682ab3f5e317e3a97435ea, and
 ede1cf4ad6f945349060db9446c489e3fd34dec4 to find LLVM/Clang >= 16, and
 build with it; patches
 upstream_Drop-custom-Find-modules-and-use-upstream-ClangConfi.patch,
 upstream_Don-t-look-for-Clang-s-builtin-dir-in-unclean-versio.patch,
 upstream_Look-for-Clang-16-builtin-dir-in-major-version-subdi.patch,
 upstream_Don-t-cast-out-of-enum-range-1-to-CommonIntegralType.patch
 (Closes: #1051885)
 - refresh optional-clang.diff to apply cleanly on top of them
   * Disable the usage of LLVM/Clang on loong64 & sparc64, as it is not 
available
 on these architectures.
Checksums-Sha1:
 d4caf6c74f6865828463588329391ea1946a935b 4093 kdevelop_22.12.2-3.dsc
 8c2b8c5858155a4857e1929ab0d91a85e7af8691 42056 kdevelop_22.12.2-3.debian.tar.xz
 1b3ebcde863adcaf625eb9fdc97b7406814a84ac 21542 
kdevelop_22.12.2-3_source.buildinfo
Checksums-Sha256:
 8c1c614d92afd8778cef2201c594ae8a9947782711da37e4f83628391d616962 4093 
kdevelop_22.12.2-3.dsc
 087ee8025e6e78510346eb35a4e41f88384b02206c7affa3d9f478181c7bfa53 42056 
kdevelop_22.12.2-3.debian.tar.xz
 a43dee48946fa72b3be05a64674535e437d7ec360f771540fda9665749426fd7 21542 
kdevelop_22.12.2-3_source.buildinfo
Files:
 ba5c7dc9e40dd7bba089155976d83f8b 4093 devel optional kdevelop_22.12.2-3.dsc
 6ee2d013a5529a98f1966453eefb6d57 42056 devel optional 
kdevelop_22.12.2-3.debian.tar.xz
 255109965c322adaa5b3209a749a6676 21542 devel optional 
kdevelop_22.12.2-3_source.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#1043033: marked as done (ghostscript: CVE-2023-38559)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 07:08:21 +0200
with message-id 
and subject line Re: Accepted ghostscript 10.02.0~dfsg-1 (source) into unstable
has caused the Debian Bug report #1043033,
regarding ghostscript: CVE-2023-38559
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1043033: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ghostscript
Version: 10.01.2~dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=706897
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 10.0.0~dfsg-11+deb12u1
Control: found -1 10.0.0~dfsg-11
Control: found -1 9.53.3~dfsg-7+deb11u5
Control: found -1 9.53.3~dfsg-7

Hi,

The following vulnerability was published for ghostscript.

CVE-2023-38559[0]:
| A buffer overflow flaw was found in base/gdevdevn.c:1973 in
| devn_pcx_write_rle() in ghostscript. This issue may allow a local
| attacker to cause a denial of service via outputting a crafted PDF
| file for a DEVN device with gs.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-38559
https://www.cve.org/CVERecord?id=CVE-2023-38559
[1] https://bugs.ghostscript.com/show_bug.cgi?id=706897 (private)
[2] 
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1fb9991bb95f1201abb5dea55f57f

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: ghostscript
Source-Version: 10.02.0~dfsg-1

On Wed, Sep 13, 2023 at 09:21:09PM +, Debian FTP Masters wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Format: 1.8
> Date: Wed, 13 Sep 2023 20:18:16 +0200
> Source: ghostscript
> Architecture: source
> Version: 10.02.0~dfsg-1
> Distribution: unstable
> Urgency: medium
> Maintainer: Debian QA Group 
> Changed-By: Jonas Smedegaard 
> Changes:
>  ghostscript (10.02.0~dfsg-1) unstable; urgency=medium
>  .
>* QA upload
>  .
>[ upstream ]
>* new release(s)

This should address as well CVE-2023-38559 / #1043033 . 

Closing with the fixed version accordingly.

Regards,
Salvatore--- End Message ---


Bug#1051455: marked as done (linux-image-6.1.0-0.deb11.7-amd64: please enable CONFIG_XDP_SOCKETS_DIAG)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 05:00:10 +
with message-id 
and subject line Bug#1051455: fixed in linux 6.5.3-1
has caused the Debian Bug report #1051455,
regarding linux-image-6.1.0-0.deb11.7-amd64: please enable 
CONFIG_XDP_SOCKETS_DIAG
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051455: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051455
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 6.1.20-2~bpo11+1
Severity: minor

Hello.

Please enable CONFIG_XDP_SOCKETS_DIAG, so that "ss" tool could tell
about AF_XDP socket in the system.

For example, on Ubuntu I can get following report:

sudo ss --xdp -e
Recv-Q  Send-Q Local Address:Port   
  Peer Address:Port  Process 
0   0enp1s0f1np1:q0 
  *   ino:6430238 sk:3
rx(entries:2048)
tx(entries:512)

umem(id:1,size:33554432,num_pages:8192,chunk_size:2048,headroom:192,ifindex:5,qid:0,zc:1,refs:1)
fr(entries:2048)
cr(entries:512)
stats(rx dropped:0,rx invalid:0,rx queue full:0,rx fill ring empty:0,tx 
invalid:0,tx ring empty:0)
0   0enp1s0f0np0:q0 
  *   ino:6430236 sk:4
rx(entries:2048)
tx(entries:512)

umem(id:0,size:33554432,num_pages:8192,chunk_size:2048,headroom:192,ifindex:4,qid:0,zc:1,refs:1)
fr(entries:2048)
cr(entries:512)
stats(rx dropped:0,rx invalid:0,rx queue full:0,rx fill ring empty:0,tx 
invalid:0,tx ring empty:0)


Debian provides "ss" tool, and this tool does not complain on "--xdp"
parameter, but it does not print any information.  It looks like the system
does not have any AF_XDP socket, which (in my case) is not true.

Thank you!

-- Package-specific info:
** Version:
Linux version 6.1.0-0.deb11.7-amd64 (debian-ker...@lists.debian.org) (gcc-10 
(Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 
SMP PREEMPT_DYNAMIC Debian 6.1.20-2~bpo11+1 (2023-04-23)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.1.0-0.deb11.7-amd64 
root=UUID=5300d200-22b3-41e1-b241-831af8102374 ro console=tty0 
crashkernel=384M-:128M

** Tainted: POE (12289)
 * proprietary module was loaded
 * externally-built ("out-of-tree") module was loaded
 * unsigned module was loaded

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: Micro-Star International Co., Ltd.
product_name: MS-7D25
product_version: 2.0
chassis_vendor: Micro-Star International Co., Ltd.
chassis_version: 2.0
bios_vendor: American Megatrends International, LLC.
bios_version: A.A0
board_vendor: Micro-Star International Co., Ltd.
board_name: PRO Z690-A WIFI (MS-7D25)
board_version: 2.0

** Loaded modules:
cpuid
tls
btrfs
blake2b_generic
zstd_compress
ufs
qnx4
hfsplus
hfs
cdrom
minix
vfat
msdos
fat
jfs
xfs
nfsv4
dns_resolver
nfs
fscache
netfs
rfcomm
cmac
algif_hash
algif_skcipher
af_alg
btusb
btrtl
btbcm
btintel
btmtk
dm_mod
bnep
nfnetlink
cts
rpcsec_gss_krb5
bluetooth
jitterentropy_rng
drbg
ansi_cprng
ecdh_generic
rfkill
ecc
intel_rapl_msr
intel_rapl_common
x86_pkg_temp_thermal
intel_powerclamp
coretemp
snd_sof_pci_intel_tgl
joydev
snd_sof_intel_hda_common
soundwire_intel
soundwire_generic_allocation
kvm_intel
amdgpu
soundwire_cadence
snd_sof_intel_hda
snd_sof_pci
kvm
snd_sof_xtensa_dsp
snd_sof
snd_sof_utils
snd_soc_hdac_hda
snd_hda_ext_core
snd_soc_acpi_intel_match
snd_soc_acpi
snd_soc_core
irqbypass
snd_hda_codec_realtek
ghash_clmulni_intel
snd_hda_codec_generic
snd_compress
sha512_ssse3
soundwire_bus
ledtrig_audio
sha512_generic
snd_hda_codec_hdmi
snd_hda_intel
gpu_sched
snd_intel_dspcfg
drm_buddy
snd_intel_sdw_acpi
drm_display_helper
snd_hda_codec
aesni_intel
snd_hda_core
cec
crypto_simd
snd_hwdep
rc_core
cryptd
snd_pcm
drm_ttm_helper
ttm
rapl
snd_timer
intel_cstate
drm_kms_helper
snd
mei_me
iTCO_wdt
intel_pmc_bxt
pmt_telemetry
intel_uncore
i2c_algo_bit
soundcore
pmt_class
mei
iTCO_vendor_support
efi_pstore
watchdog
sg
pcspkr
wmi_bmof
intel_vsec
mxm_wmi
serial_multi_instantiate
intel_pmc_core
acpi_pad
acpi_tad
evdev
button
nfsd
parport_pc
ppdev
nfs_acl
lockd
auth_rpcgss
lp
grace
drm
parport
fuse
sunrpc
configfs
efivarfs
ip_tables
x_tables
autofs4
ext4
crc16
mbcache
jbd2
raid10
raid456
async_raid6_recov
async_memcpy
async_pq
async_xor
async_tx
xor
raid6_pq
libcrc32c
crc32c_gen

Bug#1051249: marked as done (linux: s390x: FTBFS: kernel-wedge install-files: missing modules mptfc, mptsas and mptspi)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 05:00:10 +
with message-id 
and subject line Bug#1051249: fixed in linux 6.5.3-1
has caused the Debian Bug report #1051249,
regarding linux: s390x: FTBFS: kernel-wedge install-files: missing modules 
mptfc, mptsas and mptspi
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051249: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051249
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 6.5~rc4-1~exp1
Severity: serious
Tags: ftbfs
Justification: FTBFS
X-Debbugs-Cc: car...@debian.org

linux/6.5~rc4-1~exp1 onwards in experimental FTBFS for s390x:

https://buildd.debian.org/status/fetch.php?pkg=linux&arch=s390x&ver=6.5%7Erc4-1%7Eexp1&stamp=1691173177&raw=0

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.5.3-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:20:48 +0200
Source: linux
Architecture: source
Version: 6.5.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1025845 1041007 1051249 1051455
Changes:
 linux (6.5.3-1) unstable; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.2
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3
 .
   [ Christian Göttsche ]
   * Enable KFENCE support (not enabled by default) (Closes: #1025845)
 .
   [ Diederik de Haas ]
   * net/xdp: Enable XDP_SOCKETS_DIAG as module (Closes: #1051455)
 .
   [ Ben Hutchings ]
   * udeb: Make MPT modules optional in scsi-modules (fixes FTBFS on s390x)
 (Closes: #1051249)
 .
   [ Salvatore Bonaccorso ]
   * Refresh "radeon, amdgpu: Firmware is required for DRM and KMS on R600
 onward"
   * Set ABI to 1
   * [rt] Update to 6.5.2-rt8
 .
   [ Emanuele Rocca ]
   * [arm64] Add reset-rzg2l-usbphy-ctrl to usb-modules udeb in order to enable
 USB support on Renesas RZ/G2L-SMARC boards.
   * [arm64,armhf] drivers/hwspinlock: Enable CONFIG_HWSPINLOCK
   * [arm64] Add support for Lenovo ThinkPad X13s: enable as modules
 SC_DISPCC_8280XP, SC_GCC_8280XP, SC_GPUCC_8280XP, QCOM_SPMI_ADC5,
 INTERCONNECT_QCOM_OSM_L3, INTERCONNECT_QCOM_SC8280XP, LEDS_QCOM_LPG,
 QCOM_IPCC, QCOM_FASTRPC, NVMEM_SPMI_SDAM, PHY_QCOM_EDP, PHY_QCOM_QMP_PCIE,
 PHY_QCOM_USB_SNPS_FEMTO_V2, PINCTRL_SC8280XP, PINCTRL_SC8280XP_LPASS_LPI,
 PINCTRL_LPASS_LPI, POWER_RESET_QCOM_PON, BATTERY_QCOM_BATTMGR,
 QCOM_Q6V5_ADSP, QCOM_Q6V5_PAS, QCOM_Q6V5_WCSS, QCOM_SYSMON, QCOM_LLCC,
 QCOM_OCMEM, QCOM_PMIC_GLINK, QCOM_STATS, QCOM_APR, QCOM_ICC_BWMON,
 SPI_QCOM_GENI, TYPEC_MUX_GPIO_SBU, QRTR_SMD, SND_SOC_WCD938X_SDW,
 SND_SOC_LPASS_WSA_MACRO, SND_SOC_LPASS_VA_MACRO, SND_SOC_LPASS_RX_MACRO,
 SND_SOC_LPASS_TX_MACRO, SND_SOC_QDSP6
 (Thanks Steve Capper!)
   * [arm64] Add Thinkpad X13s modules to udebs
 .
   [ Vincent Blut ]
   * drivers/char/hw_random: Change HW_RANDOM from module to built-in
 (Closes: #1041007)
   * drivers/char/tpm: Do not explicitly set HW_RANDOM_TPM
   * [arm64, cloud, x86] drivers/char/tpm: Do not explicitly enable TCG_TPM
   * [arm*,ppc64*,sparc64,s390x] drivers/char/hw_random: Prevent some HW Random
 Number Generator drivers from being built-in
Checksums-Sha1:
 077843e2f9c08cc1def55e134ff52e8067609573 288931 linux_6.5.3-1.dsc
 90adc41d78bcec83f78851281ba290052570d36c 141462376 linux_6.5.3.orig.tar.xz
 a3bbbf54f9b9d60d69afa331ff96392fdab6a8a5 1493144 linux_6.5.3-1.debian.tar.xz
 a2e326f7933128849657e7472fe053c721c5f4af 6858 linux_6.5.3-1_source.buildinfo
Checksums-Sha256:
 e41e0a33c5eb34d3c53d50ad358ef5485107c148281ef9bf58f4c2a8a2080c66 288931 
linux_6.5.3-1.dsc
 55bc546f0b3e5b1fd984f0e22155fa9e0e7eca20fcb5f327a86f9ecfa3789983 141462376 
linux_6.5.3.orig.tar.xz
 f71a0ee85d794ce35b9

Bug#1041007: marked as done (linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM hardware RNG support (CONFIG_HW_RANDOM_TPM))

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 05:00:10 +
with message-id 
and subject line Bug#1041007: fixed in linux 6.5.3-1
has caused the Debian Bug report #1041007,
regarding linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM hardware RNG 
support (CONFIG_HW_RANDOM_TPM)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1041007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041007
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 6.1.20-2~bpo11+1
Severity: normal
X-Debbugs-Cc: jflf_ker...@gmx.com

Dear Maintainer,

Currently no Debian kernel enables support for TPM hardware RNG. On one of my
systems:

$ uname -a
Linux XXX 6.1.0-0.deb11.7-amd64 #1 SMP PREEMPT_DYNAMIC Debian
6.1.20-2~bpo11+1 (2023-04-23) x86_64 GNU/Linux

$ cat /sys/class/tpm/tpm0/device/description
TPM 2.0 Device

$ ls /dev/tpm*
/dev/tpm0  /dev/tpmrm0

$ sudo tpm2_getrandom 16 | xxd -p
7ba65632453b191385a3989485ac80a3

$ grep HW_RANDOM_TPM /boot/config-$(uname -r)


$ find /lib/modules/$(uname -r) -iname \*tpm\*rng\*


$ ls /dev/hwrng
ls: cannot access '/dev/hwrng': No such file or directory


I have checked the current bookworm and trixie kernel debs, and they don't
include it either. It should be enabled there too.

I manage multiple older amd64 machines that have discrete TPM chips, but no
RDRAND instruction or any other hardware RNG. Enabling support for the TPM RNG
would provide the kernel with additional entropy earlier in the boot process.

Thank you very much!


-- Package-specific info:
** Version:
Linux version 6.1.0-0.deb11.7-amd64 (debian-ker...@lists.debian.org) (gcc-10 
(Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 
SMP PREEMPT_DYNAMIC Debian 6.1.20-2~bpo11+1 (2023-04-23)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.1.0-0.deb11.7-amd64 
root=UUID=0c206836-a588-4a57-9c6d-92d3f3e20d01 ro quiet nmi_watchdog=0

** Tainted: PUOE (12353)
 * proprietary module was loaded
 * taint requested by userspace application
 * externally-built ("out-of-tree") module was loaded
 * unsigned module was loaded

** Kernel log:
Jul 13 07:19:40 silverpad kernel: ACPI: SSDT 0xD7FFA000 0004B7 (v02 
LENOVO Tpm2Tabl 1000 INTL 20141107)
Jul 13 07:19:40 silverpad kernel: ACPI: TPM2 0xD7FF8000 34 (v03 
LENOVO TP-R0C   1370 PTEC 0002)
Jul 13 07:19:40 silverpad kernel: ACPI: Reserving TPM2 table memory at [mem 
0xd7ff8000-0xd7ff8033]

** Model information
sys_vendor: LENOVO
product_name: 20GJCTO1WW
product_version: ThinkPad 13
chassis_vendor: LENOVO
chassis_version: None
bios_vendor: LENOVO
bios_version: R0CET49W (1.37 )
board_vendor: LENOVO
board_name: 20GJCTO1WW
board_version: SDK0J40709 WIN

** Loaded modules:
isofs
cdrom
uas
usb_storage
uinput
ctr
ccm
rfcomm
nft_fib_inet
nft_fib_ipv4
nft_fib_ipv6
nft_fib
nft_reject_inet
nf_reject_ipv4
vboxnetadp(OE)
nf_reject_ipv6
vboxnetflt(OE)
nft_reject
nft_ct
nft_chain_nat
nf_nat
nf_conntrack
nf_defrag_ipv6
nf_defrag_ipv4
vboxdrv(OE)
ip_set
nf_tables
nfnetlink
zstd
zstd_compress
cmac
algif_hash
algif_skcipher
zram
af_alg
zsmalloc
bnep
zfs(POE)
zunicode(POE)
zzstd(OE)
zlua(OE)
zavl(POE)
icp(POE)
zcommon(POE)
znvpair(POE)
spl(OE)
hid_logitech
ff_memless
hid_generic
snd_usb_audio
usbhid
snd_usbmidi_lib
snd_rawmidi
hid
snd_seq_device
cdc_ether
usbnet
r8152
mii
btusb
btrtl
btbcm
btintel
btmtk
bluetooth
jitterentropy_rng
uvcvideo
videobuf2_vmalloc
drbg
videobuf2_memops
videobuf2_v4l2
ansi_cprng
videobuf2_common
ecdh_generic
ecc
videodev
crc16
mc
snd_sof_pci_intel_skl
intel_rapl_msr
intel_rapl_common
snd_sof_intel_hda_common
snd_hda_codec_hdmi
x86_pkg_temp_thermal
intel_powerclamp
soundwire_intel
soundwire_generic_allocation
soundwire_cadence
coretemp
snd_sof_intel_hda
crc32_pclmul
snd_sof_pci
snd_sof_xtensa_dsp
snd_sof
snd_sof_utils
soundwire_bus
ghash_clmulni_intel
sha512_ssse3
sha512_generic
snd_soc_skl
snd_soc_hdac_hda
snd_ctl_led
snd_hda_ext_core
snd_soc_sst_ipc
snd_hda_codec_realtek
snd_soc_sst_dsp
snd_soc_acpi_intel_match
snd_soc_acpi
snd_hda_codec_generic
snd_soc_core
snd_compress
iwlmvm
snd_hda_intel
snd_intel_dspcfg
snd_intel_sdw_acpi
snd_hda_codec
intel_xhci_usb_role_switch
roles
snd_hda_core
aesni_intel
mac80211
crypto_simd
snd_hwdep
xhci_pci
cryptd
xhci_hcd
snd_pcm
mei_hdcp
ee1004
nls_ascii
rapl
libarc4
iwlwifi
e1000e
thinkpad_acpi
usbcore
nls_cp437
i2c_i801
mei_me
ptp
snd_timer
nvram
think_lmi
intel_lpss_pci
intel_cstate
platform_profile
vfat
intel_lpss
ledtrig_audio
fat
cfg80211
intel_uncore
intel_wmi_thunderbolt
wmi_bmof
firmware_attributes_class
pps_core
mei
i2c_smbus
usb_common
snd
idma64
intel

Bug#1051535: marked as done (linux: HW_RANDOM_TPM disabled due to IMA=y)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 05:00:10 +
with message-id 
and subject line Bug#1041007: fixed in linux 6.5.3-1
has caused the Debian Bug report #1041007,
regarding linux: HW_RANDOM_TPM disabled due to IMA=y
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1041007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041007
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Severity: normal

Working with a Debian user in Matrix channel #Debian where they report
that the TPM hardware random number generator that was available in
v5.10* series is missing from v6.1* series for the amd64 kernel.

After examining the Kconfig options and the Debian configs I found that
due to commit 6e679322d7d "Re-enable IMA" that possibly inadvertently
it disabled HW_RANDOM_TPM.

The reason being that we have:

config HW_RANDOM_TPM
bool "TPM HW Random Number Generator support"
depends on TCG_TPM && HW_RANDOM && !(TCG_TPM=y && HW_RANDOM=m)

And when IMA=y that does:

config IMA
bool "Integrity Measurement Architecture(IMA)"
...
select TCG_TPM if HAS_IOMEM

And `select` will force the target to the same value as this option.

TCG_TPM is tri-state (n,y,m) but IMA is boolean (n,y) so this select
forces TCG_TPM=y.

so !(TCG_TPM=y && HW_RANDOM=m) is true and therefore HW_RANDOM_TPM is
not set.

$ grep -rnE 'CONFIG_(IMA|TCG_TPM|HW_RANDOM)=' debian/config 
/boot/config-6.1.0-11-amd64
debian/config/config:457:CONFIG_HW_RANDOM=m
debian/config/config:7752:CONFIG_IMA=y
debian/config/arm64/config:172:CONFIG_TCG_TPM=m
debian/config/kernelarch-x86/config:332:CONFIG_TCG_TPM=m
debian/config/config.cloud:149:CONFIG_TCG_TPM=m
/boot/config-6.1.0-11-amd64:4324:CONFIG_HW_RANDOM=m
/boot/config-6.1.0-11-amd64:4352:CONFIG_TCG_TPM=y
/boot/config-6.1.0-11-amd64:9774:CONFIG_IMA=y


-- System Information:
Debian Release: 12.1
Architecture: amd64 (x86_64)
Foreign Architectures: i386
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.5.3-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1041...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:20:48 +0200
Source: linux
Architecture: source
Version: 6.5.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1025845 1041007 1051249 1051455
Changes:
 linux (6.5.3-1) unstable; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.2
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3
 .
   [ Christian Göttsche ]
   * Enable KFENCE support (not enabled by default) (Closes: #1025845)
 .
   [ Diederik de Haas ]
   * net/xdp: Enable XDP_SOCKETS_DIAG as module (Closes: #1051455)
 .
   [ Ben Hutchings ]
   * udeb: Make MPT modules optional in scsi-modules (fixes FTBFS on s390x)
 (Closes: #1051249)
 .
   [ Salvatore Bonaccorso ]
   * Refresh "radeon, amdgpu: Firmware is required for DRM and KMS on R600
 onward"
   * Set ABI to 1
   * [rt] Update to 6.5.2-rt8
 .
   [ Emanuele Rocca ]
   * [arm64] Add reset-rzg2l-usbphy-ctrl to usb-modules udeb in order to enable
 USB support on Renesas RZ/G2L-SMARC boards.
   * [arm64,armhf] drivers/hwspinlock: Enable CONFIG_HWSPINLOCK
   * [arm64] Add support for Lenovo ThinkPad X13s: enable as modules
 SC_DISPCC_8280XP, SC_GCC_8280XP, SC_GPUCC_8280XP, QCOM_SPMI_ADC5,
 INTERCONNECT_QCOM_OSM_L3, INTERCONNECT_QCOM_SC8280XP, LEDS_QCOM_LPG,
 QCOM_IPCC, QCOM_FASTRPC, NVMEM_SPMI_SDAM, PHY_QCOM_EDP, PHY_QCOM_QMP_PCIE,
 PHY_QCOM_USB_SNPS_FEMTO_V2, PINCTRL_SC8280XP, PINCTRL_SC8280XP_LPASS_LPI,
 PINCTRL_LPASS_LPI, POWER_RESET_QCOM_PON, BATTERY_QCOM_BATTMGR,
 QCOM_Q6V5_ADSP, QCOM_Q6V5_PAS, QCOM_Q6V5_WCSS, QCOM_SYSMON, QCOM_LLCC,
 QCOM_OCMEM, QCOM_PMIC_GLINK, QCOM_STATS, QCOM_APR, QCOM_ICC_

Bug#1025845: marked as done (linux: please enable CONFIG_KFENCE)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 05:00:10 +
with message-id 
and subject line Bug#1025845: fixed in linux 6.5.3-1
has caused the Debian Bug report #1025845,
regarding linux: please enable CONFIG_KFENCE
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1025845: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025845
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 6.0.12-1
Tags: security

Please enable support for Kernel Electric-Fence (KFENCE), a memory
safety error detector, see
https://docs.kernel.org/dev-tools/kfence.html.

Whether to actually enable it by default (do not set
CONFIG_KFENCE_SAMPLE_INTERVAL) or disable it (set
CONFIG_KFENCE_SAMPLE_INTERVAL to 0) might be up for discussion (e.g.
enable in sid, disable before stable release?).
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.5.3-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1025...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:20:48 +0200
Source: linux
Architecture: source
Version: 6.5.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1025845 1041007 1051249 1051455
Changes:
 linux (6.5.3-1) unstable; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.2
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3
 .
   [ Christian Göttsche ]
   * Enable KFENCE support (not enabled by default) (Closes: #1025845)
 .
   [ Diederik de Haas ]
   * net/xdp: Enable XDP_SOCKETS_DIAG as module (Closes: #1051455)
 .
   [ Ben Hutchings ]
   * udeb: Make MPT modules optional in scsi-modules (fixes FTBFS on s390x)
 (Closes: #1051249)
 .
   [ Salvatore Bonaccorso ]
   * Refresh "radeon, amdgpu: Firmware is required for DRM and KMS on R600
 onward"
   * Set ABI to 1
   * [rt] Update to 6.5.2-rt8
 .
   [ Emanuele Rocca ]
   * [arm64] Add reset-rzg2l-usbphy-ctrl to usb-modules udeb in order to enable
 USB support on Renesas RZ/G2L-SMARC boards.
   * [arm64,armhf] drivers/hwspinlock: Enable CONFIG_HWSPINLOCK
   * [arm64] Add support for Lenovo ThinkPad X13s: enable as modules
 SC_DISPCC_8280XP, SC_GCC_8280XP, SC_GPUCC_8280XP, QCOM_SPMI_ADC5,
 INTERCONNECT_QCOM_OSM_L3, INTERCONNECT_QCOM_SC8280XP, LEDS_QCOM_LPG,
 QCOM_IPCC, QCOM_FASTRPC, NVMEM_SPMI_SDAM, PHY_QCOM_EDP, PHY_QCOM_QMP_PCIE,
 PHY_QCOM_USB_SNPS_FEMTO_V2, PINCTRL_SC8280XP, PINCTRL_SC8280XP_LPASS_LPI,
 PINCTRL_LPASS_LPI, POWER_RESET_QCOM_PON, BATTERY_QCOM_BATTMGR,
 QCOM_Q6V5_ADSP, QCOM_Q6V5_PAS, QCOM_Q6V5_WCSS, QCOM_SYSMON, QCOM_LLCC,
 QCOM_OCMEM, QCOM_PMIC_GLINK, QCOM_STATS, QCOM_APR, QCOM_ICC_BWMON,
 SPI_QCOM_GENI, TYPEC_MUX_GPIO_SBU, QRTR_SMD, SND_SOC_WCD938X_SDW,
 SND_SOC_LPASS_WSA_MACRO, SND_SOC_LPASS_VA_MACRO, SND_SOC_LPASS_RX_MACRO,
 SND_SOC_LPASS_TX_MACRO, SND_SOC_QDSP6
 (Thanks Steve Capper!)
   * [arm64] Add Thinkpad X13s modules to udebs
 .
   [ Vincent Blut ]
   * drivers/char/hw_random: Change HW_RANDOM from module to built-in
 (Closes: #1041007)
   * drivers/char/tpm: Do not explicitly set HW_RANDOM_TPM
   * [arm64, cloud, x86] drivers/char/tpm: Do not explicitly enable TCG_TPM
   * [arm*,ppc64*,sparc64,s390x] drivers/char/hw_random: Prevent some HW Random
 Number Generator drivers from being built-in
Checksums-Sha1:
 077843e2f9c08cc1def55e134ff52e8067609573 288931 linux_6.5.3-1.dsc
 90adc41d78bcec83f78851281ba290052570d36c 141462376 linux_6.5.3.orig.tar.xz
 a3bbbf54f9b9d60d69afa331ff96392fdab6a8a5 1493144 linux_6.5.3-1.debian.tar.xz
 a2e326f7933128849657e7472fe053c721c5f4af 6858 linux_6.5.3-1_source.buildinfo
Checksums-Sha256:
 e41e0a33c5eb34d3c53d50ad358ef5485107c148281ef9bf58f4c2a8a2080c66 288931 
linux_6.5.3-1.dsc
 55bc546f0b3e5b1fd984f0e22155fa9e0e7eca20fcb5f327a86f9ecfa3789983 141462376 
linux

Bug#960489: marked as done (logrotate: error: gzip: stdin: file size changed while zipping)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 06:04:38 +0200
with message-id 
and subject line Fixed with 2.0.17-3
has caused the Debian Bug report #960489,
regarding logrotate: error: gzip: stdin: file size changed while zipping
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
960489: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960489
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mosquitto
Version: 1.5.7-1+deb10u1
Severity: normal

Dear Maintainer,

Sometimes I receive this message from the cron daemon:

/etc/cron.daily/logrotate:
error: Compressing program wrote following message to stderr when compressing 
log /var/log/mosquitto/mosquitto.log.1:
gzip: stdin: file size changed while zipping


-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (400, 
'proposed-updates')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-9-amd64 (SMP w/8 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages mosquitto depends on:
ii  adduser 3.118
ii  libc6   2.28-10
ii  libssl1.1   1.1.1d-0+deb10u3
ii  libsystemd0 241-7~deb10u4
ii  libuuid12.33.1-0.1
ii  libwebsockets8  2.0.3-3
ii  libwrap07.6.q-28
ii  lsb-base10.2019051400

mosquitto recommends no packages.

Versions of packages mosquitto suggests:
pn  apparmor  

-- no debconf information
--- End Message ---
--- Begin Message ---

-- 
   Papier ist gebundenes CO2. Bitte drucken Sie diese EMail aus und
archivieren Sie sie.--- End Message ---


Bug#1042111: marked as done (chromium: Web Environment Integrity)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 03:33:59 +
with message-id 
and subject line Bug#1042111: fixed in chromium 117.0.5938.62-1
has caused the Debian Bug report #1042111,
regarding chromium: Web Environment Integrity
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1042111: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042111
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: chromium
Version: 115.0.5790.102-2

Engineers working for Google have proposed a standard named

   Web Environment Integrity

details available at
https://github.com/RupertBenWiser/Web-Environment-Integrity/blob/main/explainer.md

There have been hundreds of articles, social media posts, etc discussing 
this, here is a page that gives a good summary of the events so far:


https://interpeer.io/blog/2023/07/google-vs-the-open-web/

Initially it was a standards proposal, but now it looks that it's 
already implemented


https://github.com/chromium/chromium/commit/6f47a22906b2899412e79a2727355efa9cc8f5bd

Debian needs to figure out if this is something we want in chromium (at 
all, disabled at build time, disabled at runtime, etc).


Thanks,

--
Matt Taggart
m...@lackof.org
--- End Message ---
--- Begin Message ---
Source: chromium
Source-Version: 117.0.5938.62-1
Done: Andres Salomon 

We believe that the bug you reported is fixed in the latest version of
chromium, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1042...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andres Salomon  (supplier of updated chromium package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 13 Sep 2023 22:26:10 -0400
Source: chromium
Architecture: source
Version: 117.0.5938.62-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Team 
Changed-By: Andres Salomon 
Closes: 1042111 1051355
Changes:
 chromium (117.0.5938.62-1) unstable; urgency=high
 .
   [ Andres Salomon]
   * New upstream stable release.
 - CVE-2023-4900: Inappropriate implementation in Custom Tabs.
   Reported by Levit Nudi from Kenya.
 - CVE-2023-4901: Inappropriate implementation in Prompts.
   Reported by Kang Ali.
 - CVE-2023-4902: Inappropriate implementation in Input.
   Reported by Axel Chong.
 - CVE-2023-4903: Inappropriate implementation in Custom Mobile Tabs.
   Reported by Ahmed ElMasry.
 - CVE-2023-4904: Insufficient policy enforcement in Downloads.
   Reported by Tudor Enache @tudorhacks.
 - CVE-2023-4905: Inappropriate implementation in Prompts.
   Reported by Hafiizh.
 - CVE-2023-4906: Insufficient policy enforcement in Autofill.
   Reported by Ahmed ElMasry.
 - CVE-2023-4907: Inappropriate implementation in Intents.
   Reported by Mohit Raj (shadow2639) .
 - CVE-2023-4908: Inappropriate implementation in Picture in Picture.
   Reported by Axel Chong.
 - CVE-2023-4909: Inappropriate implementation in Interstitials.
   Reported by Axel Chong.
   * d/copyright: drop rust, llvm, siso, & cargo binaries.
   * d/patches:
 - fixes/size.patch: drop, merged upstream.
 - fixes/variant.patch: drop, merged upstream.
 - fixes/vector.patch: drop, merged upstream.
 - upstream/contains.patch: drop, merged upstream.
 - upstream/hvec.patch: drop, merged upstream.
 - upstream/limits.patch: drop, merged upstream.
 - upstream/statelessV4L2.patch: drop, merged upstream.
 - fixes/widevine-locations.patch: refresh for minor upstream changes.
 - disable/android.patch: drop half the patch.
 - disable/catapult.patch: refresh for minor upstream changes.
 - disable/tests.patch: refresh for minor upstream changes.
 - disable/unrar.patch: refresh for minor upstream changes.
 - fixes/material-utils.patch: build fix for clang w/ libstdc++.
 - rename fixes/null.patch to fixes/perfetto.patch.
 - upstream/memory.patch: build fix for missing header.
 - bookworm/struct-ctor.patch: add a bunch more build workarounds for
   clang-14.
 - bookworm/stringpiece3.patch: another clang-14 StringPiece to
   std::string explicit convers

Bug#1051355: marked as done (chromium: Segmentation fault)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 03:33:59 +
with message-id 
and subject line Bug#1051355: fixed in chromium 117.0.5938.62-1
has caused the Debian Bug report #1051355,
regarding chromium: Segmentation fault
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051355: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051355
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 116.0.5845.180-1
Severity: grave
Justification: Renders package unusable

Dear Maintainer,

Your package is currently unusable, making it impossible to use it.
Please consider fixing this so other users can use it normally.
Thanks.
Just reiterating that the browser doesn't even open in Gnome 44 with Wayland.
The output in the terminal is as follows:
[4562:4562:0906/161027.517475:ERROR:chrome_browser_cloud_management_controller.cc(163)]
Cloud management controller initialization aborted as CBCM is not
enabled.
[4562:4590:0906/161028.019651:ERROR:nss_util.cc(357)] After loading
Root Certs, loaded==false: NSS error code: -8018
[0906/161028.521029:ERROR:elf_dynamic_array_reader.h(64)] tag not found
Falha de segmentação

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-3-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8),
LANGUAGE=pt_BR:pt:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages chromium depends on:
ii  chromium-common116.0.5845.180-1
ii  libasound2 1.2.9-2
ii  libatk-bridge2.0-0 2.49.91-2
ii  libatk1.0-02.49.91-2
ii  libatomic1 13.2.0-2
ii  libatspi2.0-0  2.49.91-2
ii  libbrotli1 1.0.9-2+b6
ii  libc6  2.37-7
ii  libcairo2  1.16.0-7
ii  libcups2   2.4.2-5
ii  libdbus-1-31.14.10-1
ii  libdouble-conversion3  3.3.0-1
ii  libdrm22.4.115-1
ii  libevent-2.1-7 2.1.12-stable-8
ii  libexpat1  2.5.0-2
ii  libflac12  1.4.3+ds-2
ii  libfontconfig1 2.14.2-4
ii  libfreetype6   2.13.2+dfsg-1
ii  libgbm123.1.6-1
ii  libgcc-s1  13.2.0-2
ii  libglib2.0-0   2.77.2-1
ii  libgtk-3-0 3.24.38-4
ii  libjpeg62-turbo1:2.1.5-2
ii  libjsoncpp25   1.9.5-6
ii  liblcms2-2 2.14-2
ii  libminizip11:1.2.13.dfsg-3
ii  libnspr4   2:4.35-1.1
ii  libnss32:3.92-1
ii  libopenh264-7  2.3.1+dfsg-3
ii  libopenjp2-7   2.5.0-2
ii  libopus0   1.4-1
ii  libpango-1.0-0 1.51.0+ds-2
ii  libpng16-161.6.40-1
ii  libpulse0  16.1+dfsg1-2+b1
ii  libsnappy1v5   1.1.10-1
ii  libstdc++6 13.2.0-2
ii  libwebp7   1.2.4-0.2
ii  libwebpdemux2  1.2.4-0.2
ii  libwebpmux31.2.4-0.2
ii  libwoff1   1.0.2-2
ii  libx11-6   2:1.8.6-1
ii  libxcb11.15-1
ii  libxcomposite1   

Bug#1051629: marked as done (chromium: Crash with seqfault when starting)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Thu, 14 Sep 2023 03:33:59 +
with message-id 
and subject line Bug#1051355: fixed in chromium 117.0.5938.62-1
has caused the Debian Bug report #1051355,
regarding chromium: Crash with seqfault when starting
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051355: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051355
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 116.0.5845.180-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Crash when starting:
[411709:411709:0910/203433.221232:ERROR:chrome_browser_cloud_management_controller.cc(163)]
 Cloud management controller initialization aborted as CBCM is not enabled.
[411709:411709:0910/203433.290281:ERROR:object_proxy.cc(590)] Failed to call 
method: org.freedesktop.portal.Settings.Read: object_path= 
/org/freedesktop/portal/desktop: org.freedesktop.DBus.Error.UnknownMethod: No 
such interface “org.freedesktop.portal.Settings” on object at path 
/org/freedesktop/portal/desktop
libva error: vaGetDriverNameByIndex() failed with unknown libva error, 
driver_name = (null)
[411709:411737:0910/203433.474597:ERROR:nss_util.cc(357)] After loading Root 
Certs, loaded==false: NSS error code: -8018
[0910/203433.684242:ERROR:elf_dynamic_array_reader.h(64)] tag not found
[0910/203433.684772:ERROR:elf_dynamic_array_reader.h(64)] tag not found
Trace/breakpoint trap


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (600, 'unstable'), (500, 'unstable-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.0-4-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_DK.UTF-8
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages chromium depends on:
ii  chromium-common  116.0.5845.180-1
ii  libasound2   1.2.9-2
ii  libatk-bridge2.0-0   2.49.91-2
ii  libatk1.0-0  2.49.91-2
ii  libatomic1   13.2.0-3
ii  libatspi2.0-02.49.91-2
ii  libbrotli1   1.0.9-2+b6
ii  libc62.37-8
ii  libcairo21.17.8-3
ii  libcups2 2.4.2-5
ii  libdbus-1-3  1.14.10-1
ii  libdouble-conversion33.3.0-1
ii  libdrm2  2.4.115-1
ii  libevent-2.1-7   2.1.12-stable-8
ii  libexpat12.5.0-2
ii  libflac121.4.3+ds-2
ii  libfontconfig1   2.14.2-5
ii  libfreetype6 2.13.2+dfsg-1
ii  libgbm1  23.1.7-1
ii  libgcc-s113.2.0-3
ii  libglib2.0-0 2.78.0-1
ii  libgtk-3-0   3.24.38-4
ii  libjpeg62-turbo  1:2.1.5-2
ii  libjsoncpp25 1.9.5-6
ii  liblcms2-2   2.14-2
ii  libminizip1  1:1.2.13.dfsg-3
ii  libnspr4 2:4.35-1.1
ii  libnss3  2:3.92-1
ii  libopenh264-72.3.1+dfsg-3
ii  libopenjp2-7 2.5.0-2
ii  libopus0 1.4-1
ii  libpango-1.0-0   1.51.0+ds-2
ii  libpng16-16  1.6.40-1
ii  libpulse016.1+dfsg1-2+b1
ii  libsnappy1v5 1.1.10-1
ii  libstdc++6   13.2.0-3
ii  libwebp7 1.2.4-0.2
ii  libwebpdemux21.2.4-0.2
ii  libwebpmux3 

Bug#1045506: marked as done (libflame: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 23:50:29 +
with message-id 
and subject line Bug#1045506: fixed in libflame 5.2.0-5
has caused the Debian Bug report #1045506,
regarding libflame: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1045506: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1045506
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libflame
Version: 5.2.0-4
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> ---
> 
> dpkg-buildpackage: info: source package libflame
> dpkg-buildpackage: info: source version 5.2.0-4
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Mo Zhou 
>  dpkg-source --before-build .
>  debian/rules clean
> dh clean -Smakefile
>dh_auto_clean -O-Smakefile
>   make -j8 distclean
> make[1]: Entering directory '/<>'
> Removing makefile fragments from ./obj/x86_64-pc-linux-gnu/src
> Removing flattened header files from ./include/x86_64-pc-linux-gnu
> Removing object files from ./obj/x86_64-pc-linux-gnu/src
> Removing libraries from ./lib/x86_64-pc-linux-gnu
> Removing ar_obj_list
> Removing config
> Removing obj
> Removing lib
> Removing include
> Removing intermediate configure files
> make[1]: Leaving directory '/<>'
>debian/rules override_dh_clean
> make[1]: Entering directory '/<>'
> dh_clean -X.orig -X.bak
> rm -f libflame1.install libflame1.links
> rm -f libflame1.postinst libflame1.prerm
> make[1]: Leaving directory '/<>'
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: building libflame using existing 
> ./libflame_5.2.0.orig.tar.gz
> dpkg-source: info: using patch list from debian/patches/series
> dpkg-source: error: cannot represent change to test/obj/test_apcaqutinc.o: 
> binary file contents changed
> dpkg-source: error: add test/obj/test_apcaqutinc.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_apqudut.o: 
> binary file contents changed
> dpkg-source: error: add test/obj/test_apqudut.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_apqudutinc.o: 
> binary file contents changed
> dpkg-source: error: add test/obj/test_apqudutinc.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_apqut.o: binary 
> file contents changed
> dpkg-source: error: add test/obj/test_apqut.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_apqutinc.o: 
> binary file contents changed
> dpkg-source: error: add test/obj/test_apqutinc.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_bidiagut.o: 
> binary file contents changed
> dpkg-source: error: add test/obj/test_bidiagut.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_caqrutinc.o: 
> binary file contents changed
> dpkg-source: error: add test/obj/test_caqrutinc.o in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to test/obj/test_chol.o: binary 
> file contents changed
> dpkg-source: error: 

Bug#1047031: marked as done (plasma-workspace: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 23:04:31 +
with message-id 
and subject line Bug#1047031: fixed in plasma-workspace 4:5.27.8-1
has caused the Debian Bug report #1047031,
regarding plasma-workspace: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1047031: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1047031
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: plasma-workspace
Version: 4:5.27.7-2
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> 
> 
> dpkg-buildpackage: info: source package plasma-workspace
> dpkg-buildpackage: info: source version 4:5.27.7-2
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Patrick Franz 
>  dpkg-source --before-build .
>  debian/rules clean
> dh clean --with kf5,pkgkde_symbolshelper,sodeps --buildsystem kf5 --without 
> build_stamp
>dh_auto_clean --buildsystem=kf5 -O--buildsystem=kf5
>dh_autoreconf_clean -O--buildsystem=kf5
>dh_clean -O--buildsystem=kf5
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: verifying ./plasma-workspace_5.27.7.orig.tar.xz.asc
> dpkg-source: info: building plasma-workspace using existing 
> ./plasma-workspace_5.27.7.orig.tar.xz
> dpkg-source: info: building plasma-workspace using existing 
> ./plasma-workspace_5.27.7.orig.tar.xz.asc
> dpkg-source: info: using patch list from debian/patches/series
> dpkg-source: info: local changes detected, the modified files are:
>  plasma-workspace-5.27.7/lookandfeel/sddm-theme-debian/Main.qml
> dpkg-source: error: aborting due to unexpected upstream changes, see 
> /tmp/plasma-workspace_5.27.7-2.diff.E7H6Nc
> dpkg-source: info: Hint: make sure the version in debian/changelog matches 
> the unpacked source tree
> dpkg-source: info: you can integrate the local changes with dpkg-source 
> --commit
> dpkg-buildpackage: error: dpkg-source -b . subprocess returned exit status 2
> 
> E: Command 'cd /<> && runuser -u user42 -- dpkg-buildpackage 
> --sanitize-env -us -uc -rfakeroot -S' failed to run.


The full build log is available from:
http://qa-logs.debian.net/2023/08/13/plasma-workspace_5.27.7-2_unstable.log

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: plasma-workspace
Source-Version: 4:5.27.8-1
Done: Patrick Franz 

We believe that the bug you reported is fixed in the latest version of
plasma-workspace, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1047...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Patrick Franz  (supplier of updated plasma-workspace 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:24:04 +0200
Source: plasma-workspace
Architecture: source
Version: 4:5.27.8-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Qt/KDE Maintainers 
Changed-By: Patrick Franz 
Closes: 1047031
Changes:
 plasma-

Bug#1040174: marked as done (nvidia-driver: Can't upgrade to nvidia-driver-525.116.04-1 on debian unstable: build fails)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 23:49:32 +0200
with message-id <7f431808-7b1f-9071-2748-c2f057337...@debian.org>
and subject line Re: Bug#1040174: nvidia-driver: Can't upgrade to 
nvidia-driver-525.116.04-1 on debian unstable: build fails
has caused the Debian Bug report #1040174,
regarding nvidia-driver: Can't upgrade to nvidia-driver-525.116.04-1 on debian 
unstable: build fails
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1040174: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040174
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nvidia-driver
Version: 525.116.04-1
Severity: important
X-Debbugs-Cc: andrewgop...@tutanota.com

Dear Maintainer,

Today, after a long time of not checking for upgrades, I finally
upgraded all of my packages. ALl of the other packages upgraded just
fine, but my nvidia driver faild to build. I was pointed to a make.log
file, which showed an error at the end saying that "asm/orc_header.h" was not
found. I've already tried rebooting and purging all nvidia packages then
reinstalling. I also tried to find the orc_header.h, but both
/usr/include/asm-generic and /usr/include/x86_64-linux-gnu/asm do not
contain the file. 


-- Package-specific info:
uname -a:
Linux gopherbox 6.3.0-1-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.3.7-1 
(2023-06-12) x86_64 GNU/Linux

/proc/version:
Linux version 6.3.0-1-amd64 (debian-ker...@lists.debian.org) (gcc-12 (Debian 
12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP 
PREEMPT_DYNAMIC Debian 6.3.7-1 (2023-06-12)

lspci 'display controller [030?]':
27:00.0 VGA compatible controller [0300]: NVIDIA Corporation GP107 [GeForce GTX 
1050 Ti] [10de:1c82] (rev a1) (prog-if 00 [VGA controller])
Subsystem: eVga.com. Corp. GP107 [GeForce GTX 1050 Ti] [3842:6251]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel modules: nvidia

dmesg:

Device node permissions:
video:x:44:andrewgopher

Alternative 'nvidia':
nvidia - auto mode
  link best version is /usr/lib/nvidia/current
  link currently points to /usr/lib/nvidia/current
  link nvidia is /usr/lib/nvidia/nvidia
  slave nvidia--libEGL_nvidia.so.0-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libEGL_nvidia.so.0
  slave nvidia--libEGL_nvidia.so.0-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libEGL_nvidia.so.0
  slave nvidia--libGLESv1_CM_nvidia.so.1-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libGLESv1_CM_nvidia.so.1
  slave nvidia--libGLESv1_CM_nvidia.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libGLESv1_CM_nvidia.so.1
  slave nvidia--libGLESv2_nvidia.so.2-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libGLESv2_nvidia.so.2
  slave nvidia--libGLESv2_nvidia.so.2-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libGLESv2_nvidia.so.2
  slave nvidia--libGLX_nvidia.so.0-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libGLX_nvidia.so.0
  slave nvidia--libGLX_nvidia.so.0-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libGLX_nvidia.so.0
  slave nvidia--libcuda.so-i386-linux-gnu is /usr/lib/i386-linux-gnu/libcuda.so
  slave nvidia--libcuda.so-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libcuda.so
  slave nvidia--libcuda.so.1-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libcuda.so.1
  slave nvidia--libcuda.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libcuda.so.1
  slave nvidia--libglxserver_nvidia.so is /usr/lib/nvidia/libglxserver_nvidia.so
  slave nvidia--libnvcuvid.so-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libnvcuvid.so
  slave nvidia--libnvcuvid.so-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libnvcuvid.so
  slave nvidia--libnvcuvid.so.1-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libnvcuvid.so.1
  slave nvidia--libnvcuvid.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libnvcuvid.so.1
  slave nvidia--libnvidia-allocator.so.1-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libnvidia-allocator.so.1
  slave nvidia--libnvidia-allocator.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libnvidia-allocator.so.1
  slave nvidia--libnvidia-cfg.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/nvidia/libnvidia-cfg.so.1
  slave nvidia--libnvidia-encode.so.1-i386-linux-gnu is 
/usr/lib/i386-linux-gnu/libnvidia-encode.so.1
  slave nvidia--libnvidia-encode.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libnvidia-encode.so.1
  slave nvidia--libnvidia-ml.so.1-x86_64-linux-gnu is 
/usr/lib/x86_64-linux-gnu/libnvidia-ml.so.1
  slave nvidia--libnvidia-ptxjitcompiler.so.1-i386-linux-gnu is 
/usr/lib/i386-linux-g

Bug#1037468: marked as done (nvidia-driver: RmInitAdapter failed! (0x25:0x65:1457))

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 23:50:03 +0200
with message-id 
and subject line Re: Bug#1037468: Acknowledgement (nvidia-driver: RmInitAdapter 
failed! (0x25:0x65:1457))
has caused the Debian Bug report #1037468,
regarding nvidia-driver: RmInitAdapter failed! (0x25:0x65:1457)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1037468: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037468
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nvidia-driver
Version: 525.105.17-1
Severity: important

Dear Maintainer,

The upgrade to 12 was smooth except the nvidia-driver did not load 
after rebooting on my Lenovo P51 with:

01:00.0 VGA compatible controller: NVIDIA Corporation GM206GLM [Quadro M2200 
Mobile] (rev a1)

I get a few dmesg then a blank screen with a cursor.  Not able
to change to a virtual terminal. I also also tried the version in 
experimental with similar effect:

Version: 525.105.17-1

2023-06-12T06:14:43.764+00:00 vent kernel: NVRM: GPU :01:00.0: 
RmInitAdapter failed! (0x25:0x65:1457)
2023-06-12T06:14:43.764+00:00 vent kernel: NVRM: GPU :01:00.0: 
rm_init_adapter failed, device minor number 0
2023-06-12T06:14:43.764+00:00 vent systemd[1]: lightdm.service: Failed with 
result 'exit-code'.

Version: 530.41.03-1

2023-06-13T02:02:39.056+00:00 vent kernel: NVRM: GPU :01:00.0: 
RmInitAdapter failed! (0x25:0x65:1462)
2023-06-13T02:02:39.056+00:00 vent kernel: NVRM: GPU :01:00.0: 
rm_init_adapter failed, device minor number 0
2023-06-13T02:02:39.056+00:00 vent systemd[1]: lightdm.service: Failed with 
result 'exit-code'.

I do have non-free-firmware enabled and hence the nvidia firmware.  
Upgraded bios to latest version  No difference if I use 
linux-image 6.1.0-9-amd64 or 5.10.0-23-amd64.

The only semi-workaround is to uninstall the nvidia driver and 
rely on nouveau.  Surprisingly to me, nouveau, doesn't seem to 
require the xserver-xorg-video-nouveau package to be installed(?).

Reported upstream as requested:

https://forums.developer.nvidia.com/t/rminitadapter-failed-0x251457/256445

-- System Information:
Debian Release: 12.0
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-9-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages nvidia-driver depends on:
pn  nvidia-alternative   
pn  nvidia-driver-bin
pn  nvidia-driver-libs   
pn  nvidia-installer-cleanup 
pn  nvidia-kernel-dkms | nvidia-kernel-525.105.17 | nvidia-open-kernel-  
525.105.17 | nvidia-open-kernel-525.105.17
pn  nvidia-legacy-check  
pn  nvidia-support   
pn  nvidia-vdpau-driver  
pn  xserver-xorg-video-nvidia

Versions of packages nvidia-driver recommends:
pn  libnvidia-cfg1   
pn  nvidia-persistenced  
pn  nvidia-settings  

Versions of packages nvidia-driver suggests:
pn  nvidia-kernel-dkms | nvidia-kernel-source | nvidia-open-kernel-sour  
ce | nvidia-open-kernel-source
--- End Message ---
--- Begin Message ---

Version: 525.125.06-1

On 23/07/2023 06.17, Allan Wind wrote:

It appears to be resolved with the Debian 12.1 upgrade today:

linux-image-6.1.0-10-amd64:amd64 (6.1.37-1, 6.1.38-1)
nvidia-driver:amd64 (525.105.17-1, 525.125.06-1~deb12u1)


Thanks for confirming the fix.

Andreas--- End Message ---


Bug#1050753: marked as done (uwsgi-plugin-lua5.2: Drop this package and lua5.2 Build-Depends)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 21:44:45 +
with message-id 
and subject line Bug#1050753: fixed in uwsgi 2.0.22-2
has caused the Debian Bug report #1050753,
regarding uwsgi-plugin-lua5.2: Drop this package and lua5.2 Build-Depends
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050753
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: uwsgi-plugin-lua5.2
Version: 2.0.22-1
Severity: wishlist
Control: block 1050640 by -1

Please drop uwsgi-plugin-lua5.2 and its Build-Depends so we can drop lua5.2 
from the archive.
uwsgi-app-integration-plugins has to drop its dependency on the package as well but as it also 
depends on the -lua5.1 version, no harm should be done.
--- End Message ---
--- Begin Message ---
Source: uwsgi
Source-Version: 2.0.22-2
Done: Jonas Smedegaard 

We believe that the bug you reported is fixed in the latest version of
uwsgi, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard  (supplier of updated uwsgi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:03:09 +0200
Source: uwsgi
Architecture: source
Version: 2.0.22-2
Distribution: unstable
Urgency: medium
Maintainer: uWSGI packaging team 
Changed-By: Jonas Smedegaard 
Closes: 1050753 1051752
Changes:
 uwsgi (2.0.22-2) unstable; urgency=medium
 .
   * exclude arches armel armhf i386 from glusterfs build-dependencies,
 and add arch riscv64;
 closes: bug#1051752, thanks to Sebastian Ramacher
   * exclude arch mipsel from gccgo build-dependencies
   * exclude arch mipsel from greenlet build-dependencies,
 and add arch riscv64
   * exclude arch mipsel from mono build-dependencies
   * exclude arch mipsel from openjdk17 build-dependencies,
 and add arch riscv64
   * exclude arch mipsel from rados build-dependencies
   * drop binary package uwsgi-plugin-lua5.2;
 stop build-depend on liblua5.2-dev;
 closes: bug#1050753, thanks to Bastian Germann
Checksums-Sha1:
 c5b79ec5f70d81b89ff3f543fee3ee4140e8925f 6990 uwsgi_2.0.22-2.dsc
 371f85134dff7bfe68111c8141a3bc0d29f28244 69472 uwsgi_2.0.22-2.debian.tar.xz
 ccf1fe4eadc26f344b00ff026562f271ba10e943 37701 uwsgi_2.0.22-2_amd64.buildinfo
Checksums-Sha256:
 e5a72b674ed022c8276c58afbc11afb05e44e366b7d4dbfb3209232be2106a3b 6990 
uwsgi_2.0.22-2.dsc
 4a50cbeb366b323be771d004d4e05026b896d0c1ba85fd6428be4beea2889020 69472 
uwsgi_2.0.22-2.debian.tar.xz
 87eb1364c0464817fe197868a480f0325a8e01d269e1f4b1bb1c19c12f7d3539 37701 
uwsgi_2.0.22-2_amd64.buildinfo
Files:
 bbc48cd0025ce1fa654e5a0596b5b735 6990 httpd optional uwsgi_2.0.22-2.dsc
 4825bf1c224f0920d7981c2b3e9bb560 69472 httpd optional 
uwsgi_2.0.22-2.debian.tar.xz
 4b4eb88ba1f37e874dcce42f4a735d2c 37701 httpd optional 
uwsgi_2.0.22-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=UPVB
-END PGP SIGNATURE End Message ---


Bug#1051752: marked as done (uwsgi: remove uwsgi-plugin-glusterfs on 32 bit architectures)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 21:44:45 +
with message-id 
and subject line Bug#1051752: fixed in uwsgi 2.0.22-2
has caused the Debian Bug report #1051752,
regarding uwsgi: remove uwsgi-plugin-glusterfs on 32 bit architectures
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051752: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051752
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: uwsgi
Version: 2.0.22-1
Severity: serious
X-Debbugs-Cc: sramac...@debian.org

glusterfs dropped support for 32 bit architectures (see #1050629 for
details) and the binaries are being removed from trixie.
uwsgi-plugin-glusterfs is the last remaining binary package depending on
them on 32 bit architectures which prevents their removal. Please remove
uwsgi-plugin-glusterfs on all 32 bit architectures.

Cheers
-- 
Sebastian Ramacher
--- End Message ---
--- Begin Message ---
Source: uwsgi
Source-Version: 2.0.22-2
Done: Jonas Smedegaard 

We believe that the bug you reported is fixed in the latest version of
uwsgi, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard  (supplier of updated uwsgi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:03:09 +0200
Source: uwsgi
Architecture: source
Version: 2.0.22-2
Distribution: unstable
Urgency: medium
Maintainer: uWSGI packaging team 
Changed-By: Jonas Smedegaard 
Closes: 1050753 1051752
Changes:
 uwsgi (2.0.22-2) unstable; urgency=medium
 .
   * exclude arches armel armhf i386 from glusterfs build-dependencies,
 and add arch riscv64;
 closes: bug#1051752, thanks to Sebastian Ramacher
   * exclude arch mipsel from gccgo build-dependencies
   * exclude arch mipsel from greenlet build-dependencies,
 and add arch riscv64
   * exclude arch mipsel from mono build-dependencies
   * exclude arch mipsel from openjdk17 build-dependencies,
 and add arch riscv64
   * exclude arch mipsel from rados build-dependencies
   * drop binary package uwsgi-plugin-lua5.2;
 stop build-depend on liblua5.2-dev;
 closes: bug#1050753, thanks to Bastian Germann
Checksums-Sha1:
 c5b79ec5f70d81b89ff3f543fee3ee4140e8925f 6990 uwsgi_2.0.22-2.dsc
 371f85134dff7bfe68111c8141a3bc0d29f28244 69472 uwsgi_2.0.22-2.debian.tar.xz
 ccf1fe4eadc26f344b00ff026562f271ba10e943 37701 uwsgi_2.0.22-2_amd64.buildinfo
Checksums-Sha256:
 e5a72b674ed022c8276c58afbc11afb05e44e366b7d4dbfb3209232be2106a3b 6990 
uwsgi_2.0.22-2.dsc
 4a50cbeb366b323be771d004d4e05026b896d0c1ba85fd6428be4beea2889020 69472 
uwsgi_2.0.22-2.debian.tar.xz
 87eb1364c0464817fe197868a480f0325a8e01d269e1f4b1bb1c19c12f7d3539 37701 
uwsgi_2.0.22-2_amd64.buildinfo
Files:
 bbc48cd0025ce1fa654e5a0596b5b735 6990 httpd optional uwsgi_2.0.22-2.dsc
 4825bf1c224f0920d7981c2b3e9bb560 69472 httpd optional 
uwsgi_2.0.22-2.debian.tar.xz
 4b4eb88ba1f37e874dcce42f4a735d2c 37701 httpd optional 
uwsgi_2.0.22-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=UPVB
-END PGP SIGNATURE End Message ---


Bug#1050903: marked as done (telegram-desktop: segmentation fault)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 21:42:31 +
with message-id 
and subject line Bug#1050903: fixed in telegram-desktop 4.9.7+ds-1
has caused the Debian Bug report #1050903,
regarding telegram-desktop: segmentation fault
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050903: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050903
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: telegram-desktop
Version:  4.9.3+ds-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Package again presents segmentation fault in some features like
viewing the user profile.

The same user has views of stories that do not get to be listed with
the application presenting a segmentation fault afterwards.

telegram-desktop -debug

(telegram-desktop:8895): Telegram-WARNING **: 07:23:35.375:
Application has been built with foreign rlottie, animated emojis won't
be colored t
o the selected pack.

(telegram-desktop:8895): Telegram-WARNING **: 07:23:35.375:
Application was built without embedded fonts, this may lead to font
issues. On Debi
an-based systems, make sure you have the fonts-open-sans package installed
QPainter::begin: Paint device returned engine == 0, type: 2
QWidget::render: Cannot render with an inactive painter
qt.svg: Error while inflating gzip file: SVG format check failed
qt.qpa.wayland: Wayland does not support QWindow::requestActivate()
Falha de segmentação (imagem do núcleo gravada)

-- Package-specific info:

-- System Information:
Debian Release: trixie/sid
 APT prefers testing
 APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-3-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8),
LANGUAGE=pt_BR:pt:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages telegram-desktop depends on:
ii  libabsl2022062320220623.1-3
ii  libavcodec60   7:6.0-6
ii  libavfilter9   7:6.0-6
ii  libavformat60  7:6.0-6
ii  libavutil587:6.0-6
ii  libc6  2.37-7
ii  libgcc-s1  13.2.0-2
ii  libglib2.0-0   2.77.2-1
ii  libglibmm-2.68-1   2.77.0-1
ii  libhunspell-1.7-0  1.7.2+really1.7.2-10
ii  libjpeg62-turbo1:2.1.5-2
ii  libkf5coreaddons5  5.107.0-1
ii  liblz4-1   1.9.4-1
ii  libminizip11:1.2.13.dfsg-3
ii  libopenal1 1:1.23.1-3
ii  libopus0   1.4-1
ii  libqrcodegencpp1   1.8.0-1.1
ii  libqt5core5a [qtbase-abi-5-15-10]  5.15.10+dfsg-3
ii  libqt5gui5 5.15.10+dfsg-3
ii  libqt5network5 5.15.10+dfsg-3
ii  libqt5svg5 5.15.10-2
ii  libqt5widgets5 5.15.10+dfsg-3
ii  librlottie0-1  0.1+dfsg-4
ii  libsigc++-3.0-03.4.0-7
ii  libsrtp2-1 2.5.0-3
ii  libssl33.0.10-1
ii  libstdc++6 13.2.0-2
ii  libswresample4 7:6.0-6
ii  libswscale77:6.0-6
ii  libvpx71.12.0-1
ii  libx11-6   2:1.8.6-1
ii  libxcb-keysyms10.4.0-1+b2
ii  libxcb-record0 1.15-1
ii  libxcb-screensaver01.15-1
ii  libxcb11.15-1
ii  libxcomposite1 1:0.4.5-1
ii  libxdamage11:1.1.6-1
ii  libxext6   2:1.3.4-1+b1
ii  libxfixes3 1:6.0.0-2
ii  libxrandr2 2:1.5.2-2+b1
ii  libxtst6   2:1.2.3-1.1
ii  libxxhash0 0.8.1-1
ii  libyuv00.0~git20230616.a366ad7-1
ii  qt5-image-formats-plugins  5.15.10-2
ii  zlib1g 1:1.2.13.dfsg-3

Versions of packages telegram-desktop recommends:
ii  fonts-open-sans   1.11-2
ii  libwebkit2gtk-4.0-37  2.40.5-1

telegram-desktop suggests no packages.

Versions of packages telegram-desktop is related to:
ii  xdg-desktop-portal   1.16.0-3
ii  xdg-desktop-portal-gtk [xdg-desktop-porta

Bug#1051828: marked as done (pytorch: needs-root for autopkgtests?)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 21:35:27 +
with message-id 
and subject line Bug#1051828: fixed in pytorch 2.0.1+dfsg-4
has caused the Debian Bug report #1051828,
regarding pytorch: needs-root for autopkgtests?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051828: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051828
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Source: pytorch
Version: 2.0.1+dfsg-2
Severity: serious

Hello, I just found this failure on Ubuntu builders.

5393s autopkgtest [13:15:11]: test show_dangling_symlink_if_any: cd 
debian/tests ; find /usr -xtype l -print
5393s autopkgtest [13:15:11]: test show_dangling_symlink_if_any: 
[---
5393s find: ‘/usr/share/polkit-1/rules.d’: Permission denied
5396s /usr/share/doc/openssl/changelog.gz
5396s /usr/share/doc/perl/Changes.gz
5396s /usr/share/doc/python3-keyring/NEWS.rst.gz
5396s /usr/share/doc/libucx0/README
5396s /usr/share/doc/libhdf5-103-1/RELEASE.txt.gz
5396s /usr/share/doc/libhdf5-hl-100/RELEASE.txt.gz
5396s /usr/share/doc/xfsprogs/changelog.gz
5396s /usr/share/doc/python3-wadllib/NEWS.rst.gz
5396s /usr/share/doc/libxml2/NEWS.gz
5396s /usr/share/locale/cs/LC_TIME/coreutils.mo
5396s /usr/share/locale/zh_TW/LC_TIME/coreutils.mo
5396s /usr/share/locale/eo/LC_TIME/coreutils.mo
5396s /usr/share/locale/tr/LC_TIME/coreutils.mo
5396s /usr/share/locale/fr/LC_TIME/coreutils.mo
5396s /usr/share/locale/eu/LC_TIME/coreutils.mo
5396s /usr/share/locale/da/LC_TIME/coreutils.mo
5396s /usr/share/locale/vi/LC_TIME/coreutils.mo
5396s /usr/share/locale/it/LC_TIME/coreutils.mo
5396s /usr/share/locale/fi/LC_TIME/coreutils.mo
5396s /usr/share/locale/lt/LC_TIME/coreutils.mo
5396s /usr/share/locale/nb/LC_TIME/coreutils.mo
5396s /usr/share/locale/el/LC_TIME/coreutils.mo
5396s /usr/share/locale/de/LC_TIME/coreutils.mo
5396s /usr/share/locale/hu/LC_TIME/coreutils.mo
5396s /usr/share/locale/ro/LC_TIME/coreutils.mo
5396s /usr/share/locale/es/LC_TIME/coreutils.mo
5396s /usr/share/locale/id/LC_TIME/coreutils.mo
5396s /usr/share/locale/et/LC_TIME/coreutils.mo
5396s /usr/share/locale/sl/LC_TIME/coreutils.mo
5396s /usr/share/locale/nl/LC_TIME/coreutils.mo
5396s /usr/share/locale/sr/LC_TIME/coreutils.mo
5396s /usr/share/locale/ga/LC_TIME/coreutils.mo
5396s /usr/share/locale/be/LC_TIME/coreutils.mo
5396s /usr/share/locale/kk/LC_TIME/coreutils.mo
5396s /usr/share/locale/pt_BR/LC_TIME/coreutils.mo
5396s /usr/share/locale/af/LC_TIME/coreutils.mo
5396s /usr/share/locale/uk/LC_TIME/coreutils.mo
5396s /usr/share/locale/ia/LC_TIME/coreutils.mo
5396s /usr/share/locale/gl/LC_TIME/coreutils.mo
5396s /usr/share/locale/pl/LC_TIME/coreutils.mo
5396s /usr/share/locale/ms/LC_TIME/coreutils.mo
5396s /usr/share/locale/ko/LC_TIME/coreutils.mo
5396s /usr/share/locale/lg/LC_TIME/coreutils.mo
5396s /usr/share/locale/bg/LC_TIME/coreutils.mo
5396s /usr/share/locale/sv/LC_TIME/coreutils.mo
5396s /usr/share/locale/ja/LC_TIME/coreutils.mo
5396s /usr/share/locale/hr/LC_TIME/coreutils.mo
5396s /usr/share/locale/pt/LC_TIME/coreutils.mo
5396s /usr/share/locale/ca/LC_TIME/coreutils.mo
5396s /usr/share/locale/sk/LC_TIME/coreutils.mo
5396s /usr/share/locale/zh_CN/LC_TIME/coreutils.mo
5396s /usr/share/locale/ru/LC_TIME/coreutils.mo
5396s /usr/src/linux-headers-6.5.0-5-generic/rust
5396s /usr/src/linux-headers-6.3.0-7-generic/rust
5396s /usr/lib/aarch64-linux-gnu/qt-default/qtchooser/default.conf
5396s autopkgtest [13:15:15]: test show_dangling_symlink_if_any: 
---]
5397s autopkgtest [13:15:16]: test show_dangling_symlink_if_any:  - - - - - - - 
- - - results - - - - - - - - - -
5397s show_dangling_symlink_if_any FAIL non-zero exit status 1
5397s autopkgtest [13:15:16]: test 1_of_98__cpptest__CppSignature_test: 
preparing testbed

This permission denied looks making the test fail, I'm not sure if you want to 
just ignore the find error, or declare the test as need-root capability.

G.


OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: pytorch
Source-Version: 2.0.1+dfsg-4
Done: Mo Zhou 

We believe that the bug you reported is fixed in the latest version of
pytorch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mo Zhou  (supplier of updated pytorch

Bug#1043935: marked as done (authheaders: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 20:53:25 +
with message-id 
and subject line Bug#1043935: fixed in authheaders 0.15.3-1
has caused the Debian Bug report #1043935,
regarding authheaders: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1043935: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043935
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: authheaders
Version: 0.15.2-1
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> --
> 
> dpkg-buildpackage: info: source package authheaders
> dpkg-buildpackage: info: source version 0.15.2-1
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Scott Kitterman 
> 
>  dpkg-source --before-build .
>  fakeroot debian/rules clean
> dh clean --with python3 --buildsystem=pybuild
>debian/rules override_dh_auto_clean
> make[1]: Entering directory '/<>'
> dh_auto_clean
> I: pybuild base:275: python3.11 setup.py clean 
> running clean
> removing '/<>/.pybuild/cpython3_3.11/build' (and everything 
> under it)
> 'build/bdist.linux-x86_64' does not exist -- can't clean it
> 'build/scripts-3.11' does not exist -- can't clean it
> rm -f authheaders/findpsl.py
> make[1]: Leaving directory '/<>'
>dh_autoreconf_clean -O--buildsystem=pybuild
>dh_clean -O--buildsystem=pybuild
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: verifying ./authheaders_0.15.2.orig.tar.gz.asc
> dpkg-source: info: building authheaders using existing 
> ./authheaders_0.15.2.orig.tar.gz
> dpkg-source: info: building authheaders using existing 
> ./authheaders_0.15.2.orig.tar.gz.asc
> dpkg-source: info: local changes detected, the modified files are:
>  authheaders-0.15.2/authheaders.egg-info/PKG-INFO
>  authheaders-0.15.2/authheaders.egg-info/SOURCES.txt
>  authheaders-0.15.2/authheaders.egg-info/entry_points.txt
> dpkg-source: error: aborting due to unexpected upstream changes, see 
> /tmp/authheaders_0.15.2-1.diff.xnWDSB
> dpkg-source: info: Hint: make sure the version in debian/changelog matches 
> the unpacked source tree
> dpkg-source: info: you can integrate the local changes with dpkg-source 
> --commit
> dpkg-buildpackage: error: dpkg-source -b . subprocess returned exit status 2
> 
> E: Command 'cd /<> && runuser -u user42 -- dpkg-buildpackage 
> --sanitize-env -us -uc -rfakeroot -S' failed to run.


The full build log is available from:
http://qa-logs.debian.net/2023/08/13/authheaders_0.15.2-1_unstable.log

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: authheaders
Source-Version: 0.15.3-1
Done: Scott Kitterman 

We believe that the bug you reported is fixed in the latest version of
authheaders, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1043...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Scott Kitterman  (supplier of updated authheaders package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP

Processed: your mail

2023-09-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close #1051868
Bug #1051868 [tracker.debian.org] tracker.debian.org: Displays the numbering of 
only bugs in the "help" category
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1051868: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051868
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: linux-image-6.1.0-12-amd64: Failure to upgrade to linux-image-6.1.0-12-amd64 from linux-image-6.1.0-10-amd64

2023-09-13 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 wontfix
Bug #1051849 [dkms] linux-image-6.1.0-12-amd64: Failure to upgrade to 
linux-image-6.1.0-12-amd64 from linux-image-6.1.0-10-amd64
Added tag(s) wontfix.
> close -1
Bug #1051849 [dkms] linux-image-6.1.0-12-amd64: Failure to upgrade to 
linux-image-6.1.0-12-amd64 from linux-image-6.1.0-10-amd64
Marked Bug as done

-- 
1051849: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051849
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1051261: marked as done (thunderbird: Desktop file for Thunderbird should have "Compose" and "Contacts" actions)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 19:31:52 +
with message-id 
and subject line Bug#1051261: fixed in thunderbird 1:115.2.2-1
has caused the Debian Bug report #1051261,
regarding thunderbird: Desktop file for Thunderbird should have "Compose" and 
"Contacts" actions
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051261: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051261
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: thunderbird
Version: 1:115.2.0-1
Severity: wishlist

Dear Maintainer,

On other distributions when I right click on Thunderbird in my dash or
dock menu commands are available to open a new compose window or open
my contacts. These are missing on Debian. Would be nice if they were
added!

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-3-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages thunderbird depends on:
ii  debianutils  5.11
ii  fontconfig   2.14.2-4
ii  libasound2   1.2.9-2
ii  libatk1.0-0  2.49.90-5
ii  libc62.37-7
ii  libcairo-gobject21.16.0-7
ii  libcairo21.16.0-7
ii  libdbus-1-3  1.14.8-2
ii  libdbus-glib-1-2 0.112-3
ii  libevent-2.1-7   2.1.12-stable-8
ii  libffi8  3.4.4-1
ii  libfontconfig1   2.14.2-4
ii  libfreetype6 2.13.2+dfsg-1
ii  libgcc-s113.2.0-2
ii  libgdk-pixbuf-2.0-0  2.42.10+dfsg-1+b1
ii  libglib2.0-0 2.77.2-1
ii  libgtk-3-0   3.24.38-4
ii  libnspr4 2:4.35-1.1
ii  libnss3  2:3.92-1
ii  libotr5  4.1.1-5
ii  libpango-1.0-0   1.51.0+ds-2
ii  librnp0  0.17.0-3
ii  libstdc++6   13.2.0-2
ii  libvpx7  1.12.0-1
ii  libx11-6 2:1.8.6-1
ii  libx11-xcb1  2:1.8.6-1
ii  libxcb-shm0  1.15-1
ii  libxcb1  1.15-1
ii  libxext6 2:1.3.4-1+b1
ii  libxrandr2   2:1.5.2-2+b1
ii  psmisc   23.6-1
ii  x11-utils7.7+5
ii  zenity   3.44.2-1
ii  zlib1g   1:1.2.13.dfsg-3

Versions of packages thunderbird recommends:
ii  hunspell-en-us [hunspell-dictionary]  1:2020.12.07-2

Versions of packages thunderbird suggests:
ii  apparmor  3.0.12-1
ii  fonts-lyx 2.3.7-1
ii  libgssapi-krb5-2  1.20.1-3

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: thunderbird
Source-Version: 1:115.2.2-1
Done: Carsten Schoenert 

We believe that the bug you reported is fixed in the latest version of
thunderbird, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Carsten Schoenert  (supplier of updated thunderbird 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:59:59 +0530
Source: thunderbird
Architecture: source
Version: 1:115.2.2-1
Distribution: unstable
Urgency: medium
Maintainer: Carsten Schoenert 
Changed-By: Carsten Schoenert 
Closes: 1042912 1051261
Changes:
 thunderbird (1:115.2.2-1) unstable; urgency=medium
 .
   * [08bc8c9] d/thunderbird.desktop: Update data with upstream data
 (Closes: #1042912, #1051261)
   * [2fd665b] New upstream version 115.2.2
 Fixed CVE issues in upstream version 115.2.2 (MFSA 2023-40):
 CVE-2023-4863: Heap buffer overflow in libwebp
   * [7b862be] d/copyright: Update content due upstream changes
   * [140b77d] d/s/lintian-overrides: Update data for overrides
Checksums-Sha1:
 b6b096203f367347a2a2c4a9df7c82c33666f35f 8537 thunderbird_115.2.2-1.dsc
 fa250be106c3ecf1b4f39618f78dbfd1214fef2e 12629416 
thunderbird_115.2.2.orig-thunderbird-l10n.tar.xz
 404bbfb463e041d83e84fe981ebe25eaabe82664 02180 
thunderbird_115.2.2.orig.tar.xz
 08e4c2a7575d030303fce078958d1d25d7a6b0f9 543104 

Bug#1042912: marked as done (Merge the Debian-specific desktop file with the upstream one)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 19:31:52 +
with message-id 
and subject line Bug#1042912: fixed in thunderbird 1:115.2.2-1
has caused the Debian Bug report #1042912,
regarding Merge the Debian-specific desktop file with the upstream one
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1042912: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042912
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: thunderbird
Version: 1:115.0.1-2

Hallo Carsten,

Upstream now provides a desktop file as part of their Flatpak distribution:

https://salsa.debian.org/mozilla-team/thunderbird/-
/blob/debian/experimental/comm/taskcluster/docker/thunderbird-
flatpak/org.mozilla.Thunderbird.desktop

Historically, Debian also has a desktop file:

https://salsa.debian.org/mozilla-team/thunderbird/-
/blob/debian/experimental/debian/thunderbird.desktop

Please merge the contents of both desktop files, and install only the merged
file. (Notice the icon name change in the upstream file;
Icon=org.mozilla.Thunderbird)

A perfect course of action is to propose the Debian changes to upstream so that
you will be able to eventually delete the Debian-specific desktop file, and only
install the upstream one.

Best,
Amr

--- End Message ---
--- Begin Message ---
Source: thunderbird
Source-Version: 1:115.2.2-1
Done: Carsten Schoenert 

We believe that the bug you reported is fixed in the latest version of
thunderbird, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1042...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Carsten Schoenert  (supplier of updated thunderbird 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 22:59:59 +0530
Source: thunderbird
Architecture: source
Version: 1:115.2.2-1
Distribution: unstable
Urgency: medium
Maintainer: Carsten Schoenert 
Changed-By: Carsten Schoenert 
Closes: 1042912 1051261
Changes:
 thunderbird (1:115.2.2-1) unstable; urgency=medium
 .
   * [08bc8c9] d/thunderbird.desktop: Update data with upstream data
 (Closes: #1042912, #1051261)
   * [2fd665b] New upstream version 115.2.2
 Fixed CVE issues in upstream version 115.2.2 (MFSA 2023-40):
 CVE-2023-4863: Heap buffer overflow in libwebp
   * [7b862be] d/copyright: Update content due upstream changes
   * [140b77d] d/s/lintian-overrides: Update data for overrides
Checksums-Sha1:
 b6b096203f367347a2a2c4a9df7c82c33666f35f 8537 thunderbird_115.2.2-1.dsc
 fa250be106c3ecf1b4f39618f78dbfd1214fef2e 12629416 
thunderbird_115.2.2.orig-thunderbird-l10n.tar.xz
 404bbfb463e041d83e84fe981ebe25eaabe82664 02180 
thunderbird_115.2.2.orig.tar.xz
 08e4c2a7575d030303fce078958d1d25d7a6b0f9 543104 
thunderbird_115.2.2-1.debian.tar.xz
 fadc7057a3f20c447620add150c9de69c8e3a213 42946 
thunderbird_115.2.2-1_amd64.buildinfo
Checksums-Sha256:
 549557304c56a3148c428e1199e7f5398974e17c8bc932302ed34d5344aefd37 8537 
thunderbird_115.2.2-1.dsc
 0f9fd8a5a050db9ac3c3e28150ceaaa16e3ff7a52d2bd5a50d9b86fff8b7d758 12629416 
thunderbird_115.2.2.orig-thunderbird-l10n.tar.xz
 997df98d52bef597e33279371af61816943f037c8d9db2000fb504250ae71aa5 02180 
thunderbird_115.2.2.orig.tar.xz
 c727a09ae0d1d3657da7c3f854045de824374f35ff2bebaea5998c68b00aeae6 543104 
thunderbird_115.2.2-1.debian.tar.xz
 13771dab32681715ef61fb046bcfa0950b9a52b7155e8a8800793f5b235ad874 42946 
thunderbird_115.2.2-1_amd64.buildinfo
Files:
 497ae54df583fbbffbdac4bc047f118d 8537 mail optional thunderbird_115.2.2-1.dsc
 cb091fdf92ea07a98b89e333dc96315c 12629416 mail optional 
thunderbird_115.2.2.orig-thunderbird-l10n.tar.xz
 d45c461fdc543982c013baf30c9abb16 02180 mail optional 
thunderbird_115.2.2.orig.tar.xz
 33fe0e0e23578b23d7fb15309fc1ccf8 543104 mail optional 
thunderbird_115.2.2-1.debian.tar.xz
 5fa26872dddcbf92e46e8b76d1275305 42946 mail optional 
thunderbird_115.2.2-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQJMBAEBCgA2FiEEtw38bxNP7PwBHmKqgwFgFCUdHbAFAmUB/+gYHGMuc2Nob2Vu
ZXJ0QHQtb25saW5lLmRlAAoJEIMBYBQlHR2wa/oP/3zLAfLb3siz6Cx46VcMpjRK
8tc+Ce2+foCuuwm3eI5VUb0CB8+lj2bWQ1r8lEahhlT97XUKacrrJWtXuuZQL7Bx
PcfjyPVBXl61P2x9BCkYtfXZvJ+R3PHPiTkdkvljqBDvxLcg4V+JYa

Processed: Re: libime FTCBFS: fails to run built tools

2023-09-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +wontfix
Bug #1051604 [src:libime] libime FTCBFS: fails to run built tools
Added tag(s) wontfix.
> close -1
Bug #1051604 [src:libime] libime FTCBFS: fails to run built tools
Marked Bug as done

-- 
1051604: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051604
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1051758: marked as done (ITP: python-ruyaml -- YAML 1.2 loader/dumper package for Python)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:47 +
with message-id 
and subject line Bug#1051758: fixed in python-ruyaml 0.91.0-1
has caused the Debian Bug report #1051758,
regarding ITP: python-ruyaml -- YAML 1.2 loader/dumper package for Python
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051758: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051758
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Carsten Schoenert 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: python-ruyaml
  Version : 0.91.0
  Upstream Contact: Anthon van der Neut, Ruamel bvba 

Sorin Sbarnea 
* URL : https://github.com/pycontribs/ruyaml
* License : MIT
  Programming Lang: Python
  Description : YAML 1.2 loader/dumper package for Python

 The ruyaml package is a fork of ruamel.yaml aimed to made in order to secure
 the future of the library, mainly by having a pool of maintainers and can be
 used as a drop-in replacement for python3-ruamel.yaml.

This package is a dependency for yamlfix (a simple opinionated yaml
formatter that keeps your comments) which I intend to package to.

Packaging will happen within the Debian Python Team.
--- End Message ---
--- Begin Message ---
Source: python-ruyaml
Source-Version: 0.91.0-1
Done: Carsten Schoenert 

We believe that the bug you reported is fixed in the latest version of
python-ruyaml, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Carsten Schoenert  (supplier of updated python-ruyaml 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 12 Sep 2023 13:41:31 +0530
Source: python-ruyaml
Binary: python-ruyaml-doc python3-ruyaml
Architecture: source all
Version: 0.91.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team 
Changed-By: Carsten Schoenert 
Description:
 python-ruyaml-doc - YAML 1.2 loader/dumper package for Python (Documentation)
 python3-ruyaml - YAML 1.2 loader/dumper package for Python
Closes: 1051758
Changes:
 python-ruyaml (0.91.0-1) unstable; urgency=medium
 .
   * [e7632d5] New upstream version 0.91.0
   * [69ac859] First and initial Debianization
 (Closes: #1051758)
Checksums-Sha1:
 3f3f6d4d682849dee579bce1cf3bddfd65838746 2373 python-ruyaml_0.91.0-1.dsc
 864d1a40e757489dac9d154ff4611d3006a73db4 224845 
python-ruyaml_0.91.0.orig.tar.gz
 481674b4cddaf0aa47f429a06b9dedda87231245 3968 
python-ruyaml_0.91.0-1.debian.tar.xz
 5e1726722ced82cb262b78549d6d35a74bce0ab6 59284 
python-ruyaml-doc_0.91.0-1_all.deb
 223c83a344c4b52fc40b8026603f0917dd944d5b 8200 
python-ruyaml_0.91.0-1_amd64.buildinfo
 cd625d16bff60074a02120c9b3d6e1ef40ef1729 97388 python3-ruyaml_0.91.0-1_all.deb
Checksums-Sha256:
 5409b739e88f20af6277e3b70b2b39c7ecd23419a361d4df1335c0e067364852 2373 
python-ruyaml_0.91.0-1.dsc
 0c69d294aeb59e1958ff92d7111c8117b02ecad26d8d36392507e9bafa7d9408 224845 
python-ruyaml_0.91.0.orig.tar.gz
 fa7fa7fce0b71a89a84e1e2c2419b744c596ee4260dd0de4f1eba9a9b415bdee 3968 
python-ruyaml_0.91.0-1.debian.tar.xz
 252f09d7625d0a62e592e2ef1061beb6b7d711faf0957166cc95448f525cdba0 59284 
python-ruyaml-doc_0.91.0-1_all.deb
 e14233962d068d075276f564bf5921046af8ef3a0038fa043eacd978c5e11caf 8200 
python-ruyaml_0.91.0-1_amd64.buildinfo
 a212b01b802ecd75fc49befe44f2252ab440d664fc1a6023c0e19defa9f602d3 97388 
python3-ruyaml_0.91.0-1_all.deb
Files:
 1ad4a3e9a08a02eff846b18b949b7167 2373 python optional 
python-ruyaml_0.91.0-1.dsc
 c4816fa6e61662d658a0c979166dcd92 224845 python optional 
python-ruyaml_0.91.0.orig.tar.gz
 f4ffcc00f8bc103a0cabf3262b647306 3968 python optional 
python-ruyaml_0.91.0-1.debian.tar.xz
 dd5a7345b1132b273069969ee41ef157 59284 doc optional 
python-ruyaml-doc_0.91.0-1_all.deb
 939b2d7cc178990bb2f1dabdb5b0cf7b 8200 python optional 
python-ruyaml_0.91.0-1_amd64.buildinfo
 41561becc2b754ec7e5de4845f6a1421 97388 python optional 
python3-ruyaml_0.91.0-1_all.deb

-BEGIN PGP SIGNATURE-

iQJMBAEBCgA2FiEEtw38bxNP7PwBHmKqgwFgFCUdHbAFAmUAbk8YHGMuc2Nob2Vu
ZXJ0QHQtb25saW5lLmRlAAoJEIM

Bug#1051798: marked as done (ITP: python-pcre2 -- Python bindings for the PCRE2 regular expression library)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:45 +
with message-id 
and subject line Bug#1051798: fixed in python-pcre2 0.2.0+ds-1
has caused the Debian Bug report #1051798,
regarding ITP: python-pcre2 -- Python bindings for the PCRE2 regular expression 
library
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051798: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051798
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: wnpp
Severity: wishlist
X-Debbugs-Cc: cru...@debian.org

Subject: ITP: python-pcre2 -- Python bindings for the PCRE2 regular 
expression library

Package: wnpp
Owner: Michael R. Crusoe 
Severity: wishlist

* Package name : python-pcre2
Version : 0.2.0+ds
Upstream Author : grtetrault
* URL : https://github.com/grtetrault/pcre2.py
* License : BSD-3-clause
Programming Lang: Python
Description : Python bindings for the PCRE2 regular expression library
This package contains Python bindings for PCRE2. PCRE2 is the revised 
API for
the Perl-compatible regular expressions (PCRE) library created by Philip 
Hazel.

.
For original source code, see the official PCRE2 repository:
https://github.com/PCRE2Project/pcre2

Upstream publishes to https://pypi.org/project/pcre2/ and has made 
recent releases.


--
Michael R. Crusoe



OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: python-pcre2
Source-Version: 0.2.0+ds-1
Done: Michael R. Crusoe 

We believe that the bug you reported is fixed in the latest version of
python-pcre2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael R. Crusoe  (supplier of updated python-pcre2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 11 Sep 2023 15:01:03 +0200
Source: python-pcre2
Binary: python3-pcre2 python3-pcre2-dbgsym
Architecture: source amd64
Version: 0.2.0+ds-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team 
Changed-By: Michael R. Crusoe 
Description:
 python3-pcre2 - Python bindings for the PCRE2 regular expression library
Closes: 1051798
Changes:
 python-pcre2 (0.2.0+ds-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1051798)
Checksums-Sha1:
 6bfb91deb956448fe7d34b0c62c532ad56aba1d3 2157 python-pcre2_0.2.0+ds-1.dsc
 0a68ba711f74581f2c53cc8c8cebd65d013dd7d4 19684 
python-pcre2_0.2.0+ds.orig.tar.xz
 baffaab1dbbfc92e4b149ebfbb4d4a5dba7f8928 3456 
python-pcre2_0.2.0+ds-1.debian.tar.xz
 0c51f87587674e0121c12ec1dac24f06a5a19a33 8636 
python-pcre2_0.2.0+ds-1_amd64.buildinfo
 bf83a138ea2d916264e2c1144ca125a8d853d385 498512 
python3-pcre2-dbgsym_0.2.0+ds-1_amd64.deb
 fd67c17cea84d4c06bb1fe7755d64347b493d6d9 108976 
python3-pcre2_0.2.0+ds-1_amd64.deb
Checksums-Sha256:
 0c725fdda69cbce2835c0fe0d0ce178dd17f0db9c010c4aa3a1cf37aa645f407 2157 
python-pcre2_0.2.0+ds-1.dsc
 f40d0a356e50d5b60a743b51dc03d6aeddac9f7ed3b6a825a66d445994bc8026 19684 
python-pcre2_0.2.0+ds.orig.tar.xz
 310847a88c833d25a53e4fe7ffe88ca7713c84a38c5fa8493513a8238aec2423 3456 
python-pcre2_0.2.0+ds-1.debian.tar.xz
 4d1a48fc452dd9f8fc4c04469b3c466acb1545e81ebd79ee8a336a66720ed58a 8636 
python-pcre2_0.2.0+ds-1_amd64.buildinfo
 f0732a65884e93e5a547a701f706274da873d84df7511f7af68d88efb5628d10 498512 
python3-pcre2-dbgsym_0.2.0+ds-1_amd64.deb
 423503b3425be76d7bd46cd56ef202456986c39dd42014e454b6552bbb456a10 108976 
python3-pcre2_0.2.0+ds-1_amd64.deb
Files:
 ca517c538e1477c93d6c4facf0ef212b 2157 python optional 
python-pcre2_0.2.0+ds-1.dsc
 b6bbe57036359f8b2c43fab34cf36f37 19684 python optional 
python-pcre2_0.2.0+ds.orig.tar.xz
 c9ead01248bded360f4d08389c87701b 3456 python optional 
python-pcre2_0.2.0+ds-1.debian.tar.xz
 ad12d908d9c17b27a7b248558cb886ea 8636 python optional 
python-pcre2_0.2.0+ds-1_amd64.buildinfo
 5be5340ebdabf73749f55869fb98df6a 498512 debug optional 
python3-pcre2-dbgsym_0.2.0+ds-1_amd64.deb
 7e01bd77c40e97fdeee99a409082a9e2 108976 python optional 
python3-pcre2_0.2.0+ds-1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEck1gkzcRPHEFUNdHPCZ2P2xn5uIFAmUAo14ACgkQPCZ2P2xn
5uI3mQ/+LPssRuqWfqY8NT30weeGlsm

Bug#1051705: marked as done (ITP: node-vega-embed -- Node.js library to easily embed vega views)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:43 +
with message-id 
and subject line Bug#1051705: fixed in node-vega-embed 6.22.2-1
has caused the Debian Bug report #1051705,
regarding ITP: node-vega-embed -- Node.js library to easily embed vega views
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051705: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051705
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-vega-embed
  Version : 6.22.2
  Upstream Contact: University of Washington Interactive Data Lab
  
* URL : https://github.com/vega/vega-embed/issues
* License : BSD-3-Clause
  Programming Lang: $jAVAsCRIPT
  Description : Node.js library to easily embed vega views

node-vega-embed makes it easy to embed interactive node-vega and
node-vega-lite views into web pages.

It's another dependency needed to build node-jupyterlab. Will be
maintained under JS Team umbrella
--- End Message ---
--- Begin Message ---
Source: node-vega-embed
Source-Version: 6.22.2-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-vega-embed, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-vega-embed package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 11 Sep 2023 17:55:50 +0400
Source: node-vega-embed
Binary: node-vega-embed
Architecture: source all
Version: 6.22.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-vega-embed - Node.js library to easily embed vega views
Closes: 1051705
Changes:
 node-vega-embed (6.22.2-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051705)
Checksums-Sha1:
 ae8378a235a2c687743bfca67d6e8aea4a90a3dc 2459 node-vega-embed_6.22.2-1.dsc
 91565381a99c332a4d54866af0f6b5811e76e8d9 400364 
node-vega-embed_6.22.2.orig.tar.gz
 e2ae8adfb9d0c7964823123f585cc3fb518c1e2b 3784 
node-vega-embed_6.22.2-1.debian.tar.xz
 052e8feca62ab2b200665f6be08913412def6748 157892 
node-vega-embed_6.22.2-1_all.deb
 1447984a5e6b8e1ceb705cc964394b9247aacacd 19231 
node-vega-embed_6.22.2-1_amd64.buildinfo
Checksums-Sha256:
 70aed01cac3404203791c3be7c631a64b1df31959ba36fce4fd69b8e6c927bd5 2459 
node-vega-embed_6.22.2-1.dsc
 94c809aad12fa8a6189bfe4db9be2b79f52b57b24e372f97f2bf68d870895362 400364 
node-vega-embed_6.22.2.orig.tar.gz
 952f5944e41955a084473645789c016c46bb370643c9dfbf91be4ce5d4877e08 3784 
node-vega-embed_6.22.2-1.debian.tar.xz
 f016b5a48f9cf1d34acce8252a190f950262edd83c32b5fcb8d4019b652f3a52 157892 
node-vega-embed_6.22.2-1_all.deb
 bb3bacdcf05b5ad58849b01fbc235bdad60a11e4c6326ecbc837991865304b1d 19231 
node-vega-embed_6.22.2-1_amd64.buildinfo
Files:
 d6ca2bb311bdcd6f2b00d6d7346349b0 2459 javascript optional 
node-vega-embed_6.22.2-1.dsc
 4b7a8228b744870a6e89fbc17f5921d7 400364 javascript optional 
node-vega-embed_6.22.2.orig.tar.gz
 5ecca00e2babfdd9248a3df0d9bed0e5 3784 javascript optional 
node-vega-embed_6.22.2-1.debian.tar.xz
 32d2aa21fd0d4771afa27129e0ac17c7 157892 javascript optional 
node-vega-embed_6.22.2-1_all.deb
 68573a056aae7d9aab41477294dcd6f0 19231 javascript optional 
node-vega-embed_6.22.2-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#1051660: marked as done (ITP: node-vega-lite -- Node.js library that provides a higher-level grammar for visual analysis for node-vega)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:44 +
with message-id 
and subject line Bug#1051660: fixed in node-vega-lite 5.14.1+~4.0.0-1
has caused the Debian Bug report #1051660,
regarding ITP: node-vega-lite -- Node.js library that provides a higher-level 
grammar for visual analysis for node-vega
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051660: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051660
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-vega-lite
  Version : 5.14.1
  Upstream Contact: University of Washington Interactive Data Lab
  
* URL : https://github.com/vega/vega-lite/issues
* License : BSD-3-Clause
  Programming Lang: JavaScript
  Description : Node.js library that provides a higher-level grammar for 
visual analysis for node-vega

node-vega-lite provides a higher-level grammar for visual analysis that
generates complete Vega specifications.
More details available on https://vega.github.io/vega-lite/docs/. Try
available also on line: https://vega.github.io/editor/#/custom/vega-lite

This library is a dependency of node-vega-embed, needed to build
node-jupyterlab. Will be maintained under JS Team umbrella
--- End Message ---
--- Begin Message ---
Source: node-vega-lite
Source-Version: 5.14.1+~4.0.0-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-vega-lite, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-vega-lite package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 11 Sep 2023 08:10:56 +0400
Source: node-vega-lite
Binary: node-vega-lite
Architecture: source all
Version: 5.14.1+~4.0.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-vega-lite - Node.js library that provides a higher-level grammar for 
visual a
Closes: 1051660
Changes:
 node-vega-lite (5.14.1+~4.0.0-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051660)
Checksums-Sha1:
 094bcea016ff15aeb3b1d1e54649adf0b4f5518e 2802 
node-vega-lite_5.14.1+~4.0.0-1.dsc
 612188689f516d05fb26c67e96ca131554447bb5 17495 
node-vega-lite_5.14.1+~4.0.0.orig-json-stringify-pretty-compact.tar.gz
 02846c6fca088e237aeb085ba693f04a67130476 25349282 
node-vega-lite_5.14.1+~4.0.0.orig.tar.gz
 928bd9b5da09a19bebf8924cad03b1675da46ce1 3676 
node-vega-lite_5.14.1+~4.0.0-1.debian.tar.xz
 a2b3a2bd952139dc52423121c8acea94fb0ea5a6 1003624 
node-vega-lite_5.14.1+~4.0.0-1_all.deb
 b32a9599917523ee842f3ef1f8110063f9ff26a3 19920 
node-vega-lite_5.14.1+~4.0.0-1_amd64.buildinfo
Checksums-Sha256:
 2678b4ba656844a9f2aa1240adda40ade703e19318ef6385a244bd2a17f18e5d 2802 
node-vega-lite_5.14.1+~4.0.0-1.dsc
 3d1bb195d6e1d9f931dee68d06cc60bcf4c19efdf95f5035a47a588ae02279ed 17495 
node-vega-lite_5.14.1+~4.0.0.orig-json-stringify-pretty-compact.tar.gz
 256baf0a281efade3bdfc7edb8658b362371e7dd8f682d9c254cd0d34493a38e 25349282 
node-vega-lite_5.14.1+~4.0.0.orig.tar.gz
 db25885582fc5e4d9507f49ce87995c1a88095d062f508eafb3c6eb8e290033b 3676 
node-vega-lite_5.14.1+~4.0.0-1.debian.tar.xz
 3e26662b4d8a040f82ea3df1b29de26893e659be2206a3e75335c5efc6b3acfc 1003624 
node-vega-lite_5.14.1+~4.0.0-1_all.deb
 e0b33a4b624ad501bdedb57bdcbe6629f6e5516e775edba714d91c921689f329 19920 
node-vega-lite_5.14.1+~4.0.0-1_amd64.buildinfo
Files:
 766cf479939f135fdae18d714d409d1d 2802 javascript optional 
node-vega-lite_5.14.1+~4.0.0-1.dsc
 252abae8b7f47d424f37d82719336dca 17495 javascript optional 
node-vega-lite_5.14.1+~4.0.0.orig-json-stringify-pretty-compact.tar.gz
 21c4e594d9e30ebb58c8e18fe4302d1b 25349282 javascript optional 
node-vega-lite_5.14.1+~4.0.0.orig.tar.gz
 76f1342790a7b57e31429cb097731973 3676 javascript optional 
node-vega-lite_5.14.1+~4.0.0-1.debian.tar.xz
 9350c32ae6fbf4c5961f0bfe4d8194af 1003624 javascript optional 
node-vega-lite_5.14.1+~4.0.0-1_all.deb
 ef74

Bug#1051628: marked as done (ITP: node-d3-delaunay -- Node.js fast library for computing the Voronoi diagram)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:42 +
with message-id 
and subject line Bug#1051628: fixed in node-d3-delaunay 6.0.4+~cs19.0.3-1
has caused the Debian Bug report #1051628,
regarding ITP: node-d3-delaunay -- Node.js fast library for computing the 
Voronoi diagram
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051628: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051628
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-d3-delaunay
  Version : 6.0.4
  Upstream Contact: Observable, Inc.
  
* URL : https://github.com/d3/d3-delaunay
* License : ISC
  Programming Lang: JavaScript
  Description : Node.js fast library for computing the Voronoi diagram

node-d3-delaunay is a fast library for computing the Voronoi diagram of a set
of two-dimensional points. It is based on included node-delaunator, a fast
library for computing the Delaunay triangulation using sweep algorithms.
The Voronoi diagram is constructed by connecting the circumcenters of
adjacent triangles in the Delaunay triangulation.

It's a missing dependency of node-vega, needed to build node-jupyterlab
--- End Message ---
--- Begin Message ---
Source: node-d3-delaunay
Source-Version: 6.0.4+~cs19.0.3-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-d3-delaunay, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-d3-delaunay package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 10 Sep 2023 21:45:16 +0400
Source: node-d3-delaunay
Binary: node-d3-delaunay
Architecture: source all
Version: 6.0.4+~cs19.0.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-d3-delaunay - Node.js fast library for computing the Voronoi diagram
Closes: 1051628
Changes:
 node-d3-delaunay (6.0.4+~cs19.0.3-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051628)
Checksums-Sha1:
 f32de173103181120a7a714dc1cae6a4a39391c4 3589 
node-d3-delaunay_6.0.4+~cs19.0.3-1.dsc
 34bf41cef13bd439c709792cb780aeb297fab0c6 286994 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-delaunator.tar.gz
 e2346627658e634464cd4a7f0a223035935b601f 484874 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-robust-predicates.tar.gz
 006b7bd838baec1511270cb900bf4fc377bbbf41 4136 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-types-d3-delaunay.tar.gz
 c6be322f0f3eff9fa9f6a5dcaa2ded54913b2d17 2381 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-types-delaunator.tar.gz
 9221eba81ca00ff3521d684a3813d83062758036 3722388 
node-d3-delaunay_6.0.4+~cs19.0.3.orig.tar.gz
 2748db93351249fa9d347941bec97cd76f75d417 4080 
node-d3-delaunay_6.0.4+~cs19.0.3-1.debian.tar.xz
 c430666e4785ffe5d39503a15976d1645d9d6c45 40576 
node-d3-delaunay_6.0.4+~cs19.0.3-1_all.deb
 2172fb98e8313612a1bcaeb3fc9300c9173096c6 14804 
node-d3-delaunay_6.0.4+~cs19.0.3-1_amd64.buildinfo
Checksums-Sha256:
 e134c8e9067768535f52a11cf2a62fdcf7225b038a226ad91fa064afcf513127 3589 
node-d3-delaunay_6.0.4+~cs19.0.3-1.dsc
 21b0eda57e24c290d728465679dc5b9865276b8ca3f03500a2177cb1ca25d5a1 286994 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-delaunator.tar.gz
 ac22403c15eba85f923edac512378b57b463ff639e4e9b87a3a644e0623ca0b9 484874 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-robust-predicates.tar.gz
 3401b05637bac39bc70d42c5259c32077768b6b65ef48aa6a8cb199fb83a 4136 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-types-d3-delaunay.tar.gz
 c3810a3054c6e100990f6db5a1af6df103999aa172cda1dbb00c985122c86189 2381 
node-d3-delaunay_6.0.4+~cs19.0.3.orig-types-delaunator.tar.gz
 5feb4a3fb29ee9d919f25b2835c3f5e0c71e02a8aff9c64ad550ad9feb00559b 3722388 
node-d3-delaunay_6.0.4+~cs19.0.3.orig.tar.gz
 9b0c2bcbf017768fe3011f047692740663649361b510b0ed94c302d3d788eb81 4080 
node-d3-delaunay_6.0.4+~cs19.0.3-1.debian.tar.xz
 bdfa0e3f25ddb6a6bef2b11056391fd4fd8f876f269344e05e80ef2ba221d882 40576 
node-d3-delaunay_6.0.4+~cs19

Bug#1051608: marked as done (ITP: node-d3-geo-projection -- Extended geographic projections for node-d3-geo)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:42 +
with message-id 
and subject line Bug#1051608: fixed in node-d3-geo-projection 4.0.0-1
has caused the Debian Bug report #1051608,
regarding ITP: node-d3-geo-projection -- Extended geographic projections for 
node-d3-geo
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051608: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051608
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-d3-geo-projection
  Version : 4.0.0
  Upstream Contact: Mike Bostock 
* URL : https://d3js.org/d3-geo-projection/
* License : ISC
  Programming Lang: JavaScript
  Description : Extended geographic projections for node-d3-geo

node-d3-geo-projection provides extended geographic projections for
node-d3-geo. It's a dependency of node-vega-lite, needed to build
node-jupyterlab. It will be maintained under JS Team umbrella.
--- End Message ---
--- Begin Message ---
Source: node-d3-geo-projection
Source-Version: 4.0.0-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-d3-geo-projection, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-d3-geo-projection package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 10 Sep 2023 20:47:36 +0400
Source: node-d3-geo-projection
Binary: node-d3-geo-projection
Architecture: source all
Version: 4.0.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-d3-geo-projection - Extended geographic projections for node-d3-geo
Closes: 1051608
Changes:
 node-d3-geo-projection (4.0.0-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051608)
Checksums-Sha1:
 ee12b1bbdcb8c0db3134fa70992057c9948103d6 2246 
node-d3-geo-projection_4.0.0-1.dsc
 a4e18e78ceb59210b6ac8cfc4ac3ba8c4a694e9a 14517855 
node-d3-geo-projection_4.0.0.orig.tar.gz
 6b48be3ef1de32a3900f6938a62b2e58afe12be9 3216 
node-d3-geo-projection_4.0.0-1.debian.tar.xz
 d9d56ac0b6651a29a0c0c147f858fc1b52e8b69a 99268 
node-d3-geo-projection_4.0.0-1_all.deb
 9ca0431aa5283ed7286c2dca62b0465872a4cd75 14848 
node-d3-geo-projection_4.0.0-1_amd64.buildinfo
Checksums-Sha256:
 d4877e71f81d2ec55059d33c01c7febaf858a60f9be2a8fde35c6b3175ab5e32 2246 
node-d3-geo-projection_4.0.0-1.dsc
 a19b0efdd5de8a4005f377588ceaa07f7160439e39562653f167519c1603d553 14517855 
node-d3-geo-projection_4.0.0.orig.tar.gz
 4fd722c3215fc428546883b1df657f861ddf5bc5b941ac935b81d27ab5c49d5a 3216 
node-d3-geo-projection_4.0.0-1.debian.tar.xz
 a773b7449b34be55e11dc1671e99b72e2c026d018c6ad3c16aac2c82f29e 99268 
node-d3-geo-projection_4.0.0-1_all.deb
 7634d5dad7a3f29eaee14ad3e10f1bf0fc4dd2a5b7188d323d0f7ce6d7ce1c06 14848 
node-d3-geo-projection_4.0.0-1_amd64.buildinfo
Files:
 282d54d6cf69ca0c9d2aa32cac5440a5 2246 javascript optional 
node-d3-geo-projection_4.0.0-1.dsc
 1c7d15a5bee2880084f03a60681502ff 14517855 javascript optional 
node-d3-geo-projection_4.0.0.orig.tar.gz
 de809075cec29ca04cdc91aa18ca7f9b 3216 javascript optional 
node-d3-geo-projection_4.0.0-1.debian.tar.xz
 2a662bb1743ca270cc92f4fc1a25173b 99268 javascript optional 
node-d3-geo-projection_4.0.0-1_all.deb
 7e2e662b3bc7d39661475d6f89ad0a4b 14848 javascript optional 
node-d3-geo-projection_4.0.0-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#1051601: marked as done (ITP: node-geojson -- Node.js library to convert geo data into GeoJSON)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:43 +
with message-id 
and subject line Bug#1051601: fixed in node-geojson 0.5.0+~7946.0.10-1
has caused the Debian Bug report #1051601,
regarding ITP: node-geojson -- Node.js library to convert geo data into GeoJSON
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051601: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051601
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-geojson
  Version : 0.5.0
  Upstream Contact: Casey Cesari
  
* URL : https://github.com/caseycesari/geojson.js
* License : Expat
  Programming Lang: JavaScript
  Description : Node.js library to convert geo data into GeoJSON

node-geojson is a dependency of node-vega-lite and a TS dependency of
node-d3. It will be maintained under JS Team umbrella.
--- End Message ---
--- Begin Message ---
Source: node-geojson
Source-Version: 0.5.0+~7946.0.10-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-geojson, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-geojson package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 10 Sep 2023 15:40:26 +0400
Source: node-geojson
Binary: node-geojson
Architecture: source all
Version: 0.5.0+~7946.0.10-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-geojson - Node.js library to turn geo data into GeoJSON
Closes: 1051601
Changes:
 node-geojson (0.5.0+~7946.0.10-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051601)
Checksums-Sha1:
 66e4af1bda41cfc0d9b65fd5dccda18c2e3466bb 2471 
node-geojson_0.5.0+~7946.0.10-1.dsc
 fb96402b7351c14679bd951d6e3ff44ae6d619fa 2880 
node-geojson_0.5.0+~7946.0.10.orig-types-geojson.tar.xz
 856f3e54fb029896aa272b8831a205cb3ead78a3 8924 
node-geojson_0.5.0+~7946.0.10.orig.tar.xz
 2113c3eb8a017ef876714d0cc5055e2e1b702093 2688 
node-geojson_0.5.0+~7946.0.10-1.debian.tar.xz
 04445ab413e222f66ad50be84b1d8f7cee6fc0d7 6 
node-geojson_0.5.0+~7946.0.10-1_all.deb
 96d081ccdee3c24afe1f2e1e92311f00c348f324 11559 
node-geojson_0.5.0+~7946.0.10-1_amd64.buildinfo
Checksums-Sha256:
 56879bb0f67600a24c8fb6fc03ba1e2239b69cfec862b4d7c54202155db80763 2471 
node-geojson_0.5.0+~7946.0.10-1.dsc
 6d150c57f0f027e591ee818e6127ac111ad9ae1791af4e0aab33e020846babb7 2880 
node-geojson_0.5.0+~7946.0.10.orig-types-geojson.tar.xz
 7c4e8b43bfe96ce84173fa674e7b79a401ce92ed6522f6681aca3498fb157b2a 8924 
node-geojson_0.5.0+~7946.0.10.orig.tar.xz
 4939dc824800a23050cead900aab8c46a6ad4b2c0e5f424a706b39bde157e31e 2688 
node-geojson_0.5.0+~7946.0.10-1.debian.tar.xz
 d8ec0d21b3516e195f2c05169a9e054aab326260ad3bacbd5f689c1f5d54ae57 6 
node-geojson_0.5.0+~7946.0.10-1_all.deb
 1e8743c514e027b6d98bdb00d9ab4c43fb67bda20d798854478ae3813a33204c 11559 
node-geojson_0.5.0+~7946.0.10-1_amd64.buildinfo
Files:
 b3bd35bcba70ed49214e1c098149b02e 2471 javascript optional 
node-geojson_0.5.0+~7946.0.10-1.dsc
 5094e548b7521407e293fcc147634e08 2880 javascript optional 
node-geojson_0.5.0+~7946.0.10.orig-types-geojson.tar.xz
 9874728bd6e9b729d4d8608f6777fd03 8924 javascript optional 
node-geojson_0.5.0+~7946.0.10.orig.tar.xz
 02236eb893db0b45b5976961a071ecbe 2688 javascript optional 
node-geojson_0.5.0+~7946.0.10-1.debian.tar.xz
 c5628b33cbc50b434252541c9daad3e7 6 javascript optional 
node-geojson_0.5.0+~7946.0.10-1_all.deb
 692452ca748058149b1590cbe17343b8 11559 javascript optional 
node-geojson_0.5.0+~7946.0.10-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEAN/li4tVV3nRAF7J9tdMp8mZ7ukFAmT9q58ACgkQ9tdMp8mZ
7unAPA/+JT29m192eGtf+e99riiC8cJmX5zGwXKuzsXWyxp48QOFkueAMAxA9s6w
rWgCRNh+P3Jsqp8pohR5Begp8Wrorzd1BgHVHeRFevkOW/YK8g7KSRQ40gDL+/Wu
kHq2Z7mLfaW1quwj3isTM1x6XKwA5HFyLgN0OoLilUotSd2PaRVQEt3WlOEG7dcC
tlHyZ9Zg7AvnIXptq6uz7X0IEkvjs8hBsIJuf2HSSjt5AVvnuI

Bug#1051591: marked as done (ITP: node-vega-tooltip -- Tooltip for node-vega and node-vega-lite)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:44 +
with message-id 
and subject line Bug#1051591: fixed in node-vega-tooltip 0.33.0-1
has caused the Debian Bug report #1051591,
regarding ITP: node-vega-tooltip -- Tooltip for node-vega and node-vega-lite
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051591: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051591
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-vega-tooltip
  Version : 0.33.0
  Upstream Contact: https://github.com/vega/vega-tooltip/issues
* URL : https://github.com/vega/vega-tooltip
* License : BSD-3-Clause
  Programming Lang: JavaScript
  Description : Tooltip for node-vega and node-vega-lite

node-vega-tooltip is a tooltip plugin for Vega and Vega-Lite visualizations.
This plugin implements a custom tooltip handler for Vega that uses custom
HTML tooltips instead of the HTML title attribute.

This is a dependency of node-jupyterlab. It will be maintained under JS
Team umbrella.
--- End Message ---
--- Begin Message ---
Source: node-vega-tooltip
Source-Version: 0.33.0-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-vega-tooltip, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-vega-tooltip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 10 Sep 2023 12:27:22 +0400
Source: node-vega-tooltip
Binary: node-vega-tooltip
Architecture: source all
Version: 0.33.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-vega-tooltip - Tooltip for node-vega and node-vega-lite
Closes: 1051591
Changes:
 node-vega-tooltip (0.33.0-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051591)
Checksums-Sha1:
 9b623a5eab968237927a102ba2ec93c66f872a79 2278 node-vega-tooltip_0.33.0-1.dsc
 a3a050202e8011ea1a2b57aaca52018070b7169b 216132 
node-vega-tooltip_0.33.0.orig.tar.gz
 82378438052da3d103380f6e778da31e281aa0e8 4040 
node-vega-tooltip_0.33.0-1.debian.tar.xz
 4ce56b2dc3977605c7cbb5dec79ac92b23a68d0f 29324 
node-vega-tooltip_0.33.0-1_all.deb
 1d2a7fb56425797dc7a8117e1d5896f253ae5306 21279 
node-vega-tooltip_0.33.0-1_amd64.buildinfo
Checksums-Sha256:
 1eff8807ea1ac5771d04cc18519ff92c81588e195a9f108457f9d0974ad658fb 2278 
node-vega-tooltip_0.33.0-1.dsc
 2c291a8d3aeb6c177c4ee5eecae94df8c898a8fca5b6d2b13e6c8545acc87d18 216132 
node-vega-tooltip_0.33.0.orig.tar.gz
 2002736b3b7a4f2165752fe5baf36b320e7cee62a35a78b1bb000610d1ba7700 4040 
node-vega-tooltip_0.33.0-1.debian.tar.xz
 5c66df5162cdbc9b3ab45e654e08fd71701a26e5b454f8e7973ff1e1770cd232 29324 
node-vega-tooltip_0.33.0-1_all.deb
 46bb61bdc54cf2fbba988b89077e8dad3b92831117288b94af0d8800a715e307 21279 
node-vega-tooltip_0.33.0-1_amd64.buildinfo
Files:
 bc6bfd822e7a5e7c95f45af894493d7f 2278 javascript optional 
node-vega-tooltip_0.33.0-1.dsc
 8a9fbdcce127ec61ab5484924d29d308 216132 javascript optional 
node-vega-tooltip_0.33.0.orig.tar.gz
 21836652d77a27f9b671db8a9f9c340e 4040 javascript optional 
node-vega-tooltip_0.33.0-1.debian.tar.xz
 d9de213f371d4b8d99a38cfc5e60a3c0 29324 javascript optional 
node-vega-tooltip_0.33.0-1_all.deb
 f7930106f2626158a327e14061aee192 21279 javascript optional 
node-vega-tooltip_0.33.0-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEAN/li4tVV3nRAF7J9tdMp8mZ7ukFAmT9gIoACgkQ9tdMp8mZ
7umrFhAAheFUA6RCxq0XAiRR7q5VPZUx5KkvbFYV5UCBUcWE4S7jee3nSF+onvMh
KJSLkY8m+Jm8tUVJtCnEVASsOgKzSXTvw2OPqIJ5ngRgswdQP1WRZJC6IB6vA2p7
81t9QuKEsYUAp+1XJcwlJDvhAuzv3p2WaljUK5bKYS35dWvz5hcSfTajXxv34SnP
6PndtnYIeigu7Q/2lukpFcMWgtcssfWuS9zxUuB6RjV2zXWpwrAvE1fOGJCnH835
MTWjNK2pb+2Kj8SuBfq31qKHxSZR9mLky5tB2iRTqmPHi0LT4JxuAZ/GgBXVA8nd
KFphxHHhpk3UX25pnNaUD4bFLm+KN/DjC9XAROaS/KfpfOHDTi9ZURdp7q7/h0Bg
5BY0Bq7FaQWTb2Ao4Bgg/mbi9NUNZnqGpHv0l7R333HcAutxQpNzzjYK2cNuHrU6
V7Nf+e0s42F9TEmkzxWsPMAVPYyql3VNVMDPw/Mhllnbk1UdJZiJFnVvyF3y70QN
41L5j4PW

Bug#1051272: marked as done (ITP: python-pyasn1-modules-lextudio -- collection of ASN.1-based protocols modules)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:46 +
with message-id 
and subject line Bug#1051272: fixed in python-pyasn1-modules-lextudio 0.2.9-1
has caused the Debian Bug report #1051272,
regarding ITP: python-pyasn1-modules-lextudio -- collection of ASN.1-based 
protocols modules
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051272: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051272
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: python-pyasn1-modules-lextudio
  Version : 0.2.9
  Upstream Contact: Lex Li 
* URL : https://github.com/lextudio/pyasn1-modules
* License : BSD-2-clause
  Programming Lang: Python
  Description : collection of ASN.1-based protocols modules

 The pyasn1-modules package contains a collection of ASN.1 data structures
 expressed as Python classes based on pyasn1 data model.
 .
 If ASN.1 module you need is not present in this collection, try using Asn1ate
 (from https://github.com/kimgr/asn1ate) tool that compiles ASN.1 documents
 into pyasn1 code.
--- End Message ---
--- Begin Message ---
Source: python-pyasn1-modules-lextudio
Source-Version: 0.2.9-1
Done: Thomas Goirand 

We believe that the bug you reported is fixed in the latest version of
python-pyasn1-modules-lextudio, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated 
python-pyasn1-modules-lextudio package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 05 Sep 2023 16:07:14 +0200
Source: python-pyasn1-modules-lextudio
Binary: python3-pyasn1-modules-lextudio
Architecture: source all
Version: 0.2.9-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack 
Changed-By: Thomas Goirand 
Description:
 python3-pyasn1-modules-lextudio - collection of ASN.1-based protocols modules
Closes: 1051272
Changes:
 python-pyasn1-modules-lextudio (0.2.9-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1051272)
Checksums-Sha1:
 5a98f315f418f2f7ba671d6179d0add54d4363ee 2282 
python-pyasn1-modules-lextudio_0.2.9-1.dsc
 33d5ec04851d886147a57a6da51cc7b9cace3b2d 226720 
python-pyasn1-modules-lextudio_0.2.9.orig.tar.xz
 52621b697676ec66b08c55919a7ff2db48bc466d 2264 
python-pyasn1-modules-lextudio_0.2.9-1.debian.tar.xz
 0ec22aa333fe784cc3c964becf6ce327e8d35f2a 7502 
python-pyasn1-modules-lextudio_0.2.9-1_amd64.buildinfo
 3ae09ede01bb264a2bcae965a36b21361bad611f 84360 
python3-pyasn1-modules-lextudio_0.2.9-1_all.deb
Checksums-Sha256:
 70b8332b4555c72588ab31a87f63ccacdff947106b705a32e73181f12994db5e 2282 
python-pyasn1-modules-lextudio_0.2.9-1.dsc
 aef5e5ce961f3bf4d270ec17337719ae9acde5f08a6c122699fb899aa5750fa1 226720 
python-pyasn1-modules-lextudio_0.2.9.orig.tar.xz
 5c980d70dc5f050303f5653edd3a722800a5887051eff5c6010466f2a2c963ac 2264 
python-pyasn1-modules-lextudio_0.2.9-1.debian.tar.xz
 ee80c8f197c01708141f4cd5e0c2e74d02f6a0331dfd57fe5e836cfd07722534 7502 
python-pyasn1-modules-lextudio_0.2.9-1_amd64.buildinfo
 abe448c1a89f5d44cebfbb26aa2f892b8ae48d1fbb212b55566a1750028007fa 84360 
python3-pyasn1-modules-lextudio_0.2.9-1_all.deb
Files:
 5730e76b2c17e1bd53b1d92d345ea8f9 2282 python optional 
python-pyasn1-modules-lextudio_0.2.9-1.dsc
 3a91ddb4d1e639317370fa0bf921d8df 226720 python optional 
python-pyasn1-modules-lextudio_0.2.9.orig.tar.xz
 f31c8a02f4ffe169979d4e9119926eac 2264 python optional 
python-pyasn1-modules-lextudio_0.2.9-1.debian.tar.xz
 855bba97341d75d40d30f69cb70ad3aa 7502 python optional 
python-pyasn1-modules-lextudio_0.2.9-1_amd64.buildinfo
 cc250a4191dd3fc084c22d48ebb95c89 84360 python optional 
python3-pyasn1-modules-lextudio_0.2.9-1_all.deb

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEoLGp81CJVhMOekJc1BatFaxrQ/4FAmT+5NoACgkQ1BatFaxr
Q/7BBA/9GcqMXq4njQef5luf5Lo0mISd0yjtl+nS5kFIfHmvE7NzZ/rs/twVmQwH
xZY4w8zgp2KZQt6vEL476Ao7PhCtJH5mmQfwTgPKV1p49DyT3B9qF7bcwi6z/Sr2
ztDJZj9e+G4xtPUFW7CV+CPf3rRuUuFZmJy5HJutTi2i48Lhqz3TLaepTiskLaWC
TgH5LC+lHXCgSt6Ysp7kH

Bug#1051265: marked as done (ITP: python-pysmi-lextudio -- SNMP/SMI MIB parsing and conversion library)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:46 +
with message-id 
and subject line Bug#1051265: fixed in python-pysmi-lextudio 1.0.4-1
has caused the Debian Bug report #1051265,
regarding ITP: python-pysmi-lextudio -- SNMP/SMI MIB parsing and conversion 
library
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051265: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051265
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: python-pysmi-lextudio
  Version : 1.0.4
  Upstream Contact: Ilya Etingof 
* URL : https://github.com/lextudio/pysmi
* License : BSD-2-clause
  Programming Lang: Python
  Description : SNMP/SMI MIB parsing and conversion library

 PySMI is a pure-Python implementation of SNMP SMI MIB parser. This tool is
 designed to turn ASN.1 MIBs into various formats. As of this moment, JSON and
 pysnmp modules can be generated from ASN.1 MIBs.
--- End Message ---
--- Begin Message ---
Source: python-pysmi-lextudio
Source-Version: 1.0.4-1
Done: Thomas Goirand 

We believe that the bug you reported is fixed in the latest version of
python-pysmi-lextudio, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated python-pysmi-lextudio 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 05 Sep 2023 14:50:50 +0200
Source: python-pysmi-lextudio
Binary: python-pysmi-lextudio-doc python3-pysnmp-pysmi
Architecture: source all
Version: 1.0.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack 
Changed-By: Thomas Goirand 
Description:
 python-pysmi-lextudio-doc - SNMP/SMI MIB parsing and conversion library - doc
 python3-pysnmp-pysmi - SNMP/SMI MIB parsing and conversion library
Closes: 1051265
Changes:
 python-pysmi-lextudio (1.0.4-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1051265)
Checksums-Sha1:
 8b6e3deb434080193cc4abac6a9a6e208f332494 2339 python-pysmi-lextudio_1.0.4-1.dsc
 c9691619ca6c857db3ea5f90e724cf1ff9aa112a 93028 
python-pysmi-lextudio_1.0.4.orig.tar.xz
 8db75e5328073650eea760e16b464184ffd966b7 2140 
python-pysmi-lextudio_1.0.4-1.debian.tar.xz
 6285d58f58589bcfc99a218da24a9d2ebcb73465 70976 
python-pysmi-lextudio-doc_1.0.4-1_all.deb
 f1f33dd030369500712b8863cc79f3cc3f8422b8 8704 
python-pysmi-lextudio_1.0.4-1_amd64.buildinfo
 416864eb0de1e4da8d593de9356d7a9dce3b1323 45684 
python3-pysnmp-pysmi_1.0.4-1_all.deb
Checksums-Sha256:
 0ba50baf97b5ec3dae2c9b52c123a6f75329730a409d421fac10e8fb6197920e 2339 
python-pysmi-lextudio_1.0.4-1.dsc
 7c128ce4c9682ecd21cc01002d55ba05c3033c37550a0ee2e04d52041f6524b0 93028 
python-pysmi-lextudio_1.0.4.orig.tar.xz
 35cf22b74ad66379e98d69d0bac36c1a998b8194b6cfb0ecfd3b65a6216b3b67 2140 
python-pysmi-lextudio_1.0.4-1.debian.tar.xz
 ccb7f67e6885af0e5083cadea382754f4721303259e9eeafc0603d6b582eaf45 70976 
python-pysmi-lextudio-doc_1.0.4-1_all.deb
 f94e6dee706f1cd72d10814eca25cbcaf6416bb648372ee17a6ec0358bb9d4b4 8704 
python-pysmi-lextudio_1.0.4-1_amd64.buildinfo
 1391dd0362deb20b530753c392547b93a2a143328f71e8d372a0abc76540d354 45684 
python3-pysnmp-pysmi_1.0.4-1_all.deb
Files:
 4ac6d71fadd2498dac11afbe2777f1aa 2339 python optional 
python-pysmi-lextudio_1.0.4-1.dsc
 d932469653ac02429da12dc95ca161e5 93028 python optional 
python-pysmi-lextudio_1.0.4.orig.tar.xz
 8702d8104a1961728de3af22661d5247 2140 python optional 
python-pysmi-lextudio_1.0.4-1.debian.tar.xz
 0190de9b1394ba800f74dff938427dfa 70976 doc optional 
python-pysmi-lextudio-doc_1.0.4-1_all.deb
 af89884a5f105b2d13602d83c82eb30f 8704 python optional 
python-pysmi-lextudio_1.0.4-1_amd64.buildinfo
 8d5c42f599ccc19efe1e979a119d3575 45684 python optional 
python3-pysnmp-pysmi_1.0.4-1_all.deb

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEoLGp81CJVhMOekJc1BatFaxrQ/4FAmT/IUgACgkQ1BatFaxr
Q/5LvhAAmWvDQqYiFewdQnVfV5Pm+ju32Fl7wBcvtZV3NCq5TMxDjwOdPBdJx6qX
ghkTXOYU2aU7mCsfNp/3jr40V8bdyDt2FaOv6ViIdKrnmozxG/F9+Ajpye7nGUDe
8SEwSJtl7xIBuPCjGbUcZLjNTt

Bug#1051583: marked as done (ITP: node-fast-json-patch -- Node.js implementation of JSON-Patch)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:43 +
with message-id 
and subject line Bug#1051583: fixed in node-fast-json-patch 3.1.1+ds-1
has caused the Debian Bug report #1051583,
regarding ITP: node-fast-json-patch -- Node.js implementation of JSON-Patch
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051583: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051583
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Yadd 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: node-fast-json-patch
  Version : 3.1.1
  Upstream Contact: Joachim Wester 
* URL : https://github.com/Starcounter-Jack/JSON-Patch
* License : Expat
  Programming Lang: JavaScript
  Description : Node.js implementation of JSON-Patch

node-fast-json-patch is a leaner and meaner implementation of JSON-Patch.
Small footprint. High performance. It can:
 * apply patches (arrays) and single operations on JS object
 * validate a sequence of patches
 * observe for changes and generate patches when a change is detected
 * compare two objects to obtain the difference

node-fast-json-patch is a dependency of node-vega-embed, needed for
node-jupyterlab.
--- End Message ---
--- Begin Message ---
Source: node-fast-json-patch
Source-Version: 3.1.1+ds-1
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
node-fast-json-patch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated node-fast-json-patch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 10 Sep 2023 07:51:26 +0400
Source: node-fast-json-patch
Binary: node-fast-json-patch
Architecture: source all
Version: 3.1.1+ds-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 

Changed-By: Yadd 
Description:
 node-fast-json-patch - Node.js implementation of JSON-Patch
Closes: 1051583
Changes:
 node-fast-json-patch (3.1.1+ds-1) unstable; urgency=medium
 .
   * Initial release (Closes: #1051583)
Checksums-Sha1:
 a76c5c226712fd8c595ce8eb41b54622af266009 2206 
node-fast-json-patch_3.1.1+ds-1.dsc
 bdebc379f39ccbed35cbf967957bc9d061ce4b76 80920 
node-fast-json-patch_3.1.1+ds.orig.tar.xz
 c37f15fa75458cedfe0ab7a297895bfa7f2a6691 3372 
node-fast-json-patch_3.1.1+ds-1.debian.tar.xz
 2963abbd2a05ed3ad5b16d8f010f142fabda08eb 24880 
node-fast-json-patch_3.1.1+ds-1_all.deb
 0b042cc2111701ebf91d9f0e921a35a5816258b3 18158 
node-fast-json-patch_3.1.1+ds-1_amd64.buildinfo
Checksums-Sha256:
 a90250d4aaffcac6973c56d7de6d9ff142814a64306c7123e5537341c756f7bb 2206 
node-fast-json-patch_3.1.1+ds-1.dsc
 5ea96f7a329556bfe0e2f141a8fb06f68601f0c3f9239a953bab288a1fae2f1d 80920 
node-fast-json-patch_3.1.1+ds.orig.tar.xz
 a9315d15c99cd89a70c6ecf24b100f07617f8740d9e489dafbf0d4c931388465 3372 
node-fast-json-patch_3.1.1+ds-1.debian.tar.xz
 100b42f7904719e3f385431d5d91af7c4a3f86a13f80acab815d7bea05df9154 24880 
node-fast-json-patch_3.1.1+ds-1_all.deb
 f3defa1cf1cb1f629b13f92474461dbc1cf5f50ccb2e8de91ebdefec4615848b 18158 
node-fast-json-patch_3.1.1+ds-1_amd64.buildinfo
Files:
 6b6e5020bf228a0ea53aa0fa61a60183 2206 javascript optional 
node-fast-json-patch_3.1.1+ds-1.dsc
 2653d88ef2a381488b1c1fac7e58ea7f 80920 javascript optional 
node-fast-json-patch_3.1.1+ds.orig.tar.xz
 9980c6e6f0488656e9555a510e2ff2ef 3372 javascript optional 
node-fast-json-patch_3.1.1+ds-1.debian.tar.xz
 4021345a48172d1d48fd338823335f6e 24880 javascript optional 
node-fast-json-patch_3.1.1+ds-1_all.deb
 4032ee4c78b8c4dbd7eb87fe638f15e0 18158 javascript optional 
node-fast-json-patch_3.1.1+ds-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEAN/li4tVV3nRAF7J9tdMp8mZ7ukFAmT9PuMACgkQ9tdMp8mZ
7ukCNA//Uj3fxsVRvYk3LHFcA1A4d8u3YN2wCpv6s2z3jsgOQ0d0e1BxHcnHvSSI
seFUoxa8Kr2on0YXaRNI+dvsX3Q3a+5LnCiuEXMhb0cGz+aVn3wk/JPqJUyNqnAY
zcp9o48OCPjpaJttjOLWtS2HsOrRlo4kOH9Q2DZOl772t5vQuH2yCNToWa1YeCXL
5bjjCWjSBuHQbVUV7Zym92BofrPkRWp4SmxFrMY8UcAXUQQKcOf2IhOv2lW/qoGd
ZmibpisKP8E79UV2N2nZODx1urbP6BYv5xMOwNDwQ8jtnvqiRYmwJ79P/W/OqO9s
ZsA/

Bug#1051275: marked as done (ITP: python-pyasn1-lextudio -- ASN.1 types and codecs)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:46 +
with message-id 
and subject line Bug#1051275: fixed in python-pyasn1-lextudio 1.1.2-1
has caused the Debian Bug report #1051275,
regarding ITP: python-pyasn1-lextudio -- ASN.1 types and codecs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051275: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051275
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: python-pyasn1-lextudio
  Version : 1.1.2
  Upstream Contact: 2005-2019, Ilya Etingof 
* URL : https://github.com/lextudio/pyasn1
* License : BSD-2-clause
  Programming Lang: Python
  Description : ASN.1 types and codecs

 This package provides an implementation of ASN.1 types and codecs. It has been
 first written to support particular protocol (SNMP) but then generalized to be
 suitable for a wide range of protocols based on the ASN.1 specification.
--- End Message ---
--- Begin Message ---
Source: python-pyasn1-lextudio
Source-Version: 1.1.2-1
Done: Thomas Goirand 

We believe that the bug you reported is fixed in the latest version of
python-pyasn1-lextudio, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated python-pyasn1-lextudio 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 05 Sep 2023 16:35:53 +0200
Source: python-pyasn1-lextudio
Binary: python-pyasn1-lextudio-doc python3-pysnmp-pyasn1
Architecture: source all
Version: 1.1.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack 
Changed-By: Thomas Goirand 
Description:
 python-pyasn1-lextudio-doc - ASN.1 types and codecs - doc
 python3-pysnmp-pyasn1 - ASN.1 types and codecs - Python 3.x
Closes: 1051275
Changes:
 python-pyasn1-lextudio (1.1.2-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1051275)
Checksums-Sha1:
 7db5dab0338afaf9c0e497ea727bdd0113b556c0 2274 
python-pyasn1-lextudio_1.1.2-1.dsc
 531f5cd213bb136474ac3ffcea4915fc7a5276a6 123520 
python-pyasn1-lextudio_1.1.2.orig.tar.xz
 07883ce68643e5aabc6277bce1516b33fecc34d7 2412 
python-pyasn1-lextudio_1.1.2-1.debian.tar.xz
 050976495ded12fa789a26ebc25519c0a9e487fb 135900 
python-pyasn1-lextudio-doc_1.1.2-1_all.deb
 82f8b67efc9d3abfb3a1df24d5ac214bffd458f1 8476 
python-pyasn1-lextudio_1.1.2-1_amd64.buildinfo
 675d161ebea9c4ee151aac6f97fffd4d374566e6 62044 
python3-pysnmp-pyasn1_1.1.2-1_all.deb
Checksums-Sha256:
 54f0dfb857ce4f9d7dfe44584e64a55524284024109fc92042d31325d9b8fb3f 2274 
python-pyasn1-lextudio_1.1.2-1.dsc
 aa7f3d7c4b9a8b75cae4a4ab5537b08c363a607394d706de6e117845ae650628 123520 
python-pyasn1-lextudio_1.1.2.orig.tar.xz
 7a78f2dff62a3061f49fea27ddb2d2daaf53b633298f5da054ecf09864019692 2412 
python-pyasn1-lextudio_1.1.2-1.debian.tar.xz
 c7097a46ad1dbfb037da10879a63ee65da818a1464cbe508807756f2c29a7ca4 135900 
python-pyasn1-lextudio-doc_1.1.2-1_all.deb
 bfe28f0f8c3b92415e486176096de78024a2123a3f6d5e1757ff8f8617f2cfa1 8476 
python-pyasn1-lextudio_1.1.2-1_amd64.buildinfo
 fbb83baf350d22d1c8a12a91b68a38461b0ce4bae4b9cc2e13913ea3ce60e9b2 62044 
python3-pysnmp-pyasn1_1.1.2-1_all.deb
Files:
 a40c2da8053ababb44721a82d4e87d95 2274 python optional 
python-pyasn1-lextudio_1.1.2-1.dsc
 d196a8b15b5c6655d86b53ceee5766d4 123520 python optional 
python-pyasn1-lextudio_1.1.2.orig.tar.xz
 e4789f1b4a04c226e5f46f34cfcbd718 2412 python optional 
python-pyasn1-lextudio_1.1.2-1.debian.tar.xz
 5375daea8053d21aefae06ffc9236703 135900 doc optional 
python-pyasn1-lextudio-doc_1.1.2-1_all.deb
 4d0dc64e572d6b7d514c3c4a94a32d26 8476 python optional 
python-pyasn1-lextudio_1.1.2-1_amd64.buildinfo
 c6744f801bcc33dfdadf149a96ad07e7 62044 python optional 
python3-pysnmp-pyasn1_1.1.2-1_all.deb

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEoLGp81CJVhMOekJc1BatFaxrQ/4FAmT+3bAACgkQ1BatFaxr
Q/4iaA//YSraQQNEFy5aSy30D9uIbzwBruq/0qpfGcdzPywiB9hV5R8tg/LKGY6g
JhTU0r0SwZMVlCwuDNs4Bo18TjpQ258F5FQHAz0clCxhup12wDSyGiOfAMg2rI2A
m3dsJ5w+khqKMOBRR1UW

Bug#1051262: marked as done (ITP: python-pysnmp-lextudio -- SNMP library v.1/v.2c/v.3 for agents and managers)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:47 +
with message-id 
and subject line Bug#1051262: fixed in python-pysnmp-lextudio 5.0.26-1
has caused the Debian Bug report #1051262,
regarding ITP: python-pysnmp-lextudio -- SNMP library v.1/v.2c/v.3 for agents 
and managers
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051262: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051262
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Thomas Goirand 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: python-pysnmp-lextudio
  Version : 5.0.26
  Upstream Contact: LeXtudio Inc.
* URL : https://github.com/lextudio/pysnmp
* License : BSD-2-clause
  Programming Lang: Python
  Description : SNMP library v.1/v.2c/v.3 for agents and managers

 This is a Python implementation of SNMP v.1/v.2c/v.3 engine. Its general
 functionality is to assemble/disassemble SNMP messages from/into given SNMP
 Object IDs along with associated values. PySNMP also provides a few transport
 methods specific to TCP/IP networking.
 .
 PySNMP is written entirely in Python and is self-sufficient in terms that it
 does not rely on any third party tool (it isn't a wrapper).
 .
 This version is a fork of Ilya Etingof's project etingof/pysnmp. Ilya sadly
 passed away on 10-Aug-2022.
--- End Message ---
--- Begin Message ---
Source: python-pysnmp-lextudio
Source-Version: 5.0.26-1
Done: Thomas Goirand 

We believe that the bug you reported is fixed in the latest version of
python-pysnmp-lextudio, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated python-pysnmp-lextudio 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 05 Sep 2023 14:34:15 +0200
Source: python-pysnmp-lextudio
Binary: python-pysnmp-lextudio-doc python3-pysnmp-lextudio
Architecture: source all
Version: 5.0.26-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack 
Changed-By: Thomas Goirand 
Description:
 python-pysnmp-lextudio-doc - SNMP library v.1/v.2c/v.3 for agents and managers 
- doc
 python3-pysnmp-lextudio - SNMP library v.1/v.2c/v.3 for agents and managers
Closes: 1051262
Changes:
 python-pysnmp-lextudio (5.0.26-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1051262)
Checksums-Sha1:
 97370212b8569de35686da01e4e342be505557ad 2404 
python-pysnmp-lextudio_5.0.26-1.dsc
 39eadc53409b2cc55eae5e85e5f09672158a576c 355684 
python-pysnmp-lextudio_5.0.26.orig.tar.xz
 a85c2c13b2cc78f2e264f7421d3745529686096b 3320 
python-pysnmp-lextudio_5.0.26-1.debian.tar.xz
 61cf891d07e1fa7d5a72bbc1aeb945d9ce44af36 268376 
python-pysnmp-lextudio-doc_5.0.26-1_all.deb
 a65e094d32dc7379866920a557098f64e63956c8 8823 
python-pysnmp-lextudio_5.0.26-1_amd64.buildinfo
 a4d7bbe40788006252c7d696dfb57a01b1423aa6 179132 
python3-pysnmp-lextudio_5.0.26-1_all.deb
Checksums-Sha256:
 3f8069a3ec95a480d81c00716c872512be26a23fe2393c7a8bef31566a2bc4ad 2404 
python-pysnmp-lextudio_5.0.26-1.dsc
 c7e4456733dc8432b41274d6f088d1dacffd5eeafe80776574b9f2c7f0c1e661 355684 
python-pysnmp-lextudio_5.0.26.orig.tar.xz
 298e28e71809063ebdaffe837c68656b1b2fe6361be92814a55419457d53 3320 
python-pysnmp-lextudio_5.0.26-1.debian.tar.xz
 f3af4260d1bd9f124da26688722c005e5ea21407b6898bab2f663416329caaca 268376 
python-pysnmp-lextudio-doc_5.0.26-1_all.deb
 bec1c1f7c24534e49d0947150e423a8633ddc11a6342e6a06f75b3b83dbaf274 8823 
python-pysnmp-lextudio_5.0.26-1_amd64.buildinfo
 5bcf3c3ecc2e20773323fa96d944c0b5968d2bc61dc3de21b51659bef5678be4 179132 
python3-pysnmp-lextudio_5.0.26-1_all.deb
Files:
 4156eaaebce84184b06df3b358a30929 2404 python optional 
python-pysnmp-lextudio_5.0.26-1.dsc
 38d0f4a5dc8f70e6e40db56a9ea1ea64 355684 python optional 
python-pysnmp-lextudio_5.0.26.orig.tar.xz
 7bc0fc206014c959a8efcfdab60bb6a6 3320 python optional 
python-pysnmp-lextudio_5.0.26-1.debian.tar.xz
 ba5af872e486bbd75a7813bc9f2c873a 268376 doc optional 
python-pysnmp-lextudio-doc_5.0.26-1_all.deb
 5ae5738e76ed5cf194b2b8c0d9b0dfcd 8823 py

Bug#1033272: marked as done (ITP: libre-graph-api-cpp-qt-client -- C++/Qt Libre Graph API client)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:02:42 +
with message-id 
and subject line Bug#1033272: fixed in libre-graph-api-cpp-qt-client 1.0.1-1
has caused the Debian Bug report #1033272,
regarding ITP: libre-graph-api-cpp-qt-client -- C++/Qt Libre Graph API client
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033272: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033272
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Pierre-Elliott Bécue 
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: libre-graph-api-cpp-qt-client
  Version : 1.0.1
  Upstream Author : Michael Barz 
* URL : https://github.com/owncloud/libre-graph-api-cpp-qt-client
* License : Apache-2.0
  Programming Lang: C++
  Description : C++/Qt client implementation of Libre Graph API

The Libre Graph API is an API for open Cloud Collaboration. It provides
an open source standard for open Cloud Collaboration. See the Libre
Graph Home for more details.

This package is a new dependency on owncloud-client, and will be
maintained in the Next-Owncloud Team.
--- End Message ---
--- Begin Message ---
Source: libre-graph-api-cpp-qt-client
Source-Version: 1.0.1-1
Done: Pierre-Elliott Bécue 

We believe that the bug you reported is fixed in the latest version of
libre-graph-api-cpp-qt-client, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre-Elliott Bécue  (supplier of updated 
libre-graph-api-cpp-qt-client package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 13:24:35 +0200
Source: libre-graph-api-cpp-qt-client
Binary: libre-graph-api-cpp-qt-client
Architecture: source amd64
Version: 1.0.1-1
Distribution: unstable
Urgency: medium
Maintainer: ownCloud for Debian maintainers 

Changed-By: Pierre-Elliott Bécue 
Description:
 libre-graph-api-cpp-qt-client - C++/Qt client implementation of Libre Graph API
Closes: 1033272
Changes:
 libre-graph-api-cpp-qt-client (1.0.1-1) unstable; urgency=medium
 .
   * Initial package (Closes: #1033272)
Checksums-Sha1:
 f6c43dafcbc71c56abc79124f58b44d525bac51f 2202 
libre-graph-api-cpp-qt-client_1.0.1-1.dsc
 52d70c58ad5d1bff9942ea1b5efdcdaa1949d435 105266 
libre-graph-api-cpp-qt-client_1.0.1.orig.tar.gz
 62ed918ae2aa509d3ae856f0d996282f597ff351 1812 
libre-graph-api-cpp-qt-client_1.0.1-1.debian.tar.xz
 824dd9eea20adabd45605451533b8ae04936d686 10598 
libre-graph-api-cpp-qt-client_1.0.1-1_amd64.buildinfo
 f32599be92a16c2529a410ace4500bd6e653cf4c 387824 
libre-graph-api-cpp-qt-client_1.0.1-1_amd64.deb
Checksums-Sha256:
 3ad5aa64ae367490c68812f1ade6c56581723a531bcaf55aae29525e8d42f5c5 2202 
libre-graph-api-cpp-qt-client_1.0.1-1.dsc
 b1b3a3d48c973b0cf5327432fedf3b7c5ff3305f31abbad862b3d8c8da0766f1 105266 
libre-graph-api-cpp-qt-client_1.0.1.orig.tar.gz
 85ebb8994c06e4675a5802339cce1017686cf59fe3c1f247bf22645f60e5ba76 1812 
libre-graph-api-cpp-qt-client_1.0.1-1.debian.tar.xz
 3ba855d1df80591f85d06fe77b4e844fc1f0107f88cf470801941af2adfc9b18 10598 
libre-graph-api-cpp-qt-client_1.0.1-1_amd64.buildinfo
 7ed403c84cba814f12fd7964edc535ed79b1f28619d8002da3363b8f7a380cc2 387824 
libre-graph-api-cpp-qt-client_1.0.1-1_amd64.deb
Files:
 85e740a8d9e8d7971fea8fff0663753c 2202 net optional 
libre-graph-api-cpp-qt-client_1.0.1-1.dsc
 c34529b23c863265cd7cf95732d3202e 105266 net optional 
libre-graph-api-cpp-qt-client_1.0.1.orig.tar.gz
 211b8721485e3279ca05fd2a8aa5fc09 1812 net optional 
libre-graph-api-cpp-qt-client_1.0.1-1.debian.tar.xz
 aef839b67ab43571a52c8a0dc0a5e2d6 10598 net optional 
libre-graph-api-cpp-qt-client_1.0.1-1_amd64.buildinfo
 dfd4ad00227b4a769b8838f9a7523f95 387824 net optional 
libre-graph-api-cpp-qt-client_1.0.1-1_amd64.deb

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEE5CQeth7uIW7ehIz87iFbn7jEWwsFAmUBnakACgkQ7iFbn7jE
Wwu8KxAAsoKqIFY4qoN6JvcLugnGiqNP88Lt8fNdQUG0dOBRmuz8qaQUujOmNXY+
J+uMkf5oYofcIaUw/99B2hoAHnQKKyD3gsa1TY4VdnrVfrobUVeVKnNRHmH2+OKN
d1MhslCxl2Kmr4I9C8Zo722KsgX4lE7hCxVE/hZatEL4C93re4eE/iyhK3swhMEv
e+7qXIS54SitiBrtr7XbyAfeF2Z7/jnaz4AcUUvW

Bug#1051747: marked as done (p11tool should use libssl3)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 18:39:31 +0200
with message-id 
and subject line Re: Bug#1051747: p11tool should use libssl3
has caused the Debian Bug report #1051747,
regarding p11tool should use libssl3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051747: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051747
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gnutls-bin
Version: 3.8.1-4+b1
Severity: normal
X-Debbugs-Cc: phil...@marek.priv.at

After removing libssl1.1:amd64=1.1.1o-1 I can't run p11tool any more:

# LD_DEBUG=libs p11tool
   1708431: find library=libcrypto.so.1.0.1 [0]; searching
   ...
   1708431: find library=libcrypto.so.1.0.0 [0]; searching
   ...
   1708431: find library=libcrypto.so.1.0 [0]; searching
   ...
   1708431: find library=libcrypto.so.10 [0]; searching
   ...
   1708431: find library=libcrypto.so.1.1 [0]; searching
   1708431:  search path=/usr/lib   (system search path)
   1708431:   trying file=/usr/lib/libcrypto.so.1.1
   1708431:  search cache=/etc/ld.so.cache
   1708431:  search 
path=/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/lib:/usr/lib  
(system search path)
   1708431:   trying file=/lib/x86_64-linux-gnu/libcrypto.so.1.1
   1708431:   trying file=/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
   1708431:   trying file=/lib/libcrypto.so.1.1
   1708431:   trying file=/usr/lib/libcrypto.so.1.1
   1708431:
p11tool: CRYPTO/Crypto.c:355: init_openssl_crypto: Assertion `lib' failed.

https://packages.debian.org/search?searchon=contents&keywords=libcrypto.so 
says that libssl-dev contains a libcrypto.so;
I've got libssl-dev:amd64 3.0.10-1 installed,
but p11tool only looks for 1.x, and 3.x is incompatible AFAIR.

(Re)installing 
http://snapshot.debian.org/archive/debian/20230910T024957Z/pool/main/o/openssl/libssl1.1_1.1.1v-0~deb11u1_amd64.deb
makes it work again.


-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.4.0-1-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_AT:de
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gnutls-bin depends on:
ii  libc62.37-7
ii  libgnutls-dane0  3.8.1-4+b1
ii  libgnutls30  3.8.1-4+b1
ii  libtasn1-6   4.19.0-3

gnutls-bin recommends no packages.

gnutls-bin suggests no packages.

-- no debconf information

-- debsums errors found:
debsums: can't check gnutls-bin file 
/usr/share/doc/gnutls-bin/changelog.Debian.amd64.gz (Wide character in 
subroutine entry)
debsums: can't check gnutls-bin file 
/usr/share/doc/gnutls-bin/changelog.Debian.gz (Wide character in subroutine 
entry)
debsums: can't check gnutls-bin file /usr/share/doc/gnutls-bin/changelog.gz 
(Wide character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/certtool.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/danetool.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/gnutls-cli-debug.1.gz 
(Wide character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/gnutls-cli.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/gnutls-serv.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/ocsptool.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/p11tool.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/psktool.1.gz (Wide 
character in subroutine entry)
debsums: can't check gnutls-bin file /usr/share/man/man1/tpmtool.1.gz (Wide 
character in subroutine entry)
--- End Message ---
--- Begin Message ---
On 2023-09-13 Philipp Marek via Pkg-gnutls-maint 
 wrote:
> > I suspect the culprit might be one of pkcs11 modules you are using, not
> > p11-toool itself.

> Yeah, you're right -- thanks!

> eToken's PKCS11 still uses 1.1, even in a current version.

Thanks for the quick reply, I am closing the bugreport.

cu Andreas

-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so

Bug#1051544: marked as done (ding: looking up words is very slow)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 16:19:19 +
with message-id 
and subject line Bug#1051544: fixed in ding 1.9-7
has caused the Debian Bug report #1051544,
regarding ding: looking up words is very slow
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051544: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051544
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ding
Version: 1.9-6
Severity: important

Dear Maintainer,

When starting ding and searching for a word, it takes several seconds to
show the results.

For example when searching for "lupe", the status bar shows
> 8 results, 1979ms
and this is on an Intel i7-6500U with SSD and no load.

The command used is
> tre-agrep -h -w -i -e "lupe" /usr/share/trans/de-en

My settings are "0 errors" and "simple search".

tre-agrep is specifically built to find wrongly written words,
but since "0 errors" is selected, normal grep should be used.
This returns in 127ms instead of 2 seconds.

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.0-4-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ding depends on:
ii  tk  8.6.13

Versions of packages ding recommends:
ii  trans-de-en [translation-dictionary]  1.9-6
ii  tre-agrep 0.8.0-7

Versions of packages ding suggests:
pn  dict
pn  hunspell
ii  hunspell-de-de  20161207-11
ii  hunspell-en-us  1:2020.12.07-2

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: ding
Source-Version: 1.9-7
Done: Roland Rosenfeld 

We believe that the bug you reported is fixed in the latest version of
ding, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roland Rosenfeld  (supplier of updated ding package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 13 Sep 2023 17:42:51 +0200
Source: ding
Architecture: source
Version: 1.9-7
Distribution: unstable
Urgency: medium
Maintainer: Roland Rosenfeld 
Changed-By: Roland Rosenfeld 
Closes: 1051544
Changes:
 ding (1.9-7) unstable; urgency=medium
 .
   * 21_de-en-devel: Update to devel version (2023-04-13) of de-en dict.
   * Recommends agrep | glimpse now instead of the slower tre-agrep
 (Closes: #1051544).
Checksums-Sha1:
 1ef314cd452f2e5af317619dfa37869fd04fab4d 2077 ding_1.9-7.dsc
 3d82a7034f616128ec207f9b3202f88da80a018f 5021692 ding_1.9-7.debian.tar.xz
 26e17e5cef22e8b4bbb30d545144a4ea733fcbcb 7521 ding_1.9-7_source.buildinfo
Checksums-Sha256:
 f2ff938f5d835ff44c5eb620fd9732f624becc4f29757123b6ea3de76b89a4ef 2077 
ding_1.9-7.dsc
 b421618681008284027292400122d75c64bb2a85bdfe24608bd536422c64e6d5 5021692 
ding_1.9-7.debian.tar.xz
 283b8605e3c5026391539acbb104aa7324db56bceb0ad81fdd0bc45f4cbae577 7521 
ding_1.9-7_source.buildinfo
Files:
 e31014b8b75aa0627fffb013b2c565e9 2077 text optional ding_1.9-7.dsc
 1a952098cea7ff19b9b3b825df1969d6 5021692 text optional ding_1.9-7.debian.tar.xz
 274d46d1e37f7d1307a422a99cd60d2c 7521 text optional ding_1.9-7_source.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#1029614: marked as done (blueprint-compiler: crashes when run on s390x)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 16:04:04 +
with message-id 
and subject line Bug#1029614: fixed in blueprint-compiler 0.10.0-2
has caused the Debian Bug report #1029614,
regarding blueprint-compiler: crashes when run on s390x
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1029614: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029614
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: blueprint-compiler
Version: 0.6.0-1
Severity: serious
Tags: ftbfs bookworm sid upstream
Forwarded: https://gitlab.gnome.org/jwestman/blueprint-compiler/-/issues/96
Affects: src: gnome-shell-extension-manager, src:dialect

Things that use blueprint-compiler are failing to build on s390x. This
is preventing important fixes from reaching Testing/Bookworm.

Thank you,
Jeremy Bicha
--- End Message ---
--- Begin Message ---
Source: blueprint-compiler
Source-Version: 0.10.0-2
Done: Jeremy Bícha 

We believe that the bug you reported is fixed in the latest version of
blueprint-compiler, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1029...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jeremy Bícha  (supplier of updated blueprint-compiler 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 11:34:29 -0400
Source: blueprint-compiler
Built-For-Profiles: noudeb
Architecture: source
Version: 0.10.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME Maintainers 

Changed-By: Jeremy Bícha 
Closes: 1029614
Launchpad-Bugs-Fixed: 2003893
Changes:
 blueprint-compiler (0.10.0-2) unstable; urgency=medium
 .
   * Cherry-pick patch to fix using blueprint-compiler on big-endian
 (Closes: #1029614) (LP: #2003893)
Checksums-Sha1:
 c5ced78b473a4838a2b4bdb8d9e1ca3882d36ca3 2270 blueprint-compiler_0.10.0-2.dsc
 398a3dc61e74982a89d7fe2e234ba97b3d849327 3928 
blueprint-compiler_0.10.0-2.debian.tar.xz
 f2769d57c8bc2315dc7c3d1fe26a6c159b08a890 18245 
blueprint-compiler_0.10.0-2_source.buildinfo
Checksums-Sha256:
 af11fcff77cb941dde183ad70eb2bcd92279f8f0f6f24a8dc35721c046e1ba60 2270 
blueprint-compiler_0.10.0-2.dsc
 3314cd4a71f19407de2ad3e65e6227e2012387170f0cb1bc680dbf53e4a841b6 3928 
blueprint-compiler_0.10.0-2.debian.tar.xz
 d4a0e6745c2eb4813cdf1dae99144cf4517aacc23379b1e2ed5e66d20cfca20d 18245 
blueprint-compiler_0.10.0-2_source.buildinfo
Files:
 211a5d12a5e5fbff2ccfb4c4074ec931 2270 gnome optional 
blueprint-compiler_0.10.0-2.dsc
 2eb602dcc075e86bb821d12f28f60484 3928 gnome optional 
blueprint-compiler_0.10.0-2.debian.tar.xz
 b28c8a4fd7b40d395643c3080c9e7788 18245 gnome optional 
blueprint-compiler_0.10.0-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=ZVUS
-END PGP SIGNATURE End Message ---


Bug#1032263: marked as done (colord: diff for NMU version 1.4.6-2.2)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 16:04:17 +
with message-id 
and subject line Bug#1032263: fixed in colord 1.4.6-3
has caused the Debian Bug report #1032263,
regarding colord: diff for NMU version 1.4.6-2.2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032263: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032263
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: colord
Version: 1.4.6-2.1
Severity: normal
Tags: patch pending

I've prepared an NMU for colord (versioned as 1.4.6-2.2), to:

* stop pulling in the transitional policykit-1 package to GNOME, KDE Plasma
  and Xfce desktop environments
* fix autopkgtest failures since policykit-1 121
* work around a transient FTBFS caused by #1032183 in libgusb
* incorporate Debian Janitor changes

Please let me know if any of that needs reverting. As a result of the
release timeline I've uploaded this without a delay.

I already pushed these changes to the git repository on Salsa.

I had also intended to include https://github.com/hughsie/colord/pull/146
in this, but it seems that commit is not necessary with Debian's lcms,
which already contains a workaround. lcms and colord were involved in
GNOME Shell crashes, but the ones reproducible in Debian turned out to
be a mutter bug (#1031847) so I fixed it there instead.

Thanks,
smcv
diffstat for colord-1.4.6 colord-1.4.6

 changelog |   26 +
 colord.maintscript|3 
 colord.preinst|7 -
 control   |5 -
 copyright |  142 ++
 tests/installed-tests |2 
 tests/overrides/99-allow-all-colord.pkla  |4 
 tests/overrides/99-allow-all-colord.rules |9 +
 8 files changed, 51 insertions(+), 147 deletions(-)

diff -Nru colord-1.4.6/debian/changelog colord-1.4.6/debian/changelog
--- colord-1.4.6/debian/changelog	2022-12-03 06:26:35.0 +
+++ colord-1.4.6/debian/changelog	2023-03-02 10:45:31.0 +
@@ -1,3 +1,29 @@
+colord (1.4.6-2.2) unstable; urgency=medium
+
+  * Non-maintainer upload
+
+  [ Debian Janitor ]
+  * d/copyright: Refer to common license file for CC0-1.0
+  * d/control: Use secure URI in Homepage field
+  * d/colord.maintscript: Remove obsolete maintscript entries
+  * d/colord.preinst: Remove empty maintainer script
+
+  [ Simon McVittie ]
+  * d/control: Depend on polkitd | policykit-1, not just policykit-1.
+This allows colord to be installed without pulling in the transitional
+package policykit-1, which in turn is enough to avoid policykit-1 being
+included in new bookworm installations of GNOME, KDE Plasma and Xfce.
+(Closes: #1025554, #1025379)
+  * d/tests/installed-tests: Fix autopkgtest failure if polkitd-pkla is
+not installed.
+Installing policykit-1 is no longer guaranteed to provide support for
+the legacy .pkla rules language.
+  * d/control: Build-depend on libjson-glib-dev.
+This works around a missing dependency by libgusb-dev (see #1032183)
+and can be reverted when that bug is fixed.
+
+ -- Simon McVittie   Thu, 02 Mar 2023 10:45:31 +
+
 colord (1.4.6-2.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru colord-1.4.6/debian/colord.maintscript colord-1.4.6/debian/colord.maintscript
--- colord-1.4.6/debian/colord.maintscript	2022-12-03 06:26:35.0 +
+++ colord-1.4.6/debian/colord.maintscript	2023-03-02 10:45:31.0 +
@@ -1,4 +1 @@
-rm_conffile /etc/bash_completion.d/colormgr-completion.bash 1.0.3-1~
-rm_conffile /etc/colord.conf 1.2.12-1~ colord
 rm_conffile /etc/dbus-1/system.d/org.freedesktop.ColorManager.conf 1.4.3-4~
-rm_conffile /etc/dbus-1/system.d/org.freedesktop.colord-sane.conf 1.0.3-1~
diff -Nru colord-1.4.6/debian/colord.preinst colord-1.4.6/debian/colord.preinst
--- colord-1.4.6/debian/colord.preinst	2022-12-03 06:26:35.0 +
+++ colord-1.4.6/debian/colord.preinst	1970-01-01 01:00:00.0 +0100
@@ -1,7 +0,0 @@
-#! /bin/sh
-
-set -e
-
-#DEBHELPER#
-
-exit 0
diff -Nru colord-1.4.6/debian/control colord-1.4.6/debian/control
--- colord-1.4.6/debian/control	2022-12-03 06:26:35.0 +
+++ colord-1.4.6/debian/control	2023-03-02 10:45:31.0 +
@@ -12,6 +12,7 @@
  libglib2.0-dev (>= 2.58),
  libgudev-1.0-dev,
  libgusb-dev (>= 0.2.7),
+ libjson-glib-dev,
  liblcms2-dev,
  libpolkit-gobject-1-dev (>= 0.103),
  libsane-dev [linux-any],
@@ -29,7 +30,7 @@
 Rules-Requires-Root: no
 Standards-Version: 4.6.1
 Secti

Bug#1040682: marked as done (FTBFS in colord with meson 1.2.0 rc2)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 16:04:17 +
with message-id 
and subject line Bug#1040682: fixed in colord 1.4.6-3
has caused the Debian Bug report #1040682,
regarding FTBFS in colord with meson 1.2.0 rc2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1040682: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040682
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: colord
Version: 1.4.6-2.2
Severity: serious
Tags: ftbfs

colord successfully passes dh_auto_configure, but fails to build
immediately after:

```
dh override_dh_auto_configure-arch
make[1]: Leaving directory '/<>'
   debian/rules override_dh_auto_configure-indep
make[1]: Entering directory '/<>'
meson configure  -Dsession_example=false -Ddaemon_user=colord
-Dvapi=true -Ddocs=false -Dinstalled_tests=true -Dargyllcms_sensor=true
 -Dsane=true -Dprint_profiles=true

ERROR: No valid build directory found, cannot modify options.
make[1]: *** [debian/rules:38: override_dh_auto_configure-indep] Error 1
```

The cause of this is that setup options are passed to meson's "print the
values of all options" subcommand.

Previous versions of meson would print the following warning:

The source directory instead of the build directory was specified.
Only the default values for the project are printed, and all command
line parameters are ignored.


The release candidate makes this an error instead. If you want to print
the values of available options, simply avoid passing arguments; this
works both in a source directory and a build directory.

-- 
Eli Schwartz
--- End Message ---
--- Begin Message ---
Source: colord
Source-Version: 1.4.6-3
Done: Jeremy Bícha 

We believe that the bug you reported is fixed in the latest version of
colord, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1040...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jeremy Bícha  (supplier of updated colord package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 11:07:00 -0400
Source: colord
Built-For-Profiles: noudeb
Architecture: source
Version: 1.4.6-3
Distribution: unstable
Urgency: medium
Maintainer: Christopher James Halse Rogers 
Changed-By: Jeremy Bícha 
Closes: 1032263 1040682
Changes:
 colord (1.4.6-3) unstable; urgency=medium
 .
   * Team upload (Closes: #1032263)
   * Simplify handling of arch:all/arch:any builds (Closes: #1040682)
Checksums-Sha1:
 263ac8ef773f3d3958d787f3de86e9b3e1870b40 3303 colord_1.4.6-3.dsc
 b5e6d2e0942ea685df32734638658e8df435ac20 28776 colord_1.4.6-3.debian.tar.xz
 58388605b8c3bbf0aa5eec71c4efe484a1ce5a20 13271 colord_1.4.6-3_source.buildinfo
Checksums-Sha256:
 a1799305f3e24b64b158fd8bff580bec102b7e28d06b2abcbb91f42f03f9a548 3303 
colord_1.4.6-3.dsc
 033f1384fe6ce8738eb2d975238763b5671cd45fecc251be36e7825db3209b2c 28776 
colord_1.4.6-3.debian.tar.xz
 42741479cc02e0b4bbf053b32ed53d34f8b070923ab00cbfa10a45a88d6d8090 13271 
colord_1.4.6-3_source.buildinfo
Files:
 c76c1f78b0ba95195322d39f311f0adf 3303 graphics optional colord_1.4.6-3.dsc
 9f3822fec2baad6c01c78c14951b2eba 28776 graphics optional 
colord_1.4.6-3.debian.tar.xz
 4d79bb6f3b8db0f87cc5bafe8031d1cb 13271 graphics optional 
colord_1.4.6-3_source.buildinfo

-BEGIN PGP SIGNATURE-
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=h8MH
-END PGP SIGNATURE End Message ---


Bug#1045470: marked as done (localslackirc: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 15:37:00 +
with message-id 
and subject line Bug#1045470: fixed in localslackirc 1.18-1
has caused the Debian Bug report #1045470,
regarding localslackirc: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1045470: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1045470
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: localslackirc
Version: 1.17-1.1
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> 
> 
> dpkg-buildpackage: info: source package localslackirc
> dpkg-buildpackage: info: source version 1.17-1.1
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Michael Biebl 
>  dpkg-source --before-build .
>  debian/rules clean
> dh clean --with python3
>dh_auto_clean
>   make -j8 clean
> make[1]: Entering directory '/<>'
> rm -f -r deb-pkg
> rm -f -r tests/__pycache__
> rm -f -r __pycache__
> make[1]: Leaving directory '/<>'
>dh_clean
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: verifying ./localslackirc_1.17.orig.tar.gz.asc
> dpkg-source: info: building localslackirc using existing 
> ./localslackirc_1.17.orig.tar.gz
> dpkg-source: info: building localslackirc using existing 
> ./localslackirc_1.17.orig.tar.gz.asc
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/@plugins_snapshot.json has no final 
> newline (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/__future__.data.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/__future__.meta.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file localslackirc-1.17/.mypy_cache/3.10/_ast.data.json 
> has no final newline (either original or modified version)
> dpkg-source: warning: file localslackirc-1.17/.mypy_cache/3.10/_ast.meta.json 
> has no final newline (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_codecs.data.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_codecs.meta.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_collections_abc.data.json has no final 
> newline (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_collections_abc.meta.json has no final 
> newline (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_compression.data.json has no final 
> newline (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_compression.meta.json has no final 
> newline (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_ctypes.data.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_ctypes.meta.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_decimal.data.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_decimal.meta.json has no final newline 
> (either original or modified version)
> dpkg-source: warning: file 
> localslackirc-1.17/.mypy_cache/3.10/_random.dat

Bug#1050942: marked as done (FTBFS: Failed 1/1 test programs. 5/246 subtests failed.)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 15:04:37 +
with message-id 
and subject line Bug#1050942: fixed in blhc 0.13+git20230913.fb2c46d-1
has caused the Debian Bug report #1050942,
regarding FTBFS: Failed 1/1 test programs. 5/246 subtests failed.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050942: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050942
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: blhc
Version: 0.13-5
Severity: serious
Tags: ftbfs upstream
Justification: fails to build from source
X-Debbugs-Cc: eribe...@debian.org, Simon Ruderich 

Dear Simon Ruderich,

Currently blhc fails to build from source in Debian Sid. This issue was
detected in Salsa[1].

[1] https://salsa.debian.org/debian/blhc/-/jobs/4635438

I also tested it in a fresh jail:

dh_auto_test
/usr/bin/perl Build test --verbose 1

#   Failed test './t/logs/arch-avr32 --color (output)'
#   at t/tests.t line 45.
#  got: 'Use of uninitialized value $os in pattern match (m//) at 
./bin/blhc line 1194.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1198.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1202.
# LDFLAGS missing (-Wl,-z,relro): gcc -o test test.o
# CFLAGS missing (-fstack-protector-strong): gcc -D_FORTIFY_SOURCE=2 -g -O2 
-Wformat -Wformat-security -Werror=format-security -Wall -c test.c
# LDFLAGS missing (-Wl,-z,relro): gcc -o test test.o
# '
# expected: 'CFLAGS missing (-fstack-protector-strong): gcc 
-D_FORTIFY_SOURCE=2 -g -O2 -Wformat -Wformat-security -Werror=format-security 
-Wall -c test.c
# '

#   Failed test './t/logs/arch-avr32 (output)'
#   at t/tests.t line 45.
#  got: 'Use of uninitialized value $os in pattern match (m//) at 
./bin/blhc line 1194.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1198.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1202.

[...]

# checking './t/logs/debian-hardening-wrapper'...
# HARDENING WRAPPER: no checks possible, aborting
# '

#   Failed test './t/logs/arch-i386 ./t/logs/arch-amd64 ./t/logs/arch-avr32 
./t/logs/ignore-flag --ignore-arch-flag i386:-fstack-protector-strong 
--ignore-arch-flag mipsel:-Werror=format-security (output)'
#   at t/tests.t line 45.
#  got: 'Use of uninitialized value $os in pattern match (m//) at 
./bin/blhc line 1194.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1198.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1202.

[...]

# CFLAGS missing (-O2): gcc -g -fstack-protector-strong -Wformat 
-Wformat-security -Werror=format-security -D_FORTIFY_SOURCE=2 -c test-c.c
# '

#   Failed test './t/logs/arch-i386 ./t/logs/arch-amd64 ./t/logs/arch-avr32 
./t/logs/ignore-line --ignore-arch-line "i386:gcc .+ -fPIE .+" 
--ignore-arch-line "mipsel:gcc .+ -Wl,-z,relro -Wl,-z,now .+" (output)'
#   at t/tests.t line 45.
#  got: 'Use of uninitialized value $os in pattern match (m//) at 
./bin/blhc line 1194.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1198.
# Use of uninitialized value $cpu in pattern match (m//) at ./bin/blhc line 
1202.

[...]


# Looks like you failed 5 tests of 246.
t/tests.t ..
1..246
[...]
not ok 14 - ./t/logs/arch-avr32 --color (output)
[...]
not ok 164 - ./t/logs/arch-avr32 (output)
[...]
not ok 242 - ./t/logs/bad-ldflags ./t/logs/empty ./t/logs/arch-avr32 
./t/logs/debian-hardening-wrapper (output)
[...]
not ok 244 - ./t/logs/arch-i386 ./t/logs/arch-amd64 ./t/logs/arch-avr32 
./t/logs/ignore-flag --ignore-arch-flag i386:-fstack-protector-strong 
--ignore-arch-flag mipsel:-Werror=format-security (output)
[...]
not ok 246 - ./t/logs/arch-i386 ./t/logs/arch-amd64 ./t/logs/arch-avr32 
./t/logs/ignore-line --ignore-arch-line "i386:gcc .+ -fPIE .+" 
--ignore-arch-line "mipsel:gcc .+ -Wl,-z,relro -Wl,-z,now .+" (output)
Dubious, test returned 5 (wstat 1280, 0x500)
Failed 5/246 subtests 

Test Summary Report
---
t/tests.t (Wstat: 1280 (exited 5) Tests: 246 Failed: 5)
  Failed tests:  14, 164, 242, 244, 246
  Non-zero exit status: 5
Files=1, Tests=246,  3 wallclock secs ( 0.02 usr  0.00 sys +  2.46 cusr  0.37 
csys =  2.85 CPU)
Result: FAIL
Failed 1/1 test programs. 5/246 subtests failed.


Regards,

Eriberto

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-11-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_

Bug#1036450: marked as done (mosquitto: Fails to restart on reboot)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 14:40:30 +
with message-id 
and subject line Bug#1036450: fixed in mosquitto 2.0.17-2
has caused the Debian Bug report #1036450,
regarding mosquitto: Fails to restart on reboot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1036450: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036450
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mosquitto
Version: 2.0.11-1
Severity: normal

Dear Maintainer,

On my bullseye armhf Raspberry Pi the restart on reboot fails with "Cannot
assign requested address". The configuration causing this is fairly simple:

$ cat /etc/mosquitto/conf.d/local.conf
listener 1883 127.0.0.1
listener 1883 192.168.47.11
password_file /etc/mosquitto/passwd

A later manual restart using

sudo service mosquitto restart

starts mosquitto correctly.

Sincerely,
Joachim


-- System Information:
Debian Release: 12.0
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-9-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages mosquitto depends on:
ii  adduser3.132
ii  libc6  2.36-9
ii  libcap21:2.66-3
ii  libcjson1  1.7.15-1
pn  libdlt2
ii  libmosquitto1  2.0.11-1.2
ii  libssl1.1  1.1.1n-0+deb11u4
ii  libssl33.0.8-1
ii  libsystemd0252.6-1
pn  libwebsockets16
ii  libwrap0   7.6.q-32
ii  lsb-base   11.6
ii  sysvinit-utils [lsb-base]  3.06-4

mosquitto recommends no packages.

Versions of packages mosquitto suggests:
ii  apparmor  3.0.8-3
--- End Message ---
--- Begin Message ---
Source: mosquitto
Source-Version: 2.0.17-2
Done: Philippe Coval 

We believe that the bug you reported is fixed in the latest version of
mosquitto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1036...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philippe Coval  (supplier of updated mosquitto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 15:01:39 +0200
Source: mosquitto
Binary: libmosquitto-dev libmosquitto1 libmosquitto1-dbgsym libmosquittopp-dev 
libmosquittopp1 libmosquittopp1-dbgsym mosquitto mosquitto-clients 
mosquitto-clients-dbgsym mosquitto-dbgsym mosquitto-dev
Architecture: source amd64 all
Version: 2.0.17-2
Distribution: unstable
Urgency: medium
Maintainer: Debian IoT Maintainers 

Changed-By: Philippe Coval 
Description:
 libmosquitto-dev - MQTT version 5.0/3.1.1/3.1 client library, development files
 libmosquitto1 - MQTT version 5.0/3.1.1/3.1 client library
 libmosquittopp-dev - MQTT version 3.1 client C++ library, development files
 libmosquittopp1 - MQTT version 5.0/3.1.1/3.1 client C++ library
 mosquitto  - MQTT version 5.0/3.1.1/3.1 compatible message broker
 mosquitto-clients - Mosquitto command line MQTT clients
 mosquitto-dev - Development files for Mosquitto
Closes: 1036450
Changes:
 mosquitto (2.0.17-2) unstable; urgency=medium
 .
   [ Joachim Zobel ]
   * debian/patches/2895.patch:
 - cherry-pick proposed upstream change for reboot issue
   (Closes: #1036450)
 .
   [ Gianfranco Costamagna ]
   * Revert "Refresh patch"
   * Refresh manually patch
Checksums-Sha1:
 9336ab1a7a507500d7caf6c46b072a8b9ab80e39 2650 mosquitto_2.0.17-2.dsc
 1a83bb35c9d6bd202d9ce6f1c26cdb30e842a43e 2235406 mosquitto_2.0.17.orig.tar.gz
 06ad9bff2357e998be8346d5bcd61f656b8ed8c5 26604 mosquitto_2.0.17-2.debian.tar.xz
 c740313cacf052ecac88904cacc27d52e8ccc805 73816 
libmosquitto-dev_2.0.17-2_amd64.deb
 2a626228064cb279e66e4613a512c63275784d14 110596 
libmosquitto1-dbgsym_2.0.17-2_amd64.deb
 ec24028057606e470df22ac34947e716fb2fe6f2 93636 libmosquitto1_2.0.17-2_amd64.deb
 7b748835a36dfc562ae97d7294181beaa68dacac 55116 
libmosquitto

Bug#1051847: marked as done (iproute2 ships configuration files in /usr/lib violating debian-policy)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 16:17:40 +0200
with message-id <20230913141740.kjzxnvh2mc7zd...@shell.thinkmo.de>
and subject line Re: Bug#1051847: iproute2 ships configuration files in 
/usr/lib violating debian-policy
has caused the Debian Bug report #1051847,
regarding iproute2 ships configuration files in /usr/lib violating debian-policy
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051847: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051847
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: iproute2
Version: 6.1.0-3
Severity: serious
Justification: Policy 10.7.2
X-Debbugs-Cc: d...@darkboxed.org

Dear Maintainer,

your iproute2 6.5.0-3 package installs configuration files in
/usr/lib/iproute2. This is a blatant violation of debian-policy
section 10.7.2. "Configuration files / Location" which states as
follows:

> Any configuration files created or used by your package must reside
> in /etc. If there are several, consider creating a subdirectory of
> /etc named after your package.

As I've mentioned in Bug#1051577 this is related to upstream commit

commit 0a0a8f12fa1b03dd0ccbebf5f85209d1c8a0f580
Read configuration files from /etc and /usr

Add support for the so called "stateless" configuration pattern (read
from /etc, fall back to /usr), giving system administrators a way to
define local configuration without changing any distro-provided files.

In practice this means that each configuration file FOO is loaded
from /usr/lib/iproute2/FOO unless /etc/iproute2/FOO exists.

but moving the config files from /etc/iproute to /usr/lib  is
misguided and should be overriden in your Debian package.

Thanks,
--Daniel
--- End Message ---
--- Begin Message ---
Hi Daniel

On Wed, Sep 13, 2023 at 04:11:16PM +0200, Daniel Gröber wrote:
> your iproute2 6.5.0-3 package installs configuration files in
> /usr/lib/iproute2. This is a blatant violation of debian-policy
> section 10.7.2. "Configuration files / Location" which states as
> follows:

No, it does not.  The files in /usr are defaults.  Those should be
copied to /etc for modification, which is config.

Bastian

-- 
No problem is insoluble.
-- Dr. Janet Wallace, "The Deadly Years", stardate 3479.4--- End Message ---


Bug#1050205: marked as done (wlsunset: Out of date package)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 13:35:31 +
with message-id 
and subject line Bug#1050205: fixed in wlsunset 0.3.0-1
has caused the Debian Bug report #1050205,
regarding wlsunset: Out of date package
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050205: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050205
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: wlsunset
Version: 0.2.0-2
Severity: wishlist

Dear Maintainer,

As per suggestion from the debian-mentors channel, I'm filing a bug
report for this package being out of date. I accidentally made my own local 
version of the updated version and it seems there's no complications with the 
new version that I can see. Please excuse me if this is improper procedure 
though.

-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable'), (400, 'testing'), (50, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-11-amd64 (SMP w/8 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages wlsunset depends on:
ii  libc6   2.36-9+deb12u1
ii  libwayland-client0  1.21.0-1

wlsunset recommends no packages.

wlsunset suggests no packages.

-- no debconf information

-- 
Mae Miller (it/she)
--- End Message ---
--- Begin Message ---
Source: wlsunset
Source-Version: 0.3.0-1
Done: Peymaneh 

We believe that the bug you reported is fixed in the latest version of
wlsunset, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Peymaneh  (supplier of updated wlsunset package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 11 Sep 2023 18:08:54 +0200
Source: wlsunset
Architecture: source
Version: 0.3.0-1
Distribution: unstable
Urgency: medium
Maintainer: Peymaneh 
Changed-By: Peymaneh 
Closes: 1050205
Changes:
 wlsunset (0.3.0-1) unstable; urgency=medium
 .
   * New upstream version 0.3.0 (Closes: #1050205)
   * d/control: Update standards version
   * Avoid explicitly specifying -Wl,--as-needed linker flag
Checksums-Sha1:
 62bde78f90f1d85ed53370e9220781561b5bcc48 1303 wlsunset_0.3.0-1.dsc
 90af7d1dca51b025808cbd791956445a672c24c1 16538 wlsunset_0.3.0.orig.tar.gz
 d602d65171b0d08b3def851f71f0aebabd35ddc5 2640 wlsunset_0.3.0-1.debian.tar.xz
 0d0469d142e0ac90cee247a0386cd7249502b8d2 6919 wlsunset_0.3.0-1_amd64.buildinfo
Checksums-Sha256:
 ff235ee7d4a541ef5363cffdb6cc8dbe0fd60b58ec3cf2347b0563dce835265f 1303 
wlsunset_0.3.0-1.dsc
 b834c520744784346196ec9bdd055a14172edcbf3cd8bb72e53e206d0d41f929 16538 
wlsunset_0.3.0.orig.tar.gz
 853983316143f77ea386179cfcf0a74e0c111e517c70b933e335d1e9994ab614 2640 
wlsunset_0.3.0-1.debian.tar.xz
 dbaecbb2bc773da387590f5b3980fed5d8e69d24af65640d96315bf48d21d2bd 6919 
wlsunset_0.3.0-1_amd64.buildinfo
Files:
 e87083fb282c110445a4a9a388cff368 1303 x11 optional wlsunset_0.3.0-1.dsc
 3cc3a37f08ef8c10525020e209b0ae50 16538 x11 optional wlsunset_0.3.0.orig.tar.gz
 04a98467fd15fdd3dc788fa505625851 2640 x11 optional 
wlsunset_0.3.0-1.debian.tar.xz
 abad5c7451167a844a00775a9ec44825 6919 x11 optional 
wlsunset_0.3.0-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQSxU0gdtznMh6PWXc8GICPKPga91QUCZQG1IAAKCRAGICPKPga9
1QkWAP9RbZ70tWELg9SOmlTXpiJ3nBUPrUThx2c4rD/0q0GQywEAqXqIPKO1kl8A
nj9/Ke2uatF+Oz5Or1yOWH+c+3DOSA4=
=BOuY
-END PGP SIGNATURE End Message ---


Bug#1051595: marked as done (RFS: geeqie/1:2.1-1 -- image viewer using GTK+)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 15:29:19 +0200
with message-id <7673b19c-4103-4fa7-b991-b3016cf39...@debian.org>
and subject line Re: Bug#1051595: RFS: geeqie/1:2.1-1 -- image viewer using GTK+
has caused the Debian Bug report #1051595,
regarding RFS: geeqie/1:2.1-1 -- image viewer using GTK+
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051595: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051595
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "geeqie":

 * Package name : geeqie
   Version  : 1:2.1-1
 * URL  : http://geeqie.org/
 * License  : GPL-2+, GFDL-1.2+
 * Vcs  : https://salsa.debian.org/debian/geeqie
   Section  : graphics

The source builds the following binary packages:

  geeqie - image viewer using GTK+
  geeqie-common - data files for Geeqie

To access further information about this package, please visit the following 
URL:

  https://mentors.debian.net/package/geeqie/

Alternatively, you can download the package with 'dget' using this command:

  dget -x https://mentors.debian.net/debian/pool/main/g/geeqie/geeqie_2.1-1.dsc

Changes since the last upload:

 geeqie (1:2.1-1) unstable; urgency=medium
 .
   * Update debian/watch
   * New upstream version 2.1
   * Refresh patches
   * Remove patch Fix-1023-Unresponsive-UI-when-Show-Marks-is-enabled.patch
   * No need to install AUTHORS file
   * Install SVG icon too
   * d/changelog: remove trailing whitespace
   * Update Debian copyright to 2023
   * Remove unused include-binaries
   * Upgrade to Standards Version 4.6.2 (No changes required)
   * Add patch to fix lintian warning privacy-breach-generic
   * Add lintian override for false positive spelling error
 (ment/meant)

Regards,
-- 
  Andreas Rönnquist
--- End Message ---
--- Begin Message ---

Uploaded geeqie.--- End Message ---


Bug#1051814: marked as done (neutron-vpnaas-dashboard: Fix unit test failures for Django 4.x)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 13:20:28 +
with message-id 
and subject line Bug#1051814: fixed in neutron-vpnaas-dashboard 8.0.0-3
has caused the Debian Bug report #1051814,
regarding neutron-vpnaas-dashboard: Fix unit test failures for Django 4.x
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051814: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051814
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: neutron-vpnaas-dashboard
Version: Fix unit test failures for Django 4.x
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu mantic ubuntu-patch

Dear Maintainer,

In Ubuntu, the attached patch was applied to achieve the following:

  * d/p/fix-test-failures-with-Django-4.x.patch: Fix unit tests
that are failing with Django 4.2.4.


Thanks for considering the patch.


-- System Information:
Debian Release: bookworm/sid
  APT prefers jammy-updates
  APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), 
(100, 'jammy-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.2.0-31-generic (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru 
neutron-vpnaas-dashboard-8.0.0/debian/patches/fix-test-failures-with-Django-4.x.patch
 
neutron-vpnaas-dashboard-8.0.0/debian/patches/fix-test-failures-with-Django-4.x.patch
--- 
neutron-vpnaas-dashboard-8.0.0/debian/patches/fix-test-failures-with-Django-4.x.patch
   1969-12-31 18:00:00.0 -0600
+++ 
neutron-vpnaas-dashboard-8.0.0/debian/patches/fix-test-failures-with-Django-4.x.patch
   2023-09-12 17:18:27.0 -0400
@@ -0,0 +1,72 @@
+From 9c46ffe619fe948363d0d8b1a533ae7214e65c60 Mon Sep 17 00:00:00 2001
+From: Corey Bryant 
+Date: Tue, 12 Sep 2023 17:13:51 -0400
+Subject: [PATCH] Fix unit test failures for Django 4.x
+
+These tests have started failing with Django 4.2.4 due to
+comparison of objects with strings. This change just compares
+the repr(object) with the existing strings.
+
+Closes-Bug: #2034952
+Change-Id: Ifce3ab76a659931a6753d4fa796ea2164f9accd8
+---
+ .../dashboards/project/vpn/tests.py   | 15 ++-
+ 1 file changed, 10 insertions(+), 5 deletions(-)
+
+diff --git a/neutron_vpnaas_dashboard/dashboards/project/vpn/tests.py 
b/neutron_vpnaas_dashboard/dashboards/project/vpn/tests.py
+index 9ba235e..b169a5a 100644
+--- a/neutron_vpnaas_dashboard/dashboards/project/vpn/tests.py
 b/neutron_vpnaas_dashboard/dashboards/project/vpn/tests.py
+@@ -255,7 +255,8 @@ class VPNTests(test.TestCase):
+ self.assertEqual(workflow.name, workflows.AddVPNService.name)
+ 
+ expected_objs = ['', ]
+-self.assertQuerysetEqual(workflow.steps, expected_objs)
++actual_objs = [repr(step) for step in workflow.steps]
++self.assertQuerysetEqual(actual_objs, expected_objs)
+ 
+ self.mock_network_list_for_tenant.assert_called_once_with(
+ helpers.IsHttpRequest(), self.tenant.id)
+@@ -331,7 +332,8 @@ class VPNTests(test.TestCase):
+ self.assertEqual(workflow.name, workflows.AddEndpointGroup.name)
+ 
+ expected_objs = ['', ]
+-self.assertQuerysetEqual(workflow.steps, expected_objs)
++actual_objs = [repr(step) for step in workflow.steps]
++self.assertQuerysetEqual(actual_objs, expected_objs)
+ self.mock_network_list_for_tenant.assert_called_once_with(
+ helpers.IsHttpRequest(), self.tenant.id)
+ 
+@@ -389,7 +391,8 @@ class VPNTests(test.TestCase):
+ self.assertEqual(workflow.name, workflows.AddIKEPolicy.name)
+ 
+ expected_objs = ['', ]
+-self.assertQuerysetEqual(workflow.steps, expected_objs)
++actual_objs = [repr(step) for step in workflow.steps]
++self.assertQuerysetEqual(actual_objs, expected_objs)
+ 
+ @helpers.create_mocks({api_vpn: ('ikepolicy_create', )})
+ def test_add_ikepolicy_post(self):
+@@ -448,7 +451,8 @@ class VPNTests(test.TestCase):
+ self.assertEqual(workflow.name, workflows.AddIPsecPolicy.name)
+ 
+ expected_objs = ['', ]
+-self.assertQuerysetEqual(workflow.steps, expected_objs)
++actual_objs = [repr(step) for step in workflow.steps]
++self.assertQuerysetEqual(actual_objs, expected_objs)
+ 
+ @helpers.create_mocks({api_vpn: ('ipsecpoli

Bug#1033089: marked as done (subread: reproducible-builds: Embedded build path in various binaries)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 13:21:24 +
with message-id 
and subject line Bug#1033089: fixed in subread 2.0.6+dfsg-2
has caused the Debian Bug report #1033089,
regarding subread: reproducible-builds: Embedded build path in various binaries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033089: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033089
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: subread
Version: 2.0.4+dfsg-1
Severity: normal
Tags: patch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: buildpath
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

The build path is embedded in various binaries:

  
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/diffoscope-results/subread.html

  /usr/bin/exactSNP

  /build/1st/subread-2.0.4+dfsg/src/input-files.c:3084
  vs.
  /build/2/subread-2.0.4+dfsg/2nd/src/input-files.c:3084

The attached patch fixes this by patching src/Makefile.Linux to not
override the CFLAGS and CXXFLAGS variables, so that the default flags
include -ffile-prefix-map to avoid embedding the build path.

Earlier versions (e.g. 2.0.3* currently in bookworm) did pass the
default flags, so this is a regression from what is currently in
bookworm.

According to my local tests, with this patch applied subread should build
reproducibly on tests.reproducible-builds.org!

Thanks for maintaining subread!

live well,
  vagrant
From 661536e4afcec2e40682257e5aba8119b46935d7 Mon Sep 17 00:00:00 2001
From: Vagrant Cascadian 
Date: Thu, 16 Mar 2023 21:51:54 -0700
Subject: [PATCH 1/3] src/Makefile.Linux: Do not set CFLAGS and CXXFLAGS to
 empty values.

---
 src/Makefile.Linux | 2 --
 1 file changed, 2 deletions(-)

diff --git a/src/Makefile.Linux b/src/Makefile.Linux
index 0571c1a..a6ec556 100644
--- a/src/Makefile.Linux
+++ b/src/Makefile.Linux
@@ -6,8 +6,6 @@ OPT_LEVEL = 3
 include makefile.version
 -include ~/.R/DBPZ_debug_makefile
 
-CXXFLAGS=
-CFLAGS=
 CCFLAGS += -O${OPT_LEVEL} -fsigned-char -Wall -DMAKE_FOR_EXON  -D MAKE_STANDALONE -D SUBREAD_VERSION=\"${SUBREAD_VERSION}\"  -D_FILE_OFFSET_BITS=64 ${WARNING_LEVEL}
 LDFLAGS += ${STATIC_MAKE} -pthread -lz -O${OPT_LEVEL} -DMAKE_FOR_EXON -D MAKE_STANDALONE -lm
 CFLAGS += ${CCFLAGS} -fmessage-length=0 -ggdb
-- 
2.39.2



signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: subread
Source-Version: 2.0.6+dfsg-2
Done: Michael R. Crusoe 

We believe that the bug you reported is fixed in the latest version of
subread, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael R. Crusoe  (supplier of updated subread package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 14:21:47 +0200
Source: subread
Architecture: source
Version: 2.0.6+dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Med Packaging Team 

Changed-By: Michael R. Crusoe 
Closes: 1033089
Changes:
 subread (2.0.6+dfsg-2) unstable; urgency=medium
 .
   * Team upload.
   * d/control: build on riscv64 as well.
   * d/patches/0001-src-Makefile.Linux-Do-not-set-CFLAGS-and-CXXFLAGS-
 to.patch: fix embedded build path in various binaries.
 Thanks to Vagrant Cascadian .
 Closes: #1033089.
Checksums-Sha1:
 672236e7e75a458103bbdaf0340de9816839e456 2282 subread_2.0.6+dfsg-2.dsc
 af4075da4622c89c5e16192faa523ea49c23293f 18808 
subread_2.0.6+dfsg-2.debian.tar.xz
 d093fd706ff4a091a42966cb9683cdc3aa2cf4c1 7931 
subread_2.0.6+dfsg-2_source.buildinfo
Checksums-Sha256:
 65d6a5bff0ba7b2262eb81e947ac6160811801f0bc594fea06bad920926ec65f 2282 
subread_2.0.6+dfsg-2.dsc
 e03dab91cefb9179cfcfe2714ff6125f0a3f30c435a8e2c585ce2811552983a6 18808 
subread_2.0.6+dfsg-2.debian.tar.xz
 6f32704555af659cd2e126e629c229efc86519ddfab2b3fb70183c8ce6ce8fd7 7931 
subread_2.0.6+dfsg-2_source.buildinfo
Files:
 ed042ea10ad3fe26b6858b55d002206c 2282 science optional subread_2.0.6+dfsg-2.dsc
 a3a47a633a995a16b594a06c67fb9b63 18808 science optional 
subread_2.0.6+dfsg-2.debian.tar.xz
 812bc464bc60d8766771fd4d6b688453 7931 science optional 
sub

Bug#967339: marked as done (fio: depends on deprecated GTK 2)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 12:03:59 +
with message-id 
and subject line Bug#967339: fixed in fio 3.35-3
has caused the Debian Bug report #967339,
regarding fio: depends on deprecated GTK 2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
967339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967339
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: fio
Severity: normal
User: pkg-gnome-maintain...@lists.alioth.debian.org
Usertags: gtk2 oldlibs
Control: block 947713 by -1

This package has Build-Depends on GTK 2 (libgtk2.0-dev), or produces
binary packages with a Depends on GTK 2.

GTK 2 was superseded by GTK 3 in 2011 (see
). It no longer receives any significant
upstream maintenance, and in particular does not get feature development
for new features like UI scaling on high-pixel-density displays (HiDPI)
and native Wayland support. GTK 3 is in maintenance mode and GTK 4 is
approaching release, so it seems like a good time to be thinking about
minimizing the amount of GTK 2 in the archive.

GTK 2 is used by some important productivity applications like GIMP, and
has also historically been a popular UI toolkit for proprietary software
that we can't change, so perhaps removing GTK 2 from Debian will never be
feasible. However, it has reached the point where a dependency on it is
a bug - not a release-critical bug, and not a bug that can necessarily
be fixed quickly, but a piece of technical debt that maintainers should
be aware of.

A porting guide is provided in the GTK 3 documentation:
https://developer.gnome.org/gtk3/stable/migrating.html

Some libraries (for example libgtkspell0) expose GTK as part of their
API/ABI, in which case removing the deprecated dependency requires
breaking API/ABI. For these libraries, in many cases there will already
be a corresponding GTK 3 version (for example libgtkspell3-3-0), in which
case the GTK 2-based library should probably be deprecated or removed
itself. If there is no GTK 3 equivalent, of a GTK 2-based library,
maintainers should talk to the dependent library's upstream developers
about whether the dependent library should break API/ABI and switch
to GTK 3, or whether the dependent library should itself be deprecated
or removed.

A few packages extend GTK 2 by providing plugins (theme engines, input
methods, etc.) or themes, for example ibus and mate-themes. If these
packages deliberately support GTK 2 even though it is deprecated, and
they also support GTK 3, then it is appropriate to mark this mass-filed
bug as wontfix for now. I have tried to exclude these packages from
the mass-bug-filing, but I probably missed some of them.

Regards,
smcv
--- End Message ---
--- Begin Message ---
Source: fio
Source-Version: 3.35-3
Done: Martin Steigerwald 

We believe that the bug you reported is fixed in the latest version of
fio, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 967...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Steigerwald  (supplier of updated fio 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 12 Sep 2023 09:46:14 +0200
Source: fio
Architecture: source
Version: 3.35-3
Distribution: unstable
Urgency: medium
Maintainer: Martin Steigerwald 
Changed-By: Martin Steigerwald 
Closes: 967339
Changes:
 fio (3.35-3) unstable; urgency=medium
 .
   [ Bastian Germann ]
   * gfio will not be ported to gtk3 or later. So drop this gtk2 dependent
 package. (Closes: #967339)
 .
   [ Martin Steigerwald ]
   * control: Drop libpmemblk from Build-Depends. Thanks to Adam Borowski for
 his merge request.
Checksums-Sha1:
 19f2732d9c265821e5e842c727035f8322ece741 2386 fio_3.35-3.dsc
 7647d5eec220404d6ae1bcbd33164af252e4c67d 22908 fio_3.35-3.debian.tar.xz
 dafb2043148843440c629b7c7bfe3694fcdd0b79 11469 fio_3.35-3_amd64.buildinfo
Checksums-Sha256:
 7054d3a492aa7712717948dd638bca066c16f2b2b158ea92973161cd95567a16 2386 
fio_3.35-3.dsc
 1efd676038d15cf53267eac3cb256187d2113493f0546e310c94d6ee0908cd1a 22908 
fio_3.35-3.debian.tar.xz
 e1dee892dd3cd8e450095d57c1bed7d01deffcd1158a7884a1f5368b28d204

Bug#1042181: marked as done (trantor: FTBFS: MsgBuffer.h:77:5: error: ‘uint8_t’ does not name a type)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 12:04:22 +
with message-id 
and subject line Bug#1042181: fixed in trantor 1.5.12+ds-1
has caused the Debian Bug report #1042181,
regarding trantor: FTBFS: MsgBuffer.h:77:5: error: ‘uint8_t’ does not name a 
type
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1042181: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042181
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: trantor
Version: 1.5.11+ds-1
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20230726 ftbfs-trixie

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
> /usr/bin/c++ -Dtrantor_EXPORTS -I/<> 
> -I/<>/obj-x86_64-linux-gnu/exports 
> -I/<>/trantor/utils -I/<>/trantor/net 
> -I/<>/trantor/net/inner -I/<>/third_party/wepoll -g 
> -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat 
> -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -std=c++14 -fPIC 
> -Wall -Wextra -Werror -MD -MT 
> CMakeFiles/trantor.dir/trantor/utils/TimingWheel.cc.o -MF 
> CMakeFiles/trantor.dir/trantor/utils/TimingWheel.cc.o.d -o 
> CMakeFiles/trantor.dir/trantor/utils/TimingWheel.cc.o -c 
> /<>/trantor/utils/TimingWheel.cc
> In file included from /<>/trantor/utils/MsgBuffer.cc:15:
> /<>/trantor/utils/MsgBuffer.h:77:5: error: ‘uint8_t’ does not 
> name a type
>77 | uint8_t peekInt8() const
>   | ^~~
> /<>/trantor/utils/MsgBuffer.h:24:1: note: ‘uint8_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
>23 | #include 
>   +++ |+#include 
>24 | #ifdef _WIN32
> /<>/trantor/utils/MsgBuffer.h:88:5: error: ‘uint16_t’ does not 
> name a type
>88 | uint16_t peekInt16() const;
>   | ^~~~
> /<>/trantor/utils/MsgBuffer.h:88:5: note: ‘uint16_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:95:5: error: ‘uint32_t’ does not 
> name a type
>95 | uint32_t peekInt32() const;
>   | ^~~~
> /<>/trantor/utils/MsgBuffer.h:95:5: note: ‘uint32_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:102:5: error: ‘uint64_t’ does not 
> name a type
>   102 | uint64_t peekInt64() const;
>   | ^~~~
> /<>/trantor/utils/MsgBuffer.h:102:5: note: ‘uint64_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:117:5: error: ‘uint8_t’ does not 
> name a type
>   117 | uint8_t readInt8();
>   | ^~~
> /<>/trantor/utils/MsgBuffer.h:117:5: note: ‘uint8_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:124:5: error: ‘uint16_t’ does not 
> name a type
>   124 | uint16_t readInt16();
>   | ^~~~
> /<>/trantor/utils/MsgBuffer.h:124:5: note: ‘uint16_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:131:5: error: ‘uint32_t’ does not 
> name a type
>   131 | uint32_t readInt32();
>   | ^~~~
> /<>/trantor/utils/MsgBuffer.h:131:5: note: ‘uint32_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:138:5: error: ‘uint64_t’ does not 
> name a type
>   138 | uint64_t readInt64();
>   | ^~~~
> /<>/trantor/utils/MsgBuffer.h:138:5: note: ‘uint64_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:189:27: error: ‘uint8_t’ does not 
> name a type
>   189 | void appendInt8(const uint8_t b)
>   |   ^~~
> /<>/trantor/utils/MsgBuffer.h:189:27: note: ‘uint8_t’ is defined 
> in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:199:28: error: ‘uint16_t’ does not 
> name a type
>   199 | void appendInt16(const uint16_t s);
>   |^~~~
> /<>/trantor/utils/MsgBuffer.h:199:28: note: ‘uint16_t’ is 
> defined in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:206:28: error: ‘uint32_t’ does not 
> name a type
>   206 | void appendInt32(const uint32_t i);
>   |^~~~
> /<>/trantor/utils/MsgBuffer.h:206:28: note: ‘uint32_t’ is 
> defined in header ‘’; did you forget to ‘#include ’?
> /<>/trantor/utils/MsgBuffer.h:213:28: error: ‘uint64_t’ does not 
> name a type
>   213 | void appendInt64(const uint64_t l);
>   |^~~~
> /<>/trantor/utils/MsgBuffer.h:213:28: note: ‘uint64_t’ is 
> defined in header ‘’; did y

Bug#1047585: marked as done (soundgrain: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 11:52:59 +
with message-id 
and subject line Bug#1047585: fixed in soundgrain 6.0.1-5
has caused the Debian Bug report #1047585,
regarding soundgrain: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1047585: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1047585
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: soundgrain
Version: 6.0.1-4
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> ---
> 
> dpkg-buildpackage: info: source package soundgrain
> dpkg-buildpackage: info: source version 6.0.1-4
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Tiago Bortoletto Vaz 
> 
>  dpkg-source --before-build .
>  fakeroot debian/rules clean
> dh clean --with python3 --buildsystem=pybuild
>debian/rules override_dh_auto_clean
> make[1]: Entering directory '/<>'
> find . -name '*.pyc' -delete
> rm -rf build
> make[1]: Leaving directory '/<>'
>dh_autoreconf_clean -O--buildsystem=pybuild
>dh_clean -O--buildsystem=pybuild
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: building soundgrain using existing 
> ./soundgrain_6.0.1.orig.tar.bz2
> dpkg-source: info: using patch list from debian/patches/series
> dpkg-source: warning: newly created empty file 
> '.pybuild/cpython3_3.11/build/Resources/__init__.py' will not be represented 
> in diff
> dpkg-source: warning: file soundgrain-6.0.1/soundgrain.egg-info/SOURCES.txt 
> has no final newline (either original or modified version)
> dpkg-source: info: local changes detected, the modified files are:
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/.pydistutils.cfg
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/Biquad_Filter.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/CommandFrame.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/ControlPanel.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/DrawingSurface.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/FxBall.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/MainFrame.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/MidiSettings.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/Modules.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/Trajectory.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/audio.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/constants.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/splash.py
>  soundgrain-6.0.1/.pybuild/cpython3_3.11/build/Resources/widgets.py
>  soundgrain-6.0.1/soundgrain.egg-info/PKG-INFO
>  soundgrain-6.0.1/soundgrain.egg-info/SOURCES.txt
>  soundgrain-6.0.1/soundgrain.egg-info/dependency_links.txt
>  soundgrain-6.0.1/soundgrain.egg-info/top_level.txt
> dpkg-source: error: aborting due to unexpected upstream changes, see 
> /tmp/soundgrain_6.0.1-4.diff.6rCwax
> dpkg-source: info: Hint: make sure the version in debian/changelog matches 
> the unpacked source tree
> dpkg-source: info: you can integrate the local changes with dpkg-source 
> --commit
> dpkg-buildpackage: error: dpkg-source -b . subprocess returned exit status 2
> 
> E: Command 'cd /<> && runuser -u user42 -- dpkg-buildpackage 
> --sanitize-env -us -uc -rfakeroot -S' failed to run.


The full build log is available from:
http://qa-logs.debian.net/2023/08/13/soundgrain_6.0.1-4_unstable.log

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please p

Bug#1043678: marked as done (cecilia: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 11:49:04 +
with message-id 
and subject line Bug#1043678: fixed in cecilia 5.4.1-2
has caused the Debian Bug report #1043678,
regarding cecilia: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1043678: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043678
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: cecilia
Version: 5.4.1-1
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> -
> 
> dpkg-buildpackage: info: source package cecilia
> dpkg-buildpackage: info: source version 5.4.1-1
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Dennis Braun 
>  dpkg-source --before-build .
>  debian/rules clean
> dh clean --with python3 --buildsystem=pybuild
>debian/rules override_dh_auto_clean
> make[1]: Entering directory '/<>'
> find . -name '*.pyc' -delete
> rm -rf build
> make[1]: Leaving directory '/<>'
>dh_autoreconf_clean -O--buildsystem=pybuild
>dh_clean -O--buildsystem=pybuild
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: building cecilia using existing ./cecilia_5.4.1.orig.tar.gz
> dpkg-source: info: using patch list from debian/patches/series
> dpkg-source: error: cannot represent change to 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Cecilia5.icns: binary 
> file contents changed
> dpkg-source: error: add 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Cecilia5.icns in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Cecilia5.ico: binary 
> file contents changed
> dpkg-source: error: add 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Cecilia5.ico in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/CeciliaFileIcon5.icns: 
> binary file contents changed
> dpkg-source: error: add 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/CeciliaFileIcon5.icns 
> in debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/CeciliaFileIcon5.ico: 
> binary file contents changed
> dpkg-source: error: add 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/CeciliaFileIcon5.ico 
> in debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: error: cannot represent change to 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Cecilia_splash.png: 
> binary file contents changed
> dpkg-source: error: add 
> .pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Cecilia_splash.png in 
> debian/source/include-binaries if you want to store the modified binary in 
> the debian tarball
> dpkg-source: warning: file 
> cecilia-5.4.1/.pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/DocFrame.py
>  has no final newline (either original or modified version)
> dpkg-source: warning: file 
> cecilia-5.4.1/.pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Drunk.py 
> has no final newline (either original or modified version)
> dpkg-source: warning: file 
> cecilia-5.4.1/.pybuild/cpython3_3.11_cecilia/build/cecilia/Resources/Sliders.py
>  has no final newline (either original or modified version)
> dpkg-source: warning: file 
> cecilia-5.4.1/.pybuild/cpython3_3.11_cecilia/b

Bug#982773: marked as done (haskell-uniplate: Wrong homepage + new version)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 13:40:21 +0300
with message-id <20230913104021.o62m66muonefs...@iliastsi.net>
and subject line Re: Bug#982773: haskell-uniplate: Wrong homepage + new version
has caused the Debian Bug report #982773,
regarding haskell-uniplate: Wrong homepage + new version
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
982773: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982773
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Source: haskell-uniplate
Version: 1.6.12-9
Severity: normal

I have see that the project homepage do not respond anymore:
community.haskell.org/~ndm/uniplate/

I think that the homepage is now:
https://github.com/ndmitchell/uniplate
https://hackage.haskell.org/package/uniplate

I think here there is a new version: 1.6.13

Ciao
Davide

Note: this is a simplified bug report that I use to report homepage 
problems found at https://repology.org/repository/debian_testing/problems
--- End Message ---
--- Begin Message ---
Version: 1.6.13-1

This was fixed in version 1.6.13-1.

Thanks,

-- 
Ilias--- End Message ---


Bug#1051805: marked as done (systemd-cron: shell redirect not working in crontab entries)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 09:12:50 +
with message-id 
and subject line Bug#1051805: fixed in systemd-cron 2.1.3-1
has caused the Debian Bug report #1051805,
regarding systemd-cron: shell redirect not working in crontab entries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051805: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051805
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: systemd-cron
Version: 2.1.2-1
Severity: normal

Dear Maintainer,

I can put a simple command with a redirect to a file or /dev/null, and
systemd-cron continues to email the output of the command. See the
following excerpt from the email, which shows the command I'm running:

Process: 3729378 ExecStart=/bin/sh 
/run/systemd/generator/cron-john-john-3.sh (code=exited, status=0/SUCCESS)
   Main PID: 3729378 (code=exited, status=0/SUCCESS)
CPU: 28ms
2023-09-12T18:44:00+ nucleus.hjsoft.com systemd[1]: Starting 
cron-john-john-3.service - [Cron] "* * * * *   ls -la > /dev/null"...
2023-09-12T18:44:00+ nucleus.hjsoft.com sh[3729380]: total 80
2023-09-12T18:44:00+ nucleus.hjsoft.com sh[3729380]: drwxr-xr-x  18 root 
root  4096 Aug 31 16:21 .
2023-09-12T18:44:00+ nucleus.hjsoft.com sh[3729380]: drwxr-xr-x  18 root 
root  4096 Aug 31 16:21 ..
2023-09-12T18:44:00+ nucleus.hjsoft.com sh[3729380]: lrwxrwxrwx   1 root 
root 7 Oct  5  2022 bin -> usr/bin
2023-09-12T18:44:00+ nucleus.hjsoft.com sh[3729380]: drwxr-xr-x   2 root 
root  4096 Aug 30  2011 boot


I would have not expected to see the output in email.

Work-around:
I can get the redirect to work, if I change the cron entry to:

* * * * *   bash -lc "ls -la > /dev/null"



-- Package-specific info:
-- output of systemctl list-timers
NEXT  LEFT LAST   PASSED 
UNIT   ACTIVATES
Tue 2023-09-12 18:50:35   95ms ago Tue 2023-09-12 18:37:28 13min ago 
apt-listbugs.timer apt-listbugs.service
Tue 2023-09-12 18:51:0024s Tue 2023-09-12 18:50:00   34s ago 
cron-john-john-1.timer cron-john-john-1.service
Tue 2023-09-12 18:51:0024s Tue 2023-09-12 18:50:00   34s ago 
cron-john-john-3.timer cron-john-john-3.service
Tue 2023-09-12 19:00:00   9min -   - 
cron-sendmail-smmsp-0.timercron-sendmail-smmsp-0.service
Tue 2023-09-12 19:00:00   9min -   - 
cron-tiger-root-0.timercron-tiger-root-0.service
Tue 2023-09-12 19:02:00  11min -   - 
cron-logcheck-logcheck-0.timer cron-logcheck-logcheck-0.service
Tue 2023-09-12 19:49:00  58min Tue 2023-09-12 18:49:00  1min 34s ago 
cron-debsecan-daemon-0.timer   cron-debsecan-daemon-0.service
Wed 2023-09-13 00:00:005h 9min -   - 
cron-john-john-2.timer cron-john-john-2.service
Wed 2023-09-13 00:00:005h 9min Tue 2023-09-12 00:00:00   18h ago 
logrotate.timerlogrotate.service
Wed 2023-09-13 01:14:21 6h Tue 2023-09-12 03:39:18   15h ago 
plocate-updatedb.timer plocate-updatedb.service
Wed 2023-09-13 02:32:06 7h Tue 2023-09-12 13:52:16  4h 58min ago 
apt-daily.timerapt-daily.service
Wed 2023-09-13 04:00:00 9h -   - 
cron-backup-root-0.timer   cron-backup-root-0.service
Wed 2023-09-13 05:05:0010h -   - 
cron-john-john-0.timer cron-john-john-0.service
Wed 2023-09-13 05:06:0310h Tue 2023-09-12 05:06:03   13h ago 
systemd-tmpfiles-clean.timer   systemd-tmpfiles-clean.service
Wed 2023-09-13 05:21:0410h Tue 2023-09-12 05:21:04   13h ago 
chkrootkit.timer   chkrootkit.service
Wed 2023-09-13 06:10:0011h Tue 2023-09-12 06:10:00 - 
cron-daily-aptitude.timer  cron-daily-aptitude.service
Wed 2023-09-13 06:10:0011h Tue 2023-09-12 06:10:00 - 
cron-daily-checksecurity.timer cron-daily-checksecurity.service
Wed 2023-09-13 06:10:0011h Tue 2023-09-12 06:10:00 - 
cron-daily-cleanup_mqueue.timercron-daily-cleanup_mqueue.service
Wed 2023-09-13 06:10:0011h Tue 2023-09-12 06:10:00 - 
cron-daily-find.timer  cron-daily-find.service
Wed 2023-09-13 06:10:001

Bug#1051815: marked as done (Builds invalid wasm32 binaries (1.67->1.68 regression))

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 09:13:06 +
with message-id 
and subject line Bug#1051815: fixed in wasi-libc 0.0~git20230113.4362b18-2
has caused the Debian Bug report #1051815,
regarding Builds invalid wasm32 binaries (1.67->1.68 regression)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051815: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051815
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: wasmedge
Version: 0.13.3+dfsg-1
Severity:serious

The autopkgtests for wasmedge fail with rustc 1.68, I have observed this with
both testing and unstable's versions of wasmedge, and with both testing and
unstable's versions of wasi-lib.

https://ci.debian.net/data/autopkgtest/unstable/amd64/w/wasmedge/37793933/log.gz

https://ci.debian.net/data/autopkgtest/unstable/amd64/w/wasmedge/37778163/log.gz

https://ci.debian.net/data/autopkgtest/testing/amd64/w/wasmedge/37770138/log.gz



 93s autopkgtest [14:54:23]: test capi-wasi-env: [---
 93s 1..2
 94s ok 1 build wasi_get_env.wasm with cargo/rustc
 94s not ok 2 build set_wasm_env with gcc
 94s # (in test file debian/tests/capi-wasi-env, line 24)
 94s #   `assert_output --partial "ENV1: VAL1"' failed
 94s #
 94s # -- output does not contain substring --
 94s # substring (1 lines):
 94s #   ENV1: VAL1
 94s # output (4 lines):
 94s #   [2023-09-12 14:54:24.910] [error] execution failed: unreachable, Code: 
0x89
 94s #   [2023-09-12 14:54:24.910] [error] In instruction: unreachable 
(0x00) , Bytecode offset: 0x9efb
 94s #   [2023-09-12 14:54:24.910] [error] When executing function name: 
"print_env"
 94s #   Execution Failed. Error message: unreachable
 94s # --
 94s #
 95s autopkgtest [14:54:25]: test capi-wasi-env: ---]
 95s autopkgtest [14:54:25]: test capi-wasi-env:  - - - - - - - - - - results - 
- - - - - - - - -
 95s capi-wasi-envFAIL non-zero exit status 1
--- End Message ---
--- Begin Message ---
Source: wasi-libc
Source-Version: 0.0~git20230113.4362b18-2
Done: Fabian Grünbichler 

We believe that the bug you reported is fixed in the latest version of
wasi-libc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Fabian Grünbichler  (supplier of updated 
wasi-libc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 08:19:24 +0200
Source: wasi-libc
Architecture: source
Version: 0.0~git20230113.4362b18-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers 

Changed-By: Fabian Grünbichler 
Closes: 1051815
Changes:
 wasi-libc (0.0~git20230113.4362b18-2) unstable; urgency=medium
 .
   * Revert "build: enable stack protection" (Closes: #1051815)
Checksums-Sha1:
 84f97c8c96134ca93997d7908ebc1b4122f35f87 2174 
wasi-libc_0.0~git20230113.4362b18-2.dsc
 2fbf7564f3ba218e4537a493155330da4cfb26f9 7336 
wasi-libc_0.0~git20230113.4362b18-2.debian.tar.xz
 e8baab69a3012ad29510770a42005a4f3153959c 6742 
wasi-libc_0.0~git20230113.4362b18-2_source.buildinfo
Checksums-Sha256:
 99472f842c59639be0b6d49950e4ddabf8d7a857e9b1c827d92fd0c75feb20f6 2174 
wasi-libc_0.0~git20230113.4362b18-2.dsc
 b140317084fa1e5d448799ebd946bd53ebff4da40eecdb1b92bcc6a2fd4f20ac 7336 
wasi-libc_0.0~git20230113.4362b18-2.debian.tar.xz
 f2fdce555638786af5cc2c26087bfb9085cc867bf2203ff451ae0b3e2c0ac8b9 6742 
wasi-libc_0.0~git20230113.4362b18-2_source.buildinfo
Files:
 da3f778f5a9684ec2e101e70dd94a080 2174 devel optional 
wasi-libc_0.0~git20230113.4362b18-2.dsc
 401f6b91cb14efd25ba841e6a7ef9159 7336 devel optional 
wasi-libc_0.0~git20230113.4362b18-2.debian.tar.xz
 c32cf4d64873854d6e78c8d61129939d 6742 devel optional 
wasi-libc_0.0~git20230113.4362b18-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJVBAEBCgA/FiEEbdkGe7ToK0Amc9ppdh5TKjcTRTAFAmUBcokhHGRlYmlhbkBm
YWJpYW4uZ3J1ZW5iaWNobGVyLmVtYWlsAAoJEHYeUyo3E0Uw/2cP/3Xe5Z8vv1WR
zSF3Xa8SV2m6ENj8ZYt5VfpHKtfGWITO6SrcI7fQvYmKxB+40kqezURtx+Algs0o
g0K4Tly9JafvtbEtLOBaLky41V9HUVfLPIdl2laol+WS3pLvkcM4fWFkRpag8kOm
ct12y8mHq9lZE0pjuw7KAu60CGfs5CyruxaU+zfycusxR2YoOD1Bi574pWc/u9ay
acSSOUOdCkAZVvdw

Bug#1051815: marked as done (Builds invalid wasm32 binaries (1.67->1.68 regression))

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 09:12:40 +
with message-id 
and subject line Bug#1051815: fixed in rustc 1.69.0+dfsg1-1~exp2
has caused the Debian Bug report #1051815,
regarding Builds invalid wasm32 binaries (1.67->1.68 regression)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051815: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051815
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: wasmedge
Version: 0.13.3+dfsg-1
Severity:serious

The autopkgtests for wasmedge fail with rustc 1.68, I have observed this with
both testing and unstable's versions of wasmedge, and with both testing and
unstable's versions of wasi-lib.

https://ci.debian.net/data/autopkgtest/unstable/amd64/w/wasmedge/37793933/log.gz

https://ci.debian.net/data/autopkgtest/unstable/amd64/w/wasmedge/37778163/log.gz

https://ci.debian.net/data/autopkgtest/testing/amd64/w/wasmedge/37770138/log.gz



 93s autopkgtest [14:54:23]: test capi-wasi-env: [---
 93s 1..2
 94s ok 1 build wasi_get_env.wasm with cargo/rustc
 94s not ok 2 build set_wasm_env with gcc
 94s # (in test file debian/tests/capi-wasi-env, line 24)
 94s #   `assert_output --partial "ENV1: VAL1"' failed
 94s #
 94s # -- output does not contain substring --
 94s # substring (1 lines):
 94s #   ENV1: VAL1
 94s # output (4 lines):
 94s #   [2023-09-12 14:54:24.910] [error] execution failed: unreachable, Code: 
0x89
 94s #   [2023-09-12 14:54:24.910] [error] In instruction: unreachable 
(0x00) , Bytecode offset: 0x9efb
 94s #   [2023-09-12 14:54:24.910] [error] When executing function name: 
"print_env"
 94s #   Execution Failed. Error message: unreachable
 94s # --
 94s #
 95s autopkgtest [14:54:25]: test capi-wasi-env: ---]
 95s autopkgtest [14:54:25]: test capi-wasi-env:  - - - - - - - - - - results - 
- - - - - - - - -
 95s capi-wasi-envFAIL non-zero exit status 1
--- End Message ---
--- Begin Message ---
Source: rustc
Source-Version: 1.69.0+dfsg1-1~exp2
Done: Fabian Grünbichler 

We believe that the bug you reported is fixed in the latest version of
rustc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Fabian Grünbichler  (supplier of updated 
rustc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 08:02:53 +0200
Source: rustc
Architecture: source
Version: 1.69.0+dfsg1-1~exp2
Distribution: experimental
Urgency: medium
Maintainer: Debian Rust Maintainers 

Changed-By: Fabian Grünbichler 
Closes: 1051815
Changes:
 rustc (1.69.0+dfsg1-1~exp2) experimental; urgency=medium
 .
   * config: also enable rustdoc explicitly
   * bump wasi-libc to revert stack protection (Closes: #1051815)
Checksums-Sha1:
 4631ed4571f74386eeed7048a797bd1ef66a20de 3612 rustc_1.69.0+dfsg1-1~exp2.dsc
 4802fc8088054b3f873a8fb16fcb828447342efe 97852 
rustc_1.69.0+dfsg1-1~exp2.debian.tar.xz
 17bffc1bf8791d1d8b549c0b04426ec15818fbb3 9020 
rustc_1.69.0+dfsg1-1~exp2_source.buildinfo
Checksums-Sha256:
 0434077a4a3d9b990e928b4c731a2b089c2aea38c2351f21e00914b52df4e553 3612 
rustc_1.69.0+dfsg1-1~exp2.dsc
 9b8b0148cf5088f2b4599c6b5d40736e13fb93617c2e5f60fa9af44e6d099a0a 97852 
rustc_1.69.0+dfsg1-1~exp2.debian.tar.xz
 c9b05470768dbfaa56a232bb328e41f6185b3b0d3a9445d52fc639459478571f 9020 
rustc_1.69.0+dfsg1-1~exp2_source.buildinfo
Files:
 fe224183d69f1bb70118cabe173ce528 3612 devel optional 
rustc_1.69.0+dfsg1-1~exp2.dsc
 6f31fae94b0db4773354068403710c4a 97852 devel optional 
rustc_1.69.0+dfsg1-1~exp2.debian.tar.xz
 e1c2fc55d1ec25a7ba32b8ce9ebf8eb6 9020 devel optional 
rustc_1.69.0+dfsg1-1~exp2_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJVBAEBCgA/FiEEbdkGe7ToK0Amc9ppdh5TKjcTRTAFAmUBc0ghHGRlYmlhbkBm
YWJpYW4uZ3J1ZW5iaWNobGVyLmVtYWlsAAoJEHYeUyo3E0UwfkEP/i/dzUk27lzC
MBumybqchlkzyeGnVC0TrE//eIqWV6NYtT/d0VJpAZEzRclAf4fNsELlf/luTStl
nqXRcj8bDXS4za4yWv6Xc0izKnHCNMK/rAHyZ1bLku+DxF1TrPXoT+6M2Qs82wjv
Ffvs3+7QN3U4qltrA9TXQG/Oa0dKMGJiRUxJdp74gpKNxAnA6NOCXDYoQo8rkzoD
VNWK/yciAkQH29KbYMReIZYWN6NO9e5EU0uFFUww4OUsB9TqPVSgaOmWEieAzsDH
zqBW9UWF81tMrpIlceuo2NieA43EC7j19

Bug#1047740: marked as done (prosody: Fails to build source after successful build)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 09:06:46 +
with message-id 
and subject line Bug#1047740: fixed in prosody 0.12.4-1
has caused the Debian Bug report #1047740,
regarding prosody: Fails to build source after successful build
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1047740: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1047740
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: prosody
Version: 0.12.3-1
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-sab-20230813 ftbfs-source-after-build
User: debian...@lists.debian.org
Usertags: qa-doublebuild

Hi,

This package fails to build a source package after a successful build
(dpkg-buildpackage ; dpkg-buildpackage -S).

This is probably a clear violation of Debian Policy section 4.9 (clean target),
but this is filed as severity:minor for now, because a discussion on
debian-devel showed that we might want to revisit the requirement of a working
'clean' target.

More information about this class of issues, included common problems and
solutions, is available at
https://wiki.debian.org/qa.debian.org/FTBFS/SourceAfterBuild

Relevant part of the build log:
> cd /<> && runuser -u user42 -- dpkg-buildpackage --sanitize-env 
> -us -uc -rfakeroot -S
> --
> 
> dpkg-buildpackage: info: source package prosody
> dpkg-buildpackage: info: source version 0.12.3-1
> dpkg-buildpackage: info: source distribution unstable
> dpkg-buildpackage: info: source changed by Victor Seva 
>  dpkg-source --before-build .
>  fakeroot debian/rules clean
> dh clean
>debian/rules override_dh_auto_clean
> make[1]: Entering directory '/<>'
> if [ -f config.unix ]; then \
>   make -C tools/migration clean; \
>   make clean; \
>   rm -f config.unix; \
> fi
> make[2]: Entering directory '/<>/tools/migration'
> rm -f prosody-migrator.install
> rm -f migrator.cfg.lua.install
> make[2]: Leaving directory '/<>/tools/migration'
> make[2]: Entering directory '/<>'
> rm -f prosody.install
> rm -f prosodyctl.install
> rm -f prosody.cfg.lua.install
> rm -f prosody.version
> make clean -C util-src
> make[3]: Entering directory '/<>/util-src'
> rm -f encodings.so hashes.so net.so pposix.so signal.so table.so 
> ringbuffer.so time.so poll.so compat.so strbitop.so struct.so encodings.o 
> hashes.o net.o pposix.o signal.o table.o ringbuffer.o time.o poll.o compat.o 
> strbitop.o struct.o
> make[3]: Leaving directory '/<>/util-src'
> make[2]: Leaving directory '/<>'
> rm -f prosody.8 prosodyctl.8 ejabberd2prosody.8 prosody-migrator.8
> make[1]: Leaving directory '/<>'
>dh_clean
>  dpkg-source -b .
> dpkg-source: info: using source format '3.0 (quilt)'
> dpkg-source: info: verifying ./prosody_0.12.3.orig.tar.gz.asc
> gpgv: Signature made Tue Feb 21 10:07:08 2023 UTC
> gpgv:using RSA key 32A9EDDE3609931EB98CEAC315907E8E7BDD6BFE
> gpgv: Note: signatures using the SHA1 algorithm are rejected
> gpgv: Can't check signature: Bad public key
> dpkg-source: warning: cannot verify upstream tarball signature for 
> ./prosody_0.12.3.orig.tar.gz: no acceptable signature found
> dpkg-source: info: building prosody using existing 
> ./prosody_0.12.3.orig.tar.gz
> dpkg-source: info: building prosody using existing 
> ./prosody_0.12.3.orig.tar.gz.asc
> dpkg-source: info: using patch list from debian/patches/series
> dpkg-source: error: cannot represent change to util/compat.so: binary file 
> contents changed
> dpkg-source: error: add util/compat.so in debian/source/include-binaries if 
> you want to store the modified binary in the debian tarball
> dpkg-source: error: cannot represent change to util/encodings.so: binary file 
> contents changed
> dpkg-source: error: add util/encodings.so in debian/source/include-binaries 
> if you want to store the modified binary in the debian tarball
> dpkg-source: error: cannot represent change to util/hashes.so: binary file 
> contents changed
> dpkg-source: error: add util/hashes.so in debian/source/include-binaries if 
> you want to store the modified binary in the debian tarball
> dpkg-source: error: cannot represent change to util/net.so: binary file 
> contents changed
> dpkg-source: error: add util/net.so in debian/source/include-binaries if you 
> want to store the modified binary in the debian tarball
> dpkg-source: error: cannot represent change to util/poll.so: binary file 
> contents changed
> dpkg-source: error: add util/poll.so in debian/source/include-binaries if

Bug#1051090: marked as done (emacsql: FTBFS: 5 unexpected results)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 09:04:05 +
with message-id 
and subject line Bug#1051090: fixed in emacsql 3.1.1+git20230417.6401226+ds-1
has caused the Debian Bug report #1051090,
regarding emacsql: FTBFS: 5 unexpected results
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051090: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051090
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: emacsql
Version: 3.1.1+ds-1 
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)

Dear maintainer,

emacsql fails to build from source with errors in the testsuite. From my
build log on amd64:

| Ran 24 tests, 19 results as expected, 5 unexpected (2023-09-01 08:04:24+, 
0.351282 sec)
| 
| 5 unexpected results:
|FAILED  emacsql-basic
|FAILED  emacsql-error
|FAILED  emacsql-foreign-key
|FAILED  emacsql-nul-character
|FAILED  emacsql-special-chars
| 
| dh_elpa_test: error: emacs -batch -Q -l package --eval "(add-to-list 
'package-directory-list \"/usr/share/emacs/site-lisp/elpa\")" --eval 
"(add-to-list 'package-directory-list \"/usr/share/emacs/site-lisp/elpa-src\")" 
-f package-initialize -L . -L tests --eval "(unless (and (getenv 
\"AUTOPKGTEST_TMP\") (file-directory-p (getenv \"AUTOPKGTEST_TMP\"))) (setq 
emacsql-sqlite-executable (concat default-directory 
\"sqlite/emacsql-sqlite\")))" -l tests/emacsql-compiler-tests.el -l 
tests/emacsql-external-tests.el --eval \(ert-run-tests-batch-and-exit\) 
returned exit code 1
| make: *** [debian/rules:4: binary-arch] Error 25
| dpkg-buildpackage: error: debian/rules binary-arch subprocess returned exit 
status 2

A full build log on riscv64 is also available:
https://buildd.debian.org/status/fetch.php?pkg=emacsql&arch=riscv64&ver=3.1.1%2Bds-1&stamp=1693407418&raw=0

Regards
Aurelien
--- End Message ---
--- Begin Message ---
Source: emacsql
Source-Version: 3.1.1+git20230417.6401226+ds-1
Done: Sean Whitton 

We believe that the bug you reported is fixed in the latest version of
emacsql, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sean Whitton  (supplier of updated emacsql package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 09:28:28 +0100
Source: emacsql
Architecture: source
Version: 3.1.1+git20230417.6401226+ds-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Emacsen team 
Changed-By: Sean Whitton 
Closes: 1051090
Changes:
 emacsql (3.1.1+git20230417.6401226+ds-1) unstable; urgency=medium
 .
   [ Aymeric Agon-Rambosson ]
   * Update to new upstream version 3.1.1+git20230417.6401226+ds : needed
 to repair magit after release of emacs 1:29.1+1-1 (see
 https://github.com/magit/forge/issues/535) (Closes: #1051090).
   * Bump Standards-Version to 4.6.2 (no changes required).
   * d/control : update Homepage.
   * Specify dependencies manually between backends and high-level
 abstractions (discrepancy in version numbering format made backends
 unupgradeable).
   * Add new upstream files to d/elpa-emacsql-sqlite.elpa.
   * d/rules: add binary hardening options.
Checksums-Sha1:
 6d8924105d5a9a9b83699c069687e4996733aacd 2498 
emacsql_3.1.1+git20230417.6401226+ds-1.dsc
 d000e191cadf92208043c0179d5be1aae77ac9ca 31992 
emacsql_3.1.1+git20230417.6401226+ds.orig.tar.xz
 975736b985988a26151ee75c2c05abb19fa5c3fc 5352 
emacsql_3.1.1+git20230417.6401226+ds-1.debian.tar.xz
Checksums-Sha256:
 bdfbe2c921301da75e17b4688df89cbf8a0b6e8ffd11624023da12332a872491 2498 
emacsql_3.1.1+git20230417.6401226+ds-1.dsc
 da9832a21fe4d2f9fe58a9a96836632093c07995814ab9dde62731e167f7f5eb 31992 
emacsql_3.1.1+git20230417.6401226+ds.orig.tar.xz
 f96249b56a0f430708ccdbb6f8e2589f466891e9c4b854658eca568794297491 5352 
emacsql_3.1.1+git20230417.6401226+ds-1.debian.tar.xz
Files:
 4c2522b539fd69217e0544dcd46051ca 2498 editors optional 
emacsql_3.1.1+git20230417.6401226+ds-1.dsc
 95b2bf7475193bed897dfb038c4a8e1f 31992 editors optional 
emacsql_3.1.1+git20230417.6401226+ds.orig.tar.xz
 1c723a05d06b5d124f2ed19269efdf1f 5352 

Bug#993048: marked as done (mosquitto init script broken with bullseye update)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 08:37:53 +
with message-id 
and subject line Bug#993048: fixed in mosquitto 2.0.17-1
has caused the Debian Bug report #993048,
regarding mosquitto init script broken with bullseye update
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
993048: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993048
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mosquitto
Version: 2.0.11-1
Severity: important
Tags: patch

Dear Maintainer,

With the 2.0 upgrade, mosquitto now writes a pid file on it's own as the
mosquitto user. This breaks the init script as the run directory is root
writable, and on top of that the init script uses s-s-d to also write a
root-owned pid file. The attached patch should match the behavior of the
systemd file, which is let the daemon write it's own pid file in
/var/run/mosquitto/ and chowns the dir to allow it. I have disabled
s-s-d from making a root owned file, and also added a match to the
mosquitto user for stopping/reloading as the new policy says non-root
pid files are insecure unless additional matches are present.


Oh, and listener 1883 needs to be added ito the config otherwise mosquitto
only listens on loopback which will break most existing installs.

references:
https://issues.apache.org/jira/secure/attachment/13001569/0001-Fix-init-script-for-debian-Buster.patch
https://github.com/eclipse/mosquitto/issues/1950

-- System Information:
Debian Release: 11.0
 APT prefers stable
 APT policy: (700, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages mosquitto depends on:
ii  adduser3.118
ii  libc6  2.31-13
ii  libcjson1  1.7.14-1
ii  libdlt22.18.6-1
ii  libelogind0 [libsystemd0]  246.9.1-1+debian1
ii  libmosquitto1  2.0.11-1
ii  libssl1.1  1.1.1k-1
ii  libwebsockets164.0.20-2
ii  libwrap0   7.6.q-31
ii  lsb-base   11.1.0

mosquitto recommends no packages.

Versions of packages mosquitto suggests:
ii  apparmor  2.13.6-10

-- Configuration Files:
/etc/init.d/mosquitto changed:
set -e
PIDFILE=/run/mosquitto/mosquitto.pid
DAEMON=/usr/sbin/mosquitto
USER=mosquitto
test -x ${DAEMON} || exit 0
umask 022
. /lib/lsb/init-functions
run_by_init() {
   ([ "$previous" ] && [ "$runlevel" ]) || [ "$runlevel" = S ]
}
export PATH="${PATH:+$PATH:}/usr/sbin:/sbin"
case "$1" in
 start)
if init_is_upstart; then
exit 1
fi
log_daemon_msg "Starting network daemon:" "mosquitto"
/bin/mkdir -m 740 -p /var/log/mosquitto
/bin/chown mosquitto /var/log/mosquitto
/bin/mkdir -m 740 -p /run/mosquitto
/bin/chown mosquitto /run/mosquitto
if start-stop-daemon --start --quiet --oknodo --background  --user 
${USER} --pidfile ${PIDFILE} --exec ${DAEMON} -- -c 
/etc/mosquitto/mosquitto.conf ; then
log_end_msg 0
else
log_end_msg 1
fi
;;
 stop)
if init_is_upstart; then
exit 0
fi
log_daemon_msg "Stopping network daemon:" "mosquitto"
if start-stop-daemon --stop --quiet --oknodo --user ${USER} --pidfile 
${PIDFILE}; then
log_end_msg 0
rm -f ${PIDFILE}
else
log_end_msg 1
fi
;;
 reload|force-reload)
if init_is_upstart; then
exit 1
fi
log_daemon_msg "Reloading network daemon configuration:" "mosquitto"
   if start-stop-daemon --stop --signal HUP --quiet --oknodo --user ${USER} 
--pidfile $PIDFILE; then
   log_end_msg 0
   else
   log_end_msg 1
   fi   
;;
 restart)
if init_is_upstart; then
exit 1
fi
log_daemon_msg "Restarting network daemon:" "mosquitto"
if start-stop-daemon --stop --quiet --oknodo --retry 30 --user ${USER} 
--pidfile ${PIDFILE}; then
rm -f ${PIDFILE}
fi

/bin/mkdir -m 740 -p /var/log/mosquitto
/bin/chown mosquitto /var/log/mosquitto
/bin/mkdir -m 740 -p /run/mosquitto
/bin/chown mosquitto /run/mosquitto
if start-stop-daemon --start --quiet --oknodo --background --pidfile 
${PIDFILE} --user ${USER} --exec ${DAEMON} -- -c /etc/mosqu

Bug#706695: marked as done (phpldapadmin: PHP dependency choices do not include php5-fpm)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 08:38:03 +
with message-id 
and subject line Bug#706695: fixed in phpldapadmin 1.2.6.6-1
has caused the Debian Bug report #706695,
regarding phpldapadmin: PHP dependency choices do not include php5-fpm
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
706695: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706695
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: phpldapadmin
Version: 1.2.2-5
Severity: normal

Dear Maintainer,

The phpldapadmin package depends on libapache2-mod-php5 | php5-cli,
however other methods could be used to run the application, including
php5-fpm. I would suggest one of the following two changes:

1) Change the dependency to (libapache2-mod-php5 | php5-cli | php5-fpm)

2) Change the dependency to the metapackage php5, as that may better
cover the available options. It currently requires one of the following:
libapache2-mod-php5 | libapache2-mod-php5filter | php5-cgi | php5-fpm

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages phpldapadmin depends on:
ii  apache2-mpm-worker [httpd]  2.2.22-13
ii  debconf [debconf-2.0]   1.5.49
ii  php5-cli5.4.4-14
ii  php5-ldap   5.4.4-14
ii  ucf 3.0025+nmu3

phpldapadmin recommends no packages.

phpldapadmin suggests no packages.
--- End Message ---
--- Begin Message ---
Source: phpldapadmin
Source-Version: 1.2.6.6-1
Done: William Desportes 

We believe that the bug you reported is fixed in the latest version of
phpldapadmin, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 706...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
William Desportes  (supplier of updated phpldapadmin 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 10:08:24 +0200
Source: phpldapadmin
Architecture: source
Version: 1.2.6.6-1
Distribution: unstable
Urgency: medium
Maintainer: Fabio Tranchitella 
Changed-By: William Desportes 
Closes: 706695 1033387 1051391
Changes:
 phpldapadmin (1.2.6.6-1) unstable; urgency=medium
 .
   * New upstream version 1.2.6.6
   * Add myself to Uploaders
   * Update Standards-Version to 4.6.2
   * Add d/upstream/metadata
   * Add Vcs-* and Homepage
   * Run wrap-and-sort
   * Add Romanian translation (Closes: #1033387)
   * Add gbp.conf
   * Update patches Forwarded fields (Closes: #706695)
   * Drop all forwarded patches (Closes: #1051391)
   * Refresh patches
   * Add a patch for PHP 8.2 deprecated $var strings
   * Add selenium DEP-8 tests
   * Improve the d/copyright
Checksums-Sha1:
 d671eab4a5a6229e0a0a0cc5f98394d8ef04efe4 2151 phpldapadmin_1.2.6.6-1.dsc
 b8343d06ce0e43cf90067de647313f77402fadf4 1132820 
phpldapadmin_1.2.6.6.orig.tar.gz
 28f8fb415b99cc4a7ec3fb2500d582b16edf33b6 35864 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 05681beb3a8bcd8bdd9924f713b2b9d847611901 5672 
phpldapadmin_1.2.6.6-1_source.buildinfo
Checksums-Sha256:
 1788b8b4aff3c99e85bfd0149aa6cad3b3b78dc2593ae1c4910538517ed7bf97 2151 
phpldapadmin_1.2.6.6-1.dsc
 7a8c02a611e60aa6713d1cf863dfac9637e23c3f4d401ea5e47dbe2b22d4895a 1132820 
phpldapadmin_1.2.6.6.orig.tar.gz
 a3790a871367392d0e21a569e563a7a442550b5018130ef7a567bcddc2727098 35864 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 930677b7df6e581d88019085f7cc6dbb05eb0828cca0f7af305f142bb2567d9a 5672 
phpldapadmin_1.2.6.6-1_source.buildinfo
Files:
 8261615b69e9e5b97412e58d9cf5a3ce 2151 admin optional phpldapadmin_1.2.6.6-1.dsc
 3daa789ce0811f5a586ad0153decad4b 1132820 admin optional 
phpldapadmin_1.2.6.6.orig.tar.gz
 273846884fd5b6e952d7cde943e068e1 35864 admin optional 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 3869c71f682a12d353d477dee4daa002 5672 admin optional 
phpldapadmin_1.2.6.6-1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEExNkf3872tKPGU/14kKDvG4JRqIkFAmUBcJ4ACgkQkKDvG4JR
qInHVQ//WvFutCaC4nWKgNnxKUnpFyOTmbASjwHZlrC8m82EeqdRj6Gbtb7bIqYO
PpF85mOVKq

Bug#1033387: marked as done ([INTL:ro] Romanian debconf templates translation of phpldapadmin)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 08:38:03 +
with message-id 
and subject line Bug#1033387: fixed in phpldapadmin 1.2.6.6-1
has caused the Debian Bug report #1033387,
regarding [INTL:ro] Romanian debconf templates translation of phpldapadmin
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033387: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033387
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: phpldapadmin
Version: N/A
Severity: wishlist
Tags: l10n, patch

Dear Maintainer,

Please find attached the Romanian translation of the «phpldapadmin» file.

Thanks,
Remus-Gabriel

phpldapadmin_debconf_ro.po
Description: Binary data
--- End Message ---
--- Begin Message ---
Source: phpldapadmin
Source-Version: 1.2.6.6-1
Done: William Desportes 

We believe that the bug you reported is fixed in the latest version of
phpldapadmin, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
William Desportes  (supplier of updated phpldapadmin 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 10:08:24 +0200
Source: phpldapadmin
Architecture: source
Version: 1.2.6.6-1
Distribution: unstable
Urgency: medium
Maintainer: Fabio Tranchitella 
Changed-By: William Desportes 
Closes: 706695 1033387 1051391
Changes:
 phpldapadmin (1.2.6.6-1) unstable; urgency=medium
 .
   * New upstream version 1.2.6.6
   * Add myself to Uploaders
   * Update Standards-Version to 4.6.2
   * Add d/upstream/metadata
   * Add Vcs-* and Homepage
   * Run wrap-and-sort
   * Add Romanian translation (Closes: #1033387)
   * Add gbp.conf
   * Update patches Forwarded fields (Closes: #706695)
   * Drop all forwarded patches (Closes: #1051391)
   * Refresh patches
   * Add a patch for PHP 8.2 deprecated $var strings
   * Add selenium DEP-8 tests
   * Improve the d/copyright
Checksums-Sha1:
 d671eab4a5a6229e0a0a0cc5f98394d8ef04efe4 2151 phpldapadmin_1.2.6.6-1.dsc
 b8343d06ce0e43cf90067de647313f77402fadf4 1132820 
phpldapadmin_1.2.6.6.orig.tar.gz
 28f8fb415b99cc4a7ec3fb2500d582b16edf33b6 35864 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 05681beb3a8bcd8bdd9924f713b2b9d847611901 5672 
phpldapadmin_1.2.6.6-1_source.buildinfo
Checksums-Sha256:
 1788b8b4aff3c99e85bfd0149aa6cad3b3b78dc2593ae1c4910538517ed7bf97 2151 
phpldapadmin_1.2.6.6-1.dsc
 7a8c02a611e60aa6713d1cf863dfac9637e23c3f4d401ea5e47dbe2b22d4895a 1132820 
phpldapadmin_1.2.6.6.orig.tar.gz
 a3790a871367392d0e21a569e563a7a442550b5018130ef7a567bcddc2727098 35864 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 930677b7df6e581d88019085f7cc6dbb05eb0828cca0f7af305f142bb2567d9a 5672 
phpldapadmin_1.2.6.6-1_source.buildinfo
Files:
 8261615b69e9e5b97412e58d9cf5a3ce 2151 admin optional phpldapadmin_1.2.6.6-1.dsc
 3daa789ce0811f5a586ad0153decad4b 1132820 admin optional 
phpldapadmin_1.2.6.6.orig.tar.gz
 273846884fd5b6e952d7cde943e068e1 35864 admin optional 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 3869c71f682a12d353d477dee4daa002 5672 admin optional 
phpldapadmin_1.2.6.6-1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=9Oem
-END PGP SIGNATURE End Message ---


Bug#1051391: marked as done (phpldapadmin: unable to login with PHP 7.4)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 08:38:03 +
with message-id 
and subject line Bug#1051391: fixed in phpldapadmin 1.2.6.6-1
has caused the Debian Bug report #1051391,
regarding phpldapadmin: unable to login with PHP 7.4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051391: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051391
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: phpldapadmin


Version: 1.2.6.3-0.3
Severity: normal

After updating phpldapadmin to version 1.2.6.3-0.3, I am unable to connect to 
the LDAP database
The error I get is UNHANDLED, $resource is not a resource

I am using Debian GNU/Linux 12 (bookworm) 5.10.0-20-amd64 #1 SMP Debian 
5.10.158-2 (2022-12-13) x86_64 GNU/Linux

--- End Message ---
--- Begin Message ---
Source: phpldapadmin
Source-Version: 1.2.6.6-1
Done: William Desportes 

We believe that the bug you reported is fixed in the latest version of
phpldapadmin, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
William Desportes  (supplier of updated phpldapadmin 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 13 Sep 2023 10:08:24 +0200
Source: phpldapadmin
Architecture: source
Version: 1.2.6.6-1
Distribution: unstable
Urgency: medium
Maintainer: Fabio Tranchitella 
Changed-By: William Desportes 
Closes: 706695 1033387 1051391
Changes:
 phpldapadmin (1.2.6.6-1) unstable; urgency=medium
 .
   * New upstream version 1.2.6.6
   * Add myself to Uploaders
   * Update Standards-Version to 4.6.2
   * Add d/upstream/metadata
   * Add Vcs-* and Homepage
   * Run wrap-and-sort
   * Add Romanian translation (Closes: #1033387)
   * Add gbp.conf
   * Update patches Forwarded fields (Closes: #706695)
   * Drop all forwarded patches (Closes: #1051391)
   * Refresh patches
   * Add a patch for PHP 8.2 deprecated $var strings
   * Add selenium DEP-8 tests
   * Improve the d/copyright
Checksums-Sha1:
 d671eab4a5a6229e0a0a0cc5f98394d8ef04efe4 2151 phpldapadmin_1.2.6.6-1.dsc
 b8343d06ce0e43cf90067de647313f77402fadf4 1132820 
phpldapadmin_1.2.6.6.orig.tar.gz
 28f8fb415b99cc4a7ec3fb2500d582b16edf33b6 35864 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 05681beb3a8bcd8bdd9924f713b2b9d847611901 5672 
phpldapadmin_1.2.6.6-1_source.buildinfo
Checksums-Sha256:
 1788b8b4aff3c99e85bfd0149aa6cad3b3b78dc2593ae1c4910538517ed7bf97 2151 
phpldapadmin_1.2.6.6-1.dsc
 7a8c02a611e60aa6713d1cf863dfac9637e23c3f4d401ea5e47dbe2b22d4895a 1132820 
phpldapadmin_1.2.6.6.orig.tar.gz
 a3790a871367392d0e21a569e563a7a442550b5018130ef7a567bcddc2727098 35864 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 930677b7df6e581d88019085f7cc6dbb05eb0828cca0f7af305f142bb2567d9a 5672 
phpldapadmin_1.2.6.6-1_source.buildinfo
Files:
 8261615b69e9e5b97412e58d9cf5a3ce 2151 admin optional phpldapadmin_1.2.6.6-1.dsc
 3daa789ce0811f5a586ad0153decad4b 1132820 admin optional 
phpldapadmin_1.2.6.6.orig.tar.gz
 273846884fd5b6e952d7cde943e068e1 35864 admin optional 
phpldapadmin_1.2.6.6-1.debian.tar.xz
 3869c71f682a12d353d477dee4daa002 5672 admin optional 
phpldapadmin_1.2.6.6-1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEExNkf3872tKPGU/14kKDvG4JRqIkFAmUBcJ4ACgkQkKDvG4JR
qInHVQ//WvFutCaC4nWKgNnxKUnpFyOTmbASjwHZlrC8m82EeqdRj6Gbtb7bIqYO
PpF85mOVKqdIIah8HxGm4LKEzaOsQENx/OzHgNEFODbhVg/Bi59SJLINcCGl1KLu
NZ+ilbpnxeKdzNU2TCEi0eTnH7evo9f2yHUlR4w+ELIBzcWTv096zjDKkANh2vpD
v5TunIQAik0pmji7tSmQ0ieWq5IDKfWPCkK6Nr1Js4QTfKS9uZ1KusNB+q40izJ6
ZL43k98Jwi1ZUuBWWy/Jigzpd/ljiiwFnV8TK6a8UcQ4oElxn2P8sdI1dR4ekvn4
WJoI2YoO6Hypy32IbeGzMYjT4Z1rSPJZZ6gVdsDAyuw3QlDsLAI8p2807QWEZmuf
Krp1JZAggKKAoh0yChOZN5DGCrTWlXdHuW/yfFZW/cLeDKzH79hUqLlWYgxaKgs3
diFE4UxdwFy/3/0gItNwmD9NhCl0Ke9ilxoXciM1D34yEK08W2ugCP9OidhVYNOy
5s4YHEBf8/k5hXPgcZbwlp6XSQb+Xjw5fm+CdI0drkRyh2sH+oh2hNzVKwy8TrVZ
mNwuTIfPehF9S/6z5QhvFpKtNQ5TzQKBVue/t51c0OQD2ourBxBGgbnDmRr4yd2s
EtDl+yOljj6MsVlTsovxHmEMLEcuA9YbQz5W59z193Nz/cxttnk=
=9Oem
-END PGP SIGNATURE End Message ---


Bug#994442: marked as done (python3-pyo: Silently crash with 4/167 dead streams)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 04:21:18 -0400
with message-id <20230913082118.5472bhgg3h3ktedq@x1>
and subject line Can't reproduce, MIA reporter
has caused the Debian Bug report #994442,
regarding python3-pyo: Silently crash with 4/167 dead streams
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
994442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994442
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python3-pyo
Version: 1.0.4-1+b1
Severity: important
Tags: upstream
X-Debbugs-Cc: d...@groolot.net

Dear Maintainer,

   In software "pyoChainsaw"
   (https://framagit.org/groolot-association/chainsaw) based on
   "python3-pyo", a needly flood of OSC messages kill the audio
   server. Before the update to 1.0.4, it wasn't detected but maybe
   existent. By the way, version 1.0.2 hasn't the problem.
   
   Nothing but not OSC flooding is effective to not reproduce the
   crash.

Sincerely,
Grégory David

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-8-amd64 (SMP w/8 CPU threads)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages python3-pyo depends on:
ii  libc6 2.32-3
ii  libjack-jackd2-0 [libjack-0.125]  1.9.19~dfsg-2
ii  liblo70.31-1
ii  libportaudio2 19.6.0-1.1
ii  libportmidi0  1:217-6
ii  libsndfile1   1.0.31-2
ii  python3   3.9.2-3

Versions of packages python3-pyo recommends:
ii  jackd2  1.9.19~dfsg-2
ii  python3-tk  3.9.7-1

python3-pyo suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---

-- 
Tiago Vaz
https://tvaz.cc--- End Message ---


Bug#1036701: marked as done (gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 07:49:10 +
with message-id 
and subject line Bug#1036701: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1036701,
regarding gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1036701: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2023-2837[0]:
| Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to
| 2.2.2.

https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17/
https://github.com/gpac/gpac/commit/6f28c4cd607d83ce381f9b4a9f8101ca1e79c611

CVE-2023-2838[1]:
| Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.

https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f/
https://github.com/gpac/gpac/commit/c88df2e202efad214c25b4e586f243b2038779ba

CVE-2023-2839[2]:
| Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.

https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f/
https://github.com/gpac/gpac/commit/047f96fb39e6bf70cb9f344093f5886e51dce0ac

CVE-2023-2840[3]:
| NULL Pointer Dereference in GitHub repository gpac/gpac prior to
| 2.2.2.

https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257/
https://github.com/gpac/gpac/commit/ba59206b3225f0e8e95a27eff41cb1c49ddf9a3

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-2837
https://www.cve.org/CVERecord?id=CVE-2023-2837
[1] https://security-tracker.debian.org/tracker/CVE-2023-2838
https://www.cve.org/CVERecord?id=CVE-2023-2838
[2] https://security-tracker.debian.org/tracker/CVE-2023-2839
https://www.cve.org/CVERecord?id=CVE-2023-2839
[3] https://security-tracker.debian.org/tracker/CVE-2023-2840
https://www.cve.org/CVERecord?id=CVE-2023-2840

Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Source: gpac
Source-Version: 2.2.1+dfsg1-2
Done: Shengjing Zhu 

We believe that the bug you reported is fixed in the latest version of
gpac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1036...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Shengjing Zhu  (supplier of updated gpac package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 13 Sep 2023 14:56:05 +0800
Source: gpac
Architecture: source
Version: 2.2.1+dfsg1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Shengjing Zhu 
Closes: 1033116 1034187 1034732 1034890 1036701 1041380
Changes:
 gpac (2.2.1+dfsg1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group  (See #1038784)
   * Upload to unstable.
   * Backport patch to build with ffmpeg 6.0 (Closes: #1041380)
 .
 gpac (2.2.1+dfsg1-1) experimental; urgency=medium
 .
   * New upstream version,
 closes: #1033116, #1034732, #1034187, #1036701, #1034890
   * soname bump libgpac11 -> libgpac12
Checksums-Sha1:
 515d078cd5d15d313aee64dbd9f4e67cf8f3cef7 1792 gpac_2.2.1+dfsg1-2.dsc
 9d039fa233084402316bd9cb408c07e638b9e1d0 37648 gpac_2.2.1+dfsg1-2.debian.tar.xz
 701e4931c4284d79759357714aec8292f05c1236 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Checksums-Sha256:
 fec96c4cc0e5b24291bd9c057959f945bd70f3eff64e19059cebee6f4c71b5cc 1792 
gpac_2.2.1+dfsg1-2.dsc
 af3728f8e7f919a92f63013a2b8c77143202f68d2320fb1c3bede45696cb133b 37648 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 e1f7d5b34b614d5575a1935c714b3deef8e6a3f752888a5e1e793d13c0e842fd 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Files:
 97d4a6d4b6b9495e9d629076fdc3f00a 1792 graphics optional gpac_2.2.1+dfsg1-2.dsc
 59c4c28301588d18b2772b4d7d2c01d1 37648 graphics optional 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 13e61d51c866f3a27f2b029ed6e9b2b4 5325 graphics optional 
gpac_2.2.1+dfsg1-2_source.buildinfo

-BEGIN PGP SIGNATURE--

Bug#1034890: marked as done (gpac: CVE-2023-0841)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 07:49:10 +
with message-id 
and subject line Bug#1034890: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1034890,
regarding gpac: CVE-2023-0841
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1034890: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034890
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerability was published for gpac.

CVE-2023-0841[0]:
| A vulnerability, which was classified as critical, has been found in
| GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function
| mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation
| leads to heap-based buffer overflow. The attack may be initiated
| remotely. The exploit has been disclosed to the public and may be
| used. The associated identifier of this vulnerability is VDB-221087.

Only reference here is the following, doesn't seem to have been forwarded:
https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-0841
https://www.cve.org/CVERecord?id=CVE-2023-0841

Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Source: gpac
Source-Version: 2.2.1+dfsg1-2
Done: Shengjing Zhu 

We believe that the bug you reported is fixed in the latest version of
gpac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1034...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Shengjing Zhu  (supplier of updated gpac package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 13 Sep 2023 14:56:05 +0800
Source: gpac
Architecture: source
Version: 2.2.1+dfsg1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Shengjing Zhu 
Closes: 1033116 1034187 1034732 1034890 1036701 1041380
Changes:
 gpac (2.2.1+dfsg1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group  (See #1038784)
   * Upload to unstable.
   * Backport patch to build with ffmpeg 6.0 (Closes: #1041380)
 .
 gpac (2.2.1+dfsg1-1) experimental; urgency=medium
 .
   * New upstream version,
 closes: #1033116, #1034732, #1034187, #1036701, #1034890
   * soname bump libgpac11 -> libgpac12
Checksums-Sha1:
 515d078cd5d15d313aee64dbd9f4e67cf8f3cef7 1792 gpac_2.2.1+dfsg1-2.dsc
 9d039fa233084402316bd9cb408c07e638b9e1d0 37648 gpac_2.2.1+dfsg1-2.debian.tar.xz
 701e4931c4284d79759357714aec8292f05c1236 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Checksums-Sha256:
 fec96c4cc0e5b24291bd9c057959f945bd70f3eff64e19059cebee6f4c71b5cc 1792 
gpac_2.2.1+dfsg1-2.dsc
 af3728f8e7f919a92f63013a2b8c77143202f68d2320fb1c3bede45696cb133b 37648 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 e1f7d5b34b614d5575a1935c714b3deef8e6a3f752888a5e1e793d13c0e842fd 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Files:
 97d4a6d4b6b9495e9d629076fdc3f00a 1792 graphics optional gpac_2.2.1+dfsg1-2.dsc
 59c4c28301588d18b2772b4d7d2c01d1 37648 graphics optional 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 13e61d51c866f3a27f2b029ed6e9b2b4 5325 graphics optional 
gpac_2.2.1+dfsg1-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQSRhdT1d2eu7mxV1B5/RPol6lUUywUCZQFiHAAKCRB/RPol6lUU
y1LPAP46U6+EIJ9QVlkB7/alzOVjS8rwJtv3AXCP8hiN1MQmzwD/eA+xNfWYmjYC
ttFLF72wb/NNs+Jvc+UX71Z/j73NJwQ=
=4Rgn
-END PGP SIGNATURE End Message ---


Bug#1034732: marked as done (Keep out of testing)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 07:49:09 +
with message-id 
and subject line Bug#1034732: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1034732,
regarding Keep out of testing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1034732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034732
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gpac
Version: 2.0.0+dfsg1-2+b1
Severity: serious

In some discussion between Reinhard, Sebastian and the Security team we've come 
to the
conclusion that gpac isn't suitable to be included in a stable release. The 
massive
influx of security issues makes that untenable (and there's no suitable LTS 
branch
we could use, which e.g. makes ffmpeg manageable).

Sebastian has already updated x264 to no longer depend on it, when x264
2:0.164.3095+gitbaee400-3 has reached testing, gpac can be dropped. The only
other rdep in ccextractor, which is already out of testing due to a lack of
support for ffmpeg 5.

Cheers,
Moritz
--- End Message ---
--- Begin Message ---
Source: gpac
Source-Version: 2.2.1+dfsg1-2
Done: Shengjing Zhu 

We believe that the bug you reported is fixed in the latest version of
gpac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1034...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Shengjing Zhu  (supplier of updated gpac package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 13 Sep 2023 14:56:05 +0800
Source: gpac
Architecture: source
Version: 2.2.1+dfsg1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Shengjing Zhu 
Closes: 1033116 1034187 1034732 1034890 1036701 1041380
Changes:
 gpac (2.2.1+dfsg1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group  (See #1038784)
   * Upload to unstable.
   * Backport patch to build with ffmpeg 6.0 (Closes: #1041380)
 .
 gpac (2.2.1+dfsg1-1) experimental; urgency=medium
 .
   * New upstream version,
 closes: #1033116, #1034732, #1034187, #1036701, #1034890
   * soname bump libgpac11 -> libgpac12
Checksums-Sha1:
 515d078cd5d15d313aee64dbd9f4e67cf8f3cef7 1792 gpac_2.2.1+dfsg1-2.dsc
 9d039fa233084402316bd9cb408c07e638b9e1d0 37648 gpac_2.2.1+dfsg1-2.debian.tar.xz
 701e4931c4284d79759357714aec8292f05c1236 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Checksums-Sha256:
 fec96c4cc0e5b24291bd9c057959f945bd70f3eff64e19059cebee6f4c71b5cc 1792 
gpac_2.2.1+dfsg1-2.dsc
 af3728f8e7f919a92f63013a2b8c77143202f68d2320fb1c3bede45696cb133b 37648 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 e1f7d5b34b614d5575a1935c714b3deef8e6a3f752888a5e1e793d13c0e842fd 5325 
gpac_2.2.1+dfsg1-2_source.buildinfo
Files:
 97d4a6d4b6b9495e9d629076fdc3f00a 1792 graphics optional gpac_2.2.1+dfsg1-2.dsc
 59c4c28301588d18b2772b4d7d2c01d1 37648 graphics optional 
gpac_2.2.1+dfsg1-2.debian.tar.xz
 13e61d51c866f3a27f2b029ed6e9b2b4 5325 graphics optional 
gpac_2.2.1+dfsg1-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQSRhdT1d2eu7mxV1B5/RPol6lUUywUCZQFiHAAKCRB/RPol6lUU
y1LPAP46U6+EIJ9QVlkB7/alzOVjS8rwJtv3AXCP8hiN1MQmzwD/eA+xNfWYmjYC
ttFLF72wb/NNs+Jvc+UX71Z/j73NJwQ=
=4Rgn
-END PGP SIGNATURE End Message ---


Bug#1033116: marked as done (gpac: CVE-2022-3222 CVE-2023-0866 CVE-2022-4202 CVE-2022-43039 CVE-2023-23143 CVE-2023-23144 CVE-2023-23145 CVE-2022-43040 CVE-2022-43042 CVE-2022-43043 CVE-2022-43044 CVE

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 07:49:09 +
with message-id 
and subject line Bug#1033116: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1033116,
regarding gpac: CVE-2022-3222 CVE-2023-0866 CVE-2022-4202 CVE-2022-43039 
CVE-2023-23143 CVE-2023-23144 CVE-2023-23145 CVE-2022-43040 CVE-2022-43042 
CVE-2022-43043 CVE-2022-43044 CVE-2022-43045 CVE-2022-45202 CVE-2022-45283 
CVE-2022-45343 CVE-2022-46489 CVE-2022-46490 CVE-2022-47086 CVE-2022-47087 
CVE-2022-47088 CVE-2022-47089 CVE-2022-47091 CVE-2022-47092 CVE-2022-47093 
CVE-2022-47094 CVE-2022-47095 CVE-2022-47653 CVE-2022-47654 CVE-2022-47656 
CVE-2022-47657 CVE-2022-47658 CVE-2022-47659 CVE-2022-47660 CVE-2022-47661 
CVE-2022-47662 CVE-2022-47663 CVE-2023-0358 CVE-2023-0760 CVE-2023-0770 
CVE-2023-0817 CVE-2023-0818 CVE-2023-0819
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033116: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033116
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2022-3222[0]:
| Uncontrolled Recursion in GitHub repository gpac/gpac prior to
| 2.1.0-DEV.

https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235/
https://github.com/gpac/gpac/commit/4e7736d7ec7bf64026daa611da951993bb42fdaf

CVE-2023-0866[2]:
| Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to
| 2.3.0-DEV.

https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f
https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937

CVE-2022-4202[3]:
| A vulnerability, which was classified as problematic, was found in
| GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function
| lsr_translate_coords of the file laser/lsr_dec.c. The manipulation
| leads to integer overflow. It is possible to launch the attack
| remotely. The exploit has been disclosed to the public and may be
| used. The name of the patch is
| b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a
| patch to fix this issue. VDB-214518 is the identifier assigned to this
| vulnerability.

https://github.com/gpac/gpac/issues/2333
https://github.com/gpac/gpac/commit/b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908

CVE-2022-43039[4]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_isom_meta_restore_items_ref
| at /isomedia/meta.c.

https://github.com/gpac/gpac/issues/2281
https://github.com/gpac/gpac/commit/62dbd5caad6b89b33535dfa19ef65419f0378303

CVE-2023-23143[5]:
| Buffer overflow vulnerability in function avc_parse_slice in file
| media_tools/av_parsers.c. GPAC version 2.3-DEV-rev1-g4669ba229-master.

https://github.com/gpac/gpac/commit/af6a5e7a96ee01a139cce6c9e4edfc069aad17a6

CVE-2023-23144[6]:
| Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file
| bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master.

https://github.com/gpac/gpac/commit/3a2458a49b3e6399709d456d7b35e7a6f50cfb86

CVE-2023-23145[7]:
| GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a
| memory leak in lsr_read_rare_full function.

https://github.com/gpac/gpac/commit/4ade98128cbc41d5115b97a41ca2e59529c8dd5f

CVE-2022-43040[8]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap
| buffer overflow via the function gf_isom_box_dump_start_ex at
| /isomedia/box_funcs.c.

https://github.com/gpac/gpac/issues/2280
https://github.com/gpac/gpac/commit/f17dae31ebf6ea7af8c512165d9b954c2a6ea46e

CVE-2022-43042[9]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap
| buffer overflow via the function FixSDTPInTRAF at
| isomedia/isom_intern.c.

https://github.com/gpac/gpac/issues/2278
https://github.com/gpac/gpac/commit/3661da280b3eba75490e75ff20ad440c66e24de9

CVE-2022-43043[10]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function BD_CheckSFTimeOffset at
| /bifs/field_decode.c.

https://github.com/gpac/gpac/issues/2276
https://github.com/gpac/gpac/commit/6bff06cdb8e9b4e8ed2e789ee9340877759536fd

CVE-2022-43044[11]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation via the function gf_isom_get_meta_item_info at
| /isomedia/meta.c.

https://github.com/gpac/gpac/issues/2282
https://github.com/gpac/gpac/commit/8a0e8e4ab13348cb1ab8e93b950a03d93f158a35

CVE-2022-43045[12]:
| GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a
| segmentation violation v

Bug#1034187: marked as done (gpac: CVE-2023-1448 CVE-2023-1449 CVE-2023-1452 CVE-2023-1654 CVE-2023-1655)

2023-09-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Sep 2023 07:49:09 +
with message-id 
and subject line Bug#1034187: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1034187,
regarding gpac: CVE-2023-1448 CVE-2023-1449 CVE-2023-1452 CVE-2023-1654 
CVE-2023-1655
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1034187: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034187
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for gpac.

CVE-2023-1448[1]:
| A vulnerability, which was classified as problematic, was found in
| GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function
| gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation
| leads to heap-based buffer overflow. Attacking locally is a
| requirement. The exploit has been disclosed to the public and may be
| used. It is recommended to apply a patch to fix this issue. The
| identifier VDB-223293 was assigned to this vulnerability.

https://github.com/gpac/gpac/issues/2388
https://github.com/gpac/gpac/commit/8db20cb634a546c536c31caac94e1f74b778b463

CVE-2023-1449[2]:
| A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master
| and classified as problematic. This vulnerability affects the function
| gf_av1_reset_state of the file media_tools/av_parsers.c. The
| manipulation leads to double free. It is possible to launch the attack
| on the local host. The exploit has been disclosed to the public and
| may be used. It is recommended to apply a patch to fix this issue.
| VDB-223294 is the identifier assigned to this vulnerability.

https://github.com/gpac/gpac/issues/2387
https://github.com/gpac/gpac/commit/8ebbfd61c73d61a2913721a492e5a81fb8d9f9a9

CVE-2023-1452[3]:
| A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It
| has been declared as critical. Affected by this vulnerability is an
| unknown functionality of the file filters/load_text.c. The
| manipulation leads to buffer overflow. Local access is required to
| approach this attack. The exploit has been disclosed to the public and
| may be used. It is recommended to apply a patch to fix this issue. The
| identifier VDB-223297 was assigned to this vulnerability.

https://github.com/gpac/gpac/issues/2386
https://github.com/gpac/gpac/commit/a5efec8187de02d1f0a412140b0bf030a6747d3f

CVE-2023-1654[4]:
| Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.

https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14
https://github.com/gpac/gpac/commit/2c055153d401b8c49422971e3a0159869652d3da

CVE-2023-1655[5]:
| Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to
| 2.4.0.

https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9
https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-0841
https://www.cve.org/CVERecord?id=CVE-2023-0841
[1] https://security-tracker.debian.org/tracker/CVE-2023-1448
https://www.cve.org/CVERecord?id=CVE-2023-1448
[2] https://security-tracker.debian.org/tracker/CVE-2023-1449
https://www.cve.org/CVERecord?id=CVE-2023-1449
[3] https://security-tracker.debian.org/tracker/CVE-2023-1452
https://www.cve.org/CVERecord?id=CVE-2023-1452
[4] https://security-tracker.debian.org/tracker/CVE-2023-1654
https://www.cve.org/CVERecord?id=CVE-2023-1654
[5] https://security-tracker.debian.org/tracker/CVE-2023-1655
https://www.cve.org/CVERecord?id=CVE-2023-1655

Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Source: gpac
Source-Version: 2.2.1+dfsg1-2
Done: Shengjing Zhu 

We believe that the bug you reported is fixed in the latest version of
gpac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1034...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Shengjing Zhu  (supplier of updated gpac package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas..