Bug#926432: apache2: Internal error: error fetching from cache 'dbm:/var/cache/apache2/gnutls_cache'

2019-04-07 Thread Damir Islamov
Hello,

Unfortunately, not.
apache2 2.4.39-1 is installed, but I can see these errors in apache2/error.log

Best regards,
Damir

-Original Message-
From: Xavier  
Sent: Friday, April 5, 2019 11:40 AM
To: Damir R. Islamov 
Cc: 926...@bugs.debian.org; 926...@bugs.debian.org
Subject: Re: Bug#926432: apache2: Internal error: error fetching from cache 
'dbm:/var/cache/apache2/gnutls_cache'

Le 03/04/2019 à 14:40, Damir R. Islamov a écrit :
> Package: apache2
> Version: 2.4.38-2
> Severity: normal
> 
> Dear Maintainer,
> 
> After update to aapche 2.4.38-1 /var/log/apache2/error.log has a lot of 
> errors like
> 
> [gnutls:warn] [pid 6466:tid 140230002730752] (20014)Internal error (specific 
> information not available): error fetching from cache 
> 'dbm:/var/cache/apache2/gnutls_cache'
> 
> One string per virtual host, every 10 minutes.


Hello,

could you try with apache-2.4.39
(https://people.debian.org/~yadd/apache/) ? It seems that this has been
fixed.

Cheers,
Xavier



Bug#926623: ITP: ruby-parallel-tests -- Run Test::Unit / RSpec / Cucumber / Spinach in parallel

2019-04-07 Thread Hideki Yamane
Package: wnpp
Severity: wishlist
Owner: Hideki Yamane 

* Package name: ruby-parallel-tests
  Version : 2.28.0
  Upstream Author : Michael Grosser 
* URL : https://github.com/grosser/parallel_tests
* License : MIT
  Programming Lang: Ruby
  Description : Run Test::Unit / RSpec / Cucumber / Spinach in parallel

 Speedup Test::Unit + RSpec + Cucumber + Spinach by running parallel
 on multiple CPU cores. ParallelTests splits tests into even groups
 (by number of lines or runtime) and runs each group in a single process
 with its own database.



Bug#925411: kernel-package: Not suitable for release

2019-04-07 Thread Nicholas D Steeves
Hi Ben,

On Sun, Mar 24, 2019 at 11:23:58PM +, Ben Hutchings wrote:
> Control: severity -1 serious
> 
> On Sun, 2019-03-24 at 16:19 -0600, Nicholas D Steeves wrote:
> > Control: severity -1 important
> > Justification: essential package that works flawlessly for me
> 
> This was agreed with the maintainer, so you should not override it.
> 
> The discussion is here:
> https://lore.kernel.org/lkml/1551888035-13329-1-git-send-email-yamada.masah...@socionext.com/
> but unfortunately Manoj's message didn't get archived there for some
> reason.
>

Maybe I'm missing something, but I couldn't find sufficient
justification there...  That said, I did more tests, because an RC bug
that cuts such a useful package from a release really ought to have
justification.

I can now confirm that at least one dkms module (tp-smapi-dkms)
doesn't build with make-kpkg-generated kernel packages on buster.
Maybe all dkms modules are affected?  Maybe Manoj' message said
something to that affect, and how make-kpkg produces packages that are
defective in this way...and maybe other ways?

> [...]
> > The new style kernel packaging is hard to learn how to use, and builds
> > take much longer for some reason (generation of more packages?).
> [...]
> 
> It sounds like you're looking at the linux source package.  I would
> certainly not suggest using that for local custom packages; it's meant
> for distributions.
> 
> The simple alternative is already included in the kernel tree itself:
> 
> make bindeb-pkg
>

Ah, yes, thank you! :-)  Regarding documentation, should
Debian-specific bits go on our wiki or be forwarded upstream?  eg: the
top line of BuildADebianKernelPackage says "this is an obsolete now
guide", but then at the bottom it says "make -j`nproc` bindeb-pkg".  I
specifically missed that because first line conveys the message "stop
reading this doc now, it's an obsolete waste of time".

> It does generate some extra packages (linux-headers and linux-libc-dev) 
> but that doesn't take very long.  The generated packages don't support
> /etc/kernel-img.conf but they do support hooks in /etc/kernel.
>

Should users who track a 4.19.x-based branch use buster's
linux-libc-dev headers, or install the ones that correspond to their
custom kernel?

> > 13.018+nmu1 on buster works like it always has for me--flawlessly.  I
> > built upstream vanilla 4.19.31 two days ago.
> 
> Bug #890817 also looks like it may be a big problem for current kernel
> versions, but apparently you have avoided it.
>

For once, yes :-)  Generally I'm unlucky and hit all the bugs haha.


Thanks again for taking the time to reply, I appreciate it!
Also, thank you for your hard work, and for all time spent on the BTS.

Cheers,
Nicholas


signature.asc
Description: PGP signature


Bug#926618: RFP: webext-plasma-integration -- provides integration of web browsers with the Plasma desktop

2019-04-07 Thread Nicholas D Steeves
Hi Scarlett,

On Sun, Apr 07, 2019 at 06:59:10PM -0400, John Scott wrote:
> Package: wnpp
> Severity: wishlist
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> * Package name: webext-plasma-integration
>   Version : 1.4
>   Upstream Author : Kai Uwe Broulik 
> * URL : https://community.kde.org/Plasma/Browser_Integration
> * License : GPL 3
>   Programming Lang: HTML + JavaScript 
>   Description : provides integration of web browsers with the Plasma 
> desktop
> 
> Plasma Browser Integration is an extension for common browsers
> to closer fit into the Plasma shell. This includes:
>  * Media Controls
>  * Send links via KDE Connect
>  * Show downloads in and control them from Plasma’s notification area
>  * Find browser tabs in the Run Command (Alt-Space) window
> 
> I think it would be handy to have this extension packaged
> for a couple of reasons.
> 
>  * dependency management
> plasma-integration is useful if and only if the extension
> is actually used, so installing the Web Extension package
> would let one mark the former as automatically installed
> and forget about it.
> 
>  * Suggests: or Enhances: for easier discovery
> I was delighted to have found the extension after several
> weeks of using KDE Connect, and hope that no one misses
> out on it for not being aware.
> 
> Thank you,

IIRC you were working on this or something similar?

Cheers,
Nicholas


signature.asc
Description: PGP signature


Bug#926622: unblock: zulucrypt/5.4.0-3

2019-04-07 Thread Marcio de Souza Oliveira
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package zulucrypt

This debian release fixes the bug #922038. This bug affect the working of
zulucrypt-cli and zulumount-cli. Because of ordering the linker flags
the linker doesn't consider the functions used in zuluplay-static when
determining that libgcrypt is not used and thus need not be linked
against.

This upload implements the patch to solve this.

(include/attach the debdiff against the package in testing)

unblock zulucrypt/5.4.0-3

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=ANSI_X3.4-1968) 
(ignored: LC_ALL set to C), LANGUAGE=pt_BR.UTF-8 (charmap=ANSI_X3.4-1968) 
(ignored: LC_ALL set to C)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru zulucrypt-5.4.0/debian/changelog zulucrypt-5.4.0/debian/changelog
--- zulucrypt-5.4.0/debian/changelog2018-01-28 15:32:27.0 -0200
+++ zulucrypt-5.4.0/debian/changelog2019-02-18 21:11:00.0 -0300
@@ -1,3 +1,20 @@
+zulucrypt (5.4.0-3) unstable; urgency=medium
+
+  * New debian release.
+  * Created the directory debian/upstream.
+  * debian/control:
+  - Bumped Standards-Version to 4.3.0.
+  - Updated the Maintainer e-mail.
+  - Updated the Vcs-Git field.
+  - Updated the Vcs-Browser field.
+  * debian/patches:
+  - Created the patch linker-flags-ordering.patch.(Closes: #922038)
+Thanks Ahzod, Luca and Peter Ziegler.
+  * debian/upstream:
+  - Created the metadata file.
+
+ -- Marcio de Souza Oliveira   Tue, 19 Feb 2019 
00:11:00 +
+
 zulucrypt (5.4.0-2) unstable; urgency=medium
 
   * Upload to unstable.
diff -Nru zulucrypt-5.4.0/debian/control zulucrypt-5.4.0/debian/control
--- zulucrypt-5.4.0/debian/control  2018-01-28 15:32:27.0 -0200
+++ zulucrypt-5.4.0/debian/control  2019-02-18 21:11:00.0 -0300
@@ -1,7 +1,7 @@
 Source: zulucrypt
 Section: utils
 Priority: optional
-Maintainer: Marcio de Souza Oliveira 
+Maintainer: Marcio de Souza Oliveira 
 Build-Depends: debhelper (>= 10),
  libcryptsetup-dev,
  libpwquality-dev,
@@ -18,10 +18,10 @@
  chrpath,
  cmake,
  bzip2
-Standards-Version: 4.1.3
+Standards-Version: 4.3.0
 Homepage: http://mhogomchungu.github.io/zuluCrypt
-Vcs-Git: https://github.com/marciosouza20/zulucrypt.git
-Vcs-Browser: https://github.com/marciosouza20/zulucrypt.git
+Vcs-Git: https://salsa.debian.org/debian/zulucrypt.git
+Vcs-Browser: https://salsa.debian.org/debian/zulucrypt
 
 Package: zulucrypt-cli
 Architecture: any
diff -Nru zulucrypt-5.4.0/debian/patches/fix_spelling 
zulucrypt-5.4.0/debian/patches/fix_spelling
--- zulucrypt-5.4.0/debian/patches/fix_spelling 2017-04-13 12:48:14.0 
-0300
+++ zulucrypt-5.4.0/debian/patches/fix_spelling 2019-02-18 21:11:00.0 
-0300
@@ -2,11 +2,11 @@
 Author: Marcio de Souza Oliveira 
 Last-Update: 2017-04-13
 
-Index: zulucrypt-5.1.0/zuluCrypt-cli/bin/main.c
+Index: zulucrypt-5.4.0/zuluCrypt-cli/bin/main.c
 ===
 zulucrypt-5.1.0.orig/zuluCrypt-cli/bin/main.c
-+++ zulucrypt-5.1.0/zuluCrypt-cli/bin/main.c
-@@ -626,7 +626,7 @@ int main( int argc,char * argv[] )
+--- zulucrypt-5.4.0.orig/zuluCrypt-cli/bin/main.c
 zulucrypt-5.4.0/zuluCrypt-cli/bin/main.c
+@@ -648,7 +648,7 @@ int main( int argc,char * argv[] )
switch( zuluCryptGetDeviceFileProperties( 
deviceuid ) ){
  
case 0 : break ;
@@ -15,10 +15,10 @@
case 2 : return zuluExit( 112,stl,stx,env,gettext( 
"ERROR: Given path is a directory" ) ) ;
case 3 : return zuluExit( 113,stl,stx,env,gettext( 
"ERROR: A file can have only one hard link" ) ) ;
case 4 : return zuluExit( 113,stl,stx,env,gettext( 
"ERROR: Insufficient privilges to access the device" ) ) ;
-Index: zulucrypt-5.1.0/zuluMount-cli/main.c
+Index: zulucrypt-5.4.0/zuluMount-cli/main.c
 ===
 zulucrypt-5.1.0.orig/zuluMount-cli/main.c
-+++ zulucrypt-5.1.0/zuluMount-cli/main.c
+--- zulucrypt-5.4.0.orig/zuluMount-cli/main.c
 zulucrypt-5.4.0/zuluMount-cli/main.c
 @@ -463,7 +463,7 @@ Possible reasons for getting the error a
 close( fd ) ;
 }
@@ -28,11 +28,11 @@
case 2 : printf( gettext( "ERROR: Given path is a directory\n" 
) ) ;return 221 ;
case 3 : printf( gettext( "ERROR: A file can have only one hard 
link\n" ) ) ;   return 222 ;
case 4 

Bug#926596: fwupdate: arm64 version of PE/COFF efi binary is corrupt

2019-04-07 Thread Ard Biesheuvel
On Mon, 8 Apr 2019 at 02:07,  wrote:
>
> Would you be able to check if this also affects fwupd?  The fwupdate binary 
> was also merged into that project a while back and I would suspect it's 
> affecting both.
>

I've had a report that Fedora's version of the fwupdmgr .efi helper is
broken, but looking at the binary [0], it appears to be a different
problem.

PE header starts at 0x40 'PE'

0040  50 45 00 00 64 aa 02 00  00 00 00 00 00 00 00 00
0050  01 00 00 00 a0 00 06 02  0b 02 02 14 00 a0 00 00
0060  00 1c 00 00 00 00 00 00  00 10 00 00 00 10 00 00
0070  00 00 00 00 00 00 00 00  00 10 00 00 00 02 00 00

The section alignment and file alignment are at offsets 0x78 and 0x7c,
respectively, so 0x1000 and 0x200 which looks fine.

0080  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00
0090  00 cc 00 00 00 10 00 00  00 00 00 00 0a 00 00 00

Total file size at 0x90, which is 0xcc00

00f0  00 00 00 00 00 00 00 00  2e 74 65 78 74 00 00 00  |.text...|
0100  00 a0 00 00 00 10 00 00  00 a0 00 00 00 10 00 00  ||

Size and offset of .text section at 0x100 and 0x104: 0xa000 bytes @ 0x1000

0120  2e 64 61 74 61 00 00 00  00 1c 00 00 00 b0 00 00  |.data...|

Size and offset of .data section at 0x128 and 0x12c: 0x1c00 bytes @
0xb000, which brings the total file size to 0xcc00 just like in the
main header.

[0] http://people.linaro.org/~ard.biesheuvel/fwupdaa64.efi-f29








> -Original Message-
> From: Ard Biesheuvel 
> Sent: Sunday, April 7, 2019 10:46 PM
> To: Debian Bug Tracking System
> Subject: Bug#926596: fwupdate: arm64 version of PE/COFF efi binary is corrupt
>
>
> [EXTERNAL EMAIL]
>
> Package: fwupdate
> Version: 12-4
> Severity: important
>
> Dear Maintainer,
>
> Version 12-4 of fwupdate is broken for arm64. The included binary 
> fwupaa64.efi is corrupt, resulting in EFI_LOAD_ERROR to be returned by the 
> firmware when trying to invoke it.
>
> The binary layout looks like this:
>
> Detected 'AArch64' type PE/COFF image consisting of 2 sections Section 
> alignment: 0x1000 File alignment: 0x200 Image size: 0xd890 Section '.text' @ 
> 0x1000 File offset: 0x1000 Virtual size: 0xac20 Raw size: 0xac20 Section 
> '.data' @ 0xbc20 File offset: 0xbc20 Virtual size: 0x1d70 Raw size: 0x1d70
>
> Note that file offset + size of section #2 exceeds the total image size. But 
> the file offset of that section is not even a multiple of the file alignment, 
> so the whole image seems pretty broken.
>
>
>
> -- System Information:
> Debian Release: 9.8
>   APT prefers stable
>   APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'testing')
> Architecture: arm64 (aarch64)
>
> Kernel: Linux 5.1.0-rc2+ (SMP w/24 CPU cores; PREEMPT)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
> LANGUAGE=en_US:en (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
>
> Versions of packages fwupdate depends on:
> ii  e2fsprogs1.43.4-2
> ii  efibootmgr   14-2
> ii  libc62.28-8
> ii  libefiboot1  37-2
> ii  libefivar1   37-2
> ii  libfwup1 12-4
> ii  libpopt0 1.16-10+b2
>
> Versions of packages fwupdate recommends:
> ii  fwupdate-arm64-signed [fwupdate-signed]  12+4
>
> fwupdate suggests no packages.
>
> -- no debconf information
>



Bug#926621: ITP: ruby-strptime -- fast strptime/strftime engine

2019-04-07 Thread Hideki Yamane
Package: wnpp
Severity: wishlist
Owner: Hideki Yamane 

* Package name: ruby-strptime
  Version : 0.2.3
  Upstream Author : NARUSE, Yui 
* URL : https://github.com/nurse/strptime
* License : BSD-2-Clause
  Programming Lang: C, Ruby
  Description : fast strptime/strftime engine

 fluentd depends on it



Bug#926596: fwupdate: arm64 version of PE/COFF efi binary is corrupt

2019-04-07 Thread Mario.Limonciello
Would you be able to check if this also affects fwupd?  The fwupdate binary was 
also merged into that project a while back and I would suspect it's affecting 
both.

-Original Message-
From: Ard Biesheuvel  
Sent: Sunday, April 7, 2019 10:46 PM
To: Debian Bug Tracking System
Subject: Bug#926596: fwupdate: arm64 version of PE/COFF efi binary is corrupt


[EXTERNAL EMAIL] 

Package: fwupdate
Version: 12-4
Severity: important

Dear Maintainer,

Version 12-4 of fwupdate is broken for arm64. The included binary fwupaa64.efi 
is corrupt, resulting in EFI_LOAD_ERROR to be returned by the firmware when 
trying to invoke it.

The binary layout looks like this:

Detected 'AArch64' type PE/COFF image consisting of 2 sections Section 
alignment: 0x1000 File alignment: 0x200 Image size: 0xd890 Section '.text' @ 
0x1000 File offset: 0x1000 Virtual size: 0xac20 Raw size: 0xac20 Section 
'.data' @ 0xbc20 File offset: 0xbc20 Virtual size: 0x1d70 Raw size: 0x1d70

Note that file offset + size of section #2 exceeds the total image size. But 
the file offset of that section is not even a multiple of the file alignment, 
so the whole image seems pretty broken.



-- System Information:
Debian Release: 9.8
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'testing')
Architecture: arm64 (aarch64)

Kernel: Linux 5.1.0-rc2+ (SMP w/24 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages fwupdate depends on:
ii  e2fsprogs1.43.4-2
ii  efibootmgr   14-2
ii  libc62.28-8
ii  libefiboot1  37-2
ii  libefivar1   37-2
ii  libfwup1 12-4
ii  libpopt0 1.16-10+b2

Versions of packages fwupdate recommends:
ii  fwupdate-arm64-signed [fwupdate-signed]  12+4

fwupdate suggests no packages.

-- no debconf information



Bug#925785: neovim: ftbfs with GCC-9

2019-04-07 Thread James McCoy
Control: tag -1 + upstream fixed-upstream

On Wed, Mar 27, 2019 at 07:47:15PM +, Matthias Klose wrote:
> From test_mksession.vim:
> Found errors in Test_mksession_arglist():
> Caught exception in Test_mksession_arglist(): Vim(set):E539: Illegal 
> character : shortmess=aoO @ 
> /<>/src/nvim/testdir/Xtest_mks.out, line 8
> Found errors in Test_mksession_winheight():
> Caught exception in Test_mksession_winheight(): Vim(set):E539: Illegal 
> character : shortmess=aoO @ 
> /<>/src/nvim/testdir/Xtest_mks.out, line 8

This ended up being due to the new compound literal lifetime changes --
https://gcc.gnu.org/gcc-9/porting_to.html#complit.

The code in question is something close to:

  unsigned char *varp;
  unsigned char *p;

  if (varp == _shm) {
p = (unsigned char *)((unsigned char[]){ 'a', 'b', 'c' });
  }
  ...

  // iterate over p

It would have been helpful in diagnosing this if gcc had warned about
using a pointer to an object outside of its scope.

Cheers,
-- 
James
GPG Key: 4096R/91BF BF4D 6956 BD5D F7B7  2D23 DFE6 91AE 331B A3DB


signature.asc
Description: PGP signature


Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-04-07 Thread Guilhem Moulin
On Sun, 07 Apr 2019 at 20:56:41 +0200, gregor herrmann wrote:
> Alright, after purging libssl1.0.2 (and the outdated packages which
> depended on it *cough*) I get the hang as well:
> […]
> Thanks for the push in the right direction!

You're welcome :-)  Does clearing the SSL_MODE_AUTO_RETRY context flag
(i.e., reverting the default from OpenSSL <1.1.1) solves this for you
too?  If so, what do you think about my proposed paths forwards from

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914034#71

If there is consensus that libssl's SSL_CTRL_CLEAR_MODE and/or
SSL_CTX_clear_mode should be exposed to Net::SSLeay I'd be happy to
propose a patch there.  That leaves the question about which defaults
context flags should IO::Socket::SSL (or LWP) have, though.

-- 
Guilhem.


signature.asc
Description: PGP signature


Bug#926603: Debian fails to start after installation into Virtualbox

2019-04-07 Thread Michael Biebl
Control: tags -1 moreinfo

Am 07.04.19 um 18:51 schrieb Andy Ruddock:
> Package: systemd
> Severity: critical
> 
> I'm running Windows 10 (Home edition - up to date) on the desktop, with
> Virtualbox (v6.0.4).
> I've used both the netinst CD & the testing DVD (downloaded today -
> 07/Apr/2019) to install Buster.
> After installation the system fails to start with many errors.
> The first is :
> 
> systemd[1]: user.slice: Failed to set inovcation ID for unit: File
> exists
> [FAILED]: Failed to start User and Session Slice.
> 
> other services then fail to start :
> 
> [FAILED] Failed to start Slices.
> [FAILED] Failed to listen on udev Kernel Socket.
> [FAILED] Failed to start Remote File Systems.
> [FAILED] Failed to listen on Syslog Socket.
> 
> and many more, followed by
> 
> systemd[1]: Timed out waiting for device /dev/disk/by-uuid/2cb
> 
> finally
> 
> [FAILED] Failed to start Network.
> 
> At which point there is no more, the system just halts.
> 
> Starting with "quiet" removed from linux invocation in grub, I see
> 
> systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX
> +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS
> +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2
> default-hierarchy=hybrid)
> systemd[1]: Detected virtualization oracle.
> systemd[1]: Detected architecture x86-64.
> 
> Welcome to Debian GNU/Linux buser/sid!

Please follow the instructions at
https://freedesktop.org/wiki/Software/systemd/Debugging/ and get us a
verbose debug log from the complete boot.
Please also attach the output of "reportbug --template systemd" on the
affected system.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#926620: debsums: [INTL:pt] Update on Portuguese translation of manpage

2019-04-07 Thread Américo Monteiro
Package: debsumsr
Version: 2.2.3
3ags: l10n, patch-
Severity: wishlist

Updated Portuguese translation for  debsums's manpage
Translator: Américo Monteiro 
Feel free to use it.

For translation updates please contact 'Last Translator' 

-- 
Melhores cumprimentos/Best regards,

Américo Monteiro




debsums_2.2.3_pt.po.gz
Description: application/gzip


Bug#926306: RFS: socklog/2.1.0-9

2019-04-07 Thread Mathieu Mirmont
On Sat, Apr 06, 2019 at 07:13:56PM +, Dmitry Bogatov wrote:
> 
> [2019-04-04 13:30] Mathieu Mirmont 
> > > * I know, it is pain, but there should be init.d script. You may want to
> > >   take a look at bcron=0.11-8.
> >
> > Sure, no worries. How about systemd service files? It makes little sense
> > to run socklog along with systemd I think, but for the principle it may
> > be required to profile service files. What do you think?
> 
> Up to you. Presence of systemd unit files is not mandated by Policy,
> unlike init.d scripts.

Done, the init scripts call daemon(1) and runsv(1) and they work
pretty nicely.

> > >   I believe there should be separate sysuser for socklog-* services.
> > >   Ideally, separate sysuser for /every/ from socklog-* service, but I do
> > >   not know, whehter it is possible.
> >
> > Yeah good point. I tend to think that a single user for all socklog-*
> > services would be enough, but if you prefer I can add one user per
> > service.
> 
> Yes, I'd prefer as much separation, as possible.

Done, one user per service.

> > Thanks for the review!
> 
> My pleasure. By the way, you seems to forgot to add changelog entry
> about new maintainer. Something in lines:
> 
>   * Set myself as maintainer (Closes: #)

I had this line but somehow I messed up and accidentally squashed two
commits so the line disappeared (I use gbp dch to generate the
changelog). I've put it back.

There is one more issue that I noticed this weekend: the orig.tar.gz
file that is registered in debian archives is not the same as the
upstream tarball. It is in fact a tarball of the upstream tarball
(!). I don't know why it's done this way, and it pretty much breaks
breaks source format 3.0 (quilt) because I can't get dpkg-source to
unpack the tarball before applying the patches. Do you know how to
deal with that?

-- 
Mathieu Mirmont 


signature.asc
Description: PGP signature


Bug#926619: deborphan: [INTL:pt] Update on Portuguese translation of manpage

2019-04-07 Thread Américo Monteiro
Package: deborphan
Version: 1.7.31
3ags: l10n, patch-
Severity: wishlist

Updated Portuguese translation for  deborphan's manpage
Translator: Américo Monteiro 
Feel free to use it.

For translation updates please contact 'Last Translator' 

-- 
Melhores cumprimentos/Best regards,

Américo Monteiro




deborphan_1.7.31_pt.po.gz
Description: application/gzip


Bug#926618: RFP: webext-plasma-integration -- provides integration of web browsers with the Plasma desktop

2019-04-07 Thread John Scott
Package: wnpp
Severity: wishlist

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

* Package name: webext-plasma-integration
  Version : 1.4
  Upstream Author : Kai Uwe Broulik 
* URL : https://community.kde.org/Plasma/Browser_Integration
* License : GPL 3
  Programming Lang: HTML + JavaScript 
  Description : provides integration of web browsers with the Plasma desktop

Plasma Browser Integration is an extension for common browsers
to closer fit into the Plasma shell. This includes:
 * Media Controls
 * Send links via KDE Connect
 * Show downloads in and control them from Plasma’s notification area
 * Find browser tabs in the Run Command (Alt-Space) window

I think it would be handy to have this extension packaged
for a couple of reasons.

 * dependency management
plasma-integration is useful if and only if the extension
is actually used, so installing the Web Extension package
would let one mark the former as automatically installed
and forget about it.

 * Suggests: or Enhances: for easier discovery
I was delighted to have found the extension after several
weeks of using KDE Connect, and hope that no one misses
out on it for not being aware.

Thank you,

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEAXEkn09uX7g8Tv8W3qerYfa4vJcFAlyqgLkACgkQ3qerYfa4
vJdc2wgAo1yPuGzVMMgMF4oeA21e2QG6c3+WJbZOzg3bjrZYOt2O5nWLSfCdmO4u
rkNbo2Ay6TS4QQUAFhLXkkX8v8nQQBxo+MyBT7djPp8CNFf/zosc4kIPm2sHN8jf
k09gTlvhI1bv+RiN+OgR/JzwCrIyHMjlVyy04F/ioXKBszMWlzj1c6eU3bTMv2gh
SaLOdsPaVMJlPiIZbi+DVww/m93uXjNDOCBqElrYsmrsYXHk0AfBvM3vj+2X0vWp
T9GcrmPudG8WNHfiYU1pIzJjMPSbcqVOVv0tnxACp0ijbQgvYO5o83L5OaQ2jRuO
hhlMFEnWHkBMgQgg13WPHU0hSaEEbQ==
=3uw6
-END PGP SIGNATURE-


Bug#926617: plasma-pa: Speakers test doesn't work if libcanberra-pulse is not installed

2019-04-07 Thread Alexander Kernozhitsky
Package: plasma-pa
Version: 4:5.14.5-1
Severity: normal

The speakers test functionality in the settings of the plasmoid didn't work for
me. When I tried to use it, I saw the following in the console:

ALSA lib pcm.c:2565:(snd_pcm_open_noupdate) Unknown PCM 2
ALSA lib pcm.c:2565:(snd_pcm_open_noupdate) Unknown PCM 2
ALSA lib pcm.c:2565:(snd_pcm_open_noupdate) Unknown PCM 2

After studying the code, I noticed that test sounds are being played with
libcanberra, and the device ID is backend-specific there. It seems that the
numeric IDs are used by Pulseaudio backend, not ALSA.

So, I installed the Pulseaudio backend:

$ sudo apt install libcanberra-pulse

This fixed the bug for me.

So, please add libcanberra-pulse to Recommends of plasma-pa.



-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE=ru 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages plasma-pa depends on:
ii  libc62.28-8
ii  libcanberra0 0.30-7
ii  libkf5coreaddons55.54.0-1
ii  libkf5globalaccel-bin5.54.0-1
ii  libkf5globalaccel5   5.54.0-1
ii  libkf5i18n5  5.54.0-1
ii  libkf5quickaddons5   5.54.0-1
ii  libpulse-mainloop-glib0  12.2-4
ii  libpulse012.2-4
ii  libqt5core5a 5.11.3+dfsg1-1
ii  libqt5dbus5  5.11.3+dfsg1-1
ii  libqt5gui5   5.11.3+dfsg1-1
ii  libqt5qml5   5.11.3-4
ii  libqt5quick5 5.11.3-4
ii  libqt5widgets5   5.11.3+dfsg1-1
ii  libstdc++6   8.3.0-5
ii  plasma-framework 5.54.0-1
ii  pulseaudio   12.2-4
ii  qml-module-org-kde-draganddrop   5.54.0-1
ii  qml-module-org-kde-kquickcontrolsaddons  5.54.0-1
ii  qml-module-qtquick-controls  5.11.3-2
ii  qml-module-qtquick-layouts   5.11.3-4
ii  qml-module-qtquick2  5.11.3-4

plasma-pa recommends no packages.

plasma-pa suggests no packages.

-- no debconf information



Bug#926616: CVE-2018-3750: Prototype Pollution

2019-04-07 Thread Jeff Cliff
Package: node-deep-extend
Version: 0.4.1-1
Severity: important

Dear Maintainer,

As per the ubuntu bug report: 

from https://snyk.io/vuln/npm:deep-extend:20180409 :

deep-extend "all the listed modules can be tricked into modifying the prototype 
of "Object" 
when the attacker control part of the structure passed to these function."

This is verifiably true on at least buster, given the PoC listed in the above 
URL, but
since it's the same deep-extend in sid, it's probably the same there.

The following commit apparently fixes this: (though I haven't verified that)

https://github.com/unclechu/node-deep-extend/commit/433ee51ed606f4e1867ece57b6ff5a47bebb492f



-- System Information:
Debian Release: buster/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_CA:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages node-deep-extend depends on:
ii  nodejs  10.15.2~dfsg-1

node-deep-extend recommends no packages.

node-deep-extend suggests no packages.

-- debconf-show failed



Bug#925185: unblock pre-approval: sysstat/12.0.3-1 (actually 12.0.3-2)

2019-04-07 Thread Robert Luberda
Control: tags -1 -moreinfo
Control: retitle -1  unblock sysstat/12.0.3-2

Hi,

>> [...]
> Please go ahead with 12.0.3-1 for buster and remove the moreinfo tag
> when it is ready for unblocks.
> 

Thanks. I uploaded 12.0.3-2 to unstable yesterday. Could you please
unblock it?

Comparing to 12.0.3-1, it only introduces a new changelog entry, and a
fix for the typo you've found:

-- sysstat-12.0.3/debian/changelog 2019-03-17 23:09:46.0 +0100
+++ sysstat-12.0.3/debian/changelog 2019-04-06 09:18:26.0 +0200
@@ -1,3 +1,9 @@
+sysstat (12.0.3-2) unstable; urgency=medium
+
+  * Upload to unstable.
+
+ -- Robert Luberda   Sat, 06 Apr 2019 09:18:26 +0200
+
 sysstat (12.0.3-1) experimental; urgency=medium

   * New upstream stable version:
@@ -11,7 +17,7 @@
 marker into statistics file on systems on which systemd is not used.
 Thanks to Georgios Zarkadas for noticing this (closes: #924864).
   * debian/rules: replace deprecated dh_systemd_start by dh_installsystemd,
-as suggested by lintian; the former command wass ignored by
debhelper v11,
+as suggested by lintian; the former command was ignored by
debhelper v11,
 what in turn resulted in the `--no-start' option being ignored, and the
 restart markers were incorrectly added during package upgrades.


Regards,
robert



Bug#926408: Scrolling makes kdiff3 crash

2019-04-07 Thread Bernhard Übelacker
Control: tags 926408 + upstream patch
Control: tags 926408 - moreinfo unreproducible


Dear Maintainer, Hello Gudjon,
I forgot to mention that this little "save" button should be on the
developers information tab of DrKonqi. Then you should not need to
do something in gdb manually.

However, I overlooked initially the subject of your submitting email
completely - so I was now able to reproduce.

In KDiff3App::scrollDiffTextWindow is m_pDiffVScrollBar unconditionally
accessed when it currently contains a null pointer.

Attached patch simply avoids that and does not crash anymore.

Could not find an upstream issue about this.

Kind regards,
Bernhard


Thread 1 (Thread 0x7f50273cd800 (LWP 18204)):
[KCrash Handler]
#6  QAbstractSlider::value (this=this@entry=0x0) at 
widgets/qabstractslider.cpp:526
#7  0x5649e94cba8a in KDiff3App::scrollDiffTextWindow (this=0x5649e9fe1920, 
deltaX=0, deltaY=-810) at ./src/pdiff.cpp:490
#8  0x7f502c001588 in QWidget::event (this=0x5649e9fe1920, 
event=0x7ffe9592cdc0) at kernel/qwidget.cpp:8925
#9  0x7f502bfc34b1 in QApplicationPrivate::notify_helper 
(this=this@entry=0x5649e9b0e040, receiver=receiver@entry=0x5649e9fe1920, 
e=e@entry=0x7ffe9592cdc0) at kernel/qapplication.cpp:3726
#10 0x7f502bfcc69f in QApplication::notify (this=, 
receiver=0x5649e9daf590, e=0x7ffe9592d2d0) at kernel/qapplication.cpp:3294
#11 0x7f502b6485a9 in QCoreApplication::notifyInternal2 
(receiver=0x5649e9daf590, event=0x7ffe9592d2d0) at 
../../include/QtCore/5.11.3/QtCore/private/../../../../../src/corelib/thread/qthread_p.h:307
#12 0x7f502c001588 in QWidget::event (this=this@entry=0x5649e9d0ada0, 
event=event@entry=0x7ffe9592d2d0) at kernel/qwidget.cpp:8925
#13 0x7f502c0a4d1e in QFrame::event (this=0x5649e9d0ada0, e=0x7ffe9592d2d0) 
at widgets/qframe.cpp:550
#14 0x7f502c2161bb in QAbstractItemView::viewportEvent 
(this=this@entry=0x5649e9d0ada0, event=event@entry=0x7ffe9592d2d0) at 
itemviews/qabstractitemview.cpp:1750
#15 0x7f502c27e40b in QTreeView::viewportEvent (this=0x5649e9d0ada0, 
event=0x7ffe9592d2d0) at itemviews/qtreeview.cpp:1326
#16 0x7f502b6482bb in 
QCoreApplicationPrivate::sendThroughObjectEventFilters (event=, 
receiver=) at kernel/qcoreapplication.cpp:1173
#17 QCoreApplicationPrivate::sendThroughObjectEventFilters 
(receiver=receiver@entry=0x5649e9bdc320, event=event@entry=0x7ffe9592d2d0) at 
kernel/qcoreapplication.cpp:1162
#18 0x7f502bfc34a1 in QApplicationPrivate::notify_helper 
(this=this@entry=0x5649e9b0e040, receiver=receiver@entry=0x5649e9bdc320, 
e=e@entry=0x7ffe9592d2d0) at kernel/qapplication.cpp:3722
#19 0x7f502bfcc69f in QApplication::notify (this=, 
receiver=0x5649e9bdc320, e=0x7ffe9592d450) at kernel/qapplication.cpp:3294
#20 0x7f502b6485a9 in QCoreApplication::notifyInternal2 
(receiver=0x5649e9bdc320, event=0x7ffe9592d450) at 
../../include/QtCore/5.11.3/QtCore/private/../../../../../src/corelib/thread/qthread_p.h:307
#21 0x7f502c01d56c in QWidgetWindow::handleWheelEvent 
(this=this@entry=0x5649e9b53200, event=event@entry=0x7ffe9592d7a0) at 
kernel/qwidgetwindow.cpp:844
#22 0x7f502c01ebf3 in QWidgetWindow::event (event=0x7ffe9592d7a0, 
this=0x5649e9b53200) at kernel/qwidgetwindow.cpp:308
#23 QWidgetWindow::event (this=0x5649e9b53200, event=0x7ffe9592d7a0) at 
kernel/qwidgetwindow.cpp:224
#24 0x7f502bfc34b1 in QApplicationPrivate::notify_helper 
(this=this@entry=0x5649e9b0e040, receiver=receiver@entry=0x5649e9b53200, 
e=e@entry=0x7ffe9592d7a0) at kernel/qapplication.cpp:3726
#25 0x7f502bfca950 in QApplication::notify (this=0x7ffe9592dad0, 
receiver=0x5649e9b53200, e=0x7ffe9592d7a0) at kernel/qapplication.cpp:3485
#26 0x7f502b6485a9 in QCoreApplication::notifyInternal2 
(receiver=receiver@entry=0x5649e9b53200, event=event@entry=0x7ffe9592d7a0) at 
../../include/QtCore/5.11.3/QtCore/private/../../../../../src/corelib/thread/qthread_p.h:307
#27 0x7f502b9f031c in QCoreApplication::sendSpontaneousEvent 
(event=0x7ffe9592d7a0, receiver=0x5649e9b53200) at 
../../include/QtCore/../../src/corelib/kernel/qcoreapplication.h:237
#28 QGuiApplicationPrivate::processWheelEvent (e=0x7f5020007500) at 
kernel/qguiapplication.cpp:2160
#29 0x7f502b9f5e15 in QGuiApplicationPrivate::processWindowSystemEvent 
(e=e@entry=0x7f5020007500) at kernel/qguiapplication.cpp:1820
#30 0x7f502b9d006b in QWindowSystemInterface::sendWindowSystemEvents 
(flags=...) at kernel/qwindowsysteminterface.cpp:1032
#31 0x7f50270303eb in QPAEventDispatcherGlib::processEvents 
(this=0x5649e9b51e40, flags=...) at qeventdispatcher_glib.cpp:70
#32 0x7f502b64727b in QEventLoop::exec (this=this@entry=0x7ffe9592d980, 
flags=..., flags@entry=...) at 
../../include/QtCore/../../src/corelib/global/qflags.h:140
#33 0x7f502b64f262 in QCoreApplication::exec () at 
../../include/QtCore/../../src/corelib/global/qflags.h:120
#34 0x5649e94a5932 in main (argc=, argv=) at 
./src/main.cpp:177
[Inferior 1 (process 18204) detached]



Bug#926615: bug#314: Acknowledgement (gpsd: ..2'nd roll over bug: gpsd "clock is 56 years wrong", like "1963-07-18T08:57:40.584Z")

2019-04-07 Thread Arnt Karlsen


..upstream bug reports:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926615
https://savannah.nongnu.org/bugs/index.php?56094

..our bug report:
https://bugs.devuan.org//cgi/bugreport.cgi?bug=314

-- 
..med vennlig hilsen = with Kind Regards from Arnt Karlsen
...with a number of polar bear hunters in his ancestry...
  Scenarios always come in sets of three: 
  best case, worst case, and just in case.



Bug#926615: gpsd: ..2'nd roll over bug: gpsd "clock is 56 years wrong", like "1963-07-18T08:57:40.584Z"

2019-04-07 Thread Arnt Karlsen
Package: gpsd
Version: 3.16-4
Severity: important

..upstream bug.  




Hi,


..reportbug reports our (Devuan) BTS is down, bug report on gpsd: 
Content-Type
: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Arnt 
To: Devuan Bug Tracking System 
Subject: gpsd: ..2'nd roll over bug: gpsd clock is 56 years wrong,
"1963-07-18T08:57:40.584Z" Message-ID:
<155465156363.24771.3526445890355259661.reportbug@sda3> X-Mailer:
reportbug 7.1.6+devuan2.1 Date: Sun, 07 Apr 2019 17:39:23 +0200
X-Debbugs-Cc: a...@iaksess.no

Package: gpsd
Version: 3.16-4
Severity: important

..upstream bug.  


Dear Maintainer,

*** Reporter, please consider answering these questions, where
appropriate ***

   * What led up to the situation?

..according to http://catb.org/gpsd/NMEA.html#_dates_and_times : 
GPS date and time are subject to a rollover problem in the 10-bit 
week number counter, which will re-zero every 1024 weeks (roughly 
every 19.6 years). The last rollover (and the first since GPS went 
live in 1980) was in Aug-1999; the next will fall in Apr-2019. 


..checks out rather well:
arnt@sda3:~$ date --date='1024 weeks ago'
Sun Aug 22 18:23:04 CEST 1999
arnt@sda3:~$ date --date='2048 weeks ago'
Sun Jan  6 17:23:36 CET 1980
arnt@sda3:~$ date --date='TZ=UTC 2048 weeks ago'
date: invalid date ‘TZ=UTC 2048 weeks ago’
arnt@sda3:~$ date --date='TZ="UTC" 2048 weeks ago'
Sun Jan  6 19:25:50 CET 1980
arnt@sda3:~$
http://www.leapsecond.com/java/gpsclock.htm
http://www.leapsecond.com/java/cal.htm


..fix suggestions: hard code third 10bit era and/or move to 
the new 13bit "CNAV" data format pointed to above. 

..this patch hard codes third 10bit era as suggested in 
gpsd-3.1x's timebase.c:
arnt@nb6:~$ diff -u timebase.h-3.16 timebase.h-new
--- timebase.h-3.16 2016-01-08 20:30:27.0 +0100
+++ timebase.h-new  2019-04-07 20:11:52.903644739 +0200
@@ -1,9 +1,9 @@
 /*
  * Constants used for GPS time detection and rollover correction.
  *
- * Correct for week beginning 2016-01-07T00:00:00
+ * Correct for week beginning 2019-04-07T02:00:00 UTC
  */
 #define BUILD_CENTURY  2000
-#define BUILD_WEEK 854# Assumes 10-bit week counter 
-#define BUILD_LEAPSECONDS  17
-#define BUILD_ROLLOVERS1  # Assumes 10-bit week counter
+#define BUILD_WEEK 1  # Assumes 10-bit week counter 
+#define BUILD_LEAPSECONDS  19
+#define BUILD_ROLLOVERS2  # Assumes 10-bit week counter


..and ditto for gpsd-3.17:
arnt@nb6:~$ diff -u timebase.h-3.17 timebase.h-new
--- timebase.h-3.17 2017-09-07 13:53:40.0 +0200
+++ timebase.h-new  2019-04-07 20:11:52.903644739 +0200
@@ -1,9 +1,9 @@
 /*
  * Constants used for GPS time detection and rollover correction.
  *
- * Correct for week beginning 2017-09-07T00:00:00
+ * Correct for week beginning 2019-04-07T02:00:00 UTC
  */
 #define BUILD_CENTURY  2000
-#define BUILD_WEEK 941   # Assumes 10-bit week counter 
+#define BUILD_WEEK 1 # Assumes 10-bit week counter 
#define BUILD_LEAPSECONDS  19
-#define BUILD_ROLLOVERS1 # Assumes 10-bit week counter
+#define BUILD_ROLLOVERS2 # Assumes 10-bit week counter



..this patch hard codes third 10bit era as suggested in 
gpsd-3.11's timebase.c: 
arnt@sda3:~$ diff -u timebase.h*
--- timebase.h-3.11  2019-04-07 19:19:42.442197516 +0200
+++ timebase.h-ny  2019-04-07 19:18:28.572535352 +0200
@@ -1,8 +1,8 @@
 /*
  * Constants used for GPS time detection and rollover correction.
  *
- * Correct for week beginning 2014-08-21T00:00:00
+ * Correct for week beginning 2019-04-07T00:00:00
  */
-#define CENTURY_BASE   201400
-#define LEAPSECOND_NOW 16
-#define GPS_WEEK_NOW   1806
+#define CENTURY_BASE   201900
+#define LEAPSECOND_NOW 19
+#define GPS_WEEK_NOW   2049


..current timebase.h in gpsd-3.11 source:
arnt@sda3:~$ cat timebase.h
/*
 * Constants used for GPS time detection and rollover correction.
 *
 * Correct for week beginning 2014-08-21T00:00:00
 */
#define CENTURY_BASE201400
#define LEAPSECOND_NOW  16
#define GPS_WEEK_NOW1806
arnt@sda3:~$




   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Distributor ID: Devuan
Description:Devuan GNU/Linux 2.0 (ascii)
Release:2.0
Codename:   ascii

Architecture: armv6l

Kernel: Linux 4.19.32+
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=locale: Cannot
set LC_ALL to default locale: No such file or directory UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages gpsd depends on:
ii  adduser  3.115
ii  init-system-helpers  1.48+devuan2.0
ii  libbluetooth35.43-2+deb9u1
ii  libc62.24-11+deb9u4
ii  libdbus-1-3  1.10.22-1+devuan2
ii  libgps22 

Bug#925909: [Help] Re: pbgenomicconsensus: autopkgtest regression

2019-04-07 Thread Andreas Tille
On Sun, Apr 07, 2019 at 02:08:54PM +0200, Liubov Chuprikova wrote:
> I have just added python-pytest and one more missing library. Now the tests
> should pass.

Finally it passes now.

Thanks a lot, Andreas.

-- 
http://fam-tille.de



Bug#921176: redis-server service is failing to start in buster lxc container

2019-04-07 Thread Antonio Terceiro
On Sun, Apr 07, 2019 at 08:37:53PM +0200, Pierre-Elliott Bécue wrote:
> Le dimanche 24 février 2019 à 15:01:14+0100, intrigeri a écrit :
> > Control: reassign -1 lxc
> > Control: severity -1 important
> > 
> > Hi,
> > 
> > Pirate Praveen:
> > > In dmesg inside container (same error on the host as well), so it seems 
> > > apparmor is blocking it.
> > 
> > > [14760.307180] audit: type=1400 audit(1549992481.311:156): 
> > > apparmor="DENIED" operation="mount" info="failed flags match" error=-13 
> > > profile="lxc-container-default-cgns" name="/" pid=20531 
> > > comm="(s-server)" flags="rw, rslave"
> > 
> > The lxc-container-default-cgns profile is shipped by the lxc
> > package ⇒ reassigning.
> > 
> > This looks very much like LXC bug #916639 so please retry with:
> > lxc 1:3.1.0+really3.0.3-3 or newer?
> > 
> > If that's not sufficient, you might need to set these options for
> > your container:
> > 
> >lxc.apparmor.profile = generated
> >lxc.apparmor.allow_nesting = 1
> > 
> > (On sid, these settings are in /etc/lxc/default.conf already but I'm
> > not familiar with LXC and I don't know if they'll apply to
> > pre-existing containers.)
> > 
> > Thanks in advance!
> > 
> > Also, I'm setting severity to non-RC as it would be unfortunate to
> > block the migration to testing of… the very version that likely fixes
> > this bug. Once it's clarified that this is #916639, I'll fix
> > the metadata.
> > 
> > Cheers,
> 
> Dear Praveen,
> 
> Did you give a test at the latest LXC3 releases?
> 
> I wonder if I can close this bug report now.

FWIW I just tested in a clean container and redis-server starts just
fine.


signature.asc
Description: PGP signature


Bug#926613: openssh-server: Locked out of server after upgrading to buster.

2019-04-07 Thread Sam Bull
Package: openssh-server
Severity: serious
Justification: Policy 8.2

Dear Maintainer,

Due to a change in how some options are handled in sshd_config, upgrading to 
buster can result in the user getting locked out of their system if the config 
is not updated.

Probably the most likely cause (and what occurred to me) is if the 
PubkeyAcceptedKeyTypes includes ssh-rsa and the admin logs in with an RSA key. 
After upgrading, the user will no longer be able to connect to the server.
The solution for this case is to replace ssh-rsa with rsa-sha2-256,rsa-sha2-512.

At the very least this needs to be mentioned in the upgrade instructions in the 
release notes for buster.


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.15.0-47-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=C.UTF-8 (charmap=locale: Cannot set 
LC_MESSAGES to default locale: No such file or directory
locale: Cannot set LC_ALL to default locale: No such file or directory
UTF-8), LANGUAGE=en_GB:en (charmap=locale: Cannot set LC_MESSAGES to default 
locale: No such file or directory
locale: Cannot set LC_ALL to default locale: No such file or directory
UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages openssh-server depends on:
ii  adduser3.118
ii  debconf [debconf-2.0]  1.5.71
ii  dpkg   1.19.6
ii  libaudit1  1:2.8.4-2
ii  libc6  2.28-8
ii  libcom-err21.44.5-1
ii  libgssapi-krb5-2   1.17-2
ii  libkrb5-3  1.17-2
ii  libpam-modules 1.3.1-5
ii  libpam-runtime 1.3.1-5
ii  libpam0g   1.3.1-5
ii  libselinux12.8-1+b1
ii  libssl1.1  1.1.1b-1
ii  libsystemd0241-1
pn  libwrap0   
ii  lsb-base   10.2019031300
ii  openssh-client 1:7.9p1-9
pn  openssh-sftp-server
pn  procps 
pn  ucf
ii  zlib1g 1:1.2.11.dfsg-1

Versions of packages openssh-server recommends:
ii  libpam-systemd  241-1
pn  ncurses-term
ii  xauth   1:1.0.10-1

Versions of packages openssh-server suggests:
pn  molly-guard   
pn  monkeysphere  
pn  rssh  
pn  ssh-askpass   
pn  ufw   



Bug#916145: closure-compiler: Not working with recent JS code

2019-04-07 Thread Markus Koschany
Am 07.04.19 um 20:36 schrieb Adrian Bunk:
> On Sun, Apr 07, 2019 at 11:12:30AM -0700, tony mancill wrote:
>> ...
>> Somewhat related, given that closure-compiler upstream releases about
>> once a month on average, perhaps it is a candidate for doing Something
>> Different.
> 
> That's pretty normal for a package, and we aren't even close to the 
> point where this would matter:
> 
> It is by design that stretch ships 2016 versions of packages and
> buster ships 2018 versions of packages.
> 
> But stretch and buster shipping a 2013 version of a package with more 
> recent versions means that even the version in stretch is 3 years
> older than it could be.

What tony wanted to imply is that closure-compiler requires more
maintenance effort than other packages and releases more frequently
which means more changes, more often, more new build-dependencies and
more work. The day is only 24 hours long for all of us. The maintainer
who introduced this package left the team shortly afterwards and tony
just spent some of his time to keep this package in Debian (a real team
effort) because it seems useful for other packages. Those who contribute
nothing to the packaging work, which also means packaging new
build-dependencies and making sure that r-deps continue to work, have
absolutely no right to complain about how up-to-date a package is.

>> Maybe a closure-compiler-installer package or something like that?
>> ...
> 
> The main user of the version currently in buster/unstable are reverse 
> dependencies inside Debian. And some are already blocked by the outdated 
> version.

This is the only reason why this package is still in Debian and
apparently closure-compiler seems to work for those packages, otherwise
the maintainers would have noticed it, I guess? So it is still useful
for its main purpose, being a build-dependency for other packages,
although heavily outdated.

The only positive way forward is to update this package and its
reverse-dependencies. The less positive way is to remove the package
from Debian. Just to be clear, personally I don't mind but the timing is
bad. Maintainers of reverse-dependencies should have had a chance to
contribute a fix or ensure that their packages work without
closure-compiler but it looks to me it never happened. So as long as
those r-deps are useful and work correctly, bug #916145 is not RC.

> closure-compiler-installer would force such packages out of main.

We know that. At least it would give users "something", that's the quick
and dirty approach. IMO this would be the perfect fit for our "bikeshed"
or the currently discussed Debian User Repository idea. However it isn't
implemented yet.






signature.asc
Description: OpenPGP digital signature


Bug#926595: cache policy

2019-04-07 Thread Laurent Debian
Dear maintainers,

Below is the output you required (in French).

I hope I am not just making you lose time because of a bad  config

Regards,

python3-numpy:
  Installé : 1:1.16.2-1
  Candidat : 1:1.16.2-1
 Table de version :
 *** 1:1.16.2-1 500
500 http://ftp.fr.debian.org/debian sid/main amd64 Packages
100 /var/lib/dpkg/status
 1:1.12.1-3 500
500 http://ftp.fr.debian.org/debian stable/main amd64 Packages
python3-scipy:
  Installé : 1.1.0-4
  Candidat : 1.1.0-4
 Table de version :
 *** 1.1.0-4 500
500 http://ftp.fr.debian.org/debian sid/main amd64 Packages
100 /var/lib/dpkg/status
 0.18.1-2 500
500 http://ftp.fr.debian.org/debian stable/main amd64 Packages
libblas3:
  Installé : 3.8.0-2
  Candidat : 3.8.0-2
 Table de version :
 *** 3.8.0-2 500
500 http://ftp.fr.debian.org/debian sid/main amd64 Packages
100 /var/lib/dpkg/status
 3.7.0-2 500
500 http://ftp.fr.debian.org/debian stable/main amd64 Packages


Bug#926612: missing hp-laserjet_200_colormfp_m276-ps.ppd

2019-04-07 Thread Richard Kettlewell
Package: hpijs-ppds
Version: 3.16.11+repack0-3

Hi,

I have a HP LaserJet 200 colorMFP M276n. The PPD for this printer is in
the hplip source package:

$ pwd
/home/rjk/junk/hplip-3.16.11+repack0
$ find . -name *m276*
./prnt/ps/hp-laserjet_200_colormfp_m276-ps.ppd.gz

However it is not in the binary package:

$ dpkg --contents hpijs-ppds_3.16.11+repack0-3_all.deb |grep m267
$

Is there any reason for this? Please could it be added?

ttfn/rjk



Bug#900912: Enabling jaw (Java-atk-wrapper) by default ? (Bug#900912)

2019-04-07 Thread Samuel Thibault
Vincent Privat, le dim. 07 avril 2019 21:55:33 +0200, a ecrit:
> Disabling it only through accessibility.properties means we have no control
> over it from JOSM. So when the next bug appears, we'll have to tell all of our
> impacted Ubuntu users to modify the file.

We are here only talking about Buster, not Ubuntu.

> It's cumbersome for us, and for them.
> I would prefer a runtime flag we can set in josm launcher. I don't want to
> experience major issues like [1]https://josm.openstreetmap.de/ticket/12022 
> and 
> [2]https://josm.openstreetmap.de/ticket/1 again.

AFAIK, these have been fixed, so won't appear again.

Exposing jaw largely *before* deciding to enable it for Buster is
precisely what could be a better option. Limited-scope testing wouldn't
expose the bugs seen in JOSM.

Samuel



Bug#919929: python-scipy's autopkgtests break again

2019-04-07 Thread Helmut Grohne
Control: reopen -1

I'm seeing this failure again:

https://ci.debian.net/data/autopkgtest/testing/amd64/p/python-scipy/2213599/log.gz

Helmut



Bug#926611: unblock: schema2ldif/1.3-3

2019-04-07 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package schema2ldif

+  [ Ondřej Nový ]
+  * d/copyright:
++ Change Format URL to correct one

Formalistic auto-commit that already was in git log for next upload.

+  [ Mike Gabriel ]
+  * debian/control:
++ Update Homepage: URL to one that resolves and exists.

In fact, the homepage URL used so far is not available anymore. Replaced
by an existing one.

++ Bump Standards-Version: to 4.3.0. No changes needed.

Formalistic change.

++ Update Maintainer: field. Use tracker.debian.org team mail address.
+  (Closes: ##925526).

-> RC bug fix. Previous mailing list address is not available anymore.


unblock schema2ldif/1.3-3

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-2-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru schema2ldif-1.3/debian/changelog schema2ldif-1.3/debian/changelog
--- schema2ldif-1.3/debian/changelog2018-06-11 15:03:44.0 +0200
+++ schema2ldif-1.3/debian/changelog2019-04-07 21:25:06.0 +0200
@@ -1,3 +1,18 @@
+schema2ldif (1.3-3) unstable; urgency=medium
+
+  [ Ondřej Nový ]
+  * d/copyright:
++ Change Format URL to correct one
+
+  [ Mike Gabriel ]
+  * debian/control:
++ Update Homepage: URL to one that resolves and exists.
++ Bump Standards-Version: to 4.3.0. No changes needed.
++ Update Maintainer: field. Use tracker.debian.org team mail address.
+  (Closes: ##925526).
+
+ -- Mike Gabriel   Sun, 07 Apr 2019 21:25:06 +0200
+
 schema2ldif (1.3-2) unstable; urgency=medium
 
   * debian/control:
diff -Nru schema2ldif-1.3/debian/control schema2ldif-1.3/debian/control
--- schema2ldif-1.3/debian/control  2018-06-11 15:03:44.0 +0200
+++ schema2ldif-1.3/debian/control  2019-04-07 21:23:53.0 +0200
@@ -1,14 +1,14 @@
 Source: schema2ldif
 Section: text
 Priority: optional
-Maintainer: FusionDirectory Maintenance Team 

+Maintainer: FusionDirectory Packagers 
 Uploaders:
  Benoit Mortier ,
  Mike Gabriel ,
 Build-Depends:
  debhelper (>= 11~),
-Standards-Version: 4.1.4
-Homepage: https://forge.fusiondirectory.org/projects/schema2ldif/
+Standards-Version: 4.3.0
+Homepage: 
https://www.fusiondirectory.org/projects/schema2ldif-project-and-components/
 Vcs-Browser: https://salsa.debian.org/debian/schema2ldif
 Vcs-Git: https://salsa.debian.org/debian/schema2ldif.git
 
diff -Nru schema2ldif-1.3/debian/copyright schema2ldif-1.3/debian/copyright
--- schema2ldif-1.3/debian/copyright2018-06-11 15:03:44.0 +0200
+++ schema2ldif-1.3/debian/copyright2019-04-07 21:20:14.0 +0200
@@ -1,4 +1,4 @@
-Format: https://www.debian.org/doc/copyright-format/1.0
+Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
 Upstream-Name: FusionDirectory
 Upstream-Contact: Contact 
 Source: https://repos.fusiondirectory.org/sources/schema2ldif/


Bug#147164: ping and new proposal

2019-04-07 Thread Thomas Lange


Remove the outdated /doc/docpolicy. Even the "current draft of the new
policy" is outdated and deprecated.

Instead of a whole policy manual which is outdated for a long time my
proposal is to just list a few things to consider on /doc.


Currently we have these items on /doc about the policy:

Manual licenses comply with DFSG.
Directory structure: filesystem, WWW, FTP.
We use Docbook XML for our documents. Use of DebianDoc SGML is being phased 
out.
Every document has one maintainer.



"Every document has one maintainer." seems to be not true since I
found this in debian/control:
Maintainer: Debian Documentation Project 

So just remove this item.


My proposal to list these items on /doc:

Manual licenses comply with DFSG
We use Docbook XML for our documents
The sources should be at https://salsa.debian.org/ddp-team
www.debian.org/doc/ will be the official URL
Please ask on debian-doc if you like to write a new document


Any objections on removing /doc/docpolicy?

-- 
regards Thomas



Bug#926610: unblock: ceph/12.2.11+dfsg1-2.1

2019-04-07 Thread Bernd Zeimetz
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi release team,

please unblock package ceph.

I've NMUed it to add a missing systemd @.service file,
which basically renedered the package unusuable
(unless you'd be doing crazy stuff which is far away from
the documented process of setting up a ceph cluster).

Find the short diff below.

unblock ceph/12.2.11+dfsg1-2.1


Thanks,

Bernd



bzed@think ~debian/BSP/ceph (git)-[luminous/unstable] % git diff-tree -p 
debian/12.2.11+dfsg1-2..debian/12.2.11+dfsg1-2.1
diff --git a/debian/changelog b/debian/changelog
index 92d40bfbe4..44d4e3a672 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+ceph (12.2.11+dfsg1-2.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * [3194010] Install ceph-volume@.service into ceph-osd.
+(Closes: #924061)
+
+ -- Bernd Zeimetz   Fri, 05 Apr 2019 15:12:52 +0200
+
 ceph (12.2.11+dfsg1-2) unstable; urgency=medium

   * [27a321] Fix builds on 32bit architectures
diff --git a/debian/rules b/debian/rules
index d167e96e96..ae1c2270e1 100755
--- a/debian/rules
+++ b/debian/rules
@@ -123,8 +123,10 @@ override_dh_installinit:
install -d -m0755 debian/ceph-osd/lib/systemd/system
install -m0644 systemd/ceph-osd@.service 
debian/ceph-osd/lib/systemd/system
install -m0644 systemd/ceph-disk@.service 
debian/ceph-osd/lib/systemd/system
+   install -m0644 systemd/ceph-volume@.service 
debian/ceph-osd/lib/systemd/system
sed -i s./etc/sysconfig/./etc/default/.g 
debian/ceph-osd/lib/systemd/system/ceph-osd@.service
sed -i s./etc/sysconfig/./etc/default/.g 
debian/ceph-osd/lib/systemd/system/ceph-disk@.service
+   sed -i s./etc/sysconfig/./etc/default/.g 
debian/ceph-osd/lib/systemd/system/ceph-volume@.service
install -m0644 systemd/ceph-osd.target 
debian/ceph-osd/lib/systemd/system
# systemd:ceph-mds
install -d -m0755 debian/ceph-mds/lib/systemd/system
bzed@think ~debian/BSP/ceph (git)-[luminous/unstable] %



-- 
 Bernd ZeimetzDebian GNU/Linux Developer
 http://bzed.dehttp://www.debian.org
 GPG Fingerprint: ECA1 E3F2 8E11 2432 D485  DD95 EB36 171A 6FF9 435F



Bug#926609: unblock: apache2/2.4.38-3

2019-04-07 Thread Stefan Fritsch
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package apache2, it fixes various security issues (no
other changes).


Debdiff is attached

unblock apache2/2.4.38-3
diff -Nru apache2-2.4.38/debian/changelog apache2-2.4.38/debian/changelog
--- apache2-2.4.38/debian/changelog 2019-01-31 21:54:05.0 +0100
+++ apache2-2.4.38/debian/changelog 2019-04-07 20:15:40.0 +0200
@@ -1,3 +1,40 @@
+apache2 (2.4.38-3) unstable; urgency=high
+
+  [ Marc Deslauriers ]
+  * SECURITY UPDATE: read-after-free on a string compare in mod_http2
+- debian/patches/CVE-2019-0196.patch: disentangelment of stream and
+  request method in modules/http2/h2_request.c.
+- CVE-2019-0196
+  * SECURITY UPDATE: privilege escalation from modules' scripts
+- debian/patches/CVE-2019-0211.patch: bind the bucket number of each
+  child to its slot number in include/scoreboard.h,
+  server/mpm/event/event.c, server/mpm/prefork/prefork.c,
+  server/mpm/worker/worker.c.
+- CVE-2019-0211
+  * SECURITY UPDATE: mod_ssl access control bypass
+- debian/patches/CVE-2019-0215.patch: restore SSL verify state after
+  PHA failure in TLSv1.3 in modules/ssl/ssl_engine_kernel.c.
+- CVE-2019-0215
+  * SECURITY UPDATE: mod_auth_digest access control bypass
+- debian/patches/CVE-2019-0217.patch: fix a race condition in
+  modules/aaa/mod_auth_digest.c.
+- CVE-2019-0217
+  * SECURITY UPDATE: URL normalization inconsistincy
+- debian/patches/CVE-2019-0220-1.patch: merge consecutive slashes in
+  the path in include/http_core.h, include/httpd.h, server/core.c,
+  server/request.c, server/util.c.
+- debian/patches/CVE-2019-0220-2.patch: fix r->parsed_uri.path safety
+  in server/request.c, server/util.c.
+- debian/patches/CVE-2019-0220-3.patch: maintainer mode fix in
+  server/util.c.
+- CVE-2019-0220
+
+  [ Stefan Fritsch ]
+  * Pull security fixes from 2.4.39 via Ubuntu
+  * CVE-2019-0197: mod_http2: Fix possible crash on late upgrade
+
+ -- Stefan Fritsch   Sun, 07 Apr 2019 20:15:40 +0200
+
 apache2 (2.4.38-2) unstable; urgency=medium
 
   * Disable "reset" test in allowmethods.t (Closes: #921024)
diff -Nru apache2-2.4.38/debian/patches/CVE-2019-0196.patch 
apache2-2.4.38/debian/patches/CVE-2019-0196.patch
--- apache2-2.4.38/debian/patches/CVE-2019-0196.patch   1970-01-01 
01:00:00.0 +0100
+++ apache2-2.4.38/debian/patches/CVE-2019-0196.patch   2019-04-07 
19:37:55.0 +0200
@@ -0,0 +1,27 @@
+From 8de3c6f2a0df79d1476c89ec480a96f9282cea28 Mon Sep 17 00:00:00 2001
+From: Stefan Eissing 
+Date: Tue, 5 Feb 2019 11:52:28 +
+Subject: [PATCH] Merge of r1852986 from trunk:
+
+mod_http2: disentangelment of stream and request method.
+
+
+
+git-svn-id: 
https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1852989 
13f79535-47bb-0310-9956-ffa450edef68
+---
+ modules/http2/h2_request.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/modules/http2/h2_request.c b/modules/http2/h2_request.c
+index 8899c4feb75..5ee88e9679f 100644
+--- a/modules/http2/h2_request.c
 b/modules/http2/h2_request.c
+@@ -266,7 +266,7 @@ request_rec *h2_request_create_rec(const h2_request *req, 
conn_rec *c)
+ 
+ /* Time to populate r with the data we have. */
+ r->request_time = req->request_time;
+-r->method = req->method;
++r->method = apr_pstrdup(r->pool, req->method);
+ /* Provide quick information about the request method as soon as known */
+ r->method_number = ap_method_number_of(r->method);
+ if (r->method_number == M_GET && r->method[0] == 'H') {
diff -Nru apache2-2.4.38/debian/patches/CVE-2019-0197.patch 
apache2-2.4.38/debian/patches/CVE-2019-0197.patch
--- apache2-2.4.38/debian/patches/CVE-2019-0197.patch   1970-01-01 
01:00:00.0 +0100
+++ apache2-2.4.38/debian/patches/CVE-2019-0197.patch   2019-04-07 
19:49:17.0 +0200
@@ -0,0 +1,93 @@
+# https://svn.apache.org/r1855406
+--- apache2.orig/modules/http2/h2_conn.c
 apache2/modules/http2/h2_conn.c
+@@ -305,6 +305,10 @@ conn_rec *h2_slave_create(conn_rec *mast
+ c->notes  = apr_table_make(pool, 5);
+ c->input_filters  = NULL;
+ c->output_filters = NULL;
++c->keepalives = 0;
++#if AP_MODULE_MAGIC_AT_LEAST(20180903, 1)
++c->filter_conn_ctx= NULL;
++#endif
+ c->bucket_alloc   = apr_bucket_alloc_create(pool);
+ c->data_in_input_filters  = 0;
+ c->data_in_output_filters = 0;
+@@ -332,16 +336,15 @@ conn_rec *h2_slave_create(conn_rec *mast
+ ap_set_module_config(c->conn_config, mpm, cfg);
+ }
+ 
+-ap_log_cerror(APLOG_MARK, APLOG_TRACE2, 0, c, 
+-  "h2_stream(%ld-%d): created slave", master->id, slave_id);
++ap_log_cerror(APLOG_MARK, APLOG_TRACE3, 0, c, 
++  "h2_slave(%s): created", c->log_id);
+ return c;
+ }
+ 
+ void 

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-04-07 Thread gregor herrmann
On Sun, 07 Apr 2019 18:39:44 +0200, Guilhem Moulin wrote:

> > I can't reproduce this problem:
> Interesting, are you talking TLS 1.3?

Good question :)
 
> $ dpkg-query -l "libssl*" "libnet-ssleay-perl" "liblwp-protocol-https-perl" 
> "libio-socket-ssl-perl"
> Desired=Unknown/Install/Remove/Purge/Hold
> | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
> |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
> ||/ Name   Version  Architecture Description
> +++-==---=
> ii  libio-socket-ssl-perl  2.060-3  all  Perl module 
> implementing object oriented interface to SSL sockets
> ii  liblwp-protocol-https-perl 6.07-2   all  HTTPS driver for 
> LWP::UserAgent
> ii  libnet-ssleay-perl 1.85-2+b1amd64Perl module for 
> Secure Sockets Layer (SSL)
> ii  libssl-dev:amd64   1.1.1b-1 amd64Secure Sockets Layer 
> toolkit - development files
> un  libssl-doc   (no description 
> available)
> un  libssl0.9.8  (no description 
> available)
> un  libssl1.0-dev(no description 
> available)
> ii  libssl1.1:amd641.1.1b-1 amd64Secure Sockets Layer 
> toolkit - shared libraries

% dpkg -l "libssl*" "libnet-ssleay-perl" "liblwp-protocol-https-perl" 
"libio-socket-ssl-perl" 
  
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name   Version Architecture Description
+++-==-===--=
ii  libio-socket-ssl-perl  2.060-3 all  Perl module 
implementing object oriented interface to SSL sockets
ii  liblwp-protocol-https-perl 6.07-2  all  HTTPS driver for 
LWP::UserAgent
ii  libnet-ssleay-perl 1.85-2+b1   amd64Perl module for 
Secure Sockets Layer (SSL)
un  libssl0.9.8 (no description 
available)
un  libssl1.0.0 (no description 
available)
ii  libssl1.0.2:amd64  1.0.2r-1~deb9u1 amd64Secure Sockets 
Layer toolkit - shared libraries
ii  libssl1.1:amd641.1.1b-1amd64Secure Sockets 
Layer toolkit - shared libraries
ii  libssl1.1:i386 1.1.1b-1i386 Secure Sockets 
Layer toolkit - shared libraries

Hm I note that I still have libssl1.0.2 installed additionally.

Alright, after purging libssl1.0.2 (and the outdated packages which
depended on it *cough*) I get the hang as well:

% time perl -MLWP::UserAgent -e 
'LWP::UserAgent->new->post("https://facebook.com;, { data => "foo" }) or die'   

[long time nothing]
perl -MLWP::UserAgent -e   0.18s user 0.02s system 0% cpu 3:06.66 total


Thanks for the push in the right direction!
 
> > % time perl -MLWP::UserAgent -e 
> > 'LWP::UserAgent->new->post("https://twitter.com;, { data => "foo" }) or die'
> > perl -MLWP::UserAgent -e   0.13s user 0.02s system 36% cpu 0.415 total
> 
> twitter.com doesn't support TLS 1.3 though, right?

Good catch, I just wanted to try a random website which is IPv4-only.


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   NP: Furry Lewis: Billy lyons & stack o' lee


signature.asc
Description: Digital Signature


Bug#926607: tracetuner FTCBFS: upstream Makefiles hard code build architecture compiler

2019-04-07 Thread Helmut Grohne
Source: tracetuner
Version: 3.0.6~beta+dfsg-1
Tags: patch upstream
User: helm...@debian.org
Usertags: rebootstrap

tracetuner fails to cross build from source, because it seeds the LINK.c
variable from the build architecture compiler in two occasions.
Defaulting them to $(CXX) fixes the cross build failure and should be
acceptable upstream. Please consider applying the attached patch.

Helmut
--- tracetuner-3.0.6~beta+dfsg.orig/src/mkchk/Makefile
+++ tracetuner-3.0.6~beta+dfsg/src/mkchk/Makefile
@@ -37,7 +37,7 @@
 CFLAGS += -I$(INCTOOLSDIR)/io_lib
 CFLAGS += -I$(INCTOOLSDIR)/io_lib/utils $(EXTRACFLAGS)
 
-LINK.c = g++
+LINK.c = $(CXX)
 
 $(RELDIR)/checkqv: $(CHECKQVOBJS) $(TTLIB)
 	@mkdir -p $(RELDIR)
--- tracetuner-3.0.6~beta+dfsg.orig/src/mklut/Makefile
+++ tracetuner-3.0.6~beta+dfsg/src/mklut/Makefile
@@ -57,7 +57,7 @@
 	mkdir -p $(OBJDIR)
 	$(COMPILE.c) $< -o $@
 
-LINK.c = g++
+LINK.c = $(CXX)
 
 $(RELDIR)/lut: $(LUTOBJS) $(TTLIB) 
 	@mkdir -p $(RELDIR)


Bug#926606: hawknl FTCBFS: does not pass cross tools to make

2019-04-07 Thread Helmut Grohne
Source: hawknl
Version: 1.6.8+dfsg2-1
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap

hawknl fails to cross build from source, because it does not pass cross
tools to make. The easiest way of doing so - using dh_auto_build - makes
hawknl cross buildable. Please consider applying the attached patch.

Helmut
diff -u hawknl-1.6.8+dfsg2/debian/changelog hawknl-1.6.8+dfsg2/debian/changelog
--- hawknl-1.6.8+dfsg2/debian/changelog
+++ hawknl-1.6.8+dfsg2/debian/changelog
@@ -1,3 +1,10 @@
+hawknl (1.6.8+dfsg2-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Let dh_auto_build pass cross tools to make. (Closes: #-1)
+
+ -- Helmut Grohne   Sun, 07 Apr 2019 20:38:09 +0200
+
 hawknl (1.6.8+dfsg2-1) unstable; urgency=low
 
   [ Barry deFreese ]
diff -u hawknl-1.6.8+dfsg2/debian/rules hawknl-1.6.8+dfsg2/debian/rules
--- hawknl-1.6.8+dfsg2/debian/rules
+++ hawknl-1.6.8+dfsg2/debian/rules
@@ -31,7 +31,7 @@
 build-stamp: 
dh_testdir
 
-   $(MAKE) -C src -f makefile.linux
+   dh_auto_build --sourcedirectory=src --buildsystem=makefile -- -f 
makefile.linux
 
touch build-stamp
 
diff -u hawknl-1.6.8+dfsg2/debian/control hawknl-1.6.8+dfsg2/debian/control
--- hawknl-1.6.8+dfsg2/debian/control
+++ hawknl-1.6.8+dfsg2/debian/control
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer: Debian Games Team 
 Uploaders: Barry deFreese 
-Build-Depends: debhelper (>= 5.0.0), quilt
+Build-Depends: debhelper (>= 7), quilt
 Standards-Version: 3.8.3
 Homepage: http://hawksoft.com/hawknl/
 Vcs-Git: git://git.debian.org/pkg-games/hawknl.git


Bug#926608: duktape FTCBFS: does not pass cross tools to make

2019-04-07 Thread Helmut Grohne
Source: duktape
Version: 2.3.0-1
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap

duktape fails to cross build from source, because it does not pass cross
tools to make. The easiest way of fixing that - using dh_auto_build -
makes duktape cross buildable. Please consider applying the attached
patch.

Helmut
diff --minimal -Nru duktape-2.3.0/debian/changelog 
duktape-2.3.0/debian/changelog
--- duktape-2.3.0/debian/changelog  2018-08-14 22:12:45.0 +0200
+++ duktape-2.3.0/debian/changelog  2019-04-07 20:14:24.0 +0200
@@ -1,3 +1,10 @@
+duktape (2.3.0-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Let dh_auto_build pass cross tools to make. (Closes: #-1)
+
+ -- Helmut Grohne   Sun, 07 Apr 2019 20:14:24 +0200
+
 duktape (2.3.0-1) unstable; urgency=medium
 
   * New upstream release
diff --minimal -Nru duktape-2.3.0/debian/rules duktape-2.3.0/debian/rules
--- duktape-2.3.0/debian/rules  2017-11-24 18:23:21.0 +0100
+++ duktape-2.3.0/debian/rules  2019-04-07 20:14:24.0 +0200
@@ -10,8 +10,8 @@
 
 override_dh_auto_build:
mkdir -p tmp-build/lib tmp-build/include
-   make -f Makefile.sharedlibrary install
-   make -f Makefile.cmdline
+   dh_auto_build --buildsystem=makefile -- -f Makefile.sharedlibrary 
install
+   dh_auto_build --buildsystem=makefile -- -f Makefile.cmdline
cat debian/duktape.pc.in|sed "s/#TRIPLE#/$(DEB_HOST_MULTIARCH)/g" > 
debian/duktape.pc
dh_auto_build
 


Bug#926605: webissues FTCBFS: uses the build architecture qmake

2019-04-07 Thread Helmut Grohne
Source: webissues
Version: 1.1.5-3
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap

webissues fails to cross build from source, because it uses the build
architecture qmake. The attached patch passes a suitable qmake via
-qmake to ./configure and makes webissues cross buildable. Plase
consider applying it.

Helmut
diff --minimal -Nru webissues-1.1.5/debian/changelog 
webissues-1.1.5/debian/changelog
--- webissues-1.1.5/debian/changelog2018-03-15 15:39:26.0 +0100
+++ webissues-1.1.5/debian/changelog2019-04-07 20:42:30.0 +0200
@@ -1,3 +1,10 @@
+webissues (1.1.5-3.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Pass a triplet-prefixed qmake to configure. (Closes: #-1)
+
+ -- Helmut Grohne   Sun, 07 Apr 2019 20:42:30 +0200
+
 webissues (1.1.5-3) unstable; urgency=medium
 
   * Set a save URL in the homepage field.
diff --minimal -Nru webissues-1.1.5/debian/rules webissues-1.1.5/debian/rules
--- webissues-1.1.5/debian/rules2018-03-15 15:39:26.0 +0100
+++ webissues-1.1.5/debian/rules2019-04-07 20:42:30.0 +0200
@@ -1,13 +1,20 @@
 #!/usr/bin/make -f
 
+include /usr/share/dpkg/architecture.mk
 export DEB_BUILD_MAINT_OPTIONS = hardening=+all
 export QT_SELECT=qt5
+ifeq ($(DEB_BUILD_ARCH),$(DEB_HOST_ARCH))
+QMAKE = qmake
+else
+QMAKE = $(DEB_HOST_GNU_TYPE)-qmake
+endif
 
 %:
dh $@
 
 override_dh_auto_configure:
./configure \
+   -qmake `which $(QMAKE)` \
-system-sqlite \
-prefix /usr \
-destdir $(CURDIR)/debian/tmp/ \


Bug#925167: kmod: add softdep dwc3 to have GBit network on Odroid

2019-04-07 Thread Marco d'Itri
Control: reassign -1 src:linux
Control: retitle -1 add a modules softdep to dwc3 to fix it on odroid

On Mar 22, Jochen Sprickerhof  wrote:

> Not apart from that I was not aware of that option :). I've send a patch
> upstream:
> 
> https://marc.info/?l=linux-usb=155321315512949=2
> 
> and will close this if it's accepted.
I am reassigning the bug to the kernel since this is where it should be 
handled anyway.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Bug#921176: redis-server service is failing to start in buster lxc container

2019-04-07 Thread Pierre-Elliott Bécue
Le dimanche 24 février 2019 à 15:01:14+0100, intrigeri a écrit :
> Control: reassign -1 lxc
> Control: severity -1 important
> 
> Hi,
> 
> Pirate Praveen:
> > In dmesg inside container (same error on the host as well), so it seems 
> > apparmor is blocking it.
> 
> > [14760.307180] audit: type=1400 audit(1549992481.311:156): 
> > apparmor="DENIED" operation="mount" info="failed flags match" error=-13 
> > profile="lxc-container-default-cgns" name="/" pid=20531 
> > comm="(s-server)" flags="rw, rslave"
> 
> The lxc-container-default-cgns profile is shipped by the lxc
> package ⇒ reassigning.
> 
> This looks very much like LXC bug #916639 so please retry with:
> lxc 1:3.1.0+really3.0.3-3 or newer?
> 
> If that's not sufficient, you might need to set these options for
> your container:
> 
>lxc.apparmor.profile = generated
>lxc.apparmor.allow_nesting = 1
> 
> (On sid, these settings are in /etc/lxc/default.conf already but I'm
> not familiar with LXC and I don't know if they'll apply to
> pre-existing containers.)
> 
> Thanks in advance!
> 
> Also, I'm setting severity to non-RC as it would be unfortunate to
> block the migration to testing of… the very version that likely fixes
> this bug. Once it's clarified that this is #916639, I'll fix
> the metadata.
> 
> Cheers,

Dear Praveen,

Did you give a test at the latest LXC3 releases?

I wonder if I can close this bug report now.

-- 
Pierre-Elliott Bécue
GPG: 9AE0 4D98 6400 E3B6 7528  F493 0D44 2664 1949 74E2
It's far easier to fight for one's principles than to live up to them.


signature.asc
Description: PGP signature


Bug#926062: qbitorrent crashes, blames QNetworkAccessM

2019-04-07 Thread sledgehammer999
This seems the same bug as
https://github.com/qbittorrent/qBittorrent/issues/9667
A possible workaround is in PR:
https://github.com/qbittorrent/qBittorrent/pull/10445

Or you can just disable the download of tracker favicons from the advanced
settings.
Out of curiosity: How many trackers do you have? (number is shown in the
sidepanel)

On Sat, Apr 6, 2019 at 2:12 AM Tobias Frost  wrote:

> Control: serverity -1 important
> Control: tags -1 unreproducible moreinfo
>
> Hi shirish,
>
> I tried to reproduce your SEGV, but here qbittorrent seems to work
> fine. Do you have additional informations about how to trigger the
> SEGV, like what you are doing to trigger it or like?
>
> Cheers from the Salzburg BSP,
> tobi
>
>


Bug#916145: closure-compiler: Not working with recent JS code

2019-04-07 Thread Adrian Bunk
On Sun, Apr 07, 2019 at 11:12:30AM -0700, tony mancill wrote:
>...
> Somewhat related, given that closure-compiler upstream releases about
> once a month on average, perhaps it is a candidate for doing Something
> Different.

That's pretty normal for a package, and we aren't even close to the 
point where this would matter:

It is by design that stretch ships 2016 versions of packages and
buster ships 2018 versions of packages.

But stretch and buster shipping a 2013 version of a package with more 
recent versions means that even the version in stretch is 3 years
older than it could be.

> Maybe a closure-compiler-installer package or something like that?
>...

The main user of the version currently in buster/unstable are reverse 
dependencies inside Debian. And some are already blocked by the outdated 
version.

closure-compiler-installer would force such packages out of main.

> Cheers,
> tony 
> (wearing a Java Team hat...)

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Bug#925899: lxc: Unprivileged containers fail to start after recent updates

2019-04-07 Thread Pierre-Elliott Bécue
Le dimanche 31 mars 2019 à 14:55:52+0200, intrigeri a écrit :
> Hi,
> 
> Regis Smith:
> >> > lxc-start: test: lsm/apparmor.c: apparmor_prepare: 974 Cannot use
> > generated profile: apparmor_parser not available
> 
> I've reproduced this problem and I could fix it with:
> 
>   lxc.apparmor.profile = unconfined
> 
> Regis, can you please confirm this fix works for you as well?
> 
> Pierre-Elliott Bécue:
> > Cc-ing intrigeri: I'm reconsidering the /etc/lxc/default.conf setting
> > regarding apparmor.profile. Putting generated breaks many unpriv
> > containers as they have no apparmor.profile set in their configuration.
> 
> Considering kernel.unprivileged_userns_clone is disabled by default
> on Debian, IMO we should:
> 
>  - Optimize for the Debian defaults, i.e. privileged containers:
> - Keep the settings we added recently in /etc/lxc/default.conf
> - Replace "Suggests: apparmor" with "Depends: apparmor", because
>   the default config will create containers that fail to start
>   if the apparmor package is not installed.
> 
>  - Document how to use unprivileged containers on Debian. It's not as
>if they were previously working fine by default and AppArmor broke
>them — regardless of AppArmor, on current sid with the default
>kernel settings and lxc.apparmor.profile = unconfined, trying to
>start an unprivileged container fails in a very much user
>unfriendly way:
>
>  conf.c: chown_mapped_root: 3250 lxc-usernsexec failed: Permission denied 
> - Failed to open tt
> 
>That's a first usability stumbling block. The new
>lxc.apparmor.profile default setting merely adds a second one.
> 
>So I think README.Debian should document the need for
>kernel.unprivileged_userns_clone=1 and for
>lxc.apparmor.profile = unconfined
> 
>  - Take care of the Stretch→Buster upgrade path for unprivileged
>containers, by mentioning in NEWS.Debian that previously working
>unprivileged containers now need lxc.apparmor.profile = unconfined.
> 
> Thoughts?

See the two latest commits for lxc:

https://salsa.debian.org/lxc-team/lxc/commits/master

Tell me what you think about them, and if needed don't hesitate to
submit a MR! :)

-- 
Pierre-Elliott Bécue
GPG: 9AE0 4D98 6400 E3B6 7528  F493 0D44 2664 1949 74E2
It's far easier to fight for one's principles than to live up to them.


signature.asc
Description: PGP signature


Bug#916145: closure-compiler: Not working with recent JS code

2019-04-07 Thread tony mancill
On Sun, Apr 07, 2019 at 11:16:53AM +0300, Adrian Bunk wrote:
> On Sat, Apr 06, 2019 at 06:13:05PM +0200, Chris Hofstaedtler wrote:
> > * Roland Gruber  [190406 16:07]:
> > > the current version is so old that it got incompatible with recent JS 
> > > code.
> > > E.g. jQuery 3.3.1 cannot be minified as the tool reports parsing errors.
> > > 
> > > Please either update the tool or remove it from the archive. This is now
> > > 5 years in unmaintained state.
> > 
> > I've checked all r-deps of closure-compiler in Debian, and they all
> > build -- datatables-extensions shows some errors in a prebuilt file,
> > but it has done so for a long time, so probably not super relevant.
> > 
> > While I agree that having a 5 year old JS compiler in Debian is not
> 
> Now over 6 years.
> 
> > a great situation, its also not threatening to the packages in
> > Debian using it, so I'd suggest keeping it for now.
> 
> Packages that would require a non-prehistoric version of 
> closure-compiler are already blocked from entering Debian,
> see #843951 and #727529 (since 2013!) as examples.
> 
> Any actual user installing closure-compiler will have a WTF experience 
> when discovering that the new Debian release ships a version that was
> already outdated when the dinosaurs roamed the earth.
> 
> > Adrian: you raised the severity, care to lower it until buster is
> > out (or say some words on why)?
> 
> IMHO the release team adding a buster-ignore tag would be the best way 
> forward here - this would still show up as RC bug for bullseye.

+1 for not orphaning r-build-deps at this point in the release cycle but
forcing the issue at the onset of the bullseye release cycle.

I'm not a user of closure-compiler but have tried to help keep the
package in Debian because it appears to be useful to others.  I agree
that at a certain point, an old package is probably more harmful than a
missing package.  

Packaging the transitive build-deps for closure-compiler is a
non-trivial effort and one that people might easily overlook when they
ask for the latest version.  Since there are plenty of users who want a
newer version, it shouldn't be that hard to get some help with those
build-deps, right?  

Somewhat related, given that closure-compiler upstream releases about
once a month on average, perhaps it is a candidate for doing Something
Different.  Maybe a closure-compiler-installer package or something like
that?  (Maybe backports would work, but we would have to manage the
transitive dependencies as well.)  

Cheers,
tony 
(wearing a Java Team hat...)


signature.asc
Description: PGP signature


Bug#913823: apache2: dav.load does not check for an already loaded dav_module

2019-04-07 Thread Stefan Fritsch
On Friday, 1 February 2019 03:49:22 CEST Nye Liu wrote:
> Package: apache2
> Version: 2.4.38-1
> Followup-For: Bug #913823
> 
> Workaround in /etc/apache2/mods-available/dav.load:
> 
> 
> LoadModule dav_module /usr/lib/apache2/modules/mod_dav.so
> 
> 
> Alternately just make dav_fs not depend on dav, it will autoload it.

This does not make sense. There is no functionality in mod_dav_fs that would 
autoload mod_dav. The "# Depends: dav" in dav_fs.load is a hint to a2enmod to 
enable dav.load, too. But this is visible by a symlink in mods-enabled. There 
must be another LoadModule somewhere else in your configuration.

You should probably do

grep -R dav_module /etc/apache2/{*.conf,*-enabled}

to find it. 



Bug#926212: gnome-shell crashed (segfault)

2019-04-07 Thread Bernhard Übelacker
Hello Guenter Grodotzki,

(I guess you wanted me to receive your last message, so you should
use "reply all", or it gets just attached to your bug report.)

I have left a note in this upstream report [1], lets see if they agree.

Kind regards,
Bernhard

[1] https://gitlab.gnome.org/GNOME/gnome-shell/issues/822#note_484642

PS.: My untested change in message 10 might not crash, but lead to an
infinitive loop, as app->running_state might not change anymore...



Bug#869318: libimage-sane-perl FTBFS randomly: build hangs during tests

2019-04-07 Thread Santiago Vila
retitle 869318 libimage-sane-perl: FTBFS randomly: build hangs during tests
tags 869318 - unreproducible
thanks

Greetings.

I can reproduce the random nature of this bug on START1-S instances
from Scaleway (amd64). The failure rate is around 25% here.

I've put a bunch of build logs here:

https://people.debian.org/~sanvila/build-logs/libimage-sane-perl/

(Note: Those logs use eatmydata, but I've also checked that it fails
in a normal way, i.e. without eatmydata).

If you need a test machine to reproduce the randomness, please contact me
privately and I will gladly provide ssh access.

I'm retitling the bug because it is not really architecture specific.
My theory is that it's a race condition which happens easily on
machines with 2 CPUs (and maybe also slower than average).

Note: I know START1-S instances are discontinued but in either case
the bug is in the package, not in the instances. I will try to check
on the new DEV1-S instances (those also have 2 CPUs and 2 GB of RAM).

Thanks.



Bug#925455: alsa volume never saved/restored

2019-04-07 Thread Elimar Riesebieter
* gregor herrmann  [2019-04-07 18:16 +0200]:

> On Sun, 07 Apr 2019 18:05:06 +0200, Elimar Riesebieter wrote:
> 
> > > There is a commit in the packaging repo which claims to fix this bug:
> > > https://salsa.debian.org/alsa-team/alsa-utils/commit/af161676131e94bbaed72f37d0c5d4c6685a119e
> > Jordi is MIA at the moment. Tried to reach him since a few days. I
> > can't upload the fix myself, though...
> 
> I pinged him on a different channel, but if he doesn't have time I'm
> happy to offer a sponsored upload to fix this bug.

Would be nice. Yes, please :-)

-- 
  "Talking much about oneself can also
   be a means to conceal oneself."
 -Friedrich Nietzsche


signature.asc
Description: PGP signature


Bug#920665: xwayland: Crash with external display, notifications, and screen idle [upstream patch attached]

2019-04-07 Thread Andreas Boll
Hi,

On Thu, Apr 04, 2019 at 04:30:31PM +0300, csaavedra...@gmail.com wrote:
> I see that this landed in unstable (in the next upstream release) but
> testing is still affected, as it's frozen. I installed testing in a new
> machine and I have hit this crasher again. I think this should be
> considered serious enough to be fixed in testing/upcoming stable.

Yeah, as testing is currently frozen an unblock request is required to
unblock xorg-server/2:1.20.4-1 and thus allow it to migrate to
testing. I've filed such a request at
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926540

Thanks,
Andreas



Bug#926603: Debian fails to start after installation into Virtualbox

2019-04-07 Thread Andy Ruddock
Package: systemd
Severity: critical

I'm running Windows 10 (Home edition - up to date) on the desktop, with
Virtualbox (v6.0.4).
I've used both the netinst CD & the testing DVD (downloaded today -
07/Apr/2019) to install Buster.
After installation the system fails to start with many errors.
The first is :

systemd[1]: user.slice: Failed to set inovcation ID for unit: File
exists
[FAILED]: Failed to start User and Session Slice.

other services then fail to start :

[FAILED] Failed to start Slices.
[FAILED] Failed to listen on udev Kernel Socket.
[FAILED] Failed to start Remote File Systems.
[FAILED] Failed to listen on Syslog Socket.

and many more, followed by

systemd[1]: Timed out waiting for device /dev/disk/by-uuid/2cb

finally

[FAILED] Failed to start Network.

At which point there is no more, the system just halts.

Starting with "quiet" removed from linux invocation in grub, I see

systemd[1]: systemd 241 running in system mode. (+PAM +AUDIT +SELINUX
+IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS
+ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN2 +IDN -PCRE2
default-hierarchy=hybrid)
systemd[1]: Detected virtualization oracle.
systemd[1]: Detected architecture x86-64.

Welcome to Debian GNU/Linux buser/sid!

-- 
Andy Ruddock

andy.rudd...@rainydayz.org (OpenPGP Key ID 0xB0324245)





signature.asc
Description: OpenPGP digital signature


Bug#919914: gnome-tweaks now equates "don't suspend on lid close" with "don't lock on lid close" (security issue)

2019-04-07 Thread intrigeri
intrigeri:
> Would you be interested in testing whether
> https://gitlab.gnome.org/GNOME/gnome-settings-daemon/merge_requests/84
> fixes this problem for you?

FWIW the patch proposed upstream applies nicely on top of our
debian/unstable branch:
https://salsa.debian.org/gnome-team/gnome-settings-daemon/merge_requests/3

I probably won't have time to test this myself in the next few days.
Hoping this WIP MR might save someone else a tiny bit of time :)

Cheers,
-- 
intrigeri



Bug#926602: jinja2: CVE-2019-10906

2019-04-07 Thread Salvatore Bonaccorso
Source: jinja2
Version: 2.10-1
Severity: grave
Tags: patch security upstream

Hi,

The following vulnerability was published for jinja2.

CVE-2019-10906[0]:
| In Pallets Jinja before 2.10.1, str.format_map allows a sandbox
| escape.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-10906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906
[1] https://palletsprojects.com/blog/jinja-2-10-1-released/
[2] 
https://github.com/pallets/jinja/commit/a2a6c930bcca591a25d2b316fcfd2d6793897b26

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Bug#649492: libimdi0: Typo in package description

2019-04-07 Thread Jörg Frings-Fürst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

reassign 649492 libimdi0
thanks


Hi,

libimdi0 is not part of argyll.

CU
Jörg

- -- 
New:
GPG Fingerprint: 63E0 075F C8D4 3ABB 35AB  30EE 09F8 9F3C 8CA1 D25D
GPG key (long) : 09F89F3C8CA1D25D
GPG Key: 8CA1D25D
CAcert Key S/N : 0E:D4:56

Old pgp Key: BE581B6E (revoked since 2014-12-31).

Jörg Frings-Fürst
D-54470 Lieser


git:  https://jff.email/cgit/

Threema:  SYR8SJXB
Wire: @joergfringsfuerst
Skype:joergpenguin
Ring: jff
Telegram: @joergfringsfuerst


My wish list: 
 - Please send me a picture from the nature at your home.

-BEGIN PGP SIGNATURE-
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=Qy78
-END PGP SIGNATURE-



Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-04-07 Thread Guilhem Moulin
On Sun, 07 Apr 2019 at 18:12:45 +0200, gregor herrmann wrote:
> On Sun, 18 Nov 2018 19:41:05 +0200, Niko Tyni wrote:
> 
>> Reiterating a bit: the underlying issue with TLSv1.3 seems to be related
>> to handling of 'non-application_data_records'.
>> 
>> The client tries to POST but gets an 'SSL wants a read first' error,
>> then waits until timeout for the socket to become writable.
>> 
>> A simple way to reproduce it here is
>> 
>> perl -MLWP::UserAgent -e 'LWP::UserAgent->new->post("https://facebook.com;, 
>> { data => "foo" }) or die'
>> 
>> which deadlocks for me.
> 
> I can't reproduce this problem:

Interesting, are you talking TLS 1.3?

$ dpkg-query -l "libssl*" "libnet-ssleay-perl" "liblwp-protocol-https-perl" 
"libio-socket-ssl-perl"
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name   Version  Architecture Description
+++-==---=
ii  libio-socket-ssl-perl  2.060-3  all  Perl module 
implementing object oriented interface to SSL sockets
ii  liblwp-protocol-https-perl 6.07-2   all  HTTPS driver for 
LWP::UserAgent
ii  libnet-ssleay-perl 1.85-2+b1amd64Perl module for Secure 
Sockets Layer (SSL)
ii  libssl-dev:amd64   1.1.1b-1 amd64Secure Sockets Layer 
toolkit - development files
un  libssl-doc   (no description 
available)
un  libssl0.9.8  (no description 
available)
un  libssl1.0-dev(no description 
available)
ii  libssl1.1:amd641.1.1b-1 amd64Secure Sockets Layer 
toolkit - shared libraries

$ openssl req -x509 -newkey rsa:4096 -keyout /tmp/key.pem -out /tmp/cert.pem 
-subj /CN=example.net -nodes
$ openssl s_server -accept 127.0.0.1:4433 -key /tmp/key.pem -cert /tmp/cert.pem 
-tls1_3
[…]

Then on a separate terminal, with SSL_MODE_AUTO_RETRY set (the default),
it blocks on read(2):

$ strace -eselect,read,write perl -MLWP::UserAgent -e 
'LWP::UserAgent->new(ssl_opts =>
{verify_hostname => 0, SSL_ca_file => 
"/tmp/cert.pem"})->post("https://127.0.0.1:4433;, { data => "foo" })'
[…]
select(8, [3], [3], NULL, {tv_sec=180, tv_usec=0}) = 2 (in [3], out [3], left 
{tv_sec=179, tv_usec=98})
read(3, "…", 5)   = 5
read(3, "…", 250) = 250
read(3, "…", 5)   = 5
read(3, "…", 250) = 250
read(3,

With SSL_MODE_AUTO_RETRY cleared, the handshake terminates and it waits
for the reply from the server:

$ strace -eselect,read,write perl -MLWP::UserAgent -e 
'LWP::UserAgent->new(ssl_opts =>
{verify_hostname => 0, SSL_ca_file => 
"/tmp/cert.pem"})->post("https://127.0.0.1:4433;, { data => "foo" })'
[…]
select(8, [3], [3], NULL, {tv_sec=180, tv_usec=0}) = 2 (in [3], out [3], left 
{tv_sec=179, tv_usec=98})
read(3, "…", 5) = 5
read(3, "…", 250) = 250
write(3, "…", 216) = 216
select(8, [3], NULL, NULL, {tv_sec=180, tv_usec=0}) = 1 (in [3], left 
{tv_sec=179, tv_usec=99})
read(3, "…", 5) = 5
read(3, "…", 250) = 250
select(8, [3], NULL, NULL, {tv_sec=180, tv_usec=0}

(and the connection closes gracefuly when I write “HTTP/1.1
200\r\nContent-Length: 0\r\n\r\n” from the server)

> % time perl -MLWP::UserAgent -e 
> 'LWP::UserAgent->new->post("https://twitter.com;, { data => "foo" }) or die'
> perl -MLWP::UserAgent -e   0.13s user 0.02s system 36% cpu 0.415 total

twitter.com doesn't support TLS 1.3 though, right?

$ openssl s_client -4 -connect twitter.com:443 -servername twitter.com -tls1_3
CONNECTED(0003)
139682444989504:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert 
handshake failure:../ssl/record/rec_layer_s3.c:1536:SSL alert number 40

-- 
Guilhem.


signature.asc
Description: PGP signature


Bug#926601: VarDirInode-n reports link count mismatches

2019-04-07 Thread Marc Haber
Package: aide
Version: 0.16.1-1
Severity: normal

Hi,

this might be a bug or a user error. aide --update reports:
---
Removed and changed entries:
---

d   ...n ..  : /run



---
Detailed information about changes:
---

Directory: /run
  Linkcount: 19   | 18

while I think that I have explicitly excluded the link count:
@@ifndef RUN
@@define RUN run
@@ifndef RUNLOCK
@@define RUNLOCK run/lock
/@@{ROOTPREFIX}@@{RUN}/acpid\.(socket|pid)$ VarFile
!/@@{ROOTPREFIX}@@{RUN}/aide$


Bug#881771: release-notes: No mention of "predictable network interface names" in Debian 10

2019-04-07 Thread Justin B Rye
Andrei POPESCU wrote:
>> In issues.dbk:
>> 
>>   
>> Migrating from legacy network interface names
>> 
>>  If your system was upgraded from an earlier release, and still uses
>>  the old-style network interface names that were deprecated with
>>  stretch (such as eth0 or wlan),
> 
> s/eth0/eth/ ? (since you used the non-numbered names also in upgrading.dbk)

Here I'm just giving a familiar example to identify the scheme from.
(Oh, you're right, I'm inconsistent.)
 
>>  you should be aware that udev
>>  in buster no longer supports the mechanism of defining their names via
>>  /etc/udev/rules.d/70-persistent-net.rules. To
>>  avoid the danger of your machine losing networking after the upgrade
>>  to buster, it is recommended that you migrate in advance to the new
>>  naming scheme (usually meaning names like enp0s1 or
>>  wlp2s5, which incorporate PCI bus- and
>>  slot-numbers). Take care to update any interface names hard-coded in
>>  configuration for firewalls, > role="package">ifupdown.
>>  and so on.
>> 
>> 
>>  The alternative is to switch to a supported mechanism for enforcing
>>  the old naming scheme, such as the net.ifname=0
>>  kernel commandline option or a systemd .link
>>  file.
> 
> Point to systemd.link(5)?

Oh yes, I forgot to come back to this.  It's not completely clear what
the approved method of doing manpage links is, but one option is to
point at
 https://manpages.debian.org/stretch/udev/systemd.link.5.html;>systemd.link(5).
or maybe just
 https://manpages.debian.org/systemd.link;>systemd.link(5).
 
>> 
>> 
>>  To find the new-style names that will be used, first find the
>>  current names of the relevant interfaces:
>> 
>> >  $ echo /sys/class/net/[ew]*
>> 
>> 
>>  For each one, check whether it is used in configuration files:
>> 
>> 
>>  $ sudo rgrep -w eth0 /etc
>> 
>> 
>>  And what name udev would prefer 
>> to
>>  use for it:
>> 
>> 
>>  $ udevadm test-builtin net_id /sys/class/net/eth0 2>/dev/null
>> 
>> 
>>  (One of these may be a fallback MAC-based name, sometimes needed
>>  for USB network hardware.)
>> 
>> 
>> [Possibly add extra details there for other special cases]

(In particular there are onboard cards and PCI hotplug cards, but the
upstream docs explain these better than I could.)

>> 
>> 
>>  To switch over, disable 70-persistent-net.rules
>>  either by renaming it or by commenting out individual lines.
>>  On virtual machines you will need to remove the files
>>  /etc/systemd/network/99-default.link and
>>  (if using virtio network devices)
>>  /etc/systemd/network/50-virtio-kernel-names.link.
>>  Then rebuild the initrd:
>> 
>> 
>>  $ sudo update-initramfs -u
>> 
>> 
>>  and reboot. Your system should now have new-style network interface
>>  names. Adjust any remaining configuration files, and test your system.
>> 
> 
> https://wiki.debian.org/NetworkConfiguration#Predictable_Network_Interface_Names
> suggests this might not be sufficient to activate the predictable naming 
> on stretch, is this tested?

It was enough for me, but there are also at least two other ways of
complicating matters:
 * a net.ifnames=0 option in your grub config
 * masking /dev/null symlinks in /etc/systemd/network/
Setting up one of those then forgetting about it might cause problems.

>> [possibly a paragraph about safe upgrades over SSH]
> 
> I believe your text above provides sufficient information to enable a 
> remote sysadmin to deal with this without further help.

Given unlimited space and copious reliable sources we could also
produce a decision tree for which configuration files to modify before
or after the reboot, and whether to do test-runs with one-off kernel
options and dead-man's-handle cronjobs, and so on, but a small and
inaccurate version would probably do more harm than good.

>  
>> 
>>  See the
>>  > url="https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/;>upstream
>>  documentation and the udev
>>  README.Debian for further information.
>> 
>>   
>> 
>> And/or maybe a pointer to some useful page in the Debian Wiki, but I
>> suspect we'd need to write one first.
>> 
>> Then in upgrading.dbk
>> 
>>   
>> Verify network interface name support
>> 
>>  Systems upgraded from older releases that still use network interfaces
>>  with names like eth or wlan are
>>  at risk of losing networking once they switch to buster; see
>>   for migration instructions.
>> 
>>   

Oh, you're right; there's no reason for that to say "eth" that
wouldn't also apply in the previous one.  This should either say "like
eth0 or wlan0" or "with names starting with eth- or wlan-".
-- 
JBR with qualifications in linguistics, experience as a Debian
sysadmin, 

Bug#914034: Bug#911938: libhttp-daemon-ssl-perl FTBFS: tests fail: Connection refused

2019-04-07 Thread gregor herrmann
On Sun, 18 Nov 2018 19:41:05 +0200, Niko Tyni wrote:

> Reiterating a bit: the underlying issue with TLSv1.3 seems to be related
> to handling of 'non-application_data_records'.
> 
> The client tries to POST but gets an 'SSL wants a read first' error,
> then waits until timeout for the socket to become writable.
> 
> A simple way to reproduce it here is
> 
>  perl -MLWP::UserAgent -e 'LWP::UserAgent->new->post("https://facebook.com;, 
> { data => "foo" }) or die'
> 
> which deadlocks for me.

I can't reproduce this problem:

% time perl -MLWP::UserAgent -e 
'LWP::UserAgent->new->post("https://facebook.com;, { data => "foo" }) or die'   
 
perl -MLWP::UserAgent -e   0.15s user 0.01s system 40% cpu 0.397 total

Has there something changed in LWP::Protocol::https Net::HTTPS
IO::Socket::SSL Net::SSLeay or something else, or is this some local
environment thing?

Also no issue with IPv4-only hosts:

% time perl -MLWP::UserAgent -e 
'LWP::UserAgent->new->post("https://twitter.com;, { data => "foo" }) or die'
perl -MLWP::UserAgent -e   0.13s user 0.02s system 36% cpu 0.415 total 


Cheers,
gregor, confused, as Guilhem (in message #71) could still reproduce
it at 7 Apr 2019

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   NP: Furry Lewis: Billy lyons & stack o' lee


signature.asc
Description: Digital Signature


signature.asc
Description: Digital Signature


Bug#925455: alsa volume never saved/restored

2019-04-07 Thread gregor herrmann
On Sun, 07 Apr 2019 18:05:06 +0200, Elimar Riesebieter wrote:

> > There is a commit in the packaging repo which claims to fix this bug:
> > https://salsa.debian.org/alsa-team/alsa-utils/commit/af161676131e94bbaed72f37d0c5d4c6685a119e
> Jordi is MIA at the moment. Tried to reach him since a few days. I
> can't upload the fix myself, though...

I pinged him on a different channel, but if he doesn't have time I'm
happy to offer a sponsored upload to fix this bug.


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   NP: Furry Lewis: Billy lyons & stack o' lee


signature.asc
Description: Digital Signature


Bug#925455: alsa volume never saved/restored

2019-04-07 Thread Elimar Riesebieter
* gregor herrmann  [2019-04-07 17:46 +0200]:

> Control: tag -1 + patch pending
> 
> On Mon, 25 Mar 2019 12:05:36 +0100, Laurent Bigonville wrote:
> 
> > The more obvious solution would of course be to remove the condition in the
> > .service file
> 
> There is a commit in the packaging repo which claims to fix this bug:
> https://salsa.debian.org/alsa-team/alsa-utils/commit/af161676131e94bbaed72f37d0c5d4c6685a119e

Jordi is MIA at the moment. Tried to reach him since a few days. I
can't upload the fix myself, though...

Elimar
-- 
  We all know Linux is great... it does infinite loops in 5 seconds.
-Linus Torvalds


signature.asc
Description: PGP signature


Bug#926600: eom: missing depends for gir1.2-eom-1.0

2019-04-07 Thread Bernhard Helmling
Package: eom
Version: 1.20.2-2
Severity: normal

Dear Maintainer,


   * What led up to the situation?
   start eom

   * What was the outcome of this action?
   an error: loading Eom typelib: Typelib file for namespace 'Eom', version 
'1.0' not found

   * What outcome did you expect instead?
   no error 

   * error disappear by installing gir1.2-eom-1.0


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.144-3-2019-03-05 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages eom depends on:
ii  dconf-gsettings-backend [gsettings-backend]  0.30.1-2
ii  eom-common   1.20.2-2
ii  libatk1.0-0  2.30.0-2
ii  libc62.28-8
ii  libcairo-gobject21.16.0-4
ii  libcairo21.16.0-4
ii  libdbus-1-3  1.12.12-1
ii  libdbus-glib-1-2 0.110-4
ii  libexempi8   2.5.0-2
ii  libexif120.6.21-5.1
ii  libgdk-pixbuf2.0-0   2.38.1+dfsg-1
ii  libgirepository-1.0-11.58.3-2
ii  libgl1   1.1.0-1
ii  libgl1-mesa-glx  18.3.4-2
ii  libglib2.0-0 2.58.3-1
ii  libgtk-3-0   3.24.5-1
ii  libjpeg62-turbo  1:1.5.2-2+b1
ii  liblcms2-2   2.9-3
ii  libmate-desktop-2-17 1.20.4-2
ii  libpango-1.0-0   1.42.4-6
ii  libpangocairo-1.0-0  1.42.4-6
ii  libpeas-1.0-01.22.0-4
ii  librsvg2-2   2.44.10-1
ii  librsvg2-common  2.44.10-1
ii  libstartup-notification0 0.12-6
ii  libx11-6 2:1.6.7-1
ii  libxml2  2.9.4+dfsg1-7+b3
ii  mate-desktop-common  1.20.4-2
ii  shared-mime-info 1.10-1
ii  zlib1g   1:1.2.11.dfsg-1

eom recommends no packages.

eom suggests no packages.

-- debconf-show failed



Bug#926305: nis startup scripts are completely broken

2019-04-07 Thread Andreas Henriksson
Hello everyone,

Greetings from the Gothenburg BSP.

If someone is interested in modernizing the nis package
it seems like ArchLinux has native systemd units for
nis and related services so I'd suggest importing those:

https://aur.archlinux.org/packages/nis-utils/
https://www.archlinux.org/packages/core/x86_64/rpcbind/

See also https://wiki.archlinux.org/index.php/NIS

Regards,
Andreas Henriksson



Bug#925455: alsa volume never saved/restored

2019-04-07 Thread gregor herrmann
Control: tag -1 + patch pending

On Mon, 25 Mar 2019 12:05:36 +0100, Laurent Bigonville wrote:

> The more obvious solution would of course be to remove the condition in the
> .service file

There is a commit in the packaging repo which claims to fix this bug:
https://salsa.debian.org/alsa-team/alsa-utils/commit/af161676131e94bbaed72f37d0c5d4c6685a119e


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   NP: Furry Lewis: Billy lyons & stack o' lee


signature.asc
Description: Digital Signature


Bug#914034: bug in Net::SSLeay?

2019-04-07 Thread Guilhem Moulin
Control: usertag -1 bsp-2019-04-se-gothenburg

Hi there,

strace(1) shows a select(2) syscall indicating that the socket is ready for
both read and write, but is later blocking on a read(2) without any
write(2) taking place.

select(8, [3], [3], NULL, {tv_sec=180, tv_usec=0}) = 2 (in [3], out [3], 
left {tv_sec=179, tv_usec=98})
read(3, "…", 5)   = 5
read(3, "…", 156) = 156
read(3, 

Net::SSLeay warns:

If you need to select(2) on the socket, go right ahead, but be warned that
OpenSSL does some internal buffering so SSL_read does not always return
data even if the socket selected for reading (just keep on selecting and
trying to read). "Net::SSLeay" is no different from the C language OpenSSL
in this respect.

And indeed LWP::Protocol::http's use of select(2) on SSL sockets *does*
assume that read/write readiness won't block.  (If Net::SSLeay::read()
returns -1, then the loop will retry later with SSL_ERROR_WANT_READ/WRITE.)
However since OpenSSL 1.1.1 the SSL_MODE_AUTO_RETRY flag is on by
default, which breaks that assumption: ssl_read(3) might block, even
when select(2) claimed the socket had data to be read.

SSL_MODE_AUTO_RETRY

During normal operations, non-application data records might need to be
sent or received that the application is not aware of. If a
non-application data record was processed, SSL_read_ex(3) and SSL_read(3)
can return with a failure and indicate the need to retry with
SSL_ERROR_WANT_READ. If such a non-application data record was processed,
the flag SSL_MODE_AUTO_RETRY causes it to try to process the next record
instead of returning.

[…]

In a blocking environment, applications are not always prepared to deal
with the functions returning intermediate reports such as retry requests,
and setting the SSL_MODE_AUTO_RETRY flag will cause the functions to only
return after successfully processing an application data record or a
failure.

[…]

All modes are off by default except for SSL_MODE_AUTO_RETRY which is on by
default since 1.1.1.

— https://www.openssl.org/docs/man1.1.1/man3/SSL_CTX_set_mode.html

See also https://github.com/openssl/openssl/issues/6234 .

I see several paths forward here:

  - Refactor LWP::Protocol::http's select loop to solve the assumption
that's now broken with OpenSSL ≥1.1.1; or
  - Unset SSL_MODE_AUTO_RETRY in IO::Socket::SSL; or
  - Make context flags configurable in IO::Socket::SSL, and unset
SSL_MODE_AUTO_RETRY from LWP.

IMHO the first option is not ideal so late in the release cycle.  The
second option is the easiest to implement, and should™ be regression-free,
but might confuse people who became used to OpenSSL ≥1.1.1's new context
default flags.

SSL_CTX_clear_mode(3) and SSL_CTRL_CLEAR_MODE macros are unfortunately
not exposed to Net::SSLeay 1.85-2.  The proper fix would be to expose
these and release a new version of Net::SSLeay, of course, but for tests
the macros can be taken from /usr/include/openssl/ssl.h:

# define SSL_CTRL_CLEAR_MODE 78
[…]
# define SSL_CTX_clear_mode(ctx,op) \
SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_MODE,(op),NULL)

and used as is in IO::Socket::SSL.pm.  With the following patch I'm
again able to POST to HTTPS servers using TLS 1.3.

--8<--->8--
--- a/IO/Socket/SSL.pm
+++ b/IO/Socket/SSL.pm
@@ -2433,6 +2433,7 @@
# cannot guarantee, that the location of the buffer stays constant
Net::SSLeay::CTX_set_mode( $ctx,
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER|SSL_MODE_ENABLE_PARTIAL_WRITE);
+   Net::SSLeay::CTX_ctrl($ctx, 78, Net::SSLeay::MODE_AUTO_RETRY(), undef);
 
if ( my $proto_list = $arg_hash->{SSL_npn_protocols} ) {
return IO::Socket::SSL->_internal_error("NPN not supported in 
Net::SSLeay",9)
--8<--->8--

(Again, I'm not proposing to patch IO::Socket::SSL as above :-)  With
MODE_AUTO_RETRY set — the default for OpenSSL ≥1.1.1 — one gets:

$ strace -e trace=read,write,select perl -MLWP::UserAgent -e 
'LWP::UserAgent->new(ssl_opts =>
{SSL_version => "TLSv1_3"})->post("https://facebook.com;, { data => 
"plonc" })';
[…]
select(8, [3], [3], NULL, {tv_sec=180, tv_usec=0}) = 2 (in [3], out [3], 
left {tv_sec=179, tv_usec=98})
read(3, "…", 5)   = 5
read(3, "…", 156) = 156
read(3, 

And now with the MODE_AUTO_RETRY flag unset:

$ select(8, [3], [3], NULL, {tv_sec=180, tv_usec=0}) = 2 (in [3], out [3], 
left {tv_sec=179, tv_usec=98})
read(3, "…", 5) = 5
read(3, "…", 156)   = 156
write(3, "…", 217)  = 217
select(8, [3], NULL, NULL, {tv_sec=180, tv_usec=0}) = 1 (in [3], left 
{tv_sec=179, tv_usec=870931})
read(3, "…", 5) = 5
read(3, "…", 361)   = 361

Cheers,
-- 
Guilhem.


signature.asc
Description: PGP signature


Bug#916332: local tiled installation

2019-04-07 Thread nyov
I had the same or a similar error to what you see.

The issue was for me (and I think is likely the same for you)
that I had an older local tiled installation, built from source.

This installed a version of `libtiled.so` which get's looked up by the
newer tiled, but doesn't work with it, so you should cleanly uninstall the
source-built tiled, completely (`make uninstall` in you old source dir).

You can find the offending lib, by doing `ldd /usr/bin/tiled`.

In short, this is not a bug in the packaged tiled.



Bug#926598: xmlstarlet fo --omit-decl exits with non-zero code

2019-04-07 Thread Etienne Dechamps
Package: xmlstarlet
Version: 1.6.1-2

Steps to reproduce:

$ echo '' | xmlstarlet fo --omit-decl; echo $?

Expected result:


0

Actual result:


5

What's really weird is that the returned error code is always
identical to the number of bytes written to the output.

This bug seems to only occur if --omit-decl is used.



Bug#924365: www.debian.org: FTBFS in buster: turkish vs. tr_TR locale

2019-04-07 Thread Laura Arjona Reina
Hello Ömer

To avoid such errors you need to make the english folder first, I think

make -j1 -C english STRICT_ERROR_CHECKS=1 USE_SAMPLE_FILES=1

and then

make -j1 -C turkish STRICT_ERROR_CHECKS=1 USE_SAMPLE_FILES=1

I cannot reproduce the error in Stretch, the error happens only in Buster.

Kind regards,


El 7/4/19 a las 6:26, Omer Ozarslan escribió:
> Hello Laura,
> 
> I'm not sure if I missed some steps, but I couldn't reproduce this
> issue. Yet, I hit another one:
> 
> [snipped]
> 
> root@a179023d59e0:/webwml# make -j1 -C turkish STRICT_ERROR_CHECKS=1
> USE_SAMPLE_FILES=1
> make: Entering directory '/webwml/turkish'
> make -C po install
> make[1]: Entering directory '/webwml/turkish/po'
> make[1]: Leaving directory '/webwml/turkish/po'
> make -C CD
> make[1]: Entering directory '/webwml/turkish/CD'
> make -C http-ftp
> make[2]: Entering directory '/webwml/turkish/CD/http-ftp'
> make[2]: *** No rule to make target
> '../../../english/CD/http-ftp/cdimage_mirrors.list', needed by
> 'index.tr.html'.  Stop.
> make[2]: Leaving directory '/webwml/turkish/CD/http-ftp'
> make[1]: *** [../../Makefile.common:79: http-ftp] Error 2
> make[1]: Leaving directory '/webwml/turkish/CD'
> make: *** [../Makefile.common:79: CD] Error 2
> make: Leaving directory '/webwml/turkish'
> 
> Here is the verbose part I snipped for convenience:
> 
> root@a179023d59e0:/# cd webwml
> root@a179023d59e0:/webwml# cat /var/log/apt/history.log | grep Commandline
> Commandline: apt-get install -y build-essential vim gettext make perl
> wml git wget libxml-rss-perl
> root@a179023d59e0:/webwml# git reset --hard
> HEAD is now at c28ce7bbd78 (fr) DSA 4223-4225, initial translation
> root@a179023d59e0:/webwml# make -j1 -C turkish STRICT_ERROR_CHECKS=1
> USE_SAMPLE_FILES=1
> make: Entering directory '/webwml/turkish'
> make -C po install
> make[1]: Entering directory '/webwml/turkish/po'
> msgmerge -q templates.tr.po ../../english/po/templates.pot | \
>     msgfmt --statistics -o templates.mo -
> 91 translated messages, 16 fuzzy translations, 12 untranslated messages.
> 'templates.mo' -> '../../locale/tr/LC_MESSAGES/templates.mo'
> msgmerge -q bugs.tr.po ../../english/po/bugs.pot | \
>     msgfmt --statistics -o bugs.mo -
> 34 translated messages.
> 'bugs.mo' -> '../../locale/tr/LC_MESSAGES/bugs.mo'
> msgmerge -q blends.tr.po ../../english/po/blends.pot | \
>     msgfmt --statistics -o blends.mo -
> 0 translated messages, 18 untranslated messages.
> 'blends.mo' -> '../../locale/tr/LC_MESSAGES/blends.mo'
> msgmerge -q cdimage.tr.po ../../english/po/cdimage.pot | \
>     msgfmt --statistics -o cdimage.mo -
> 26 translated messages.
> 'cdimage.mo' -> '../../locale/tr/LC_MESSAGES/cdimage.mo'
> msgmerge -q consultants.tr.po ../../english/po/consultants.pot | \
>     msgfmt --statistics -o consultants.mo -
> 15 translated messages.
> 'consultants.mo' -> '../../locale/tr/LC_MESSAGES/consultants.mo'
> msgmerge -q countries.tr.po ../../english/po/countries.pot | \
>     msgfmt --statistics -o countries.mo -
> 104 translated messages.
> 'countries.mo' -> '../../locale/tr/LC_MESSAGES/countries.mo'
> msgmerge -q date.tr.po ../../english/po/date.pot | \
>     msgfmt --statistics -o date.mo -
> 38 translated messages.
> 'date.mo' -> '../../locale/tr/LC_MESSAGES/date.mo'
> msgmerge -q distrib.tr.po ../../english/po/distrib.pot | \
>     msgfmt --statistics -o distrib.mo -
> 46 translated messages.
> 'distrib.mo' -> '../../locale/tr/LC_MESSAGES/distrib.mo'
> msgmerge -q doc.tr.po ../../english/po/doc.pot | \
>     msgfmt --statistics -o doc.mo -
> 16 translated messages, 2 fuzzy translations, 14 untranslated messages.
> 'doc.mo' -> '../../locale/tr/LC_MESSAGES/doc.mo'
> msgmerge -q l10n.tr.po ../../english/po/l10n.pot | \
>     msgfmt --statistics -o l10n.mo -
> 21 translated messages.
> 'l10n.mo' -> '../../locale/tr/LC_MESSAGES/l10n.mo'
> msgmerge -q langs.tr.po ../../english/po/langs.pot | \
>     msgfmt --statistics -o langs.mo -
> 86 translated messages.
> 'langs.mo' -> '../../locale/tr/LC_MESSAGES/langs.mo'
> msgmerge -q legal.tr.po ../../english/po/legal.pot | \
>     msgfmt --statistics -o legal.mo -
> 25 translated messages.
> 'legal.mo' -> '../../locale/tr/LC_MESSAGES/legal.mo'
> msgmerge -q mailinglists.tr.po ../../english/po/mailinglists.pot | \
>     msgfmt --statistics -o mailinglists.mo -
> 20 translated messages.
> 'mailinglists.mo' -> '../../locale/tr/LC_MESSAGES/mailinglists.mo'
> msgmerge -q newsevents.tr.po ../../english/po/newsevents.pot | \
>     msgfmt --statistics -o newsevents.mo -
> 24 translated messages, 7 fuzzy translations, 37 untranslated messages.
> 'newsevents.mo' -> '../../locale/tr/LC_MESSAGES/newsevents.mo'
> msgmerge -q organization.tr.po ../../english/po/organization.pot | \
>     msgfmt --statistics -o organization.mo -
> 49 translated messages, 17 fuzzy translations, 22 untranslated messages.
> 

Bug#887101: (no subject)

2019-04-07 Thread Gordon Ball
It is planned to ship the IPython LTS branch (5.x) for buster,
maintaining single-source python2 and python3 compatibility. IPython and
related tools 6.x and later drop python2 support. We'll aim to update
and python3 versions and retain the existing python2 versions of
interactive tools only (ipython, ipykernel and dependencies) in
bullseye.



Bug#926576: ghostscript: printer stopped working: ghostscript fails with ""Unable to determine number of pages"

2019-04-07 Thread Till Kamppeter

I have released cups-filters 1.22.5 upstream now with the fix.

   Till



Bug#926597: unblock: golang-github-puerkitobio-purell/1.1.0-2

2019-04-07 Thread Andreas Henriksson
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Greetings from the Gothenburg BSP.

Please unblock package golang-github-puerkitobio-purell

unblock golang-github-puerkitobio-purell/1.1.0-2

Fixes FTBFS (testsuite failure)

(Sorry, this also included some minor trivial changes that where
already sitting in the salsa git repo for this package.)

Regards,
Andreas Henriksson


diff --git a/debian/changelog b/debian/changelog
index a85603e..e233aac 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,15 @@
+golang-github-puerkitobio-purell (1.1.0-2) unstable; urgency=medium
+
+  * Team upload with greetings from Gothenburg BSP.
+
+  [ Alexandre Viau ]
+  * Point Vcs-* urls to salsa.debian.org.
+
+  [ Andreas Henriksson ]
+  * Add debian/patches/pr-29.patch (Closes: #926380)
+
+ -- Andreas Henriksson   Sun, 07 Apr 2019 17:00:51 +0200
+
 golang-github-puerkitobio-purell (1.1.0-1) unstable; urgency=medium
 
   * New upstream release
diff --git a/debian/control b/debian/control
index a6a5a13..ce8e849 100644
--- a/debian/control
+++ b/debian/control
@@ -1,6 +1,6 @@
 Source: golang-github-puerkitobio-purell
 Section: devel
-Priority: extra
+Priority: optional
 Maintainer: Debian Go Packaging Team 

 Uploaders: Anthony Fok 
 Build-Depends: debhelper (>= 9),
@@ -9,10 +9,10 @@ Build-Depends: debhelper (>= 9),
golang-github-opennota-urlesc-dev (>= 
0.0~git20150208.0.5fa9ff0-3),
golang-golang-x-net-dev,
golang-golang-x-text-dev
-Standards-Version: 3.9.8
+Standards-Version: 4.0.0
 Homepage: https://github.com/PuerkitoBio/purell
-Vcs-Browser: 
https://anonscm.debian.org/cgit/pkg-go/packages/golang-github-puerkitobio-purell.git
-Vcs-Git: 
https://anonscm.debian.org/git/pkg-go/packages/golang-github-puerkitobio-purell.git
+Vcs-Browser: 
https://salsa.debian.org/go-team/packages/golang-github-puerkitobio-purell
+Vcs-Git: 
https://salsa.debian.org/go-team/packages/golang-github-puerkitobio-purell.git
 XS-Go-Import-Path: github.com/PuerkitoBio/purell
 
 Package: golang-github-puerkitobio-purell-dev
diff --git a/debian/copyright b/debian/copyright
index 707eab8..afd538d 100644
--- a/debian/copyright
+++ b/debian/copyright
@@ -1,4 +1,4 @@
-Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
+Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
 Upstream-Name: Purell
 Source: https://github.com/PuerkitoBio/purell
 
diff --git a/debian/gitlab-ci.yml b/debian/gitlab-ci.yml
new file mode 100644
index 000..5c8c31b
--- /dev/null
+++ b/debian/gitlab-ci.yml
@@ -0,0 +1,28 @@
+
+# auto-generated, DO NOT MODIFY.
+# The authoritative copy of this file lives at:
+# https://salsa.debian.org/go-team/ci/blob/master/cmd/ci/gitlabciyml.go
+
+# TODO: publish under debian-go-team/ci
+image: stapelberg/ci2
+
+test_the_archive:
+  artifacts:
+paths:
+- before-applying-commit.json
+- after-applying-commit.json
+  script:
+# Create an overlay to discard writes to /srv/gopath/src after the build:
+- "rm -rf /cache/overlay/{upper,work}"
+- "mkdir -p /cache/overlay/{upper,work}"
+- "mount -t overlay overlay -o 
lowerdir=/srv/gopath/src,upperdir=/cache/overlay/upper,workdir=/cache/overlay/work
 /srv/gopath/src"
+- "export GOPATH=/srv/gopath"
+- "export GOCACHE=/cache/go"
+# Build the world as-is:
+- "ci-build -exemptions=/var/lib/ci-build/exemptions.json > 
before-applying-commit.json"
+# Copy this package into the overlay:
+- "GBP_CONF_FILES=:debian/gbp.conf gbp buildpackage --git-no-pristine-tar 
--git-ignore-branch --git-ignore-new --git-export-dir=/tmp/export 
--git-no-overlay --git-tarball-dir=/nonexistant --git-cleaner=/bin/true 
--git-builder='dpkg-buildpackage -S -d --no-sign'"
+- "pgt-gopath -dsc /tmp/export/*.dsc"
+# Rebuild the world:
+- "ci-build -exemptions=/var/lib/ci-build/exemptions.json > 
after-applying-commit.json"
+- "ci-diff before-applying-commit.json after-applying-commit.json"
diff --git a/debian/patches/pr-29.patch b/debian/patches/pr-29.patch
new file mode 100644
index 000..c5f889e
--- /dev/null
+++ b/debian/patches/pr-29.patch
@@ -0,0 +1,76 @@
+From b5f01560a83bfe6f1551df3579f2149ae7f3f54c Mon Sep 17 00:00:00 2001
+From: Martin Angers 
+Date: Sat, 16 Feb 2019 16:08:08 -0500
+Subject: [PATCH] fix failing go1.12 test due to control chars causing
+ url.Parse to fail
+
+---
+ purell_test.go | 41 -
+ 1 file changed, 24 insertions(+), 17 deletions(-)
+
+diff --git a/purell_test.go b/purell_test.go
+index 8eb5191..efde722 100644
+--- a/purell_test.go
 b/purell_test.go
+@@ -4,6 +4,7 @@ import (
+   "fmt"
+   "net/url"
+   "testing"
++  "unicode"
+ )
+ 
+ type testCase struct {
+@@ -746,30 +747,36 @@ func TestDecodeUnnecessaryEscapesAll(t *testing.T) {
+   for i := 0; i < 256; i++ {
+   url += fmt.Sprintf("%%%02x", i)
+   }

Bug#881771: release-notes: No mention of "predictable network interface names" in Debian 10

2019-04-07 Thread Andrei POPESCU
On Du, 07 apr 19, 15:32:32, Justin B Rye wrote:
 
> Okay, here's a significantly trimmed-down version that we might be
> able to use if it's bulked out with good external references.
> 
> In issues.dbk:
> 
>   
> Migrating from legacy network interface names
> 
>  If your system was upgraded from an earlier release, and still uses
>  the old-style network interface names that were deprecated with
>  stretch (such as eth0 or wlan),

s/eth0/eth/ ? (since you used the non-numbered names also in upgrading.dbk)

>  you should be aware that udev
>  in buster no longer supports the mechanism of defining their names via
>  /etc/udev/rules.d/70-persistent-net.rules. To
>  avoid the danger of your machine losing networking after the upgrade
>  to buster, it is recommended that you migrate in advance to the new
>  naming scheme (usually meaning names like enp0s1 or
>  wlp2s5, which incorporate PCI bus- and
>  slot-numbers). Take care to update any interface names hard-coded in
>  configuration for firewalls,  role="package">ifupdown.
>  and so on.
> 
> 
>  The alternative is to switch to a supported mechanism for enforcing
>  the old naming scheme, such as the net.ifname=0
>  kernel commandline option or a systemd .link
>  file.

Point to systemd.link(5)?

> 
> 
>  To find the new-style names that will be used, first find the
>  current names of the relevant interfaces:
> 
>   $ echo /sys/class/net/[ew]*
> 
> 
>  For each one, check whether it is used in configuration files:
> 
> 
>  $ sudo rgrep -w eth0 /etc
> 
> 
>  And what name udev would prefer 
> to
>  use for it:
> 
> 
>  $ udevadm test-builtin net_id /sys/class/net/eth0 2>/dev/null
> 
> 
>  (One of these may be a fallback MAC-based name, sometimes needed
>  for USB network hardware.)
> 
> 
> [Possibly add extra details there for other special cases]
> 
> 
>  To switch over, disable 70-persistent-net.rules
>  either by renaming it or by commenting out individual lines.
>  On virtual machines you will need to remove the files
>  /etc/systemd/network/99-default.link and
>  (if using virtio network devices)
>  /etc/systemd/network/50-virtio-kernel-names.link.
>  Then rebuild the initrd:
> 
> 
>  $ sudo update-initramfs -u
> 
> 
>  and reboot. Your system should now have new-style network interface
>  names. Adjust any remaining configuration files, and test your system.
> 

https://wiki.debian.org/NetworkConfiguration#Predictable_Network_Interface_Names
suggests this might not be sufficient to activate the predictable naming 
on stretch, is this tested?

> [possibly a paragraph about safe upgrades over SSH]

I believe your text above provides sufficient information to enable a 
remote sysadmin to deal with this without further help.
 
> 
>  See the
>   url="https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/;>upstream
>  documentation and the udev
>  README.Debian for further information.
> 
>   
> 
> And/or maybe a pointer to some useful page in the Debian Wiki, but I
> suspect we'd need to write one first.
> 
> Then in upgrading.dbk
> 
>   
> Verify network interface name support
> 
>  Systems upgraded from older releases that still use network interfaces
>  with names like eth or wlan are
>  at risk of losing networking once they switch to buster; see
>   for migration instructions.
> 
>   
> 
> -- 
> JBR   with qualifications in linguistics, experience as a Debian
>   sysadmin, and probably no clue about this particular package
> 

Otherwise (FWIW) this looks good for me.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Bug#863468: (no subject)

2019-04-07 Thread Gordon Ball
I can confirm this bug is still present in 0.8.10, but I don't have a
clear sense of how to fix it; awaiting an upstream fix.



Bug#926576: ghostscript: printer stopped working: ghostscript fails with ""Unable to determine number of pages"

2019-04-07 Thread Till Kamppeter

Thanks for reporting this.

I have fixed the problem now by changing the Ghostscript call to count 
pages in a PDF file.


See

https://github.com/OpenPrinting/cups-filters/commit/297cc2d

I found this solution with the help of a bug report to Arch Linux:

https://bugs.archlinux.org/task/62251

There they have found the alternative method and also talked with the 
Ghostscript developers on IRC to confirm the need of the change.


The old call used the undocumented internal "pdfdict" of Ghostscript 
which from Ghostscript 9.27 on is not accessible any more for security 
reasons. Now I use the call suggested in the Arch Linux bug report using

"runpdfbegin".

   Till



Bug#926342: libprotobuf17: I was forced to download libprotobuf17 on this site: https://packages.debian.org/buster/amd64/libprotobuf17/download

2019-04-07 Thread GCS
On Fri, Apr 5, 2019 at 8:18 PM  wrote:
> C]I have just a file which name is apt-listbugs in /etc/apt/preferences.d :
>
> /etc/apt/preferences.d# ls -ail
> total 12
> 1044672 drwxr-xr-x 2 root root 4096 mars   6  2018 .
> 1044507 drwxr-xr-x 8 root root 4096 avril  5 08:44 ..
> 1045052 -rw-r--r-- 1 root root  631 févr. 26 08:22 apt-listbugs
>
>
> less apt-listbugs
> Result :
[...]
> Explanation: Pinned by apt-listbugs at 2018-10-27 19:50:22 +0200
> Explanation:   #910964: libprotobuf17 needs Breaks: libprotobuf10
> Package: libprotobuf17
> Pin: version *
> Pin-Priority: -3
 This is the culprit. Somehow auto-generated I suppose. Please delete
this segment and you will be able to install / update libprotobuf17
again.

Cheers,
Laszlo/GCS



Bug#926596: fwupdate: arm64 version of PE/COFF efi binary is corrupt

2019-04-07 Thread Ard Biesheuvel
Package: fwupdate
Version: 12-4
Severity: important

Dear Maintainer,

Version 12-4 of fwupdate is broken for arm64. The included binary fwupaa64.efi
is corrupt, resulting in EFI_LOAD_ERROR to be returned by the firmware when
trying to invoke it.

The binary layout looks like this:

Detected 'AArch64' type PE/COFF image consisting of 2 sections
Section alignment: 0x1000
File alignment: 0x200
Image size: 0xd890
Section '.text' @ 0x1000
File offset: 0x1000
Virtual size: 0xac20
Raw size: 0xac20
Section '.data' @ 0xbc20
File offset: 0xbc20
Virtual size: 0x1d70
Raw size: 0x1d70

Note that file offset + size of section #2 exceeds the total image size. But
the file offset of that section is not even a multiple of the file alignment,
so the whole image seems pretty broken.



-- System Information:
Debian Release: 9.8
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'testing')
Architecture: arm64 (aarch64)

Kernel: Linux 5.1.0-rc2+ (SMP w/24 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages fwupdate depends on:
ii  e2fsprogs1.43.4-2
ii  efibootmgr   14-2
ii  libc62.28-8
ii  libefiboot1  37-2
ii  libefivar1   37-2
ii  libfwup1 12-4
ii  libpopt0 1.16-10+b2

Versions of packages fwupdate recommends:
ii  fwupdate-arm64-signed [fwupdate-signed]  12+4

fwupdate suggests no packages.

-- no debconf information



Bug#923930: testsuite comes with built-in time-bomb

2019-04-07 Thread Andreas Henriksson
Control: forwarded -1 https://github.com/heimdal/heimdal/issues/533

Greetings from the Gothenburg BSP.

To summarize the above issue:
- certs used in test-suite expired
- upstream regenerated certs with 500 years expiration time set
- this solves the issue on machines with 64bit time_t
  but 32bit machines still fails the test-suite.
- A suggestion was made to generate certs that expire
  "Tue, 19 Jan 2038 03:14:06 GMT" instead.

On the debian side of things: including the upstream diff is
annoying because debian/patches/ (quilt 3.0) doesn't support
git binary diffs.

The lazy solution here is to argue that we don't want time-bombs and
just disable the test-suite. The better solution involves generating
the certificates so that they align with what 32bit machines can handle,
uuencoding the result and setting up debian/rules handling to "manually
patch" the build.

Regards,
Andreas Henriksson



Bug#926577: eeschema: assert failed with more than one instance of hierarchical sheet

2019-04-07 Thread Carsten Schoenert
Hi,

On Sun, Apr 07, 2019 at 11:45:50AM +0200, Cobra wrote:
 
> When I try to create more than one instance of a hierarchical sheet,
> an assert fails. After hitting "continue", the same error appears again
> and again. I gave up after 10 repetitions and hit stop to kill kicad,
> losing any unsaved content.
> This happens when creating a new hierarchical sheet and linking it to an
> existing one by entering the same file name but also when duplicating an
> existing sheet.
> It seems like this bug has been fixed upstream in 5.1.0, see
> https://bugs.launchpad.net/kicad/+bug/1798930
> https://bugs.launchpad.net/kicad/+bug/1800796

the KiCad version 5.1.0 is currently only available in unstable.
I've asked the release team for an unblock of that version so it could
migrate to testing then. Please see #926004. As this is a big change to
the previous version in testing I can't overview if this unblock will
happen even I don't expect any big or small issues on this update.

https://bugs.debian.org/926004

Given your report is created against the version of KiCad in
stretch-backports there not much I can do right now. First version 5.1.0
need to be in testing before I can work on a new updated version for
stretch-backports.

As upstream has started again talking about the next update of KiCad to
5.1.1 I'm not much motivated currently to work in between times an a
backport version of KiCad for stretch which wouldn't made into backports.

But maybe I change my mind on this. :)

Regards
Carsten



Bug#926380: golang-github-puerkitobio-purell: FTBFS (failing tests)

2019-04-07 Thread Shengjing Zhu
Hi,

On Sun, Apr 7, 2019 at 10:09 PM Andreas Henriksson  wrote:
>
> Greetings from the Gothenburg BSP.
>
> This is the output I get when reproducing this issue:
>
> ---8<->8-
>
> --- FAIL: TestEncodeNecessaryEscapesAll (0.00s)
> purell_test.go:761: Got error parse http://host/
>
>
> � net/url: invalid control character in URL
> FAIL
> exit status 1
> FAIL_/tmp/golang-github-puerkitobio-purell-1.1.00.003s
>
> ---8<->8-
>
>
> net/url Parse now explicitly check that you don't pass in
> "invalid" (non-encoded) urls and rejects them:
> https://sources.debian.org/src/golang-1.11/1.11.6-1/src/net/url/url.go/?hl=498#L498
>
> The NormalizeUrlString helper function starts out by passing the url
> string to url.Parse:
> https://sources.debian.org/src/golang-github-puerkitobio-purell/1.1.0-1/purell.go/#L153
>
> The TestDecodeUnnecessaryEscapesAll function creates an url with control
> characters and passes it to NormalizeURLString to try to get it
> normalized/escaped.
>
> I'd say the design of the NormalizeUrlString function is broken and thus
> it's not obvious to me how to fix it. I'd say that if you have a
> non-normalized string you want encoded, you should pass it in as
> something that doesn't need to be parsed. ie. use NormalizeUrl helper
> function, which takes an Url type.
>
> Removing the NormalizeUrlString function however would be an API/ABI
> break as it's publicly exported (and used by Hugo and Kubernetes)...
>
> Maybe open-coding some homebrew url parsing to fall back on could be
> done to keep the function around. Sounds bad to think you know
> better than net/url how to parse an url though.
>
> I'm attaching a patch which "fixes" this issue, but really it's most likely
> a stupid and wrong things to do to solve this. It's just designed to
> make the testsuite pass. As mentioned, I think the NormalizeURLString
> function is incorrectly designed and there's no way to fix it (so should
> be deprecated in favour of NormalizeURL).
> Thus intentionally *not* tagging patch, as this is rather a "proof of
> concept".
>
> Regards,
> Andreas Henriksson

Thanks for your great work!

However it's already fixed by upstream,
https://github.com/PuerkitoBio/purell/pull/29

If someone is going to upload the new version, please take upstream
patch instead :/

-- 
Shengjing Zhu



Bug#882179: (no subject)

2019-04-07 Thread Gordon Ball
Unable to reproduce this. The output of `jupyter kernelspec list`
provided shows that there is a custom install of ipykernel (python2) in
/usr/local/share/jupyter/kernels/python2 shadowing python-ipykernel -
maybe installed with `sudo pip install`?

Try removing that version and see if the packaged kernel
(/usr/share/jupyter/kernels/python2/kernel.json) works as expected.



Bug#881771: release-notes: No mention of "predictable network interface names" in Debian 10

2019-04-07 Thread Justin B Rye
Karl O. Pinc wrote:
>> Whether I'm accessing it physically or via ssh, can't I use something
>> like:
>>  udevadm test /sys/class/net/$ETHX 2>/dev/null | grep NET
>> or
>>  udevadm test-builtin net_id /sys/class/net/$ETHX 2>/dev/null
>> ...?  That worked for me even on Jessie machine.
> 
> I don't know.  I just tried both the above on a
> jessie box running on a VM and it did not show me
> an ID_NET_NAME_PATH, which I presume is what
> shows me the new-style interface name?

(By "$ETHX" I mean "eth0 or whatever you've currently got"...)

Is the VM one that supports the ports-and-slots scheme?  Some
apparently don't.  I don't know exactly what happens instead, but
udevadm seems the most reliable way of narrowing that down.
 
> I don't have a stretch box with old-style names to test on.

If I boot a physical stretch box with the net.ifnames=0 option, it
comes up with an eth0 but udevadm says ID_NET_PATH=enp1s0.

I know udevadm worked for me on physical machines running jessie,
since that's how I predicted their names for my own upgrades.  But if
it *is* the officially approved way of predicting predictable names, I
wish the upstream docs would say so.

Okay, here's a significantly trimmed-down version that we might be
able to use if it's bulked out with good external references.

In issues.dbk:

  
Migrating from legacy network interface names

 If your system was upgraded from an earlier release, and still uses
 the old-style network interface names that were deprecated with
 stretch (such as eth0 or wlan),
 you should be aware that udev
 in buster no longer supports the mechanism of defining their names via
 /etc/udev/rules.d/70-persistent-net.rules. To
 avoid the danger of your machine losing networking after the upgrade
 to buster, it is recommended that you migrate in advance to the new
 naming scheme (usually meaning names like enp0s1 or
 wlp2s5, which incorporate PCI bus- and
 slot-numbers). Take care to update any interface names hard-coded in
 configuration for firewalls, ifupdown.
 and so on.


 The alternative is to switch to a supported mechanism for enforcing
 the old naming scheme, such as the net.ifname=0
 kernel commandline option or a systemd .link
 file.


 To find the new-style names that will be used, first find the
 current names of the relevant interfaces:



 For each one, check whether it is used in configuration files:


 $ sudo rgrep -w eth0 /etc


 And what name udev would prefer to
 use for it:


 $ udevadm test-builtin net_id /sys/class/net/eth0 2>/dev/null


 (One of these may be a fallback MAC-based name, sometimes needed
 for USB network hardware.)


[Possibly add extra details there for other special cases]


 To switch over, disable 70-persistent-net.rules
 either by renaming it or by commenting out individual lines.
 On virtual machines you will need to remove the files
 /etc/systemd/network/99-default.link and
 (if using virtio network devices)
 /etc/systemd/network/50-virtio-kernel-names.link.
 Then rebuild the initrd:


 $ sudo update-initramfs -u


 and reboot. Your system should now have new-style network interface
 names. Adjust any remaining configuration files, and test your system.


[possibly a paragraph about safe upgrades over SSH]


 See the
 https://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames/;>upstream
 documentation and the udev
 README.Debian for further information.

  

And/or maybe a pointer to some useful page in the Debian Wiki, but I
suspect we'd need to write one first.

Then in upgrading.dbk

  
Verify network interface name support

 Systems upgraded from older releases that still use network interfaces
 with names like eth or wlan are
 at risk of losing networking once they switch to buster; see
  for migration instructions.

  

-- 
JBR with qualifications in linguistics, experience as a Debian
sysadmin, and probably no clue about this particular package



Bug#926576: ghostscript: printer stopped working: ghostscript fails with ""Unable to determine number of pages"

2019-04-07 Thread Leonardo Canducci
c

Il giorno dom 7 apr 2019 alle ore 11:56 Till Kamppeter <
till.kamppe...@gmail.com> ha scritto:

> Does
>
> gs -o - -dNODISPLAY 
>
> using Ghostscript 9.27, with  being a PDF file which you do
> not succeed to print due to this problem, give you a list of "Page XX"
> lines for each page in the PDF file (plus some other irrelevant lines)?
>

I guess no. It's not file related. I get the same error with any file, even
printing from the browser.

>
> Can you post the output of the command here?
>

 leo@asbesto:~/Scaricati$ gs -o - -dNODISPLAY file_162654.pdf
GPL Ghostscript 9.27 (2019-04-04)
Copyright (C) 2018 Artifex Software, Inc.  All rights reserved.
This software is supplied under the GNU AGPLv3 and comes with NO WARRANTY:
see the file COPYING for details.
Processing pages 1 through 1.
Page 1
Loading NimbusSans-Regular font from
/usr/share/ghostscript/9.27/Resource/Font/NimbusSans-Regular... 4349448
2837965 3337976 1998733 4 done.
Loading NimbusSans-Bold font from
/usr/share/ghostscript/9.27/Resource/Font/NimbusSans-Bold... 4436528
3058081 3956024 2549354 4 done.

Leonardo


Bug#926595: python3 can't import scipy.misc

2019-04-07 Thread Stuart Prescott
Control: tags -1 + unreproducible moreinfo

Hi Laurent,

Perhaps you could include the output of

$ apt-cache policy python3-numpy python3-scipy libblas3

for this report.

>   APT policy: (500, 'unstable'), (500, 'stable')

this is not a promising sign btw.

regards
Stuart

-- 
Stuart Prescotthttp://www.nanonanonano.net/   stu...@nanonanonano.net
Debian Developer   http://www.debian.org/ stu...@debian.org
GPG fingerprint90E2 D2C1 AD14 6A1B 7EBB 891D BBC1 7EBB 1396 F2F7



Bug#919914: gnome-tweaks now equates "don't suspend on lid close" with "don't lock on lid close" (security issue)

2019-04-07 Thread intrigeri
Hi Josh,

Josh Triplett:
> Recently, disabling the setting "Suspend when laptop lid is closed"
> seems to have started preventing *any* action on lid close, including
> locking the screen;

Would you be interested in testing whether
https://gitlab.gnome.org/GNOME/gnome-settings-daemon/merge_requests/84
fixes this problem for you?

Cheers,
-- 
intrigeri



Bug#913110: (no subject)

2019-04-07 Thread Gordon Ball
The report above appears to reference
.local/jupyter/kernels/python3/kernel.json , which would be a user-local
kernel file not installed by the package.

If the kernel file is wrong, I don't think this is a bug in
jupyter-notebook. If the system-installed kernel file
/usr/share/jupyter/kernels/python3/kernel.json refers to python[2], that
would be a bug in python3-ipykernel



Bug#926595: python3 can't import scipy.misc

2019-04-07 Thread laurent
Package: python3
Version: 3.7.3-1
Severity: important
Tags: upstream

Dear Maintainer,

When trying to import scipy.misc in python3 [numpy scipy are both installed and
were fonctionning correctly some weeks ago]


I got the error below which accordingly to the debian user mailing list seems
to be a bug. I insist that python3-numpy is installed.

Best regards,


:>  from scipy.misc import *

---
ModuleNotFoundError   Traceback (most recent call last)
ModuleNotFoundError: No module named 'numpy.core._multiarray_umath'

---
ImportError   Traceback (most recent call last)
 in ()
  4 from numpy import *
  5 from numpy.random import *
> 6 from scipy.misc import *
  7 from scipy.stats import *

/usr/lib/python3/dist-packages/scipy/misc/__init__.py in ()
 66 from numpy import who as _who, source as _source, info as _info
 67 import numpy as np
---> 68 from scipy.interpolate._pade import pade as _pade
 69 from scipy.special import (comb as _comb, logsumexp as _lsm,
 70 factorial as _fact, factorial2 as _fact2, factorialk as _factk)

/usr/lib/python3/dist-packages/scipy/interpolate/__init__.py in ()
173 from __future__ import division, print_function, absolute_import
174
--> 175 from .interpolate import *
176 from .fitpack import *
177

/usr/lib/python3/dist-packages/scipy/interpolate/interpolate.py in ()
 18dot, ravel, poly1d, asarray, intp)
 19
---> 20 import scipy.linalg
 21 import scipy.special as spec
 22 from scipy.special import comb

/usr/lib/python3/dist-packages/scipy/linalg/__init__.py in ()
188 from .linalg_version import linalg_version as __version__
189
--> 190 from .misc import *
191 from .basic import *
192 from .decomp import *

/usr/lib/python3/dist-packages/scipy/linalg/misc.py in ()
  3 import numpy as np
  4 from numpy.linalg import LinAlgError
> 5 from .blas import get_blas_funcs
  6 from .lapack import get_lapack_funcs
  7

/usr/lib/python3/dist-packages/scipy/linalg/blas.py in ()
212 import numpy as _np
213
--> 214 from scipy.linalg import _fblas
215 try:
216 from scipy.linalg import _cblas

ImportError: numpy.core.multiarray failed to import




-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE= 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages python3 depends on:
ii  libpython3-stdlib  3.7.3-1
ii  python3-minimal3.7.3-1
ii  python3.7  3.7.3-2

python3 recommends no packages.

Versions of packages python3 suggests:
pn  python3-doc   
ii  python3-tk3.7.3-1
pn  python3-venv  

-- no debconf information



Bug#374039: #374039 shutdown -h -H: warn that then cannot poweroff perhaps

2019-04-07 Thread Jesse Smith
> Halt action is to halt or drop into boot monitor on systems that
> support it." is not enough to convey, that in many cases it brings
> machine into state, when it is still on, display still showing
> letters, but no interation (except physical poweroff) is possible.

That is what halt means - to stop running the system without powering off.

> "Maybe -H is actually produces useful behaviour in some cases (no
> idea), but please add into manpage warning like "Do not use -H option,
> unless you really know what are you doing."

Halting is often used to run through the shutdown process and leave
output on the screen for debugging purposes. Or when you want the OS to
stop, but leave the power on. There is no negative side-effect to using
the -H option, no loss of data. There isn't any reason to print an extra
warning.

Which brings me back to the original bug report which read: "Well, I
tried "-h -H", and guess what, it put my IBM Thinkpad in a unrebootable
state... no button would respond, no way to poweroff either. I had to
remove the AC cord, and remove the battery, to finally poweroff. So
perhaps add a warning to the man page."

The user could, in that case, just press and hold the power button for
five seconds to power off the machine. There is no need to remove the AC
power or take out the battery. Holding the power button works on all
workstations and laptops made in the past 20 years. It's common practise
for any time a machine hangs, has a kernel panic or stops responding to
keyboard input.



Bug#926380: golang-github-puerkitobio-purell: FTBFS (failing tests)

2019-04-07 Thread Andreas Henriksson
Greetings from the Gothenburg BSP.

This is the output I get when reproducing this issue:

---8<->8-

--- FAIL: TestEncodeNecessaryEscapesAll (0.00s)
purell_test.go:761: Got error parse http://host/


� net/url: invalid control character in URL
FAIL
exit status 1
FAIL_/tmp/golang-github-puerkitobio-purell-1.1.00.003s

---8<->8-


net/url Parse now explicitly check that you don't pass in
"invalid" (non-encoded) urls and rejects them:
https://sources.debian.org/src/golang-1.11/1.11.6-1/src/net/url/url.go/?hl=498#L498

The NormalizeUrlString helper function starts out by passing the url
string to url.Parse:
https://sources.debian.org/src/golang-github-puerkitobio-purell/1.1.0-1/purell.go/#L153

The TestDecodeUnnecessaryEscapesAll function creates an url with control
characters and passes it to NormalizeURLString to try to get it
normalized/escaped.

I'd say the design of the NormalizeUrlString function is broken and thus
it's not obvious to me how to fix it. I'd say that if you have a
non-normalized string you want encoded, you should pass it in as
something that doesn't need to be parsed. ie. use NormalizeUrl helper
function, which takes an Url type.

Removing the NormalizeUrlString function however would be an API/ABI
break as it's publicly exported (and used by Hugo and Kubernetes)...

Maybe open-coding some homebrew url parsing to fall back on could be
done to keep the function around. Sounds bad to think you know
better than net/url how to parse an url though.

I'm attaching a patch which "fixes" this issue, but really it's most likely
a stupid and wrong things to do to solve this. It's just designed to
make the testsuite pass. As mentioned, I think the NormalizeURLString
function is incorrectly designed and there's no way to fix it (so should
be deprecated in favour of NormalizeURL).
Thus intentionally *not* tagging patch, as this is rather a "proof of
concept".

Regards,
Andreas Henriksson
diff -uriNp golang-github-puerkitobio-purell-1.1.0/purell.go golang-github-puerkitobio-purell-1.1.0-fixed/purell.go
--- golang-github-puerkitobio-purell-1.1.0/purell.go	2016-11-15 03:49:42.0 +0100
+++ golang-github-puerkitobio-purell-1.1.0-fixed/purell.go	2019-04-07 16:00:06.039745498 +0200
@@ -12,6 +12,7 @@ import (
 	"sort"
 	"strconv"
 	"strings"
+	"errors"
 
 	"github.com/PuerkitoBio/urlesc"
 	"golang.org/x/net/idna"
@@ -147,10 +148,43 @@ func MustNormalizeURLString(u string, f
 	return result
 }
 
+func myURLParse(u string) (*url.URL, error) {
+	// first try to parse the url as normal and return it if successful
+	parsed, err := url.Parse(u)
+	if err == nil {
+		return parsed, nil
+	}
+
+	// path possibly contains control characters, which url.Parse
+	// doesn't allow. Try to parse url without path and then add it.
+
+	// find third / and assume that's where path starts.
+	parts := strings.SplitN(u, "/", 4)
+
+	var noPathURL string
+	if len(parts) != 4 {
+		return nil, errors.New("Failed to find start of path in url")
+	}
+	noPathURL = strings.Join(parts[:3], "/")
+
+	parsed, err = url.Parse(noPathURL)
+	if err != nil {
+		return nil, err
+	}
+
+	pathquery := strings.SplitN(parts[3], "#", 2)
+	parsed.Path = pathquery[0]
+	if len(pathquery) > 1 {
+		parsed.Fragment = pathquery[1]
+	}
+
+	return parsed, nil
+}
+
 // NormalizeURLString returns the normalized string, or an error if it can't be parsed into an URL object.
 // It takes an URL string as input, as well as the normalization flags.
 func NormalizeURLString(u string, f NormalizationFlags) (string, error) {
-	parsed, err := url.Parse(u)
+	parsed, err := myURLParse(u)
 	if err != nil {
 		return "", err
 	}


Bug#924840: highwayhash: FTBFS - symbol missing

2019-04-07 Thread Rebecca N. Palmer
I do see this bug in both sid and mostly-buster (I haven't tried 
creating a new buster chroot).  If only some people see this bug, but 
who sees it is reproducible, that could be a sign of another problem 
such as the package doing build-time hardware detection. 
(https://sources.debian.org/src/highwayhash/0%7Egit20190222.276dd7b-1/README.md/#L24 
says it provides both build-time-CPU-detection and 
run-time-CPU-detection variants.)


It appears to be the same bug as #923255 (which is "arch-specific" 
because the expected symbol list was updated for amd64), implying that 
if it is caused by a change in other packages, it appeared between 
2018-11-26 (gcc 8.2.0-10, glibc 2.27-8, binutils 2.31.1-8) and 
2019-02-24 (gcc 8.2.0-21, glibc 2.28-7, binutils 2.21.1-14).


It is one of 4 symbol mismatch bugs (in different packages) found in 
this archive rebuild run:


#924840 / #923255 highwayhash
(gdb) demangle 
_ZNSt6vectorIjSaIjEE17_M_realloc_insertIJRKjEEEvN9__gnu_cxx17__normal_iteratorIPjS1_EEDpOT_@Base 
0~20180209-g14dedec
void std::vector 
>::_M_realloc_insertconst&>(__gnu_cxx::__normal_iteratorint, std::allocator > >, unsigned int const&)@Base 
0~20180209-g14dedec

#924849 gatb-core
(gdb) demangle 
_ZZN4gatb4core8debruijn4impl5bglueILm96EEEvPNS0_5tools7storage4impl7StorageENSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEEiiibENKUlRKNS0_4bank8SequenceEE_clESI_@Base
gatb::core::debruijn::impl::bglue<96ul>(gatb::core::tools::storage::impl::Storage*, 
std::__cxx11::basic_string, 
std::allocator >, int, int, int, 
bool)::{lambda(gatb::core::bank::Sequence 
const&)#1}::operator()(gatb::core::bank::Sequence const&) const@Base

#924841 lib3mf
(gdb) demangle 
_ZNSt8_Rb_treeIjSt4pairIKjSt10shared_ptrIN3NMR14CModelResourceEEESt10_Select1stIS6_ESt4lessIjESaIS6_EE5eraseERS1_@Base 
1.8.0+ds
std::_Rb_treestd::shared_ptr >, 
std::_Select1ststd::shared_ptr > >, std::less, 
std::allocatorstd::shared_ptr > > >::erase(unsigned int 
const&)@Base 1.8.0+ds

#924819 libstatgen
(c++)"void std::vector 
>::emplace_back(float&&)@Base" 1.0.14


The other 3 were fixed by updating the expected symbols list, and this 
one probably could be as well, but that only fixes the FTBFS itself and 
not any potential underlying issue.


As highwayhash has no rdeps in sid (it was packaged as a dependency of 
tensorflow, which is only in experimental), doing nothing and allowing 
it to be removed from buster may also be an option.




Bug#926575: Debidiff as a suggestion

2019-04-07 Thread Paul Wise
On Sun, 2019-04-07 at 11:52 +0200, Christian Ehrhardt wrote:

> This debdiff was test built against gpsd in experimental and works
> fine with it.

I expect I'll just make a new upstream release after buster.

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



signature.asc
Description: This is a digitally signed message part


Bug#926594: unblock: jupyter-notebook/5.7.8-1

2019-04-07 Thread Gordon Ball
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package jupyter-notebook, 5.7.4-2.1 -> 5.7.8-1 (pending
approval before the latter version is uploaded to unstable).

There are two new CVEs since 5.7.4:
 * CVE-2019-9644 (#924515)
 * CVE-2019-10255 (#925939)

The diff between 5.7.4 and 5.7.8 upstream consists mostly of fixes for
these issues. There are also a couple of small non-security related bug
fixes. In principle two of these fixes are not needed (one concerning
MIME types relevant only on Windows, one concerning compatibility with a
newer major version of tornado, which is not yet in debian), but it
seems preferable to use the upstream changes unmodified rather than
selectively remove a small fraction of them.

unblock jupyter-notebook/5.7.8-1

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-3-amd64 (SMP w/1 CPU core)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru jupyter-notebook-5.7.4/debian/changelog 
jupyter-notebook-5.7.8/debian/changelog
--- jupyter-notebook-5.7.4/debian/changelog 2019-03-30 14:52:25.0 
+
+++ jupyter-notebook-5.7.8/debian/changelog 2019-04-07 11:46:04.0 
+
@@ -1,3 +1,11 @@
+jupyter-notebook (5.7.8-1) unstable; urgency=medium
+
+  * New upstream release 5.7.8
+  * Fixes CVE-2019-9644 (Closes: #924515)
+  * Fixes CVE-CVE-2019-10255 (Closes: #925939)
+
+ -- Gordon Ball   Sun, 07 Apr 2019 11:46:04 +
+
 jupyter-notebook (5.7.4-2.1) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru jupyter-notebook-5.7.4/docs/source/changelog.rst 
jupyter-notebook-5.7.8/docs/source/changelog.rst
--- jupyter-notebook-5.7.4/docs/source/changelog.rst2018-12-17 
10:01:51.0 +
+++ jupyter-notebook-5.7.8/docs/source/changelog.rst2019-04-01 
10:22:11.0 +
@@ -21,6 +21,44 @@
 Use ``pip install pip --upgrade`` to upgrade pip. Check pip version with
 ``pip --version``.
 
+.. _release-5.7.8:
+
+5.7.8
+-
+
+- Fix regression in restarting kernels in 5.7.5.
+  The restart handler would return before restart was completed.
+- Further improve compatibility with tornado 6 with improved
+  checks for when websockets are closed.
+- Fix regression in 5.7.6 on Windows where .js files could have the wrong 
mime-type.
+- Fix Open Redirect vulnerability (CVE-2019-10255)
+  where certain malicious URLs could redirect from the Jupyter login page
+  to a malicious site after a successful login.
+  5.7.7 contained only a partial fix for this issue.
+
+.. _release-5.7.6:
+
+5.7.6
+-
+
+5.7.6 contains a security fix for a cross-site inclusion (XSSI) vulnerability 
(CVE-2019–9644),
+where files at a known URL could be included in a page from an unauthorized 
website if the user is logged into a Jupyter server.
+The fix involves setting the ``X-Content-Type-Options: nosniff``
+header, and applying CSRF checks previously on all non-GET
+API requests to GET requests to API endpoints and the /files/ endpoint.
+
+The attacking page is able to access some contents of files when using 
Internet Explorer through script errors,
+but this has not been demonstrated with other browsers.
+
+.. _release-5.7.5:
+
+5.7.5
+-
+
+- Fix compatibility with tornado 6 (:ghpull:`4392`, :ghpull:`4449`).
+- Fix opening integer filedescriptor during startup on Python 2 
(:ghpull:`4349`)
+- Fix compatibility with asynchronous `KernelManager.restart_kernel` methods 
(:ghpull:`4412`)
+
 .. _release-5.7.4:
 
 5.7.4
diff -Nru jupyter-notebook-5.7.4/notebook/auth/login.py 
jupyter-notebook-5.7.8/notebook/auth/login.py
--- jupyter-notebook-5.7.4/notebook/auth/login.py   2018-12-17 
10:01:51.0 +
+++ jupyter-notebook-5.7.8/notebook/auth/login.py   2019-04-01 
10:22:11.0 +
@@ -7,9 +7,9 @@
 import os
 
 try:
-from urllib.parse import urlparse # Py 3
+from urllib.parse import urlparse, urlunparse  # Py 3
 except ImportError:
-from urlparse import urlparse # Py 2
+from urlparse import urlparse, urlunparse  # Py 2
 import uuid
 
 from tornado.escape import url_escape
@@ -39,15 +39,23 @@
 """
 if default is None:
 default = self.base_url
-if not url.startswith(self.base_url):
+# protect chrome users from mishandling unescaped backslashes.
+# \ is not valid in urls, but some browsers treat it as /
+# instead of %5C, causing `\\` to behave as `//`
+url = url.replace("\\", "%5C")
+parsed = urlparse(url)
+path_only = urlunparse(parsed._replace(netloc='', scheme=''))
+if url != path_only or not (parsed.path + 
'/').startswith(self.base_url):
  

Bug#926475: Uploads

2019-04-07 Thread Stefan Potyra
Hi Bruno,

On Sat, Apr 06, 2019 at 04:56:29AM +0200, Bruno Kleinert wrote:
> Hi Stefan,
> 
> that's great! I offer reviews and will sponsor uploads :)

cool, thanks for the offer :).

Preliminary package available:
  dget http://potyra.de/dlt-viewer/dlt-viewer_2.18.0+dfsg-1.dsc

Please give it a thourough review. It's been some time since I last created a
package...

Cheers,
  Stefan.


signature.asc
Description: PGP signature


Bug#926418: [Pkg-libvirt-maintainers] Bug#926418: libvirt: CVE-2019-3886: virsh domhostname command discloses guest hostname in readonly mode

2019-04-07 Thread Salvatore Bonaccorso
Hi Guido,

On Fri, Apr 05, 2019 at 09:54:30PM +0200, Salvatore Bonaccorso wrote:
> Hi Guido,
> 
> On Fri, Apr 05, 2019 at 07:10:25PM +0200, Guido Günther wrote:
> > Hi,
> > On Thu, Apr 04, 2019 at 10:30:14PM +0200, Salvatore Bonaccorso wrote:
> > > Source: libvirt
> > > Version: 5.0.0-1
> > > Severity: important
> > > Tags: security upstream
> > > Forwarded: 
> > > https://www.redhat.com/archives/libvir-list/2019-April/msg00339.html
> > > 
> > > Hi,
> > > 
> > > The following vulnerability was published for libvirt.
> > > 
> > > CVE-2019-3886[0]:
> > > | An incorrect permissions check was discovered in libvirt 4.8.0 and
> > > | above. The readonly permission was allowed to invoke APIs depending on
> > > | the guest agent, which could lead to potentially disclosing unintended
> > > | information or denial of service by causing libvirt to block.
> > > 
> > > I'm filling it here as well for ruther investigation. Is this only
> > > affecting versions >= 4.8.0?
> > 
> > I'd assume this to affect older version as well (looking at the
> > fix). I'll prepare an upload once upstream has this in git.
> 
> Thanks. Yes I'm confused that it's claimed to be 4.8.0 onwards, but
> the submitted fix would in theory apply.

And https://bugzilla.novell.com/show_bug.cgi?id=1131595#c3 confirms
somehow that >= 4.8.0 only looks strange. So let's assume it's
affecting as well the older version were the commit applies.

Regards,
Salvatore



Bug#925473: tomcat9: sysvinit script missing (Policy §9.11¶2 “must”)

2019-04-07 Thread Thorsten Glaser
On Sun, 7 Apr 2019, Ivo De Decker wrote:

> Also, I'm not sure adding an init script now is an approriate change
> for the freeze.

It is, it only touches systems on which it previously did not work.

> Some other changes suggested in this bug (like changes in systemd)
> certainly are not.

This was discussed for later. Emmanuel agreed that, if those changes
were not implemented for buster, the suggested patch to restore user
creation with adduser (trivial, fits into less than an ANSI screen
page, easy to audit) can go into this for buster.

> This bug should not be used as an argument to force these kind of
> changes for buster.

Indeed, and that was never my intention.


I would like to respectfully ask that this *not* be buster-ignored,
and to review the attached patch, which has been tested to indeed
unbreak sysvinit (and fixed some bugs detected during that).

Thanks in advance,
//mirabilos
-- 
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-235
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander Steegdiff -Nru tomcat9-9.0.16/debian/README.Debian 
tomcat9-9.0.16/debian/README.Debian
--- tomcat9-9.0.16/debian/README.Debian 2019-02-05 10:11:13.0 +0100
+++ tomcat9-9.0.16/debian/README.Debian 2019-04-01 16:26:55.0 +0200
@@ -54,6 +54,13 @@
   systemctl daemon-reload
   systemctl restart tomcat9
 
+⚠ This is supported only when Tomcat is started with the systemd unit.
+
+Using Tomcat with other init systems is supported, however that will
+negate the security hardening detailed above, make Tomcat not have
+its own temporary directory, not drop privileges/capabilities after
+start, and not be restarted on crashing. Use at your own risk.
+
   * To run more than one Tomcat instance on your server, install the package
 tomcat9-user and run the tomcat9-instance-create utility.
 You should remove the tomcat9 package if you don't want Tomcat to
diff -Nru tomcat9-9.0.16/debian/changelog tomcat9-9.0.16/debian/changelog
--- tomcat9-9.0.16/debian/changelog 2019-02-26 09:31:13.0 +0100
+++ tomcat9-9.0.16/debian/changelog 2019-04-02 22:54:17.0 +0200
@@ -1,3 +1,21 @@
+tomcat9 (9.0.16-4) unstable; urgency=medium
+
+  * Team upload.
+  * debian/logging.properties: Add commented-out non-systemd configuration
+  * Make tomcat9 installable without systemd:
+- Readd logic to create the system user via adduser
+- Add sysvinit script, for init independence (Closes: #925473)
+  * debian/README.Debian: Document non-systemd risks
+  * debian/libexec/tomcat-locate-java.sh: Remove shebang and make
+not executable as this is only ever sourced (makes no sense otherwise)
+  * Make the systemd startup script honour the (renamed) $SECURITY_MANAGER
+  * Remove -XX:+UseG1GC from standard JAVA_OPTS; the JRE chooses
+a suitable GC automatically anyway (Closes: #925928)
+  * Correct the ownership and permissions on the log directory:
+group adm and setgid (Closes: #925929)
+
+ -- Thorsten Glaser   Tue, 02 Apr 2019 22:54:17 +0200
+
 tomcat9 (9.0.16-3) unstable; urgency=medium
 
   * Removed read/write access to /var/lib/solr (Closes: #923299)
diff -Nru tomcat9-9.0.16/debian/control tomcat9-9.0.16/debian/control
--- tomcat9-9.0.16/debian/control   2019-02-05 10:53:30.0 +0100
+++ tomcat9-9.0.16/debian/control   2019-04-01 16:26:55.0 +0200
@@ -47,7 +47,7 @@
 Architecture: all
 Depends:
  lsb-base (>= 3.0-6),
- systemd (>= 215),
+ systemd (>= 215) | adduser,
  tomcat9-common (>= ${source:Version}),
  ucf,
  ${misc:Depends}
diff -Nru tomcat9-9.0.16/debian/copyright tomcat9-9.0.16/debian/copyright
--- tomcat9-9.0.16/debian/copyright 2019-02-05 10:11:13.0 +0100
+++ tomcat9-9.0.16/debian/copyright 2019-04-01 16:26:55.0 +0200
@@ -49,6 +49,7 @@
2013-2014, Gianfranco Costamagna 
2013-2018, Emmanuel Bourg 
2001-2017, Markus Koschany 
+   2015–2019, mirabilos 
 License: Apache-2.0
 
 License: Apache-2.0
diff -Nru tomcat9-9.0.16/debian/default.template 
tomcat9-9.0.16/debian/default.template
--- tomcat9-9.0.16/debian/default.template  2019-02-05 10:11:13.0 
+0100
+++ tomcat9-9.0.16/debian/default.template  2019-04-01 17:15:52.0 
+0200
@@ -3,9 +3,10 @@
 # OpenJDK and the Oracle JDK are tried.
 #JAVA_HOME=/usr/lib/jvm/java-8-openjdk
 
-# You may pass JVM startup parameters to Java here. If unset, the default
-# options will be: -Djava.awt.headless=true -XX:+UseG1GC
-JAVA_OPTS="-Djava.awt.headless=true -XX:+UseG1GC"
+# You may pass JVM startup parameters to Java here. If you run Tomcat with
+# Java 8 instead of 9 or newer, add "-XX:+UseG1GC" to select a suitable GC.
+# If unset, the default options will be: -Djava.awt.headless=true
+JAVA_OPTS="-Djava.awt.headless=true"
 
 # To enable remote debugging uncomment the 

Bug#925473: tomcat9: sysvinit script missing (Policy §9.11¶2 “must”)

2019-04-07 Thread Ivo De Decker
Control: tags -1 buster-ignore

Hi,

On Wed, Apr 03, 2019 at 02:33:47PM +0200, Thorsten Glaser wrote:
> On Wed, 3 Apr 2019, Emmanuel Bourg wrote:
> 
> > > I really insist on being able to install tomcat9 without having to
> > > install a whole other init system, even if it is not used.
> > 
> > See this as a compromise?
> 
> I don’t know… the missing initscript is an RC bug, so the compromise
> would start _after_ it’s added…

I'm tagging this bug buster-ignore, because we're not going to delay buster
for it. Also, I'm not sure adding an init script now is an approriate change
for the freeze. Some other changes suggested in this bug (like changes in
systemd) certainly are not.

This bug should not be used as an argument to force these kind of changes for
buster.

Thanks,

Ivo



Bug#923986: ruby-pygments.rb: FTBFS randomly (failing tests)

2019-04-07 Thread Chris Lamb
Santiago Vila wrote:

> I tried to build this package in buster but it failed:

Hm, I've just built this package 20 times in sid and the tests pass
every time.

> My recommendation is that the failing tests are simply disabled for buster.

If it's a specific test, then I recommend just disabling that one or
(better) explicitly marking it as XFAIL.


Best wishes,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



Bug#916145: closure-compiler: Not working with recent JS code

2019-04-07 Thread Ivo De Decker
Control: severity -1 important

Hi,

On Sun, Apr 07, 2019 at 11:16:53AM +0300, Adrian Bunk wrote:
> > Adrian: you raised the severity, care to lower it until buster is
> > out (or say some words on why)?
> 
> IMHO the release team adding a buster-ignore tag would be the best way 
> forward here - this would still show up as RC bug for bullseye.

No. Downgrading is the way forward.

If you want to update the package for bullseye, filing an RC bug is not the
way to do it. Joining the team and preparing a new package (after the freeze)
is.

Thanks,

Ivo



Bug#905446: haskell-hackage-mirror: FTBFS: Module `Control.Monad.Trans.Resource' does not export `monadThrow'

2019-04-07 Thread Alexandre Peyroux
This package is deprecated. https://github.com/fpco/hackage-mirror

Regards


Bug#917203: FTBFS on at least two architectures: test failure in the enigma algorithm

2019-04-07 Thread Chris Lamb
tags 917203 + pending
thanks

I've uploaded libmcrypt 2.5.8-3.4 to DELAYED/5:
  
  libmcrypt (2.5.8-3.4) unstable; urgency=medium
  
* Non-maintainer upload.
* Fix FTBFS on at least two architectures due to test failures in the
  "enigma". Thanks to Göran Weinholt (weinholt) for the patch.
  (Closes: #917203)
* Update Vcs-{Git,Browser} to point to salsa.debian.org.

The full debdiff is attached.


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-
diffstat for libmcrypt_2.5.8-3.3 libmcrypt_2.5.8-3.4

 libmcrypt-2.5.8/debian/changelog |   10 ++
 libmcrypt-2.5.8/debian/control   |4 ++--
 modules/algorithms/enigma.h  |   10 +-
 3 files changed, 17 insertions(+), 7 deletions(-)

diff -u libmcrypt-2.5.8/debian/changelog libmcrypt-2.5.8/debian/changelog
--- libmcrypt-2.5.8/debian/changelog
+++ libmcrypt-2.5.8/debian/changelog
@@ -1,3 +1,13 @@
+libmcrypt (2.5.8-3.4) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTBFS on at least two architectures due to test failures in the
+"enigma". Thanks to Göran Weinholt (weinholt) for the patch.
+(Closes: #917203)
+  * Update Vcs-{Git,Browser} to point to salsa.debian.org.
+
+ -- Chris Lamb   Sun, 07 Apr 2019 14:38:10 +0200
+
 libmcrypt (2.5.8-3.3) unstable; urgency=low
 
   * Non-maintainer upload.
diff -u libmcrypt-2.5.8/debian/control libmcrypt-2.5.8/debian/control
--- libmcrypt-2.5.8/debian/control
+++ libmcrypt-2.5.8/debian/control
@@ -3,8 +3,8 @@
 Priority: optional
 Maintainer: RISKO Gergely 
 Build-Depends: debhelper (>= 7.0.50), dh-autoreconf, libltdl-dev
-Vcs-Browser: http://git.debian.org/?p=collab-maint/libmcrypt.git;a=summary
-Vcs-Git: git://git.debian.org/collab-maint/libmcrypt.git
+Vcs-Browser: http://salsa.debian.org/debian/libmcrypt
+Vcs-Git: http://salsa.debian.org/debian/libmcrypt.git
 Homepage: http://mcrypt.sourceforge.net/
 Standards-Version: 3.8.1
 
--- libmcrypt-2.5.8.orig/modules/algorithms/enigma.h
+++ libmcrypt-2.5.8/modules/algorithms/enigma.h
@@ -3,11 +3,11 @@
 #define MASK 0377
 
 typedef struct crypt_key {
-   char t1[ROTORSZ];
-   char t2[ROTORSZ];
-   char t3[ROTORSZ];
-   char deck[ROTORSZ];
-   char cbuf[13];
+   signed char t1[ROTORSZ];
+   signed char t2[ROTORSZ];
+   signed char t3[ROTORSZ];
+   signed char deck[ROTORSZ];
+   signed char cbuf[13];
int n1, n2, nr1, nr2;
 } CRYPT_KEY;
 


Bug#900912: Enabling jaw (Java-atk-wrapper) by default ? (Bug#900912)

2019-04-07 Thread Vincent Privat
If enabled by default, please offer a reliable way for applications to
disable it. We don't need it for JOSM, and we have been so impacted with
jaw's problems in the past years that we will never want it enabled by
default for us.

Le dim. 7 avr. 2019 à 12:08, Samuel Thibault  a
écrit :

> Hello,
>
> Matthias Klose, le sam. 06 avril 2019 15:46:21 +0200, a ecrit:
> > On 06.04.19 15:13, Paul Gevers wrote:
> > > We're late already, I would want this rather sooner than latter
> > > in buster, such that there is some real live testing before we release.
> > > Sure, there are chances for bugs, but if that's the case, let's find
> > > them and fix them.
> >
> > I disagree.  I'll do the next upload with Samuel's proposed patches, not
> > enabling that by default, together with the planned security update.
> Then
> > people can start testing if the wrapper works.
>
> Well, I'm afraid that what will happen is that the people who will
> test will simply find out that it just works for them (just like it
> does already for them with openjdk-8) ; will we then conclude near the
> release that it should be enabled by default for Buster, and then be hit
> by the much wider exposition to jaw?
>
> If on the contrary we enable it by default during the freeze, we will
> have *way* more testing coverage, and thus be much more confident with
> keeping it enabled by default in Buster if we don't see bug reports.
>
> > Enabling features during the freeze which were broken most of the time
> > during the development cycle sounds risky.
>
> Just ftr: what was broken was the load of jaw in openjdk-11, jaw itself
> seems to work in openjdk-8 for people needing it.
>
> Samuel
>


Bug#926479: Interesting ..

2019-04-07 Thread Christian Ehrhardt
Hi,
that is very interesting, thanks for pulling me in.

Since the same tests ran in Ubuntu for quite a while I checked it, but
it looks good across the board [1] and since you posted an amd64 fail
I checked that for Xenial [2] and Bionic [3] which both look non flaky
to me on our infrastructure at least.

However that was just a statement for the overall status. They seem to
be flaky for you, so let us take a look why.

To reproduce I did:
$ autopkgtest-build-lxd images:debian/sid/amd64
$ sudo ~/work/autopkgtest/autopkgtest/runner/autopkgtest
--test-name=daemon --no-built-binarie
s --apt-upgrade --shell-fail strongswan_5.7.2-1.dsc -- lxd
images:debian/sid/amd64

That really gave me in Debian the failing services ?! why would that
be different?

The command above gives you a login into the just failed test
environment and there really is no pid for the daemon. This also does
not resolve over time.

The reason is that normally a started service would look like:
● strongswan.service - strongSwan IPsec IKEv1/IKEv2 daemon using ipsec.conf
  Loaded: loaded (/lib/systemd/system/strongswan.service; enabled;
vendor preset: enabled)
  Active: active (running) since Sun 2019-04-07 12:05:59 UTC; 2min 20s ago
Main PID: 14806 (starter)
   Tasks: 18 (limit: 547)
  Memory: 4.9M
  CGroup: /system.slice/strongswan.service
  ├─14806 /usr/lib/ipsec/starter --daemon charon --nofork
  └─14845 /usr/lib/ipsec/charon

Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[CFG] loading aa
certificates from '/etc/
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[CFG] loading
ocsp signer certificates fr
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[CFG] loading
attribute certificates from
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[CFG] loading
crls from '/etc/ipsec.d/crl
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[CFG] loading
secrets from '/etc/ipsec.se
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[LIB] loaded
plugins: charon aes rc2 sha2
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[LIB] dropped
capabilities, running as ui
Apr 07 12:05:59 disco-checklvm-pass charon[14845]: 00[JOB] spawning 16
worker threads
Apr 07 12:05:59 disco-checklvm-pass ipsec[14806]: charon (14845)
started after 40 ms
Apr 07 12:05:59 disco-checklvm-pass ipsec_starter[14806]: charon
(14845) started after 40 ms

But on the Debian test it is like:
systemctl status strongswan
.service
● strongswan.service - strongSwan IPsec IKEv1/IKEv2 daemon using ipsec.conf
  Loaded: loaded (/lib/systemd/system/strongswan.service; enabled;
vendor preset: enabled)
  Active: inactive (dead) since Sun 2019-04-07 12:00:56 UTC; 8min ago
Main PID: 1120 (code=exited, status=0/SUCCESS)

Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec[1120]: 00[CFG] expanding
file expression '/var/li
b/strongswan/ipsec.secrets.inc' failed
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec[1120]: 00[LIB] failed to
load 2 critical plugin f
eatures
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec[1120]: 00[DMN]
initialization failed - aborting c
haron
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec[1120]: charon has quit:
initialization failed
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec[1120]: charon refused to be started
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec_starter[1120]: charon has
quit: initialization fa
iled
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec[1120]: ipsec starter stopped
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec_starter[1120]: charon
refused to be started
Apr 07 12:00:56 autopkgtest-lxd-gstxpo ipsec_starter[1120]: ipsec
starter stopped
Apr 07 12:00:56 autopkgtest-lxd-gstxpo systemd[1]: strongswan.service:
Succeeded.

The other tests work in the container environment, but the daemon
itself needs a VM to load modules and fails in containers.
The reason it is flaky might be that it runs on VMs sometimes and on
Containers in the other cases.

The fix for that would be simple, how about:

diff --git a/debian/tests/control b/debian/tests/control
index eb9e20463c..b6afafd29d 100644
--- a/debian/tests/control
+++ b/debian/tests/control
@@ -1,3 +1,7 @@
-Tests: daemon admin-strongswan-charon admin-strongswan-starter plugins
+Tests: admin-strongswan-charon admin-strongswan-starter plugins
Depends: strongswan, libstrongswan-standard-plugins,
libstrongswan-extra-plugins, libcharon-e
xtra-plugins, strongswan-pki, strongswan-scepclient
Restrictions: needs-root isolation-container allow-stderr
+
+Tests: daemon
+Depends: strongswan-starter
+Restrictions: needs-root isolation-machine allow-stderr


I have no Debian VM that supports autopkgtest, maybe you could upload
that to experimental or the QA team could otherwise help to verify the
suggestion.
Or - if you want - you can take the change as is, as it should be really safe.


[1]: http://autopkgtest.ubuntu.com/packages/strongswan
[2]: http://autopkgtest.ubuntu.com/packages/strongswan/xenial/amd64
[3]: http://autopkgtest.ubuntu.com/packages/strongswan/bionic/amd64

-- 
Christian Ehrhardt
Software 

Bug#926592: Buffer overflow in readlink running under fakechroot

2019-04-07 Thread John Williams
Package: fakechroot
Version: 2.19-3

In an up-to-date installation of stretch, I do this:
  fakechroot readlink /etc/ssl/certs/*
and get this:
   *** Error in readlink: free(): invalid next size (fast): 0xee312140 
***

Note that this is *not* in a faked chroot.

Looking at the source code: readlink allocates a small buffer for the linked 
filename, and relies on the readlink() call returning a truncated value if the 
buffer overflows. But the replacement readlink() in libfakechroot calls the 
original function with a huge buffer, and if a faked chroot is not in effect 
then it just copies the whole result to the caller. The file names in 
/etc/ssl/certs are long enough for this to cause an overflow.

I haven't investigated to see how much damage this could cause if (e.g.) a 
specially-crafted malicious file name were used.



  1   2   >