Bug#1071363: snappy-tools: FTBFS: snappy.cpp:575:51: error: call of overloaded ‘Compress({anonymous}::fd_source*, {anonymous}::FILE_sink*)’ is ambiguous

2024-05-20 Thread GCS
On Sat, May 18, 2024 at 12:29 AM наб  wrote:
> But a fixed patch, would be much easier to produce:
 This is correct, thanks.

> I also see
[...]
> which should've gotten a similar treatment,
> or actually no treatment at all, because RawCompressFromIOVec() is new in 1.2
> (but AFAICT calling RawCompressFromIOVec() will fail on overload resolution 
> like Compress()).
 Nope, it was added in v1.1.10 and it was part of the archive [1],
version 1.2.0 changed the function signature as the others [2] added
CompressionOptions.

Regards,
Laszlo/GCS
[1] 
https://tracker.debian.org/news/1445402/accepted-snappy-1110-1-source-into-unstable/
[2] 
https://github.com/google/snappy/commit/766d24c95e345d4d06bfd3cc5787c2da3e025fab#diff-ec7058c429b88797a43d7c3ef3a244980e46f8219844cd2550eaf4bcdc36e961L85



Bug#1070977: transition: snappy

2024-05-13 Thread GCS
On Mon, May 13, 2024 at 2:04 PM Emilio Pozuelo Monfort  wrote:
> Why is there a libsnappy1v5 transitional package?
 Serves several purposes. As noted, upstream soname is _not_ changed,
so I can't let the old library package be present as it would contain
the same named library file conflicting with the one in the new,
normally named library package name. In short, I must do a file move
between packages. Then the old libsnappy1v5 package has a conflict
with the then old libsnappy1 package name. Thus this conflict needs to
be removed.

> Also has upstream been contacted in order to do a proper SONAME bump? 
> Otherwise
> libsnappy1 will have to conflict with libsnappy1v5, and that will make both 
> the
> transition and upgrades harder, as they have to be done in lockstep. If they
> broke the ABI, then a SONAME bump is in order, and that will make it easier 
> for
> us too.
 Yup, in such cases a soname bump is needed. Then upstream is Google
and as I remember years back I had a somewhat similar problem with one
of their library package. If I'm correct, I got a similar answer that
in such cases they just recompile the dependent sources and don't
change the soname.
Then the public source tree is hosted on GitHub [1] without the issues
(report) area enabled. The AUTHORS file contains a general email
address (opensou...@google.com) [2] meaning I'm not sure if I get any
answer or I will get one soon. But I can try it if you insist.

Regards,
Laszlo/GCS
[1] https://github.com/google/snappy
[2] https://github.com/google/snappy/blob/1.2.0/AUTHORS



Bug#1070977: transition: snappy

2024-05-12 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 + src:snappy

Hi RMs,

Upstream of snappy changed function signatures [1] breaking other
applications with the 1.2.0 release. I've added back the original
function signatures calling the new ones to restore the immediate
problem, to restore the ABI. But then this creates ambiguity in the
Compress method signatures [2] making (only) ceph FTBFS. While it can
be patched to avoid it, a proper transition should be done.
I've renamed back the library name which was done due to the C++11 ABI
change with g++ 5.0 back in 2015.

Thanks for considering,
Laszlo/GCS
[1] https://bugs.debian.org/1070217
[2] https://bugs.debian.org/1070785



Bug#1070785: libsnappy-dev: Ambiguity in Compress method signatures causes FTBFS in ceph

2024-05-10 Thread GCS
Hi James,

On Thu, May 9, 2024 at 9:03 AM James Page  wrote:
cd > The patch added to restore older API signatures to resolve Bug 1070217
> creates ambiguity in the method signatures resulting in FTBFS in at
> least the ceph package:
[...]
> The compression options parameter which was added for >= 1.2 of snappy
> provides a default, so the added method with no options creates this
> ambiguity.
 For the time being ceph might patch to call directly the new API with
changing line 78 of SnappyCompressor.h:
snappy::Compress(, );
to
snappy::Compress(, , {});

I can't test it myself as in my test environment ceph can't even
configure due to:
-- crypto soname: libcrypto.so.3
CMake Error at 
/usr/share/cmake-3.29/Modules/FindPackageHandleStandardArgs.cmake:230
(message):
  Could NOT find Python3 (missing: Python3_LIBRARY Python3_INCLUDE_DIR
  Development) (found suitable exact version "3.10.13")

But indeed, I should do a transition of snappy with a prepared new library name.

Regards,
Laszlo/GCS



Bug#758985: libsqlite3-0: Please support 'icu' and 'unicode61' tokenizers

2024-05-07 Thread GCS
Hi Mike,

On Mon, May 6, 2024 at 10:27 PM Mike Gabriel  wrote:
> Find attached a .debdiff patch that fixes bug #758985 by building
> sqlite3 with SQLITE_ENABLE_ICU.
 I think there was a time when it was already enabled. Caused some
problems, but so late I can't remember exactly.

> Please consider enabling the ICU extension and making sqlite3 i18n
> capable for languages using regional fonts etc. If this change is not
> acceptable, please also let me know.
 I'm going to upload it to experimental as it will help to test it
easily first. Would it pull in too many extra dependencies with ICU?
Need to be checked as well.

> Maybe it could be an approach to upload an ICU-enabled version of
> sqlite3 to experimental and ask people to test their
> services/applications with the new-featured sqlite3. I can help with
> communications if needed. Please let me know.
 Do you have a list of people, projects that will be affected by this
change? Sure, it would help to reach them for comments.

Regards,
Laszlo/GCS



Bug#1070401: sqlite3 breaks tracker autopkgtest: killed by signal 6 SIGABRT

2024-05-05 Thread GCS
Hi Paul,

On Sat, May 4, 2024 at 10:27 PM Paul Gevers  wrote:
> With a recent upload of sqlite3 the autopkgtest of tracker fails in
> testing when that autopkgtest is run with the binary packages of sqlite3
> from unstable.
[...]
> The new version of tracker in unstable also fails in unstable, but that
> already has bug 1068468 (which *may* be the same).
 It _is_ the same bug. But start from the beginning. SQLite3 only got
bug fixes between the current testing (3.45.1-1) and unstable
(3.45.3-1) package versions [1]. All other packages build and
autopkgtest successfully with the SQLite3 version in Sid. Even tracker
(current Sid version, 3.7.3-1) itself was compiled and succeeded to
self-test with SQLite3 3.4.3-1 [2], see the build log parts:
dbus-run-session -- dh_auto_test --no-parallel -- --timeout-multiplier 5
cd obj-x86_64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb
LC_ALL=C.UTF-8 MESON_TESTTHREADS=1 meson test --timeout-multiplier 5
19/41 tracker:fts / fts   OK   0.46s
25/41 tracker:core / service  OK  12.03s

Installed-Build-Depends:
 libsqlite3-0 (= 3.45.3-1),

While the autopkgtest results:
 87s  8/29 tracker:fts / fts   FAIL
 0.22s   killed by signal 6 SIGABRT

In short, how come that while building with SQLite3 version 3.45.3 it
works, but autopkgtest with the same version fails?
Your mentioned autopkg log spills out a lot of "ambiguous column name:
ROWID" as well. It seems the test environment setup is failing
somehow. The upstream maintainer of tracker also notes it [3]:
-- cut --
Looking at the configuration at
https://salsa.debian.org/gnome-team/tracker/-/blob/debian/latest/debian/tests/unit-tests,
this looks fishy:
[...]
I see some issues with this:
These loadable modules are not interchangeable with other versions,
the internal API may change between minor releases.
The libtracker-http-soup3.so is installed in that location, but is not
related and does not belong in the src/libtracker-common path.
These .so files are not expected in LD_LIBRARY_PATH, they are dlopened
from specific locations.
The library and test suite will already open the in-tree .so modules,
while run through ninja/meson test.

The build environment does not need any fooling to do the right thing
(i.e. test in-tree code), things might just work if you don't fight it
:).
-- cut --

Then a quick summary. As I see the autopkgtest configure the build
tree and copies installed libraries to it and as such the tests are
failing.
If I do the same manually from simple CLI then indeed the self testing fails.
Still the same environment, still from the same directory if I issue
dh_auto_build after the dh_auto_configure and then execute the same
"dbus-run-session -- dh_auto_test --no-parallel --
--timeout-multiplier 5": all tests pass.
The only difference is that every built binary is in place, not just
two libraries copied into the source tree missing something else. This
is what SIGABRT suggests, probably some binary or library can't be
dlopen-ed as it's (those are) not copied over.
It's the tracker autopkg testing that needs fixing.

Regards,
Laszlo/GCS
[1] https://sqlite.org/releaselog/3_45_3.html
[2] 
https://buildd.debian.org/status/fetch.php?pkg=tracker=amd64=3.7.3-1=1714672833=0
[3] https://gitlab.gnome.org/GNOME/tracker/-/issues/434#note_2077470



Bug#1070266: nmu: chromium_124.0.6367.118-1

2024-05-02 Thread GCS
Control: tags -1 +moreinfo

On Fri, May 3, 2024 at 12:57 AM Andres Salomon  wrote:
> Snappy 1.2.0-1 was uploaded with broken symbols (see
> https://bugs.debian.org/1070217). This is fixed in snappy 1.2.0-2, but
> chromium in sid had already built against the broken version of snappy.
 Nope, the symbols were _not_ broken, some were missing as of the
1.1.10-1 version. I have added those back in the 1.2.0-2 package
version.

> Please rebuild chromium against snappy 1.2.0-2 to fix its broken symbol
> dependencies. Because this chromium release has CVE fixes (and there's
> 20-something pending CVEs in trixie already that would be fixed by
> chromium migration), I'm filing this with a higher severity than usual.
 It is _not_ needed. the ABI of 1.2.0-1 is not changed in 1.2.0-2,
I've even installed the new snappy library version and can still use
chromium without problems. Do you experience any odd behaviour?

Regards,
Laszlo/GCS



Bug#979617: tcplay: VeraCrypt support

2024-04-25 Thread GCS
On Mon, Apr 22, 2024 at 8:33 PM Daniel Kahn Gillmor  wrote:
> On Sun 2024-04-21 15:44:12 +0200, László Böszörményi (GCS) wrote:
> >  I prefer communication first. :) Currently I'm travelling so I can
> > only check it on Tuesday.
>
> That's why i uploaded to DELAYED/15 :)  thanks for offering to take a
> look at it later this week, László!
 I meant to reach a consensus first and then do the upload. There's no
point in an upload that needs to be cancelled.

Best,
Laszlo/GCS



Bug#979617: tcplay: VeraCrypt support

2024-04-21 Thread GCS
Hi,

On Sun, Apr 21, 2024 at 9:06 AM Daniel Kahn Gillmor  wrote:
> I've just confirmed what Johannes said about tcplay 3.3 building easily
> on debian.  I uploaded 3.3-0.1 to unstable as an NMU to DELAYED/15,
> after cleaning up the packaging a little bit.
[...]
> Hopefully this NMU is welcomed in the helpful spirit i intended with it!
> But if you think it's a bad idea, I don't mind it being NACK'ed.  In the
> course of doing the cleanup i noticed a few weird things about the
> packaging for libtcplay, that i wasn't sure how to best fix, so i just
> recorded them in the BTS.
 I prefer communication first. :) Currently I'm travelling so I can
only check it on Tuesday.

> I've also tested a backported version of 3.3-0.1 to debian stable, and
> it seems to work fine to create an interoperable VeraCrypt volume
> (methodology described below).
 There were some license problems in the past at least, which
prevented packaging. I will check the current situation.

Regards,
Laszlo/GCS



Bug#1067407: graphviz: diff for NMU version 2.42.2-8.1

2024-03-21 Thread GCS
Control: tags -1 +moreinfo

On Thu, Mar 21, 2024 at 12:39 PM Gianfranco Costamagna
 wrote:
> I've prepared an NMU for graphviz (versioned as 2.42.2-8.1) and
> uploaded it to DELAYED/2. Please feel free to cancel it directly if you want 
> to do a maintainer upload.
 I do not see the point of this. Can you please recheck the current
graphviz package state and report back to me?

Regards,
Laszlo/GCS



Bug#1067407: graphviz: FTBFS due to -Wimplicit-declaration gcc flag

2024-03-21 Thread GCS
Hi Gianfranco,

On Thu, Mar 21, 2024 at 9:09 AM Gianfranco Costamagna
 wrote:
> Hello, looks like the package will FTBFS due to newly introduced 
> implicit-declaration flag
> I did cherry-pick two upstream patches and the package now build successfully.
 When that '-Wimplicit-declaration' is going to be set? I'm a bit
confused, you may mix it with '-Werror=implicit-function-declaration'
which was already patched five days ago.
Can you recheck your findings and add more information?

Thanks,
Laszlo/GCS



Bug#1062465: ivykis: NMU diff for 64-bit time_t transition

2024-02-01 Thread GCS
Hi Graham,

On Thu, Feb 1, 2024 at 5:03 PM Graham Inggs  wrote:
> Source: ivykis
> Version: 0.42.4-1
[...]
> If you have any concerns about this patch, please reach out ASAP.  Although
> this package will be uploaded to experimental immediately, there will be a
> period of several days before we begin uploads to unstable; so if information
> becomes available that your package should not be included in the transition,
> there is time for us to amend the planned uploads.
 My only question is if it would be OK for you if I package the new
ivykis upstream release to experimental as 0.43-1~exp1 over your
changes of course?

Regards,
Laszlo/GCS



Bug#1060753: exiftags: CVE-2023-50671

2024-01-14 Thread GCS
Hi Salvatore,

On Sat, Jan 13, 2024 at 5:51 PM Salvatore Bonaccorso  wrote:
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
 I have fixed some issues, but as I see, not the root causes. Then
with my fixes I found that the reproducers may crash exiftags later by
other issues.
Contacted upstream if he plans to fix these by himself. Waiting for his reply.

Regards,
Laszlo/GCS



Bug#1027876: protobuf: package is missing CMake files

2024-01-14 Thread GCS
On Wed, Jan 4, 2023 at 11:36 AM André Apitzsch
 wrote:
> CMake has difficulties to keep up compatibility with the CMake files
> provided by Protobuf, therefore it is considered to deprecate
> FindProtobuf in CMake [1] in favor of CMake files provided by Protobuf.
 Thanks for the previous work on this.

> One way to add the CMake files could be to switch from Autotools to
> CMake or Bazel. These tools are recommended to build Protobuf from
> source [2]. The instructions to build Protobuf with Autotools have been
> removed [3].
 Yup, that's true and the new Protobuf package, currently in
'experimental' is now built with CMake. Please check if it meets your
requirements.
It will take a while to make it to Sid, but please report back if you
find any issues.

Regards,
Laszlo/GCS



Bug#1058099: pyro4: FTBFS: AttributeError: 'CoreTests' object has no attribute 'assertEquals'. Did you mean: 'assertEqual'? debdiff for NMU

2024-01-11 Thread GCS
Hi Thomas,

On Thu, Jan 11, 2024 at 4:57 PM Thomas Goirand  wrote:
> Please see attached diff to fix the issue. It's kind of trivial to fix,
> as you may see... Could you please upload it to unstable ASAP, or allow
> me to NMU this fix?
 I'll upload it ASAP. But what's your intention with keeping pyro4 in
the archives? It is no longer developed and superseded with pyro5.
Should be removed sooner than later.

Regards,
Laszlo/GCS



Bug#1060225: protobuf: Install proto_api.h

2024-01-09 Thread GCS
Control: forwarded -1 https://github.com/protocolbuffers/protobuf/issues/9464

Hi,

On Sun, Jan 7, 2024 at 9:42 PM Kari Pahula  wrote:
> For some reason, protobuf doesn't apparently install
> python/google/protobuf/proto_api.h anywhere.  For example
> https://github.com/pybind/pybind11_protobuf uses it with an #include
> which it assumes to find under "python" directory after fetching it
> with cmake.  For packaging use that won't work and it'd help to have
> it available in protobuf's packages.
 It has been left out since at least 3.14 on purpose. See the issue
this report is forwarded to.
I do not plan to force install it for the package.

Regards,
Laszlo/GCS



Bug#1059161: RFA: pypdf -- Pure-Python library built as a PDF toolkit (Python 3)

2023-12-20 Thread GCS
Package: wnpp
Control: affects -1 + src:pypdf
X-Debbugs-Cc: py...@packages.debian.org
X-Debbugs-Cc: Daniel Kahn Gillmor 
Severity: normal

I request an adopter for the pypdf package.

The package description is:
 A Pure-Python library built as a PDF toolkit.  It is capable of:
   - extracting document information (title, author, ...),
   - splitting documents page by page,
   - merging documents page by page,
   - cropping pages,
   - merging multiple pages into a single page,
   - encrypting and decrypting PDF files.
 .
 By being Pure-Python, it should run on any Python platform without any
 dependencies on external libraries.  It can also work entirely on StringIO
 objects rather than file streams, allowing for PDF manipulation in memory.
 It is therefore a useful tool for websites that manage or manipulate PDFs.
 .
 This is the Python 3 version of the package.



Bug#1059160: RFA: pypdf2 -- Pure-Python library built as a PDF toolkit (Python 3)

2023-12-20 Thread GCS
Package: wnpp
Control: affects -1 + src:pypdf2
X-Debbugs-Cc: pyp...@packages.debian.org
X-Debbugs-Cc: Daniel Kahn Gillmor 
Severity: normal

I request an adopter for the pypdf2 package.

The package description is:
 A Pure-Python library built as a PDF toolkit.  It is capable of:
   - extracting document information (title, author, ...),
   - splitting documents page by page,
   - merging documents page by page,
   - cropping pages,
   - merging multiple pages into a single page,
   - encrypting and decrypting PDF files.
 .
 By being Pure-Python, it should run on any Python platform without any
 dependencies on external libraries.  It can also work entirely on StringIO
 objects rather than file streams, allowing for PDF manipulation in memory.
 It is therefore a useful tool for websites that manage or manipulate PDFs.
 .
 This is the Python 3 version of the package.



Bug#1059026: transition: rocksdb

2023-12-19 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 + src:rocksdb

Hi RMs,

Small transition of RocksDB to the 8.9.1 release, available from
experimental. Affected packages are balboa, oxigraph and sortmerna.
While oxigraph is Sid only currently, all three build fine with this
version of RocksDB as well.

Thanks for considering,
Laszlo/GCS



Bug#1057889: graphviz_10.0.0~git231209-1_riscv64-buildd.changes REJECTED

2023-12-10 Thread GCS
Control: tags -1 +confirmed pending

On Sun, Dec 10, 2023 at 10:33 AM Aurelien Jarno  wrote:
> On 2023-12-10 07:05, Debian FTP Masters wrote:
> > graphviz-tools_10.0.0~git231209-1_riscv64.deb: has 1 file(s) with a 
> > timestamp=
> >  too far in the past:
> >   usr/share/doc/graphviz-tools/copyright (Thu Jan  1 00:01:00 1970)
 Seems I updated my Bookworm system too soon and hit the ext4
corruption bug in the kernel as noted in #1057843. Luckily an fsck
corrected my filesystem and package update is in progress.

Regards,
Laszlo/GCS



Bug#1055944: bookworm-pu: package vips/8.14.1-3+deb12u1

2023-11-14 Thread GCS
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bookworm
Severity: normal
Control: affects -1 + src:vips

Hi RMs,

[ Reason ]
A specially crafted SVG input can cause libvips versions 8.14.3 or
earlier to segfault when attempting to parse a malformed UTF-8
character. It is considered a security issue and has the
CVE-2023-40032 identifier.

[ Impact ]
It is an application crash and can't be used for more. Hence the
Security Team decided it doesn't get a DSA. But it would be nice to
get the package updated.

[ Tests ]
Upstream testsuite and Sid update doesn't report any regressions.

[ Risks ]
The proposed change has very little risk of side-effects.

[ Checklist ]
  [x] *all* changes are documents in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in bookworm
  [x] the issue is verified as fixed in unstable

Thanks for considering,
Laszlo/GCS
diff -Nru vips-8.14.1/debian/changelog vips-8.14.1/debian/changelog
--- vips-8.14.1/debian/changelog	2023-02-13 10:48:58.0 +0100
+++ vips-8.14.1/debian/changelog	2023-11-14 16:05:39.0 +0100
@@ -1,3 +1,10 @@
+vips (8.14.1-3+deb12u1) bookworm; urgency=medium
+
+  * Backport upstream security fix for CVE-2023-40032: svgload: fix
+null-pointer dereference.
+
+ -- Laszlo Boszormenyi (GCS)   Tue, 14 Nov 2023 16:05:39 +0100
+
 vips (8.14.1-3) unstable; urgency=medium
 
   * Double self-testing timeout on mips64el and mipsel architectures.
diff -Nru vips-8.14.1/debian/patches/CVE-2023-40032.patch vips-8.14.1/debian/patches/CVE-2023-40032.patch
--- vips-8.14.1/debian/patches/CVE-2023-40032.patch	1970-01-01 01:00:00.0 +0100
+++ vips-8.14.1/debian/patches/CVE-2023-40032.patch	2023-11-14 16:05:39.0 +0100
@@ -0,0 +1,71 @@
+From e091d65835966ef56d53a4105a7362cafdb1582b Mon Sep 17 00:00:00 2001
+From: Kleis Auke Wolthuizen 
+Date: Sun, 13 Aug 2023 15:48:54 +0200
+Subject: [PATCH] svgload: fix null-pointer dereference (#3604)
+
+`g_utf8_find_next_char()` might return NULL when called with a
+non-NULL second argument, indicating that the end of the string
+has been reached.
+---
+ ChangeLog |  4 
+ libvips/foreign/svgload.c | 18 +++---
+ 2 files changed, 19 insertions(+), 3 deletions(-)
+
+diff --git a/ChangeLog b/ChangeLog
+index e47ee86bb4..b7544219e5 100644
+--- a/ChangeLog
 b/ChangeLog
+@@ -1,3 +1,7 @@
++TBD 8.14.4
++
++- fix null-pointer dereference during svgload [kleisauke]
++
+ TBD 8.14.2
+ 
+ - dedupe FITS header write [ewelot]
+diff --git a/libvips/foreign/svgload.c b/libvips/foreign/svgload.c
+index 94072581d4..aefd412ed2 100644
+--- a/libvips/foreign/svgload.c
 b/libvips/foreign/svgload.c
+@@ -145,7 +145,7 @@ vips_foreign_load_svg_zfree( void *opaque, void *ptr )
+ /* Find a utf-8 substring within the first len_bytes (not characters). 
+  *
+  *   - case-insensitive
+- *   - needle must be zero-terminated, but hackstack need not be
++ *   - needle must be zero-terminated, but haystack need not be
+  *   - haystack can be null-terminated
+  *   - if haystack is shorter than len bytes, that'll end the search 
+  *   - if we hit invalid utf-8, we return NULL
+@@ -191,11 +191,14 @@ vips_utf8_strcasestr( const char *haystack_start, const char *needle_start,
+ b == (gunichar) -2 )
+ return( NULL );
+ 
+-/* End of haystack. There can't be a complete needle
+- * anywhere.
++/* Disallow codepoint U+ as it's a nul byte.
++ * This is redundant with GLib >= 2.63.0, see:
++ * https://gitlab.gnome.org/GNOME/glib/-/merge_requests/967
+  */
++#if !GLIB_CHECK_VERSION( 2, 63, 0 )
+ if( a == (gunichar) 0 )
+ return( NULL );
++#endif
+ 
+ /* Mismatch.
+  */
+@@ -205,6 +208,15 @@ vips_utf8_strcasestr( const char *haystack_start, const char *needle_start,
+ haystack_char = 
+ g_utf8_find_next_char( haystack_char, 
+ 	haystack_start + len_bytes );
++
++/* End of haystack. There can't be a complete needle
++ * anywhere.
++ */
++if( haystack_char == NULL )
++return( NULL );
++
++/* needle_char will never be NULL.
++ */
+ needle_char = 
+ g_utf8_find_next_char( needle_char, NULL );
+ }
diff -Nru vips-8.14.1/debian/patches/series vips-8.14.1/debian/patches/series
--- vips-8.14.1/debian/patches/series	2023-02-12 08:52:21.0 +0100
+++ vips-8.14.1/debian/patches/series	2023-11-14 16:05:39.0 +0100
@@ -1,2 +1,3 @@
 dedupe_fits_header.patch
 fix_target_pnm_write.patch
+CVE-2023-40

Bug#1055762: ITP: botan3 -- multiplatform crypto library (3.x version)

2023-11-10 Thread GCS
Package: wnpp
Severity: wishlist
Owner: Laszlo Boszormenyi (GCS) 

* Package name: botan
  Version : 3.2.0
  Upstream Author : The Botan Authors
* URL : https://botan.randombit.net/
* License : BSD-2-clause
  Programming Lang: C++
  Description : multiplatform crypto library (3.x version)

Botan is a C++ library which provides support for many common cryptographic
operations, including encryption, authentication, and X.509v3 certificates and
CRLs. A wide variety of algorithms is supported, including RSA, DSA, DES, AES,
MD5, and SHA-1.



Bug#1055222: fuse: backport unprivileged usage via /dev/fd/N to support usage in namespaces

2023-11-06 Thread GCS
Hi Helmut,

On Mon, Nov 6, 2023 at 11:28 AM Helmut Grohne  wrote:
> On Sun, Nov 05, 2023 at 02:19:18PM +0100, László Böszörményi (GCS) wrote:
> >  Yes, it makes upstreams more easily staying with the FUSE 2 API.
> > Making the switch to the FUSE 3 API more difficult. But OK, let it go.
> > I'm preparing the upload.
>
> Thank you.
 Just for the record, the change broke self-testing of gphotofs big on
all architectures. It fails with:
autopkgtest: test command1: [ "$(./gphotofs 2>&1)" == 'fuse: missing
mountpoint parameter' ]
165s command1 FAIL non-zero exit status 1

Will try to check and fix it.

Regards,
Laszlo/GCS



Bug#1055456: pyutilib: port to Pyro5

2023-11-06 Thread GCS
Source: pyutilib
Version: 6.0.0-1
Severity: important
Tags: trixie
Usertags: pyro4-rm
Control: affects -1 + src:pyro4

Hi,

The development of Pyro4 has ended [1]. As I see, your upstream is
also dead. Please port the source to Pyro5 [2], already packaged for
Debian.
If you don't have the skills for the port, at least remove your
'recommends' on Pyro4 - as I understand your package will still have
functionality.

Regards,
Laszlo/GCS
[1] 
https://github.com/irmen/Pyro4/commit/8ec0db055d76ae1512239710b1e30883ee6bd74b
[2] https://pyro5.readthedocs.io/en/latest/



Bug#1055457: pyxrd: port to Pyro5

2023-11-06 Thread GCS
Source: pyxrd
Version: 0.8.4-3
Severity: important
Tags: trixie
Usertags: pyro4-rm
Control: affects -1 + src:pyro4

Hi,

The development of Pyro4 has ended [1]. As I see, your upstream is
also dead. Please port the source to Pyro5 [2], already packaged for
Debian.
Otherwise as Pyro4 can break anytime with newer Python versions, you
risk your package being removed from the archives.

Regards,
Laszlo/GCS
[1] 
https://github.com/irmen/Pyro4/commit/8ec0db055d76ae1512239710b1e30883ee6bd74b
[2] https://pyro5.readthedocs.io/en/latest/



Bug#1042648: pyro4: FTBFS with Sphinx 7.1, docutils 0.20: rm: cannot remove '/<>/debian/pyro4-doc/usr/share/doc/pyro4-doc//html/_static/underscore.js': No such file or directory

2023-11-06 Thread GCS
Hi Thomas,

On Mon, Nov 6, 2023 at 2:27 PM Thomas Goirand  wrote:
> FYI, simply removing from d/rules:
[...]
> fixes the build. Can this be done and uploaded ASAP please? Or
> alternatively, is this OK for an NMU?
 I'm going to fix this right now. On the other hand, why is it so
important for you? Pyro4 is dead for a while. Last update was for
Python 3.10 (the archive has the default of 3.11). See upstream note
that development halted, repository is archived [1].

Regards,
Laszlo/GCS
[1] 
https://github.com/irmen/Pyro4/commit/8ec0db055d76ae1512239710b1e30883ee6bd74b



Bug#1055222: fuse: backport unprivileged usage via /dev/fd/N to support usage in namespaces

2023-11-05 Thread GCS
Hi Helmut,

On Thu, Nov 2, 2023 at 12:15 PM Helmut Grohne  wrote:
> I have a slightly unusual request. I know libfuse 2.x is a legacy in
> maintenance mode slated for removal eventually. Unfortunately, 2/3 of
> fuse users still use the 2.x branch so it seems like we will have to
> support it a bit longer than expected.
 I think distributions should do the opposite, somehow enforce
projects to migrate to the new, supported FUSE version. Basically it
is deprecated since 2018 and as 2024 is approaching it means for six
years.

> Unfortunately, this currently requires fuse >= 3.3 and e.g. fuse2fs from
> e2fsprogs still uses fuse 2.x. Last time Ted Ts'o was inquired about
> porting to 3.x, he was unenthusiastic and when I spent a look, it is
> quite non-trivial as the API changed a lot. It's not just fuse2fs that
> is affected but still 2/3 of drivers.
[...]
> So I think we should backport this into fuse 2.x. This is not to say
> that we should stop porting drivers to the 3.x API. It also slightly
> improves compatibility between 2.x and 3.x, so that seems like a sane
> trade-off to me. Do you agree?
 Yes, it makes upstreams more easily staying with the FUSE 2 API.
Making the switch to the FUSE 3 API more difficult. But OK, let it go.
I'm preparing the upload.

Regards,
Laszlo/GCS



Bug#1054806: git-cola: FTBFS: sed: can't read /<>/debian/git-cola/usr/lib/python3*/site-packages/cola/widgets/spellcheck.py: No such file or directory

2023-10-28 Thread GCS
Hi David,

On Sat, Oct 28, 2023 at 6:39 AM David Aguilar  wrote:
> This step in the build log looks suspicious:
>
> sed -i 's|env python|env python3|' \
>
> /<>/debian/git-cola/usr/lib/python3*/site-packages/cola/widgets/spellcheck.py
 Yes, this is the culprit and already fixed locally.

> Another note is that 3.12.0 is a very old version. Newer versions have
> the python3 shebangs. That's probably related.
 Then newer versions also have a new dependency that is not (yet)
packaged for Debian. I don't have time for that as if I remember
correctly it is something uncommon. I think I will let git-cola go.

Regards,
Laszlo/GCS



Bug#1054170: graphviz: dot generates unreproducible pdfs with embedded timestamps

2023-10-24 Thread GCS
Hi Daniel,

On Wed, Oct 18, 2023 at 10:09 PM Daniel Gröber  wrote:
> Seems -Tpdf doesn't work for with 9.0 some reason, is a configure option
> for that missing perhaps?:
 You need to install the libgvplugin-pango as well. Please do it and
test your case again. But my own testing shows CreationDate is still
embedded in PDF files generated by graphviz.

Cheers,
Laszlo/GCS



Bug#1054170: graphviz: dot generates unreproducible pdfs with embedded timestamps

2023-10-18 Thread GCS
Hi Daniel,

On Wed, Oct 18, 2023 at 5:45 PM Daniel Gröber  wrote:
> dot appears to embed CreationDate in the pdf and this cannot be
> controlled with SOURCE_DATE_EPOCH.
Can you please test it with the Graphviz version 9.0 in experimental?
I don't expect it to be different, but I would like to be sure.

Thanks,
Laszlo/GCS



Bug#1053663: libraft2: Consider switching upstream to cowsql/raft

2023-10-14 Thread GCS
Hi Free,

On Sat, Oct 14, 2023 at 11:30 AM Free Ekanayaka  wrote:
> Am I missing something? If there's consenus about this, I'd finalize the
> changelog and start uploading raft-0.17.7-1.
 Looks OK to me.
Just a question if you tested building of raft with pbuilder. I've
packaged your raft version 0.17.6 locally and it still hangs with the
last output of 'PASS: test/unit/uv' when tried building with pbuilder.

Cheers,
Laszlo/GCS



Bug#1053692: [graphicsmagick:discussion] Re: Any plans to add HEIC format?

2023-10-08 Thread GCS
Control: forwarded -1 https://github.com/strukturag/libheif/issues/974

Hi,

On Sun, Oct 8, 2023 at 10:09 PM Dan Jacobson  wrote:
> Hello. The viewnior and gpicview packages support heic, so should gm.
> On 2023-10-08 08:08, Bob Friesenhahn wrote:
> > On Sat, 7 Oct 2023, Dan Jacobson wrote:
> >> $ gm convert -list formats |fgrep -i heif
> >> AVIF P  r--  HEIF Image Format (heif v16.2.0)
> >> HEIC P  r--  HEIF Image Format (heif v16.2.0)
> >> HEIF P  r--  HEIF Image Format (heif v16.2.0)
> >> $ gm convert -debug coder,exception C001.heic info:-
> >> 18:35:16 0:0.002526  0.000u 3249 constitute.c/ReadImage/1676/Coder:
> >>  Invoking "HEIC" decoder (HEIF Image Format) subimage=0 subrange=0
> >> 18:35:16 0:0.010894  0.010u 3249 heif.c/ReadHEIFImage/571/Coder:
> >>  Geometry: 1280x720
> >> 18:35:16 0:0.011036  0.010u 3249 heif.c/ReadHEIFImage/573/Coder:
> >>  Matte: False
> >> 18:35:16 0:0.011135  0.010u 3249 heif.c/ReadHEIFImage/650/Coder:
> >>  heif_decode_image() reports error "Unsupported feature: Unsupported
> >> codec"
> >
> > From the above, I deduce that libheif from Debian Sid does not support
> > HEIC, or a sub-feature of HEIC.  It is possible that Debian Sid
> > binaries do not include support for HEIC at all.
 It's up to the new HEIF library which broke other packages including
GM, GIMP, etc. See the relevant bug report in Debian [1]. Its upstream
stated to solve this, but it seems not the case [2]. That's why GM and
others can't use the mentioned display formats.

Regards,
Laszlo/GCS
[1] https://bugs.debian.org/1041242
[2] https://github.com/strukturag/libheif/issues/974



Bug#1053663: libraft2: Consider switching upstream to cowsql/raft

2023-10-08 Thread GCS
Hi Free,

On Sun, Oct 8, 2023 at 12:09 PM Free Ekanayaka  wrote:
> The canonical/dqlite and canonical/raft projects on GitHub have also
> been forked into cowsql/cowsql and cowsql/raft respectively:
[...]
> I'm the original upstream author of dqlite and its C raft library, and
> after having left Canonical I tried for quite some time to collaborate
> with them on dqlite, but I always felt there was not much interest in
> having it be a real "community" project, so after LXD was forked I
> decided to fork dqlite too.
 Bit strange, I heard good things about Canonical and I respect their work.
OK, currently I can't build 'raft' on Debian, a bug is reported [1]
and upstream working on it. Fedora has a patch, which I haven't tried
yet.

> While I could not keep the name "dqlite" (which is a trademark of
> Canonical), the name "raft" is just the name of an algorithm, so it I
> haven't changed it.
>
> I'm also a Debian Developer, and I'd like to propose to switch the
> upstream of the libraft package from canonical/raft to cowsql/raft,
> instead of having to upload a separate package with a different name or
> alternatively vendoring cowsql/raft into cowsql/cowsql.
 I would be happier if you two can join forces - software development
is a long task, you need to take care of it for years to come.
I'm open to switching to cowsql/raft as you are the original upstream
author. Hope you will find long term contributors to the project.

> The cowsql/raft library is compatible with canonical/raft so there would
> be no disruption for users and for reverse dependencies. I don't expect
> this compatibilty to be an issue for the forseeble future (e.g. during
> the Trixie cycle).
 That's a good promise, I say let's go with it then.

> I'd also like to help with maintainership of both src:dqlite and the
> re-upstreamed src:raft in Debian, making sure that things work as
> expected.
 This is also accepted, you can open a project on Salsa and either
start a project group or just make yourself the maintainer and me as
an uploader. But the former might be better as I think Mathias might
like to join.

Cheers,
Laszlo/GCS



Bug#1053608: bullseye-pu: zeromq3/4.3.4-1+deb11u1

2023-10-07 Thread GCS
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: sdu...@centreon.com
Control: affects -1 + src:zeromq3

Hi RMs,

[ Reason ]
I got a bug report that fork() is not detected correctly for zeromq3
when GCC 7 or 8 is used [1].

[ Impact ]
For some workflows it causes an assertion which was reported upstream
[2] and fixed [3].
The fix is applied and a package update is prepared, debdiff is
attached to this email.

[ Tests ]
Upstream testsuite still works. The build log now contains the
positive changelog message that fork() is now detected correctly.

[ Risks ]
Very little as the change is not a source change but a configure check
fix. With newer GCC versions (ie Bookworm and later) the configure
check works and fork() is used as expected.

[ Checklist ]
  [x] *all* changes are documents in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in bullseye
  [x] the issue is verified as fixed in unstable

Thanks for considering,
Laszlo/GCS
[1] https://bugs.debian.org/1053448
[2] https://github.com/zeromq/libzmq/issues/3313
[3] 
https://github.com/zeromq/libzmq/commit/5a9c174dab9f8f7cd675360db2af302cb48d961a
diff -Nru zeromq3-4.3.4/debian/changelog zeromq3-4.3.4/debian/changelog
--- zeromq3-4.3.4/debian/changelog	2021-02-03 08:46:36.0 +0100
+++ zeromq3-4.3.4/debian/changelog	2023-10-07 11:22:30.0 +0200
@@ -1,3 +1,9 @@
+zeromq3 (4.3.4-1+deb11u1) bullseye; urgency=medium
+
+  * Apply fix for fork() detection on GCC 7 (closes: #1053448).
+
+ -- Laszlo Boszormenyi (GCS)   Sat, 07 Oct 2023 11:22:30 +0200
+
 zeromq3 (4.3.4-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru zeromq3-4.3.4/debian/patches/fix_fork_detection_with_gcc_7.patch zeromq3-4.3.4/debian/patches/fix_fork_detection_with_gcc_7.patch
--- zeromq3-4.3.4/debian/patches/fix_fork_detection_with_gcc_7.patch	1970-01-01 01:00:00.0 +0100
+++ zeromq3-4.3.4/debian/patches/fix_fork_detection_with_gcc_7.patch	2023-10-07 11:22:30.0 +0200
@@ -0,0 +1,85 @@
+From 240e36af4e0300a529c99b0a05c4bf391bbcd6f5 Mon Sep 17 00:00:00 2001
+From: David Gloe 
+Date: Tue, 23 Nov 2021 15:39:42 +
+Subject: [PATCH 1/2] Problem: Fix fork detection on gcc 7
+
+Solution: When compiling with gcc 7 and newer, the program produced by
+AC_CHECK_FUNCS(fork) produces a warning, which results in configure
+incorrectly disabling fork support. Fix the issue by using an
+AC_COMPILE_IFELSE which correctly detects fork availability.
+Tested by running configure and make check on a system with gcc 7
+installed, and verifying that HAVE_FORK was defined correctly.
+
+See issue #3313.
+---
+ configure.ac | 19 ---
+ 1 file changed, 16 insertions(+), 3 deletions(-)
+
+diff --git a/configure.ac b/configure.ac
+index 227e37b488..1a571291eb 100644
+--- a/configure.ac
 b/configure.ac
+@@ -771,9 +771,24 @@ AC_LANG_POP([C++])
+ 
+ # Checks for library functions.
+ AC_TYPE_SIGNAL
+-AC_CHECK_FUNCS(perror gettimeofday clock_gettime memset socket getifaddrs freeifaddrs fork mkdtemp accept4)
++AC_CHECK_FUNCS(perror gettimeofday clock_gettime memset socket getifaddrs freeifaddrs mkdtemp accept4)
+ AC_CHECK_HEADERS([alloca.h])
+ 
++# AC_CHECK_FUNCS(fork) fails on gcc 7
++AC_MSG_CHECKING([whether fork is available])
++AC_COMPILE_IFELSE(
++	[AC_LANG_PROGRAM(
++		[[#include ]],
++		[[return fork();]])
++	],[
++		AC_MSG_RESULT([yes])
++		AC_DEFINE(HAVE_FORK, [1], [fork is available])
++		AM_CONDITIONAL(HAVE_FORK, true)
++	],[
++		AC_MSG_RESULT([no])
++		AM_CONDITIONAL(HAVE_FORK, false)
++])
++
+ # string.h doesn't seem to be included by default in Fedora 30
+ AC_MSG_CHECKING([whether strnlen is available])
+ AC_COMPILE_IFELSE(
+@@ -971,8 +986,6 @@ LIBZMQ_CHECK_GETRANDOM([
+ [Whether getrandom is supported.])
+ ])
+ 
+-AM_CONDITIONAL(HAVE_FORK, test "x$ac_cv_func_fork" = "xyes")
+-
+ if test "x$cross_compiling" = "xyes"; then
+ #   Enable draft by default when cross-compiling
+ defaultval=yes
+
+From 72b5359049664458e117f2609d174dc5213fc19b Mon Sep 17 00:00:00 2001
+From: David Gloe 
+Date: Tue, 23 Nov 2021 16:27:52 +
+Subject: [PATCH 2/2] Problem: Missing relicense statement for dgloe-hpe
+
+Solution: Add new author to the existing HPE relicense statement.
+---
+ RELICENSE/hewlett_packard_enterprise.md | 6 --
+ 1 file changed, 4 insertions(+), 2 deletions(-)
+
+diff --git a/RELICENSE/hewlett_packard_enterprise.md b/RELICENSE/hewlett_packard_enterprise.md
+index 9a0741984d..067ce39cbc 100644
+--- a/RELICENSE/hewlett_packard_enterprise.md
 b/RELICENSE/hewlett_packard_enterprise.md
+@@ -5,9 +5,11 @@ that grants permission to relicense its copyrights in the libzmq C++
+ library (ZeroMQ) under the Mozilla Public License v2 (MPLv2).
+ 
+ A portion of the commits made by the Github handle "brc859844", with
+-commit author "Brett Cameron &

Bug#1052026: transition: thrift

2023-09-16 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 + src:thrift

Hi RMs,

Small transition to 0.19.0 release of thrift. The only reverse
dependency is gnuradio which builds fine with the new thrift release.
There are two things to consider. First is that gnuradio is also
involved in the fmtlib, qwt and boost1.81 transitions as well. Then it
is scheduled to be removed from testing on 14th of October due to
depending on bladerf which has an open RC bug [1].with a patch since
the end of August.

Thanks for considering,
Laszlo/GCS
[1] https://bugs.debian.org/1050943



Bug#1050676: enblend-enfuse: FTBFS: dot: maze.c:311: chkSgraph: Assertion `np->cells[0]' failed.

2023-09-14 Thread GCS
Hi Andreas,

On Sun, Sep 10, 2023 at 9:21 PM Andreas Metzler  wrote:
> I tried to do a test build of enblend against graphviz 8.1.0 from
> experimental. I had no luck, since dot seems to be built without support
> for png output:
 Please try graphviz 9.0.0 from experimental.

> /usr/bin/m4 --fatal-warnings --prefix-builtins --synclines 
> --define='dot_output_type=png' ../../doc/uml-dot.m4 
> ../../doc/external-mask-workflow.dot | \
> /usr/bin/dot  -Tpng -Gbgcolor=transparent -Gresolution=600 | \
> /usr/bin/convert png:- -transparent white -resize $(( ((96 * 
> 1000) / 600) / 10 ))% external-mask-workflow.png
> Format: "png" not recognized. Use one of: canon cmap cmapx cmapx_np dot 
> dot_json eps fig gv imap imap_np ismap json json0 mp pic plain plain-ext pov 
> ps ps2 svg svgz tk xdot xdot1.2 xdot1.4 xdot_json
> convert: improper image header 
> `/dev/shm/magick-u_9y0p39jcrUpQwvjHcDxiLBtxK8jlEu' @ 
> error/png.c/ReadPNGImage/4107.
 There's still a font issue, you will get something like:
fontconfig: Didn't find expected font family. Perhaps URW Type 1 fonts
need installing?

I don't know why this is happening, as if I check the intermediate dot
file then only the node font settings cause this error. Other uses of
the Helvetica font are fine. As per source change, you will need this
patch for enblend-enfuse.
Please check if the resulting package works as you expected or not and
report back your findings.

Regards,
Laszlo/GCS
Description: use Times font instead of Helvetica for testing
 For testing the font Helvetica used. This is fine, but for some reason
 recently fontconfig can't find it as URW Type 1 font for dot nodes. For
 other uses, Helvetica font is found by the way.
Author: Laszlo Boszormenyi (GCS) 
Forwarded: no
Last-Update: 2023-09-15

---

--- enblend-enfuse-4.2.orig/doc/uml-dot.m4
+++ enblend-enfuse-4.2/doc/uml-dot.m4
@@ -10,7 +10,7 @@ m4_dnl  (`uml_'), we treat only `Activit
 m4_dnl  need more for the Enblend/Enfuse documentation.
 
 
-m4_define(`uml_font', `Helvetica')
+m4_define(`uml_font', `Times')
 
 
 m4_dnl  Graph Attributes


Bug#1051515: raft: New version available

2023-09-14 Thread GCS
On Mon, Sep 11, 2023 at 6:40 PM Mathias Gibbens  wrote:
>   I spent some time looking at this over the weekend, and apparently
> there's some issue(s) running the integration/uv tests within a
> continer(-ish) environment.
 While I may copy your report to an upstream bugreport, it's not my
work. Would you please file an upstream issue yourself? I hope it will
be an easy fix for them and raft can be updated soon in Debian.

Thanks,
Laszlo/GCS



Bug#1050676: enblend-enfuse: FTBFS: dot: maze.c:311: chkSgraph: Assertion `np->cells[0]' failed.

2023-09-10 Thread GCS
Hi,

On Sun, Sep 10, 2023 at 9:21 PM Andreas Metzler  wrote:
> I tried to do a test build of enblend against graphviz 8.1.0 from
> experimental. I had no luck, since dot seems to be built without support
> for png output:
 It is/was due to another issue which is just fixed. But it is still a
work in progress, not fully ready for user consumption.
enblend-enfuse will still not build. Please give me some time to clear
all graphviz issues.

Regards,
Laszlo/GCS



Bug#1051515: raft: New version available

2023-09-08 Thread GCS
Hi Mathias,

On Sat, Sep 9, 2023 at 3:45 AM Mathias Gibbens  wrote:
>   A new version of raft is available -- when able, could you please
> upload the latest version to sid?
 Well, my constant problem is that I can't run its tests and can't
find out the reason.
If I build in a chroot then I get:
Error: test/unit/test_uv_fs.c:320: assertion failed: rv_ == RAFT_IOERR (0 == 18)

If I build it with pbuilder, then the last line I get is:
PASS: test/unit/core
but the build / testing never (at least not in a hour) finished (tried
on two different machines).

>   Also, if you'd like I would be happy to help co-maintain this package
> as an uploader, since it's a dependency of lxd.
 If you have time, please check the proposed package [1]. You may have
more insights on what's the problem.

Regards,
Laszlo/GCS
[1] dget -x https://people.debian.org/~gcs/raft_0.17.1-1.dsc



Bug#1034668: Please update to new upstream release 3.22.3 in experimental

2023-09-08 Thread GCS
On Thu, Sep 7, 2023 at 7:24 PM Benjamin Barenblat  wrote:
> I will do an upload of 20230802.0 to experimental today, but I don’t
> think it fixes this issue. scoped_mock_log depends on symbols in
> GoogleMock, but there’s no good way to express those dependencies in a
> hypothetical libabsl_scoped_mock_log.so since libgmock.so doesn’t exist.
 Thanks for the upload and the information. I'm going to check it soon.

> The way upstream (Google) intends for all this to work is for protobuf
> to link its Abseil and GoogleMock dependencies statically. Is that
> possible?
 It is possible, but not recommended. If abseil gets (security) fixes,
protobuf will not get it like in the case of loading fresh shared
libraries.
Also it seems protobuf configure process looks for shared version of
abseil. Need to double check.

> If not, I have some alternative ideas (like building a
> libabsl_scoped_mock_log.so without a DT_NEEDED entry for GoogleMock),
> but they all seem like hacks. I’m also open to other ideas if anybody
> has them.
 I'm not sure how to handle this properly for everyone. I think I will
solve this on the protobuf side. Use static linking with abseil and
record with the build process which version was used. The hard way
would be to bundle an abseil source tarball with protobuf and use its
shared version of libraries from a private location only for protobuf.
The first should get precedence for which abseil should export static
linking possibilities of scoped_mock_log in its cmake files.

Regards,
Laszlo/GCS



Bug#1012864: graphviz: new upstream version 7.0.0 is available

2023-09-08 Thread GCS
Control: severity 1012864 normal
Control: merge 1012864 1051351

Hi,

On Wed, Aug 9, 2023 at 12:55 AM László Böszörményi (GCS)  
wrote:
> On Tue, Aug 8, 2023 at 6:30 PM Benjamin Redelings
>  wrote:
> > Perhaps an upload to experimental could be done?  Then people could use 
> > that while you are getting advice from upstream on packaging 8.1.
>  Indeed, that's the plan. I need some days for further testing.
 This will happen in minutes. Please note it needs manual acceptance
from the FTP Masters which may take a while.

Regards,
Laszlo/GCS



Bug#1051351: graphviz: Please package a new upstream version

2023-09-07 Thread GCS
Hi Eugene,

On Wed, Sep 6, 2023 at 8:36 PM Eugene Toder  wrote:
> It appears that the upstream version of graphviz was last updated in
> September 2019, i.e. almost 4 years ago. Several new versions were
> released since then with many bug fixes. Please package a new version.
 I've already received several reports of this. As noted in these,
I've the newest package version v8.1.0 ready [1]. As it's a big
upstream release and I've split the original; packages to several
others it needs testing. Some of it is already done, but I look
forward your findings if any.
In short, I think I should upload it to experimental to make it more
visible for you, end users.

Regards,
Laszlo/GCS
[1] dget -x https://people.debian.org/~gcs/graphviz_8.1.0-1.dsc



Bug#1034668: Please update to new upstream release 3.22.3 in experimental

2023-09-06 Thread GCS
Hi Nilesh, Benjamin,

On Sat, Jul 22, 2023 at 5:06 AM Nilesh Patra  wrote:
> On Thu, 27 Apr 2023 19:59:38 +0530 Pirate Praveen  
> wrote:
> >  Target "tests" links to:
> >
> >absl::scoped_mock_log
> >
> >  but the target was not found. Possible reasons include:
 The reason is that it and protobuf 3.24.2 need abseil 20230125.0 or
newer. While it is available in experimental, it doesn't export
scoped_mock_log targets for cmake. Hence it is not found, I don't know
if newer versions like 20230802.0 fix this issue or not. Can you
comment on this Benjamin and if you are going to package it soon
and/or accept someone as a co-maintainer for abseil? It seems abseil
20230802.0 became available and should be packaged.

> Now, the release of abseil in experimental seems to be doing that, but
> only for the static library and not the shared library, because it needs
> googltest for the same, and googletest does not vendor any shared
> library because the SO lib is not maintained properly upstream[2] [...]
[...]
> This was straightforward was to add "-Dprotobuf_BUILD_TESTS=OFF" to
> configure options.
 Building without tests are always a bad idea.

> PS: Sponsor me a party/dinner when?
 If you are at DebConf, we may talk and eat together.

Regards,
Laszlo/GCS



Bug#1051380: transition: rocksdb

2023-09-06 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 + src:rocksdb

Hi RMs,

Small transition of rocksdb as only two packages are affected: balboa
and sortmerna. Both build fine with the 8.5.3 version of rocksdb
already in experimental.
Only thing to mention is that the testing version of sortmerna doesn't
build with the new rocksdb version - but as I know it doesn't cause
any issue as binNMUs happen in unstable.

Thanks for considering,
Laszlo/GCS



Bug#1051325: sortmerna: FTBFS: concurrentqueue.h: No such file or directory

2023-09-06 Thread GCS
Source: sortmerna
Version: 4.3.6-2
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs

Hi,

During a rebuild of your package for RocksDB transition your package
fails to build on amd64. Relevant lines:
In file included from
/build/sortmerna-4.3.6/src/sortmerna/paralleltraversal.cpp:57:
/build/sortmerna-4.3.6/include/readsqueue.hpp:49:12: fatal error:
concurrentqueue/concurrentqueue.h: No such file or directory
   49 | #  include 
  |^~~
compilation terminated.
make[3]: *** [src/sortmerna/CMakeFiles/smr_objs.dir/build.make:233:
src/sortmerna/CMakeFiles/smr_objs.dir/paralleltraversal.cpp.o] Error 1
make[3]: *** Waiting for unfinished jobs
In file included from /build/sortmerna-4.3.6/src/sortmerna/output.cpp:49:
/build/sortmerna-4.3.6/include/readsqueue.hpp:49:12: fatal error:
concurrentqueue/concurrentqueue.h: No such file or directory
   49 | #  include 
  |^~~
compilation terminated.
make[3]: *** [src/sortmerna/CMakeFiles/smr_objs.dir/build.make:205:
src/sortmerna/CMakeFiles/smr_objs.dir/output.cpp.o] Error 1
In file included from /build/sortmerna-4.3.6/src/sortmerna/kseq_load.cpp:39:
/build/sortmerna-4.3.6/include/kseq_load.hpp:63:12: error: 'uint64_t'
has not been declared
   63 |uint64_t number_total_read,
  |^~~~
/build/sortmerna-4.3.6/src/sortmerna/kseq_load.cpp:53:12: error:
'uint64_t' has not been declared
   53 |uint64_t number_total_read,
  |^~~~

It seems the mentioned header moved to
/usr/include/concurrentqueue/moodycamel/concurrentqueue.h ; please
update your package.

Regards,
Laszlo/GCS



Bug#1050937: protobuf: FTBFS: ModuleNotFoundError: No module named 'tzdata'

2023-09-03 Thread GCS
Hi,

On Sat, Sep 2, 2023 at 10:33 AM Gianfranco Costamagna
 wrote:
> Hello, probably tzdata split in legacy made this package FTBFS.
 Seems to be the case.

> Solutions are:
> 1) fix the test to work with main tzdata
 It's Python 3.11 itself which can't handle tzdata related things. It
has a proposed patch applied for the Debian package [1] but seems not
fully tested / complete.

> 2) add dependency on tzdata-legacy package
 No, it's Python which tries to import a module that doesn't exist.
Static data has nothing to do with it. Will test with the mentioned
patch removed Python package version.

Regards,
Laszlo/GCS
[1] 
https://tracker.debian.org/news/1458326/accepted-python311-3115-3-source-into-unstable/



Bug#1050636: graphviz: Update to lua5.3

2023-08-27 Thread GCS
Control: tags -1 +pending

On Sun, Aug 27, 2023 at 1:09 PM Bastian Germann  wrote:
> Please update your package to build with lua5.3 so we can drop v5.2 from the 
> archive.
> The build system supports lua5.3 as well.
 I can build it with Lua 5.4 even, any reason not to use that?

Regards,
Laszlo/GCS



Bug#1050195: libwebsockets: Unfortunately the change from #977637 has been lost

2023-08-23 Thread GCS
Hi Joachim,

On Mon, Aug 21, 2023 at 9:03 PM Joachim Zobel  wrote:
> Unfortunately the change that sets LWS_WITH_EXTERNAL_POLL to ON has been lost
> together with the changelog entry for 4.0.20-2.
 Indeed, it's not enabled anymore. It's still don't recommended by its
developers, the option itself states:
option(LWS_WITH_EXTERNAL_POLL "Support external POLL integration using
callback messages (not recommended)" OFF)

I'm going to re-enable it, but you should refactor your code in the
long run not to depend on it.

Regards,
Laszlo/GCS



Bug#1049383: google-perftools: please don't ship pprof from gperftools anymore

2023-08-15 Thread GCS
Hi Aliaksei,

On Tue, Aug 15, 2023 at 4:33 AM Aliaksei Kandratsenka
 wrote:
> please, note, that gperftools has old and unmaintained perl version of
> pprof tool. We intend to drop it entirely in couple releases. Please
> consider packaging much much improved version written in Go from
> https://github.com/google/pprof
 Thanks for the heads-up. To help my work, please tag releases of the
Go pprof tool for:
- let me know how mature it is,
- which commits are considered stable enough to package and distribute.

Thanks,
Laszlo/GCS



Bug#1043506: libvips-tools: vipsthumbnail makes black thumbnails or says "Unsupported codec"

2023-08-13 Thread GCS
Control: tags -1 +confirmed
Control: reassign -1 libheif

On Sat, Aug 12, 2023 at 9:12 AM Michael Moore  wrote:
> vipsthumbnail was working for me at least until the Bookworm release, it now 
> generates solid black thumbnails or an empty file. I don't know exactly when 
> it stopped working.
>
> The commands below are failing for all HEIC files I have tested with, 
> including files which I had previously generated thumbnails for, using 
> vipsthumbnail.
>
> You can get a sample image here: http://stuporglue.org/downloads/pie.HEIC
 Tested the following scenarios.
1) Backport vips from Sid to Bookworm and it still produced a good thumbnail.
2) Downgraded libheif in Sid to its Bookworm version and vips still
produced a good thumbnail.

Please note that libheif went from 1.15.1 to 1.16.2 and it was
modularized. But even if I install all libheif1-plugin-* packages,
vipsthumbnail can't get the image data from libheif. Seems it is
already reported [1] or might be a bit different. Anyway, it seems
libheif was not loading plugins in all cases. This is fixed in its
upstream [2] and hopefully will be integrated into its packaging soon.

Regards,
Laszlo/GCS
[1] https://bugs.debian.org/1041242
[2] https://github.com/strukturag/libheif/issues/914



Bug#1042025: thrift: FTBFS: dh_auto_test: error: make -j1 check "TESTSUITEFLAGS=-j1 --verbose" VERBOSE=1 returned exit code 2

2023-08-09 Thread GCS
Control: forwarded -1 https://issues.apache.org/jira/browse/THRIFT-5680

Hi Christoph,

On Wed, Aug 9, 2023 at 8:27 PM Christoph Berg  wrote:
> > > (./testapplicationexception:892843): GLib-CRITICAL **: 07:16:59.134: Did 
> > > not see expected message GLib-GObject-WARNING **: value*out of range*type*
> > > not ok /testapplicationexception/Properties/test - 
> > > GLib-GObject-FATAL-CRITICAL: value "-1" of type 'gint' is invalid or out 
> > > of range for property 'type' of type 'gint'
> > > Bail out!
[...]
> Fwiw, there is a new 0.18.1 upstream version. Perhaps that works
> better.
 It is already packaged for experimental and has the same build
problem. Upstream knows this bug [1], assigned major priority to it
but has not touched the issue since february.

Regards,
Laszlo/GCS
[1] https://issues.apache.org/jira/browse/THRIFT-5680



Bug#1012864: graphviz: new upstream version 7.0.0 is available

2023-08-08 Thread GCS
Hi,

On Tue, Aug 8, 2023 at 6:30 PM Benjamin Redelings
 wrote:
> I tried running the following command, and it looks like there's an issue 
> where libtool has just recently removed a "Provides: libltdl7-dev" from 
> libtldl-dev.
[...]
> I was able to get around this problem by downgrading libltdl-dev and libltdl7 
> from 2.4.7-7 to 2.4.7-5, but then I got some errors about usr/bin/smyrna 
> being missing.
 These are addressed in the upcoming 8.1.0 [1] update. Please note
it's not yet finished, still addresses the above, contains upstream
recommendations and a huge package split.

> Perhaps an upload to experimental could be done?  Then people could use that 
> while you are getting advice from upstream on packaging 8.1.
 Indeed, that's the plan. I need some days for further testing.

Regards,
Laszlo/GCS
[1] dget -x https://people.debian.org/~gcs/graphviz_8.1.0-1.dsc



Bug#1012864: graphviz: new upstream version 7.0.0 is available

2023-08-07 Thread GCS
Hi,

On Mon, Aug 7, 2023 at 4:39 PM Bo YU  wrote:
> I'm currently experiencing a demand from Debian users who
> would like to upgrade this package. Really the upstream become very
> active. Do you have plan to upgrade the package recently?
 I've already updated the package to 8.0.5 [1] to be exact. Going to
further update it to 8.1.0 and accept upstream development advice.
At this point I'm not looking for co-maintainers.

Regards,
Laszlo/GCS
[1] dget -x https://people.debian.org/~gcs/graphviz_8.0.5-1.dsc



Bug#1041776: transition: libwebsockets

2023-07-23 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 + src:libwebsockets

Hi RMs,

This transition missed Bookworm, but now I would like to start it. All
reverse dependencies are built correctly on amd64. I'm going to test
i386 as well, but I do not expect any failure.

Thanks for considering,
Laszlo/GCS



Bug#1041511: ntfs-3g: Undocumented dependency on libbrotli-dev

2023-07-22 Thread GCS
Control: tags -1 +unreproducible +wontfix
Control: severity -1 normal

On Thu, Jul 20, 2023 at 3:57 AM Theodoric Stier  wrote:
> Source: ntfs-3g
> Severity: serious
> Tags: ftbfs
> Justification: fails to build from source (but built successfully in the past)
[...]
> This package build fails during the configure step if libbrotli-dev is not 
> installed.
> It appears to be missing from BuildDep.
 It has nothing to do with ntfs-3g. I see three things:
1) You are changing the package to be non-official:
-- cut --
dpkg-buildpackage: info: source package ntfs-3g
dpkg-buildpackage: info: source version 1:2022.10.3-2
dpkg-buildpackage: info: source distribution unstable
dpkg-buildpackage: info: source changed by Theodoric Stier 
-- cut --

2) The package does not need and doesn't check for brotli. Your build
log clearly show this:
-- cut --
configure:14736: checking for gnutls >= 1.4.
configure:14743: $PKG_CONFIG --exists --print-errors "gnutls >= 1.4.4"
Package libbrotlienc was not found in the pkg-config search path.
Perhaps you should add the directory containing `libbrotlienc.pc'
to the PKG_CONFIG_PATH environment variable
Package 'libbrotlienc', required by 'gnutls', not found
Package 'libbrotlidec', required by 'gnutls', not found
Package 'libzstd', required by 'gnutls', not found
configure:14746: $? = 1
configure:14760: $PKG_CONFIG --exists --print-errors "gnutls >= 1.4.4"
Package libbrotlienc was not found in the pkg-config search path.
Perhaps you should add the directory containing `libbrotlienc.pc'
to the PKG_CONFIG_PATH environment variable
Package 'libbrotlienc', required by 'gnutls', not found
Package 'libbrotlidec', required by 'gnutls', not found
-- cut --

It is gnutls which needs brotli, not ntfs-3g.

3) Official gnutls28 packages don't build with brotli so it seems you
have an unofficial one or you tampered with that as well.

Regards,
Laszlo/GCS



Bug#1040945: tiff: CVE-2023-3618

2023-07-17 Thread GCS
Hi Salvatore,

On Thu, Jul 13, 2023 at 8:42 PM Salvatore Bonaccorso  wrote:
> On Wed, Jul 12, 2023 at 10:12:50PM +0200, László Böszörményi wrote:
> > In short, it seems:
> > - it's a non-dsa as only a crash in a CLI tool (which has end of life now),
> > - doesn't affect the library,
> > - while 4.5.0-6 (and in fact, at least from 4.5.0-1) is vulnerable,
> > 4.5.1-1 fixed this issue.
> >
> > But you may find it otherwise, I do not alter this report in the BTS.
[...]
> For about having the issue fixed: The problem I have is that upstream
> has not yet closed the issue. Is it completely fixed and what is the
> fixing commit? https://gitlab.com/libtiff/libtiff/-/issues/529 is
> slight unhelpful on that front.
 Reason is simple. Upstream was fixing issues and probably was doing
as they wanted. That is, there's another SIGSEGV issue [1] and it's in
tiffcrop as well. Upstream fixed it and was going on with other fixes.
Then maybe they couldn't reproduce the mentioned CVE issue and went on
releasing v4.5.1 with several other CVE fixes [2]. There Timothy
Lyanguzov commented that bug#529 probably will get a CVE id too, but
he couldn't reproduce it with that Git HEAD.
Answer is simple, the other SIGSEGV issue [1] fix solved this issue as
well. As upstream probably didn't recognize and couldn't reproduce
this SIGSEGV (anymore), it remained open.

> Are you able to identify the fixing commit confirming it is done in
> 4.5.1-1?
 Indeed, it is fixed for 4.5.1 and the fixing commit is
b5c7d4c4e0ac16b5cfb11acaaeaa493334f8 [3].

Hope this clear things up,
Laszlo/GCS
[1] https://gitlab.com/libtiff/libtiff/-/issues/553
[2] https://gitlab.com/libtiff/libtiff/-/issues/533
[3] 
https://gitlab.com/libtiff/libtiff/-/commit/b5c7d4c4e0ac16b5cfb11acaaeaa493334f8



Bug#1040945: tiff: CVE-2023-3618

2023-07-12 Thread GCS
Hi Salvatore,

On Wed, Jul 12, 2023 at 9:39 PM Salvatore Bonaccorso  wrote:
> Source: tiff
> Version: 4.5.1-1
> CVE-2023-3618[0]:
> | A flaw was found in libtiff. A specially crafted tiff file can lead
> | to a segmentation fault due to a buffer overflow in the Fax3Encode
> | function in libtiff/tif_fax3.c, resulting in a denial of service.
[...]
> Please adjust the affected versions in the BTS as needed.
 Done my quick testing. My experience is the following.
1) libtiff6 and libtiff-tools are both 4.5.1-1 (ie, Trixie): the tool
reports several warnings, exists with 1 (non-zero) but doesn't
segfault. Even tried with valgrind, still no segfault.
2) libtiff6 is 4.5.1-1 backported to Bookworm and libtiff-tools are
not, ie it's 4.5.0-6 : the tool reports the same warnings like above,
but this time it _does_ segfault.
3) If libtiff-tools also updated to 4.5.1-1 on Bookworm: it's like the
first case, several warnings, non-zero exit code without a segfault.

In short, it seems:
- it's a non-dsa as only a crash in a CLI tool (which has end of life now),
- doesn't affect the library,
- while 4.5.0-6 (and in fact, at least from 4.5.0-1) is vulnerable,
4.5.1-1 fixed this issue.

But you may find it otherwise, I do not alter this report in the BTS.

Regards,
Laszlo/GCS



Bug#1040609: traceroute.db.1: some remarks and editorial fixes for the manual

2023-07-08 Thread GCS
Hi Bjarni,

On Fri, Jul 7, 2023 at 11:03 PM Bjarni Ingi Gislason  wrote:
> Package: traceroute
> Version: 1:2.1.2-1
> Severity: minor
> Tags: patch
[...]
> here are some notes and fixes for the man page.
 Thanks for all your work. Can you please:
1) Send your patch to traceroute upstream[1]?
2) Alternatively send me the patch as an attachment (do not paste it
inline the email) and I will send your fixes upstream.

Thanks,
Laszlo/GCS
[1] https://sourceforge.net/p/traceroute/patches/



Bug#1040639: transition: rocksdb

2023-07-08 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 + src:rocksdb
Control: forwarded -1
https://release.debian.org/transitions/html/auto-rocksdb.html

Hi RMs,

Small transition for RocksDB as only two reverse dependencies are in
the archives: balboa and sortmerna.
Both build fine with the rocksdb 8.3.2-1 version already in
experimental. The only thing you might wait for is that it's not yet
started to build on mips64el. I don't expect any failure as it was
built fine on other release architectures.

Regards,
Laszlo/GCS



Bug#1039521: Summarizing my proposed changes about the Java part of protobuf

2023-06-29 Thread GCS
On Thu, Jun 29, 2023 at 9:15 PM Pierre Gruet  wrote:
> Le 29/06/2023 à 18:41, László Böszörményi (GCS) a écrit :
> > Do you have your proposed package somewhere? I would also like to
> > check it with the updated protobuf package before uploading.
> You can find it in the public repo
> https://salsa.debian.org/pgt/protobuf
 Your package = genomicsdb but I guess it's in the med-team repo [1].

Cheers,
Laszlo/GCS
[1] https://salsa.debian.org/med-team/genomicsdb



Bug#1039521: Summarizing my proposed changes about the Java part of protobuf

2023-06-29 Thread GCS
Hi Pierre,

On Wed, Jun 28, 2023 at 4:39 PM Pierre Gruet  wrote:
> - removing j2objc from the pom.xml so that rdeps don't look for this
> Debian-unpackaged artifact (touches d/p/no_j2objc.patch);
 Thanks for all of your work on this! I see you added this as a patch,
but not included in the series file. Meaning it will not be applied.
It's just an oversight I guess. Other than that it looks good.
Do you have your proposed package somewhere? I would also like to
check it with the updated protobuf package before uploading.

Thanks,
Laszlo/GCS



Bug#918075: Some patches for dar

2023-06-05 Thread GCS
Hi John,

On Mon, Jun 5, 2023 at 10:12 PM John Goerzen  wrote:
> If you are open to me taking over dar at this time, I would go ahead and
> upload 2.7.9 (with my updates above) with the maintainer changed to me.
 I just ask for one thing. Please wait until Bookworm is released -
probably this or next week. Then go ahead and take over dar.

Regards,
Laszlo/GCS



Bug#1037042: graphicsmagick: GetImageDepth has a thread arena and memory leak

2023-06-04 Thread GCS
Hi,

On Sat, Jun 3, 2023 at 8:30 PM Bob Friesenhahn
 wrote:
> I am definitely able to confirm that memory consumption builds due to
> invoking GetImageDepth() via a POSIX thread.  The rate that it builds
> is image sensitive since some images cause GetImageDepth() to perform
> more OpenMP loops.
 Unfortunately I can not reproduce. My processor is an Intel K variant
CPU, six cores and twelve threads, 64 Gb of RAM.
GM is 1.3.40 with two security fixes backported, compiled with GCC
v12.2.0. Tried with three PNG images, all memory consumption is static
from the beginning. Do I need some special case of PNG files to
experience this issue?

> My own testing is under Ubuntu 20.04 using GCC 10.
 Do you think it might be a problem with another system component, a
GCC optimization or this is fixed meanwhile? At least I do wonder why
this issue is CPU / machine dependent.

Regards,
Laszlo/GCS



Bug#1019717: Display of an SVG file broken due to gsfonts transition

2023-05-23 Thread GCS
On Tue, May 23, 2023 at 9:45 PM Albrecht Dreß  wrote:
> I added the attached patch file to the Debian patches and re-build the 
> package, which now processes SVG files as expected, so this seems to be a fix.
>
> Also attached is the *very* ugly Python script I used to extract the URW font 
> paths from the Ghostscript config and to modify type-ghostscript.mgk.in - 
> maybe it is helpful.
 These fixes [1] you submitted look OK, let's loop-in the upstream developer.

Thanks,
Laszlo/GCS
[1] https://bugs.debian.org/1019717#20



Bug#1019717: Display of an SVG file broken due to gsfonts transition

2023-05-23 Thread GCS
Hi Albrecht, Bob,

[Written a day ago, forgot to send.]

On Mon, May 22, 2023 at 6:51 PM Albrecht Dreß  wrote:
> The issue is still present in libgraphicsmagick-q16-3 v. 1.4+really1.3.40-4 
> and makes using the library with the standard config files somehow unusable 
> as soon as any SVG with a "text" container is involved.  It would be great if 
> a fix would be available before the final Bookworm release.
 It's an upstream bug; there was a gsfonts -> fonts-urw-base35
transition which resulted in different font files. But GM has the font
names hardcoded. The default seems to be n019003l.pfb [1] and font
variants are also hardcoded [2]. But the package fonts-urw-base35 has
none of these pfb files.
Not sure what to do at this point. Alter the font names in GM or ship
the hardcoded fonts?

Regards,
Laszlo/GCS
[1] 
http://hg.graphicsmagick.org/hg/GraphicsMagick/file/c41d8933edef/magick/nt_base.c#l1713
[2] 
http://hg.graphicsmagick.org/hg/GraphicsMagick/file/c41d8933edef/wmf/src/font.h#l82
[3] https://packages.debian.org/bookworm/all/fonts-urw-base35/filelist



Bug#1036449: unblock: vice/3.7.1+dfsg1-2

2023-05-21 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: affects -1 + src:vice

Hi RMs,

[ Reason ]
My bad was still using non-official categories in desktop files. Now
this is corrected.

[ Impact ]
Find shortcuts to emulation binaries in the right place finally for Bookworm.

[ Tests ]
Local check was made and already in Sid for a week.

[ Risks ]
None.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock vice/3.7.1+dfsg1-2

Thanks for considering,
Laszlo/GCS
diff -Nru vice-3.7.1+dfsg1/debian/changelog vice-3.7.1+dfsg1/debian/changelog
--- vice-3.7.1+dfsg1/debian/changelog	2023-04-29 10:58:51.0 +0200
+++ vice-3.7.1+dfsg1/debian/changelog	2023-05-14 07:41:04.0 +0200
@@ -1,3 +1,10 @@
+vice (3.7.1+dfsg1-2) unstable; urgency=medium
+
+  * Use valid Freedesktop.org categories for desktop files
+(closes: #626518, #958959).
+
+ -- Laszlo Boszormenyi (GCS)   Sun, 14 May 2023 07:41:04 +0200
+
 vice (3.7.1+dfsg1-1) unstable; urgency=medium
 
   * Remove mps803.bin printer ROM from source (closes: #1035079).
diff -Nru vice-3.7.1+dfsg1/debian/desktop/x128.desktop vice-3.7.1+dfsg1/debian/desktop/x128.desktop
--- vice-3.7.1+dfsg1/debian/desktop/x128.desktop	2022-02-02 17:44:26.0 +0100
+++ vice-3.7.1+dfsg1/debian/desktop/x128.desktop	2023-05-13 23:20:01.0 +0200
@@ -63,4 +63,4 @@
 Icon=/usr/share/pixmaps/c128icon-32x28.xpm
 Exec=/usr/bin/x128
 Terminal=false
-Categories=Application;X-Debian-Applications-Emulators;
+Categories=Game;Emulator;
diff -Nru vice-3.7.1+dfsg1/debian/desktop/x64.desktop vice-3.7.1+dfsg1/debian/desktop/x64.desktop
--- vice-3.7.1+dfsg1/debian/desktop/x64.desktop	2022-02-02 17:44:26.0 +0100
+++ vice-3.7.1+dfsg1/debian/desktop/x64.desktop	2023-05-13 23:20:07.0 +0200
@@ -63,4 +63,4 @@
 Icon=/usr/share/pixmaps/c64icon-32x28.xpm
 Exec=/usr/bin/x64sc
 Terminal=false
-Categories=Application;X-Debian-Applications-Emulators;
+Categories=Game;Emulator;
diff -Nru vice-3.7.1+dfsg1/debian/desktop/xcbm2.desktop vice-3.7.1+dfsg1/debian/desktop/xcbm2.desktop
--- vice-3.7.1+dfsg1/debian/desktop/xcbm2.desktop	2022-02-02 17:44:26.0 +0100
+++ vice-3.7.1+dfsg1/debian/desktop/xcbm2.desktop	2023-05-13 23:20:12.0 +0200
@@ -63,4 +63,4 @@
 Icon=/usr/share/pixmaps/cbm2icon-32x28.xpm
 Exec=/usr/bin/xcbm2
 Terminal=false
-Categories=Application;X-Debian-Applications-Emulators;
+Categories=Game;Emulator;
diff -Nru vice-3.7.1+dfsg1/debian/desktop/xpet.desktop vice-3.7.1+dfsg1/debian/desktop/xpet.desktop
--- vice-3.7.1+dfsg1/debian/desktop/xpet.desktop	2022-02-02 17:44:26.0 +0100
+++ vice-3.7.1+dfsg1/debian/desktop/xpet.desktop	2023-05-13 23:20:16.0 +0200
@@ -63,4 +63,4 @@
 Icon=/usr/share/pixmaps/peticon-32x28.xpm
 Exec=/usr/bin/xpet
 Terminal=false
-Categories=Application;X-Debian-Applications-Emulators;
+Categories=Game;Emulator;
diff -Nru vice-3.7.1+dfsg1/debian/desktop/xplus4.desktop vice-3.7.1+dfsg1/debian/desktop/xplus4.desktop
--- vice-3.7.1+dfsg1/debian/desktop/xplus4.desktop	2022-02-02 17:44:26.0 +0100
+++ vice-3.7.1+dfsg1/debian/desktop/xplus4.desktop	2023-05-13 23:20:32.0 +0200
@@ -63,4 +63,4 @@
 Icon=/usr/share/pixmaps/plus4icon-32x28.xpm
 Exec=/usr/bin/xplus4
 Terminal=false
-Categories=Application;X-Debian-Applications-Emulators;
+Categories=Game;Emulator;
diff -Nru vice-3.7.1+dfsg1/debian/desktop/xvic.desktop vice-3.7.1+dfsg1/debian/desktop/xvic.desktop
--- vice-3.7.1+dfsg1/debian/desktop/xvic.desktop	2022-02-02 17:44:26.0 +0100
+++ vice-3.7.1+dfsg1/debian/desktop/xvic.desktop	2023-05-13 23:20:35.0 +0200
@@ -63,4 +63,4 @@
 Icon=/usr/share/pixmaps/vic20icon-32x28.xpm
 Exec=/usr/bin/xvic
 Terminal=false
-Categories=Application;X-Debian-Applications-Emulators;
+Categories=Game;Emulator;


Bug#1035556: expat: Generalize libbsd-dev build-dep on freebsd & hurd

2023-05-06 Thread GCS
Control: tags -1 +confirmed

Hi,

On Fri, May 5, 2023 at 1:39 PM Samuel Thibault  wrote:
> debian/rules is passing --with-libbsd for all kfreebsd & hurd ports,
> debian/control should thus enable the build-dep for all of them, as the
> attached patch does. This fixes building on hurd-amd64.
 Patch is correct, thanks for it. How soon do you need it? Current
release is in freeze and hurd-amd64 is not even a port architecture
for Debian. As such I don't think it will be allowed for Bookworm.

Regards,
Laszlo/GCS



Bug#1035339: unblock: vice/3.7.1+dfsg1-1

2023-05-01 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: affects -1 + src:vice

Hi RMs,

[ Reason ]
Upstream source contains several ROM files for Commodore machines and
floppy drives, including printers. All these have a size of 2k and
multiples. A script under debian/ directory called mangle-source.sh
remove those. There's a printer ROM file which turned out to be an
exception to this size rule. Meaning this non-free file slipped to the
source tree and to the package itself.
This is filed as a serious bug [1] already. I've fixed it by removing
the file and updating the removal script.

[ Impact ]
It will make the package DFSG free and users can still have it in Bookworm.

[ Tests ]
This file is unused for package build and only needed if someone would
like to emulate the Commodore printer. That is, no extra tests are
required.

[ Risks ]
Nothing. The change is only a file removal, replace it with the text
'dummy' and a source repack shell script update.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
Uploaded, built on all architectures and package is working.

unblock vice/3.7.1+dfsg1-1

Thanks for considering,
Laszlo/GCS
[1] https://bugs.debian.org/1035079
Binary files /tmp/Vc_Z6BwILs/vice-3.7.1+dfsg/data/PRINTER/mps803.bin and /tmp/e6SEihfSew/vice-3.7.1+dfsg1/data/PRINTER/mps803.bin differ
diff -Nru vice-3.7.1+dfsg/debian/changelog vice-3.7.1+dfsg1/debian/changelog
--- vice-3.7.1+dfsg/debian/changelog	2023-02-17 21:06:12.0 +0100
+++ vice-3.7.1+dfsg1/debian/changelog	2023-04-29 10:58:51.0 +0200
@@ -1,3 +1,9 @@
+vice (3.7.1+dfsg1-1) unstable; urgency=medium
+
+  * Remove mps803.bin printer ROM from source (closes: #1035079).
+
+ -- Laszlo Boszormenyi (GCS)   Sat, 29 Apr 2023 10:58:51 +0200
+
 vice (3.7.1+dfsg-2) unstable; urgency=medium
 
   * Clarify license of CBM.ttf (closes: #1029260).
diff -Nru vice-3.7.1+dfsg/debian/mangle-source.sh vice-3.7.1+dfsg1/debian/mangle-source.sh
--- vice-3.7.1+dfsg/debian/mangle-source.sh	2023-01-14 20:56:30.0 +0100
+++ vice-3.7.1+dfsg1/debian/mangle-source.sh	2023-04-29 10:58:51.0 +0200
@@ -24,6 +24,9 @@
   echo dummy > $FILE
 fi
   done
+  # non-standard size
+  rm data/PRINTER/mps803.bin
+  echo dummy > data/PRINTER/mps803.bin
   # replace non-free font
   echo replace font 1>&2
   rm data/common/C64_Pro_Mono-STYLE.ttf 1>&2


Bug#1034646: [pre-approval] unblock: fuse3/3.14.0-4

2023-04-28 Thread GCS
Control: tags -1 -moreinfo

On Thu, Apr 27, 2023 at 7:56 AM Paul Gevers  wrote:
> Please go ahead and remove the moreinfo tag once the upload happens.
 Thanks, uploaded and built on all architectures. Piuparts and package
tests are done as well.

Cheers,
Laszlo/GCS



Bug#1034753: RM: paxctl -- RoM; obsolete

2023-04-23 Thread GCS
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
Control: affects -1 + src:paxctl

Hi FTP Masters,

Please remove src:paxctl as it's an old, outdated project in our
archives. I've no intentions to keep it in Sid nor ship it with
Bookworm.

Thanks,
Laszlo/GCS



Bug#1034646: [pre-approval] unblock: fuse3/3.14.0-4

2023-04-20 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: Cyril Brulebois 
Control: affects -1 + src:fuse3

Hi RMs,

Two issues in src:fuse3 I would like to have fixed for Bookworm.

[ Reason ]
There's a memory leak in the high level API [1] and the fuse CLI
doesn't propagate the allowed maximum threads to use [2].

[ Impact ]
In special cases like fuse3 would get a signal during its start it
would leak some memory. Users can't set usage constraints in terms of
threads (CPU) usage. These are not common situations but would be
better to handle these.

[ Tests ]
Upstream test suite. Tested and built correctly in experimental.
Waiting for your permission to upload to Sid.

[ Risks ]
Minimal, the fixes are small and very targeted. Should not affect the
installer creation (as it uses the fuse3 udeb), but kibi is also
pinged for an extra check.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock fuse3/3.14.0-4

Thanks for considering,
Laszlo/GCS
[1] https://github.com/libfuse/libfuse/pull/781
[2] https://github.com/libfuse/libfuse/pull/742
diff -Nru fuse3-3.14.0/debian/changelog fuse3-3.14.0/debian/changelog
--- fuse3-3.14.0/debian/changelog	2023-03-17 20:51:05.0 +0100
+++ fuse3-3.14.0/debian/changelog	2023-04-18 23:07:15.0 +0200
@@ -1,3 +1,11 @@
+fuse3 (3.14.0-4) unstable; urgency=medium
+
+  * Backport upstream fixes:
+- fix max_threads command line parameter propagation,
+- fix memory leak in high level API.
+
+ -- Laszlo Boszormenyi (GCS)   Tue, 18 Apr 2023 23:07:15 +0200
+
 fuse3 (3.14.0-3) unstable; urgency=medium
 
   [ Helge Deller  ]
diff -Nru fuse3-3.14.0/debian/patches/Fix-max_threads-command-line-parameter-propagation.patch fuse3-3.14.0/debian/patches/Fix-max_threads-command-line-parameter-propagation.patch
--- fuse3-3.14.0/debian/patches/Fix-max_threads-command-line-parameter-propagation.patch	1970-01-01 01:00:00.0 +0100
+++ fuse3-3.14.0/debian/patches/Fix-max_threads-command-line-parameter-propagation.patch	2023-04-17 21:34:29.0 +0200
@@ -0,0 +1,24 @@
+From ab5ca07af03b7dbb33193666c13b938534bde0e4 Mon Sep 17 00:00:00 2001
+From: Sarath Lakshman 
+Date: Sat, 11 Mar 2023 16:58:31 +0530
+Subject: [PATCH] Fix max_threads command line parameter propagation
+
+The fuse_main_real() method doesn't apply the max_threads parameter
+parsed through the commandline arguments. This commit fixes the wiring
+of max_threads argument.
+---
+ lib/helper.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/lib/helper.c b/lib/helper.c
+index 35c6a98c..14a0df33 100644
+--- a/lib/helper.c
 b/lib/helper.c
+@@ -377,6 +377,7 @@ int fuse_main_real(int argc, char *argv[], const struct fuse_operations *op,
+ 		fuse_loop_cfg_set_clone_fd(loop_config, opts.clone_fd);
+ 
+ 		fuse_loop_cfg_set_idle_threads(loop_config, opts.max_idle_threads);
++		fuse_loop_cfg_set_max_threads(loop_config, opts.max_threads);
+ 		res = fuse_loop_mt(fuse, loop_config);
+ 	}
+ 	if (res)
diff -Nru fuse3-3.14.0/debian/patches/Fix_memory_leak_in_high_level_API.patch fuse3-3.14.0/debian/patches/Fix_memory_leak_in_high_level_API.patch
--- fuse3-3.14.0/debian/patches/Fix_memory_leak_in_high_level_API.patch	1970-01-01 01:00:00.0 +0100
+++ fuse3-3.14.0/debian/patches/Fix_memory_leak_in_high_level_API.patch	2023-04-17 21:34:29.0 +0200
@@ -0,0 +1,66 @@
+From fcd293f675fc7bfa0522186c5d68ef932eec6945 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Matthias=20G=C3=B6rgens?= 
+Date: Fri, 14 Apr 2023 19:19:03 +0800
+Subject: [PATCH] Fix memory leak in high level API (#781)
+
+Previously, in the high level API if we received a signal between
+setting up signal handlers and processing INIT, we would leak
+
+```
+$ ./example/hello -s -d -f mountpoint/
+[9/9] Linking target example/hello_ll
+FUSE library version: 3.14.1
+nullpath_ok: 0
+
+=
+==178330==ERROR: LeakSanitizer: detected memory leaks
+
+Direct leak of 352 byte(s) in 1 object(s) allocated from:
+#0 0x7fbb19abf411 in __interceptor_calloc /usr/src/debug/gcc/gcc/libsanitizer/asan/asan_malloc_linux.cpp:77
+#1 0x7fbb1a0efd3b in fuse_fs_new ../lib/fuse.c:4814
+#2 0x7fbb1a0f02b5 in fuse_new_31 ../lib/fuse.c:4913
+#3 0x7fbb1a10ec5e in fuse_main_real ../lib/helper.c:345
+#4 0x5625db8ab418 in main ../example/hello.c:176
+#5 0x7fbb1983c78f  (/usr/lib/libc.so.6+0x2378f)
+
+SUMMARY: AddressSanitizer: 352 byte(s) leaked in 1 allocation(s).
+```
+
+That's because `fuse_lowlevel.c`s `fuse_session_destroy` would only call
+the user supplied `op.destroy`, if INIT had been processed, but the high
+level API relied on `op.destroy` to free `f->fs`.
+
+This patch moves the freeing into `fuse_destroy` that will always be
+called by our high-level API.
+---
+ lib/fuse.c | 3 +--
+ 1 file changed

Bug#1034645: unblock: graphicsmagick/1.4+really1.3.40-4

2023-04-20 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: affects -1 + src:graphicsmagick

Hi RMs,

Two security fixes were added to graphicsmagick and I would like to
get those to Bookworm.

[ Reason ]
It was found that the MIFF reader was somehow able to provide
attribute data in a way which resulted in a heap overflow. There is
also a memory leak fix.

[ Impact ]
The heap overflow was detected by ASAN, meaning it might be
exploitable. The memory leak is in the handling of the
EXIF:Orientation key, common in images.

[ Tests ]
Upstream test suite.

[ Risks ]
Minimal but if there would be any issue upstream is quick to address them.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock graphicsmagick/1.4+really1.3.40-4

Thanks for considering,
Laszlo/GCS
diff -Nru graphicsmagick-1.4+really1.3.40/debian/changelog graphicsmagick-1.4+really1.3.40/debian/changelog
--- graphicsmagick-1.4+really1.3.40/debian/changelog	2023-01-19 19:44:45.0 +0100
+++ graphicsmagick-1.4+really1.3.40/debian/changelog	2023-04-17 19:17:10.0 +0200
@@ -1,3 +1,19 @@
+graphicsmagick (1.4+really1.3.40-4) unstable; urgency=medium
+
+  * Remove development ifdef from memory leak fix.
+
+ -- Laszlo Boszormenyi (GCS)   Mon, 17 Apr 2023 19:17:10 +0200
+
+graphicsmagick (1.4+really1.3.40-3) unstable; urgency=high
+
+  * Backport security fixes:
+- MIFF reader able to provide attribute data in way which results in
+  a heap overflow,
+- SetImageAttribute(): eliminate memory leak when handling attribute
+  with key "EXIF:Orientation".
+
+ -- Laszlo Boszormenyi (GCS)   Sun, 16 Apr 2023 14:21:32 +0200
+
 graphicsmagick (1.4+really1.3.40-2) unstable; urgency=medium
 
   * Don't force tiff dependency, let shlibs handle it (closes: #1029212).
diff -Nru graphicsmagick-1.4+really1.3.40/debian/patches/eliminate_memory_leak_when_handling_EXIFOrientation.patch graphicsmagick-1.4+really1.3.40/debian/patches/eliminate_memory_leak_when_handling_EXIFOrientation.patch
--- graphicsmagick-1.4+really1.3.40/debian/patches/eliminate_memory_leak_when_handling_EXIFOrientation.patch	1970-01-01 01:00:00.0 +0100
+++ graphicsmagick-1.4+really1.3.40/debian/patches/eliminate_memory_leak_when_handling_EXIFOrientation.patch	2023-04-17 19:17:10.0 +0200
@@ -0,0 +1,115 @@
+
+# HG changeset patch
+# User Bob Friesenhahn 
+# Date 1681598921 18000
+# Node ID 3ce01217413bb5b476460bbc8ab11020205eeda0
+# Parent  8bec800dbaef2d72da0e7e997ad45bece0e95893
+SetImageAttribute(): Eliminate memory leak when handling attribute with key "EXIF:Orientation"
+
+diff -r 8bec800dbaef -r 3ce01217413b ChangeLog
+--- a/ChangeLog	Sat Apr 08 18:31:31 2023 -0500
 b/ChangeLog	Sat Apr 15 17:48:41 2023 -0500
+@@ -1,3 +1,9 @@
++2023-04-15  Bob Friesenhahn  
++
++	* magick/attribute.c (SetImageAttribute): Eliminate memory leak
++	when handling attribute with key "EXIF:Orientation".  (SourceForge
++	issue #707 "memory leaks in gm").
++
+ 2023-04-08  Bob Friesenhahn  
+ 
+ 	* coders/mpc.c (ReadMPCImage): If an attribute appears multiple
+diff -r 8bec800dbaef -r 3ce01217413b coders/miff.c
+--- a/coders/miff.c	Sat Apr 08 18:31:31 2023 -0500
 b/coders/miff.c	Sat Apr 15 17:48:41 2023 -0500
+@@ -761,6 +761,8 @@ SetNewImageAttribute(Image *image,const
+   MagickPassFail
+ status;
+ 
++  status = SetImageAttribute(image,key,value);
++
+   if (GetImageAttribute(image,key) == (const ImageAttribute *) NULL)
+ status = SetImageAttribute(image,key,value);
+   else
+diff -r 8bec800dbaef -r 3ce01217413b magick/attribute.c
+--- a/magick/attribute.c	Sat Apr 08 18:31:31 2023 -0500
 b/magick/attribute.c	Sat Apr 15 17:48:41 2023 -0500
+@@ -3178,9 +3178,6 @@
+   register ImageAttribute
+ *p;
+ 
+-  int
+-orientation;
+-
+   /*
+ Initialize new attribute.
+   */
+@@ -3271,6 +3268,9 @@
+ 
+   if (LocaleCompare(attribute->key,"EXIF:Orientation") == 0)
+ {
++  int
++orientation = 0;
++
+   /*
+ Special handling for EXIF orientation tag.
+ If new value differs from existing value,
+@@ -3278,17 +3278,19 @@
+ is valid. Don't append new value to existing value,
+ replace it instead.
+   */
+-  orientation = MagickAtoI(value);
+-  if (orientation > 0 || orientation <= (int)LeftBottomOrientation)
+-SetEXIFOrientation(image, orientation);
+-
+-  /* Replace current attribute with new one */
+-  attribute->next = p->next;
+-  if (p->previous == (ImageAttribute *) NULL)
+-image->attributes=attribute;
+-  else
+-p->previous->next = attribute;
+-   

Bug#1034330: unblock: protobuf/3.21.12-3

2023-04-12 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: affects -1 + src:protobuf

Hi RMs,

Please unblock package protobuf. It's running build time tests with those fixes.

[ Reason ]
It was discovered late that build time tests are not run [1] and the
fix is easy. Reporter stated firmly that he is even going to NMU the
package in unstable and/or stable to fix this issue. My bad that I
thought this change was fully tested and I only checked it on amd64.
Then it turned out build time tests are broken on 32 bit platforms [2].

[ Impact ]
I took my time and fixed build tests. On hppa I had to extend the
ignorance of a static_assert() due to over alignment on this platform.
Now it has a working self-check on package changes including security
ones during Bookworm lifecycle.

[ Tests ]
Upstream test suite. Done build tests with the following rdeps:
clementine and grpc on both i386 and amd64 including tests of those
packages. Those worked without a hitch.
Package tests for migration also worked.

[ Risks ]
Low, the changes are pretty straightforward and only affects the
self-testing parts of the package.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]
Uploaded four days ago, built on all previous architectures and no new
bug reports are filed.

unblock protobuf/3.21.12-3

Thanks for considering,
Laszlo/GCS
[1] https://bugs.debian.org/1033989
[2] https://bugs.debian.org/1033998
diff -Nru protobuf-3.21.12/debian/changelog protobuf-3.21.12/debian/changelog
--- protobuf-3.21.12/debian/changelog	2022-12-17 09:18:06.0 +0100
+++ protobuf-3.21.12/debian/changelog	2023-04-09 07:50:55.0 +0200
@@ -1,3 +1,16 @@
+protobuf (3.21.12-3) unstable; urgency=medium
+
+  * Fix build-time tests on 32 bit architectures (closes: #1033998).
+
+ -- Laszlo Boszormenyi (GCS)   Sun, 09 Apr 2023 05:50:55 +
+
+protobuf (3.21.12-2) unstable; urgency=medium
+
+  [ Helmut Grohne  ]
+  * Reenable build-time testing (closes: #1033989).
+
+ -- Laszlo Boszormenyi (GCS)   Wed, 05 Apr 2023 21:57:20 +0200
+
 protobuf (3.21.12-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru protobuf-3.21.12/debian/elpa-test protobuf-3.21.12/debian/elpa-test
--- protobuf-3.21.12/debian/elpa-test	1970-01-01 01:00:00.0 +0100
+++ protobuf-3.21.12/debian/elpa-test	2023-04-05 21:57:20.0 +0200
@@ -0,0 +1 @@
+disable=please_do_run_dh_auto_test
diff -Nru protobuf-3.21.12/debian/patches/build_32_bit_tests.patch protobuf-3.21.12/debian/patches/build_32_bit_tests.patch
--- protobuf-3.21.12/debian/patches/build_32_bit_tests.patch	1970-01-01 01:00:00.0 +0100
+++ protobuf-3.21.12/debian/patches/build_32_bit_tests.patch	2023-04-05 21:57:20.0 +0200
@@ -0,0 +1,140 @@
+From 01c340d0bb9abb2654554afc732df2c89774ce81 Mon Sep 17 00:00:00 2001
+From: Mike Kruskal <62662355+mkruskal-goo...@users.noreply.github.com>
+Date: Mon, 19 Sep 2022 09:50:19 -0700
+Subject: [PATCH] Adding full build to 32 bit tests (#10589)
+
+* Adding full build to 32 bit tests
+
+* Running C++ tests in 32 bit builds
+
+* Patching static assert test failure
+
+* Test fixes for 32-bit architectures
+
+* Cleanup after CMake build
+
+* Save protoc before cleanup
+
+* Route protoc better
+---
+ .../compiler/cpp/message_size_unittest.cc |  2 +-
+ src/google/protobuf/extension_set_unittest.cc |  6 ++--
+ .../protobuf/io/zero_copy_stream_unittest.cc  |  3 ++
+ .../protobuf/repeated_field_unittest.cc   |  4 +--
+ src/google/protobuf/util/time_util_test.cc| 28 +++
+ 8 files changed, 42 insertions(+), 20 deletions(-)
+
+diff --git a/src/google/protobuf/compiler/cpp/message_size_unittest.cc b/src/google/protobuf/compiler/cpp/message_size_unittest.cc
+index a75d77a70cb..ed4a90e223f 100644
+--- a/src/google/protobuf/compiler/cpp/message_size_unittest.cc
 b/src/google/protobuf/compiler/cpp/message_size_unittest.cc
+@@ -139,9 +139,9 @@ TEST(GeneratedMessageTest, OneStringSize) {
+ 
+ TEST(GeneratedMessageTest, MoreStringSize) {
+   struct MockGenerated : public MockMessageBase {  // 16 bytes
+-int has_bits[1];   // 4 bytes
+ int cached_size;   // 4 bytes
+ MockRepeatedPtrField data; // 24 bytes
++// + 4 bytes padding
+   };
+   GOOGLE_CHECK_MESSAGE_SIZE(MockGenerated, 48);
+   EXPECT_EQ(sizeof(protobuf_unittest::MoreString), sizeof(MockGenerated));
+diff --git a/src/google/protobuf/extension_set_unittest.cc b/src/google/protobuf/extension_set_unittest.cc
+index 8b436bc20c9..84da3c5465a 100644
+--- a/src/google/protobuf/extension_set_unittest.cc
 b/src/google/protobuf/extension_set_unittest.cc
+@@ -852,8 +852,10 @@ TEST(ExtensionSetTest, SpaceUsedExcludingSelf) {
+ const size_t old_ca

Bug#1034309: RM: gradm2 -- RoM; obsolete

2023-04-12 Thread GCS
Package: ftp.debian.org
Severity: normal
User: ftp.debian@packages.debian.org
Usertags: remove
Control: affects -1 + src:gradm2

Hi FTP Masters,

Please remove src:gradm2 from unstable - and from Bookworm as well if
a separate 'dak rm' is needed. It is an outdated, obsolete package
version that should not be part of our next stable release nor be part
of the project anymore.

Thanks,
Laszlo/GCS



Bug#1033989: protobuf: does not run any build-time tests anymore

2023-04-05 Thread GCS
On Wed, Apr 5, 2023 at 9:27 PM Helmut Grohne  wrote:
> Please let me know if you want to handle this. I'll treat the absence of
> a response as being ok with me NMUing the attached patch and filing the
> unblock request.
 Updated package is uploaded.

> I also intend to NMU protobuf in stable (fixing more issues).
 Feel free to ping me before that. I'm always open to learning from my
mistakes - and I'm alive and well.

Regards,
Laszlo/GCS



Bug#988948: CVE-2019-11939

2023-03-26 Thread GCS
Hi,

On Fri, Mar 17, 2023 at 7:54 PM László Böszörményi (GCS)  
wrote:
> On Thu, Mar 16, 2023 at 11:15 PM Moritz Mühlenhoff  wrote:
> > Am Fri, May 21, 2021 at 09:46:31PM +0200 schrieb Moritz Muehlenhoff:
> > > CVE-2019-11939:
> > > https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757
> > is this fixed in Bookworm?
>  I let the Security Team decide how this should be treated. I will try
> to describe it in full and short.
 Friendly ping, how the Security Team sees this issue. I've provided
insights [1] and tend to think it's safe for Bullseye and later.

Regards,
Laszlo/GCS
[1] https://bugs.debian.org/988948#17



Bug#1033203: unblock: fuse3/3.14.0-3

2023-03-19 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: Cyril Brulebois 
Control: affects -1 + src:fuse3

Hi RMs,

[ Reason ]
The self-testing of fuse3 only works on little-endian machines. I've
already disabled it on big-endian release architectures. Missed hppa
which is not added to the list.
Compiling examples didn't work due to outdated Makefile and using an
outdated header name in one of the files.

[ Impact ]
With the changes fuse3 is compiled on hppa now. As the installer needs
its udeb it can be created on that architecture as well from now on.
One of the example files was patched to use the current header file
name and now compiles with all of the other example files.

[ Tests ]
I've tested the examples compilation and those are OK now. Compilation
on hppa is now working as can be seen in the buildd logs [1].

[ Risks ]
None of the changes affect the working of the package itself.
As fuse3 has an udeb I put kibi to the loop if extra ACK is needed.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock fuse3/3.14.0-3

Thanks for considering,
Laszlo/GCS
[1] https://buildd.debian.org/status/logs.php?pkg=fuse3=hppa
diff -Nru fuse3-3.14.0/debian/changelog fuse3-3.14.0/debian/changelog
--- fuse3-3.14.0/debian/changelog	2023-02-18 07:22:30.0 +0100
+++ fuse3-3.14.0/debian/changelog	2023-03-17 20:51:05.0 +0100
@@ -1,3 +1,15 @@
+fuse3 (3.14.0-3) unstable; urgency=medium
+
+  [ Helge Deller  ]
+  * Add the big-endian hppa platform to the disabled self-testing list
+(closes: #1032187).
+
+  [ Laszlo Boszormenyi (GCS) ]
+  * Update fuse header name in examples.
+  * Fix Makefile for examples (closes: #1031544).
+
+ -- Laszlo Boszormenyi (GCS)   Fri, 17 Mar 2023 20:51:05 +0100
+
 fuse3 (3.14.0-2) unstable; urgency=medium
 
   * Revert upgrade of fuse_kernel.h for not being upstreamed yet
diff -Nru fuse3-3.14.0/debian/examples/Makefile fuse3-3.14.0/debian/examples/Makefile
--- fuse3-3.14.0/debian/examples/Makefile	2014-06-20 08:23:50.0 +0200
+++ fuse3-3.14.0/debian/examples/Makefile	2023-03-17 20:51:05.0 +0100
@@ -1,12 +1,16 @@
-CFLAGS := -Wall $(shell pkg-config fuse --cflags)
-LDFLAGS := $(shell pkg-config fuse --libs)
+CFLAGS := -Wall $(shell pkg-config fuse3 --cflags)
+LDFLAGS := $(shell pkg-config fuse3 --libs)
 
-targets = fusexmp fusexmp_fh hello hello_ll null
+targets = cuse cuse_client hello hello_ll \
+  invalidate_path ioctl ioctl_client \
+  notify_inval_entry notify_inval_inode notify_store_retrieve \
+  null passthrough passthrough_fh passthrough_ll \
+  poll poll_client printcap
 
-all: $(targets)
+%: %.c
+	$(CC) $(CFLAGS) $< -o $@ $(LDFLAGS)
 
-fusexmp_fh: fusexmp_fh.c
-	$(CC) $(CFLAGS) $(LDFLAGS) -lulockmgr $< -o $@
+all: $(targets)
 
 clean:
 	rm -f *.o
diff -Nru fuse3-3.14.0/debian/patches/series fuse3-3.14.0/debian/patches/series
--- fuse3-3.14.0/debian/patches/series	2023-02-18 07:22:30.0 +0100
+++ fuse3-3.14.0/debian/patches/series	2023-03-17 20:51:05.0 +0100
@@ -1 +1,2 @@
 revert_upgrade_of_fuse_kernel.h.patch
+update_header_name.patch
diff -Nru fuse3-3.14.0/debian/patches/update_header_name.patch fuse3-3.14.0/debian/patches/update_header_name.patch
--- fuse3-3.14.0/debian/patches/update_header_name.patch	1970-01-01 01:00:00.0 +0100
+++ fuse3-3.14.0/debian/patches/update_header_name.patch	2023-03-17 20:51:05.0 +0100
@@ -0,0 +1,21 @@
+Description: use new header name of fuse
+ Just rename fuse_config.h to libfuse_config.h
+Author: Laszlo Boszormenyi (GCS) 
+Bug-Debian: https://bugs.debian.org/1031544
+Forwarded: no
+Last-Update: 2023-03-17
+
+---
+
+
+--- fuse3-3.14.0.orig/example/poll_client.c
 fuse3-3.14.0/example/poll_client.c
+@@ -19,7 +19,7 @@
+  * \include poll_client.c
+  */
+ 
+-#include 
++#include 
+ 
+ #include 
+ #include 
diff -Nru fuse3-3.14.0/debian/rules fuse3-3.14.0/debian/rules
--- fuse3-3.14.0/debian/rules	2023-01-22 08:17:08.0 +0100
+++ fuse3-3.14.0/debian/rules	2023-03-17 20:51:05.0 +0100
@@ -54,7 +54,7 @@
 
 override_dh_auto_test:
 ifeq (,$(findstring nocheck,$(DEB_BUILD_OPTIONS)))
-ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x))
+ifeq (,$(findstring $(DEB_BUILD_ARCH),powerpc ppc64 sparc64 s390x hppa))
 		(cd obj-${DEB_HOST_GNU_TYPE}; python3 -m pytest test/) \
 			|| true
 endif


Bug#1033197: unblock: sqlite3/3.40.1-2

2023-03-19 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: Cyril Brulebois 
Control: affects -1 + src:sqlite3

Hi RMs,

[ Reason ]
Cyril Brulebois (kibi) who is the maintainer of crowdsec found out
that partial upgrade of Bullseye to Bookworm may render it unable to
start. Reason is, sqlite3 with 3.37.0-1 changed its internal
table_info representation. Previously the column types were in
lowercase letters and from this version these are using uppercase
letters - confusing the Bullseye version of crowdsec. With the version
in Bookworm it is already fixed.

[ Impact ]
Upgrading only libsqlite3-0 but not crowdsec makes the latter unusable
as it will not start. To prevent such situations I've added breaks on
old crowdsec versions.

[ Tests ]
Kibi did the testing [1] and the fix only prevents incompatible
versions of the mentioned packages to be installed.

[ Risks ]
Basically nothing.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock sqlite3/3.40.1-2

Thanks for consideration,
Laszlo/GCS
[1] https://bugs.debian.org/1033029
diff -Nru sqlite3-3.40.1/debian/changelog sqlite3-3.40.1/debian/changelog
--- sqlite3-3.40.1/debian/changelog	2022-12-31 09:41:40.0 +0100
+++ sqlite3-3.40.1/debian/changelog	2023-03-16 19:54:28.0 +0100
@@ -1,3 +1,12 @@
+sqlite3 (3.40.1-2) unstable; urgency=medium
+
+  [ Cyril Brulebois  ]
+  * Add Breaks against crowdsec as found in bullseye, as it relies on a
+particular table_info format, which changes between 3.36.0 and 3.37.0
+(closes: #1033029).
+
+ -- Laszlo Boszormenyi (GCS)   Thu, 16 Mar 2023 19:54:28 +0100
+
 sqlite3 (3.40.1-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru sqlite3-3.40.1/debian/control sqlite3-3.40.1/debian/control
--- sqlite3-3.40.1/debian/control	2022-12-31 09:41:40.0 +0100
+++ sqlite3-3.40.1/debian/control	2023-03-16 19:54:28.0 +0100
@@ -52,7 +52,7 @@
 Section: libs
 Architecture: any
 Depends: ${shlibs:Depends}, ${misc:Depends}
-Breaks: python-migrate (<< 0.11.0-4~), python3-migrate (<< 0.11.0-4~)
+Breaks: python-migrate (<< 0.11.0-4~), python3-migrate (<< 0.11.0-4~), crowdsec (<< 1.4)
 Multi-Arch: same
 Pre-Depends: ${misc:Pre-Depends}
 Description: SQLite 3 shared library


Bug#988948: CVE-2019-11939

2023-03-17 Thread GCS
On Fri, Mar 17, 2023 at 7:54 PM László Böszörményi (GCS)  
wrote:
> Thrift was developed by Facebook, open sourced and later donated to
> the Apache Software Foundation.
 Missed the whole point: packaging done from the ASF source tree of Thrift.

Cheers,
Laszlo/GCS



Bug#988948: CVE-2019-11939

2023-03-17 Thread GCS
Hi Moritz,

On Thu, Mar 16, 2023 at 11:15 PM Moritz Mühlenhoff  wrote:
> Am Fri, May 21, 2021 at 09:46:31PM +0200 schrieb Moritz Muehlenhoff:
> > CVE-2019-11939:
> > https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757
> is this fixed in Bookworm?
 I let the Security Team decide how this should be treated. I will try
to describe it in full and short.
Thrift was developed by Facebook, open sourced and later donated to
the Apache Software Foundation. Meaning that it's a real open source
project, it's not supervised by the company. That is, there are two
source trees; one from Facebook itself [1] and the one from ASF [2].
These diverged and the vulnerability is found only in the source tree
of Facebook [3]: "Golang Facebook Thrift servers would not error
[...]".
Sure, with Jaeger Agent [4] large memory allocation was found in the
Golang binding of the Apache source tree. It was filed as THRIFT-5322
[5] and was fixed for 0.14.0 [6].
This vulnerability is referenced with this issue as well. But I think
the upcoming issue is more relevant with it, as with other circumates
Jaeger Agent still caused huge allocations and the fix is more similar
to the fix used by Facebook. This issue is filed as THRIFT-5369 [7]
and was fixed for 0.14.2 and 0.15.0 [8].
Bookworm has version 0.17.0 of Apache Thrift so at least the two
mentioned memory allocation problems in Golang bindings are fixed in
it. But the referenced CVE vulnerability is officially not referenced
with the Apache source tree. I'm looking for advice from the Security
Team on how this is considered.

Cheers,
Laszlo/GCS
[1] https://github.com/facebook/fbthrift
[2] https://github.com/apache/thrift
[3] https://nvd.nist.gov/vuln/detail/CVE-2019-11939
[4] https://www.jaegertracing.io/
[5] https://issues.apache.org/jira/browse/THRIFT-5322
[6] 
https://github.com/apache/thrift/commit/37c2ceb737cb40377346c63a05f407da1c119ba0
[7] https://issues.apache.org/jira/browse/THRIFT-5369
[8] 
https://github.com/apache/thrift/commit/6583f4e52345c3b05a76f0b188836599628356e8



Bug#918075: Some patches for dar

2023-03-08 Thread GCS
Hi John,

On Wed, Mar 8, 2023 at 2:47 PM John Goerzen  wrote:
> I had thought that I'd be able to get by without the delta-diff
> features, but due to some changes over here, they would save me multiple
> GBs per day.  So I am happy to dive in to work on dar.
 Sounds good.

> I have submitted an ITP for libthreadar, which will allow multithreaded
> compression/encryption as well as enable remote repository support.  I
> have also uploaded a backport of librsync to bullseye-backports to
> enable a future dar backport to bullseye with binary delta support.
 Where can I check the libthreadar packaging?

> Would you like me to take over maintaining dar?  Or would you like to
> apply the patch (with appropriate changelog updates) and upload it?  Or
> I could upload it and leave the maintainers line alone?
 It's a release freeze for Bookworm. I'm asking for approval and will
do it once it is allowed.
I am open to giving the package to you during the Trixie release cycle.

Regards,
Laszlo/GCS



Bug#1032526: [pre-approval] unblock: dar/2.7.8-2

2023-03-08 Thread GCS
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: jgoer...@complete.org
Control: affects -1 + src:dar

Hi RMs,

Please pre-approve a feature enabled version of dar.

[ Reason ]
John Goerzen updated build dependencies to reflect the libext2fs-dev
rename, added delta changes support with rsync (previously I've not
enabled it as it didn't have the static library to use with
dar-static) and use Linux capabilities support.

[ Impact ]
Users will get a more feature rich version of dar.

[ Tests ]
The delta changes testing done by John, I did only build and basic testing.

[ Risks ]
I don't know any. No code change, only enable features that are
present in the source code already.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

Thanks for consideration,
Laszlo/GCS
diff -Nru dar-2.7.8/debian/changelog dar-2.7.8/debian/changelog
--- dar-2.7.8/debian/changelog	2022-12-04 15:57:33.0 +0100
+++ dar-2.7.8/debian/changelog	2023-03-08 18:14:41.0 +0100
@@ -1,3 +1,17 @@
+dar (2.7.8-2) unstable; urgency=medium
+
+  [ John Goerzen ]
+  * Support delta changes via librsync.
+  * Update dep on e2fslibs-dev to new name libext2fs-dev
+  * Add dep on libcap-dev to eneable proper capability handling.
+  * Add build-dependency on dot to ensure figures for docs are always
+built.
+
+  [ Laszlo Boszormenyi (GCS) ]
+  * Build depend on libcap-dev only on Linux architectures.
+
+ -- Laszlo Boszormenyi (GCS)   Wed, 08 Mar 2023 18:14:41 +0100
+
 dar (2.7.8-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru dar-2.7.8/debian/control dar-2.7.8/debian/control
--- dar-2.7.8/debian/control	2022-12-04 15:57:33.0 +0100
+++ dar-2.7.8/debian/control	2023-03-08 18:14:41.0 +0100
@@ -3,9 +3,11 @@
 Priority: optional
 Maintainer: Laszlo Boszormenyi (GCS) 
 Build-Depends: debhelper-compat (= 13), pkg-config, zlib1g-dev, libbz2-dev,
- libzstd-dev, liblzo2-dev, liblzma-dev, liblz4-dev, e2fslibs-dev,
- libgcrypt20-dev, libgpgme-dev, libassuan-dev, libargon2-dev, doxygen, groff
-Build-Conflicts: libcurl4-gnutls-dev, libcurl4-openssl-dev, librsync-dev
+ libzstd-dev, liblzo2-dev, liblzma-dev, liblz4-dev, libext2fs-dev,
+ libgcrypt20-dev, libgpgme-dev, libassuan-dev, libargon2-dev,
+ librsync-dev, libcap-dev [linux-any],
+ doxygen, groff, graphviz
+Build-Conflicts: libcurl4-gnutls-dev, libcurl4-openssl-dev
 Standards-Version: 4.6.1
 Rules-Requires-Root: no
 Homepage: http://dar.linux.free.fr/
diff -Nru dar-2.7.8/debian/rules dar-2.7.8/debian/rules
--- dar-2.7.8/debian/rules	2022-12-04 15:57:33.0 +0100
+++ dar-2.7.8/debian/rules	2023-03-08 18:14:41.0 +0100
@@ -4,13 +4,18 @@
 # Uncomment this to turn on verbose mode.
 #export DH_VERBOSE=1
 
+DEB_HOST_ARCH_OS ?= $(shell dpkg-architecture -qDEB_HOST_ARCH_OS)
+
 export DEB_BUILD_MAINT_OPTIONS = hardening=+all
 
 DEB_CONFIGURE_EXTRA_FLAGS := --disable-upx --disable-python-binding \
 			 --enable-mode=64
 DEB_CONFIGURE_EXTRA_FLAGS += --libdir=\$${prefix}/lib/$(DEB_HOST_MULTIARCH)
 
-BUILT_USING_PACKAGES = libc-dev-bin libattr1-dev libbz2-dev libgcrypt20-dev libgpgme-dev liblzo2-dev zlib1g-dev libzstd-dev liblz4-dev libargon2-dev libassuan-dev
+BUILT_USING_PACKAGES = libc-dev-bin libbz2-dev libgcrypt20-dev libgpgme-dev liblzo2-dev zlib1g-dev libzstd-dev liblz4-dev libargon2-dev libassuan-dev librsync-dev libext2fs-dev
+ifeq ($(DEB_HOST_ARCH_OS), linux)
+BUILT_USING_PACKAGES += libcap-dev
+endif
 
 BUILT_USING=$(shell dpkg-query -f '$${source:Package} (= $${source:Version}), ' -W $(BUILT_USING_PACKAGES))
 


Bug#1031716: python3-protobuf: Do reverse dependencies need stricter version constraints?

2023-02-21 Thread GCS
On Tue, Feb 21, 2023 at 1:27 PM Adrian Bunk  wrote:
> Looking at #1028371, should generated dependencies on python3-protobuf be
>   python3-protobuf (>= 3.21), python3-protobuf (<< 3.22)
 You mean on python3-bernhard, right?

> to ensure that the binary package is used with the same version
> as the protobuf-compiler used during the build?
 Then what? It would become uninstallable when a new protobuf version
(3.22 next time) is uploaded and built.

> If yes, are other language bindings also affected by this problem?
 I still don't get your point. How does a language binding package
version relate to the protobuf-compiler version? I don't follow the
internals of Protobuf, but I would say it's more related to the
library soname and its provided API version.

Regards,
Laszlo/GCS



Bug#1031632: tiff: CVE-2023-0795 CVE-2023-0796 CVE-2023-0797 CVE-2023-0798 CVE-2023-0799 CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804

2023-02-19 Thread GCS
Hi Salvatore,

On Sun, Feb 19, 2023 at 4:39 PM Salvatore Bonaccorso  wrote:
> The following vulnerabilities were published for tiff. Strictly
> speaking it might be disputed to fill this as RC level, though would
> be good to have those as well addressed before the bookworm release.
 Aren't these the issues I've fixed earlier today [1] with two
additional security related fixes?
You even handled these with commit
919f8c7bc3305adea4835ca0a7b24a48e592ec25 via our security tracker.
Unfortunately I still don't get any emails from it. :( However I'm
sure I'm subscribed to the tracker-commits.

Regards,
Laszlo/GCS
[1] 
https://tracker.debian.org/news/1422194/accepted-tiff-450-5-source-into-unstable/



Bug#1029260: vice: missing font license in d/copyright

2023-02-17 Thread GCS
Control: found -1 2.1.dfsg-1
Control: severity -1 important

On Sun, Jan 29, 2023 at 4:03 PM Bastian Germann  wrote:
> So if that font is not GPL-compibly licensed, CBM cannot be GPL licensed.
 It's mentioned as '100% free' and was added to the VICE project in
its 1.22.9 release. The first package version uploaded with it is
2.1.dfsg-1 from March, 2009.

Cheers,
Laszlo/GCS



Bug#1031394: Please re-enable RTTI support in Sid/Bookworm, needed by at least Ceph

2023-02-16 Thread GCS
Control: tags -1 +moreinfo

Dear Thomas,

On Thu, Feb 16, 2023 at 1:51 PM Thomas Goirand  wrote:
> During my tests with Ceph, I noticed a grave regression: Ceph OSD (the process
> that does the actual storage for Ceph) cannot use Snappy anymore, because it
> can't find one symbole related to RTTI.
 Isn't that because the upgrade path is not correct? New Ceph binaries
should handle this path.

> The consequence is that it cannot load and use Snappy. This may be ok for 
> newer
> clusters, but when upgrading from a cluster let's say in Bullseye, this may be
> desastrous: data wont be able to be unpacked, which means data loss.
 I don't see it as a data loss, but a data access issue.

> Moving forward, what I propose is probably the easiest way forward, at least
> for Ceph. Doing extra patching of the Ceph would be a way more hazardous.
 I'm quite surprised this was realized so late. You are probably not
the only person using Ceph. How others can use, how they upgraded
their Ceph clusters?

Regards,
Laszlo/GCS



Bug#1029944: neon27 FTBFS on IPV6-only buildds

2023-02-11 Thread GCS
Hi,

On Sat, Feb 11, 2023 at 7:48 PM Andreas Henriksson  wrote:
> If replacing "127.0.0.1" with "localhost" does not work the attached
> (completely untested) patch might be an option instead (simply skip the
> test on EAFNOSUPPORT).
 I don't have access to an IPv6 host to test on, so I just think it
would not work.

> (Sorry if the patch is completely broken, but I hope you get the
> idea...)
 This is broken for sure as some tests create a server socket (get the
'Address family for hostname not supported' error) and then next tests
would like to connect to it ('request failed: Could not connect to
proxy server: Connection refused' error) or simply get an other error
('request failed with 5 not NE_ERROR' message). While your patch would
skip the former, the latter would still be a problem.
I can remove the IPv4 only tests that are detected on buildds, but
there's at least one which hangs ('Build killed with signal TERM after
150 minutes of inactivity').
Any IPv6 porterbox available?

Regards,
Laszlo/GCS



Bug#1029260: vice: missing font license in d/copyright

2023-01-29 Thread GCS
On Sun, Jan 29, 2023 at 4:03 PM Bastian Germann  wrote:
> I have tracked down the origin to 
> https://sourceforge.net/projects/diskimagery64.
> This is a GPL-2 project so one could assume the font is GPL-2 as well.
> However, README.txt claims the following:
>
> "The fonts were not created totally by myself. I had a scalable commodore
> TrueType font lying around on on my hard disk and I used it as a starting
> point. The existing font told me its origins in the header: based on a font by
> Devin D. Cook with fixes from Chris McBride."
 Yes, the font was made by Devin D. Cook back in 2003/2004 or even
earlier and he further updated it around 2010.

> So if that font is not GPL-compibly licensed, CBM cannot be GPL licensed.
 He only states '100% Free' [1]. Will try to get to him for a longer
explanation.

> In any way, please also include the source files for the font from the  
> referenced project.
 Err, what do you mean source files for a font?

Regards,
Laszlo/GCS
[1] https://www.dafont.com/commodore-64-pixelized.font



Bug#1029260: vice: missing font license in d/copyright

2023-01-29 Thread GCS
Control: tags -1 +moreinfo

On Fri, Jan 20, 2023 at 1:36 PM Bastian Germann  wrote:
> Please include the CBM.ttf font license. I cannot find it on the
> web with any free software license so it might be non-free.
 Thanks for taking care of this. Let me ask you, did you find it
anywhere, especially with a non-free licence?

Regards,
Laszlo/GCS



Bug#1012864: graphviz: new upstream version 2.44.0 is available

2023-01-29 Thread GCS
On Sat, Jan 28, 2023 at 10:27 PM Antoine Beaupré  wrote:
> It seems that this bug report is not quite up to date. According to the
> upstream changelog I could find, 7.0.0 has been out since January:
 Indeed, upstream got moving quite fast even with breaking changes.

> Are we all looking at the same upstream here? :)
 With me at least. I know that upstream has become quite active. Even
packaged (I believe) 6.0 back then which needed several new binary
packages, reorganization of files, etc. Then I didn't have time to do
all the test rebuilds of packages that use it as build dependency. My
plan is to do it early for Trixie with an updated upstream release.

Regards,
Laszlo/GCS



Bug#1029944: neon27 FTBFS on IPV6-only buildds

2023-01-29 Thread GCS
Control: tags -1 +confirmed

On Sun, Jan 29, 2023 at 12:33 PM Adrian Bunk  wrote:
> https://buildd.debian.org/status/logs.php?pkg=neon27=amd64
>
> ...
> auth..  3/20 FAIL - retries (line 311: HTTP error:
> Could not resolve hostname `127.0.0.1': Address family for hostname not 
> supported)
 Is there a way to detect such buildds as a maintainer? What can I do
except notifying upstream and / or disable such tests?

Cheers,
Laszlo/GCS



Bug#1029444: dmraid: remove force_load dm-raid45 not shipped by Debian

2023-01-27 Thread GCS
On Sun, Jan 22, 2023 at 5:57 PM Alban Browaeys  wrote:
> Package: dmraid
> Version: 1.0.0.rc16-8+b1
[...]
> on each Debian box with dmraid installed (here by suggestion from gparted),
> one gets a message at boot (from initrd stage):
> modprobe: module dm-raid45 not found in modules.dep
 It has been fixed long time ago for Bookworm. For me it seems you are
using Bullseye.

> it has been 15 years since the issue has been reported and it was told to 
> patch the kernel with alpha
> code in Debian bug #411172 . (there was also a patch included in the debian 
> package to
> translate raid-45 calls to raid456 which is in the Debian kernel but it is 
> told not to work in htis bug report
> - was dmraid 1.0.0.rc14-1).
>
> Is there any reason to ship an initramfs that request an out-of-tree module 
> for all Debian users with dmraid installted ?
>
> May I request that the call to force_load dm-raid45 be removed for now and 
> replaced by a force_load raid456
>  when support is implemented?
 Can you confirm that when you have _up-to-date Bookworm_ running you
have this message?

Regards,
Laszlo/GCS



Bug#1029213: libgraphicsmagick-q16-3 has a hardcoded dependency on libtiff5

2023-01-19 Thread GCS
Control: merge -1 1029212

On Thu, Jan 19, 2023 at 7:15 PM Adrian Bunk  wrote:
> libgraphicsmagick-q16-3 has a hardcoded dependency on the cruft libtiff5:
> https://sources.debian.org/src/graphicsmagick/1.4%2Breally1.3.40-1/debian/control/#L44
>
> Please drop this, ${shlibs:Depends} already generates a correct dependency
> on libtiff6.
 Indeed and already reported. Will fix this shortly.

Regards,
Laszlo/GCS



Bug#1029032: ITP: python-google-api-core -- Google API client core library

2023-01-16 Thread GCS
Package: wnpp
Severity: wishlist
Owner: Laszlo Boszormenyi (GCS) 

* Package name: python-google-api-core
  Version : 1.34.0
  Upstream Author : 2014- Google Inc.
* URL : https://github.com/googleapis/python-api-core
* License : Apache-2.0
  Programming Lang: Python
  Description : Google API client core library
This library is not meant to be stand-alone. Instead it defines common
helpers used by all Google API clients.



Bug#1009879: security update needed for pypdf2 in bullseye (CVE-2022-24859)?

2023-01-15 Thread GCS
Hi Daniel,

On Mon, Jan 16, 2023 at 6:38 AM Salvatore Bonaccorso  wrote:
> On Sun, Jan 15, 2023 at 04:57:24PM -0500, Daniel Kahn Gillmor wrote:
> > I was looking into CVE-2022-24859 and pypdf2, and trying to figure out
> > whether the version in bullseye is still vulnerable, as it appears to be
> > according to the security tracker:
[...]
> It is still unfixed in bullseye TTBOMK, but would not warrant a DSA.
 Indeed, it's not yet fixed for Bullseye and doesn't warrant a DSA as
the max impact is an infinite loop in the user's own process.

> Can you propose a fix for it with cherry-picking the pull request
> changes for the next bullseye point release?
 Correct, it needs to go via Bullseye point update. I attached the
short change which has the original commit as Salvatore noted.

Sorry for the noise,
Laszlo/GCS
diff -Nru pypdf2-1.26.0/debian/changelog pypdf2-1.26.0/debian/changelog
--- pypdf2-1.26.0/debian/changelog	2020-01-19 09:08:58.0 +0100
+++ pypdf2-1.26.0/debian/changelog	2023-01-16 07:22:11.0 +0100
@@ -1,3 +1,10 @@
+pypdf2 (1.26.0-4+deb11u1) bullseye; urgency=high
+
+  * Backport fix for CVE-2022-24859: manipulated inline images can cause
+infinite loop (closes: #1009879).
+
+ -- Laszlo Boszormenyi (GCS)   Mon, 16 Jan 2023 07:22:11 +0100
+
 pypdf2 (1.26.0-4) unstable; urgency=medium
 
   * Remove Python 2 from build dependencies (closes: #937505).
diff -Nru pypdf2-1.26.0/debian/patches/CVE-2022-24859.patch pypdf2-1.26.0/debian/patches/CVE-2022-24859.patch
--- pypdf2-1.26.0/debian/patches/CVE-2022-24859.patch	1970-01-01 01:00:00.0 +0100
+++ pypdf2-1.26.0/debian/patches/CVE-2022-24859.patch	2023-01-16 00:10:42.0 +0100
@@ -0,0 +1,64 @@
+From d71fb3e6249a07682e8ebc456e26499923ff9031 Mon Sep 17 00:00:00 2001
+From: Sebastian Krause 
+Date: Fri, 15 Apr 2022 13:55:29 +0200
+Subject: [PATCH] SEC/PERF: ContentStream_readInlineImage (#740)
+
+Closes #329 - potential infinite loop (SEC)
+Closes #330 - performance issue of ContentStream._readInlineImage (PERF)
+---
+ PyPDF2/pdf.py | 32 ++--
+ 1 file changed, 22 insertions(+), 10 deletions(-)
+
+diff --git a/PyPDF2/pdf.py b/PyPDF2/pdf.py
+index 5bd4b7968..6d1824384 100644
+--- a/PyPDF2/pdf.py
 b/PyPDF2/pdf.py
+@@ -2723,11 +2723,25 @@ def _readInlineImage(self, stream):
+ # left at beginning of ID
+ tmp = stream.read(3)
+ assert tmp[:2] == b_("ID")
+-data = b_("")
++data = BytesIO()
++# Read the inline image, while checking for EI (End Image) operator.
+ while True:
+-# Read the inline image, while checking for EI (End Image) operator.
+-tok = stream.read(1)
+-if tok == b_("E"):
++# Read 8 kB at a time and check if the chunk contains the E operator.
++buf = stream.read(8192)
++# We have reached the end of the stream, but haven't found the EI operator.
++if not buf:
++raise utils.PdfReadError("Unexpected end of stream")
++loc = buf.find(b_("E"))
++
++if loc == -1:
++data.write(buf)
++else:
++# Write out everything before the E.
++data.write(buf[0:loc])
++
++# Seek back in the stream to read the E next.
++stream.seek(loc - len(buf), 1)
++tok = stream.read(1)
+ # Check for End Image
+ tok2 = stream.read(1)
+ if tok2 == b_("I"):
+@@ -2744,14 +2758,12 @@ def _readInlineImage(self, stream):
+ stream.seek(-1, 1)
+ break
+ else:
+-stream.seek(-1,1)
+-data += info
++stream.seek(-1, 1)
++data.write(info)
+ else:
+ stream.seek(-1, 1)
+-data += tok
+-else:
+-data += tok
+-return {"settings": settings, "data": data}
++data.write(tok)
++return {"settings": settings, "data": data.getvalue()}
+ 
+ def _getData(self):
+ newdata = BytesIO()
diff -Nru pypdf2-1.26.0/debian/patches/series pypdf2-1.26.0/debian/patches/series
--- pypdf2-1.26.0/debian/patches/series	2016-09-05 19:14:14.0 +0200
+++ pypdf2-1.26.0/debian/patches/series	2023-01-16 00:13:06.0 +0100
@@ -1 +1,2 @@
 Prevent_infinite_loop_in_readObject.patch
+CVE-2022-24859.patch


Bug#1028027: vice: contains non-free font file

2023-01-14 Thread GCS
Hi Bastian,

On Fri, Jan 6, 2023 at 3:00 AM Bastian Germann  wrote:
> The package includes C64_Pro_Mono-STYLE.ttf which has a non-free license.
> So please repack to get rid of it. As your package is in contrib, you can
> easily extract it to a new non-free package and depend on it.
 I have to check if a contrib package can or should depend on a
non-free one. At the moment I don't like the idea and switch back to
the previous free one instead.

Thanks for the note anyway,
Laszlo/GCS



Bug#1028559: pypdf2: replace with pypdf

2023-01-13 Thread GCS
Hi Daniel,

On Fri, Jan 13, 2023 at 1:36 AM Daniel Kahn Gillmor
 wrote:
> looks like PyPDF2 2.12.1 is the last version before a major
> (backward-incompatible) change in 3.0.0.  and PyPDF2 3.0.0 itself
> indicates that it is deprecated in favor of pypdf 3.x
 Indeed, that's the last backward compatible release.

> I've prepared some packaging for PyPDF2 2.12.1-0.1 and put it in salsa
> at https://salsa.debian.org/debian/pypdf
 Cool! But I still haven't checked. Hopefully I will check tomorrow morning.

> If that's someplace that you'd be up for collaborating, i'd be happy to
> help out on it with you there.
 I'm not sure if we know each other, but I have the knowledge that you
are a nice guy. Sure, I'm open to collaboration and Salsa is a good
place to start.

> We can probably also use the same repository (just different branches)
> for packaging pypdf, since i would expect that packaging to just inherit
> directly from the pypdf2 packaging, and it can be nice to have the
> history in the same location.
 I'm not sure what would be the best practices for this case, but
definitely a continued packaging is preferred from my side.

> Let me know if that's something you'd be up for collaboratong on,
> László!
 I'm even open to you taking over the package and making me an uploader.

> If you don't like it, i'm also happy to remove the repo from salsa.  I
> defer to you as the maintainer here.
 To be honest, I was going to look for an adopter for this package
this summer, probably after migrating it to src:pypdf. If you are
interested, even contributed already to the project then you are the
best candidate. As noted, you can take over immediately while leaving
me as an uploader for a while.

Best,
Laszlo/GCS



Bug#1027283: transition: tiff

2023-01-10 Thread GCS
On Tue, Jan 10, 2023 at 10:32 PM Sebastian Ramacher
 wrote:
> On 2023-01-08 09:07:37 +0100, László Böszörményi wrote:
> > Transition can start anytime upon RM decision.
>
> Please go ahead.
 Thanks, uploaded yesterday evening. Almost all builds are already done.

Cheers,
Laszlo/GCS



Bug#1027283: transition: tiff

2023-01-08 Thread GCS
On Sat, Dec 31, 2022 at 1:04 PM Sebastian Ramacher  wrote:
> On 2022-12-29 18:19:58 +0100, László Böszörményi wrote:
> > As tiff is used commonly and has security issues from time to time it
> > would be good to have its latest release in Debian. I don't know if
> > the old version will get any fixes or not.
>
> Understood. Please let us know once you're done with the test rebuilds
> and have filed all bugs.
 The situation has improved: gtk4 has been fixed and I've provided
drop-in patches for the other two, qtimageformats-opensource-src and
hylafax.
Transition can start anytime upon RM decision.

Regards,
Laszlo/GCS



Bug#1028118: transition: rocksdb

2023-01-07 Thread GCS
On Sat, Jan 7, 2023 at 11:53 AM Sebastian Ramacher  wrote:
> On 2023-01-07 08:42:37 +0100, László Böszörményi wrote:
> > I hope this transition gets green light despite this dependency
> > problem that needs to be resolved anyway. Main reason is a specific
> > memory corruption error fix in the 7.8.1 version of RocksDB.
>
> Please go ahead.
 Thanks, uploaded and just got accepted.

Cheers,
Laszlo/GCS



  1   2   3   4   5   6   7   8   9   10   >