Bug#1018718: marked as pending in apache2

2023-04-01 Thread Christoph Anton Mitterer
Hey.

Thanks for the fix.

Am I right that this *generally* does not longer enable apache2-
doc.conf per default (i.e. also on fresh installs)?

Causes that would also make it fix #977014.

Cheers,
Chris.



Bug#1033408: marked as done (apache2: Segmentation fault + 503 on frontpage on 2.4.56-1)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sun, 02 Apr 2023 03:19:14 +
with message-id 
and subject line Bug#1033408: fixed in apache2 2.4.56-2
has caused the Debian Bug report #1033408,
regarding apache2: Segmentation fault + 503 on frontpage on 2.4.56-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033408: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033408
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: apache2
Version: 2.4.56-1~deb11u1
Severity: important
X-Debbugs-Cc: t...@security.debian.org

Unattended-upgrades applied this new version on 22 march @ 6AM. Had
Segmentation faults since then, 503 for customers on websites. Since we
reverted back to 2.4.54, we've no more issues. Couldn't make any sense
of coredump but can provide one if necessary.


-- Package-specific info:

-- System Information:
Debian Release: 11.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-18-amd64 (SMP w/32 CPU threads)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages apache2 depends on:
ii  apache2-bin  2.4.56-1~deb11u1
ii  apache2-data 2.4.56-1~deb11u1
ii  apache2-utils2.4.56-1~deb11u1
ii  dpkg 1.20.12
ii  init-system-helpers  1.60
ii  lsb-base 11.1.0
ii  mime-support 3.66
ii  perl 5.32.1-4+deb11u2
ii  procps   2:3.3.17-5

Versions of packages apache2 recommends:
ii  ssl-cert  1.1.0+nmu1

Versions of packages apache2 suggests:
pn  apache2-doc  
pn  apache2-suexec-pristine | apache2-suexec-custom  
ii  lynx [www-browser]   2.9.0dev.6-3~deb11u1

Versions of packages apache2-bin depends on:
ii  libapr1  1.7.0-6+deb11u2
ii  libaprutil1  1.6.1-5+deb11u1
ii  libaprutil1-dbd-sqlite3  1.6.1-5+deb11u1
ii  libaprutil1-ldap 1.6.1-5+deb11u1
ii  libbrotli1   1.0.9-2+b2
ii  libc62.31-13+deb11u5
ii  libcrypt11:4.4.18-4
ii  libcurl4 7.74.0-1.3+deb11u7
ii  libjansson4  2.13.1-1.1
ii  libldap-2.4-22.4.57+dfsg-3+deb11u1
ii  liblua5.3-0  5.3.3-1.1+b1
ii  libnghttp2-141.43.0-1
ii  libpcre3 2:8.44-2+0~20210301.9+debian11~1.gbpa278ad
ii  libssl1.11.1.1n-0+deb11u4
ii  libxml2  2.9.14+dfsg-0+0~20220524.12+debian11~1.gbpc5dc45
ii  perl 5.32.1-4+deb11u2
ii  zlib1g   1:1.2.11.dfsg-2+deb11u2

Versions of packages apache2-bin suggests:
pn  apache2-doc  
pn  apache2-suexec-pristine | apache2-suexec-custom  
ii  lynx [www-browser]   2.9.0dev.6-3~deb11u1

Versions of packages apache2 is related to:
ii  apache2  2.4.56-1~deb11u1
ii  apache2-bin  2.4.56-1~deb11u1

-- Configuration Files:
/etc/apache2/apache2.conf changed [not included]
/etc/apache2/mods-available/mpm_event.conf changed [not included]
/etc/apache2/ports.conf changed [not included]
/etc/apache2/sites-available/000-default.conf changed [not included]

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: apache2
Source-Version: 2.4.56-2
Done: Yadd 

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd  (supplier of updated apache2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 02 Apr 2023 06:54:25 +0400
Source: apache2
Built-For-Profiles: nocheck
Architecture: source
Version: 2.4.56-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Apache Maintainers 
Changed-By: Yadd 
Closes: 1033284 1033408
Changes:
 apache2 (2.4.56-2) unstable; urgency=medium
 .
   * Fix regression in mod_rewrite introduced in version 

Processed: Bug#1033408 marked as pending in apache2

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1033408 [apache2] apache2: Segmentation fault + 503 on frontpage on 
2.4.56-1
Added tag(s) pending.

-- 
1033408: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033408
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Bug#1018718 marked as pending in apache2

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #1018718 [apache2-doc] apache2-doc: despite having been disabled, 
apache2-doc.conf gets rather silently re-enabled automatically
Added tag(s) pending.

-- 
1018718: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018718
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033408: marked as pending in apache2

2023-04-01 Thread Yadd
Control: tag -1 pending

Hello,

Bug #1033408 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/1f69bd10ac680a0b95e60c8c5a66e0d5633508c3


Fix regressions introduced in 2.4.56 (Closes: #1033408, #1033284)


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1033408



Bug#1018718: marked as pending in apache2

2023-04-01 Thread Yadd
Control: tag -1 pending

Hello,

Bug #1018718 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/330c94476d5801bdf8b4cea1200add1b84fcf6f3


Don't automatically enable apache2-doc.conf

Closes: #1018718


(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1018718



Bug#1028421: salt upstream lifecycle details

2023-04-01 Thread Federico Grau
Adding to this thread/bug-report per salt project and Debian packaging, salt
is unfortunately probably not a good candidate for the Debian ecosystem.


The salt project current (2023-04) published lifecycle only lists 1.5 years of
support for typical releases.  After that their "extended life support" is
really "best-effort technical support for customers" with "No bug fixes, [or]
security fixes".

This is clearly short of the Debian stable target support period of 3 years.



https://docs.saltproject.io/salt/install-guide/en/latest/topics/salt-version-support-lifecycle.html#salt-version-support-lifecycle


Salt Project Product support lifecycle excerpt:

Salt versionPhase 1 support endsPhase 2 support endsPhase 3 support 
endsExtended life support 

3005Feb 25, 2023Aug 25, 2023Feb 25, 2024
Feb 25, 2025
3004Apr 18, 2022Oct 18, 2022Apr 18, 2023
Apr 18, 2024
3003Sep 30, 2021Mar 31, 2022Sep 30, 2022
Sep 30, 2023
3002Apr 21, 2021Oct 21, 2021Apr 21, 2022
Apr 21, 2023
3001Dec 31, 2020Jun 30, 2021Dec 31, 2021
Dec 31, 2022
3000Aug 31, 2020Feb 28, 2021Aug 31, 2021
Aug 31, 2022
2019.2  Sep 30, 2019Mar 31, 2020Sep 30, 2020
Sep 30, 2021
2018.3  Oct 31, 2018Apr 30, 2019Oct 31, 2019
Oct 31, 2020
2017.7  Jan 31, 2018Jun 30, 2018Aug 30, 2019
Dec 31, 2019
2016.3  Nov 30, 2016May 31, 2017Nov 30, 2017
Nov 30, 2018
2015.8  Mar 31, 2016Sep 30, 2016Mar 31, 2017
Mar 31, 2018
2015.5  Nov 31, 2015May 31, 2016Nov 30, 2016
Nov 30, 2017
2014.7  May 31, 2015Nov 30, 2015May 31, 2016
May 31, 2017


regards,
donfede


signature.asc
Description: PGP signature


Bug#1032989: marked as done (Liferea 1.14.1-1 segfaults on startup when trying to read gsettings)

2023-04-01 Thread Martin Bergström

On 2023-04-01 19:57, Paul Gevers wrote:

I have uploaded a new upstream version that includes the fix for this 
issue, as well as fixes for some more crashes. I would appreciate it a 
lot if you could install the version from unstable once it's build and 
report back what your experience with that version is.


I'm not Grzegorz but I also had the problem and it is fixed with 
1.14.4-1. Thanks!




Processed: Remove moreinfo tag

2023-04-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1033732 - moreinfo
Bug #1033732 [src:linux] linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 
kernel launching crashes with a panic message
Removed tag(s) moreinfo.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1033732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033732
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 upstream
Bug #1033732 [src:linux] linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 
kernel launching crashes with a panic message
Added tag(s) upstream.

-- 
1033732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033732
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Diederik de Haas
Control: tag -1 upstream

On Saturday, 1 April 2023 22:47:35 CEST Guy Durrieu wrote:
> I just finished to build the patched kernel. 

Well done!

> After installing it, the system 6.1.0-7 boots again and run fine.
> Thus the source was well identified by Bjørn Mork.

This is great :-)

> I just had problems trying to install
> linux-headers-6.1.0-7-amd64_6.1.20-1a~test_amd64.deb, for dependencies
> reasons not so clear for me. It is not mandatory anyway.

Yeah, there are some improvements to be made for the procedure.

> Thanks a lot to all of you for your help !

You're welcome and thanks for doing this.

> What next ?

1) Now you get to brag to all your family and friends that you build a Linux 
kernel :-D
2) The commit that Bjørn identified also contained a "Link:" tag:
https://lore.kernel.org/r/20230105041059.39366-1-kvija...@amd.com

The best thing to do is to respond to that thread and explain the issue you 
ran into. At the bottom of the page you can find instructions on how to do 
that. The To/CC list is quite large, but don't be alarmed by that, that's 
rather common with kernel development. It's probably a good idea to add 
1033...@bugs.debian.org to that list.

The instructions also contain this part:
"Avoid top-posting and favor interleaved quoting"
That's what I've been doing and is considered rather important, so try your 
best to do that too.

In your reply you should put the following things:

1) Your system worked find with kernel 6.1.15, but stopped booting after 
upgrading to 6.1.20 and resulted in a kernel panic
2) Copy the part between "" from your initial report so that it shows the 
kernel panic, your motherboard info and the stack trace
3) Indicate that Bjørn identified ce7d894bed1a539a8d6cff42f6f78f9db0c9c26b from 
the linux-6.1.y branch as the likely culprit
4) After building a 6.1.20 kernel with just that commit reverted, your system 
booted normally again.
5) You reported that all to https://bugs.debian.org/1033732 and were asked to 
report the issue 'upstream' (which is what that mail is).

It could be that they'll ask you to test a patch. If it's just a simple/single 
patch you should be able to try that with the same procedure as you've already 
done, but replace the patch I provided with one they provide.
If you don't understand what they're asking or f.e. the kernel build is/seems 
too complicated, feel free to ask for help in (just) this bug.

Good luck and thanks in advance :-)

signature.asc
Description: This is a digitally signed message part.


Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu

Hello everybody,

I just finished to build the patched kernel. After installing it, the 
system 6.1.0-7 boots again and run fine. Thus the source was well 
identified by Bjørn Mork. I just had problems trying to install 
linux-headers-6.1.0-7-amd64_6.1.20-1a~test_amd64.deb, for dependencies 
reasons not so clear for me. It is not mandatory anyway.


Thanks a lot to all of you for your help !

What next ?

Best regards.

-- Guy

Le 01/04/2023 à 19:48, Guy Durrieu a écrit :

Thanks for your help !

That was more or less my conclusion, but it would indeed be useful to 
clarify that 4.1 and 4.21. are mutually exclusive.


And I must admit that the # vs $ steps had escaped me :(

Best regards.

-- Guy

Le 01/04/2023 à 18:56, Diederik de Haas a écrit :

On Saturday, 1 April 2023 17:44:21 CEST Guy Durrieu wrote:
I am in trouble... I first did "Obtaining the kernel source", and at 
the

end I got a /root/linux-source-6.1/ directory.

Then I did "Rebuilding official Debian kernel packages" and
"Preparation", and then I got among others a
/root/linux-source-6.1/linux-6.1.20 the content of which is similar to
the parent one, and where I can find, by the way, a debian directory.

It seems strange to me, is it correct?
No, this is not correct. No worries though as this is a great way to 
learn how

we can improve the documentation :-)

With "Preparation" I meant paragraph 4.2.1 and you don't need to 
follow 4.1.
Also worth noting is that command prefixed by `#` should be done as 
root, but

the commands prefixed by `$` should be done as (normal) user.

So this is what you need to do:
# apt-get install build-essential fakeroot
# apt-get build-dep linux

While we're 'root', do this too:
# apt-get install devscripts

And then (as user):
$ apt-get source linux
$ cd linux-6.1.20

If you then do ``ls -lh`` you will see a ``debian`` directory.
So now you can run this:
$ bash debian/bin/test-patches 

And now it should build a patched kernel for you.


If it is correct, in what order to do the patches (debian patches and
the revert patch)?
When you look at the output of the ``apt-get source linux`` you'll 
see it
download the linux source code and (automatically) applies the debian 
patches

which are always applied when building a debian kernel.
This is excluding the patch I send earlier, but that gets applied 
when you run

the ``bash debian/bin/test-patches`` command.

HTH,
Diederik




Processed: bug 1033805 is forwarded to https://github.com/trusteddomainproject/OpenDMARC/issues/183

2023-04-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 1033805 https://github.com/trusteddomainproject/OpenDMARC/issues/183
Bug #1033805 [opendmarc] opendmarc: Segmentation fault with 3072-bit key 
signatures in ARC-Seal headers
Set Bug forwarded-to-address to 
'https://github.com/trusteddomainproject/OpenDMARC/issues/183'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1033805: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033805
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: found 1033805 in 1.4.2-2

2023-04-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 1033805 1.4.2-2
Bug #1033805 [opendmarc] opendmarc: Segmentation fault with 3072-bit key 
signatures in ARC-Seal headers
Marked as found in versions opendmarc/1.4.2-2.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1033805: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033805
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033806: libntru: autopkgtest regression: undefined reference

2023-04-01 Thread Paul Gevers

Source: libntru
Version: 0.5-2
Severity: serious
Control: tags -1 bookworm-ignore
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

Your package has an autopkgtest, great. However, it fails. Can you 
please investigate the situation and fix it? I copied some of the output 
at the bottom of this report.


The release team has announced [1] that failing autopkgtest on amd64 and 
arm64 are considered RC in testing. [Release Team member hat on] I'm 
slightly worried that this test failure points at a real problem with 
the library, but because we're currently in the hard freeze for 
bookworm, I have marked this bug as bookworm-ignore. Targeted fixes are 
still welcome. Please remove the bookworm-ignore tag if the library is 
broken as it is.


More information about this bug and the reason for filing it can be 
found on 
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation


Paul

[1] https://lists.debian.org/debian-devel-announce/2019/07/msg2.html

https://ci.debian.net/data/autopkgtest/testing/amd64/libn/libntru/32095885/log.gz

autopkgtest [16:23:12]: test benchmark: [---
/usr/bin/ld: /tmp/cc3rAheI.o: warning: relocation against `EES761EP1' in 
read-only section `.text.startup'

/usr/bin/ld: /tmp/cc3rAheI.o: in function `main':
bench.c:(.text.startup+0x39): undefined reference to 
`ntru_rand_default_init'
/usr/bin/ld: bench.c:(.text.startup+0x40): undefined reference to 
`ntru_rand_default_generate'
/usr/bin/ld: bench.c:(.text.startup+0x54): undefined reference to 
`EES401EP1'
/usr/bin/ld: bench.c:(.text.startup+0x5c): undefined reference to 
`EES401EP1'
/usr/bin/ld: bench.c:(.text.startup+0x63): undefined reference to 
`EES401EP1'
/usr/bin/ld: bench.c:(.text.startup+0x6b): undefined reference to 
`EES449EP1'
/usr/bin/ld: bench.c:(.text.startup+0x7a): undefined reference to 
`EES401EP1'
/usr/bin/ld: bench.c:(.text.startup+0x89): undefined reference to 
`EES401EP1'
/usr/bin/ld: bench.c:(.text.startup+0x98): undefined reference to 
`EES449EP1'
/usr/bin/ld: bench.c:(.text.startup+0xa7): undefined reference to 
`EES449EP1'
/usr/bin/ld: bench.c:(.text.startup+0xb5): undefined reference to 
`EES449EP1'
/usr/bin/ld: bench.c:(.text.startup+0xc4): undefined reference to 
`EES449EP1'
/usr/bin/ld: bench.c:(.text.startup+0xd3): undefined reference to 
`EES677EP1'
/usr/bin/ld: bench.c:(.text.startup+0xe2): undefined reference to 
`EES677EP1'
/usr/bin/ld: bench.c:(.text.startup+0xf0): undefined reference to 
`EES677EP1'
/usr/bin/ld: bench.c:(.text.startup+0xff): undefined reference to 
`EES677EP1'
/usr/bin/ld: bench.c:(.text.startup+0x10e): undefined reference to 
`EES677EP1'
/usr/bin/ld: bench.c:(.text.startup+0x11d): undefined reference to 
`EES1087EP2'
/usr/bin/ld: bench.c:(.text.startup+0x141): undefined reference to 
`EES1087EP2'
/usr/bin/ld: bench.c:(.text.startup+0x149): undefined reference to 
`EES1087EP2'
/usr/bin/ld: bench.c:(.text.startup+0x151): undefined reference to 
`EES1087EP2'
/usr/bin/ld: bench.c:(.text.startup+0x158): undefined reference to 
`EES1087EP2'
/usr/bin/ld: bench.c:(.text.startup+0x167): undefined reference to 
`EES541EP1'
/usr/bin/ld: bench.c:(.text.startup+0x176): undefined reference to 
`EES541EP1'
/usr/bin/ld: bench.c:(.text.startup+0x185): undefined reference to 
`EES541EP1'
/usr/bin/ld: bench.c:(.text.startup+0x194): undefined reference to 
`EES541EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1a2): undefined reference to 
`EES541EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1b1): undefined reference to 
`EES613EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1c0): undefined reference to 
`EES613EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1cf): undefined reference to 
`EES613EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1dd): undefined reference to 
`EES613EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1ec): undefined reference to 
`EES613EP1'
/usr/bin/ld: bench.c:(.text.startup+0x1fb): undefined reference to 
`EES887EP1'
/usr/bin/ld: bench.c:(.text.startup+0x20a): undefined reference to 
`EES887EP1'
/usr/bin/ld: bench.c:(.text.startup+0x22e): undefined reference to 
`EES887EP1'
/usr/bin/ld: bench.c:(.text.startup+0x235): undefined reference to 
`EES887EP1'
/usr/bin/ld: bench.c:(.text.startup+0x23d): undefined reference to 
`EES887EP1'
/usr/bin/ld: bench.c:(.text.startup+0x245): undefined reference to 
`EES1171EP1'
/usr/bin/ld: bench.c:(.text.startup+0x24d): undefined reference to 
`EES1171EP1'
/usr/bin/ld: bench.c:(.text.startup+0x255): undefined reference to 
`EES1171EP1'
/usr/bin/ld: bench.c:(.text.startup+0x264): undefined reference to 
`EES1171EP1'
/usr/bin/ld: bench.c:(.text.startup+0x26b): undefined reference to 
`EES1171EP1'
/usr/bin/ld: bench.c:(.text.startup+0x27a): undefined reference to 
`EES659EP1'
/usr/bin/ld: bench.c:(.text.startup+0x289): undefined reference to 
`EES659EP1'
/usr/bin/ld: bench.c:(.text.startup+0x297): undefined reference to 
`EES659EP1'
/usr/bin/ld: bench.c:(.text.startup+0x2a6): undefined reference to 

Processed: libntru: autopkgtest regression: undefined reference

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 bookworm-ignore
Bug #1033806 [src:libntru] libntru: autopkgtest regression: undefined reference
Added tag(s) bookworm-ignore.

-- 
1033806: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033805: opendmarc: Segmentation fault with 3072-bit key signatures in ARC-Seal headers

2023-04-01 Thread Scott Kitterman
Package: opendmarc
Version: 1.4.0~beta1+dfsg-6+deb11u1
Severity: serious
Tags: upstream patch
Justification: Maintainer designation

Currently opendmarc in Stable, Testing, and Unstable will crash if they
key used in an ARC header field is 3072 bit RSA or longer.  This really
needs to be fixed prior to release since, in normal usage, when a milter
crashes it stops all mail flow on the system.  Since the key size is an
attribute decided by the sending domain, there's no work around on the
receiver side to avoid the specific keys at issue.

Longer RSA keys are becoming more common and this trend will continue
through Bookworm's life, so the impact will only grow.

Patch available in the upstream GitHub repository:

https://github.com/trusteddomainproject/OpenDMARC/issues/183

Scott K



Bug#1029215: marked as done (debian-archive-keyring: bookworm SRM key)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 18:32:08 +
with message-id 
and subject line Bug#1029215: fixed in debian-archive-keyring 2021.1.1+deb11u1
has caused the Debian Bug report #1029215,
regarding debian-archive-keyring: bookworm SRM key
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1029215: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029215
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: debian-archive-keyring
Version: 2021.1.1
Severity: serious
X-Debbugs-Cc: debian-rele...@lists.debian.org

Hi,

We need an SRM key for bookworm, so that we can include it in the
release.

Regards,

Adam
--- End Message ---
--- Begin Message ---
Source: debian-archive-keyring
Source-Version: 2021.1.1+deb11u1
Done: Jonathan Wiltshire 

We believe that the bug you reported is fixed in the latest version of
debian-archive-keyring, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1029...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonathan Wiltshire  (supplier of updated 
debian-archive-keyring package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Mar 2023 14:53:41 +
Source: debian-archive-keyring
Architecture: source
Version: 2021.1.1+deb11u1
Distribution: bullseye
Urgency: medium
Maintainer: Debian Release Team 
Changed-By: Jonathan Wiltshire 
Closes: 1029214 1029215
Changes:
 debian-archive-keyring (2021.1.1+deb11u1) bullseye; urgency=medium
 .
   * Update my key and refresh signature
   * Remove stretch's keys (automatic and release)
   * Add Debian Stable Release Key (12/bookworm) (ID: 0xF8D2585B8783D481)
 (Closes: #1029215)
   * Add automatic signing keys for bookworm (Closes: #1029214)
   * Add debian/gbp.conf to make future maintenance easier
Checksums-Sha1:
 f169b4e058d39b5aaddab3fd26756b0fe44c39bb 1301 
debian-archive-keyring_2021.1.1+deb11u1.dsc
 493c46c890db47a95b468130a8df5917b4efafae 174768 
debian-archive-keyring_2021.1.1+deb11u1.tar.xz
 cfdfdf8a1ed0ea2ff36c80760626f60f852088f1 9601 
debian-archive-keyring_2021.1.1+deb11u1_source.buildinfo
Checksums-Sha256:
 afde187bdb36b807ab71eb0a5803d35a0a19265ff9ca47cb140f9f26aef2d6dd 1301 
debian-archive-keyring_2021.1.1+deb11u1.dsc
 7beff096d7293d019de8007d3425dbbcb18009b5780e6d0e172f57f5b6b300ae 174768 
debian-archive-keyring_2021.1.1+deb11u1.tar.xz
 e1b77624b6690c850cdbf10b111801afbba641893fce351cd88c731fec8940c3 9601 
debian-archive-keyring_2021.1.1+deb11u1_source.buildinfo
Files:
 a2f12238f9a4248bf2710745ccf1ff31 1301 misc important 
debian-archive-keyring_2021.1.1+deb11u1.dsc
 a5604f50247c54cab2636618e8dc 174768 misc important 
debian-archive-keyring_2021.1.1+deb11u1.tar.xz
 8dc687d0fefff2a72eb992289f846923 9601 misc important 
debian-archive-keyring_2021.1.1+deb11u1_source.buildinfo

-BEGIN PGP SIGNATURE-

iIUEARYKAC0WIQTdFzjfLGn8URFmteMDXuYJgEtROQUCZBXWdg8cam13QGRlYmlh
bi5vcmcACgkQA17mCYBLUTmZtgEAmtuQ/yC/VrjI3nZwnNJG4o36twXkWJ42s6iv
0RI6ahAA/0eaU6odNlEuih9XZ02RVGDyFz7c3iFCkLgihxdK3ywO
=XOIB
-END PGP SIGNATURE End Message ---


Bug#1029214: marked as done (debian-archive-keyring: bookworm archive signing keys)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 18:32:08 +
with message-id 
and subject line Bug#1029214: fixed in debian-archive-keyring 2021.1.1+deb11u1
has caused the Debian Bug report #1029214,
regarding debian-archive-keyring: bookworm archive signing keys
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1029214: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029214
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: debian-archive-keyring
Version: 2021.1.1
Severity: serious
X-Debbugs-Cc: ftpmas...@debian.org, debian-rele...@lists.debian.org

Hi,

We need new archive signing keys for bookworm, so that we can include
them in the release.

Regards,

Adam
--- End Message ---
--- Begin Message ---
Source: debian-archive-keyring
Source-Version: 2021.1.1+deb11u1
Done: Jonathan Wiltshire 

We believe that the bug you reported is fixed in the latest version of
debian-archive-keyring, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1029...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonathan Wiltshire  (supplier of updated 
debian-archive-keyring package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Mar 2023 14:53:41 +
Source: debian-archive-keyring
Architecture: source
Version: 2021.1.1+deb11u1
Distribution: bullseye
Urgency: medium
Maintainer: Debian Release Team 
Changed-By: Jonathan Wiltshire 
Closes: 1029214 1029215
Changes:
 debian-archive-keyring (2021.1.1+deb11u1) bullseye; urgency=medium
 .
   * Update my key and refresh signature
   * Remove stretch's keys (automatic and release)
   * Add Debian Stable Release Key (12/bookworm) (ID: 0xF8D2585B8783D481)
 (Closes: #1029215)
   * Add automatic signing keys for bookworm (Closes: #1029214)
   * Add debian/gbp.conf to make future maintenance easier
Checksums-Sha1:
 f169b4e058d39b5aaddab3fd26756b0fe44c39bb 1301 
debian-archive-keyring_2021.1.1+deb11u1.dsc
 493c46c890db47a95b468130a8df5917b4efafae 174768 
debian-archive-keyring_2021.1.1+deb11u1.tar.xz
 cfdfdf8a1ed0ea2ff36c80760626f60f852088f1 9601 
debian-archive-keyring_2021.1.1+deb11u1_source.buildinfo
Checksums-Sha256:
 afde187bdb36b807ab71eb0a5803d35a0a19265ff9ca47cb140f9f26aef2d6dd 1301 
debian-archive-keyring_2021.1.1+deb11u1.dsc
 7beff096d7293d019de8007d3425dbbcb18009b5780e6d0e172f57f5b6b300ae 174768 
debian-archive-keyring_2021.1.1+deb11u1.tar.xz
 e1b77624b6690c850cdbf10b111801afbba641893fce351cd88c731fec8940c3 9601 
debian-archive-keyring_2021.1.1+deb11u1_source.buildinfo
Files:
 a2f12238f9a4248bf2710745ccf1ff31 1301 misc important 
debian-archive-keyring_2021.1.1+deb11u1.dsc
 a5604f50247c54cab2636618e8dc 174768 misc important 
debian-archive-keyring_2021.1.1+deb11u1.tar.xz
 8dc687d0fefff2a72eb992289f846923 9601 misc important 
debian-archive-keyring_2021.1.1+deb11u1_source.buildinfo

-BEGIN PGP SIGNATURE-

iIUEARYKAC0WIQTdFzjfLGn8URFmteMDXuYJgEtROQUCZBXWdg8cam13QGRlYmlh
bi5vcmcACgkQA17mCYBLUTmZtgEAmtuQ/yC/VrjI3nZwnNJG4o36twXkWJ42s6iv
0RI6ahAA/0eaU6odNlEuih9XZ02RVGDyFz7c3iFCkLgihxdK3ywO
=XOIB
-END PGP SIGNATURE End Message ---


Bug#1027954: marked as done (cppad: binary-all FTBFS)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 18:00:12 +
with message-id 
and subject line Bug#1027954: fixed in cppad 2023.00.00.0-2
has caused the Debian Bug report #1027954,
regarding cppad: binary-all FTBFS
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1027954: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027954
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: cppad
Version: 2023.00.00.0-1
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/fetch.php?pkg=cppad=all=2023.00.00.0-1=1672887350=0

...
   dh_installdocs -i -O--buildsystem=cmake
dh_installdocs: error: Cannot find (any matches for) "doc.omh" (tried in ., 
debian/tmp)

make: *** [debian/rules:6: binary-indep] Error 25
--- End Message ---
--- Begin Message ---
Source: cppad
Source-Version: 2023.00.00.0-2
Done: Barak A. Pearlmutter 

We believe that the bug you reported is fixed in the latest version of
cppad, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1027...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Barak A. Pearlmutter  (supplier of updated cppad package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 29 Mar 2023 09:46:00 +0100
Source: cppad
Binary: libcppad-dev libcppad-doc libcppad-lib1456.0 libcppad-lib1456.0-dbgsym
Architecture: source amd64 all
Version: 2023.00.00.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Team 

Changed-By: Barak A. Pearlmutter 
Description:
 libcppad-dev - Automatic Differentiation of C++ algorithms, dev files
 libcppad-doc - Automatic Differentiation of C++ algorithms, documentation
 libcppad-lib1456.0 - Automatic Differentiation of C++ algorithms, shared 
library
Closes: 1027954
Changes:
 cppad (2023.00.00.0-2) unstable; urgency=medium
 .
   * Stop trying to install old format ohm documentation (closes: #1027954)
   * Don't try to build documents from new format xrst documentation
   * Change soname, rename libcppad-lib 340.3 to 1456.0
   * Update debian/copyright
   * Update relationship to old cppad package per lintian
Checksums-Sha1:
 5dad2959741c58b5c52643674f6b38e4f9845c19 2146 cppad_2023.00.00.0-2.dsc
 668f0083da1f22b9181a624da61de1482db2931c 7992 
cppad_2023.00.00.0-2.debian.tar.xz
 31515a3f1c8326506d8012c23aaf8ed9a802791b 14337 
cppad_2023.00.00.0-2_amd64.buildinfo
 b752ee8b2e34e1cf894aa3e584437ec7b98bc82a 379456 
libcppad-dev_2023.00.00.0-2_amd64.deb
 41ff576a1e9e45b04e9100e5bc2d6ebddf61c2a4 7308 
libcppad-doc_2023.00.00.0-2_all.deb
 fce0c6f536e7d7cfa0c8e8d16b92467c5059b27d 750048 
libcppad-lib1456.0-dbgsym_2023.00.00.0-2_amd64.deb
 2ec00671143342fcfeda5bfde7e47f372e43911e 57224 
libcppad-lib1456.0_2023.00.00.0-2_amd64.deb
Checksums-Sha256:
 bd7ff29c01b6f27298878de27d1abf384deb15d8cb4bc1b24f8da3de757a5baf 2146 
cppad_2023.00.00.0-2.dsc
 137086b4fd158da7b693b9c58bcce0350f6f335d90c7a48f38437437b04be2da 7992 
cppad_2023.00.00.0-2.debian.tar.xz
 6bf96e5be874c5969a42f8c0006d6bf6f04f56034b11bc57888168d7b9faadd4 14337 
cppad_2023.00.00.0-2_amd64.buildinfo
 b707a4ab8dd732424d0f59f042a3e3ea5a2856b941e81b7138530f5608649e98 379456 
libcppad-dev_2023.00.00.0-2_amd64.deb
 b9e93d7f69b671743d792438634894901f79315412f62e4334396b06dc3199c4 7308 
libcppad-doc_2023.00.00.0-2_all.deb
 84f5eea57927cbb69bd25e0af4286453d5dbba37d6c0ebf4e26bb43a9382110c 750048 
libcppad-lib1456.0-dbgsym_2023.00.00.0-2_amd64.deb
 a47746e5f085a4088ec617788eeed548adfa1f3188cded940fa3531c5956ff99 57224 
libcppad-lib1456.0_2023.00.00.0-2_amd64.deb
Files:
 1d7c6baa52c433d4c58b05206a076384 2146 devel optional cppad_2023.00.00.0-2.dsc
 dec9b3e82bc7f55d6cd33035cf2aeda7 7992 devel optional 
cppad_2023.00.00.0-2.debian.tar.xz
 53c1fa54bd72aa422de72488cb1a4b23 14337 devel optional 
cppad_2023.00.00.0-2_amd64.buildinfo
 36da377bbef0e1f88a4ab8201c315141 379456 libdevel optional 
libcppad-dev_2023.00.00.0-2_amd64.deb
 728864610bfab59f5b5d446b27689824 7308 doc optional 
libcppad-doc_2023.00.00.0-2_all.deb
 91ea1f808e799c7fd7fa374613ef139a 750048 debug optional 
libcppad-lib1456.0-dbgsym_2023.00.00.0-2_amd64.deb
 f5006f977d577f2935bbebbbca1ce003 57224 libs optional 

Bug#1032989: marked as done (Liferea 1.14.1-1 segfaults on startup when trying to read gsettings)

2023-04-01 Thread Paul Gevers

Hi Grzegorz, H.-Dirk

On 01-04-2023 19:54, Debian Bug Tracking System wrote:

This means that you claim that the problem has been dealt with.


I have uploaded a new upstream version that includes the fix for this 
issue, as well as fixes for some more crashes. I would appreciate it a 
lot if you could install the version from unstable once it's build and 
report back what your experience with that version is.


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Processed: Re: libdancer2-plugin-database-perl: FTBFS randomly (failing tests)

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 serious
Bug #923824 [src:libdancer2-plugin-database-perl] 
libdancer2-plugin-database-perl: FTBFS randomly (failing tests)
Severity set to 'serious' from 'important'
> tags -1 bookworm-ignore
Bug #923824 [src:libdancer2-plugin-database-perl] 
libdancer2-plugin-database-perl: FTBFS randomly (failing tests)
Added tag(s) bookworm-ignore.

-- 
923824: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923824
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1032989: marked as done (Liferea 1.14.1-1 segfaults on startup when trying to read gsettings)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 17:50:26 +
with message-id 
and subject line Bug#1032989: fixed in liferea 1.14.4-1
has caused the Debian Bug report #1032989,
regarding Liferea 1.14.1-1 segfaults on startup when trying to read gsettings
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032989: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032989
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: liferea
Version: 1.14.1-1

Dear Maintainer,

After I have upgraded liferea from 1.14.0-1 to 1.14.1-1 today, it no
longer starts, segfaulting when trying to read the "enable-reader-mode"
setting. I have attached (liferea.crash) the result of the following
command:

gdb -batch -n -ex 'set pagination off' -ex run -ex bt -ex 'bt full' -ex 
'thread apply all bt full' --args liferea

from which the short summary is:

Thread 1 "liferea" received signal SIGSEGV, Segmentation fault.
0x55577a6e in conf_get_bool_value_from_schema (gsettings=, gsettings@entry=0x0, key=key@entry=0x555cb33a "enable-reader-mode", 
value=value@entry=0x54) at ../conf.c:258
258 *value = g_settings_get_boolean (gsettings,key);

Let me know if there is more info I can provide to help.

-- 
Grzegorz Szymaszek
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[New Thread 0x7fffebdff6c0 (LWP 202012)]
[New Thread 0x7fffeb5fe6c0 (LWP 202013)]
[New Thread 0x7fffeadfd6c0 (LWP 202014)]
[New Thread 0x7fffea5fc6c0 (LWP 202015)]
[Detaching after fork from child process 202016]
[New Thread 0x7fffdbfff6c0 (LWP 202017)]
[Thread 0x7fffdbfff6c0 (LWP 202017) exited]
[New Thread 0x7fffdbfff6c0 (LWP 202018)]
[New Thread 0x7fffdb7fe6c0 (LWP 202019)]
[Thread 0x7fffdbfff6c0 (LWP 202018) exited]
[Thread 0x7fffdb7fe6c0 (LWP 202019) exited]
[New Thread 0x7fffdb7fe6c0 (LWP 202020)]
[New Thread 0x7fffdbfff6c0 (LWP 202021)]
[Thread 0x7fffdb7fe6c0 (LWP 202020) exited]
[Thread 0x7fffdbfff6c0 (LWP 202021) exited]
[New Thread 0x7fffdbfff6c0 (LWP 202022)]
[New Thread 0x7fffdb7fe6c0 (LWP 202023)]
[Thread 0x7fffdbfff6c0 (LWP 202022) exited]
[Thread 0x7fffdb7fe6c0 (LWP 202023) exited]
[New Thread 0x7fffdb7fe6c0 (LWP 202024)]
[New Thread 0x7fffdbfff6c0 (LWP 202025)]
[Thread 0x7fffdb7fe6c0 (LWP 202024) exited]
[Thread 0x7fffdbfff6c0 (LWP 202025) exited]
[New Thread 0x7fffdbfff6c0 (LWP 202026)]
[New Thread 0x7fffdb7fe6c0 (LWP 202027)]
[Thread 0x7fffdbfff6c0 (LWP 202026) exited]
[Thread 0x7fffdb7fe6c0 (LWP 202027) exited]

Thread 1 "liferea" received signal SIGSEGV, Segmentation fault.
0x55577a6e in conf_get_bool_value_from_schema (gsettings=, gsettings@entry=0x0, key=key@entry=0x555cb33a "enable-reader-mode", 
value=value@entry=0x54) at ../conf.c:258
258 *value = g_settings_get_boolean (gsettings,key);
#0  0x55577a6e in conf_get_bool_value_from_schema (gsettings=, gsettings@entry=0x0, key=key@entry=0x555cb33a "enable-reader-mode", 
value=value@entry=0x54) at ../conf.c:258
#1  0x555a74fd in liferea_browser_update (browser=0x0, mode=1) at 
./src/ui/liferea_browser.c:727
#2  0x555a54e7 in itemview_update () at ./src/ui/itemview.c:297
#3  0x555851cd in itemlist_merge_itemset 
(itemSet=itemSet@entry=0x564b7740) at ../itemlist.c:299
#4  0x55585405 in itemlist_load (node=node@entry=0x55eb2cc0) at 
../itemlist.c:354
#5  0x5558170d in feedlist_selection_changed (obj=, 
nodeId=0x56438d20 "jnwlxys", data=) at ../feedlist.c:585
#9  0x73c8ffd8 in  (instance=0x55b45400, 
detailed_signal=detailed_signal@entry=0x555c04ce "selection-changed") at 
../../../gobject/gsignal.c:3648
#6  0x73c763b0 in g_closure_invoke (closure=0x55fdc420, 
return_value=return_value@entry=0x0, n_param_values=2, 
param_values=param_values@entry=0x7fffb770, 
invocation_hint=invocation_hint@entry=0x7fffb6f0) at 
../../../gobject/gclosure.c:832
#7  0x73c89076 in signal_emit_unlocked_R 
(node=node@entry=0x55840800, detail=detail@entry=0, 
instance=instance@entry=0x55b45400, 
emission_return=emission_return@entry=0x0, 
instance_and_params=instance_and_params@entry=0x7fffb770) at 
../../../gobject/gsignal.c:3796
#8  0x73c8fbf5 in g_signal_emit_valist 
(instance=instance@entry=0x55b45400, signal_id=signal_id@entry=282, 
detail=, var_args=var_args@entry=0x7fffb928) at 
../../../gobject/gsignal.c:3549
#10 0x555a2fdd in feed_list_view_selection_changed_cb 
(selection=, data=) at 
./src/ui/feed_list_view.c:134
#11 

Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu

Thanks for your help !

That was more or less my conclusion, but it would indeed be useful to 
clarify that 4.1 and 4.21. are mutually exclusive.


And I must admit that the # vs $ steps had escaped me :(

Best regards.

-- Guy

Le 01/04/2023 à 18:56, Diederik de Haas a écrit :

On Saturday, 1 April 2023 17:44:21 CEST Guy Durrieu wrote:

I am in trouble... I first did "Obtaining the kernel source", and at the
end I got a /root/linux-source-6.1/ directory.

Then I did "Rebuilding official Debian kernel packages" and
"Preparation", and then I got among others a
/root/linux-source-6.1/linux-6.1.20 the content of which is similar to
the parent one, and where I can find, by the way, a debian directory.

It seems strange to me, is it correct?
No, this is not correct. No worries though as this is a great way to 
learn how

we can improve the documentation :-)

With "Preparation" I meant paragraph 4.2.1 and you don't need to 
follow 4.1.
Also worth noting is that command prefixed by `#` should be done as 
root, but

the commands prefixed by `$` should be done as (normal) user.

So this is what you need to do:
# apt-get install build-essential fakeroot
# apt-get build-dep linux

While we're 'root', do this too:
# apt-get install devscripts

And then (as user):
$ apt-get source linux
$ cd linux-6.1.20

If you then do ``ls -lh`` you will see a ``debian`` directory.
So now you can run this:
$ bash debian/bin/test-patches 

And now it should build a patched kernel for you.


If it is correct, in what order to do the patches (debian patches and
the revert patch)?

When you look at the output of the ``apt-get source linux`` you'll see it
download the linux source code and (automatically) applies the debian 
patches

which are always applied when building a debian kernel.
This is excluding the patch I send earlier, but that gets applied when 
you run

the ``bash debian/bin/test-patches`` command.

HTH,
Diederik




Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu

Thanks for your help !

That was more or less my conclusion, but it would indeed be useful to 
clarify that 4.1 and 4.21. are mutually exclusive.


And I must admit that the # vs $ steps had escaped me :(

Best regards.

-- Guy

Le 01/04/2023 à 18:56, Diederik de Haas a écrit :

On Saturday, 1 April 2023 17:44:21 CEST Guy Durrieu wrote:

I am in trouble... I first did "Obtaining the kernel source", and at the
end I got a /root/linux-source-6.1/ directory.

Then I did "Rebuilding official Debian kernel packages" and
"Preparation",  and then I got among others a
/root/linux-source-6.1/linux-6.1.20 the content of which is similar to
the parent one, and where I can find, by the way, a debian directory.

It seems strange to me, is it correct?

No, this is not correct. No worries though as this is a great way to learn how
we can improve the documentation :-)

With "Preparation" I meant paragraph 4.2.1 and you don't need to follow 4.1.
Also worth noting is that command prefixed by `#` should be done as root, but
the commands prefixed by `$` should be done as (normal) user.

So this is what you need to do:
# apt-get install build-essential fakeroot
# apt-get build-dep linux

While we're 'root', do this too:
# apt-get install devscripts

And then (as user):
$ apt-get source linux
$ cd linux-6.1.20

If you then do ``ls -lh`` you will see a ``debian`` directory.
So now you can run this:
$ bash debian/bin/test-patches 

And now it should build a patched kernel for you.


If it is correct, in what order to do the patches (debian patches and
the revert patch)?

When you look at the output of the ``apt-get source linux`` you'll see it
download the linux source code and (automatically) applies the debian patches
which are always applied when building a debian kernel.
This is excluding the patch I send earlier, but that gets applied when you run
the ``bash debian/bin/test-patches`` command.

HTH,
   Diederik




Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Diederik de Haas
On Saturday, 1 April 2023 17:44:21 CEST Guy Durrieu wrote:
> I am in trouble... I first did "Obtaining the kernel source", and at the
> end I got a /root/linux-source-6.1/ directory.
> 
> Then I did "Rebuilding official Debian kernel packages" and
> "Preparation",  and then I got among others a
> /root/linux-source-6.1/linux-6.1.20 the content of which is similar to
> the parent one, and where I can find, by the way, a debian directory.
> 
> It seems strange to me, is it correct?

No, this is not correct. No worries though as this is a great way to learn how 
we can improve the documentation :-)

With "Preparation" I meant paragraph 4.2.1 and you don't need to follow 4.1.
Also worth noting is that command prefixed by `#` should be done as root, but 
the commands prefixed by `$` should be done as (normal) user.

So this is what you need to do:
# apt-get install build-essential fakeroot
# apt-get build-dep linux

While we're 'root', do this too:
# apt-get install devscripts

And then (as user):
$ apt-get source linux
$ cd linux-6.1.20

If you then do ``ls -lh`` you will see a ``debian`` directory.
So now you can run this:
$ bash debian/bin/test-patches 

And now it should build a patched kernel for you.

> If it is correct, in what order to do the patches (debian patches and
> the revert patch)?

When you look at the output of the ``apt-get source linux`` you'll see it 
download the linux source code and (automatically) applies the debian patches 
which are always applied when building a debian kernel.
This is excluding the patch I send earlier, but that gets applied when you run 
the ``bash debian/bin/test-patches`` command.

HTH,
  Diederik

signature.asc
Description: This is a digitally signed message part.


Bug#1033431: marked as done (cookiecutter: FTBFS in testing: dh_auto_test: error: pybuild --test -i python{version} -p 3.11 returned exit code 13)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 16:03:55 +
with message-id 
and subject line Bug#1033431: fixed in cookiecutter 1.7.3-3
has caused the Debian Bug report #1033431,
regarding cookiecutter: FTBFS in testing: dh_auto_test: error: pybuild --test 
-i python{version} -p 3.11 returned exit code 13
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033431: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033431
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: cookiecutter
Version: 1.7.3-2
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20230323 ftbfs-bookworm

Hi,

During a rebuild of all packages in testing (bookworm), your package failed
to build on amd64.


Relevant part (hopefully):
>  debian/rules build
> dh build --with python3,sphinxdoc --buildsystem=pybuild
>dh_update_autotools_config -O--buildsystem=pybuild
>dh_autoreconf -O--buildsystem=pybuild
>dh_auto_configure -O--buildsystem=pybuild
> I: pybuild base:240: python3.11 setup.py config 
> running config
>dh_auto_build -O--buildsystem=pybuild
> I: pybuild base:240: /usr/bin/python3 setup.py build 
> running build
> running build_py
> creating 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/hooks.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/extensions.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/__main__.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/main.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/exceptions.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/__init__.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/prompt.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/config.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/log.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/repository.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/generate.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/replay.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/find.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/vcs.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/zipfile.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/cli.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/utils.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> copying cookiecutter/environment.py -> 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build/cookiecutter
> running egg_info
> creating cookiecutter.egg-info
> writing cookiecutter.egg-info/PKG-INFO
> writing dependency_links to cookiecutter.egg-info/dependency_links.txt
> writing entry points to cookiecutter.egg-info/entry_points.txt
> writing requirements to cookiecutter.egg-info/requires.txt
> writing top-level names to cookiecutter.egg-info/top_level.txt
> writing manifest file 'cookiecutter.egg-info/SOURCES.txt'
> reading manifest file 'cookiecutter.egg-info/SOURCES.txt'
> reading manifest template 'MANIFEST.in'
> warning: no files found matching 'AUTHORS.rst'
> warning: no files found matching 'CONTRIBUTING.rst'
> warning: no files found matching 'HISTORY.rst'
> warning: no files found matching 'README.rst'
> warning: no previously-included files matching '__pycache__' found under 
> directory '*'
> warning: no previously-included files matching '*.py[co]' found under 
> directory '*'
> adding license file 'LICENSE'
> adding license file 'AUTHORS.md'
> writing manifest file 'cookiecutter.egg-info/SOURCES.txt'
>dh_auto_test -O--buildsystem=pybuild
> I: pybuild base:240: cd 
> /<>/.pybuild/cpython3_3.11_cookiecutter/build; python3.11 -m 
> pytest tests
> = test session starts 
> ==
> platform linux -- Python 3.11.2, pytest-7.2.1, pluggy-1.0.0+repack -- 
> /usr/bin/python3.11
> cachedir: .pytest_cache
> rootdir: /<>, configfile: setup.cfg
> plugins: mock-3.8.2, cov-4.0.0
> collecting ... collected 276 items
> 
> 

Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu


I am in trouble... I first did "Obtaining the kernel source", and at the 
end I got a /root/linux-source-6.1/ directory.


Then I did "Rebuilding official Debian kernel packages" and 
"Preparation",  and then I got among others a 
/root/linux-source-6.1/linux-6.1.20 the content of which is similar to 
the parent one, and where I can find, by the way, a debian directory.


It seems strange to me, is it correct?

If it is correct, in what order to do the patches (debian patches and 
the revert patch)?


Thanks in advance for your help !

Best regards.

-- Guy


Le 01/04/2023 à 16:55, Diederik de Haas a écrit :
 > > On April 1, 2023 4:31:49 PM GMT+02:00, Guy Durrieu > 
 wrote: >> Thanks for your help ! >> >> There 
is something not clear for me in the section 4.2.2. Simple >> patching 
and building... >> >> I ran apt-get install devscripts but I can't find 
any debian >> directory nor patches. Is it sufficient to apply the patch 
given by >> Diederik de Haas ? > > I'm guessing you forgot to do the 
Preparation from 4.2.1 > >> Le 01/04/2023 à 15:28, Salvatore Bonaccorso 
a écrit : >>> Hi, >>> >>> On Sat, Apr 01, 2023 at 11:51:38AM +0200, Guy 
Durrieu wrote:  Hello,   This is something I have never 
done, but I can try.   However some time ago, for solving a 
previous issue, a guy from  Debian compiled for me an unofficial 
release including the  patch to be tested, along with some 
credentials. I know this is  not the recommended procedure :) but it 
worked. >>> Seems there was a race on responding. If you look at the >>> 
documentation referenced by Diederik there are instructions on >>> how 
to do it with a single patch applied on top. If you run into >>> trouble 
let us know though. >>> >>> Regards, Salvatore >> >

Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Diederik de Haas



On April 1, 2023 4:31:49 PM GMT+02:00, Guy Durrieu  
wrote:
>Thanks for your help !
>
>There is something not clear for me in the section 4.2.2. Simple patching and 
>building...
>
>I ran apt-get install devscripts but I can't find any debian directory nor 
>patches. Is it sufficient to apply the patch given by Diederik de Haas ?

I'm guessing you forgot to do the Preparation from 4.2.1

>Le 01/04/2023 à 15:28, Salvatore Bonaccorso a écrit :
>> Hi,
>> 
>> On Sat, Apr 01, 2023 at 11:51:38AM +0200, Guy Durrieu wrote:
>>> Hello,
>>> 
>>> This is something I have never done, but I can try.
>>> 
>>> However some time ago, for solving a previous issue, a guy from Debian
>>> compiled for me an unofficial release including the patch to be tested,
>>> along with some credentials. I know this is not the recommended procedure :)
>>> but it worked.
>> Seems there was a race on responding. If you look at the documentation
>> referenced by Diederik there are instructions on how to do it with a
>> single patch applied on top. If you run into  trouble let us know
>> though.
>> 
>> Regards,
>> Salvatore
>

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.



Bug#1029588: bts: Changes in libio-socket-ssl-perl 2.078 make bts fail to send mail to mail-server via SSL/TLS - hostname verification failed

2023-04-01 Thread Dominique Dumont
Hi

I've created a merge request [1] on devscript to fix this issue

All the best

[1] https://salsa.debian.org/debian/devscripts/-/merge_requests/343



Processed: tagging 1029588

2023-04-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1029588 + patch
Bug #1029588 [devscripts] bts: Changes in libio-socket-ssl-perl 2.078 make bts 
fail to send mail to mail-server via SSL/TLS - hostname verification failed
Added tag(s) patch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1029588: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029588
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033785: irssi: CVE-2023-29132

2023-04-01 Thread Salvatore Bonaccorso
On Sat, Apr 01, 2023 at 10:36:56AM +0200, Salvatore Bonaccorso wrote:
> Source: irssi
> Version: 1.4.3-1
> Severity: grave
> Tags: security upstream
> X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> 
> 
> Hi,
> 
> The following vulnerability was published for irssi.
> 
> CVE-2023-29132[0]:
> | Irssi SA-2023-03 / Use after free in printing routine

Just to be clear, the following are mitigating facts:

The precondition for this issue is printing a non-formatted line during
the printing of a formatted line. This is unlikely to happen without
scripts, and is obscured by the slice allocator when using GLib before
version 2.77.

*but* I still filled it for now as RC, as the fix is very isolated,
and good to be included in bookworm already.

Regards,
Salvatore



Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu

Thanks for your help !

There is something not clear for me in the section 4.2.2. Simple 
patching and building...


I ran apt-get install devscripts but I can't find any debian directory 
nor patches. Is it sufficient to apply the patch given by Diederik de Haas ?


Regards.

-- Guy

Le 01/04/2023 à 15:28, Salvatore Bonaccorso a écrit :

Hi,

On Sat, Apr 01, 2023 at 11:51:38AM +0200, Guy Durrieu wrote:

Hello,

This is something I have never done, but I can try.

However some time ago, for solving a previous issue, a guy from Debian
compiled for me an unofficial release including the patch to be tested,
along with some credentials. I know this is not the recommended procedure :)
but it worked.

Seems there was a race on responding. If you look at the documentation
referenced by Diederik there are instructions on how to do it with a
single patch applied on top. If you run into  trouble let us know
though.

Regards,
Salvatore




Bug#995156: easy-rsa: vars Autodetection

2023-04-01 Thread textshell
Bump to avoid auto removal while the fixed version ages in unstable.



Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Salvatore Bonaccorso
Hi,

On Sat, Apr 01, 2023 at 11:51:38AM +0200, Guy Durrieu wrote:
> Hello,
> 
> This is something I have never done, but I can try.
> 
> However some time ago, for solving a previous issue, a guy from Debian
> compiled for me an unofficial release including the patch to be tested,
> along with some credentials. I know this is not the recommended procedure :)
> but it worked.

Seems there was a race on responding. If you look at the documentation
referenced by Diederik there are instructions on how to do it with a
single patch applied on top. If you run into  trouble let us know
though.

Regards,
Salvatore



Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Bjørn Mork
Salvatore Bonaccorso  writes:

> AFAIK there is no commit upstream with fixes tag on that commit. But
> Bjorn suspects that might be the suspicious commit introducing the
> issue.

Yes, I noticed that, so I could very well be wrong...

But it stood out as the only change to any x86 IOAPIC stuff
since Linux 6.1.0-6-amd64.  That's of course not any guarantee.  But
worth testing.



Bjørn



Bug#1033607: [Pkg-sogo-maintainers] Bug#1033607: sogo: /usr/bin/sogo linked against wrong version of libgnustep-base

2023-04-01 Thread Jeroen Dekkers
Hi Phil,

On Sat, 01 Apr 2023 02:41:05 +0200,
Phil Gruber wrote:
>
> Thanks for getting back to me.
>
> Here's what this looks like for me:
>
> > $ /usr/sbin/sogod
> > /usr/sbin/sogod: error while loading shared libraries: 
> > libgnustep-base.so.1.24: cannot open shared object file: No such file or 
> > directory
> > $ ldd -r /usr/sbin/sogod | grep gnustep
> > libgnustep-base.so.1.27 => /usr/lib/libgnustep-base.so.1.27 
> > (0x7f6c6428f000)
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
> > libgnustep-base.so.1.24 => not found
>
> I just removed and re-installed the sogo package, but it didn't make a
> difference.

Can you use objdump to figure out which files have the dependency on
libgnustep-base.so.1.24?

objdump -p /usr/sbin/sogod | grep NEEDED

If that doesn't list libgnustep-base.so.1.24 then try libSOGo.so.5 and all the
other libraries listed by ldd.

Kind regards,

Jeroen Dekkers



Bug#1033667: marked as done (verilator: Uninstallable in sid because of ${sphinxdoc:Built-Using} dependency)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 10:05:18 +
with message-id 
and subject line Bug#1033667: fixed in verilator 5.008-1
has caused the Debian Bug report #1033667,
regarding verilator: Uninstallable in sid because of ${sphinxdoc:Built-Using} 
dependency
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033667: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033667
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: verilator
Version: 5.006-2
Severity: serious
Tags: patch

Dear Maintainer,

In a clean sid chroot, verilator is not installable:

  # apt install verilator
  Reading package lists... Done
  Building dependency tree... Done
  Reading state information... Done
  Some packages could not be installed. This may mean that you have
  requested an impossible situation or if you are using the unstable
  distribution that some required packages have not yet been created
  or been moved out of Incoming.
  The following information may help to resolve the situation:

  The following packages have unmet dependencies:
   verilator : Depends: sphinx (= 5.3.0-3)
  E: Unable to correct problems, you have held broken packages.

This is because that package has ${sphinxdoc:Built-Using} among its
dependencies.

That substitution variable is intended to be used in Built-Using field of
architecture-dependent packages, NOT in Depends field.

I have created a merge request [1] on salsa to fix this.

[1]: https://salsa.debian.org/electronics-team/verilator/-/merge_requests/3

--
Dmitry Shachnev


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: verilator
Source-Version: 5.008-1
Done: Carsten Schoenert 

We believe that the bug you reported is fixed in the latest version of
verilator, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Carsten Schoenert  (supplier of updated verilator 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 30 Mar 2023 19:48:21 +0200
Source: verilator
Architecture: source
Version: 5.008-1
Distribution: experimental
Urgency: medium
Maintainer: Debian Electronics Team 

Changed-By: Carsten Schoenert 
Closes: 1030913 1031711 1033667
Changes:
 verilator (5.008-1) experimental; urgency=medium
 .
   * Team upload
   [ Dmitry Shachnev ]
   * [38e486b] Move ${sphinxdoc:Built-Using} to the correct field.
 (Closes: #1033667)
 .
   [ Carsten Schoenert ]
   * [0a50071] New upstream version 5.008
 (Closes: #1030913)
   * [bb4558b] Rebuild patch queue from patch-queue branch
 Removed patches (included upstream):
 Add-SOURCE_DATE_EPOCH-for-docs-guide-conf.py-3918.patch
 (Closes: #1031711)
Checksums-Sha1:
 2a60dc75f6eb7a37563bb5b034a4b99cf5d6c57c 2198 verilator_5.008-1.dsc
 7cf4d4c35c7c163f09a3fa8f625da0298f7a0c21 3177491 verilator_5.008.orig.tar.gz
 cc1bf912f7d435f4071f37e218cd8cc359b165a4 12040 verilator_5.008-1.debian.tar.xz
 1d83fde42927cb4789a617e0922cec1e9f784612 9843 verilator_5.008-1_amd64.buildinfo
Checksums-Sha256:
 b30665d937a0b6cc0f3b2427e3932f13199fb7bec78759c9e74cf506558cdc6d 2198 
verilator_5.008-1.dsc
 d9fcbbecac2f2e2be7e5d0224f0695ad547279110340c79ef67c88395c0f75a9 3177491 
verilator_5.008.orig.tar.gz
 7df1d77085fa9c178cbe209eb3ef9db1e3c312ccab3ddd23a49ef9962ee54b69 12040 
verilator_5.008-1.debian.tar.xz
 d0c3cd32f6b8e75bb32d1ce320262d706515acd537bb10c4b1532e75bc274b82 9843 
verilator_5.008-1_amd64.buildinfo
Files:
 35507609e717856bf49dbebb68ec7652 2198 electronics optional 
verilator_5.008-1.dsc
 631e70c0f1744ca31f24853bdaec47c8 3177491 electronics optional 
verilator_5.008.orig.tar.gz
 86560c47c13f5d9d8d7b2ff51bc19bf3 12040 electronics optional 
verilator_5.008-1.debian.tar.xz
 fc503fbcb2fa3a45ca83c9bba31a66e4 9843 electronics optional 
verilator_5.008-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEtw38bxNP7PwBHmKqgwFgFCUdHbAFAmQn+90ACgkQgwFgFCUd
HbDb6Q//Q9gTQ2pO5IGnL54K4HGFh/GMKVVkpP+HQEiBwe2y7zDBvy/DRtqJlWXd
n6jBoDahONlB5g95JI8Q5tlOW9X+4yWYtFfgDaK+eEeShesblK/yCGxuwKb002my

Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu

Hello,

This is something I have never done, but I can try.

However some time ago, for solving a previous issue, a guy from Debian 
compiled for me an unofficial release including the patch to be tested, 
along with some credentials. I know this is not the recommended 
procedure :) but it worked.


Best regards,

-- Guy

Le 01/04/2023 à 11:00, Salvatore Bonaccorso a écrit :

Control: tags -1 + moreinfo

Hi Guy,

On Sat, Apr 01, 2023 at 10:09:09AM +0200, Guy Durrieu wrote:

Hello,

Thanks for your answer !

Before receiving it I tried to update my BIOS to the last available version
(F51h). Without any effect.

I am not sure I understand everything that is said in your link, except I
must wait for the next updates... Right ?

AFAIK there is no commit upstream with fixes tag on that commit. But
Bjorn suspects that might be the suspicious commit introducing the
issue.

Would you be able to build a kernel 6.1.20 with that patch reverted on
top and see if it resolved your issue?

Regards,
Salvatore




Bug#1033784: marked as done (FTBFS: mbimbf.t fails with libmath-bigint-perl 1.999838)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 09:04:00 +
with message-id 
and subject line Bug#1033784: fixed in libmath-bigint-gmp-perl 1.6011-3
has caused the Debian Bug report #1033784,
regarding FTBFS: mbimbf.t fails with libmath-bigint-perl 1.999838
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033784: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033784
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libmath-bigint-gmp-perl
Version: 1.6011-2
Severity: serious
Tags: ftbfs, patch

Dear Maintainer,

yesterday I uploaded libmath-bigint-perl 1.999838-1, which fixes RC
bugs.
Bug with this version of libmath-bigint-perl now
libmath-bigint-gmp-perl fails to build, since two test cases in
t/mbimbf.t fail:

ok 729 - $x has A of 42
ok 730 - $x has A from global
not ok 731 - $x has still A of 42
ok 732 - $x has A of 42
ok 733 - $x has A from global
not ok 734 - $x has still A of 42

t/mbimbf.t in libmath-bigint-perl and libmath-bigint-gmp-perl where
identical except
-use Math::BigInt only => 'Calc';
+use Math::BigInt only => 'GMP';
before the update of libmath-bigint-perl, but Upstream
extended/changed mbimbf.t in 1.999838, so IMHO it should be changed in
libmath-bigint-gmp-perl accordingly.

The attached patch merges mbimbf.t changes from libmath-bigint-perl
1.999838.
With this patch libmath-bigint-gmp-perl builds with a working test
suite.

Greetings
Roland
From: Roland Rosenfeld 
Subject: Adapt mbimbf.t to the one from Math::BigInt 1.999838
Date: Sat, 01 Apr 2023 09:57:20 +0200

--- a/t/mbimbf.t
+++ b/t/mbimbf.t
@@ -7,7 +7,7 @@ use strict;
 use warnings;
 
 use Test::More tests => 712 # tests in require'd file
-+ 26;   # tests in this file
++ 52;   # tests in this file
 
 use Math::BigInt only => 'GMP';
 use Math::BigFloat;
@@ -58,24 +58,71 @@ foreach my $class (qw/Math::BigInt Math:
 }
 
 foreach my $class (qw/Math::BigInt Math::BigFloat/)  {
-$class->accuracy(42);
+my $x;
 
-# $x gets A of 42, too!
-my $x = $class->new(123);
+# Accuracy
 
-# really?
-is($x->accuracy(), 42, '$x has A of 42');
+# set and check the class accuracy
+$class->accuracy(1);
+is($class->accuracy(), 1, "$class has A of 1");
 
-# $x has no A, but the global is still in effect for $x so the return value
-# of that operation should be 42, not undef
-is($x->accuracy(undef), 42, '$x has A from global');
+# a new instance gets the class accuracy
+$x = $class->new(123);
+is($x->accuracy(), 1, '$x has A of 1');
 
-# so $x should still have A = 42
-is($x->accuracy(), 42, '$x has still A of 42');
+# set and check the instance accuracy
+$x->accuracy(2);
+is($x->accuracy(), 2, '$x has A of 2');
 
-# reset for further tests
+# change the class accuracy
+$class->accuracy(3);
+is($class->accuracy(), 3, "$class has A of 3");
+
+# verify that the instance accuracy hasn't changed
+is($x->accuracy(), 2, '$x still has A of 2');
+
+# change the instance accuracy
+$x->accuracy(undef);
+is($x->accuracy(), undef, '$x now has A of undef');
+
+# check the class accuracy
+is($class->accuracy(), 3, "$class still has A of 3");
+
+# change the class accuracy again
 $class->accuracy(undef);
+is($class->accuracy(), undef, "$class now has A of undef");
+
+# Precision
+
+# set and check the class precision
+$class->precision(1);
+is($class->precision(), 1, "$class has A of 1");
+
+# a new instance gets the class precision
+$x = $class->new(123);
+is($x->precision(), 1, '$x has A of 1');
+
+# set and check the instance precision
+$x->precision(2);
+is($x->precision(), 2, '$x has A of 2');
+
+# change the class precision
+$class->precision(3);
+is($class->precision(), 3, "$class has A of 3");
+
+# verify that the instance precision hasn't changed
+is($x->precision(), 2, '$x still has A of 2');
+
+# change the instance precision
+$x->precision(undef);
+is($x->precision(), undef, '$x now has A of undef');
+
+# check the class precision
+is($class->precision(), 3, "$class still has A of 3");
+
+# change the class precision again
 $class->precision(undef);
+is($class->precision(), undef, "$class now has A of undef");
 }
 
 # bug with blog(Math::BigFloat, Math::BigInt)
--- End Message ---
--- Begin Message ---
Source: libmath-bigint-gmp-perl
Source-Version: 1.6011-3
Done: Roland Rosenfeld 

We believe that the bug you reported is fixed in 

Processed: Re: Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + moreinfo
Bug #1033732 [src:linux] linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 
kernel launching crashes with a panic message
Added tag(s) moreinfo.

-- 
1033732: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033732
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo

Hi Guy,

On Sat, Apr 01, 2023 at 10:09:09AM +0200, Guy Durrieu wrote:
> Hello,
> 
> Thanks for your answer !
> 
> Before receiving it I tried to update my BIOS to the last available version
> (F51h). Without any effect.
> 
> I am not sure I understand everything that is said in your link, except I
> must wait for the next updates... Right ?

AFAIK there is no commit upstream with fixes tag on that commit. But
Bjorn suspects that might be the suspicious commit introducing the
issue.

Would you be able to build a kernel 6.1.20 with that patch reverted on
top and see if it resolved your issue?

Regards,
Salvatore



Bug#1033757: marked as done (ghostscript: CVE-2023-28879)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 08:49:12 +
with message-id 
and subject line Bug#1033757: fixed in ghostscript 10.0.0~dfsg-11
has caused the Debian Bug report #1033757,
regarding ghostscript: CVE-2023-28879
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033757: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ghostscript
Version: 10.0.0~dfsg-9
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=706494
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for ghostscript.

CVE-2023-28879[0]:
| In Artifex Ghostscript through 10.01.0, there is a buffer overflow
| leading to potential corruption of data internal to the PostScript
| interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode,
| TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte
| less than full, and one then tries to write an escaped character, two
| bytes are written.

I'm preparing an update for this issue.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-28879
https://www.cve.org/CVERecord?id=CVE-2023-28879
[1] https://bugs.ghostscript.com/show_bug.cgi?id=706494 (not public)

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: ghostscript
Source-Version: 10.0.0~dfsg-11
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
ghostscript, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated ghostscript 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 01 Apr 2023 09:48:32 +0200
Source: ghostscript
Architecture: source
Version: 10.0.0~dfsg-11
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Salvatore Bonaccorso 
Closes: 1033757
Changes:
 ghostscript (10.0.0~dfsg-11) unstable; urgency=medium
 .
   * QA upload.
   * Prevent buffer overrun in (T)BCP encoding (CVE-2023-28879)
 (Closes: #1033757)
Checksums-Sha1:
 d979e4f9cc8f632fc786f69bbc715a10757ce093 2987 ghostscript_10.0.0~dfsg-11.dsc
 7946dd26efb4274e62d31d6d955a839f34f135c5 85428 
ghostscript_10.0.0~dfsg-11.debian.tar.xz
 7f47fd6c6a2baa5f0772ff6454ed61b7525cc239 7081 
ghostscript_10.0.0~dfsg-11_source.buildinfo
Checksums-Sha256:
 e4e6af2e982228ea452f5dbd64f29f79db10f731571174adf3b37b0b913a5c97 2987 
ghostscript_10.0.0~dfsg-11.dsc
 41861b53c348ce9b9cbe64cac2ecbba44d3bbb16c87a8cb807336f3107fc4650 85428 
ghostscript_10.0.0~dfsg-11.debian.tar.xz
 dd83d1e03ac9b7d8cf139ab182a49843cd1acadbf84239970b2a8bf9aaf2e804 7081 
ghostscript_10.0.0~dfsg-11_source.buildinfo
Files:
 202c53a276ed471f7e7333c15ae6f99b 2987 text optional 
ghostscript_10.0.0~dfsg-11.dsc
 360c629443995dd5aee569a840efe8cf 85428 text optional 
ghostscript_10.0.0~dfsg-11.debian.tar.xz
 4cf2a2c9332621fb66e496d7f7a16b39 7081 text optional 
ghostscript_10.0.0~dfsg-11_source.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Diederik de Haas
On Saturday, 1 April 2023 10:09:09 CEST Guy Durrieu wrote:
> Le 01/04/2023 à 09:25, Bjørn Mork a écrit :
> > Guy Durrieu  writes:
> >> 
> >> [ 0.117782] Kernel panic — not syncing: timer doesn’t work through
> >> Interrupt-
> >> remapped I0-APIC
> >> [ 0.117848] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-7-and64 #1
> >> Debian
> >> 6.1.20-1
> >> [ 0.117913] Hardware name: Gigabyte Technology Co., Ltd. ABS50M-Gaming
> >> 3/AB350M-Gaming 3-CF, BIOS F50d 07/02/2020
> >> [ 0.117982] Call Trace:
> >> [ 0.118634] 
> >> [ 0.118685] dump_stack_lvl+0x44/0x5c
> >> [ 0.118143] panic+0x118/0x2ed
> >> [ 0.118198] panic_if_irq_remap.cold+0x5/0x5
> >> [ 0.118256] setup_I0_APIC+0x3db/0x64b
> >> [ 0.118313] ? _raw_spin_unlock_irqrestore+0x23/0x40
> >> [ 0.118372] ? clear_IO_APIC_pin+0x169/0x240
> >> [ 0.118429] apic_intr_node_init+0x101/0x106
> >> [ 0.118485] x86_late_time_init+0x20/0x34
> >> [ 0.118542] start_kerne1+0x667/0x727
> >> [ 0.118598] secondary_startup_64_no_verify+0xe5/0xeb
> >> [ 0.118658] 
> >> [ 0.118711] ---[ end Kernel panic - not syncing: timer doesn’t work
> >> through
> >> Interrupt-remapped IO-APIC J---
> >> 
> > 
> > Extremely suspiscious commit in the v6.1.15..v6.1.20 update:
> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
> > /commit/?id=ce7d894bed1a539a8d6cff42f6f78f9db0c9c26b
> 
> I am not sure I understand everything that is said in your link, except
> I must wait for the next updates... Right ?

When triaging a bug, we usually try to find the upstream commit which *caused*
the issue and Bjørn thinks it's the one referenced.

To test whether that's indeed the case, there's a procedure here:
https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html#s4.2.1
These are preliminary steps to the actual one which is para 4.2.2 and I have
attached a patch which reverts the referenced commit and that .patch file is
what you give as an argument to `bash debian/bin/test-patches`.

If you could try that to see if that indeed fixes the issue, that would be
very helpful.

HTH
>From 2e6223080905caf4c775680201700b243caa91a9 Mon Sep 17 00:00:00 2001
From: Diederik de Haas 
Date: Sat, 1 Apr 2023 10:32:31 +0200
Subject: [PATCH] Revert "x86/acpi/boot: Do not register processors that cannot
 be onlined for x2APIC"

This reverts commit ce7d894bed1a539a8d6cff42f6f78f9db0c9c26b.
---
 arch/x86/kernel/acpi/boot.c | 19 +++
 1 file changed, 3 insertions(+), 16 deletions(-)

diff --git a/arch/x86/kernel/acpi/boot.c b/arch/x86/kernel/acpi/boot.c
index 518bda50068c..907cc98b1938 100644
--- a/arch/x86/kernel/acpi/boot.c
+++ b/arch/x86/kernel/acpi/boot.c
@@ -188,17 +188,6 @@ static int acpi_register_lapic(int id, u32 acpiid, u8 enabled)
 	return cpu;
 }
 
-static bool __init acpi_is_processor_usable(u32 lapic_flags)
-{
-	if (lapic_flags & ACPI_MADT_ENABLED)
-		return true;
-
-	if (acpi_support_online_capable && (lapic_flags & ACPI_MADT_ONLINE_CAPABLE))
-		return true;
-
-	return false;
-}
-
 static int __init
 acpi_parse_x2apic(union acpi_subtable_headers *header, const unsigned long end)
 {
@@ -223,10 +212,6 @@ acpi_parse_x2apic(union acpi_subtable_headers *header, const unsigned long end)
 	if (apic_id == 0x)
 		return 0;
 
-	/* don't register processors that cannot be onlined */
-	if (!acpi_is_processor_usable(processor->lapic_flags))
-		return 0;
-
 	/*
 	 * We need to register disabled CPU as well to permit
 	 * counting disabled CPUs. This allows us to size
@@ -265,7 +250,9 @@ acpi_parse_lapic(union acpi_subtable_headers * header, const unsigned long end)
 		return 0;
 
 	/* don't register processors that can not be onlined */
-	if (!acpi_is_processor_usable(processor->lapic_flags))
+	if (acpi_support_online_capable &&
+	!(processor->lapic_flags & ACPI_MADT_ENABLED) &&
+	!(processor->lapic_flags & ACPI_MADT_ONLINE_CAPABLE))
 		return 0;
 
 	/*
-- 
2.40.0



signature.asc
Description: This is a digitally signed message part.


Processed: bug 1033784 is forwarded to https://rt.cpan.org/Ticket/Display.html?id=147484

2023-04-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 1033784 https://rt.cpan.org/Ticket/Display.html?id=147484
Bug #1033784 [src:libmath-bigint-gmp-perl] FTBFS: mbimbf.t fails with 
libmath-bigint-perl 1.999838
Set Bug forwarded-to-address to 
'https://rt.cpan.org/Ticket/Display.html?id=147484'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1033784: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033784
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033785: irssi: CVE-2023-29132

2023-04-01 Thread Salvatore Bonaccorso
Source: irssi
Version: 1.4.3-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for irssi.

CVE-2023-29132[0]:
| Irssi SA-2023-03 / Use after free in printing routine

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-29132
https://www.cve.org/CVERecord?id=CVE-2023-29132
[1] https://irssi.org/security/irssi_sa_2023_03.txt
[2] 
https://github.com/irssi/irssi/commit/c554a45738712219c066897b09a44d99afeb4240

Regards,
Salvatore



Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Guy Durrieu

Hello,

Thanks for your answer !

Before receiving it I tried to update my BIOS to the last available 
version (F51h). Without any effect.


I am not sure I understand everything that is said in your link, except 
I must wait for the next updates... Right ?


Best regards.

-- Guy

Le 01/04/2023 à 09:25, Bjørn Mork a écrit :

Guy Durrieu  writes:



[ 0.117782] Kernel panic — not syncing: timer doesn’t work through
Interrupt-
remapped I0-APIC
[ 0.117848] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-7-and64 #1
Debian
6.1.20-1
[ 0.117913] Hardware name: Gigabyte Technology Co., Ltd. ABS50M-Gaming
3/AB350M-Gaming 3-CF, BIOS F50d 07/02/2020
[ 0.117982] Call Trace:
[ 0.118634] 
[ 0.118685] dump_stack_lvl+0x44/0x5c
[ 0.118143] panic+0x118/0x2ed
[ 0.118198] panic_if_irq_remap.cold+0x5/0x5
[ 0.118256] setup_I0_APIC+0x3db/0x64b
[ 0.118313] ? _raw_spin_unlock_irqrestore+0x23/0x40
[ 0.118372] ? clear_IO_APIC_pin+0x169/0x240
[ 0.118429] apic_intr_node_init+0x101/0x106
[ 0.118485] x86_late_time_init+0x20/0x34
[ 0.118542] start_kerne1+0x667/0x727
[ 0.118598] secondary_startup_64_no_verify+0xe5/0xeb
[ 0.118658] 
[ 0.118711] ---[ end Kernel panic - not syncing: timer doesn’t work through
Interrupt-remapped IO-APIC J---


Extremely suspiscious commit in the v6.1.15..v6.1.20 update:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?id=ce7d894bed1a539a8d6cff42f6f78f9db0c9c26b



Bjørn




Bug#1033784: FTBFS: mbimbf.t fails with libmath-bigint-perl 1.999838

2023-04-01 Thread Roland Rosenfeld
Source: libmath-bigint-gmp-perl
Version: 1.6011-2
Severity: serious
Tags: ftbfs, patch

Dear Maintainer,

yesterday I uploaded libmath-bigint-perl 1.999838-1, which fixes RC
bugs.
Bug with this version of libmath-bigint-perl now
libmath-bigint-gmp-perl fails to build, since two test cases in
t/mbimbf.t fail:

ok 729 - $x has A of 42
ok 730 - $x has A from global
not ok 731 - $x has still A of 42
ok 732 - $x has A of 42
ok 733 - $x has A from global
not ok 734 - $x has still A of 42

t/mbimbf.t in libmath-bigint-perl and libmath-bigint-gmp-perl where
identical except
-use Math::BigInt only => 'Calc';
+use Math::BigInt only => 'GMP';
before the update of libmath-bigint-perl, but Upstream
extended/changed mbimbf.t in 1.999838, so IMHO it should be changed in
libmath-bigint-gmp-perl accordingly.

The attached patch merges mbimbf.t changes from libmath-bigint-perl
1.999838.
With this patch libmath-bigint-gmp-perl builds with a working test
suite.

Greetings
Roland
From: Roland Rosenfeld 
Subject: Adapt mbimbf.t to the one from Math::BigInt 1.999838
Date: Sat, 01 Apr 2023 09:57:20 +0200

--- a/t/mbimbf.t
+++ b/t/mbimbf.t
@@ -7,7 +7,7 @@ use strict;
 use warnings;
 
 use Test::More tests => 712 # tests in require'd file
-+ 26;   # tests in this file
++ 52;   # tests in this file
 
 use Math::BigInt only => 'GMP';
 use Math::BigFloat;
@@ -58,24 +58,71 @@ foreach my $class (qw/Math::BigInt Math:
 }
 
 foreach my $class (qw/Math::BigInt Math::BigFloat/)  {
-$class->accuracy(42);
+my $x;
 
-# $x gets A of 42, too!
-my $x = $class->new(123);
+# Accuracy
 
-# really?
-is($x->accuracy(), 42, '$x has A of 42');
+# set and check the class accuracy
+$class->accuracy(1);
+is($class->accuracy(), 1, "$class has A of 1");
 
-# $x has no A, but the global is still in effect for $x so the return value
-# of that operation should be 42, not undef
-is($x->accuracy(undef), 42, '$x has A from global');
+# a new instance gets the class accuracy
+$x = $class->new(123);
+is($x->accuracy(), 1, '$x has A of 1');
 
-# so $x should still have A = 42
-is($x->accuracy(), 42, '$x has still A of 42');
+# set and check the instance accuracy
+$x->accuracy(2);
+is($x->accuracy(), 2, '$x has A of 2');
 
-# reset for further tests
+# change the class accuracy
+$class->accuracy(3);
+is($class->accuracy(), 3, "$class has A of 3");
+
+# verify that the instance accuracy hasn't changed
+is($x->accuracy(), 2, '$x still has A of 2');
+
+# change the instance accuracy
+$x->accuracy(undef);
+is($x->accuracy(), undef, '$x now has A of undef');
+
+# check the class accuracy
+is($class->accuracy(), 3, "$class still has A of 3");
+
+# change the class accuracy again
 $class->accuracy(undef);
+is($class->accuracy(), undef, "$class now has A of undef");
+
+# Precision
+
+# set and check the class precision
+$class->precision(1);
+is($class->precision(), 1, "$class has A of 1");
+
+# a new instance gets the class precision
+$x = $class->new(123);
+is($x->precision(), 1, '$x has A of 1');
+
+# set and check the instance precision
+$x->precision(2);
+is($x->precision(), 2, '$x has A of 2');
+
+# change the class precision
+$class->precision(3);
+is($class->precision(), 3, "$class has A of 3");
+
+# verify that the instance precision hasn't changed
+is($x->precision(), 2, '$x still has A of 2');
+
+# change the instance precision
+$x->precision(undef);
+is($x->precision(), undef, '$x now has A of undef');
+
+# check the class precision
+is($class->precision(), 3, "$class still has A of 3");
+
+# change the class precision again
 $class->precision(undef);
+is($class->precision(), undef, "$class now has A of undef");
 }
 
 # bug with blog(Math::BigFloat, Math::BigInt)


Processed: nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-0194,

2023-04-01 Thread Debian Bug Tracking System
Processing control commands:

> clone -1 -2 -3 -4 -5 -6 -7 -8 -9 -10
Bug #1033774 [src:nvidia-graphics-drivers] nvidia-graphics-drivers: 
CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, 
CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, 
CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Bug 1033774 cloned as bugs 1033775-1033783
> reassign -2 src:nvidia-graphics-drivers-legacy-340xx 340.76-6
Bug #1033775 [src:nvidia-graphics-drivers] nvidia-graphics-drivers: 
CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, 
CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, 
CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Bug reassigned from package 'src:nvidia-graphics-drivers' to 
'src:nvidia-graphics-drivers-legacy-340xx'.
Ignoring request to alter found versions of bug #1033775 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1033775 to the same values 
previously set
Bug #1033775 [src:nvidia-graphics-drivers-legacy-340xx] 
nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, 
CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Marked as found in versions nvidia-graphics-drivers-legacy-340xx/340.76-6.
> retitle -2 nvidia-graphics-drivers-legacy-340xx: CVE-2023-0184, 
> CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
> CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Bug #1033775 [src:nvidia-graphics-drivers-legacy-340xx] 
nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, 
CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Changed Bug title to 'nvidia-graphics-drivers-legacy-340xx: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191' from 
'nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, 
CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191'.
> tag -2 + wontfix
Bug #1033775 [src:nvidia-graphics-drivers-legacy-340xx] 
nvidia-graphics-drivers-legacy-340xx: CVE-2023-0184, CVE-2023-0189, 
CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, 
CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Added tag(s) wontfix.
> reassign -3 src:nvidia-graphics-drivers-legacy-390xx 390.48-4
Bug #1033776 [src:nvidia-graphics-drivers] nvidia-graphics-drivers: 
CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, 
CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, 
CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Bug reassigned from package 'src:nvidia-graphics-drivers' to 
'src:nvidia-graphics-drivers-legacy-390xx'.
Ignoring request to alter found versions of bug #1033776 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1033776 to the same values 
previously set
Bug #1033776 [src:nvidia-graphics-drivers-legacy-390xx] 
nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, 
CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Marked as found in versions nvidia-graphics-drivers-legacy-390xx/390.48-4.
> retitle -3 nvidia-graphics-drivers-legacy-390xx: CVE-2023-0184, 
> CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
> CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Bug #1033776 [src:nvidia-graphics-drivers-legacy-390xx] 
nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, 
CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Changed Bug title to 'nvidia-graphics-drivers-legacy-390xx: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191' from 
'nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, 
CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191'.
> tag -3 + wontfix
Bug #1033776 [src:nvidia-graphics-drivers-legacy-390xx] 
nvidia-graphics-drivers-legacy-390xx: CVE-2023-0184, CVE-2023-0189, 
CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, 
CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Added tag(s) wontfix.
> reassign -4 src:nvidia-graphics-drivers-tesla-418 418.87.01-1
Bug #1033777 [src:nvidia-graphics-drivers] nvidia-graphics-drivers: 
CVE-2023-0184, 

Bug#1033774: nvidia-graphics-drivers: CVE-2023-0184, CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-019

2023-04-01 Thread Andreas Beckmann
Source: nvidia-graphics-drivers
Severity: serious
Tags: security upstream
X-Debbugs-Cc: Debian Security Team 
Control: clone -1 -2 -3 -4 -5 -6 -7 -8 -9 -10
Control: reassign -2 src:nvidia-graphics-drivers-legacy-340xx 340.76-6
Control: retitle -2 nvidia-graphics-drivers-legacy-340xx: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Control: tag -2 + wontfix
Control: reassign -3 src:nvidia-graphics-drivers-legacy-390xx 390.48-4
Control: retitle -3 nvidia-graphics-drivers-legacy-390xx: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Control: tag -3 + wontfix
Control: reassign -4 src:nvidia-graphics-drivers-tesla-418 418.87.01-1
Control: retitle -4 nvidia-graphics-drivers-tesla-418: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Control: tag -4 + wontfix
Control: reassign -5 src:nvidia-graphics-drivers-tesla-450 450.51.05-1
Control: retitle -5 nvidia-graphics-drivers-tesla-450: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0198, CVE-2023-0199, 
CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, CVE-2023-0191
Control: reassign -6 src:nvidia-graphics-drivers-tesla-460 460.32.03-1
Control: retitle -6 nvidia-graphics-drivers-tesla-460: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, 
CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, 
CVE-2023-0191
Control: tag -6 + wontfix
Control: close -6 460.106.00-3
Control: reassign -7 src:nvidia-graphics-drivers-tesla-470 470.57.02-1
Control: retitle -7 nvidia-graphics-drivers-tesla-470: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0185, CVE-2023-0187, CVE-2023-0198, 
CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, CVE-2023-0195, 
CVE-2023-0191
Control: reassign -8 src:nvidia-graphics-drivers-tesla-510 510.47.03-1
Control: retitle -8 nvidia-graphics-drivers-tesla-510: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, 
CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, 
CVE-2023-0195, CVE-2023-0191
Control: tag -8 + wontfix
Control: close -8 510.85.02-2
Control: reassign -9 src:nvidia-graphics-drivers-tesla 510.85.02-1
Control: retitle -9 nvidia-graphics-drivers-tesla: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, 
CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, 
CVE-2023-0195, CVE-2023-0191
Control: found -9 515.48.07-1
Control: found -9 525.60.13-1
Control: reassign -10 src:nvidia-open-gpu-kernel-modules 515.43.04-1
Control: retitle -10 nvidia-open-gpu-kernel-modules: CVE-2023-0184, 
CVE-2023-0189, CVE-2023-0180, CVE-2023-0183, CVE-2023-0185, CVE-2023-0187, 
CVE-2023-0198, CVE-2023-0199, CVE-2023-0188, CVE-2023-0190, CVE-2023-0194, 
CVE-2023-0195, CVE-2023-0191
Control: found -10 520.56.06-1
Control: found -10 525.85.12-1
Control: found -10 530.30.02-1
Control: found -1 340.24-1
Control: found -1 343.22-1
Control: found -1 396.18-1
Control: found -1 430.14-1
Control: found -1 455.23.04-1
Control: found -1 465.24.02-1
Control: found -1 495.44-1
Control: found -1 515.48.07-1
Control: found -1 520.56.06-1
Control: found -1 525.53-1
Control: found -1 530.30.02-1
Control: fixed -1 530.41.03-1

https://nvidia.custhelp.com/app/answers/detail/a_id/5452

CVE-2023-0189   NVIDIA GPU Display Driver for Linux contains a
vulnerability in the kernel mode layer handler, which may lead to code
execution, denial of service, escalation of privileges, information
disclosure, and data tampering.

CVE-2023-0184   NVIDIA GPU Display Driver for Windows and Linux contains
a vulnerability in the kernel mode layer handler, which may lead to
denial of service, escalation of privileges, information disclosure, and
data tampering.

CVE-2023-0181   NVIDIA GPU Display Driver for Windows and Linux contains
a vulnerability in a kernel mode layer handler, where memory permissions
are not correctly checked, which may lead to denial of service and data
tampering.

CVE-2023-0191   NVIDIA GPU Display Driver for Windows and Linux contains
a vulnerability in the kernel mode layer handler, where an out-of-bounds
access may lead to denial of service or data tampering.

CVE-2023-0183   NVIDIA GPU Display Driver for Linux contains a
vulnerability in the kernel mode layer where an out-of-bounds write can
lead to denial of service and data tampering.

CVE-2023-0180   NVIDIA GPU Display Driver for Linux contains a
vulnerability in a kernel mode layer handler, which may lead to denial
of service or information disclosure.

CVE-2023-0185   NVIDIA GPU Display Driver for Linux contains a
vulnerability in the kernel mode 

Bug#1033732: linux-image-6.1.0-7-amd64: The Linux 6.1.0-7-amd64 kernel launching crashes with a panic message

2023-04-01 Thread Bjørn Mork


Guy Durrieu  writes:

> 
> [ 0.117782] Kernel panic — not syncing: timer doesn’t work through
> Interrupt-
> remapped I0-APIC
> [ 0.117848] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-7-and64 #1
> Debian
> 6.1.20-1
> [ 0.117913] Hardware name: Gigabyte Technology Co., Ltd. ABS50M-Gaming
> 3/AB350M-Gaming 3-CF, BIOS F50d 07/02/2020
> [ 0.117982] Call Trace:
> [ 0.118634] 
> [ 0.118685] dump_stack_lvl+0x44/0x5c
> [ 0.118143] panic+0x118/0x2ed
> [ 0.118198] panic_if_irq_remap.cold+0x5/0x5
> [ 0.118256] setup_I0_APIC+0x3db/0x64b
> [ 0.118313] ? _raw_spin_unlock_irqrestore+0x23/0x40
> [ 0.118372] ? clear_IO_APIC_pin+0x169/0x240
> [ 0.118429] apic_intr_node_init+0x101/0x106
> [ 0.118485] x86_late_time_init+0x20/0x34
> [ 0.118542] start_kerne1+0x667/0x727
> [ 0.118598] secondary_startup_64_no_verify+0xe5/0xeb
> [ 0.118658] 
> [ 0.118711] ---[ end Kernel panic - not syncing: timer doesn’t work through
> Interrupt-remapped IO-APIC J---
> 

Extremely suspiscious commit in the v6.1.15..v6.1.20 update:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?id=ce7d894bed1a539a8d6cff42f6f78f9db0c9c26b



Bjørn



Bug#1012233: marked as done (python3-ml-collections: overly generic python module name: /usr/lib/python3/dist-packages/docs/conf.py)

2023-04-01 Thread Debian Bug Tracking System
Your message dated Sat, 01 Apr 2023 06:34:15 +
with message-id 
and subject line Bug#1012233: fixed in python-ml-collections 0.1.1-2
has caused the Debian Bug report #1012233,
regarding python3-ml-collections: overly generic python module name: 
/usr/lib/python3/dist-packages/docs/conf.py
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1012233: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012233
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python3-ml-collections
Version: 0.1.1-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package uses a very generic
python module name that now clashes with other packages:

/usr/lib/python3/dist-packages/docs/conf.py


Andreas
--- End Message ---
--- Begin Message ---
Source: python-ml-collections
Source-Version: 0.1.1-2
Done: Nilesh Patra 

We believe that the bug you reported is fixed in the latest version of
python-ml-collections, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1012...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nilesh Patra  (supplier of updated python-ml-collections 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 01 Apr 2023 11:29:28 +0530
Source: python-ml-collections
Architecture: source
Version: 0.1.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team 
Changed-By: Nilesh Patra 
Closes: 1012233
Changes:
 python-ml-collections (0.1.1-2) unstable; urgency=medium
 .
   * Team Upload.
   * Remove docs before building (Closes: #1012233)
   * Bump Standards-Version to 4.6.2 (no changes needed)
   * Add python-is-python3 to test-deps
   * Add Suggests on python-is-python3
   * Update copyright years
   * d/lintian-overrides: Override FP
Checksums-Sha1:
 dea404ebee39ad8b44137dcc7ab0a094697e65a1 1702 python-ml-collections_0.1.1-2.dsc
 e67e423f196f5e9fc93a117b9b0b6da1f951eb25 4628 
python-ml-collections_0.1.1-2.debian.tar.xz
 2384cc32b5118225079ad6dc0d4057c13d737cd4 5863 
python-ml-collections_0.1.1-2_amd64.buildinfo
Checksums-Sha256:
 90c5a89f76f8a90db11d73773580deaeb443066c23d810b62f76f24e5eff631d 1702 
python-ml-collections_0.1.1-2.dsc
 5c9cf40cd23f0311ee46e1308997fdb31445137ba2ed8047ff2968141f1722d0 4628 
python-ml-collections_0.1.1-2.debian.tar.xz
 bea12610bf33a4deec463e428d840c3bf525316753baba19c3a2e16b3e30e55a 5863 
python-ml-collections_0.1.1-2_amd64.buildinfo
Files:
 cecf4a907532ad7d37063d84827d23ac 1702 python optional 
python-ml-collections_0.1.1-2.dsc
 a38ff5aa4da86a613fe870999792a87d 4628 python optional 
python-ml-collections_0.1.1-2.debian.tar.xz
 f5330496f49fb2c21ec675d6ccd12325 5863 python optional 
python-ml-collections_0.1.1-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQSglbZu4JAkvuai8HIqJ5BL1yQ+2gUCZCfKJwAKCRAqJ5BL1yQ+
2qOhAQDdMrzIONZi47fC6EpklpTO06JBar7+KmAi7hvyBv2wMQEAsVeZoi9RBLfJ
3tlGFkrNVgF4+TMW+iXKDEXMSmFPtgk=
=VxTm
-END PGP SIGNATURE End Message ---