Bug#1036641: gcc-12-base: please bump the Breaks: gnat (<< 12) for smoother upgrades from bullseye

2023-05-23 Thread Andreas Beckmann
Package: gcc-12-base
Version: 12.2.0-14
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

As usual, it is helpful to bump the Breaks against gnat (which is not
co-installable) for smoother upgrades from bullseye to ensure the
obsolete gnat-10 stack gets removed.

Andreas



Processed: Re: libmpfr6: multiple bugs in GNU MPFR 4.2.0, patches available

2023-05-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1036606 fixed-upstream
Bug #1036606 [libmpfr6] libmpfr6: multiple bugs in GNU MPFR 4.2.0, patches 
available
Added tag(s) fixed-upstream.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1036606: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036606
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1036606: libmpfr6: multiple bugs in GNU MPFR 4.2.0, patches available

2023-05-23 Thread Vincent Lefevre
Package: libmpfr6
Version: 4.2.0-1
Severity: important
Tags: upstream

There are multiple bugs, more or less important, in GNU MPFR 4.2.0.
Patches are available at
  https://www.mpfr.org/mpfr-4.2.0/#bugs

In particular:
* For the mpfr_ui_pow_ui function, infinite loop in case of overflow.
* The mpfr_rec_sqrt function may yield a stack overflow due to many
  small allocations in the stack, based on alloca(). This occurs on
  cases that are very hard to round. In practice, to build such cases,
  the precision of the input needs to be large enough (e.g. around
  10 bits).
* MPFR can crash when a formatted output function is called with
  %.2147483648Rg in the format string (2147483648 = 2^31).

See attached files for simple testcases (but the patches provide
testcases for the testsuite).

-- System Information:
Debian Release: 12.0
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing-security'), (500, 
'stable-updates'), (500, 'stable-security'), (500, 'unstable'), (500, 
'testing'), (500, 'stable'), (1, 'experimental')
merged-usr: no
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-9-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=POSIX, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libmpfr6 depends on:
ii  libc6 2.36-9
ii  libgmp10  2:6.2.1+dfsg1-1.1

libmpfr6 recommends no packages.

libmpfr6 suggests no packages.

-- no debconf information

-- 
Vincent Lefèvre  - Web: 
100% accessible validated (X)HTML - Blog: 
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)
#include 
#include 
#include 

int main (void)
{
  mpfr_exp_t emax_max;
  mpfr_t x;

  emax_max = mpfr_get_emax_max ();

  if (mpfr_set_emax (emax_max))
{
  fprintf (stderr, "ui_pow_ui-overflow error: mpfr_set_emax failed\n");
  return 1;
}

  mpfr_init2 (x, 8);

  /* The purpose of this test is more to check that mpfr_ui_pow_ui
 terminates (without taking much memory) rather than checking
 the value of x. On 2023-02-13, the +Inf case was not handled
 in the Ziv iteration, yielding an infinite loop, affecting
 mpfr_log10 in particular. See
   commit 90de094f0d9c309daca707aa227470d810866616
  */
  mpfr_ui_pow_ui (x, 5, ULONG_MAX, MPFR_RNDN);
  if (emax_max <= ULONG_MAX  /* true with default _MPFR_EXP_FORMAT */
  && ! mpfr_inf_p (x))
{
  fprintf (stderr, "ui_pow_ui-overflow error");
  printf ("ui_pow_ui-overflow: expected +Inf, got ");
  mpfr_dump (x);
  return 1;
}

  mpfr_clear (x);

  return 0;
}
#include 
#include 

int main (void)
{
  mpfr_t x, y;
  int inex;

  mpfr_init2 (x, 123456);
  mpfr_init2 (y, 4);
  mpfr_set_ui (y, 9, MPFR_RNDN);
  mpfr_ui_div (x, 1, y, MPFR_RNDN);
  inex = mpfr_rec_sqrt (y, x, MPFR_RNDN);
  /* Let's also check the result, though this is not the real purpose
 of this test (a stack overflow just makes the program crash).
 1/9 = 0.111000111000111000111000111000111000...E-3 and since the
 precision 123456 is divisible by 6, x > 1/9. Thus 1/sqrt(x) < 3. */
  if (mpfr_nan_p (y) || mpfr_cmp_ui (y, 3) != 0 || inex <= 0)
{
  printf ("mpfr_rec_sqrt error: expected 3 with inex > 0, got ");
  mpfr_out_str (stdout, 10, 0, y, MPFR_RNDN);
  printf (" with inex=%d\n", inex);
  return 1;
}
  mpfr_clear (x);
  mpfr_clear (y);

  return 0;
}
#include 
#include 

int main (void)
{
  mpfr_t x;
  char buf1[3] = "xxx", buf2[3] = "xxx";
  int r;

  mpfr_init2 (x, 128);
  mpfr_set_ui (x, 1, MPFR_RNDN);

  r = mpfr_snprintf (NULL, 0, "%.2147483648Rg\n", x);
  if (r != 2 && r >= 0)
return 1;

  r = mpfr_snprintf (buf1, sizeof(buf1), "%.2147483648Rg\n", x);
  if (r != 2 && r >= 0)
return 2;
  if (r >= 0 && (buf1[0] != '1' || buf1[1] != '\n' || buf1[2] != 0))
return 3;

  r = mpfr_sprintf (buf2, "%.2147483648Rg\n", x);
  if (r != 2 && r >= 0)
return 4;
  if (r >= 0 && (buf2[0] != '1' || buf2[1] != '\n' || buf2[2] != 0))
return 5;

  mpfr_clear (x);
  return 0;
}


gcc-11_11.3.0-15_source.changes ACCEPTED into unstable

2023-05-23 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 23 May 2023 09:08:39 +0200
Source: gcc-11
Architecture: source
Version: 11.3.0-15
Distribution: unstable
Urgency: medium
Maintainer: Debian GCC Maintainers 
Changed-By: Matthias Klose 
Changes:
 gcc-11 (11.3.0-15) unstable; urgency=medium
 .
   * Update to git 20230523 from the gcc-11 branch (11.4 release candidate).
 - Fix PR c++/98821, PR target/70243 (PPC), PR target/104871 (Darwin),
   PR target/105599 (Darwin), PR c++/108998, PR c++/100295, PR c++/107579,
   PR c++/107864, PR c++/107179, PR c++/100474, PR c++/104527,
   PR c++/92752, PR c++/101118, PR fortran/109846, PR libstdc++/107801,
   PR libstdc++/107801, PR libstdc++/91456, PR libstdc++/104875,
   PR libstdc++/108118, PR libstdc++/108265.
Checksums-Sha1:
 6dd88b6d8b4d5bd7e46a126c4fe59bb859d34cf5 22383 gcc-11_11.3.0-15.dsc
 bac694003b7f08d995b2a4b20fe5ae899d16e977 810188 gcc-11_11.3.0-15.debian.tar.xz
 44f38ef3063a2eea1163ae8d895af1e6c1863323 9007 gcc-11_11.3.0-15_source.buildinfo
Checksums-Sha256:
 b7b113771a9dd4a161db6eafc7a29b96935005c3582ad2d3ec02dfaa9826 22383 
gcc-11_11.3.0-15.dsc
 05c1a648717ec764b23aaf66ee7042d5c8a9dc8278a7d146a54cc55249829efc 810188 
gcc-11_11.3.0-15.debian.tar.xz
 25ce789acb210dc08eef29d5a287f23a6d11a8d4ebf7e0fe5030ec8d1b2dc5ff 9007 
gcc-11_11.3.0-15_source.buildinfo
Files:
 d8b48e79050c36bc1ac9a0dad4f8d226 22383 devel optional gcc-11_11.3.0-15.dsc
 049c9e16e2eb723ace59952a7847e2e0 810188 devel optional 
gcc-11_11.3.0-15.debian.tar.xz
 284f33d551807b02660db6aa59974b6d 9007 devel optional 
gcc-11_11.3.0-15_source.buildinfo

-BEGIN PGP SIGNATURE-
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=XSHX
-END PGP SIGNATURE-



Processing of gcc-11_11.3.0-15_source.changes

2023-05-23 Thread Debian FTP Masters
gcc-11_11.3.0-15_source.changes uploaded successfully to localhost
along with the files:
  gcc-11_11.3.0-15.dsc
  gcc-11_11.3.0-15.debian.tar.xz
  gcc-11_11.3.0-15_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)