Bug#1068681: kquickcharts: Make the tests non-fatal on loong64
Source: kquickcharts Version: 5.107.0-1 Severity: wishlist Tags: ftbfs patch User: debian-loonga...@lists.debian.org Usertags: loong64 Dear maintainers, Compiling the kquickcharts package failed for loong64 in the Debian Package Auto-Building environment, the error log is as follows: ``` .. The following tests FAILED: 5 - tst_BarChart.qml (Subprocess aborted) 6 - tst_LineChart.qml (Subprocess aborted) 7 - tst_PieChart.qml (Subprocess aborted) Errors while running CTest ``` The full build log can be found at https://buildd.debian.org/status/logs.php?pkg=kquickcharts&ver=5.107.0-1%2Bb1&arch=loong64. There is no architecture-related code in the kquickcharts source code. Refer to the processing methods of other architectures, could you set the tests non-fatal on loong64? Please consider the patch I have attached. Your opinions are welcome. Thanks, Dandan Zhang diff -Nru kquickcharts-5.107.0/debian/rules kquickcharts-5.107.0/debian/rules --- kquickcharts-5.107.0/debian/rules 2023-03-16 21:42:02.0 + +++ kquickcharts-5.107.0/debian/rules 2023-06-18 14:08:49.0 + @@ -5,7 +5,7 @@ export DEB_BUILD_MAINT_OPTIONS = hardening=+all -testsuite_failing_archs := alpha hppa hurd-i386 mips64el powerpc riscv64 x32 +testsuite_failing_archs := alpha hppa hurd-i386 loong64 mips64el powerpc riscv64 x32 ifneq (,$(filter $(DEB_HOST_ARCH),$(testsuite_failing_archs))) fail_param := || true endif
Processing of kf6-kconfigwidgets_6.0.0-1_amd64.changes
kf6-kconfigwidgets_6.0.0-1_amd64.changes uploaded successfully to localhost along with the files: kf6-kconfigwidgets_6.0.0-1.dsc kf6-kconfigwidgets_6.0.0.orig.tar.xz kf6-kconfigwidgets_6.0.0.orig.tar.xz.asc kf6-kconfigwidgets_6.0.0-1.debian.tar.xz kf6-kconfigwidgets_6.0.0-1_amd64.buildinfo libkf6configwidgets-data_6.0.0-1_all.deb libkf6configwidgets-dev-dbgsym_6.0.0-1_amd64.deb libkf6configwidgets-dev_6.0.0-1_amd64.deb libkf6configwidgets-doc_6.0.0-1_all.deb libkf6configwidgets6-dbgsym_6.0.0-1_amd64.deb libkf6configwidgets6_6.0.0-1_amd64.deb Greetings, Your Debian queue daemon (running on host usper.debian.org)
kf6-kconfigwidgets_6.0.0-1_amd64.changes is NEW
binary:libkf6configwidgets-data is NEW. binary:libkf6configwidgets-dev is NEW. binary:libkf6configwidgets-doc is NEW. binary:libkf6configwidgets6 is NEW. binary:libkf6configwidgets-data is NEW. binary:libkf6configwidgets-dev is NEW. binary:libkf6configwidgets-doc is NEW. binary:libkf6configwidgets6 is NEW. source:kf6-kconfigwidgets is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports pgpamcok_9Cjx.pgp Description: PGP signature
Processing of kf6-kcolorscheme_6.0.0-1_amd64.changes
kf6-kcolorscheme_6.0.0-1_amd64.changes uploaded successfully to localhost along with the files: kf6-kcolorscheme_6.0.0-1.dsc kf6-kcolorscheme_6.0.0.orig.tar.xz kf6-kcolorscheme_6.0.0.orig.tar.xz.asc kf6-kcolorscheme_6.0.0-1.debian.tar.xz kf6-kcolorscheme_6.0.0-1_amd64.buildinfo libkf6colorscheme-data_6.0.0-1_all.deb libkf6colorscheme-dev_6.0.0-1_amd64.deb libkf6colorscheme-doc_6.0.0-1_all.deb libkf6colorscheme6-dbgsym_6.0.0-1_amd64.deb libkf6colorscheme6_6.0.0-1_amd64.deb Greetings, Your Debian queue daemon (running on host usper.debian.org)
kf6-kcolorscheme_6.0.0-1_amd64.changes REJECTED
kf6-kcolorscheme_6.0.0-1.dsc: Does not match file already existing in the pool. binary:libkf6colorscheme-data is NEW. binary:libkf6colorscheme-dev is NEW. binary:libkf6colorscheme-doc is NEW. binary:libkf6colorscheme6 is NEW. binary:libkf6colorscheme-data is NEW. binary:libkf6colorscheme-dev is NEW. binary:libkf6colorscheme-doc is NEW. binary:libkf6colorscheme6 is NEW. source:kf6-kcolorscheme is NEW. kf6-kcolorscheme_6.0.0.orig.tar.xz is only available in NEW. kf6-kcolorscheme_6.0.0.orig.tar.xz.asc is only available in NEW. libkf6colorscheme-data_6.0.0-1_all.deb is only available in NEW. libkf6colorscheme-dev_6.0.0-1_amd64.deb is only available in NEW. libkf6colorscheme6-dbgsym_6.0.0-1_amd64.deb is only available in NEW. kf6-kcolorscheme_6.0.0.orig.tar.xz is only available in NEW. kf6-kcolorscheme_6.0.0.orig.tar.xz.asc is only available in NEW. === Please feel free to respond to this email if you don't understand why your files were rejected, or if you upload new files which address our concerns. pgpZ7adchEuuv.pgp Description: PGP signature
Processing of kf6-kcolorscheme_6.0.0-1_amd64.changes
kf6-kcolorscheme_6.0.0-1_amd64.changes uploaded successfully to localhost along with the files: kf6-kcolorscheme_6.0.0-1.dsc kf6-kcolorscheme_6.0.0.orig.tar.xz kf6-kcolorscheme_6.0.0.orig.tar.xz.asc kf6-kcolorscheme_6.0.0-1.debian.tar.xz kf6-kcolorscheme_6.0.0-1_amd64.buildinfo libkf6colorscheme-data_6.0.0-1_all.deb libkf6colorscheme-dev_6.0.0-1_amd64.deb libkf6colorscheme-doc_6.0.0-1_all.deb libkf6colorscheme6-dbgsym_6.0.0-1_amd64.deb libkf6colorscheme6_6.0.0-1_amd64.deb Greetings, Your Debian queue daemon (running on host usper.debian.org)
kf6-kcolorscheme_6.0.0-1_amd64.changes is NEW
binary:libkf6colorscheme-data is NEW. binary:libkf6colorscheme-dev is NEW. binary:libkf6colorscheme-doc is NEW. binary:libkf6colorscheme6 is NEW. binary:libkf6colorscheme-data is NEW. binary:libkf6colorscheme-dev is NEW. binary:libkf6colorscheme-doc is NEW. binary:libkf6colorscheme6 is NEW. source:kf6-kcolorscheme is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports pgpJgGtaG4Ed6.pgp Description: PGP signature
Bug#1068454: marked as done (qt6-base: CVE-2024-30161)
Your message dated Mon, 08 Apr 2024 09:12:48 -0300 with message-id <4656997.FDCN7LgBLZ@gryffindor> and subject line Re: qt6-base: CVE-2024-30161 has caused the Debian Bug report #1068454, regarding qt6-base: CVE-2024-30161 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1068454: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068454 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: qt6-base X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for qt6-base. CVE-2024-30161[0]: | In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component may | access QNetworkReply header data via a dangling pointer. https://codereview.qt-project.org/c/qt/qtbase/+/544314 https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-30161 https://www.cve.org/CVERecord?id=CVE-2024-30161 Please adjust the affected versions in the BTS as needed. --- End Message --- --- Begin Message --- Hi Moritz! El viernes, 5 de abril de 2024 11:47:22 -03 Moritz Mühlenhoff escribió: > Source: qt6-base > X-Debbugs-CC: t...@security.debian.org > Severity: important > Tags: security > > Hi, > > The following vulnerability was published for qt6-base. > > CVE-2024-30161[0]: > | In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component may > | access QNetworkReply header data via a dangling pointer. > > https://codereview.qt-project.org/c/qt/qtbase/+/544314 > https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365 To the best of my knowledge we do not use the wasm (web assembly) at all, so as discussed on IRC, I am closing this bug. Thanks for your work -- Lisandro Pérez Meyer Embedded Platform Engineer--- End Message ---