Bug#1070667: [Pkg-openssl-devel] Bug#1070667: closed by Sebastian Andrzej Siewior (Re: Bug#1070667: libssl3: Cannot remove system package:)

2024-05-11 Thread Sebastian Andrzej Siewior
On 2024-05-09 15:14:54 [+0300], Odysseas Romanos wrote: > Dear Sebastian Hi, > Thank you very much for your support. I will try manually as you > suggested. Do you need me to keep you updated or leave it as it is? You can let me know how it went but the bug report closed and does not require

Bug#1070667: libssl3: Cannot remove system package:

2024-05-08 Thread Sebastian Andrzej Siewior
On 2024-05-07 12:20:51 [+0300], Odysseas Romanos wrote: > Old Trixie —> new trixie. Bug 1065135 seems unrelated to me. I am noob > to this so I apologize if I am not clear on my reporting That is okay. Just make sure you don't lose the Cc: so we have a public record. Now. We did (still do) have a

Bug#1070667: libssl3: Cannot remove system package:

2024-05-06 Thread Sebastian Andrzej Siewior
+ Steve Langasek, Benjamin Drung On 2024-05-07 00:02:11 [+0300], Odysseas Romanos wrote: > Package: libssl3 > Version: 3.1.5-1 > Severity: important > X-Debbugs-Cc: oromanos2...@gmail.com > > Dear Maintainer, > > *** Reporter, please consider answering these questions, where appropriate *** >

Bug#1069825: [Pkg-clamav-devel] Bug#1069825: clamav-daemon stops working with LibClamAV Error: cl_engine_addref: engine == NULL

2024-05-04 Thread Sebastian Andrzej Siewior
On 2024-04-25 13:38:51 [+0200], Michael Braun wrote: > Hi, Hi, > I'm scanning incoming mails using clamav-daemon and clamav-milter. > From time to time, my mailserver stops working due to clamav-daemon locking > up. > > The clamav logs read: > >6889 Apr 25 11:28:12 gate clamd[939931]: Thu

Bug#1069603: [Pkg-openssl-devel] Bug#1069603: Bug#1069603: openssl breaks libcrypt-smime-perl autopkgtest: Crypt::SMIME#setPublicKeyStore: failed to store the public cert

2024-04-22 Thread Sebastian Andrzej Siewior
On 2024-04-21 19:30:21 [+0200], Paul Gevers wrote: > Hi Hi, > > Could britney be hinted to migrate both at the same time? This should > > solve the issue you pointed out. > > There is no "please test together" knob if that's what you mean (is that > what you mean?). Yes, it is/ was. >

Bug#1069603: [Pkg-openssl-devel] Bug#1069603: openssl breaks libcrypt-smime-perl autopkgtest: Crypt::SMIME#setPublicKeyStore: failed to store the public cert

2024-04-21 Thread Sebastian Andrzej Siewior
On 2024-04-21 13:42:03 [+0200], Paul Gevers wrote: > opensslfrom testing3.2.1-3 > libcrypt-smime-perlfrom testing0.28-1 > all others from testingfrom testing > > I copied some of the output at the bottom of this report. > > Currently this regression

Bug#1065413: bookworm-pu: package openssl/3.0.13-1~deb12u1

2024-04-09 Thread Sebastian Andrzej Siewior
On 2024-04-07 23:46:28 [+0200], To Adam D. Barratt wrote: > On 2024-03-24 20:06:12 [+], Adam D. Barratt wrote: > > > > Sorry for not getting to this sooner. Is this still the case? > > So. This happened #1068045 (yapet broke with 1.0 format) due to the > update. On the bright side it has

Bug#1068045: [Pkg-openssl-devel] Bug#1068045: libssl3: breaks YAPET

2024-04-08 Thread Sebastian Andrzej Siewior
t file. Further testing is welcome by actual users ;) I can NMU if needed just yell. Sebastian From a54b5e81a61aa7e77e45a970ce88b9b4269fde7d Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Mon, 8 Apr 2024 18:03:30 +0200 Subject: [PATCH 1/2] crypt/blowfish: Remove EVP_CIPHER_CTX_set_key_

Bug#1065413: bookworm-pu: package openssl/3.0.13-1~deb12u1

2024-04-07 Thread Sebastian Andrzej Siewior
On 2024-03-24 20:06:12 [+], Adam D. Barratt wrote: > > Sorry for not getting to this sooner. Is this still the case? So. This happened #1068045 (yapet broke with 1.0 format) due to the update. On the bright side it has been broken in unstable but unnoticed. Looking into it but also sleeping

Bug#1068045: [Pkg-openssl-devel] Bug#1068045: libssl3: breaks YAPET

2024-04-07 Thread Sebastian Andrzej Siewior
On 2024-04-07 15:36:37 [+0800], Sean Whitton wrote: > Hello, Hi, > On Sat 06 Apr 2024 at 03:24pm +02, Salvatore Bonaccorso wrote: > > > As it is a regression caused by libssl3 3.0.11 based to 3.0.13, why is > > it reassigned to yapet? (the regression is as well present in > > unstable). > > I

Bug#1068045: [Pkg-openssl-devel] Bug#1068045: libssl3: breaks YAPET

2024-04-06 Thread Sebastian Andrzej Siewior
On 2024-04-06 17:17:45 [+0800], Sean Whitton wrote: > Hello, Hi, > It looks like the problem is opening YAPET1.0-format databases, which > the manpage explicitly says is meant to work. > > I've made a sample YAPET1.0 database using a stretch VM. Using the > attached: > > - On bookworm, invoke

Bug#1068348: xz-utils: Should activate trigger to force regenerating initramfs

2024-04-04 Thread Sebastian Andrzej Siewior
On 2024-04-04 00:14:27 [+0200], Guillem Jover wrote: > Hi! Hi, > I initially was thinking that a conditionally triggered activation > when upgrading from the affected versions would be sufficient, but if > people have already upgraded, then that will still leave them with the > malicious stuff in

Bug#1065135: [Pkg-openssl-devel] Bug#1065135: sort: error while loading shared libraries: libcrypto.so.3

2024-04-03 Thread Sebastian Andrzej Siewior
On 2024-02-29 20:37:25 [-0800], Steve Langasek wrote: > This is definitely not the behavior we want. However, the good thing is > that the dependency from coreutils to libssl is new since bookworm. As a > result, while this can affect users on upgrades from testing, it will not > affect upgrades

Bug#1068024: revert to version that does not contain changes by bad actor

2024-04-03 Thread Sebastian Andrzej Siewior
On 2024-04-02 14:34:20 [+0200], Guillem Jover wrote: > (Please do not take this mail as endorsing any specific action, just > wanted to clarify/correct the above.) Right, same here. The 5.4.x series has threaded decompression which I would like to keep. The 5.6.x series has branchless

Bug#888572: git-buildpackage: creating xz tarballs should be done multi-threaded

2024-04-03 Thread Sebastian Andrzej Siewior
On 2024-04-03 19:16:25 [+0200], Carsten Schoenert wrote: > I did a few more working on some of the packages I maintain and I did not > encounter similar problems with wrong hash ids like a few days back. Given > the troubled times around the liblzma versions I'm not sure the initial > issue about

Bug#1065751: pristine-tar: diff for NMU version 1.50+nmu2

2024-03-31 Thread Sebastian Andrzej Siewior
On 2024-03-31 19:42:24 [+], tony mancill wrote: > Given what has unfolded over the past few days regarding xz-utils and > CVE-2024-3094 [0], should we revisit the patches applied here and for > #1063252? Are they still needed? Not with the fallback to pre 5.4.x series but *I* don't think

Bug#1068045: [Pkg-openssl-devel] Bug#1068045: libssl3: breaks YAPET

2024-03-30 Thread Sebastian Andrzej Siewior
On 30 March 2024 13:14:37 CET, Sean Whitton wrote: >Hello, Hi, >I downgraded, changed the password for my database to 'asdf', >changed it back to the password it had before, upgraded libssl3, >and the bug did not appear. > >I reverted to my original db, downgraded again, deleted an entry

Bug#1068045: [Pkg-openssl-devel] Bug#1068045: libssl3: breaks YAPET

2024-03-30 Thread Sebastian Andrzej Siewior
On 2024-03-30 09:25:27 [+0800], Sean Whitton wrote: > Package: libssl3 > Version: 3.0.13-1~deb12u1 > Severity: grave > Justification: renders package unusable > X-Debbugs-Cc: t...@security.debian.org > Control: affects -1 + yapet > > Dear maintainer, > > This version of libssl3 from

Bug#1067708: new upstream versions as NMU vs. xz maintenance

2024-03-27 Thread Sebastian Andrzej Siewior
On 26 March 2024 23:11:19 CET, Thorsten Glaser wrote: >Very much *not* a fan of NMUs doing large changes such as >new upstream versions. Most of the changes are part of current -2. Ppl complainted about valgrind reports which are addressed in the new upstream version. >But this does give us

Bug#1065413: bookworm-pu: package openssl/3.0.13-1~deb12u1

2024-03-24 Thread Sebastian Andrzej Siewior
On 2024-03-24 20:06:12 [+], Adam D. Barratt wrote: > On Mon, 2024-03-04 at 07:38 +0100, Sebastian Andrzej Siewior wrote: > > This is an update to the current stable OpenSSL release in the 3.0.x > > series. It addresses the following CVE reports which were postponed > >

Bug#1067636: nodejs: Testsuite fails with openssl 3.2

2024-03-24 Thread Sebastian Andrzej Siewior
Package: nodejs Version: 18.19.1+dfsg-6 Severity: important Tags: sid control: affects -1 src:openssl User: pkg-openssl-de...@lists.alioth.debian.org Usertags: openssl-3.2 Hi, I rebuilt nodejs in unstable against openssl 3.2 in experimental an a few tests failed: | Failed tests: | ./node

Bug#1067572: rust-parsec-tool

2024-03-23 Thread Sebastian Andrzej Siewior
Package: rust-parsec-tool Version: 0.7.0-3 Severity: important Tags: sid patch control: affects -1 src:openssl User: pkg-openssl-de...@lists.alioth.debian.org Usertags: openssl-3.2 The testsuite fails with openssl 3.2. Please find attached upstream commit 8948077e106a0 ("parsec-cli-tests.sh:

Bug#1066576: nagios-plugins-contrib: FTBFS: check_memcached.l:339:37: error: implicit declaration of function ‘asprintf’; did you mean ‘vsprintf’? [-Werror=implicit-function-declaration]

2024-03-23 Thread Sebastian Andrzej Siewior
control -1 tags patch the patch attached fixes the warnings in check_memcached.l. Sebastian >From 155e35ace12f41bbaa42e4ea19bfea6de416bd95 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Fri, 22 Mar 2024 19:48:09 +0100 Subject: [PATCH] Compile warnings. Address various comp

Bug#1067532: nagios-plugins-contrib: Testsuite fails with openssl 3.2

2024-03-23 Thread Sebastian Andrzej Siewior
Package: nagios-plugins-contrib Version: 45.20231212 Severity: important Tags: sid patch control: affects -1 src:openssl User: pkg-openssl-de...@lists.alioth.debian.org Usertags: openssl-3.2 The package fails the debci testsuite with OpenSSL 3.2 due to output on stderr. The patch attached is a

Bug#888572: git-buildpackage: creating xz tarballs should be done multi-threaded

2024-03-22 Thread Sebastian Andrzej Siewior
On 2019-03-08 22:10:10 [+0100], Carsten Schoenert wrote: > Hello Guido, Hi, > On Tue, Jan 30, 2018 at 07:19:48AM +0100, Carsten Schoenert wrote: > > > We should not do more options. Multi threaded should be on when: > > > > > > - not using pristine-tar > > > - iff pristine-tar can handle it

Bug#1065751: pristine-tar: diff for NMU version 1.50+nmu2

2024-03-12 Thread Sebastian Andrzej Siewior
On 2024-03-12 09:26:32 [-0400], Jeremy Bícha wrote: > > Could someone check this, please? > > Did you try running autopkgtests on this version? The autopkgtests fail for > me. autopkgtests were the first thing that pointed me here and they passed. If you say they fail for you then I may have

Bug#1065751: pristine-tar: diff for NMU version 1.50+nmu2

2024-03-12 Thread Sebastian Andrzej Siewior
On 2024-03-11 21:23:03 [+], Amin Bandali wrote: > Hi, Hi, > On Mon, Mar 11, 2024 at 05:55:31PM +0100, Sebastian Andrzej Siewior wrote: > > On 2024-03-11 00:05:54 [+], Amin Bandali wrote: > > > Hi Sebastian, all, > > Hi, > > > > > Will this fix

Bug#1065424: [Pkg-openssl-devel] Bug#1065424: Bug#1065424: Can't connect to Active Directory with openssl

2024-03-11 Thread Sebastian Andrzej Siewior
On 2024-03-11 13:29:10 [+0100], Maciej Bogucki wrote: > Hi, Hi, > When I use stiati compiled openssl form different system I can have the > connection > > root@nsd-sdproxy1:~# /tmp/openssl version > OpenSSL 1.0.1t  3 May 2016 that is stone age. > root@nsd-sdproxy1:~# /tmp/openssl  s_client

Bug#1065751: pristine-tar: diff for NMU version 1.50+nmu2

2024-03-11 Thread Sebastian Andrzej Siewior
On 2024-03-11 00:05:54 [+], Amin Bandali wrote: > Hi Sebastian, all, Hi, > Will this fix be enough for addressing all cases, though? I think so. Do you have a test case for me to check? > I'm thinking specifically of cases where tarball repacking > is involved, for example when using

Bug#1063252: Proposed fix broke pristine-tar for me

2024-03-10 Thread Sebastian Andrzej Siewior
On 2024-03-10 00:12:46 [+0100], Andrea Pappacoda wrote: > Hi, thanks for your fix! Hi, > Unfortunately it seems that your patch has broke tarball generation for one > of the packages I maintain, dynarmic. > >$ gbp export-orig >gbp:info: Creating

Bug#1065751: pristine-tar: diff for NMU version 1.50+nmu2

2024-03-10 Thread Sebastian Andrzej Siewior
; urgency=medium + + * Non-maintainer upload. + * Preoperly account -T parameter for xz. Thanks to Jia Tan for the hint. +(Closes: #1065751). + + -- Sebastian Andrzej Siewior Sun, 10 Mar 2024 21:38:16 +0100 + pristine-tar (1.50+nmu1) unstable; urgency=medium * Non-maintainer upload. diff -Nru

Bug#1063621: bookworm-pu: package clamav/clamav_1.0.5+dfsg-1~deb12u1

2024-03-08 Thread Sebastian Andrzej Siewior
On 2024-03-08 07:38:10 [+], Adam D. Barratt wrote: > On Fri, 2024-02-09 at 23:12 +0100, Sebastian Andrzej Siewior wrote: > > This is an update to the latest clamav release in the 1.0.x series. > > One small thing you may want to fix for any follow-up updates: > >

Bug#1065529: interimap: Testsuite fails with openssl 3.2

2024-03-08 Thread Sebastian Andrzej Siewior
On 2024-03-06 15:27:50 [+0100], Guilhem Moulin wrote: > Hi Sebastian, Hi, > Great to hear OpenSSL 3.2 will soon be entering sid! :-) > > On Wed, 06 Mar 2024 at 07:59:53 +0100, Sebastian Andrzej Siewior wrote: > > I'm currently puzzled where to look at. Could you please have a l

Bug#1065529: interimap: Testsuite fails with openssl 3.2

2024-03-05 Thread Sebastian Andrzej Siewior
Package: interimap Version: 0.5.7-2 Severity: important Tags: sid control: affects -1 src:openssl User: pkg-openssl-de...@lists.alioth.debian.org Usertags: openssl-3.2 interimap's testsuite fails with OpenSSL 3.2, which is currently in experimental, for the tests:

Bug#1065424: [Pkg-openssl-devel] Bug#1065424: Acknowledgement (Can't connect to Active Directory with openssl)

2024-03-04 Thread Sebastian Andrzej Siewior
On 2024-03-04 12:01:55 [+0100], Maciej Bogucki wrote: > I have just attached pcap file. the remote side rude. The client sent a "Client Hello". The remote side didn't like it and just closed the connection. Rude behaviour is rude. My guess is RSA+SHA1 is missing and is the only accepted

Bug#1065424: [Pkg-openssl-devel] Bug#1065424: Can't connect to Active Directory with openssl

2024-03-04 Thread Sebastian Andrzej Siewior
On 2024-03-04 11:16:14 [+0100], Maciej Bogucki wrote: > When I invoke `/usr/bin/openssl s_client -connect 192.168.92.95:636` So you get no reply? That is odd. There has to be reply. A "Connected" line is something I would have expected. If there is nothing then I would assume that the port is

Bug#1063621: bookworm-pu: package clamav/clamav_1.0.5+dfsg-1~deb12u1

2024-03-03 Thread Sebastian Andrzej Siewior
On 2024-02-09 23:12:18 [+0100], To sub...@bugs.debian.org wrote: > Package: release.debian.org > Control: affects -1 + src:clamav > X-Debbugs-Cc: cla...@packages.debian.org > User: release.debian@packages.debian.org > Usertags: pu > Tags: bookworm > Severity: normal > > This is an update to

Bug#1065413: bookworm-pu: package openssl/3.0.13-1~deb12u1

2024-03-03 Thread Sebastian Andrzej Siewior
Package: release.debian.org Control: affects -1 + src:openssl X-Debbugs-Cc: open...@packages.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: bookworm X-Debbugs-Cc: sebast...@breakpoint.cc Severity: normal This is an update to the current stable OpenSSL release in the

Bug#1064856: dpkg: New xz-utils print warnings on stderr

2024-02-26 Thread Sebastian Andrzej Siewior
On 2024-02-26 20:46:43 [+0100], Guillem Jover wrote: > > > Ignoring stderr could be a workaround, but I'd need to do something as > > > well for the libdpkg code and the perl code calling xz, which will get > > > very annoying. > > > > > > This is also going to get in the way of migrating both xz

Bug#1064856: dpkg: New xz-utils print warnings on stderr

2024-02-26 Thread Sebastian Andrzej Siewior
On 2024-02-26 19:23:58 [+0100], Guillem Jover wrote: > Hi! Hi Guillem, > > | 89s +xz: Reduced the number of threads from 16 to 8 to not exceed the > > memory usage limit of 1400 MiB > > | 89s +xz: Reduced the number of threads from 16 to 8 to not exceed the > > memory usage limit of 1400 MiB >

Bug#1064857: unar: New xz-utils print warnings on stderr

2024-02-26 Thread Sebastian Andrzej Siewior
Package: unar Version: 1.10.7+ds1+really1.10.1-2 Severity: important xz-utils 5.6.0 has been uploaded to unstable. A changed behaviour of `xz' is now that mutlti threaded compress/ decompression is now enabled by default. This in turn leads to warnings if the requested amount of memory exceeds

Bug#1064856: dpkg: New xz-utils print warnings on stderr

2024-02-26 Thread Sebastian Andrzej Siewior
Package: dpkg Version: 1.22.4 Severity: important xz-utils 5.6.0 has been uploaded to unstable. A changed behaviour of `xz' is now that mutlti threaded compress/ decompression is now enabled by default. This in turn leads to warnings if the requested amount of memory exceeds the available amount.

Bug#1064853: RM: r-bioc-rhtslib [armel armhf i386] -- ANAIS; No longer built

2024-02-26 Thread Sebastian Andrzej Siewior
Package: ftp.debian.org Control: affects -1 + src:r-bioc-rhtslib X-Debbugs-Cc: r-bioc-rhts...@packages.debian.org User: ftp.debian@packages.debian.org Usertags: remove Severity: normal Hi, starting with 2.4.1+dfsg-2 the r-bioc-rhtslib package no longer builds for 32bit archs. The previously

Bug#1063874: m2crypto: Testsuite fails with OpenSSL 3.2

2024-02-13 Thread Sebastian Andrzej Siewior
3.2 and so the test for verify fails because the memory BIO "ended". The attached patch fixes the issue. Sebastian >From 08308043d7ce8bb645996c8cb29655a23ead43a4 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Tue, 13 Feb 2024 17:47:22 +0100 Subject: [PATCH] test/smim

Bug#1063621: bookworm-pu: package clamav/clamav_1.0.5+dfsg-1~deb12u1

2024-02-09 Thread Sebastian Andrzej Siewior
; +j += strlen(FILENAME_DISABLED_MESSAGE); i++; } else { buffer_cmd[j++] = opt->strarg[i]; diff --git a/common/optparser.c b/common/optparser.c index a7bdbee..1be7afe 100644 --- a/common/optparser.c +++ b/common/optparser.c @@ -333,7 +333,7 @@ co

Bug#1062654: openjdk-17-jre-headless: Segfault in jspawnhelper

2024-02-07 Thread Sebastian Andrzej Siewior
On 2024-02-06 12:52:51 [-0500], Hubert Pineault wrote: > I got the same problem on bullseye. > > the package was upgraded from 17.0.9+9-1~deb11u1 to 17.0.10+7-1~deb11u1 > on the 6th of february (with unattended-upgrades). It broke my jenkins > instance because it could not fetch git repo anymore.

Bug#1063252: pristine-tar: Always set the -T parameter for xz

2024-02-05 Thread Sebastian Andrzej Siewior
bastian >From ea404fcd433147bd8328836fe96928b8643a56f6 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior Date: Mon, 5 Feb 2024 22:10:07 +0100 Subject: [PATCH] pristine-xz: Add -T1 if nothing was specified. Signed-off-by: Sebastian Andrzej Siewior --- pristine-xz | 13 - 1

Bug#1062072: [Pkg-clamav-devel] Bug#1062072: clamav: NMU diff for 64-bit time_t transition

2024-01-31 Thread Sebastian Andrzej Siewior
On 2024-01-31 09:16:02 [+], Steve Langasek wrote: > If you have any concerns about this patch, please reach out ASAP. Although > this package will be uploaded to experimental immediately, there will be a > period of several days before we begin uploads to unstable; so if information > becomes

Bug#1062002: ngircd: Testsuite fails with openssl 3.2

2024-01-31 Thread Sebastian Andrzej Siewior
On 2024-01-31 20:37:18 [+0100], Christoph Biedl wrote: > Thanks. As upstream is about to do another release, this issue will > resolve automatically. If however you plan to upload to unstable > really soon, making ngircd FTBFS, go ahead and drop me a line, I'll > do what's necessary then. Don't

Bug#1062235: wireless-regdb: debci test fails with OpenSSL 3.2.

2024-01-31 Thread Sebastian Andrzej Siewior
Package: wireless-regdb Version: 2022.06.06-1 Severity: important Tags: sid control: affects -1 src:openssl User: pkg-openssl-de...@lists.alioth.debian.org Usertags: openssl-3.2 OpenSSL 3.2 adds output on stderr if no input file as been specified and input from stdin is expected. This additional

Bug#1062003: easy-rsa: Testsuite breaks with OpenSSL 3.2

2024-01-30 Thread Sebastian Andrzej Siewior
included a space around the fields which is not the case for `utf8'. Patch attaches fixes the issue for OpenSSL 3.2 while it still works with earlier versions. Sebastian From: Sebastian Andrzej Siewior Date: Tue, 30 Jan 2024 22:03:19 +0100 Subject: [PATCH] debian/tests: Pass -nameopt to openssl

Bug#1062002: ngircd: Testsuite fails with openssl 3.2

2024-01-30 Thread Sebastian Andrzej Siewior
Package: src:ngircd Version: 26.1-1 Severity: important Tags: sid patch control: affects -1 src:openssl User: pkg-openssl-de...@lists.alioth.debian.org Usertags: openssl-3.2 The testsuite fails with openssl 3.2. Please find attached upstream commit 287770666008b ("Test suite: Update for OpenSSL

Bug#1061869: sssd: Drop -extensions from openssl command if there is no -x509.

2024-01-29 Thread Sebastian Andrzej Siewior
if there is no -x509 The 'openssl req' ignores the '-extensions' option without '-x509'. OpenSSL versions prior 3.2 simply ignored it. Starting with version 3.2 an error is generated. There are two patches attached: One against sssd and one against debian/tests for debci. Sebastian From: Sebastian Andrzej Siewior

Bug#1061458: gdm3: Testsuite breaks with openssl 3.2

2024-01-24 Thread Sebastian Andrzej Siewior
ly ignored that argument, openssl 3.2 throws an error now, see https://ci.debian.net/packages/g/gdm3/unstable/amd64/ https://ci.debian.net/packages/g/gdm3/unstable/amd64/41875309/ Sebastian From: Sebastian Andrzej Siewior Date: Wed, 24 Jan 2024 21:32:49 +0100 Subject: [PATCH] debian: A

Bug#1060889: [Pkg-clamav-devel] Bug#1060889: Bug#1060889: clamav cannot be cross-arch installed?

2024-01-21 Thread Sebastian Andrzej Siewior
On 2024-01-17 22:00:49 [+0100], To Trent W. Buck wrote: > > 2. clamav's Depends/Conflicts/Replaces are subtly bugged, and should be > > "fixed"; or > > The multi-arch fields could be wrong. Let me check that. I fixed this in unstable. Given that the memory on i386 are almost the same as on

Bug#1060889: [Pkg-clamav-devel] Bug#1060889: clamav cannot be cross-arch installed?

2024-01-17 Thread Sebastian Andrzej Siewior
On 2024-01-16 17:59:21 [+1100], Trent W. Buck wrote: > Package: clamav-base > Version: 1.0.3+dfsg-1~deb12u1 > Severity: minor > > When trying to install clamav for non-default architecture, > I get this error from apt: > > The following packages have unmet dependencies: >

Bug#1060306: [Pkg-clamav-devel] Bug#1060306: clamav on debian oldstable outdated

2024-01-09 Thread Sebastian Andrzej Siewior
On 2024-01-09 10:09:46 [+0100], p-berger wrote: > Package: clamav > Version: 0.103.10+dfsg-0+deb11u1 > > > The daily logs tell that clamav installation is outdated. I suggest to > bump the oldstable version to a current version like 0.103.11 which is > suggested in the error message. > >

Bug#1058700: nmu: dar_2.7.13-2

2023-12-14 Thread Sebastian Andrzej Siewior
Package: release.debian.org Control: affects -1 + src:dar User: release.debian@packages.debian.org Usertags: binnmu Severity: normal Hi, if I see this correctly then dar 2.7.13-2 won't migrate to testing because it was built using openssl 3.0.12-1. This version isn't in testing and if

Bug#1051543: grub2: Fails to load normal.mod from a XFS v5 parition.

2023-11-07 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream On 2023-10-02 17:12:53 [+0200], Julian Andres Klode wrote: > Being subscribed to the mailing list, grabbing the patch and applying > it and shipping it isn't hard, but if you were wondering why it's There are different views here. But Daniel was nice enough

Bug#1002056: Fedora plans to transition to Zlib-ng

2023-11-06 Thread Sebastian Andrzej Siewior
On 2023-10-25 23:17:06 [+0200], Guillem Jover wrote: > Hi! Hi, > Ah, thanks! I had in my mind getting back to this ITP, given that the > zlib-ng project has continued to gain traction and seems to have > consolidated most of the other forks around it. > > So I'll draft another mail to Mark and

Bug#1055416: nodejs: Testsuite failure in test-crypto-dh since OpenSSL 3.0.12/3.1.4.

2023-11-05 Thread Sebastian Andrzej Siewior
ew OpenSSL vesion then it should be okay to apply the original commit. Sebastian From: Sebastian Andrzej Siewior Date: Sun, 5 Nov 2023 13:08:23 +0100 Subject: [PATCH] test: Alter error message. This is variant of upstream's commit 8eea2d3709090 ("test: fix crypto-dh error message for OpenSSL

Bug#1007559: [Pkg-clamav-devel] Bug#1007559: clamsmtp: please consider upgrading to 3.0 source format

2023-10-29 Thread Sebastian Andrzej Siewior
On October 28, 2023 1:05:06 PM GMT+02:00, Bastian Germann wrote: >I am uploading a NMU to DELAYED/10 in order to fix this. >Please find the debdiff attached. Hi, I am team clamav but I don't feel responsible for clamsmtp. The last upload was a NMU. That said, I don't mind if you reschudule

Bug#1054546: openssl: The engine interface seems to be broken.

2023-10-25 Thread Sebastian Andrzej Siewior
Package: openssl Version: 3.0.12-1 Severity: serious Control: affects -1 + src:libp11 Control: forwarded -1 https://github.com/openssl/openssl/issues/22508 At least for libp11 the engine interface seems to be broken. Sebastian

Bug#1054180: openssl: FTBFS on loong64

2023-10-20 Thread Sebastian Andrzej Siewior
On 2023-10-20 13:49:01 [+0800], WANG Xuerui wrote: > Hi, Hi, > This is likely upstream issue > https://github.com/openssl/openssl/issues/21340, manifesting on Debian due > to the packaged binutils not having Loongson SIMD support yet, and fixed by > upstream commit

Bug#1052470: [Pkg-javascript-devel] Bug#1052470: nodejs: Please fix testsuite for openssl-3.1

2023-10-18 Thread Sebastian Andrzej Siewior
On 2023-10-17 22:08:07 [+0200], Jérémy Lal wrote: > I did not forget about this. Really sorry for the delay. > Currently I'd be more willing to help someone maintain nodejs than doing it > myself. > However, I'll probably deal with the next 18.x update very soon, including > your patch. Thank

Bug#1054180: openssl: FTBFS on loong64

2023-10-18 Thread Sebastian Andrzej Siewior
Package: openssl Version: 3.1.2-1 Severity: wishlist Tags: ftbfs User:debian-de...@lists.debian.org Usertags: loongarch64 OpenSSL 3.1.x in experimental FTBFS on loong64: |crypto/aes/vpaes-loongarch64.S: Assembler messages: |crypto/aes/vpaes-loongarch64.S:24: Error: no match insn: vori.b

Bug#1051795: m2crypto: diff for NMU version 0.38.0-4.1

2023-10-18 Thread Sebastian Andrzej Siewior
3.1 error codes (Closes: #1051795). + + -- Sebastian Andrzej Siewior Tue, 17 Oct 2023 21:44:49 +0200 + m2crypto (0.38.0-4) unstable; urgency=high [ Stefano Rivera ] diff -Nru m2crypto-0.38.0/debian/patches/0005-Force-enable-tlsv1-for-the-tls1-tests.patch m2crypto-0.38.0/debian/patches/0005

Bug#1052470: [Pkg-javascript-devel] Bug#1052470: nodejs: Please fix testsuite for openssl-3.1

2023-10-17 Thread Sebastian Andrzej Siewior
On 2023-09-22 22:52:48 [+0200], Jérémy Lal wrote: > Thanks, will include it soon. Thanks. Any update on this? I added two patches. The first one is a cherry-pick from upstream, the second has been forwarded upstream via https://github.com/nodejs/node/pull/49885 but upstream has no

Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

2023-10-02 Thread Sebastian Andrzej Siewior
On 2023-10-02 13:41:17 [+0200], Cyril Brulebois wrote: > Adam D. Barratt (2023-10-02): > > Unfortunately, the version format change from -0+deb11uX to -0~deb11uX > > has broken the installer. > > > > The udebs end up with dependencies of the form ">= 1.1.1w", which > > 1.1.1w-0~deb11u1 doesn't

Bug#1051543: grub2: Fails to load normal.mod from a XFS v5 parition.

2023-09-29 Thread Sebastian Andrzej Siewior
On 2023-09-27 21:45:03 [-0400], Jon DeVree wrote: > I posted an updated v3 version of the patch: > > https://lists.gnu.org/archive/html/grub-devel/2023-09/msg00110.html Just rebuilt grub with v3 of the patch and I can confirm that it works. Thank you. Referencing the message-id or the link to

Bug#1053001: bookworm-pu: package openssl/3.0.11-1~deb12u1

2023-09-26 Thread Sebastian Andrzej Siewior
Package: release.debian.org Control: affects -1 + src:openssl X-Debbugs-Cc: open...@packages.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: bookworm X-Debbugs-Cc: sebast...@breakpoint.cc Severity: normal This is an update of the openssl package to the 3.0.11 version, a

Bug#1052070: bookworm-pu: package mutt/2.2.12-0.1~deb12u1

2023-09-24 Thread Sebastian Andrzej Siewior
On 2023-09-23 20:39:32 [+0100], Adam D. Barratt wrote: > Please go ahead. Thanks, done. > Regards, > > Adam Sebastian

Bug#1052470: nodejs: Please fix testsuite for openssl-3.1

2023-09-22 Thread Sebastian Andrzej Siewior
On 2023-09-22 17:59:51 [+0200], To sub...@bugs.debian.org wrote: > Now I'm about to test this… But it looks promising ;) Okay, builds. Sebastian

Bug#1052470: nodejs: Please fix testsuite for openssl-3.1

2023-09-22 Thread Sebastian Andrzej Siewior
-by: Sebastian Andrzej Siewior --- test/common/index.js | 6 +- .../test-https-agent-session-eviction.js | 1 + test/parallel/test-tls-alert.js | 1 + test/parallel/test-tls-getprotocol.js| 16 +--- test/parallel/test-tls

Bug#1052331: libcrypt-openssl-pkcs12-perl

2023-09-20 Thread Sebastian Andrzej Siewior
Package: libcrypt-openssl-pkcs12-perl Version: 1.9-2 severity: serious I reported FTBFS against openssl 3.0 in #1006386 and now it kind of falls apart again. The check in patch is | $major eq "3.1" and $minor <= 2) or ($major eq "3.0" and $minor <= 10) and I have now 3.1.3 in experimental and

Bug#1052070: bookworm-pu: package mutt/2.2.12-0.1~deb12u1

2023-09-16 Thread Sebastian Andrzej Siewior
Package: release.debian.org Control: affects -1 + src:mutt X-Debbugs-Cc: m...@packages.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: bookworm X-Debbugs-Cc: sebast...@breakpoint.cc Severity: normal This is an update mutt package as provided by upstream to version

Bug#1051543: grub2: Fails to load normal.mod from a XFS v5 parition.

2023-09-15 Thread Sebastian Andrzej Siewior
On 2023-09-15 15:51:51 [+0200], Felix Zielcke wrote: > Hi Sebastian, Hi Felix, > there's now a patch from Jon DeVree upstream, which might fix this for > you. Is it possible for you to test his patch? > > https://lists.gnu.org/archive/html/grub-devel/2023-09/msg00059.html Yes it sovles the

Bug#1050639: bookworm-pu: package clamav/1.0.2+dfsg-1~deb12u1

2023-09-15 Thread Sebastian Andrzej Siewior
On 2023-09-14 21:52:25 [+0100], Adam D. Barratt wrote: > > That's now out, as SUA-240-1. Thank you Adam. > Regards, > > Adam Sebastian

Bug#1050639: bookworm-pu: package clamav/1.0.2+dfsg-1~deb12u1

2023-09-14 Thread Sebastian Andrzej Siewior
On 2023-09-14 06:31:26 [+0100], Adam D. Barratt wrote: > On Wed, 2023-09-13 at 22:01 +0200, Sebastian Andrzej Siewior wrote: > > On 2023-09-13 17:26:46 [+0100], Adam D. Barratt wrote: > > > How does this sound for an SUA? > [...] > > This sounds entirely fine to me. I do

Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

2023-09-13 Thread Sebastian Andrzej Siewior
ain a copy @@ -82,13 +82,16 @@ if (!rsa_param_encode(pkey, , )) return 0; penclen = i2d_RSAPublicKey(pkey->pkey.rsa, ); -if (penclen <= 0) + if (penclen <= 0) { +ASN1_STRING_free(str); return 0; +} if (X509_PUBKEY_set0_param(pk, OBJ_nid2obj(pkey->

Bug#1050639: bookworm-pu: package clamav/1.0.2+dfsg-1~deb12u1

2023-09-13 Thread Sebastian Andrzej Siewior
On 2023-09-13 17:26:46 [+0100], Adam D. Barratt wrote: > How does this sound for an SUA? > > === > Package : clamav > Version : 1.0.3+dfsg-1~deb12u1 [bookworm] >0.103.10+dfsg-0+deb11u1 [bullseye] > Importance : medium > > ClamAV

Bug#1051795: m2crypto: Fails testsuite with OpenSSL 3.1

2023-09-12 Thread Sebastian Andrzej Siewior
Package: m2crypto Version: 0.38.0-4 Severity: important Control: affects -1 + src:openssl Control: tags -1 + upstream patch fixed-upstream Hi, As far as I can tell, m2crypto compiles and passes the testsuite if compiled and run against openssl 3.0 or 3.1. What currently fails is if m2crypto is

Bug#1051543: grub2: Fails to load normal.mod from a XFS v5 parition.

2023-09-12 Thread Sebastian Andrzej Siewior
On 2023-09-12 15:43:34 [+0200], Daniel Kiper wrote: > Hey, Hi, > Adding Lidong... > > Sebastian, Lidong is working on a fix for this issue. ach great. > Lidong, please keep Sebastain in the loop. > > Daniel Sebastian

Bug#1051563: mutt: CVE-2023-4874 CVE-2023-4875

2023-09-10 Thread Sebastian Andrzej Siewior
Hi Antonio! On 2023-09-10 15:57:58 [+0200], Antonio Radici wrote: > On Sun, Sep 10, 2023 at 01:38:33PM +0200, Salvatore Bonaccorso wrote: > > Hi Antonio, > > > > FWIW, I have done the bookworm-security upload already to > > security-master, and still working on the bullseye-security one (with >

Bug#1051563: mutt: CVE-2023-4874 CVE-2023-4875

2023-09-10 Thread Sebastian Andrzej Siewior
On 2023-09-10 15:57:13 [+0200], Antonio Radici wrote: Hi Antonio, > On Sun, Sep 10, 2023 at 01:47:30PM +0200, Salvatore Bonaccorso wrote: > > Hi Antonio, > > > > On Sun, Sep 10, 2023 at 01:24:10PM +0200, Antonio Radici wrote: > > > On Sun, Sep 10, 2023 at 01:05:31PM +0200, Antonio Radici wrote:

Bug#1050639: bookworm-pu: package clamav/1.0.2+dfsg-1~deb12u1

2023-09-09 Thread Sebastian Andrzej Siewior
-1.0.3+dfsg/debian/changelog 2023-09-09 16:36:13.0 +0200 @@ -1,3 +1,10 @@ +clamav (1.0.3+dfsg-1~deb12u1) bookworm; urgency=medium + + * Import 1.0.3 + * Remove unnecessary warning messages in freshclam during update. + + -- Sebastian Andrzej Siewior Sat, 09 Sep 2023 16:36:13 +0200

Bug#1050638: bullseye-pu: package clamav/0.103.9+dfsg-0+deb11u1

2023-09-09 Thread Sebastian Andrzej Siewior
https://github.com/Cisco-Talos/clamav/issues], [clamav], [https://www.clamav.net/]) dnl put configure auxiliary into config AC_CONFIG_AUX_DIR([config]) diff -Nru clamav-0.103.9+dfsg/debian/changelog clamav-0.103.10+dfsg/debian/changelog --- clamav-0.103.9+dfsg/debian/changelog 2023-08-27 11:57:11.

Bug#1051543: grub2: Fails to load normal.mod from a XFS v5 parition.

2023-09-09 Thread Sebastian Andrzej Siewior
Package: grub2 Version: 2.12~rc1-9 Severity: Serious control: forwarded -1 https://savannah.gnu.org/bugs/?64376 I have a single XFS partition which contains the root filesystem and the boot partition. Since the recent upgrade to the 2.12 series I can't boot anymore because grub complains that it

Bug#1050638: bullseye-pu: package clamav/0.103.9+dfsg-0+deb11u1

2023-09-08 Thread Sebastian Andrzej Siewior
On 2023-09-04 21:18:35 [+0200], To Adam D. Barratt wrote: > > The next point release for both bullseye and bookworm is in a month. > > Were you looking to have the clamav updates published via -updates > > before that point? > > I almost started preparing 0.103.10 I think it will be easier to go

Bug#1050573: bullseye-pu: package openssl/1.1.1v-0~deb11u1

2023-09-07 Thread Sebastian Andrzej Siewior
On 2023-08-26 14:50:09 [+0200], To sub...@bugs.debian.org wrote: > This is an update of the openssl package to the 1.1.1v version, a patch > release Upstream announced to release 1.1.1w on 11th September. They said it is a "security-fix" with the highest severity defined as "low". This is also

Bug#1051084: bookworm-pu: package kernelshark/2.2.1-1~deb12u1

2023-09-05 Thread Sebastian Andrzej Siewior
On 2023-09-05 17:36:41 [+0100], Jonathan Wiltshire wrote: > > Please go ahead. Thanks, done. > Thanks, Sebastian

Bug#1050638: bullseye-pu: package clamav/0.103.9+dfsg-0+deb11u1

2023-09-04 Thread Sebastian Andrzej Siewior
On 2023-09-04 19:52:23 [+0100], Adam D. Barratt wrote: > On Sun, 2023-08-27 at 13:20 +0200, Sebastian Andrzej Siewior wrote: > > This is a stable update from clamav upstream in the 0.103.x series. > > It fixes the following CVE > > - CVE-2023-20197 (Possible Do

Bug#1051084: bookworm-pu: package kernelshark/2.2.1-1~deb12u1

2023-09-02 Thread Sebastian Andrzej Siewior
for version update. + * Fix package description. (Closes: #1028585) + + -- Sebastian Andrzej Siewior Sat, 02 Sep 2023 15:29:41 +0200 + kernelshark (2.2.0-2) unstable; urgency=medium * Fix symlink names. (Closes: #1035449) diff -Nru kernelshark-2.2.0/debian/control kernelshark-2.2.1/debian

Bug#1050638: bullseye-pu: package clamav/0.103.9+dfsg-0+deb11u1

2023-08-27 Thread Sebastian Andrzej Siewior
R([config]) diff -Nru clamav-0.103.8+dfsg/debian/changelog clamav-0.103.9+dfsg/debian/changelog --- clamav-0.103.8+dfsg/debian/changelog 2023-02-17 21:43:57.0 +0100 +++ clamav-0.103.9+dfsg/debian/changelog 2023-08-27 11:57:11.0 +0200 @@ -1,3 +1,10 @@ +clamav (0.103.9+dfsg-0+deb11

Bug#1033279: the clamav-freshclam package fails to upgrade on Debian 11

2023-08-19 Thread Sebastian Andrzej Siewior
On 2023-03-21 08:42:00 [+0100], Giancarlo Giesa wrote: > description: the clamav upgrade via apt-get failed > the reason seems to be that the file /var/log/clamav/freshclam.log is not > detected but instead this exists Is this still valid? Asking because… > proceeding with the command dpkg

Bug#1044136: clamav-daemon: The server delivers "4.7.1 Tempfail- internal scan engine error" when sending with file attachments

2023-08-19 Thread Sebastian Andrzej Siewior
On 2023-08-13 17:42:29 [+0200], Andreas Guenther wrote: > you can clearly see that the service is triggered by the associated > socket! This was not the case with Debian Linux Bullseye! > > The only currently working solution is this: > > systemctl disable --now

Bug#1019361: clamav-daemon: cron job fails

2023-08-19 Thread Sebastian Andrzej Siewior
On 2022-09-07 15:26:44 [-0500], Tim McConnell wrote: > --log="$HOME/.clamtk/history/$(date +\%b-\%d-\%Y).log" 2>/dev/null # clamtk- > scan" > Loaded: loaded (/var/spool/cron/crontabs/tmick; generated) > Active: failed (Result: exit-code) since Wed 2022-09-07 04:39:26 CDT; 1s > ago >

Bug#1030171: clamav-daemon: clamav-clamonacc.service fails to start

2023-08-19 Thread Sebastian Andrzej Siewior
On 2023-06-12 08:39:53 [+0300], Martin-Éric Racine wrote: > Syslog already suggests what the fix should be: > > $ grep Clamonacc /var/log/syslog > 2023-06-12T08:33:40.562184+03:00 p8h61 clamonacc[248359]: ERROR: > Clamonacc: at least one of OnAccessExcludeUID, OnAccessExcludeUname, > or

Bug#1035310: bullseye-pu: package xz-utils/5.2.11-0~deb11u1

2023-06-27 Thread Sebastian Andrzej Siewior
On 2023-06-26 18:10:57 [+0100], Jonathan Wiltshire wrote: > Control: tag -1 moreinfo > > You're both going to have to help me a) understand what is the user-facing > problem you're solving which is necessary to fix in stable and b) whether > you're both agreed on how to fix it. a) The bpo of

Bug#1036957: unblock: openssl/3.0.8-1

2023-05-30 Thread Sebastian Andrzej Siewior
control: retitle -1 unblock: openssl/3.0.9-1 On 2023-05-30 22:16:53 [+0200], To sub...@bugs.debian.org wrote: > > Please unblock package openssl. > > The 3.0.9 release contains security and non-security related fixes for > the package. There are five new CVEs in total that has been addressed. >

  1   2   3   4   5   6   7   8   9   10   >