Bug#1032332: apt-xapian-index: Fails to install due to missing dependency on python3-six
Package: apt-xapian-index Version: 0.53 Severity: normal Hello maintainer of apt-xapian-index, While working on program-specific hooks in the live-build package, I noticed an issue in apt-xapian-index. When a minimal Python environment is used, not all dependencies are listed: 'python3-six' is missing. I've used the 'normal' severity, because on most systems 'python3-six' will already be installed and the package is working properly. With kind regards, Roland Clobus --- Commands to reproduce the test cases --- Note: I work on /dev/shm and use my apt-cacher-ng proxy on 192.168.0.15 Commands: mount /dev/shm -odev,exec,remount,size=24G mkdir /dev/shm/test-apt-xapian-index cd /dev/shm/test-apt-xapian-index debootstrap testing chroot http://deb.debian.org/debian/ chroot chroot /bin/bash -c "http_proxy=http://192.168.0.15:3142 DEBIAN_FRONTEND=noninteractive apt --yes install apt-xapian-index" Output: Setting up apt-xapian-index (0.53) ... grep: /proc/self/status: No such file or directory apt-xapian-index: Building new index in background... Processing triggers for systemd (252.5-2) ... Processing triggers for libc-bin (2.36-8) ... Processing triggers for ca-certificates (20211016) ... Updating certificates in /etc/ssl/certs... Traceback (most recent call last): File "/usr/sbin/update-apt-xapian-index", line 61, in import axi.indexer File "/usr/lib/python3/dist-packages/axi/indexer.py", line 39, in from six.moves.urllib_parse import unquote ModuleNotFoundError: No module named 'six' 0 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done. -- System Information: Debian Release: bookworm/sid APT prefers testing APT policy: (990, 'testing'), (500, 'testing-debug'), (50, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-3-amd64 (SMP w/8 CPU threads; PREEMPT) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages apt-xapian-index depends on: ii python3 3.11.2-1 ii python3-apt 2.5.2+b1 ii python3-debian 0.1.49 ii python3-xapian 1.4.22-1 apt-xapian-index recommends no packages. Versions of packages apt-xapian-index suggests: ii python3-xdg 0.28-2 -- no debconf information
Processing of freedink_109.6-5_source.changes
freedink_109.6-5_source.changes uploaded successfully to localhost along with the files: freedink_109.6-5.dsc freedink_109.6-5.debian.tar.xz freedink_109.6-5_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
freedink_109.6-5_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 04 Mar 2023 08:43:43 + Source: freedink Built-For-Profiles: noudeb Architecture: source Version: 109.6-5 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Steve Langasek Changes: freedink (109.6-5) unstable; urgency=medium . * QA upload. * debian/patches/config.h.patch: always include config.h before unistd.h. Checksums-Sha1: 278c99fbba02fd7207ae0ccdd7b82f03d0e1244d 2215 freedink_109.6-5.dsc 39ff7069cbf1e87400b5ca52b3654b7cd7c79a91 44144 freedink_109.6-5.debian.tar.xz b1d0d34b1f881d61b4b9e108f2643132f9073a9e 13734 freedink_109.6-5_source.buildinfo Checksums-Sha256: 2238f9a3d4911dd1f829653f8d64b7994e77678ce4a6b163310f2449c1e1aeb9 2215 freedink_109.6-5.dsc 37cfd5ff8e648f3b0ca6a0585cb033d43f3b68a3d08b6d1aa54a2f4de75e7a64 44144 freedink_109.6-5.debian.tar.xz c65ad0f18014a9a7ab0b967bf05f65298d11a48512c7172381fdabce20b24f6f 13734 freedink_109.6-5_source.buildinfo Files: 5f201d345392ca2b94899dfa9a343fb4 2215 games optional freedink_109.6-5.dsc c904fc5c5393430317da4ea1f0e9af0d 44144 games optional freedink_109.6-5.debian.tar.xz 04d168fdfa89d32ca65bf68cb2d2b1fc 13734 games optional freedink_109.6-5_source.buildinfo -BEGIN PGP SIGNATURE- iQJGBAEBCgAwFiEErEg/aN5yj0PyIC/KVo0w8yGyEz0FAmQDEHASHHZvcmxvbkBk ZWJpYW4ub3JnAAoJEFaNMPMhshM9+zwP+wZcf0JeZAVqbNNKyru+DSQFTC/SZLdl UBwkSYUWsQyKzOhE7HY4qT9b6yn2eZDxPQbG+Fa9jK3e90kLkSfxr4nmlpcCTGCf lsGThLy+mWg2X336IB0EnNOvfO65eedAdBY51uU5s0CEfCh1fiapaVYe55+0jJJj 4OP2dYCCL8hrpwrKnsdIiA3gBqweQ9iz8RDb5LfiPFyx/Xsw+919iwsnlfNXx1Re C4BNGnhxry0MdLk0gNP434DWVivvbjmbZLuzXlHTm6fwmh58Cpts5aHYVrRNjA+D JUM3kFg/2adKvHWVRKONINR6mBt5RkeCvA6JlHcmcwRux3u0Aw8R0FKp5UdgstUC 1vt2artePaWS3ot/gcQ3Tr6bGC33yJ/bKF+P7iNtPDzyQNUOpWr30/tXJF4V/LGR 9Jj+rSpfnAcKVqjjaGywh8GHie+hai6E7wzQGWj4i+fZdBApDCaohDpNSIGCCmXn 8/zV5/M1PJA79hH9rsOKCnIky8tt7ycyzn/GVz3hPBa04g0dywwPRcFD9A5dIEEf QaniFYk98bH8lXJBKBiiIe2NeGrZEZsf0obg8u3y8d6+lpJhF5V0TQVprQPzCujc 8Dhf5GXmmSrdSV2gbGwrZurnmAhJn5sGkbkfvV2gdVUeewHHGCBlUEqUlm40PXXx FkKTOjkmuJJZ =HnPK -END PGP SIGNATURE-
Bug#1032342: [INTL:ro] Romanian debconf templates translation of lprng
Package: lprng Severity: wishlist Tags: l10n, patch Dear Maintainer, Please find attached the Romanian translation of the lprng file. Thanks, Remus-Gabriel lprng_debconf_ro.po Description: Binary data
Bug#1032356: look: can't open /usr/lib/plan9/lib/words
Package: 9base Version: 1:6-13 Severity: normal X-Debbugs-Cc: witold.bary...@gmail.com As installed, look is not very usable: $ /usr/lib/plan9/bin/look look: can't open /usr/lib/plan9/lib/words $ This is most likely a porting bug, as man page, says by default it uses /usr/share/dict/words Using explicitly this file, makes it work: $ /usr/lib/plan9/bin/look foo /usr/share/dict/words foo foobar food ... Note: /usr/share/dict/words is usually provided by wamerican. Users are free to divert the symlink to other word lists. Additionally: I am pretty sure look uses UTF-8 (obviously), and in Debian now, all word dictionaries are now using UTF-8 too. However, not all dictionaries use Unicode or UTF-8 sorting. I tested it with Polish word list, and look does not work on it. Even without using polish dictrics in a pattern or a word. I am guessing this is because from quick tests, it looks like plan9 look looks to be doing a binary search in file, but many locale specific dictionaries are sorted using locale specific collation rules, not Unicode rules. For example, for Polish wordlist: ... Aaseny ab Ab aba ABA abace ... because this is what official Polish language rules say to do (as used for centuries in encyclopedias and paper dictionaries). In dictionaries, usually character-after-character rules are used. In encylopedias word-after-word (so for example Jan Sobieski, is before Janina). (Polish dictionary does not have any multi-word words, so that is moot anyway). Whetever it is useful for spell checking purposes, is another matter. (not util-linux's look also does not work) -- System Information: Debian Release: 12.0 APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.2.0-rc5 (SMP w/32 CPU threads; PREEMPT) Kernel taint flags: TAINT_UNSIGNED_MODULE, TAINT_SOFTLOCKUP Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) Versions of packages 9base depends on: ii debianutils 5.7-0.4 ii libc62.36-8 9base recommends no packages. 9base suggests no packages. -- no debconf information
Bug#1032356: look: can't open /usr/lib/plan9/lib/words
Package: 9base Version: 1:6-13 Followup-For: Bug #1032356 X-Debbugs-Cc: witold.bary...@gmail.com Just a small observation about non-english dictionaries: Using option -f, makes look ignore lower and upper case latters, and for example mostly work with Polish dictionary: $ /usr/lib/plan9/bin/look -f czy /usr/share/dict/polish czy czyby czybym czybyś czybyście czybyśmy Czycie czyha czyhacie ... Using polish diactricts hower does not work in pattern: $ /usr/lib/plan9/bin/look -f czł /usr/share/dict/polish $ $ grep ^czł /usr/share/dict/polish | wc -l 574 $
Processed: your mail
Processing commands for cont...@bugs.debian.org: > found 659415 0.17.41+really0.17-3 Bug #659415 [telnet-ssl] telnet: assertion failure on ring buffer overflow Marked as found in versions netkit-telnet-ssl/0.17.41+really0.17-3. > thanks Stopping processing here. Please contact me if you need assistance. -- 659415: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659415 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#659415: marked as done (telnet: assertion failure on ring buffer overflow)
Your message dated Sat, 04 Mar 2023 21:48:59 + with message-id and subject line Bug#659415: fixed in netkit-telnet-ssl 0.17.41+really0.17-4 has caused the Debian Bug report #659415, regarding telnet: assertion failure on ring buffer overflow to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 659415: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659415 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: telnet Version: 0.17-36 Severity: normal Tags: patch Assertion in ring.cc is too tigh causing abort() to be called on ring buffer overflow. A way to reproduce the bug: $ nc -l -p | sleep 10 & $ telnet 127.0.0.1 0 && top-bot <= count' failed. zsh: abort (core dumped) telnet 127.0.0.1 < /dev/zero -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.1.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=pl_PL.utf8, LC_CTYPE=pl_PL.utf8 (charmap=UTF-8) (ignored: LC_ALL set to pl_PL.utf8) Shell: /bin/sh linked to /bin/dash Versions of packages telnet depends on: ii libc62.13-26 ii libgcc1 1:4.6.2-12 ii libncurses5 5.9-4 ii libstdc++6 4.6.2-12 ii netbase 4.47 telnet recommends no packages. telnet suggests no packages. -- no debconf information --- netkit-telnet-0.17/telnet/ring.cc 2012-02-10 22:50:42.0 +0100 +++ ring.cc 2012-02-10 22:49:54.0 +0100 @@ -138,11 +138,11 @@ while (count > 0) { int bot = tail; int top = head; if (top < bot) top = size; if (marked > bot) top = marked; - assert(top-bot > 0 && top-bot <= count); + assert(top-bot >= 0 && top-bot <= count); int n; if (marked==bot) n = binding->writeurg(buf+bot, top-bot); else n = binding->write(buf+bot, top-bot); if (n < 0) { busy=0; return -2; } --- End Message --- --- Begin Message --- Source: netkit-telnet-ssl Source-Version: 0.17.41+really0.17-4 Done: Bastian Germann We believe that the bug you reported is fixed in the latest version of netkit-telnet-ssl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 659...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Germann (supplier of updated netkit-telnet-ssl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 04 Mar 2023 22:36:56 +0100 Source: netkit-telnet-ssl Architecture: source Version: 0.17.41+really0.17-4 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Bastian Germann Closes: 659415 Changes: netkit-telnet-ssl (0.17.41+really0.17-4) unstable; urgency=high . * QA upload. . [ Marcos Marado ] * Fix ring buffer overflow. (Closes: #659415) Checksums-Sha1: 420bb6af20c1a8a63956f61555629058ecdd1f18 1772 netkit-telnet-ssl_0.17.41+really0.17-4.dsc 63ac0891e71db6915f8884abf36540948d33b798 88584 netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz 73d40adc63997f18f9afdbb8b00e403e6f1e020e 6172 netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo Checksums-Sha256: bf54872e8c67bcff15f50b43ba2b883e5872ca156ad2ac54ed7c77a66bd60123 1772 netkit-telnet-ssl_0.17.41+really0.17-4.dsc 6ecf88a521f693cded55eb2f54c0827edef3297e87b6e0e95ea479ae5880cba3 88584 netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz ffa863035192b37f096e2869d7de4def3b39dd6030f13ca6eaff5327dc82bba8 6172 netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo Files: 88def26eecfe6fe0a3d7c7b8f50e3f2a 1772 net optional netkit-telnet-ssl_0.17.41+really0.17-4.dsc 791d7cd26ddd28fff13506230c854b19 88584 net optional netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz 5bdc8ea5015b4ebc09befcd1891a2409 6172 net optional netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo -BEGIN PGP SIGNATURE- iQHEBAEBCgAuFiEEQGIgyLhVKAI3jM5BH1x6i0VWQxQFAmQDuokQHGJhZ2VAZGVi aWFuLm9yZwAKCRAfXHqLRVZDFHCQDADJspLNF30Rsau57QULBpEbhSZtcRGPLe0R Q6hlVNOBDe4Lhqs81FsVjZRvfWMY3pkzZ5/PqTLHJsM6XpoueAwcPsNdN8YflyU/ yVICMVsE8idC9IIDTRv44Ix4ymDsGJ8rt1ZjmIONSFpyOjtzN2xReEruBdFpqJ0b W4aegjrxwGiPb97Ood9B0TOhgV6OREFSuKS6USct8c1bx3NRZDe1sxcYC7xZZHvg 0oVKfsAM7aQvNLvvJn4Vi6qWJDkNUMMkd3RdvIlPKIE+SJVsY+DzslQcLbVGZ3J
Processing of netkit-telnet-ssl_0.17.41+really0.17-4_source.changes
netkit-telnet-ssl_0.17.41+really0.17-4_source.changes uploaded successfully to localhost along with the files: netkit-telnet-ssl_0.17.41+really0.17-4.dsc netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
netkit-telnet-ssl_0.17.41+really0.17-4_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 04 Mar 2023 22:36:56 +0100 Source: netkit-telnet-ssl Architecture: source Version: 0.17.41+really0.17-4 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Bastian Germann Closes: 659415 Changes: netkit-telnet-ssl (0.17.41+really0.17-4) unstable; urgency=high . * QA upload. . [ Marcos Marado ] * Fix ring buffer overflow. (Closes: #659415) Checksums-Sha1: 420bb6af20c1a8a63956f61555629058ecdd1f18 1772 netkit-telnet-ssl_0.17.41+really0.17-4.dsc 63ac0891e71db6915f8884abf36540948d33b798 88584 netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz 73d40adc63997f18f9afdbb8b00e403e6f1e020e 6172 netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo Checksums-Sha256: bf54872e8c67bcff15f50b43ba2b883e5872ca156ad2ac54ed7c77a66bd60123 1772 netkit-telnet-ssl_0.17.41+really0.17-4.dsc 6ecf88a521f693cded55eb2f54c0827edef3297e87b6e0e95ea479ae5880cba3 88584 netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz ffa863035192b37f096e2869d7de4def3b39dd6030f13ca6eaff5327dc82bba8 6172 netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo Files: 88def26eecfe6fe0a3d7c7b8f50e3f2a 1772 net optional netkit-telnet-ssl_0.17.41+really0.17-4.dsc 791d7cd26ddd28fff13506230c854b19 88584 net optional netkit-telnet-ssl_0.17.41+really0.17-4.debian.tar.xz 5bdc8ea5015b4ebc09befcd1891a2409 6172 net optional netkit-telnet-ssl_0.17.41+really0.17-4_source.buildinfo -BEGIN PGP SIGNATURE- iQHEBAEBCgAuFiEEQGIgyLhVKAI3jM5BH1x6i0VWQxQFAmQDuokQHGJhZ2VAZGVi aWFuLm9yZwAKCRAfXHqLRVZDFHCQDADJspLNF30Rsau57QULBpEbhSZtcRGPLe0R Q6hlVNOBDe4Lhqs81FsVjZRvfWMY3pkzZ5/PqTLHJsM6XpoueAwcPsNdN8YflyU/ yVICMVsE8idC9IIDTRv44Ix4ymDsGJ8rt1ZjmIONSFpyOjtzN2xReEruBdFpqJ0b W4aegjrxwGiPb97Ood9B0TOhgV6OREFSuKS6USct8c1bx3NRZDe1sxcYC7xZZHvg 0oVKfsAM7aQvNLvvJn4Vi6qWJDkNUMMkd3RdvIlPKIE+SJVsY+DzslQcLbVGZ3J4 v0wNqMz1uCzmuGpfbJ3tZHqmaOCMtvHPscufJJ9YkdiXEo5NEFcCPB2ySSLe5oWb 3ycbzrxCDZMZRwdl+61Rbh4HcGZPkqW/UXchXHm15+g6gYSrq6utRsalGpfwp5vn 0SepKN6coZM3dneFfitWfoGxKVf7b7ZOL633o+eYZfB72XSdh3rsZ1gXLPNq/n1r THgKrQKo6IsDPA5Sp8Bh03NEwQzhoO8= =AUho -END PGP SIGNATURE-
c-icap-modules is marked for autoremoval from testing
c-icap-modules 1:0.5.5-2 is marked for autoremoval from testing on 2023-04-09 It (build-)depends on packages with these RC bugs: 1031896: libclamav11: LibClamAV Error: Can't verify database integrity, breaks amavis https://bugs.debian.org/1031896 This mail is generated by: https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl Autoremoval data is generated by: https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl