Bug#998832: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u1

2021-12-12 Thread Yadd

On 11/12/2021 18:42, Adam D. Barratt wrote:

On Mon, 2021-12-06 at 08:39 +0100, Yadd wrote:

sorry, here is the new debdiff



Thanks.

What's the rationale for this change?

--- a/debian/rules
+++ b/debian/rules
@@ -89,8 +89,8 @@ override_dh_auto_test: jquery-ui.js jquery-ui.min.js 
themes/base/jquery-ui.css
 nodejs --check ui/i18n/jquery-ui-i18n.js
  # Reference files are taken from the quick download ZIP file from
  # http://jqueryui.com
-   diff -Bw debian/reference-jquery-ui.js jquery-ui.js
-   diff -Bw debian/reference-jquery-ui.css themes/base/jquery-ui.css
+   #diff -Bw debian/reference-jquery-ui.js jquery-ui.js
+   #diff -Bw debian/reference-jquery-ui.css themes/base/jquery-ui.css
  endif


Hi,

this package compared built jquery-ui with upstream version (stored in 
Debian). This fails now since we changed source




Bug#998832: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u1

2021-12-12 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2021-12-12 at 09:22 +0100, Yadd wrote:
> On 11/12/2021 18:42, Adam D. Barratt wrote:
> > On Mon, 2021-12-06 at 08:39 +0100, Yadd wrote:
> > > sorry, here is the new debdiff
> > > 
> > 
> > Thanks.
> > 
> > What's the rationale for this change?
> > 
> > --- a/debian/rules
> > +++ b/debian/rules
> > @@ -89,8 +89,8 @@ override_dh_auto_test: jquery-ui.js jquery-
> > ui.min.js themes/base/jquery-ui.css
> >  nodejs --check ui/i18n/jquery-ui-i18n.js
> >   # Reference files are taken from the quick download ZIP file from
> >   # http://jqueryui.com
> > -   diff -Bw debian/reference-jquery-ui.js jquery-ui.js
> > -   diff -Bw debian/reference-jquery-ui.css themes/base/jquery-
> > ui.css
> > +   #diff -Bw debian/reference-jquery-ui.js jquery-ui.js
> > +   #diff -Bw debian/reference-jquery-ui.css
> > themes/base/jquery-ui.css
> >   endif
> 
> Hi,
> 
> this package compared built jquery-ui with upstream version (stored
> in 
> Debian). This fails now since we changed source
> 

OK. Please go ahead.

Regards,

Adam



Processed: Re: Bug#998832: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u1

2021-12-12 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #998832 [release.debian.org] bullseye-pu: package 
jqueryui/1.12.1+dfsg-8+deb11u1
Added tag(s) confirmed.

-- 
998832: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998832
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1001556: buster-pu: package mailman/1:2.1.29-1+deb10u4

2021-12-12 Thread Salvatore Bonaccorso
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: car...@debian.org

Hi SRM,

There was another CVE fixed after the last update currently in
buster-pu for mailman which similarly we think does not warrant a DSA.
I have prepared a followup for this one as well:

https://security-tracker.debian.org/tracker/CVE-2021-44227

I'm attaching both debdiffs, once against the base version currently
in buster (1:2.1.29-1+deb10u1, note that htere was as well a DSA for
mailman, 1:2.1.29-1+deb10u2) and once only against the current version
which sits in buster-proposed-updates.

Regards,
Salvatore
diff -Nru mailman-2.1.29/debian/changelog mailman-2.1.29/debian/changelog
--- mailman-2.1.29/debian/changelog 2021-11-20 15:17:30.0 +0100
+++ mailman-2.1.29/debian/changelog 2021-12-12 10:42:54.0 +0100
@@ -1,3 +1,11 @@
+mailman (1:2.1.29-1+deb10u4) buster; urgency=medium
+
+  * Non-maintainer upload by the Security Team.
+  * Fix potential CSRF attack against a list admin from a list member or
+moderator (CVE-2021-44227)
+
+ -- Salvatore Bonaccorso   Sun, 12 Dec 2021 10:42:54 +0100
+
 mailman (1:2.1.29-1+deb10u3) buster; urgency=medium
 
   * Non-maintainer upload by the Security Team.
diff -Nru mailman-2.1.29/debian/patches/CVE-2021-44227.patch 
mailman-2.1.29/debian/patches/CVE-2021-44227.patch
--- mailman-2.1.29/debian/patches/CVE-2021-44227.patch  1970-01-01 
01:00:00.0 +0100
+++ mailman-2.1.29/debian/patches/CVE-2021-44227.patch  2021-12-12 
10:42:54.0 +0100
@@ -0,0 +1,82 @@
+Description: Fix potential CSRF attack against a list admin from a list member 
or moderator
+Origin: upstream, 
https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/diff/1882
+Bug: https://launchpad.net/bugs/1952384
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2021-44227
+Forwarded: not-needed
+Last-Update: 2021-12-12
+
+=== modified file 'Mailman/CSRFcheck.py'
+--- a/Mailman/CSRFcheck.py
 b/Mailman/CSRFcheck.py
+@@ -55,7 +55,7 @@ def csrf_token(mlist, contexts, user=Non
+ token = binascii.hexlify(marshal.dumps((issued, keymac)))
+ return token
+ 
+-def csrf_check(mlist, token, options_user=None):
++def csrf_check(mlist, token, cgi_user=None):
+ """ check token by mailman cookie validation algorithm """
+ try:
+ issued, keymac = marshal.loads(binascii.unhexlify(token))
+@@ -67,12 +67,25 @@ def csrf_check(mlist, token, options_use
+ key, user = key.split('+', 1)
+ else:
+ user = None
++# Don't allow unprivileged tokens for admin or admindb.
++if cgi_user == 'admin':
++if key not in ('admin', 'site'):
++syslog('mischief',
++   'admin form submitted with CSRF token issued for %s.',
++   key + '+' + user if user else key)
++return False
++elif cgi_user == 'admindb':
++if key not in ('moderator', 'admin', 'site'):
++syslog('mischief',
++   'admindb form submitted with CSRF token issued for 
%s.',
++   key + '+' + user if user else key)
++return False
+ if user:
+ # This is for CVE-2021-42097.  The token is a user token because
+ # of the fix for CVE-2021-42096 but it must match the user for
+ # whom the options page is requested.
+ raw_user = UnobscureEmail(urllib.unquote(user))
+-if options_user and options_user != raw_user:
++if cgi_user and cgi_user != raw_user:
+ syslog('mischief',
+'Form for user %s submitted with CSRF token '
+'issued for %s.',
+--- a/Mailman/Cgi/admin.py
 b/Mailman/Cgi/admin.py
+@@ -107,7 +107,8 @@ def main():
+'legend']
+ params = cgidata.keys()
+ if set(params) - set(safe_params):
+-csrf_checked = csrf_check(mlist, cgidata.getfirst('csrf_token'))
++csrf_checked = csrf_check(mlist, cgidata.getfirst('csrf_token'),
++  'admin')
+ else:
+ csrf_checked = True
+ # if password is present, void cookie to force password authentication.
+--- a/Mailman/Cgi/admindb.py
 b/Mailman/Cgi/admindb.py
+@@ -144,7 +144,8 @@ def main():
+ safe_params = ['adminpw', 'admlogin', 'msgid', 'sender', 'details']
+ params = cgidata.keys()
+ if set(params) - set(safe_params):
+-csrf_checked = csrf_check(mlist, cgidata.getfirst('csrf_token'))
++csrf_checked = csrf_check(mlist, cgidata.getfirst('csrf_token'),
++  'admindb')
+ else:
+ csrf_checked = True
+ # if password is present, void cookie to force password authentication.
+--- a/Mailman/Cgi/edithtml.py
 b/Mailman/Cgi/edithtml.py
+@@ -111,7 +111,8 @@ def main():
+ safe_params = ['VARHELP', '

Bug#1001438: transition: glibc 2.33

2021-12-12 Thread Aurelien Jarno
On 2021-12-11 15:28, Sebastian Ramacher wrote:
> Control: tags -1 confirmed
> Control: forwarded -1 
> https://release.debian.org/transitions/html/glibc-2.33.html
> 
> On 2021-12-09 23:27:41 +0100, Aurelien Jarno wrote:
> > Package: release.debian.org
> > Severity: normal
> > User: release.debian@packages.debian.org
> > Usertags: transition
> > X-Debbugs-Cc: debian-gl...@lists.debian.org
> > 
> > Dear release team,
> > 
> > I would like to get a transition slot for glibc 2.33. It has been
> > available in experimental for one month and a half without any reported
> > bug report. It has been built successfully on all release architectures
> > and many ports architectures.
> 
> Please go ahead.

Thanks, I have just uploaded it.

> > A few issues found through the autopkgtest pseudo excuses for
> > experimental have been fixed. The remaining are false positive, with the
> > exception of kore, but which is not testing as it FTBFS.

I submitted bug #1001558 for kore.

> Thanks, I'll add the necessary hints once the glibc upload is old
> enough.

Those false positives are due to the fact that glibc from experimental
is used, and I do not expect them to appear for glibc in sid. In
addition a few of them after cruft got removed from experimental.

All that said, we so many reverse dependencies, there might get more
issues appearing.

Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net


signature.asc
Description: PGP signature


Bug#1001115: docker.io 20.10.5+dfsg1-1+deb11u1 flagged for acceptance

2021-12-12 Thread Adam D Barratt
package release.debian.org
tags 1001115 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: docker.io
Version: 20.10.5+dfsg1-1+deb11u1

Explanation: fix possible change of host file system permissions 
[CVE-2021-41089]; lock down file permissions in /var/lib/docker 
[CVE-2021-41091]; prevent credentials being sent to the default registry 
[CVE-2021-41092]; add support for "clone3" syscall in default seccomp policy



Bug#1001398: privoxy 3.0.32-2+deb11u1 flagged for acceptance

2021-12-12 Thread Adam D Barratt
package release.debian.org
tags 1001398 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: privoxy
Version: 3.0.32-2+deb11u1

Explanation: fix memory leaks [CVE-2021-44540 CVE-2021-44541 CVE-2021-44542]; 
fix cross-site scripting issue [CVE-2021-44543]



Processed: docker.io 20.10.5+dfsg1-1+deb11u1 flagged for acceptance

2021-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1001115 = bullseye pending
Bug #1001115 [release.debian.org] bullseye-pu: package 
docker.io/20.10.5+dfsg1-1+deb11u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1001115: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001115
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1001474: bpftrace 0.11.3-5+deb11u1 flagged for acceptance

2021-12-12 Thread Adam D Barratt
package release.debian.org
tags 1001474 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: bpftrace
Version: 0.11.3-5+deb11u1

Explanation: fix arrary indexing



Processed: bpftrace 0.11.3-5+deb11u1 flagged for acceptance

2021-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1001474 = bullseye pending
Bug #1001474 [release.debian.org] bullseye-pu: package bpftrace/0.11.3-5
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1001474: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001474
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: privoxy 3.0.32-2+deb11u1 flagged for acceptance

2021-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1001398 = bullseye pending
Bug #1001398 [release.debian.org] bullseye-pu: package privoxy/3.0.32-2
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1001398: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001398
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: apache-log4j2_2.15.0-1~deb11u1_source.changes
  ACCEPT
Processing changes file: apache-log4j2_2.15.0-1~deb11u1_all-buildd.changes
  ACCEPT
Processing changes file: bpftrace_0.11.3-5+deb11u1_source.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_source.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_source.changes
  ACCEPT



Bug#1000472: rustc-mozilla 1.51.0+dfsg1-1~deb11u1 flagged for acceptance

2021-12-12 Thread Adam D Barratt
package release.debian.org
tags 1000472 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: rustc-mozilla
Version: 1.51.0+dfsg1-1~deb11u1

Explanation: new source package to support building of newer firefox-esr and 
thunderbird versions



Processed: rustc-mozilla 1.51.0+dfsg1-1~deb11u1 flagged for acceptance

2021-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1000472 = bullseye pending
Bug #1000472 [release.debian.org] bullseye-pu: package 
rustc-mozilla/1.51.0+dfsg1-1~deb11u1
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1000472: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000472
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1001100: golang-1.15 1.15.15-1~deb11u2 flagged for acceptance

2021-12-12 Thread Adam D Barratt
package release.debian.org
tags 1001100 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: golang-1.15
Version: 1.15.15-1~deb11u2

Explanation: fix buffer over-run issue [CVE-2021-38297], out of bounds read 
issue [CVE-2021-41771], denial of service issues [CVE-2021-44716 CVE-2021-44717]



Bug#998832: jqueryui 1.12.1+dfsg-8+deb11u1 flagged for acceptance

2021-12-12 Thread Adam D Barratt
package release.debian.org
tags 998832 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: jqueryui
Version: 1.12.1+dfsg-8+deb11u1

Explanation: fix untrusted code execution issues [CVE-2021-41182 CVE-2021-41183 
CVE-2021-41184]



Processed: golang-1.15 1.15.15-1~deb11u2 flagged for acceptance

2021-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1001100 = bullseye pending
Bug #1001100 [release.debian.org] bullseye-pu: package 
golang-1.15/1.15.15-1~deb11u2
Added tag(s) pending; removed tag(s) confirmed and moreinfo.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1001100: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001100
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: jqueryui 1.12.1+dfsg-8+deb11u1 flagged for acceptance

2021-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 998832 = bullseye pending
Bug #998832 [release.debian.org] bullseye-pu: package 
jqueryui/1.12.1+dfsg-8+deb11u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
998832: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998832
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: rustc-mozilla_1.51.0+dfsg1-1~deb11u1_multi.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: golang-1.15_1.15.15-1~deb11u2_source.changes
  ACCEPT
Processing changes file: jqueryui_1.12.1+dfsg-8+deb11u1_sourceonly.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: golang-1.15_1.15.15-1~deb11u2_all-buildd.changes
  ACCEPT
Processing changes file: golang-1.15_1.15.15-1~deb11u2_s390x-buildd.changes
  ACCEPT



Bug#1000374: marked as done (transition: opencv)

2021-12-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 Dec 2021 16:24:43 +0100
with message-id 
and subject line Re: Bug#1000374: transition: opencv
has caused the Debian Bug report #1000374,
regarding transition: opencv
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1000374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear release team,

I would like to transition OpenCV with a bumped SOVERSION after
an ABI breakage by upstream [1].

The Ben file [2] looks good.


Cheers
Timo

[1] https://github.com/opencv/opencv/issues/20878
[2] https://release.debian.org/transitions/html/auto-opencv.html


-BEGIN PGP SIGNATURE-
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=8Q2P
-END PGP SIGNATURE-
--- End Message ---
--- Begin Message ---
On 2021-11-25 22:12:36 +0100, Sebastian Ramacher wrote:
> Control: tags -1 = confirmed
> 
> On 2021-11-25 21:37:30, Timo Röhling wrote:
> > Hi,
> > 
> > * Sebastian Ramacher  [2021-11-22 20:34]:
> > > Why does the name of the -java package get changed? For the Java ABI
> > > nothing changes in this case. If you compare the produced class files,
> > > the only difference is that libopencv_java454d.so is loaded instead of
> > > libopencv_java454.so.
> > I gave it some more thought (and discussed it with Jochen), and I
> > ended up reverting that rename, back to libopencv4.5-java, for
> > 4.5.4+dfsg-5 in experimental.
> 
> Alright, please go ahead

The old packages got removed from testing.

Cheers
-- 
Sebastian Ramacher


signature.asc
Description: PGP signature
--- End Message ---


NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: bpftrace_0.11.3-5+deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: bpftrace_0.11.3-5+deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: bpftrace_0.11.3-5+deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_all-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_armel-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_armhf-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_i386-buildd.changes
  ACCEPT
Processing changes file: 
docker.io_20.10.5+dfsg1-1+deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_s390x-buildd.changes
  ACCEPT
Processing changes file: golang-1.15_1.15.15-1~deb11u2_amd64-buildd.changes
  ACCEPT
Processing changes file: golang-1.15_1.15.15-1~deb11u2_armel-buildd.changes
  ACCEPT
Processing changes file: golang-1.15_1.15.15-1~deb11u2_i386-buildd.changes
  ACCEPT
Processing changes file: golang-1.15_1.15.15-1~deb11u2_ppc64el-buildd.changes
  ACCEPT
Processing changes file: jqueryui_1.12.1+dfsg-8+deb11u1_all-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_armel-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_armhf-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_i386-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_s390x-buildd.changes
  ACCEPT



Bug#1001587: transition: fmtlib

2021-12-12 Thread Shengjing Zhu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: z...@debian.org
Control: block -1 by 1001527

Hi,

fmtlib has bumped its SO name to 8.

I have rebuilt the reverse dependencies, the situation is:

+ spdlog/1.8.5 FTBFS, but the new version 1.9.2 has been uploaded to
  experimental, which works with fmtlib 8.
+ vast FTBFS, bug has been filed, #1001527
+ purify FTBFS, but for other reason, #1001528.
+ Other packages are in unstable only, and FTBFS:
  dpaste, ring, tiledb, lizardfs

P.S. since some level 3 packages build-depend fmtlib and spdlog, so I rebuild
with fmtlib/8 and spdlog/1.9.2 together.

Ben file:

title = "fmtlib";
is_affected = .depends ~ "libfmt7" | .depends ~ "libfmt8";
is_good = .depends ~ "libfmt8";
is_bad = .depends ~ "libfmt7";



Processed: transition: fmtlib

2021-12-12 Thread Debian Bug Tracking System
Processing control commands:

> block -1 by 1001527
Bug #1001587 [release.debian.org] transition: fmtlib
1001587 was not blocked by any bugs.
1001587 was not blocking any bugs.
Added blocking bug(s) of 1001587: 1001527

-- 
1001587: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001587
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: golang-1.15_1.15.15-1~deb11u2_arm64-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: golang-1.15_1.15.15-1~deb11u2_armhf-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_ppc64el-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: golang-1.15_1.15.15-1~deb11u2_mips64el-buildd.changes
  ACCEPT
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_i386-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: 
docker.io_20.10.5+dfsg1-1+deb11u1_mips64el-buildd.changes
  ACCEPT
Processing changes file: privoxy_3.0.32-2+deb11u1_mips64el-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: golang-1.15_1.15.15-1~deb11u2_mipsel-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: privoxy_3.0.32-2+deb11u1_mipsel-buildd.changes
  ACCEPT



Bug#1001411: bullseye-pu: package dask.distributed/2021.01.0+ds.1-2.1 fixing CVE-2021-42343

2021-12-12 Thread Diane Trout
On Sat, 2021-12-11 at 17:53 +, Adam D. Barratt wrote:
> 
> Please go ahead.
> 


Ok I uploaded 
dask.distributed_2021.01.0+ds.1-2.1+deb11u1_source.changes 
to ftp-master.



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_armel-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: docker.io_20.10.5+dfsg1-1+deb11u1_mipsel-buildd.changes
  ACCEPT
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_armhf-buildd.changes
  ACCEPT



Bug#1001438: transition: glibc 2.33

2021-12-12 Thread Paul Gevers

Hi Aurelien,

On 12-12-2021 12:37, Aurelien Jarno wrote:

Thanks, I'll add the necessary hints once the glibc upload is old
enough.


Those false positives are due to the fact that glibc from experimental
is used, and I do not expect them to appear for glibc in sid. In
addition a few of them after cruft got removed from experimental.

All that said, we so many reverse dependencies, there might get more
issues appearing.


I just started to have a look, most issues I've checked so far look 
false positives. But aribas on i386 wasn't tested for the glibc in 
experimental (don't know why) but it fails now in unstable and tested 
with glibc from unstable in testing with stack smashing:

https://ci.debian.net/data/autopkgtest/testing/i386/a/aribas/17507755/log.gz

How do we handle cross-toolchain-base? It seems to need a rebuild but I 
didn't investigate if that can be just a binNMU or needs a source upload.


Of to bed now.

Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1000472: bullseye-pu: package rustc-mozilla/1.51.0+dfsg1-1~deb11u1

2021-12-12 Thread Mike Hommey
On Sat, Dec 11, 2021 at 05:04:17PM -0500, Roberto C. Sánchez wrote:
> On Sun, Dec 12, 2021 at 06:34:01AM +0900, Mike Hommey wrote:
> > On Sat, Dec 11, 2021 at 01:54:21PM +, Adam D. Barratt wrote:
> > > On Tue, 2021-11-30 at 13:36 -0500, Roberto C.Sánchez wrote:
> > > > On Tue, Nov 30, 2021 at 06:00:57PM +, Adam D. Barratt wrote:
> > > > > On Tue, 2021-11-30 at 09:37 -0500, Roberto C.Sánchez wrote:
> > > > > > If there are no objections, I will proceed with uploading within
> > > > > > the
> > > > > > next 24 hours.  I'd like to ensure that the new FF/TB make it
> > > > > > into
> > > > > > the next point release if at all possible and that work is
> > > > > > currently
> > > > > > blocked by the need for the updated rustc.
> > > > > > 
> > > > > 
> > > > > I was assuming the plan was for the Firefox and Thunderbird updates
> > > > > to
> > > > > be released via the security archive. That's certainly how
> > > > > basically
> > > > > every other update to both packages occurs.
> > > > > 
> > > > Quite right.  I conflated the fact that LLVM and rustc are not going
> > > > in via security update.  Apologies for the confusion.
> > > 
> > > As a quick follow-up to this, with the 11.2 point release being next
> > > weekend, and thus the p-u freeze this weekend, I note that the rustc-
> > > mozilla upload is not yet in NEW, so we're starting to get quite close
> > > timing wise.
> > 
> > Relatedly, what's the plan for cargo in buster? Firefox ESR needs at
> > least 0.47, bullseye has 0.47, but buster has 0.43.1.
> 
> Emilio is working on that.  There were some tweaks needed to the
> rustc-mozilla packages I prepared in order to support his work.  As of
> this morning he identified some small additional tweaks, but he was able
> to work around the issues in order to get a FF build completed.  As soon
> as he gives me the thumbs up, then I will make the final tweaks and
> upload the rustc-mozilla packages.

Will it be cargo-mozilla in buster? How about cbindgen? Will it be
cbindgen-mozilla or is cbindgen just going to be updated?

Mike



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u2_source.changes
  ACCEPT



Bug#1001438: transition: glibc 2.33

2021-12-12 Thread Aurelien Jarno
On 2021-12-12 22:18, Paul Gevers wrote:
> Hi Aurelien,
> 
> On 12-12-2021 12:37, Aurelien Jarno wrote:
> > > Thanks, I'll add the necessary hints once the glibc upload is old
> > > enough.
> > 
> > Those false positives are due to the fact that glibc from experimental
> > is used, and I do not expect them to appear for glibc in sid. In
> > addition a few of them after cruft got removed from experimental.
> > 
> > All that said, we so many reverse dependencies, there might get more
> > issues appearing.
> 
> I just started to have a look, most issues I've checked so far look false
> positives. But aribas on i386 wasn't tested for the glibc in experimental
> (don't know why) but it fails now in unstable and tested with glibc from
> unstable in testing with stack smashing:
> https://ci.debian.net/data/autopkgtest/testing/i386/a/aribas/17507755/log.gz

It's likely an issue on the package, but without further investigating,
I can't confirm. I'll try to do that tomorrow.

> How do we handle cross-toolchain-base? It seems to need a rebuild but I
> didn't investigate if that can be just a binNMU or needs a source upload.

That would do it, but unfortunately as it is arch:all, a binNMU is not
possible. I'll ask for a new upload.

Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net


signature.asc
Description: PGP signature


Re: chromium: Update to version 94.0.4606.61 (security-fixes)

2021-12-12 Thread Andres Salomon

On 12/5/21 6:41 AM, Moritz Mühlenhoff wrote:

Am Sun, Dec 05, 2021 at 10:53:56AM +0100 schrieb Paul Gevers:
Exactly that.

I'd suggest anyone who's interested in seeing Chromium supported to first
update it in unstable (and then work towards updated in bullseye-security).


I started doing just that: https://salsa.debian.org/dilinger/chromium 
(v96 and misc-fixes branches).


Michel, it looks like upstream deprecated use_x11 and now relies on 
ozone; do you have the patches for your ozone-based packages somewhere?


I tried just setting use_ozone=true in debian/rules, but there's a whole 
bunch of BUILD.gn inclusion stuff that breaks. Would save me a lot of 
time if you've already made it work.


Thanks,

Andres





NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_mips64el-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u2_amd64-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_arm64-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_armel-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_armhf-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_i386-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_ppc64el-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_s390x-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: base-files_11.1+deb11u2_mips64el-buildd.changes
  ACCEPT
Processing changes file: base-files_11.1+deb11u2_mipsel-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: 
rustc-mozilla_1.51.0+dfsg1-1~deb11u1_mipsel-buildd.changes
  ACCEPT



NEW changes in stable-new

2021-12-12 Thread Debian FTP Masters
Processing changes file: linux-signed-amd64_5.10.84+1_source.changes
  ACCEPT
Processing changes file: linux-signed-arm64_5.10.84+1_source.changes
  ACCEPT
Processing changes file: linux-signed-i386_5.10.84+1_source.changes
  ACCEPT