Re: Getting python3-ilorest and ilorest uploaded in sync

2025-03-12 Thread Carsten Schoenert

Hello Thomas,

Am 12.03.25 um 09:39 schrieb Thomas Goirand:

There is a ongoing hassle with python-redfish as both packages use the
same module path, it's not resolved yet and would need to get fixed by
HPE I think.


I have just seen #1093034 about this.


But I'm very pessimistic HPE will move ever to get this
solved so bot Python libraries can live together.


Did you open a bug upstream for this?


Karsten Schöke did this a while ago.

https://github.com/HewlettPackard/python-ilorest-library/issues/168

--
Regards
Carsten



Re: Getting python3-ilorest and ilorest uploaded in sync

2025-03-12 Thread Thomas Goirand

On 3/11/25 15:29, Carsten Schoenert wrote:
I'm totally fine if the new version 6.x goes into Trixie. If you want to 
pick over the package feel free, otherwise I can try to have a look at 
the weekend.


FYI, I did the work, but got stuck because of this:

https://github.com/HewlettPackard/python-redfish-utility/issues/110

I'll wait for upstream to reply before attempting to fix this myself.

Cheers,

Thomas Goirand (zigo)



Bug#1100177: transition: coq-elpi 2.5.0-1

2025-03-12 Thread Julien Puydt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: jpu...@debian.org
X-Debbugs-Cc: Debian OCaml Maintainers


A new upstream version of coq-elpi is out ; it requires rebuilding all
depending packages, and updating some of them (see below).

I'm waiting for the "go!" signal to upload the new packages.

Cheers,

J.Puydt

PS: here is the transition script, obtained using:
coq-wanna-build coq-elpi 2.5.0-1 coq-quickchick 2.1.0-1 coqeal 2.1.0-1


 nmu coq-hierarchy-builder_1.8.1-1+b2 . ANY . -m 'Rebuild because of
upload of coq-elpi=2.5.0-1'
 dw coq-hierarchy-builder_1.8.1-1+b2 . ANY . -m 'coq-elpi >= 2.5.0-1'
 nmu coq-corn_8.20.0-1+b2 . ANY . -m 'Rebuild because of upload of coq-
elpi=2.5.0-1'
 dw coq-corn_8.20.0-1+b2 . ANY . -m 'coq-elpi >= 2.5.0-1'
 nmu ssreflect_2.3.0-1+b7 . ANY . -m 'Rebuild because of upload of coq-
hierarchy-builder=1.8.1-1+b2'
 dw ssreflect_2.3.0-1+b7 . ANY . -m 'coq-hierarchy-builder >= 1.8.1-
1+b2'
 dw coq-quickchick_2.1.0-1 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu coq-deriving_0.2.1-1+b6 . ANY . -m 'Rebuild because of upload of
ssreflect=2.3.0-1+b7'
 dw coq-deriving_0.2.1-1+b6 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu coq-reglang_1.2.1-4+b13 . ANY . -m 'Rebuild because of upload of
ssreflect=2.3.0-1+b7'
 dw coq-reglang_1.2.1-4+b13 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu coq-relation-algebra_1.7.11-1+b6 . ANY . -m 'Rebuild because of
upload of ssreflect=2.3.0-1+b7'
 dw coq-relation-algebra_1.7.11-1+b6 . ANY . -m 'ssreflect >= 2.3.0-
1+b7'
 nmu coquelicot_3.4.3-1+b2 . ANY . -m 'Rebuild because of upload of
ssreflect=2.3.0-1+b7'
 dw coquelicot_3.4.3-1+b2 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu mathcomp-bigenough_1.0.2-1+b3 . ANY . -m 'Rebuild because of
upload of ssreflect=2.3.0-1+b7'
 dw mathcomp-bigenough_1.0.2-1+b3 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu mathcomp-finmap_2.1.0-3+b7 . ANY . -m 'Rebuild because of upload
of ssreflect=2.3.0-1+b7'
 dw mathcomp-finmap_2.1.0-3+b7 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu mathcomp-zify_1.5.0+2.0+8.16-4+b7 . ANY . -m 'Rebuild because of
upload of ssreflect=2.3.0-1+b7'
 dw mathcomp-zify_1.5.0+2.0+8.16-4+b7 . ANY . -m 'ssreflect >= 2.3.0-
1+b7'
 nmu mathcomp-algebra-tactics_1.2.4-1+b4 . ANY . -m 'Rebuild because of
upload of coq-elpi=2.5.0-1 mathcomp-zify=1.5.0+2.0+8.16-4+b7
ssreflect=2.3.0-1+b7'
 dw mathcomp-algebra-tactics_1.2.4-1+b4 . ANY . -m 'coq-elpi >= 2.5.0-
1'
 dw mathcomp-algebra-tactics_1.2.4-1+b4 . ANY . -m 'mathcomp-zify >=
1.5.0+2.0+8.16-4+b7'
 dw mathcomp-algebra-tactics_1.2.4-1+b4 . ANY . -m 'ssreflect >= 2.3.0-
1+b7'
 nmu mathcomp-analysis_1.9.0-1+b1 . ANY . -m 'Rebuild because of upload
of mathcomp-finmap=2.1.0-3+b7 mathcomp-bigenough=1.0.2-1+b3 coq-
elpi=2.5.0-1 coq-hierarchy-builder=1.8.1-1+b2 ssreflect=2.3.0-1+b7'
 dw mathcomp-analysis_1.9.0-1+b1 . ANY . -m 'mathcomp-finmap >= 2.1.0-
3+b7'
 dw mathcomp-analysis_1.9.0-1+b1 . ANY . -m 'mathcomp-bigenough >=
1.0.2-1+b3'
 dw mathcomp-analysis_1.9.0-1+b1 . ANY . -m 'coq-elpi >= 2.5.0-1'
 dw mathcomp-analysis_1.9.0-1+b1 . ANY . -m 'coq-hierarchy-builder >=
1.8.1-1+b2'
 dw mathcomp-analysis_1.9.0-1+b1 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu coq-extructures_0.5.0-1+b6 . ANY . -m 'Rebuild because of upload
of coq-deriving=0.2.1-1+b6 ssreflect=2.3.0-1+b7'
 dw coq-extructures_0.5.0-1+b6 . ANY . -m 'coq-deriving >= 0.2.1-1+b6'
 dw coq-extructures_0.5.0-1+b6 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu coq-interval_4.11.1-1+b8 . ANY . -m 'Rebuild because of upload of
coquelicot=3.4.3-1+b2 ssreflect=2.3.0-1+b7'
 dw coq-interval_4.11.1-1+b8 . ANY . -m 'coquelicot >= 3.4.3-1+b2'
 dw coq-interval_4.11.1-1+b8 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 nmu mathcomp-multinomials_2.3.0-1+b7 . ANY . -m 'Rebuild because of
upload of ssreflect=2.3.0-1+b7 mathcomp-finmap=2.1.0-3+b7 mathcomp-
bigenough=1.0.2-1+b3'
 dw mathcomp-multinomials_2.3.0-1+b7 . ANY . -m 'ssreflect >= 2.3.0-
1+b7'
 dw mathcomp-multinomials_2.3.0-1+b7 . ANY . -m 'mathcomp-finmap >=
2.1.0-3+b7'
 dw mathcomp-multinomials_2.3.0-1+b7 . ANY . -m 'mathcomp-bigenough >=
1.0.2-1+b3'
 nmu mathcomp-real-closed_2.0.2-1+b7 . ANY . -m 'Rebuild because of
upload of ssreflect=2.3.0-1+b7 mathcomp-bigenough=1.0.2-1+b3'
 dw mathcomp-real-closed_2.0.2-1+b7 . ANY . -m 'ssreflect >= 2.3.0-
1+b7'
 dw mathcomp-real-closed_2.0.2-1+b7 . ANY . -m 'mathcomp-bigenough >=
1.0.2-1+b3'
 dw coqeal_2.1.0-1 . ANY . -m 'ssreflect >= 2.3.0-1+b7'
 dw coqeal_2.1.0-1 . ANY . -m 'mathcomp-real-closed >= 2.0.2-1+b7'



Bug#1100365: nmu: emacs_1:30.1+1-4

2025-03-12 Thread James McCoy
Package: release.debian.org
Severity: normal
X-Debbugs-Cc: em...@packages.debian.org
Control: affects -1 + src:emacs
User: release.debian@packages.debian.org
Usertags: binnmu

nmu emacs_1:30.1+1-4 . ANY . unstable . -m "Rebuild against tree-sitter 0.22"

I think I overlooked an ABI incompatibility when uploading tree-sitter
0.22, which is causing emacs to crash when it is running with the new
libtree-sitter0 package (#1100171).

Please binNMU emacs, and then I'll follow up with a tree-sitter upload
to add Breaks to avoid partial upgrades.



Bug#1099646: transition: gnat

2025-03-12 Thread Graham Inggs
Hi Nicolas

The binNMU of alire was scheduled, but FTBFS on armel and armhf [1].

I assumed this is the same issue reported in #1096181, so I marked the
bug affecting alire and tagged it ftbfs.

For the record, the armel and armhf builds were retried recently with
gcc-14 14.2.0-18 in unstable, but failed again.

I still see some packages involved in this transition with new
versions in experimental that have not yet been uploaded to unstable.
I'd like to avoid a situation where we are waiting on each other.
Please let us know if you expect further action from the release time
at this point.

Regards
Graham


[1] https://buildd.debian.org/status/package.php?p=alire



Bug#1099400: dgit 10.7+deb12u3 flagged for acceptance

2025-03-12 Thread Jonathan Wiltshire
package release.debian.org
tags 1099400 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: dgit
Version: 10.7+deb12u3

Explanation: add missing parameters for source upload target



Bug#1100336: bookworm-pu: package nginx/1.22.1-9+deb12u2

2025-03-12 Thread Andrej Shadura
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: ng...@packages.debian.org, Jan Mojžíš 
Control: affects -1 + src:nginx
User: release.debian@packages.debian.org
Usertags: pu

Hi,

I’d like to upload a backport of patches fixing for CVE-2024-7347.
This issue has been fixed in the nginx version currently in trixie/unstable.
I also plan to upload a similar fix to the nginx version in bullseye, so to
ensure users don’t update from nginx with this bug fixed to one that’s
still vulnerable, I’d like to fix it in bullsworm as well.

[ Reason ]

Nginx has a vulnerability in the ngx_http_mp4_module, which might allow
an attacker to over-read nginx worker memory resulting in its termination
using a specially crafted mp4 file. The issue only affects nginx if it
is built with the ngx_http_mp4_module and the mp4 directive is used in
the configuration file. Additionally, the attack is possible only if an
attacker can trigger the processing of a specially crafted mp4 file with
the ngx_http_mp4_module.

[ Impact ]

Since this bug is going to be fixed in bullseye, users may hit the
vulnerability once they upgrade to booksworm.

[ Tests ]

I ran the automated tests (autopkgtests) included in the package.

[ Risks ]

This change is trivial.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]

This is a trivial cherry-pick of the upstream commits
7362d01658b and 88955b1044e without any manual fixups.

Thanks.

-- 
Cheers,
  Andrej
diff -Nru nginx-1.22.1/debian/changelog nginx-1.22.1/debian/changelog
--- nginx-1.22.1/debian/changelog   2025-02-17 20:40:29.0 +0100
+++ nginx-1.22.1/debian/changelog   2025-03-12 18:55:08.0 +0100
@@ -1,3 +1,12 @@
+nginx (1.22.1-9+deb12u2) bookworm; urgency=medium
+
+  * Non-maintainer upload by the LTS Team.
+  * Add upstream patches for CVE-2024-7347:
+- mp4: fix buffer underread while updating stsz atom
+- mp4: reject unordered chunks in stsc atom
+
+ -- Andrej Shadura   Wed, 12 Mar 2025 18:55:08 +0100
+
 nginx (1.22.1-9+deb12u1) bookworm; urgency=medium
 
   * d/p/CVE-2025-23419.patch add, backport CVE-2025-23419 fix.
diff -Nru nginx-1.22.1/debian/patches/CVE-2024-7347-1.patch 
nginx-1.22.1/debian/patches/CVE-2024-7347-1.patch
--- nginx-1.22.1/debian/patches/CVE-2024-7347-1.patch   1970-01-01 
01:00:00.0 +0100
+++ nginx-1.22.1/debian/patches/CVE-2024-7347-1.patch   2025-03-12 
18:54:39.0 +0100
@@ -0,0 +1,49 @@
+From: Roman Arutyunyan 
+Date: Mon, 12 Aug 2024 18:20:43 +0400
+Subject: Mp4: fixed buffer underread while updating stsz atom.
+
+While cropping an stsc atom in ngx_http_mp4_crop_stsc_data(), a 32-bit integer
+overflow could happen, which could result in incorrect seeking and a very large
+value stored in "samples".  This resulted in a large invalid value of
+trak->end_chunk_samples.  This value is further used to calculate the value of
+trak->end_chunk_samples_size in ngx_http_mp4_update_stsz_atom().  While doing
+this, a large invalid value of trak->end_chunk_samples could result in reading
+memory before stsz atom start.  This could potentially result in a segfault.
+
+Origin: upstream, 
https://github.com/nginx/nginx/commit/7362d01658b61184108c21278443910da68f93b4
+---
+ src/http/modules/ngx_http_mp4_module.c | 7 ---
+ 1 file changed, 4 insertions(+), 3 deletions(-)
+
+diff --git a/src/http/modules/ngx_http_mp4_module.c 
b/src/http/modules/ngx_http_mp4_module.c
+index 4eff01e..460d091 100644
+--- a/src/http/modules/ngx_http_mp4_module.c
 b/src/http/modules/ngx_http_mp4_module.c
+@@ -3098,7 +3098,8 @@ static ngx_int_t
+ ngx_http_mp4_crop_stsc_data(ngx_http_mp4_file_t *mp4,
+ ngx_http_mp4_trak_t *trak, ngx_uint_t start)
+ {
+-uint32_t   start_sample, chunk, samples, id, next_chunk, n,
++uint64_t   n;
++uint32_t   start_sample, chunk, samples, id, next_chunk,
+prev_samples;
+ ngx_buf_t *data, *buf;
+ ngx_uint_t entries, target_chunk, chunk_samples;
+@@ -3159,7 +3160,7 @@ ngx_http_mp4_crop_stsc_data(ngx_http_mp4_file_t *mp4,
+"samples:%uD, id:%uD",
+start_sample, chunk, next_chunk - chunk, samples, id);
+ 
+-n = (next_chunk - chunk) * samples;
++n = (uint64_t) (next_chunk - chunk) * samples;
+ 
+ if (start_sample < n) {
+ goto found;
+@@ -3181,7 +3182,7 @@ ngx_http_mp4_crop_stsc_data(ngx_http_mp4_file_t *mp4,
+"sample:%uD, chunk:%uD, chunks:%uD, samples:%uD",
+start_sample, chunk, next_chunk - chunk, samples);
+ 
+-n = (next_chunk - chunk) * samples;
++n = (uint64_t) (next_chunk - chunk) * samples;
+ 
+ if (start_sample > n) {
+ ngx_log_error(NGX_LOG_ERR, mp4->file.log, 0,
d

Processed: bookworm-pu: package nginx/1.22.1-9+deb12u2

2025-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:nginx
Bug #1100336 [release.debian.org] bookworm-pu: package nginx/1.22.1-9+deb12u2
Added indication that 1100336 affects src:nginx

-- 
1100336: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100336
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1100166: transition: onnxruntime

2025-03-12 Thread Shengqi Chen
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
Control: affects -1 = src:onnxruntime


Dear release managers,

Upstream has just released onnxruntime 1.21.0, leading to a SONAME change.
I would like to request a transition slot for it.

Additional information:

* I have modified my patch to include only MAJOR.MINOR version numbers in the
  SOVERSION. So we could expect less frequent transitions afterwards.
* The only rev-dep gst-plugins-bad1.0 can compile without issue.

Ben file (automatic one looks good):

title = "onnxruntime";
is_affected = .depends ~ "libonnxruntime1.20.1" | .depends ~ 
"libonnxruntime1.21";
is_good = .depends ~ "libonnxruntime1.21";
is_bad = .depends ~ "libonnxruntime1.20.1";

--  
Thanks,
Shengqi Chen



Processed: transition: onnxruntime

2025-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 = src:onnxruntime
Bug #1100166 [release.debian.org] transition: onnxruntime
Added indication that 1100166 affects src:onnxruntime

-- 
1100166: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100166
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Getting python3-ilorest and ilorest uploaded in sync

2025-03-12 Thread Thomas Goirand

On 3/11/25 15:29, Carsten Schoenert wrote:

I count one time, but this doesn't matter in the end.


It's been the 3rd time, but right, let's move on.


Could we *PLEASE* communicate and get to upload both at the same time?
So far, I've been communicating with you about this privately. This
time, I'm adding the release team list as recipient, to get the release
team attention, and to make sure the message is publicly seen and ACK
that I've made such a request. If the bad practice of rogue uploads
continue, I may escalate this further. You've been (politely) warned...


Yes, we've had a conversion in the past about some coordinated uploads 
and there was no and never an intention from my side in the past to 
block any other packages, why should I've an interest in such doings. If 
this was happen I need to apologize about that.


No worries.


It's more that I've really forgotten about we need to coordinate the work.


Also, would you be ok to move your package to the Python team, so I get
upload rights as well?


I don't mind, I also would not mind if you want to put yourself into the 
Uploaders field and remove me there.

>
In the past I had an interest in the package as I was using this on may 
day job, this isn't the case anymore.


That's the case for me. We have hundreds of HPe servers at my work, and 
we use ilorest daily to change settings.



I'll move the package to the DPT the next hours.


Thanks for moving the package, I can see it already reached 
https://salsa.debian.org/python-team/packages/python-ilorest. Though I 
do not want to kick you out of the project. :)



Version 6.0.0 has been released 6 hours ago, and is available. Should we
package these for Trixie? The library freeze is in 4 days... Once done,
IMO, no further upload should be done before Trixie is out. Your 
thoughts?


I'm totally fine if the new version 6.x goes into Trixie. If you want to 
pick over the package feel free, otherwise I can try to have a look at 
the weekend.


Ok, I'll do this soon (maybe today?).

There is a ongoing hassle with python-redfish as both packages use the 
same module path, it's not resolved yet and would need to get fixed by 
HPE I think.


I have just seen #1093034 about this.

But I'm very pessimistic HPE will move ever to get this 
solved so bot Python libraries can live together.


Did you open a bug upstream for this?

Cheers,

Thomas Goirand (zigo)



Processed: nmu: emacs_1:30.1+1-4

2025-03-12 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:emacs
Bug #1100365 [release.debian.org] nmu: emacs_1:30.1+1-4
Added indication that 1100365 affects src:emacs

-- 
1100365: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100365
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1094736: transition: libcdio

2025-03-12 Thread Gabriel F. T. Gomes
* gregor herrmann:
>
> % apt-cache --no-all-versions show libiso9660-12
> Package: libiso9660-12
>
> Source: libcdio
> Version: 2.2.0-1
> Installed-Size: 76
> Maintainer: Gabriel F. T. Gomes 
> Architecture: amd64
> Depends: libc6 (>= 2.14), libcdio19t64 (>= 2.1.0)

This is probably due to the fact that libiso9660 is built from the same
source as libcdio; thus, when libiso9660 is built, it is linked against
the version of libcdio installed on the build system, which is version
2.1.0-5.

Perhaps the build rules for the libcdio (source-)package should require
libiso9660 to be linked against the newly built libcdio, but I don't
think that this is how these things are usually done.

I'm a little bit confused, as well, but thank you very much for digging
into this. This information you shared is very useful.



Bug#1094736: transition: libcdio

2025-03-12 Thread gregor herrmann

On Tue, 11 Mar 2025 16:44:14 -0700, Gabriel F. T. Gomes wrote:


1. Maybe my worries about the ABI break and libdevice-cdio-perl were
not actually too conservative.
2. Why does using an old version of libcdio (not libiso9660) is
causing the issue? Should libcdio's SONAME have been bumped (by
upstream), as well?


What surprises me a bit:

% apt-cache --no-all-versions show libdevice-cdio-perl
Package: libdevice-cdio-perl   
Source: libdevice-cdio-perl (2.0.0-2)

Version: 2.0.0-2+b5
Installed-Size: 612
Maintainer: Debian Perl Group 
Architecture: amd64
Depends: perl (>= 5.40.1-2), perlapi-5.40.1, libc6 (>= 2.38), libcdio19t64 (>= 
2.1.0), libiso9660-12 (>= 2.2.0)

i.e. libdevice-cdio-perl needs the newer libiso9660-12 but is fine 
with the old libcdio19t64.


But this is in sync with:

% apt-cache --no-all-versions show libiso9660-12
Package: libiso9660-12   
Source: libcdio

Version: 2.2.0-1
Installed-Size: 76
Maintainer: Gabriel F. T. Gomes 
Architecture: amd64
Depends: libc6 (>= 2.14), libcdio19t64 (>= 2.1.0)


Cheers,
gregor, still confused

--
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   


signature.asc
Description: Digital Signature