On Wed, 09 Nov 2022 at 15:14:08 +0100, Guilhem Moulin wrote:
> An LVM-specific regression in the `cryptroot-unlock` logic wouldn't have
> broken the dropbear-initramfs autopkgtests since we don't use LVM there
> anymore, but I tested it again after reverting the commit and th
Hi,
On Sun, 25 Jun 2023 at 21:19:10 +, Bastien Roucariès wrote:
> I found the commit that remove the stack overlfow check line 688
> https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6
That also matching my finding from https://bugs.debian.org/1034847#12 .
Asked for con
ree in lua_upvaluejoin in lapi.c. (Closes:
+#920321)
+ * Fix CVE-2020-24370: Segmentation fault in getlocal and setlocal functions
+in ldebug.c. (Closes: #988734)
+
+ -- Guilhem Moulin Thu, 22 Jun 2023 22:03:38 +0200
+
lua5.3 (5.3.3-1.1) unstable; urgency=medium
* Non-maintainer uploa
On Fri, 30 Jun 2023 at 11:14:35 -0500, Michael Meier wrote:
> I had to edit the file /usr/share/initramfs-tools-hooks so it also copies the
> dss key:
src:dropbear doesn't ship that file, do you mean
/usr/share/initramfs-tools/hooks/dropbear?
> The option DROPBEAR_OPTIONS="-E" should be default
Control: tag -1 pending
On Tue, 31 Jan 2023 at 13:38:20 -0500, Amin Bandali wrote:
> Would you please consider adopting the attached patch (also forwarded
> and applied upstream) for fixing the test suite breakage both before
> and after ICU 72.1? Though Debian unstable and testing already have
>
Control: tag -1 pending
Hi Paul,
On Sun, 25 Sep 2022 at 20:09:09 +0200, Paul Gevers wrote:
> However, the reason for that long run was not the failure itself, but
> the fact that your tests drop to shell on error and apparently waits
> for user input. One failure with 2:2.5.0-3 in unstable has th
Control: tag -1 moreinfo
Hi,
On Fri, 23 Sep 2022 at 16:47:19 +0900, Yuya Nishihara wrote:
> This is the output of 'cryptsetup luksResume', at version 2:2.5.0-3:
Thanks for the debug log! Did you obtain that by adding ‘--debug’ to
/lib/cryptsetup/functions:resume_mapping() and rebuilding the ini
Hi elbrus,
On Fri, 30 Sep 2022 at 21:38:50 +0200, Paul Gevers wrote:
> On Mon, 26 Sep 2022 19:35:44 +0200 Paul Gevers wrote:
>> Assuming it works as intended, that's exactly what I was looking for, yes.
>
> Seems it doesn't always work.
Haven't uploaded 2:2.5.0-4 yet as I was traveling this wee
Hi,
On Sun, 02 Oct 2022 at 20:40:36 +0100, Luca Boccassi wrote:
> Could you please consider an upload of the latest cryptsetup to
> bullseye-backports?
Can certainly do that if it's useful.
Cheers
--
Guilhem.
signature.asc
Description: PGP signature
Control: tag -1 = pending
Control: severity -1 important
On Tue, 27 Sep 2022 at 14:22:13 +0900, Yuya Nishihara wrote:
> The attached log file shows /run/udev/control exists, but it might not be what
> you suggested because the log is captured out of the chroot environment. Maybe
> that's why udevd
Hi,
On Sun, 02 Oct 2022 at 20:40:36 +0100, Luca Boccassi wrote:
> Could you please consider an upload of the latest cryptsetup to
> bullseye-backports?
Bookworm/sid's cryptsetup-initramfs conflicts with Bullseye's lvm2.
Could you please upload lvm2 to bullseye-backports, or ask the maintainer
to
Control: tag -1 moreinfo unreproducible
On Sat, 08 Oct 2022 at 11:58:16 +0200, mahashakti89 wrote:
> Cryptsetup won't work on kernel 6.0. No password input at all.
cryptsetup's autopkgtests passed with linux/6.0~rc7-1~exp1 and the “Please
unlock disk $NAME: […] set up successfully” messages are v
On Sat, 08 Oct 2022 at 12:27:20 +0200, Guilhem Moulin wrote:
> On Sat, 08 Oct 2022 at 11:58:16 +0200, mahashakti89 wrote:
>> Cryptsetup won't work on kernel 6.0. No password input at all.
>
> cryptsetup's autopkgtests passed with linux/6.0~rc7-1~exp1 and the “Please
> u
On Sat, 08 Oct 2022 at 12:48:59 +0200, Mahashakti89 wrote:
> I forgot to mention it worked at the very beginning of 6.0 kernel
> After pulling the latest commits it didn't work anymore
Ah, so you're building your own kernel? You might want to bisect then
to identify the culprit :-)
>> Please pr
Control: tag -1 pending
Hi,
On Tue, 20 Dec 2022 at 17:54:56 +0100, Lucas Nussbaum wrote:
>> There was 1 failure:
>>
>> 1) Rcmail_Rcmail::test_format_date
>> Failed asserting that two strings are identical.
>> --- Expected
>> +++ Actual
>> @@ @@
>> -'6/1/20, 12:20 PM'
>> +'6/1/20, 12:20 PM'
>>
>
Hi kibi,
In https://bugs.debian.org/1032235#107 elbrus (CC'ed) asked for a t-p-u
upload of cryptsetup to fix a potential major regression should
bookworm's src:argon2 ever be rebuilt with the bookworm toolchain. The
version currently in sid, 2:2.6.1-3, also includes 2 upstream patches to
mitigate
Control: tag -1 unreproducible moreinfo
Hi,
On Mon, 27 Mar 2023 at 12:35:39 +0200, Alexis Huxley wrote:
> testaroli# cryptsetup isLuks -v /dev/zvol/zpool0/test
> Command failed with code -1 (wrong or missing parameters).
> testaroli# cryptsetup -v isLuks /dev/zvol/zpool0/test
Control: tag -1 - moreinfo unreproducible
Control: tag -1 + upstream
Control: retitle -1 cryptsetup-bin: `cryptsetup -v isLuks` produces misleading
output when the device isn't LUKS
On Mon, 27 Mar 2023 at 14:06:32 +0200, Alexis Huxley wrote:
> testaroli# cryptsetup isLuks /dev/loop0; echo "\`cryp
Hi kibi,
On Sat, 01 Apr 2023 at 00:36:35 +0200, Cyril Brulebois wrote:
> Cyril Brulebois (2023-03-26):
>> I'm happy to have the patches included, and I can definitely live with
>> possible temporary regressions (should that happen) that might arise
>> from having them.
>
> Pre-upload testing show
Control: tag -1 unreproducible moreinfo
On Sat, 01 Apr 2023 at 18:36:47 +0200, William Desportes wrote:
> I am trying to sort out this bug, but the machine is blocked in an endless
> loop
>
> It does /scripts/init-bottom
>
> And then the monitor displays in an endless loop:
> /scripts/init-premou
On Sun, 02 Apr 2023 at 10:54:59 +0200, William Desportes wrote:
> Can you be more specific?, I updated some of it yesterday. The
> updating keys seems to be useful.
See the NEWS entry for 2015.68-1, /etc/ssh and the initramfs image have
different access control so blindly suggesting to convert key
On Sun, 02 Apr 2023 at 12:57:58 +0200, Lars Silvén wrote:
> I got it working with a fix I found and modified from a Ubuntu version to
> work also for Debian testing:
> https://github.com/larssilven/systemd_with_tpm2
Oh, cool! Unfortunately that's too late for bookworm, but will be
considered for
On Wed, 05 Apr 2023 at 23:11:36 +0200, William Desportes wrote:
> My Debug did some small progress the other day, and can confirm I walked into
> https://bugs.debian.org/1015810
>
>> /scripts/init-premount/dropbear: line 300: can't open '/run/net-*.conf': No
>> such file or directory
>
> That sai
On Thu, 06 Apr 2023 at 18:56:49 +0200, William Desportes wrote:
> with cryptsetup it does not like rescue mode initramfs updates.
Hm? Installing cryptsetup-initramfs, and letting it unlock devices
(incl. those holding the root FS) at early boot stage, definitely
doesn't prevent rescue mode or ge
On Thu, 06 Apr 2023 at 23:15:59 +0200, Guilhem Moulin wrote:
> On Thu, 06 Apr 2023 at 18:56:49 +0200, William Desportes wrote:
>> The system does not have ipconfig installed,
>
> What do you mean? Your main system (outside) initramfs stage might lack
Misplaced parenthesis, that s
Control: tag -1 moreinfo unreproducible
On Fri, 07 Apr 2023 at 14:52:01 -0500, Jonathan Hutchins wrote:
> Loading default page (.../mail) displays PHP code inestead of login page
> after upgrade from buster to bullseye.
index.php ends with the exact same line on buster (1.3.17+dfsg.1-1~deb10u2)
On Thu, 13 Apr 2023 at 23:16:15 +0200, William Desportes wrote:
> Right after boot&unlock and (user login?) it prints the missing
> ipconfig missing message.
Just to confirm, you unlock (at initramfs stage) using keyboard + screen
right, not remotely using dropbear SSH right? Because at that poin
On Sun, 15 Jan 2023 at 21:49:33 +0100, Hauke Mehrtens wrote:
> I have the output I see on the terminal when a monitor is connected.
Unfortunately that doesn't help much, please use the aforementioned
README.debug.html instructions to get a log file.
> The comments look like a udev rule should cre
I requested a CVE ID for this issue.
--
Guilhem.
signature.asc
Description: PGP signature
Control: tag -1 moreinfo
Hi,
On Mon, 18 Sep 2023 at 10:46:30 +0100, Luca Boccassi wrote:
> With sysvinit scripts no longer being mandatory, the udev one has been
> removed from src:systemd. It is in the process of being adopted by
> src:sysvinit, but being optional and all that might take some ti
Control: tag -1 moreinfo
Hi,
On Tue, 19 Sep 2023 at 12:42:34 +0200, J.L. Fernandez Jambrina wrote:
> As php-mail didn't change in the upgrade and I verified the arguments
> to the MAIL::send method are the same in both cases I suspect from the
> underlying php-net-smtp package, but I can be wrong
Control: tag -1 moreinfo
On Tue, 19 Sep 2023 at 22:39:40 +0100, Tj wrote:
> On reaching initialramfs it fails to unlock either of the LUKS devices;
> eventually dropping to the shell after reporting:
>
> Error: Timeout reached while waiting for askpass.
>
> After using `break=mount` and investigat
On Thu, 21 Sep 2023 at 13:58:18 +0200, J.L. Fernandez Jambrina wrote:
> Unfortunatelly I don't know how to use setDebug() to see what's is
> being passed to send()
Please see https://github.com/pear/Net_SMTP#debugging to debug Net_SMTP.
> but I used two calls to var_dump() to see it:
AFAICT this
Control: retitle -1 roundcube: CVE-2023-43770: XSS vulnerability in handling of
linkrefs in plain text messages
On Mon, 18 Sep 2023 at 13:59:47 +0200, Guilhem Moulin wrote:
> I requested a CVE ID for this issue.
CVE-2023-43770 for this. I'll suggest debdiffs targetting {bullseye,
On Fri, 22 Sep 2023 at 10:56:59 +0300, Guilhem Moulin wrote:
> I'll suggest debdiffs targetting {bullseye,bookworm}-security after
> the week-end.
Oh, didn't see the Security Team tagged this as no-dsa. Will target
{bullseye,bookworm} then.
--
Guilhem.
signature.asc
On Wed, 15 Feb 2023 at 11:42:38 +0100, Wilhelm Greiner wrote:
> With this Bug encrypting Disks with key in tpm (a documented Feature) is
> completely broken, so it should be classified as bug.
This is documented in systemd not src:cryptsetup. systemd is not
involved at early boot stage, at when l
X-Debbugs-Cc: pkg-cryptsetup-de...@alioth-lists.debian.net
Hi kibi!
On Thu, 16 Feb 2023 at 20:14:20 +0100, Cyril Brulebois wrote:
> Cyril Brulebois (2023-01-09):
>> Cyril Brulebois (2023-01-08):
>>> I'm seeing at least two problems with cryptsetup while testing daily
>>> builds:
>>> - with 6.1.
On Wed, 01 Mar 2023 at 12:04:04 +, Debian FTP Masters wrote:
> Changes:
> argon2 (0~20190702-0.1) unstable; urgency=medium
> .
> […]
>* Only build udeb without threads (Closes: #1014110)
AFAICT #1014110 says nothing about udeb, but that change actually builds
libargon2 (.deb) without pth
Control: clone -1 -2
Control: reassign -1 cryptsetup-initramfs 2:2.6.1-1
On Thu, 02 Mar 2023 at 02:57:20 +0100, Guilhem Moulin wrote:
> On Wed, 01 Mar 2023 at 12:04:04 +, Debian FTP Masters wrote:
>> Changes:
>> argon2 (0~20190702-0.1) unstable; urgency=medium
>> .
&g
Hi kibi,
On Sat, 01 Apr 2023 at 01:34:54 +0200, Guilhem Moulin wrote:
> Ah right, reopened the upstream issue but forgot to follow-up here :-(
> https://gitlab.com/cryptsetup/cryptsetup/-/issues/802#note_1328592911
AFAICT the issue is now fully fixed upstream: on systems without swap
the
Hi,
On Thu, 20 Apr 2023 at 20:02:27 +0200, Cyril Brulebois wrote:
>> * Backport upstream MR !498, let it mature in sid for a few
>> weeks then upload 2:2.6.1-4~deb12u1 via t-p-u. There are only 2
>> upstream commits to cherry-pick and neither is large nor intrusive;
>> moreover like the commits p
On Fri, 21 Apr 2023 at 13:02:24 +0200, Cyril Brulebois wrote:
> Summing up some out-of-band brainstorming about what “a bit crippled”
> means, it might just be libargon2-1-udeb's being built without pthread
> support:
>
> https://salsa.debian.org/debian/argon2/-/commit/31225912349933993e49f5007e976
This is beneficial for cryptsetup-udeb, see #1028250. Removing threading
+support in libargon2-1-udeb was done for historical reasons no longer
+relevant since Debian Bookworm.
+
+ -- Guilhem Moulin Fri, 21 Apr 2023 19:48:56 +0200
+
argon2 (0~20190702+dfsg-2) unstable; urgency=medium
On Fri, 21 Apr 2023 at 12:25:29 +0200, Guilhem Moulin wrote:
> Bookworm (debian-bookworm-DI-rc1-amd64-netinst.iso + cryptsetup
> 2:2.6.1-4~deb12u1,
> graphical install), 1024M RAM:
>
> root@debian:~# cryptsetup luksDump /dev/vda5 | grep -A3 PBKDF
> PB
[ Bastian Germann ]
+ * Add Breaks on cryptsetup-initramfs (see #1032235)
+
+ [ Guilhem Moulin ]
+ * d/gbp.conf: Set 'debian-branch = debian/bookworm'.
+ * d/rules: Restore threading support to libargon2-1-udeb (closes: #1034696).
+This is beneficial for cryptsetup-udeb, see #
00 +0200
+++ cryptsetup-2.6.1/debian/changelog 2023-04-21 00:54:29.0 +0200
@@ -1,3 +1,17 @@
+cryptsetup (2:2.6.1-4~deb12u1) bookworm; urgency=medium
+
+ * Rebuild for Bookworm.
+
+ -- Guilhem Moulin Fri, 21 Apr 2023 00:54:29 +0200
+
+cryptsetup (2:2.6.1-4) unstable; urgenc
Package: lacme
Version: 0.8.1-1
Severity: important
Control: found -1 0.8.0-2
The lacme client fails to handle "ready" → "processing" → "valid" status
change during newOrder, instead of just "ready" → "valid". The latter
may be what we observe when the server is fast enough, but according to
RFC
d of just "ready" → "valid". The latter may be what
+we observe when the server is fast enough, but according to RFC 8555
+sec. 7.1.6 the state actually transitions via "processing" state and
+we need to account for that.
+ - Test suite: Point stretch'
→ "valid". The latter may be what we
+observe when the server is fast enough, but according to RFC 8555 sec.
+7.1.6 the state actually transitions via "processing" and we need to
+account for that (closes: #1034834).
+ * d/gbp.conf: Set 'debian-branch = debian/bu
Control: tag -1 unreproducible moreinfo
What does `lsinitramfs /initrd.img | grep -e{crypt,lvm}` return (after
removing your hook and rebuilding the initramfs image)? And also
install -m0700 -d /tmp/initramfs
unmkinitramfs /initrd.img /tmp/initramfs
cat /tmp/initramfs/cry
Source: yubikey-luks
Version: 0.5.1+29.g5df2b95-6.1
Severity: serious
Hi,
cryptsetup-run has been a transitional package since the buster release,
and has now been removed following #1038285. Looks like I failed to
properly check reverse depends; yubikey-luks should replace ‘Depends:
cryptsetup-
On Mon, 28 Aug 2023 at 01:56:04 +0200, Guilhem Moulin wrote:
> cryptsetup-run has been a transitional package since the buster release,
> and has now been removed following #1038285. Looks like I failed to
> properly check reverse depends; yubikey-luks should replace ‘Depends:
> cr
Source: roundcube
Version: 1.6.4+dfsg-1
Severity: important
Control: found -1 1.6.4+dfsg-1~deb12u1
Tags: security upstream
Roundcube webmail upstream has recently released 1.6.5 which fixes the
following vulnerability:
* Fix cross-site scripting (XSS) vulnerability in setting
Content-Type/Con
Control: tag -1 wontfix
Hi,
On Tue, 07 Nov 2023 at 10:38:49 +0100, Marco Emilio Poleggi wrote:
> It looks like the file 'opengpg.js.min' for the 'enigma' plugin is
> missing.
This is intentional, see roundcube-plugins.NEWS:
https://salsa.debian.org/roundcube-team/roundcube/-/blob/debian/latest/d
Source: roundcube
Version: 1.6.3+dfsg-2
Severity: important
Tags: security upstream
Control: found -1 1.3.17+dfsg.1-1~deb10u3
Control: found -1 1.4.14+dfsg.1-1~deb11u1
Control: found -1 1.6.3+dfsg-1~deb12u1
Control: forwarded -1 https://github.com/roundcube/roundcubemail/issues/9168
In a recent po
am fix for CVE-2023-35936 from 3.1.6 release.
+
+ -- Guilhem Moulin Fri, 21 Jul 2023 20:22:42 +0200
+
pandoc (2.17.1.1-1.1) unstable; urgency=low
* Non-maintainer upload.
diff -Nru pandoc-2.17.1.1/debian/patches/CVE-2023-35936.patch
pandoc-2.17.1.1/debian/patches/CVE-2023-35936.patch
--- pan
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pan...@packages.debian.org, Guilhem Moulin
Control: affects -1 + src:pandoc
[ Reason ]
pandoc 2.9.2.1-1 is vulnerable to CVE-2023-35936: Arbitrary file write
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: pan...@packages.debian.org, Guilhem Moulin
Control: affects -1 + src:pandoc
[ Reason ]
pandoc 2.17.1.1-1.1 is vulnerable to CVE-2023-35936: Arbitrary file write
On Tue, 25 Jul 2023 at 14:39:29 +0200, Jonas Smedegaard wrote:
> I have no objections at all - on the contrary: Thanks!
>
> I will have a look at applying the patch to trixie, then - since there
> is unfortunately little hope that the whole Haskell stack will get
> upgrading any time soon, so wi ca
Control: tag -1 + unreproducible moreinfo
On Tue, 09 May 2023 at 17:10:03 +0200, Pásztor János wrote:
> The machine and the disks are having two snapshots named 'good' and 'bad' so
> it is easy to jump between the states.
> I am willing to share with you the VM(disks + virsh dump) via a filesharin
Control: tag -1 - moreinfo
On Tue, 09 May 2023 at 18:39:33 +0200, Pásztor János wrote:
> I have attached the machine definition and already sent the vm images for
> you (via filesender.hu).
Many thanks! Will have something to put teeth into once the images have
been downloaded :-)
--
Guilhem.
Control: tag -1 - unreproducible
Control: reassign -1 lvm2 2.03.15-1
Control: forcemerge 1018730 -1
Control: affects -1 cryptsetup-initramfs
Thanks for the the reproducer! Much appreciated. So the problem is
that your VG spans over multiple PVs, but the LVs that are required at
early boot stage
Guilhem.
From: Guilhem Moulin
Date: Wed, 10 May 2023 00:42:28 +0200
Subject: udev rules: Try to call activate incomplete VGs at initramfs stage.
The upstream udev rules don't autoactivate LVs residing on incomplete
VGs, see https://bugzilla.redhat.com/show_bug.cgi?id=1337220#c10 .
This change adds
On Thu, 11 May 2023 at 18:12:52 +0200, Bastian Blank wrote:
> Nope, not really. Half VG was never a real thing. It might work in
> some cases.
And these use-cases are unbootable since 2.03.15…
> Then, degraded is the default activation mode, so overriding that would
> not be appropriate. But f
Control: tag -1 unreproducible
On Wed, 10 Jun 2020 at 23:19:41 +0200, Marco Herrn wrote:
> When writing into a logfile, rainloop writes the passwords of all
> login attempts (successful or not) into the logfile in cleartext.
FWIW I'm not able to reproduce this with the version from Debian buster
Control: tag -1 moreinfo unreproducible
Hi,
On Sun, 04 Jun 2023 at 10:41:56 +0200, Georg Gast wrote:
> But dropbear did not start as it was complaining about the missing dss host
> key.
> […]
> If i delete /etc/dropbear/initramfs/dropbear_dss_host_key and generate a new
> one
> dropbearkeygen -t
Control: tag -1 unreproducible moreinfo
On Tue, 13 Jun 2023 at 16:16:51 -0500, Bryan K. Walton via
Pkg-roundcube-maintainers wrote:
> Today, I tried to upgrade my webserver to Debian 12.0 (bookworm).
> Everything succeeded but Roundcube.
What was the previous Roundcube (and Debian itself) versio
On Tue, 13 Jun 2023 at 20:45:19 -0500, Bryan K. Walton wrote:
> Previous Roundcube version: 1.4.13+dfsg.1-1~deb11u1
> Previous Debian version: 11.7
Which DB backend are you using? I'm unable to reproduce this in a
Bullseye (11.7) VM with roundcube-mysql (the default):
~# apt install -y defaul
Hi Moritz,
On Tue, 25 Apr 2023 at 20:58:00 +0200, Moritz Mühlenhoff wrote:
> CVE-2021-43519[0]:
> | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4
> | allows attackers to perform a Denial of Service via a crafted script
> | file.
While trigaging this for LTS I was unable to
On Thu, 22 Jun 2023 at 18:08:39 +0200, Guilhem Moulin wrote:
> bullseye
>
>
> $ lua5.1 ./cstack.lua
> testing stack overflow detection
> nesting coroutines running after recoverable errors
> final count:198
>
> $ lua5.2 ./cstack.lua
> te
Hi carnil,
On Fri, 23 Jun 2023 at 21:49:21 +0200, Salvatore Bonaccorso wrote:
> thanks for the analysis. I want to point out that it's really
> important to not rely on the POC for making the not-affected
> assessment (and when not confirmed, rather err on the safe side and
> keep something marked
Hi Sebastian,
Great to hear OpenSSL 3.2 will soon be entering sid! :-)
On Wed, 06 Mar 2024 at 07:59:53 +0100, Sebastian Andrzej Siewior wrote:
> I'm currently puzzled where to look at. Could you please have a look?
It seems openssl-req(1ssl) now generates X.509 version 3 certificates by
default.
Control: tag -1 moreinfo
Hi,
On Fri, 23 Aug 2024 at 13:22:01 +1200, jfp wrote:
> I get the decrypt prompt on the console, I enter the passphrase then the boot
> continues.
You enter the passphrase a local console not from an SSH client right?
Note that if you don't need remote unlocking you can
Hi Paul,
On Sat, 24 Aug 2024 at 17:50:22 +0200, Paul Gevers wrote:
> On Sun, 04 Aug 2024 22:19:30 + Debian FTP Masters
> wrote:
>> * DEP-8: Mark cryptroot-* as flaky. To be re-evaluated if/when the
>> tests only run on environment where KVM is available. (Closes: #1073052)
>
> On amd64 we
On Sat, 24 Aug 2024 at 19:16:01 +0200, Paul Gevers wrote:
> On 24-08-2024 19:10, Guilhem Moulin wrote:
>> Great news that would be much appreciated, thanks!
>
> Done.
>
> I triggered a migration-reference/0 run in testing.
Awesome, thanks! Right now these tests have “Arc
On Sat, 24 Aug 2024 at 21:25:03 +0200, Paul Gevers wrote:
> On 24-08-2024 20:53, Guilhem Moulin wrote:
>> Awesome, thanks! Right now these tests have “Architecture: amd64 i386”,
>> is the runner able to run i386 too or should I remove it from the list?
>
> Tests with isolat
Hi Paul,
On Sun, 25 Aug 2024 at 09:56:59 +0200, Paul Gevers wrote:
> Well, if those are currently only run on amd64 and i386, it might be worth
> indeed to stop marking them flaky and only run on amd64 (or mark them
> skippable and only "exit 77" on i386 on failure, such that failure on amd64
> is
Hi,
On Sat, 31 Aug 2024 at 15:14:42 +, Johannes Berg wrote:
> Since I have four devices with the same passphrase (they end
> up building a btrfs array, so they're all needed), it'd be
> nice to (try) using the passphrase for the first, so I don't
> have to enter it four times.
See /usr/share/
Package: roundcube-core
Version: 1.6.8+dfsg-1
Severity: normal
Tags: upstream pending
Control: found -1 1.6.5+dfsg-1+deb12u3
Control: forwarded -1 https://github.com/roundcube/roundcubemail/issues/9571
The upstream fix for CVE-2024-42008 (from 1.6.8 and backported to
1.6.5+dfsg-1+deb12u3)
sets a
> $ pullimap --debug SECTION
> No such directory: /home/user/.local/share at
> /usr/share/perl5/Net/IMAP/InterIMAP.pm line 102.
>
> If you need a certain directory and it does not exist... create it?
Per the XDG Base Directory Specification $XDG_DATA_HOME/pullimap (or
~/.local/share/pullimap if X
Package: autopkgtest
Version: 5.39
Severity: normal
Tags: patch
Hi,
It appears that running autopkgtest-build-qemu on a sid system produces
unbootable images for bullseye LTS and older suites.
AFAICT that's because autopkgtest-build-qemu creates the guest's root
filestem using the host's mkfs.ex
Hi,
On Thu, 15 Aug 2024 at 22:03:26 +, Einhard Leichtfuß wrote:
> when exporting an addressbook via the Roundcube web UI ("Export all"),
> any group without members is silently ignored.
Looks like this issue and the others 3 you just reported are upstream
issues, please report them at the ups
On Mon, 19 Aug 2024 at 15:01:38 -0400, Brian Smith wrote:
> I decided to do a fresh install to diagnose the issue. I grabbed the latest
> mini.iso and did a fresh install with encryped LVM. I was able to boot with no
> issues. I then updated my apt sources to point to sid instead of trixie and
> r
On Mon, 19 Aug 2024 at 22:40:32 -0400, briag...@disroot.org wrote:
> I tried again on a new machine. I was able to reproduce the issue by
> following the steps I outlined before. I then did a full reinstall - but
> this time after switching to the sid repos and running full-upgrade I
> installed sy
Control: unblock 1076420 by 1078557
On Tue, 10 Sep 2024 at 11:33:07 +, Debian Bug Tracking System wrote:
> Processing commands for cont...@bugs.debian.org:
>> block 1076420 by 1078557
> Bug #1076420 [src:uwsgi] uwsgi: move away from cdbs
> […]
> Added blocking bug(s) of 1076420: 1078557
Wrong
On Tue, 10 Sep 2024 at 13:40:06 +0200, Alexandre Rossi wrote:
>>> Bug #1076420 [src:uwsgi] uwsgi: move away from cdbs
>>> […]
>>> Added blocking bug(s) of 1076420: 1078557
>>
>> Wrong bug number? #1078557 is for a leaf package and has nothing to do
>> with uwsgi or CDBS.
>
> Sorry for that, fixing
Control: tag -1 unreproducible moreinfo
On Thu, 12 Sep 2024 at 20:12:17 +0200, Paweł Bogusławski wrote:
> if one creates /etc/initramfs-tools/scripts/local-top/crypti, crypti
> won't be called before cryptroot on boot.
Works here, on bookworm as well as sid systems. Which files do you have in
sc
Control: severity -1 minor
Control: retitle -1 Clarify -4 and -6 flags in the manpage
Hi,
On Tue, 05 Feb 2019 at 16:06:49 +, Nick wrote:
> The man page for nc(1) says the -4 or -6 switch forces ipv4 or ipv6
> only, respectively. This suggests that using neither switch enables
> both.
netcat
Control: retitle -1 gpglist chokes on direct-key signatures
Control: tag -1 pending
Hi Giovanni,
On Mon, 04 Feb 2019 at 11:16:32 +0100, Giovanni Mascellani wrote:
> I am sorry I am not able to provide further information, because I
> have no idea what gpglist is not liking about my key.
It doesn
Hi Salvatore,
On Wed, 06 Feb 2019 at 20:59:50 +0100, Salvatore Bonaccorso wrote:
> Given there is (not yet) a CVE for this issue add a unique identifier
> via a Debian BTS bug for the issue for tracking.
Oops, I should have done that before uploading 2.4.4-1… Sorry for the
extra work, and thanks
Hi,
Could you please upload src:argon2 without the compatibility package?
https://wiki.debian.org/Teams/ReleaseTeam/Transitions
This RC bug prevents packages depending on libargon2-*, such as
cryptsetup, from migrating to testing.
Cheers,
--
Guilhem.
signature.asc
Description: PGP signature
Hi,
On Fri, 20 Jul 2018 at 23:16:09 +0100, Matt Patey wrote:
> I got it working again by changing /usr/share/initramfs-tools/scripts/local-
> top/yubikey-luks as follows:
>
> sed -i 's|$|,keyscript=/sbin/ykluks-keyscript|' /cryptroot/crypttab
Please don't do that. We (cryptsetup package mainta
Source: mandos
Version: 1.7.19-1
Severity: serious
Hi,
mandos' initramfs boot script reads and parses /conf/conf.d/cryptroot.
Since cryptsetup 2:2.0.3-2 this file no longer exists; we cryptsetup
package maintainers replaced and it changed its format (without notice
as it was undocumented and thus
Do you have a usrmerge setup? What does `readlink -f /lib/cryptsetup/askpass`
return?
I noticed a problem with usrmerge setups earlier today. The following
commit fixes the issue AFAICT:
https://salsa.debian.org/cryptsetup-team/cryptsetup/commit/f1c56c19fea6dc988c1f29fb8a510c05286c2900
--
Gui
Hi Rian,
(Sorry for taking that long to come back to you.) As I wrote back in
January(!), I think OpenPGP smartcard support would be a nice addition
to src:cryptsetup. Another recent bug [#903163] was requesting the same
thing and made me come back to this. We've not decided which of these
two
On Sun, 29 Jul 2018 at 20:28:02 +0200, C. Dominik Bódi wrote:
> Am Sonntag, 29. Juli 2018, 18:46:20 CEST schrieb Guilhem Moulin:
>> readlink -f /lib/cryptsetup/askpass
> readlink returns:
> /lib/cryptsetup/askpass
Hmm. In the initramfs too? No need to reboot to the broken initrd
On Mon, 30 Jul 2018 at 02:47:39 +0800, Guilhem Moulin wrote:
> On Sun, 29 Jul 2018 at 20:28:02 +0200, C. Dominik Bódi wrote:
>> Am Sonntag, 29. Juli 2018, 18:46:20 CEST schrieb Guilhem Moulin:
>>> readlink -f /lib/cryptsetup/askpass
>> readlink returns:
>> /lib/crypts
Hi,
On Sat, 07 Jul 2018 at 17:08:59 +0200, Guilhem Moulin wrote:
> On Sat, 07 Jul 2018 at 12:05:13 +0100, Chris Lamb wrote:
>> Programming Lang: Shell
>> Description : Encrypt root volumes with an OpenPGP smartcard
>
> See also #888916 (we didn't find time to review
Control: tag -1 pending
On Tue, 31 Jul 2018 at 16:42:36 +0800, Tomasz Buchert wrote:
> I already committed a fix in
> https://salsa.debian.org/debian/signing-party/commit/c62477e3086c33af14493337227ec219f151d5b4.
I pushed a fix to upstream/latest last week
https://salsa.debian.org/debian/signing
Control: tag -1 moreinfo
Hi Andreas,
On Wed, 01 Aug 2018 at 13:20:37 +0200, Andreas Beckmann wrote:
> Configuration file '/etc/cryptsetup-initramfs/conf-hook'
> ==> Deleted (by you or by a script) since installation.
> ==> Package distributor has shipped an updated version.
>What would you
401 - 500 of 1122 matches
Mail list logo