Bug#1023716: cryptsetup: cryptroot-unlock in initramfs fails with lvm

2022-11-09 Thread Guilhem Moulin
On Wed, 09 Nov 2022 at 15:14:08 +0100, Guilhem Moulin wrote: > An LVM-specific regression in the `cryptroot-unlock` logic wouldn't have > broken the dropbear-initramfs autopkgtests since we don't use LVM there > anymore, but I tested it again after reverting the commit and th

Bug#1034847: First commit

2023-06-25 Thread Guilhem Moulin
Hi, On Sun, 25 Jun 2023 at 21:19:10 +, Bastien Roucariès wrote: > I found the commit that remove the stack overlfow check line 688 > https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6 That also matching my finding from https://bugs.debian.org/1034847#12 . Asked for con

Bug#1039708: bullseye-pu: package lua5.3/5.3.3-1.1+deb11u1

2023-06-28 Thread Guilhem Moulin
ree in lua_upvaluejoin in lapi.c. (Closes: +#920321) + * Fix CVE-2020-24370: Segmentation fault in getlocal and setlocal functions +in ldebug.c. (Closes: #988734) + + -- Guilhem Moulin Thu, 22 Jun 2023 22:03:38 +0200 + lua5.3 (5.3.3-1.1) unstable; urgency=medium * Non-maintainer uploa

Bug#1037086: dropbear-initramfs: /etc/dropbear/initramfs/dropbear_dss_host_key file not generated

2023-06-30 Thread Guilhem Moulin
On Fri, 30 Jun 2023 at 11:14:35 -0500, Michael Meier wrote: > I had to edit the file /usr/share/initramfs-tools-hooks so it also copies the > dss key: src:dropbear doesn't ship that file, do you mean /usr/share/initramfs-tools/hooks/dropbear? > The option DROPBEAR_OPTIONS="-E" should be default

Bug#1030161: roundcube: Fix short date test before and after ICU 72.1

2023-01-31 Thread Guilhem Moulin
Control: tag -1 pending On Tue, 31 Jan 2023 at 13:38:20 -0500, Amin Bandali wrote: > Would you please consider adopting the attached patch (also forwarded > and applied upstream) for fixing the test suite breakage both before > and after ICU 72.1? Though Debian unstable and testing already have >

Bug#1020714: cryptsetup: cryptroot-* autopkgtests fall-back to shell and hang on errors

2022-09-26 Thread Guilhem Moulin
Control: tag -1 pending Hi Paul, On Sun, 25 Sep 2022 at 20:09:09 +0200, Paul Gevers wrote: > However, the reason for that long run was not the failure itself, but > the fact that your tests drop to shell on error and apparently waits > for user input. One failure with 2:2.5.0-3 in unstable has th

Bug#1020553: cryptsetup-suspend: resume from suspend to RAM stuck after upgrading to 2:2.5.0-3

2022-09-26 Thread Guilhem Moulin
Control: tag -1 moreinfo Hi, On Fri, 23 Sep 2022 at 16:47:19 +0900, Yuya Nishihara wrote: > This is the output of 'cryptsetup luksResume', at version 2:2.5.0-3: Thanks for the debug log! Did you obtain that by adding ‘--debug’ to /lib/cryptsetup/functions:resume_mapping() and rebuilding the ini

Bug#1020714: [pkg-cryptsetup-devel] Bug#1020714: cryptsetup: cryptroot-* autopkgtests fall-back to shell and hang on errors

2022-09-30 Thread Guilhem Moulin
Hi elbrus, On Fri, 30 Sep 2022 at 21:38:50 +0200, Paul Gevers wrote: > On Mon, 26 Sep 2022 19:35:44 +0200 Paul Gevers wrote: >> Assuming it works as intended, that's exactly what I was looking for, yes. > > Seems it doesn't always work. Haven't uploaded 2:2.5.0-4 yet as I was traveling this wee

Bug#1021150: cryptsetup: please upload to bullseye-backports

2022-10-02 Thread Guilhem Moulin
Hi, On Sun, 02 Oct 2022 at 20:40:36 +0100, Luca Boccassi wrote: > Could you please consider an upload of the latest cryptsetup to > bullseye-backports? Can certainly do that if it's useful. Cheers -- Guilhem. signature.asc Description: PGP signature

Bug#1020553: cryptsetup-suspend: resume from suspend to RAM stuck after upgrading to 2:2.5.0-3

2022-10-03 Thread Guilhem Moulin
Control: tag -1 = pending Control: severity -1 important On Tue, 27 Sep 2022 at 14:22:13 +0900, Yuya Nishihara wrote: > The attached log file shows /run/udev/control exists, but it might not be what > you suggested because the log is captured out of the chroot environment. Maybe > that's why udevd

Bug#1021150: cryptsetup: please upload to bullseye-backports

2022-10-07 Thread Guilhem Moulin
Hi, On Sun, 02 Oct 2022 at 20:40:36 +0100, Luca Boccassi wrote: > Could you please consider an upload of the latest cryptsetup to > bullseye-backports? Bookworm/sid's cryptsetup-initramfs conflicts with Bullseye's lvm2. Could you please upload lvm2 to bullseye-backports, or ask the maintainer to

Bug#1021427: cryptsetup: no input on kernel 6.0

2022-10-08 Thread Guilhem Moulin
Control: tag -1 moreinfo unreproducible On Sat, 08 Oct 2022 at 11:58:16 +0200, mahashakti89 wrote: > Cryptsetup won't work on kernel 6.0. No password input at all. cryptsetup's autopkgtests passed with linux/6.0~rc7-1~exp1 and the “Please unlock disk $NAME: […] set up successfully” messages are v

Bug#1021427: cryptsetup: no input on kernel 6.0

2022-10-08 Thread Guilhem Moulin
On Sat, 08 Oct 2022 at 12:27:20 +0200, Guilhem Moulin wrote: > On Sat, 08 Oct 2022 at 11:58:16 +0200, mahashakti89 wrote: >> Cryptsetup won't work on kernel 6.0. No password input at all. > > cryptsetup's autopkgtests passed with linux/6.0~rc7-1~exp1 and the “Please > u

Bug#1021427: cryptsetup: no input on kernel 6.0

2022-10-08 Thread Guilhem Moulin
On Sat, 08 Oct 2022 at 12:48:59 +0200, Mahashakti89 wrote: > I forgot to mention it worked at the very beginning of 6.0 kernel > After pulling the latest commits it didn't work anymore Ah, so you're building your own kernel? You might want to bisect then to identify the culprit :-) >> Please pr

Bug#1026528: [Pkg-roundcube-maintainers] Bug#1026528: roundcube: FTBFS: make[1]: *** [debian/rules:105: override_dh_auto_test] Error 1

2022-12-20 Thread Guilhem Moulin
Control: tag -1 pending Hi, On Tue, 20 Dec 2022 at 17:54:56 +0100, Lucas Nussbaum wrote: >> There was 1 failure: >> >> 1) Rcmail_Rcmail::test_format_date >> Failed asserting that two strings are identical. >> --- Expected >> +++ Actual >> @@ @@ >> -'6/1/20, 12:20 PM' >> +'6/1/20, 12:20 PM' >> >

Bug#1028250: debian-installer: broken cryptsetup support

2023-03-26 Thread Guilhem Moulin
Hi kibi, In https://bugs.debian.org/1032235#107 elbrus (CC'ed) asked for a t-p-u upload of cryptsetup to fix a potential major regression should bookworm's src:argon2 ever be rebuilt with the bookworm toolchain. The version currently in sid, 2:2.6.1-3, also includes 2 upstream patches to mitigate

Bug#1033551: cryptsetup-bin: cryptsetup -v isLuks: doesn't work as documented

2023-03-27 Thread Guilhem Moulin
Control: tag -1 unreproducible moreinfo Hi, On Mon, 27 Mar 2023 at 12:35:39 +0200, Alexis Huxley wrote: > testaroli# cryptsetup isLuks -v /dev/zvol/zpool0/test > Command failed with code -1 (wrong or missing parameters). > testaroli# cryptsetup -v isLuks /dev/zvol/zpool0/test

Bug#1033551: cryptsetup-bin: cryptsetup -v isLuks: doesn't work as documented

2023-03-27 Thread Guilhem Moulin
Control: tag -1 - moreinfo unreproducible Control: tag -1 + upstream Control: retitle -1 cryptsetup-bin: `cryptsetup -v isLuks` produces misleading output when the device isn't LUKS On Mon, 27 Mar 2023 at 14:06:32 +0200, Alexis Huxley wrote: > testaroli# cryptsetup isLuks /dev/loop0; echo "\`cryp

Bug#1028250: debian-installer: broken cryptsetup support

2023-03-31 Thread Guilhem Moulin
Hi kibi, On Sat, 01 Apr 2023 at 00:36:35 +0200, Cyril Brulebois wrote: > Cyril Brulebois (2023-03-26): >> I'm happy to have the patches included, and I can definitely live with >> possible temporary regressions (should that happen) that might arise >> from having them. > > Pre-upload testing show

Bug#1033802: dropbear-initramfs: sleep and cat not found

2023-04-01 Thread Guilhem Moulin
Control: tag -1 unreproducible moreinfo On Sat, 01 Apr 2023 at 18:36:47 +0200, William Desportes wrote: > I am trying to sort out this bug, but the machine is blocked in an endless > loop > > It does /scripts/init-bottom > > And then the monitor displays in an endless loop: > /scripts/init-premou

Bug#1033802: dropbear-initramfs: sleep and cat not found

2023-04-02 Thread Guilhem Moulin
On Sun, 02 Apr 2023 at 10:54:59 +0200, William Desportes wrote: > Can you be more specific?, I updated some of it yesterday. The > updating keys seems to be useful. See the NEWS entry for 2015.68-1, /etc/ssh and the initramfs image have different access control so blindly suggesting to convert key

Bug#1031254: workaround

2023-04-02 Thread Guilhem Moulin
On Sun, 02 Apr 2023 at 12:57:58 +0200, Lars Silvén wrote: > I got it working with a fix I found and modified from a Ubuntu version to > work also for Debian testing: > https://github.com/larssilven/systemd_with_tpm2 Oh, cool! Unfortunately that's too late for bookworm, but will be considered for

Bug#1033802: dropbear-initramfs: sleep and cat not found

2023-04-05 Thread Guilhem Moulin
On Wed, 05 Apr 2023 at 23:11:36 +0200, William Desportes wrote: > My Debug did some small progress the other day, and can confirm I walked into > https://bugs.debian.org/1015810 > >> /scripts/init-premount/dropbear: line 300: can't open '/run/net-*.conf': No >> such file or directory > > That sai

Bug#1033802: dropbear-initramfs: sleep and cat not found

2023-04-06 Thread Guilhem Moulin
On Thu, 06 Apr 2023 at 18:56:49 +0200, William Desportes wrote: > with cryptsetup it does not like rescue mode initramfs updates. Hm? Installing cryptsetup-initramfs, and letting it unlock devices (incl. those holding the root FS) at early boot stage, definitely doesn't prevent rescue mode or ge

Bug#1033802: dropbear-initramfs: sleep and cat not found

2023-04-06 Thread Guilhem Moulin
On Thu, 06 Apr 2023 at 23:15:59 +0200, Guilhem Moulin wrote: > On Thu, 06 Apr 2023 at 18:56:49 +0200, William Desportes wrote: >> The system does not have ipconfig installed, > > What do you mean? Your main system (outside) initramfs stage might lack Misplaced parenthesis, that s

Bug#1034064: roundcube-core: Default index file /usr/share/roundcube/index.php is missing closing PHP tag (?>).

2023-04-07 Thread Guilhem Moulin
Control: tag -1 moreinfo unreproducible On Fri, 07 Apr 2023 at 14:52:01 -0500, Jonathan Hutchins wrote: > Loading default page (.../mail) displays PHP code inestead of login page > after upgrade from buster to bullseye. index.php ends with the exact same line on buster (1.3.17+dfsg.1-1~deb10u2)

Bug#1033802: dropbear-initramfs: sleep and cat not found

2023-04-13 Thread Guilhem Moulin
On Thu, 13 Apr 2023 at 23:16:15 +0200, William Desportes wrote: > Right after boot&unlock and (user login?) it prints the missing > ipconfig missing message. Just to confirm, you unlock (at initramfs stage) using keyboard + screen right, not remotely using dropbear SSH right? Because at that poin

Bug#1023716: cryptsetup: cryptroot-unlock in initramfs fails with lvm

2023-01-15 Thread Guilhem Moulin
On Sun, 15 Jan 2023 at 21:49:33 +0100, Hauke Mehrtens wrote: > I have the output I see on the terminal when a monitor is connected. Unfortunately that doesn't help much, please use the aforementioned README.debug.html instructions to get a log file. > The comments look like a udev rule should cre

Bug#1052059: roundcube: Please apply security fix from 1.6.3

2023-09-18 Thread Guilhem Moulin
I requested a CVE ID for this issue. -- Guilhem. signature.asc Description: PGP signature

Bug#1052156: cryptsetup: please (temporarily) disable cryptroot-sysvinit autopkgtest

2023-09-18 Thread Guilhem Moulin
Control: tag -1 moreinfo Hi, On Mon, 18 Sep 2023 at 10:46:30 +0100, Luca Boccassi wrote: > With sysvinit scripts no longer being mandatory, the udev one has been > removed from src:systemd. It is in the process of being adopted by > src:sysvinit, but being optional and all that might take some ti

Bug#1052238: php-net-smtp: fails to send MIME multipart email properly

2023-09-19 Thread Guilhem Moulin
Control: tag -1 moreinfo Hi, On Tue, 19 Sep 2023 at 12:42:34 +0200, J.L. Fernandez Jambrina wrote: > As php-mail didn't change in the upgrade and I verified the arguments > to the MAIL::send method are the same in both cases I suspect from the > underlying php-net-smtp package, but I can be wrong

Bug#1052290: cryptsetup-initramfs: askpass is not executed; cryptroot-unlock fails

2023-09-20 Thread Guilhem Moulin
Control: tag -1 moreinfo On Tue, 19 Sep 2023 at 22:39:40 +0100, Tj wrote: > On reaching initialramfs it fails to unlock either of the LUKS devices; > eventually dropping to the shell after reporting: > > Error: Timeout reached while waiting for askpass. > > After using `break=mount` and investigat

Bug#1052238: [pkg-php-pear] Bug#1052238: php-net-smtp: Please, consider this email address

2023-09-21 Thread Guilhem Moulin
On Thu, 21 Sep 2023 at 13:58:18 +0200, J.L. Fernandez Jambrina wrote: > Unfortunatelly I don't know how to use setDebug() to see what's is > being passed to send() Please see https://github.com/pear/Net_SMTP#debugging to debug Net_SMTP. > but I used two calls to var_dump() to see it: AFAICT this

Bug#1052059: roundcube: Please apply security fix from 1.6.3

2023-09-22 Thread Guilhem Moulin
Control: retitle -1 roundcube: CVE-2023-43770: XSS vulnerability in handling of linkrefs in plain text messages On Mon, 18 Sep 2023 at 13:59:47 +0200, Guilhem Moulin wrote: > I requested a CVE ID for this issue. CVE-2023-43770 for this. I'll suggest debdiffs targetting {bullseye,

Bug#1052059: roundcube: Please apply security fix from 1.6.3

2023-09-22 Thread Guilhem Moulin
On Fri, 22 Sep 2023 at 10:56:59 +0300, Guilhem Moulin wrote: > I'll suggest debdiffs targetting {bullseye,bookworm}-security after > the week-end. Oh, didn't see the Security Team tagged this as no-dsa. Will target {bullseye,bookworm} then. -- Guilhem. signature.asc

Bug#1031254: cryptsetup: unable to boot rootfs from luks via tpm (cryptsetup unknown option tpm2-device tpm2-pin)

2023-02-15 Thread Guilhem Moulin
On Wed, 15 Feb 2023 at 11:42:38 +0100, Wilhelm Greiner wrote: > With this Bug encrypting Disks with key in tpm (a documented Feature) is > completely broken, so it should be classified as bug. This is documented in systemd not src:cryptsetup. systemd is not involved at early boot stage, at when l

Bug#1028250: debian-installer: broken cryptsetup support

2023-02-18 Thread Guilhem Moulin
X-Debbugs-Cc: pkg-cryptsetup-de...@alioth-lists.debian.net Hi kibi! On Thu, 16 Feb 2023 at 20:14:20 +0100, Cyril Brulebois wrote: > Cyril Brulebois (2023-01-09): >> Cyril Brulebois (2023-01-08): >>> I'm seeing at least two problems with cryptsetup while testing daily >>> builds: >>> - with 6.1.

Bug#1014110: libargon2 0~20190702-0.1 no longer links against libpthreads which breaks cryptsetup-initramfs

2023-03-01 Thread Guilhem Moulin
On Wed, 01 Mar 2023 at 12:04:04 +, Debian FTP Masters wrote: > Changes: > argon2 (0~20190702-0.1) unstable; urgency=medium > . > […] >* Only build udeb without threads (Closes: #1014110) AFAICT #1014110 says nothing about udeb, but that change actually builds libargon2 (.deb) without pth

Bug#1014110: libargon2 0~20190702-0.1 no longer links against libpthread which breaks cryptsetup-initramfs

2023-03-01 Thread Guilhem Moulin
Control: clone -1 -2 Control: reassign -1 cryptsetup-initramfs 2:2.6.1-1 On Thu, 02 Mar 2023 at 02:57:20 +0100, Guilhem Moulin wrote: > On Wed, 01 Mar 2023 at 12:04:04 +, Debian FTP Masters wrote: >> Changes: >> argon2 (0~20190702-0.1) unstable; urgency=medium >> . &g

Bug#1028250: debian-installer: broken cryptsetup support

2023-04-20 Thread Guilhem Moulin
Hi kibi, On Sat, 01 Apr 2023 at 01:34:54 +0200, Guilhem Moulin wrote: > Ah right, reopened the upstream issue but forgot to follow-up here :-( > https://gitlab.com/cryptsetup/cryptsetup/-/issues/802#note_1328592911 AFAICT the issue is now fully fixed upstream: on systems without swap the

Bug#1028250: debian-installer: broken cryptsetup support

2023-04-21 Thread Guilhem Moulin
Hi, On Thu, 20 Apr 2023 at 20:02:27 +0200, Cyril Brulebois wrote: >> * Backport upstream MR !498, let it mature in sid for a few >> weeks then upload 2:2.6.1-4~deb12u1 via t-p-u. There are only 2 >> upstream commits to cherry-pick and neither is large nor intrusive; >> moreover like the commits p

Bug#1028250: debian-installer: broken cryptsetup support

2023-04-21 Thread Guilhem Moulin
On Fri, 21 Apr 2023 at 13:02:24 +0200, Cyril Brulebois wrote: > Summing up some out-of-band brainstorming about what “a bit crippled” > means, it might just be libargon2-1-udeb's being built without pthread > support: > > https://salsa.debian.org/debian/argon2/-/commit/31225912349933993e49f5007e976

Bug#1034696: libargon2-1-udeb: should build with threading support

2023-04-21 Thread Guilhem Moulin
This is beneficial for cryptsetup-udeb, see #1028250. Removing threading +support in libargon2-1-udeb was done for historical reasons no longer +relevant since Debian Bookworm. + + -- Guilhem Moulin Fri, 21 Apr 2023 19:48:56 +0200 + argon2 (0~20190702+dfsg-2) unstable; urgency=medium

Bug#1028250: debian-installer: broken cryptsetup support

2023-04-21 Thread Guilhem Moulin
On Fri, 21 Apr 2023 at 12:25:29 +0200, Guilhem Moulin wrote: > Bookworm (debian-bookworm-DI-rc1-amd64-netinst.iso + cryptsetup > 2:2.6.1-4~deb12u1, > graphical install), 1024M RAM: > > root@debian:~# cryptsetup luksDump /dev/vda5 | grep -A3 PBKDF > PB

Bug#1034809: bullseye-pu: package argon2/0~20171227-0.3+deb12u1

2023-04-24 Thread Guilhem Moulin
[ Bastian Germann ] + * Add Breaks on cryptsetup-initramfs (see #1032235) + + [ Guilhem Moulin ] + * d/gbp.conf: Set 'debian-branch = debian/bookworm'. + * d/rules: Restore threading support to libargon2-1-udeb (closes: #1034696). +This is beneficial for cryptsetup-udeb, see #

Bug#1034810: bookworm-pu: package cryptsetup/2:2.6.1-4~deb12u1

2023-04-24 Thread Guilhem Moulin
00 +0200 +++ cryptsetup-2.6.1/debian/changelog 2023-04-21 00:54:29.0 +0200 @@ -1,3 +1,17 @@ +cryptsetup (2:2.6.1-4~deb12u1) bookworm; urgency=medium + + * Rebuild for Bookworm. + + -- Guilhem Moulin Fri, 21 Apr 2023 00:54:29 +0200 + +cryptsetup (2:2.6.1-4) unstable; urgenc

Bug#1034834: lacme: client fails to handle "ready" → "processing" → "valid" status change

2023-04-25 Thread Guilhem Moulin
Package: lacme Version: 0.8.1-1 Severity: important Control: found -1 0.8.0-2 The lacme client fails to handle "ready" → "processing" → "valid" status change during newOrder, instead of just "ready" → "valid". The latter may be what we observe when the server is fast enough, but according to RFC

Bug#1034879: unblock: lacme/0.8.2-1

2023-04-26 Thread Guilhem Moulin
d of just "ready" → "valid". The latter may be what +we observe when the server is fast enough, but according to RFC 8555 +sec. 7.1.6 the state actually transitions via "processing" state and +we need to account for that. + - Test suite: Point stretch'

Bug#1035046: bullseye-pu: package lacme/0.8.0-2+deb11u1

2023-04-28 Thread Guilhem Moulin
→ "valid". The latter may be what we +observe when the server is fast enough, but according to RFC 8555 sec. +7.1.6 the state actually transitions via "processing" and we need to +account for that (closes: #1034834). + * d/gbp.conf: Set 'debian-branch = debian/bu

Bug#1034836: initramfs-tools: After bullseye -> bookworm upgrade boot stuck in the initramfs shell

2023-05-03 Thread Guilhem Moulin
Control: tag -1 unreproducible moreinfo What does `lsinitramfs /initrd.img | grep -e{crypt,lvm}` return (after removing your hook and rebuilding the initramfs image)? And also install -m0700 -d /tmp/initramfs unmkinitramfs /initrd.img /tmp/initramfs cat /tmp/initramfs/cry

Bug#1050680: yubikey-luks: Depends on removed package cryptsetup-run

2023-08-27 Thread Guilhem Moulin
Source: yubikey-luks Version: 0.5.1+29.g5df2b95-6.1 Severity: serious Hi, cryptsetup-run has been a transitional package since the buster release, and has now been removed following #1038285. Looks like I failed to properly check reverse depends; yubikey-luks should replace ‘Depends: cryptsetup-

Bug#1050680: yubikey-luks: Depends on removed package cryptsetup-run

2023-08-27 Thread Guilhem Moulin
On Mon, 28 Aug 2023 at 01:56:04 +0200, Guilhem Moulin wrote: > cryptsetup-run has been a transitional package since the buster release, > and has now been removed following #1038285. Looks like I failed to > properly check reverse depends; yubikey-luks should replace ‘Depends: > cr

Bug#1055421: roundcube: cross-site scripting (XSS) vulnerability in setting Content-Type/Content-Disposition for attachment preview/download

2023-11-05 Thread Guilhem Moulin
Source: roundcube Version: 1.6.4+dfsg-1 Severity: important Control: found -1 1.6.4+dfsg-1~deb12u1 Tags: security upstream Roundcube webmail upstream has recently released 1.6.5 which fixes the following vulnerability: * Fix cross-site scripting (XSS) vulnerability in setting Content-Type/Con

Bug#1055489: roundcube-plugins: File 'opengpg.js.min' for the 'enigma' plugin is missing

2023-11-07 Thread Guilhem Moulin
Control: tag -1 wontfix Hi, On Tue, 07 Nov 2023 at 10:38:49 +0100, Marco Emilio Poleggi wrote: > It looks like the file 'opengpg.js.min' for the 'enigma' plugin is > missing. This is intentional, see roundcube-plugins.NEWS: https://salsa.debian.org/roundcube-team/roundcube/-/blob/debian/latest/d

Bug#1054079: roundcube: cross-site scripting (XSS) vulnerability in handling of SVG in HTML messages

2023-10-16 Thread Guilhem Moulin
Source: roundcube Version: 1.6.3+dfsg-2 Severity: important Tags: security upstream Control: found -1 1.3.17+dfsg.1-1~deb10u3 Control: found -1 1.4.14+dfsg.1-1~deb11u1 Control: found -1 1.6.3+dfsg-1~deb12u1 Control: forwarded -1 https://github.com/roundcube/roundcubemail/issues/9168 In a recent po

Bug#1041976: pandoc: CVE-2023-35936

2023-07-25 Thread Guilhem Moulin
am fix for CVE-2023-35936 from 3.1.6 release. + + -- Guilhem Moulin Fri, 21 Jul 2023 20:22:42 +0200 + pandoc (2.17.1.1-1.1) unstable; urgency=low * Non-maintainer upload. diff -Nru pandoc-2.17.1.1/debian/patches/CVE-2023-35936.patch pandoc-2.17.1.1/debian/patches/CVE-2023-35936.patch --- pan

Bug#1042057: bullseye-pu: package pandoc/2.9.2.1-1+deb11u1

2023-07-25 Thread Guilhem Moulin
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: pan...@packages.debian.org, Guilhem Moulin Control: affects -1 + src:pandoc [ Reason ] pandoc 2.9.2.1-1 is vulnerable to CVE-2023-35936: Arbitrary file write

Bug#1042058: bookworm-pu: package pandoc/2.17.1.1-2~deb12u1

2023-07-25 Thread Guilhem Moulin
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: pan...@packages.debian.org, Guilhem Moulin Control: affects -1 + src:pandoc [ Reason ] pandoc 2.17.1.1-1.1 is vulnerable to CVE-2023-35936: Arbitrary file write

Bug#1041976: pandoc: CVE-2023-35936

2023-07-25 Thread Guilhem Moulin
On Tue, 25 Jul 2023 at 14:39:29 +0200, Jonas Smedegaard wrote: > I have no objections at all - on the contrary: Thanks! > > I will have a look at applying the patch to trixie, then - since there > is unfortunately little hope that the whole Haskell stack will get > upgrading any time soon, so wi ca

Bug#1034836: initramfs-tools: After bullseye -> bookworm upgrade boot stuck in the initramfs shell

2023-05-09 Thread Guilhem Moulin
Control: tag -1 + unreproducible moreinfo On Tue, 09 May 2023 at 17:10:03 +0200, Pásztor János wrote: > The machine and the disks are having two snapshots named 'good' and 'bad' so > it is easy to jump between the states. > I am willing to share with you the VM(disks + virsh dump) via a filesharin

Bug#1034836: initramfs-tools: After bullseye -> bookworm upgrade boot stuck in the initramfs shell

2023-05-09 Thread Guilhem Moulin
Control: tag -1 - moreinfo On Tue, 09 May 2023 at 18:39:33 +0200, Pásztor János wrote: > I have attached the machine definition and already sent the vm images for > you (via filesender.hu). Many thanks! Will have something to put teeth into once the images have been downloaded :-) -- Guilhem.

Bug#1034836: initramfs-tools: After bullseye -> bookworm upgrade boot stuck in the initramfs shell

2023-05-09 Thread Guilhem Moulin
Control: tag -1 - unreproducible Control: reassign -1 lvm2 2.03.15-1 Control: forcemerge 1018730 -1 Control: affects -1 cryptsetup-initramfs Thanks for the the reproducer! Much appreciated. So the problem is that your VG spans over multiple PVs, but the LVs that are required at early boot stage

Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure

2023-05-09 Thread Guilhem Moulin
Guilhem. From: Guilhem Moulin Date: Wed, 10 May 2023 00:42:28 +0200 Subject: udev rules: Try to call activate incomplete VGs at initramfs stage. The upstream udev rules don't autoactivate LVs residing on incomplete VGs, see https://bugzilla.redhat.com/show_bug.cgi?id=1337220#c10 . This change adds

Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure

2023-05-11 Thread Guilhem Moulin
On Thu, 11 May 2023 at 18:12:52 +0200, Bastian Blank wrote: > Nope, not really. Half VG was never a real thing. It might work in > some cases. And these use-cases are unbootable since 2.03.15… > Then, degraded is the default activation mode, so overriding that would > not be appropriate. But f

Bug#962629: rainloop: Rainloop stores passwords in cleartext in logfile

2023-05-27 Thread Guilhem Moulin
Control: tag -1 unreproducible On Wed, 10 Jun 2020 at 23:19:41 +0200, Marco Herrn wrote: > When writing into a logfile, rainloop writes the passwords of all > login attempts (successful or not) into the logfile in cleartext. FWIW I'm not able to reproduce this with the version from Debian buster

Bug#1037086: dropbear-initramfs: /etc/dropbear/initramfs/dropbear_dss_host_key file not generated

2023-06-04 Thread Guilhem Moulin
Control: tag -1 moreinfo unreproducible Hi, On Sun, 04 Jun 2023 at 10:41:56 +0200, Georg Gast wrote: > But dropbear did not start as it was complaining about the missing dss host > key. > […] > If i delete /etc/dropbear/initramfs/dropbear_dss_host_key and generate a new > one > dropbearkeygen -t

Bug#1037537: Upgrade To Bookworm Fails with Roundcube Update

2023-06-13 Thread Guilhem Moulin
Control: tag -1 unreproducible moreinfo On Tue, 13 Jun 2023 at 16:16:51 -0500, Bryan K. Walton via Pkg-roundcube-maintainers wrote: > Today, I tried to upgrade my webserver to Debian 12.0 (bookworm). > Everything succeeded but Roundcube. What was the previous Roundcube (and Debian itself) versio

Bug#1037537: Upgrade To Bookworm Fails with Roundcube Update

2023-06-14 Thread Guilhem Moulin
On Tue, 13 Jun 2023 at 20:45:19 -0500, Bryan K. Walton wrote: > Previous Roundcube version: 1.4.13+dfsg.1-1~deb11u1 > Previous Debian version: 11.7 Which DB backend are you using? I'm unable to reproduce this in a Bullseye (11.7) VM with roundcube-mysql (the default): ~# apt install -y defaul

Bug#1034847: lua5.3: CVE-2021-43519

2023-06-22 Thread Guilhem Moulin
Hi Moritz, On Tue, 25 Apr 2023 at 20:58:00 +0200, Moritz Mühlenhoff wrote: > CVE-2021-43519[0]: > | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 > | allows attackers to perform a Denial of Service via a crafted script > | file. While trigaging this for LTS I was unable to

Bug#1034847: lua5.3: CVE-2021-43519

2023-06-23 Thread Guilhem Moulin
On Thu, 22 Jun 2023 at 18:08:39 +0200, Guilhem Moulin wrote: > bullseye > > > $ lua5.1 ./cstack.lua > testing stack overflow detection > nesting coroutines running after recoverable errors > final count:198 > > $ lua5.2 ./cstack.lua > te

Bug#1034847: lua5.3: CVE-2021-43519

2023-06-23 Thread Guilhem Moulin
Hi carnil, On Fri, 23 Jun 2023 at 21:49:21 +0200, Salvatore Bonaccorso wrote: > thanks for the analysis. I want to point out that it's really > important to not rely on the POC for making the not-affected > assessment (and when not confirmed, rather err on the safe side and > keep something marked

Bug#1065529: interimap: Testsuite fails with openssl 3.2

2024-03-06 Thread Guilhem Moulin
Hi Sebastian, Great to hear OpenSSL 3.2 will soon be entering sid! :-) On Wed, 06 Mar 2024 at 07:59:53 +0100, Sebastian Andrzej Siewior wrote: > I'm currently puzzled where to look at. Could you please have a look? It seems openssl-req(1ssl) now generates X.509 version 3 certificates by default.

Bug#1079392: dropbear-initramfs: This is the same bug ar achived 1033802

2024-08-23 Thread Guilhem Moulin
Control: tag -1 moreinfo Hi, On Fri, 23 Aug 2024 at 13:22:01 +1200, jfp wrote: > I get the decrypt prompt on the console, I enter the passphrase then the boot > continues. You enter the passphrase a local console not from an SSH client right? Note that if you don't need remote unlocking you can

Bug#1073052: fixed in cryptsetup 2:2.7.4-1

2024-08-24 Thread Guilhem Moulin
Hi Paul, On Sat, 24 Aug 2024 at 17:50:22 +0200, Paul Gevers wrote: > On Sun, 04 Aug 2024 22:19:30 + Debian FTP Masters > wrote: >> * DEP-8: Mark cryptroot-* as flaky. To be re-evaluated if/when the >> tests only run on environment where KVM is available. (Closes: #1073052) > > On amd64 we

Bug#1073052: fixed in cryptsetup 2:2.7.4-1

2024-08-24 Thread Guilhem Moulin
On Sat, 24 Aug 2024 at 19:16:01 +0200, Paul Gevers wrote: > On 24-08-2024 19:10, Guilhem Moulin wrote: >> Great news that would be much appreciated, thanks! > > Done. > > I triggered a migration-reference/0 run in testing. Awesome, thanks! Right now these tests have “Arc

Bug#1073052: fixed in cryptsetup 2:2.7.4-1

2024-08-24 Thread Guilhem Moulin
On Sat, 24 Aug 2024 at 21:25:03 +0200, Paul Gevers wrote: > On 24-08-2024 20:53, Guilhem Moulin wrote: >> Awesome, thanks! Right now these tests have “Architecture: amd64 i386”, >> is the runner able to run i386 too or should I remove it from the list? > > Tests with isolat

Bug#1073052: fixed in cryptsetup 2:2.7.4-1

2024-08-25 Thread Guilhem Moulin
Hi Paul, On Sun, 25 Aug 2024 at 09:56:59 +0200, Paul Gevers wrote: > Well, if those are currently only run on amd64 and i386, it might be worth > indeed to stop marking them flaky and only run on amd64 (or mark them > skippable and only "exit 77" on i386 on failure, such that failure on amd64 > is

Bug#1080204: cryptsetup-initramfs: try to use passphrase for multiple device

2024-08-31 Thread Guilhem Moulin
Hi, On Sat, 31 Aug 2024 at 15:14:42 +, Johannes Berg wrote: > Since I have four devices with the same passphrase (they end > up building a btrfs array, so they're all needed), it'd be > nice to (try) using the passphrase for the first, so I don't > have to enter it four times. See /usr/share/

Bug#1078456: roundcube-core: Can't print, rescale or rotate image attachments

2024-08-10 Thread Guilhem Moulin
Package: roundcube-core Version: 1.6.8+dfsg-1 Severity: normal Tags: upstream pending Control: found -1 1.6.5+dfsg-1+deb12u3 Control: forwarded -1 https://github.com/roundcube/roundcubemail/issues/9571 The upstream fix for CVE-2024-42008 (from 1.6.8 and backported to 1.6.5+dfsg-1+deb12u3) sets a

Bug#1078557: pullimap: create directories that you require

2024-08-12 Thread Guilhem Moulin
> $ pullimap --debug SECTION > No such directory: /home/user/.local/share at > /usr/share/perl5/Net/IMAP/InterIMAP.pm line 102. > > If you need a certain directory and it does not exist... create it? Per the XDG Base Directory Specification $XDG_DATA_HOME/pullimap (or ~/.local/share/pullimap if X

Bug#1078760: autopkgtest-build-qemu produces unbootable images for old suites

2024-08-15 Thread Guilhem Moulin
Package: autopkgtest Version: 5.39 Severity: normal Tags: patch Hi, It appears that running autopkgtest-build-qemu on a sid system produces unbootable images for bullseye LTS and older suites. AFAICT that's because autopkgtest-build-qemu creates the guest's root filestem using the host's mkfs.ex

Bug#1078775: Bug#1078777: roundcube-core: Empty groups in adressbook silently not exported

2024-08-15 Thread Guilhem Moulin
Hi, On Thu, 15 Aug 2024 at 22:03:26 +, Einhard Leichtfuß wrote: > when exporting an addressbook via the Roundcube web UI ("Export all"), > any group without members is silently ignored. Looks like this issue and the others 3 you just reported are upstream issues, please report them at the ups

Bug#1079068: cryptsetup: Waiting for encrypted source device

2024-08-19 Thread Guilhem Moulin
On Mon, 19 Aug 2024 at 15:01:38 -0400, Brian Smith wrote: > I decided to do a fresh install to diagnose the issue. I grabbed the latest > mini.iso and did a fresh install with encryped LVM. I was able to boot with no > issues. I then updated my apt sources to point to sid instead of trixie and > r

Bug#1079068: cryptsetup: Waiting for encrypted source device

2024-08-20 Thread Guilhem Moulin
On Mon, 19 Aug 2024 at 22:40:32 -0400, briag...@disroot.org wrote: > I tried again on a new machine. I was able to reproduce the issue by > following the steps I outlined before. I then did a full reinstall - but > this time after switching to the sid repos and running full-upgrade I > installed sy

Bug#1076420: Processed: ITPs block move away from cdbs

2024-09-10 Thread Guilhem Moulin
Control: unblock 1076420 by 1078557 On Tue, 10 Sep 2024 at 11:33:07 +, Debian Bug Tracking System wrote: > Processing commands for cont...@bugs.debian.org: >> block 1076420 by 1078557 > Bug #1076420 [src:uwsgi] uwsgi: move away from cdbs > […] > Added blocking bug(s) of 1076420: 1078557 Wrong

Bug#1076420: Processed: ITPs block move away from cdbs

2024-09-10 Thread Guilhem Moulin
On Tue, 10 Sep 2024 at 13:40:06 +0200, Alexandre Rossi wrote: >>> Bug #1076420 [src:uwsgi] uwsgi: move away from cdbs >>> […] >>> Added blocking bug(s) of 1076420: 1078557 >> >> Wrong bug number? #1078557 is for a leaf package and has nothing to do >> with uwsgi or CDBS. > > Sorry for that, fixing

Bug#1081552: cryptroot not run as the last in local-top

2024-09-12 Thread Guilhem Moulin
Control: tag -1 unreproducible moreinfo On Thu, 12 Sep 2024 at 20:12:17 +0200, Paweł Bogusławski wrote: > if one creates /etc/initramfs-tools/scripts/local-top/crypti, crypti > won't be called before cryptroot on boot. Works here, on bookworm as well as sid systems. Which files do you have in sc

Bug#921446: netcat-openbsd: ipv4/6 behaviour differs from man page

2019-02-05 Thread Guilhem Moulin
Control: severity -1 minor Control: retitle -1 Clarify -4 and -6 flags in the manpage Hi, On Tue, 05 Feb 2019 at 16:06:49 +, Nick wrote: > The man page for nc(1) says the -4 or -6 switch forces ipv4 or ipv6 > only, respectively. This suggests that using neither switch enables > both. netcat

Bug#921331: [signing-party] gpglist: a bug politely introduces itself and demands to be reported

2019-02-05 Thread Guilhem Moulin
Control: retitle -1 gpglist chokes on direct-key signatures Control: tag -1 pending Hi Giovanni, On Mon, 04 Feb 2019 at 11:16:32 +0100, Giovanni Mascellani wrote: > I am sorry I am not able to provide further information, because I > have no idea what gpglist is not liking about my key. It doesn

Bug#921565: netmask: buffer overflow vulnerability

2019-02-06 Thread Guilhem Moulin
Hi Salvatore, On Wed, 06 Feb 2019 at 20:59:50 +0100, Salvatore Bonaccorso wrote: > Given there is (not yet) a CVE for this issue add a unique identifier > via a Debian BTS bug for the issue for tracking. Oops, I should have done that before uploading 2.4.4-1… Sorry for the extra work, and thanks

Bug#902972: libargon2-0 install a symlink pointin to libargon2.so.1

2018-07-26 Thread Guilhem Moulin
Hi, Could you please upload src:argon2 without the compatibility package? https://wiki.debian.org/Teams/ReleaseTeam/Transitions This RC bug prevents packages depending on libargon2-*, such as cryptsetup, from migrating to testing. Cheers, -- Guilhem. signature.asc Description: PGP signature

Bug#904162: yubikey-luks: keyscript not run during boot

2018-07-29 Thread Guilhem Moulin
Hi, On Fri, 20 Jul 2018 at 23:16:09 +0100, Matt Patey wrote: > I got it working again by changing /usr/share/initramfs-tools/scripts/local- > top/yubikey-luks as follows: > > sed -i 's|$|,keyscript=/sbin/ykluks-keyscript|' /cryptroot/crypttab Please don't do that. We (cryptsetup package mainta

Bug#904899: mandos: initramfs boot script assumes internal cryptsetup implementation details and is now broken

2018-07-29 Thread Guilhem Moulin
Source: mandos Version: 1.7.19-1 Severity: serious Hi, mandos' initramfs boot script reads and parses /conf/conf.d/cryptroot. Since cryptsetup 2:2.0.3-2 this file no longer exists; we cryptsetup package maintainers replaced and it changed its format (without notice as it was undocumented and thus

Bug#904926: cryptroot-unlock: timeout waiting for askpass

2018-07-29 Thread Guilhem Moulin
Do you have a usrmerge setup? What does `readlink -f /lib/cryptsetup/askpass` return? I noticed a problem with usrmerge setups earlier today. The following commit fixes the issue AFAICT: https://salsa.debian.org/cryptsetup-team/cryptsetup/commit/f1c56c19fea6dc988c1f29fb8a510c05286c2900 -- Gui

Bug#888916: cryptsetup: Patch that enables using OpenPGP card to unlock encrypted root

2018-07-29 Thread Guilhem Moulin
Hi Rian, (Sorry for taking that long to come back to you.) As I wrote back in January(!), I think OpenPGP smartcard support would be a nice addition to src:cryptsetup. Another recent bug [#903163] was requesting the same thing and made me come back to this. We've not decided which of these two

Bug#904926: cryptroot-unlock: timeout waiting for askpass

2018-07-29 Thread Guilhem Moulin
On Sun, 29 Jul 2018 at 20:28:02 +0200, C. Dominik Bódi wrote: > Am Sonntag, 29. Juli 2018, 18:46:20 CEST schrieb Guilhem Moulin: >> readlink -f /lib/cryptsetup/askpass > readlink returns: > /lib/cryptsetup/askpass Hmm. In the initramfs too? No need to reboot to the broken initrd

Bug#904926: [pkg-cryptsetup-devel] Bug#904926: cryptroot-unlock: timeout waiting for askpass

2018-07-29 Thread Guilhem Moulin
On Mon, 30 Jul 2018 at 02:47:39 +0800, Guilhem Moulin wrote: > On Sun, 29 Jul 2018 at 20:28:02 +0200, C. Dominik Bódi wrote: >> Am Sonntag, 29. Juli 2018, 18:46:20 CEST schrieb Guilhem Moulin: >>> readlink -f /lib/cryptsetup/askpass >> readlink returns: >> /lib/crypts

Bug#903163: ITP: gpg-encrypted-root -- Encrypt root volumes with an OpenPGP smartcard

2018-07-29 Thread Guilhem Moulin
Hi, On Sat, 07 Jul 2018 at 17:08:59 +0200, Guilhem Moulin wrote: > On Sat, 07 Jul 2018 at 12:05:13 +0100, Chris Lamb wrote: >> Programming Lang: Shell >> Description : Encrypt root volumes with an OpenPGP smartcard > > See also #888916 (we didn't find time to review

Bug#905097: signing-party: gpglist crashes for (some?) signature revocations

2018-07-31 Thread Guilhem Moulin
Control: tag -1 pending On Tue, 31 Jul 2018 at 16:42:36 +0800, Tomasz Buchert wrote: > I already committed a fix in > https://salsa.debian.org/debian/signing-party/commit/c62477e3086c33af14493337227ec219f151d5b4. I pushed a fix to upstream/latest last week https://salsa.debian.org/debian/signing

Bug#905188: [pkg-cryptsetup-devel] Bug#905188: cryptsetup-initramfs: fails to install, remove, distupgrade, and install again

2018-08-01 Thread Guilhem Moulin
Control: tag -1 moreinfo Hi Andreas, On Wed, 01 Aug 2018 at 13:20:37 +0200, Andreas Beckmann wrote: > Configuration file '/etc/cryptsetup-initramfs/conf-hook' > ==> Deleted (by you or by a script) since installation. > ==> Package distributor has shipped an updated version. >What would you

<    1   2   3   4   5   6   7   8   9   10   >