Source: ima-evm-utils
Version: 1.4-1.2
Severity: serious
Tags: patch pending
Justification: library ABI skew on upgrade
User: debian-...@lists.debian.org
Usertags: time-t

Dear maintainer,

As part of the 64-bit time_t transition required to support 32-bit
architectures in 2038 and beyond
(https://wiki.debian.org/ReleaseGoals/64bit-time), we have identified
ima-evm-utils as a source package shipping runtime libraries whose ABI
either is affected by the change in size of time_t, or could not be
analyzed via abi-compliance-checker (and therefore to be on the safe
side we assume is affected).

To ensure that inconsistent combinations of libraries with their
reverse-dependencies are never installed together, it is necessary to
have a library transition, which is most easily done by renaming the
runtime library package.

Since turning on 64-bit time_t is being handled centrally through a change
to the default dpkg-buildflags (https://bugs.debian.org/1037136), it is
important that libraries affected by this ABI change all be uploaded close
together in time.  Therefore I have prepared a 0-day NMU for ima-evm-utils
which will initially be uploaded to experimental if possible, then to
unstable after packages have cleared binary NEW.

Please find the patch for this NMU attached.

If you have any concerns about this patch, please reach out ASAP.  Although
this package will be uploaded to experimental immediately, there will be a
period of several days before we begin uploads to unstable; so if information
becomes available that your package should not be included in the transition,
there is time for us to amend the planned uploads.



-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-15-generic (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect
diff -Nru ima-evm-utils-1.4/debian/changelog ima-evm-utils-1.4/debian/changelog
--- ima-evm-utils-1.4/debian/changelog  2022-01-24 17:33:09.000000000 +0000
+++ ima-evm-utils-1.4/debian/changelog  2024-02-01 15:02:04.000000000 +0000
@@ -1,3 +1,10 @@
+ima-evm-utils (1.4-1.3) experimental; urgency=medium
+
+  * Non-maintainer upload.
+  * Rename libraries for 64-bit time_t transition.
+
+ -- Graham Inggs <gin...@debian.org>  Thu, 01 Feb 2024 15:02:04 +0000
+
 ima-evm-utils (1.4-1.2) unstable; urgency=high
 
   * Non-maintainer upload.
diff -Nru ima-evm-utils-1.4/debian/control ima-evm-utils-1.4/debian/control
--- ima-evm-utils-1.4/debian/control    2022-01-24 17:32:41.000000000 +0000
+++ ima-evm-utils-1.4/debian/control    2024-02-01 15:02:04.000000000 +0000
@@ -33,7 +33,10 @@
  With EVM, the security sensitive extended attributes are verified against
  offline tampering.
 
-Package: libimaevm2
+Package: libimaevm2t64
+Provides: ${t64:Provides}
+Replaces: libimaevm2
+Breaks: libimaevm2 (<< ${source:Version})
 Section: libs
 Architecture: any
 Multi-Arch: same
@@ -51,7 +54,7 @@
 Section: libdevel
 Architecture: any
 Multi-Arch: same
-Depends: libimaevm2 (= ${binary:Version}), ${misc:Depends}
+Depends: libimaevm2t64 (= ${binary:Version}), ${misc:Depends}
 Description: Linux IMA Extended Verification Module signing tools - 
development files
  Linux kernel integrity subsystem is comprised of a number of different
  components including the Integrity Measurement Architecture (IMA), Extended
diff -Nru ima-evm-utils-1.4/debian/libimaevm2.install 
ima-evm-utils-1.4/debian/libimaevm2.install
--- ima-evm-utils-1.4/debian/libimaevm2.install 2021-09-24 09:39:11.000000000 
+0000
+++ ima-evm-utils-1.4/debian/libimaevm2.install 1970-01-01 00:00:00.000000000 
+0000
@@ -1 +0,0 @@
-usr/lib/*/lib*.so.*
diff -Nru ima-evm-utils-1.4/debian/libimaevm2.symbols 
ima-evm-utils-1.4/debian/libimaevm2.symbols
--- ima-evm-utils-1.4/debian/libimaevm2.symbols 2022-01-24 09:49:06.000000000 
+0000
+++ ima-evm-utils-1.4/debian/libimaevm2.symbols 1970-01-01 00:00:00.000000000 
+0000
@@ -1,19 +0,0 @@
-libimaevm.so.3 libimaevm2 #MINVER#
-* Build-Depends-Package: libimaevm-dev
- calc_keyid_v1@Base 1.3.1
- calc_keyid_v2@Base 1.3.1
- hash_algo_name@Base 1.3.1
- ima_calc_hash@Base 1.3.1
- ima_verify_signature@Base 1.3.1
- imaevm_do_hexdump@Base 1.3.1
- imaevm_get_hash_algo@Base 1.3.1
- imaevm_hash_algo_by_id@Base 1.3.1
- imaevm_hash_algo_from_sig@Base 1.3.1
- imaevm_hexdump@Base 1.3.1
- imaevm_params@Base 1.3.1
- init_public_keys@Base 1.3.1
- key2bin@Base 1.3.1
- read_pub_key@Base 1.3.1
- read_pub_pkey@Base 1.3.1
- sign_hash@Base 1.3.1
- verify_hash@Base 1.3.1
diff -Nru ima-evm-utils-1.4/debian/libimaevm2t64.install 
ima-evm-utils-1.4/debian/libimaevm2t64.install
--- ima-evm-utils-1.4/debian/libimaevm2t64.install      1970-01-01 
00:00:00.000000000 +0000
+++ ima-evm-utils-1.4/debian/libimaevm2t64.install      2021-09-24 
09:39:11.000000000 +0000
@@ -0,0 +1 @@
+usr/lib/*/lib*.so.*
diff -Nru ima-evm-utils-1.4/debian/libimaevm2t64.lintian-overrides 
ima-evm-utils-1.4/debian/libimaevm2t64.lintian-overrides
--- ima-evm-utils-1.4/debian/libimaevm2t64.lintian-overrides    1970-01-01 
00:00:00.000000000 +0000
+++ ima-evm-utils-1.4/debian/libimaevm2t64.lintian-overrides    2024-02-01 
15:02:04.000000000 +0000
@@ -0,0 +1 @@
+libimaevm2t64: package-name-doesnt-match-sonames libimaevm2
diff -Nru ima-evm-utils-1.4/debian/libimaevm2t64.symbols 
ima-evm-utils-1.4/debian/libimaevm2t64.symbols
--- ima-evm-utils-1.4/debian/libimaevm2t64.symbols      1970-01-01 
00:00:00.000000000 +0000
+++ ima-evm-utils-1.4/debian/libimaevm2t64.symbols      2024-02-01 
15:02:04.000000000 +0000
@@ -0,0 +1,19 @@
+libimaevm.so.3 libimaevm2t64 #MINVER#
+* Build-Depends-Package: libimaevm-dev
+ calc_keyid_v1@Base 1.3.1
+ calc_keyid_v2@Base 1.3.1
+ hash_algo_name@Base 1.3.1
+ ima_calc_hash@Base 1.3.1
+ ima_verify_signature@Base 1.3.1
+ imaevm_do_hexdump@Base 1.3.1
+ imaevm_get_hash_algo@Base 1.3.1
+ imaevm_hash_algo_by_id@Base 1.3.1
+ imaevm_hash_algo_from_sig@Base 1.3.1
+ imaevm_hexdump@Base 1.3.1
+ imaevm_params@Base 1.3.1
+ init_public_keys@Base 1.3.1
+ key2bin@Base 1.3.1
+ read_pub_key@Base 1.3.1
+ read_pub_pkey@Base 1.3.1
+ sign_hash@Base 1.3.1
+ verify_hash@Base 1.3.1

Reply via email to