Bug#1101011: Comparison run & diff, one of the Debian patches is the culprit

2025-03-22 Thread Daniel Lange
Hi Andreas, Am 22.03.25 um 07:33 schrieb Andreas Metzler: On 2025-03-22 Daniel Lange wrote: [...] @dkg: any idea which of the last patches breaks this code path? [...] freepg/0027-gpg-Fix-newlines-in-Cleartext-Signature-Framework-CS.patch Confirmed. Dropping just this patch makes gpgv

Bug#1101011: Comparison run & diff, one of the Debian patches is the culprit

2025-03-21 Thread Daniel Lange
Good version: $ gpgv --version gpgv (GnuPG) 2.2.40 libgcrypt 1.10.1 Copyright (C) 2022 g10 Code GmbH License GNU GPL-3.0-or-later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. $ LC_ALL=

Bug#1093661: Please fix the debian/mumble.install file

2025-02-11 Thread Daniel Lange
Your mumble.install has usr/lib/* which also catches usr/lib/systemd/system/mumble-server.service usr/lib/sysusers.d/mumble-server.conf usr/lib/tmpfiles.d/mumble-server.conf as you can see on https://packages.debian.org/sid/amd64/mumble/filelist (at the time of writing this bug report) Pleas

Bug#765854: eCryptfs in Buster / Bullseye (bug #765854, #936465)

2020-04-27 Thread Daniel Lange
Hi folks, we have the issue that eCryptfs has not made it into Buster and has fallen out of testing due to bug #765854. To me it seems the most easy solution is from https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765854#107 as non-interactive logins don't have any passphrase to unlock an e

Bug#908678: Split file repo v2

2019-06-17 Thread Daniel Lange
as requested in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908678#139 we have created a data/CVE/.list repo ("v2") during MiniDebConf HH It is mirrored at Salsa: https://salsa.debian.org/dlange/debian_security_security-tracker_split_files_v2

Bug#908678: Update on the security-tracker git discussion

2019-06-05 Thread Daniel Lange
Am 06.06.19 um 07:31 schrieb Salvatore Bonaccorso: Could you again point me to your splitted up variant mirror? https://git.faster-it.de/debian_security_security-tracker_split_files/

Bug#908678: Update on the security-tracker git discussion

2019-01-24 Thread Daniel Lange
Zobel brought up the security-tracker git discussion in the #debian-security irc channel again and I'd like to record a few of the items touched there for others that were not present: DLange has a running mirror of the git repo with split files since three months. This is based on anarcat's s

Bug#765854: Plans for Netatalk for Buster?

2019-01-22 Thread Daniel Lange
> Hi Jonas, > > I was wondering what your plans are for Netatalk in Buster? > 1) stay on 2.2.x > 2) adopt the newer packages for 3.1.x (still maintained at >https://github.com/adiknoth/netatalk-debian as per bug #690227) > 3) RM netatalk Please re-post these excellent questions to 690...@bugs

Bug#765854: Related systemd upstream issue

2018-12-02 Thread Daniel Lange
https://github.com/systemd/systemd/issues/8598 (Title: systemd-user doesn't properly close its PAM session)

Bug#908678: Testing the filter-branch scripts

2018-11-13 Thread Daniel Lange
Am 13.11.18 um 23:09 schrieb Moritz Muehlenhoff: > The current data structure works very well for us and splitting the files > has many downsides. Could you detail what those many downsides are besides the scripts that need to be amended?

Bug#908678: Testing the filter-branch scripts

2018-11-13 Thread Daniel Lange
> The Python job finished successfully here after 10 hours. 6h40 mins here as I ported your improved logic to the python2 version :). # git filter-branch --tree-filter '/usr/bin/python2 /split-by-year.pyc' HEAD Rewrite 1169d256b27eb7244273671582cc08ba88002819 (68356/68357) (24226 seconds passed,

Bug#908678: Testing the filter-branch scripts

2018-11-10 Thread Daniel Lange
Antoine, thank you very much for your filter-branch scripts. I tested each: 1) the golang version: It completes after 3h36min: # git filter-branch --tree-filter '/split-by-year' HEAD Rewrite a09118bf0a33f3721c0b8f6880c4cbb1e407a39d (68282/68286) (12994 seconds passed, remaining 0 predicted) Re

Bug#908678: Some more thoughts and some tests on the security-tracker git repo

2018-09-26 Thread Daniel Lange
The main issue is that we need to get clone and diff+render operations back into normal time frames. The salsa workers (e.g. to render a diff) time out after 60s. Similar time constraints are put onto other rendering frond-ends. Actually you can easily get Apache to segfault if you do not time-cons

Bug#907308: Bug depends on glibc version

2018-08-26 Thread Daniel Lange
as discussed with jwilk on irc: This bug depends on the (g)libc version: * stock Stretch is unaffected (libc6-2.24-11+deb9u3) * Stretch with glibc from unstable (libc6-2.27-5) is affected * stock Ubuntu 18.04.1 (libc6-2.27-3ubuntu1) is affected

Bug#876087: xscreensaver: source-less and unlicensed code at hacks/images/m6502/dmsc.asm

2017-09-25 Thread Daniel Lange
Hi Daniel, thank you very much. All the best, Daniel

Bug#876087: Source code and license of dmsc.asm

2017-09-23 Thread Daniel Lange
Hi, your acme code dmsc.asm is used in xscreensaver by Jamie Zawinski. Apparently there have been issues filed before at very Freedom oriented distributions that the file is not clearly licensed and the source code is not shipped with it. E.g. at https://labs.parabola.nu/issues/131 . This has bo

Bug#827304: unable to reproduce the issue on three AMD64 systems

2016-09-20 Thread Daniel Lange
Control: tags -1 unreproducible I've tried to reproduce the issue for 48h on three AMD64 systems I've happened to have around here temporarily with fresh Debian testing installs. Got to use the opportunity. One of the systems was used for heavy editing, the two other for occasional editing with lo

Bug#834502: Suggest to remove this old version

2016-09-19 Thread Daniel Lange
tcpcopy 0.6.3 relies on ip_queue support that has been removed from the Linux kernel >= 3.5.0. tcpcopy 0.7.0+ knows about nfqueue for kernels >= 3.5.0. The current version of tcpcopy is 1.0.0 released 03.08.2015. I suggest removing this old version from testing / sid. (It will be auto-removed du

Bug#834502: Previous subject should have been: patch attached

2016-08-22 Thread Daniel Lange
sorry, see ^ The input word is guaranteed to be at most STRINGSIZE-1 in length. One of the mangle operations involves duplicating the input word, resulting in a string twice the length to be accommodated by both area variables. Howard Guo 2016-08-17 diff -rupN 3/lib/rules.c 3-patched/lib/rules.

Bug#834502: Proposed NMU, debdiff attached

2016-08-22 Thread Daniel Lange
Control: tags -1 + patch The buffer overflow results from strings that are too short for a strcpy to always succeed. Patch from attached. The input word is guaranteed to be at most ST

Bug#833655: Proposed NMU, debdiff attached

2016-08-22 Thread Daniel Lange
+0200 +++ metar-20061030.1/debian/changelog 2016-08-22 16:26:06.0 +0200 @@ -1,3 +1,10 @@ +metar (20061030.1-2.2) unstable; urgency=medium + + * Non-maintainer upload. + * Import patch for new METAR URL from Kees Leune. Closes: #833655 + + -- Daniel Lange Mon, 22 Aug 2016 16:25:57

Bug#820331: cronic: uses very predictable temporary files

2016-04-10 Thread Daniel Lange
Am 10.04.2016 18:46, schrieb Salvatore Bonaccorso: CVE-2016-3992 has been assigned for this issue. Can you forward this to upstream and as well include the CVE id reference in debian/changelog when fixing this issue? Upstream has already fixed yesterday and I packaged the v3 for Debian this mo