From debbugs-submit-bounces@debbugs.gnu.org Sat Apr 24 15:39:21 2021 Received: (at submit) by debbugs.gnu.org; 24 Apr 2021 19:39:21 +0000 Received: from localhost ([127.0.0.1]:41538 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1laO7V-0005s2-Sm for submit@debbugs.gnu.org; Sat, 24 Apr 2021 15:39:21 -0400 Received: from lists.gnu.org ([209.51.188.17]:59042) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1laO7R-0005rs-QU for submit@debbugs.gnu.org; Sat, 24 Apr 2021 15:39:12 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:59326) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1laO7R-0000OW-I5 for guix-patches@gnu.org; Sat, 24 Apr 2021 15:39:09 -0400 Received: from out2-smtp.messagingengine.com ([66.111.4.26]:59841) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1laO7P-00011d-A8 for guix-patches@gnu.org; Sat, 24 Apr 2021 15:39:09 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 910EA5C007E; Sat, 24 Apr 2021 15:39:05 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Sat, 24 Apr 2021 15:39:05 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=from:to:subject:date:message-id:mime-version :content-transfer-encoding; s=mesmtp; bh=0hbgAzY7RA0V8kmojY1b7C6 DX0MiHBuv4ptZdVEHQZk=; b=ke1VxbIansmz2Zrv80Cc71K7HMuQECPef6otb2p UyN+20ZUtVbEpAESahtekSmbYAqczgRvm2qwbsqHA+f/ZW2DIrly2elPlv/l/aYv n8mzZkZxfm4MBLgDV0xpfeR4wsa/DXqwNS0lKW5RGBoXo5truBB71q6TgmJS3H7S ZyP4= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:date:from :message-id:mime-version:subject:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=0hbgAzY7RA0V8kmoj Y1b7C6DX0MiHBuv4ptZdVEHQZk=; b=lJ0OHEzFNtrAiOV2/J8k43Kryzm7+tHEW W56GpztzN/9V/6bX420n3MK1BDVn9Br2/6jsHMwGBqMHgS78oYDhbP9K3JzRGAN0 vK9W7lq9DTEk9QdNy0u6xhaI/vliU3+S0RC7w5KyPVcKCdS9zrJW6Xs6JEEhvFDW TBJbWLnQXOvnvcJKI20V4rxGd1sG5hveqTjnTeGA5AcAj+jhgeMHZ0lZHAB+iWZR Odx76Ab6pkA73e6+Au/DZJyzfiWOerM4wQ5cjqBMqOhoa5cajikKQUuVUPssgGiq mnGL/xRCM0mtUB79L1EGXgl86K9RfQ3E98l6Npg2MuM1ah8bBV+0Q== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvddugedgudegtdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurhephffvufffkffoggfgsedtkeertd ertddtnecuhfhrohhmpefnvghoucfhrghmuhhlrghrihcuoehlvghosehfrghmuhhlrghr ihdrnhgrmhgvqeenucggtffrrghtthgvrhhnpeekvdelffelteekledutdejueffgedvue ffjeeiveejudfhtedtgfelgeffgfduhfenucffohhmrghinhepmhhithhrvgdrohhrghdp shgvtghlihhsthhsrdhorhhgpdhfrhgvvgguvghskhhtohhprdhorhhgpdhfvgguohhrrg hprhhojhgvtghtrdhorhhgnecukfhppedutddtrdduuddrudeiledruddukeenucevlhhu shhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehlvghosehfrghmuh hlrghrihdrnhgrmhgv X-ME-Proxy: Received: from jasmine.lan (pool-100-11-169-118.phlapa.fios.verizon.net [100.11.169.118]) by mail.messagingengine.com (Postfix) with ESMTPA id 2965824005C for ; Sat, 24 Apr 2021 15:39:05 -0400 (EDT) From: Leo Famulari To: guix-patches@gnu.org Subject: [PATCH] gnu: xorg-server: CVE-2021-3472. Date: Sat, 24 Apr 2021 15:38:58 -0400 Message-Id: X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=66.111.4.26; envelope-from=leo@famulari.name; helo=out2-smtp.messagingengine.com X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-Spam-Score: -1.4 (-) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -0.1 (/) * gnu/packages/patches/xorg-server-CVE-2021-3472.patch: New file. * gnu/local.mk (dist_patch_DATA): Add it. * gnu/packages/xorg.scm (xorg-server)[source]: Use it. --- gnu/local.mk | 1 + .../patches/xorg-server-CVE-2021-3472.patch | 44 +++++++++++++++++++ gnu/packages/xorg.scm | 5 ++- 3 files changed, 48 insertions(+), 2 deletions(-) create mode 100644 gnu/packages/patches/xorg-server-CVE-2021-3472.patch diff --git a/gnu/local.mk b/gnu/local.mk index 50b11a8ca2..3d076de924 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1815,6 +1815,7 @@ dist_patch_DATA = \ %D%/packages/patches/xfce4-panel-plugins.patch \ %D%/packages/patches/xfce4-settings-defaults.patch \ %D%/packages/patches/xmonad-dynamic-linking.patch \ + %D%/packages/patches/xorg-server-CVE-2021-3472.patch \ %D%/packages/patches/xplanet-1.3.1-cxx11-eof.patch \ %D%/packages/patches/xplanet-1.3.1-libdisplay_DisplayOutput.cpp.patch \ %D%/packages/patches/xplanet-1.3.1-libimage_gif.c.patch \ diff --git a/gnu/packages/patches/xorg-server-CVE-2021-3472.patch b/gnu/packages/patches/xorg-server-CVE-2021-3472.patch new file mode 100644 index 0000000000..523a5b1dbf --- /dev/null +++ b/gnu/packages/patches/xorg-server-CVE-2021-3472.patch @@ -0,0 +1,44 @@ +Fix CVE-2021-3472: + +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472 +https://seclists.org/oss-sec/2021/q2/20 + +Patch copied from upstream source repository: + +https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd + +From 7aaf54a1884f71dc363f0b884e57bcb67407a6cd Mon Sep 17 00:00:00 2001 +From: Matthieu Herrb +Date: Sun, 21 Mar 2021 18:38:57 +0100 +Subject: [PATCH] Fix XChangeFeedbackControl() request underflow + +CVE-2021-3472 / ZDI-CAN-1259 + +This vulnerability was discovered by: +Jan-Niklas Sohn working with Trend Micro Zero Day Initiative + +Signed-off-by: Matthieu Herrb +--- + Xi/chgfctl.c | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/Xi/chgfctl.c b/Xi/chgfctl.c +index 1de4da9ef..7a597e43d 100644 +--- a/Xi/chgfctl.c ++++ b/Xi/chgfctl.c +@@ -464,8 +464,11 @@ ProcXChangeFeedbackControl(ClientPtr client) + break; + case StringFeedbackClass: + { +- xStringFeedbackCtl *f = ((xStringFeedbackCtl *) &stuff[1]); ++ xStringFeedbackCtl *f; + ++ REQUEST_AT_LEAST_EXTRA_SIZE(xChangeFeedbackControlReq, ++ sizeof(xStringFeedbackCtl)); ++ f = ((xStringFeedbackCtl *) &stuff[1]); + if (client->swapped) { + if (len < bytes_to_int32(sizeof(xStringFeedbackCtl))) + return BadLength; +-- +2.31.1 + diff --git a/gnu/packages/xorg.scm b/gnu/packages/xorg.scm index 97ff8ab92b..df0055c704 100644 --- a/gnu/packages/xorg.scm +++ b/gnu/packages/xorg.scm @@ -5312,7 +5312,7 @@ over Xlib, including: (base32 "16bwrf0ag41l7jbrllbix8z6avc5yimga7ihvq4ch3a5hb020x4p")) (patches - (list + (cons ;; See: ;; https://lists.fedoraproject.org/archives/list/devel@lists. ;; fedoraproject.org/message/JU655YB7AM4OOEQ4MOMCRHJTYJ76VFOK/ @@ -5324,7 +5324,8 @@ over Xlib, including: (sha256 (base32 "0mm70y058r8s9y9jiv7q2myv0ycnaw3iqzm7d274410s0ik38w7q")) - (file-name "xorg-server-use-intel-only-on-pre-gen4.diff")))))) + (file-name "xorg-server-use-intel-only-on-pre-gen4.diff")) + (search-patches "xorg-server-CVE-2021-3472.patch"))))) (build-system gnu-build-system) (propagated-inputs `(("libpciaccess" ,libpciaccess) -- 2.31.1 From debbugs-submit-bounces@debbugs.gnu.org Sat Apr 24 17:36:53 2021 Received: (at 48001) by debbugs.gnu.org; 24 Apr 2021 21:36:53 +0000 Received: from localhost ([127.0.0.1]:41622 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1laPxF-0000FD-IN for submit@debbugs.gnu.org; Sat, 24 Apr 2021 17:36:53 -0400 Received: from out2-smtp.messagingengine.com ([66.111.4.26]:38261) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1laPxC-0000Ew-3e for 48001@debbugs.gnu.org; Sat, 24 Apr 2021 17:36:44 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 05E535C008C; Sat, 24 Apr 2021 17:36:36 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Sat, 24 Apr 2021 17:36:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=date:from:to:subject:message-id:mime-version:content-type; s= mesmtp; bh=XWOYuSkWOfXe41tk4j82ROePxvSi2SBw1DY4Ouvl7EE=; b=Hmz7S CZA8+1WhW5sJDBtlq/j6EqFQ//HJmw1ady+5EHT9MQzfmIgxEB8nTfd4T65AqRn9 l83a7uHtxp2ZTBXSaH438pWn7FxLoVr/PpRSDEsrXv4BZt70+n6/YGLBqAZ9Psgl TVccJdZPPMtoKNfAy7YgV/53cwXLfXnWgZCHeQ= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=XWOYuSkWOfXe41tk4j82ROePxvSi2 SBw1DY4Ouvl7EE=; b=YEHrQXhDaQ3DhX5vnI06Q4iuGD8wJq5tk/FcsEJUZoj4W dwoVwfUv2+boGq664GRL3HdLaCV9TQDTE0QE8lDBGDggijm8fZMK2q09aWztQKhH n5SznX4xUvZwEH0YEp0nuiX0ZmgcRvXTROSRsqkSXfG7b2FL+of5C0783e7RKVDp EkfXYP3XoXZQj00WG7WFS3bretD+mqNKNvnnsfrTPJdZuZh3qepa5HfIL3xV4PjL ZhqrfVE+O3iVYrFvcF+h6d56rizL9cPT2NeDYaw9elPlDm/YBWaLv44arIKt4luZ io+iaqIIe6UtKmsDo8OWDmexhB+609070myPN3cDg== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvddugedgudeigecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurhepfffhvffukfggtggusehgtdorre dttddvnecuhfhrohhmpefnvghoucfhrghmuhhlrghrihcuoehlvghosehfrghmuhhlrghr ihdrnhgrmhgvqeenucggtffrrghtthgvrhhnpeejkeejgfdtffegvddthfehjeelvdelhf euieetvedvjeffleegvdefffdvveegkeenucfkphepuddttddruddurdduieelrdduudek necuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheplhgvoh esfhgrmhhulhgrrhhirdhnrghmvg X-ME-Proxy: Received: from localhost (pool-100-11-169-118.phlapa.fios.verizon.net [100.11.169.118]) by mail.messagingengine.com (Postfix) with ESMTPA id 82CEC240054 for <48001@debbugs.gnu.org>; Sat, 24 Apr 2021 17:36:35 -0400 (EDT) Date: Sat, 24 Apr 2021 17:36:30 -0400 From: Leo Famulari To: 48001@debbugs.gnu.org Subject: RE: [PATCH] gnu: xorg-server: CVE-2021-3472. Message-ID: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="mm3URnLuC/e5LolR" Content-Disposition: inline X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 48001 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) --mm3URnLuC/e5LolR Content-Type: multipart/mixed; boundary="SW0aTBK9UaEsqe/L" Content-Disposition: inline --SW0aTBK9UaEsqe/L Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable The first revision of this patch does not take care to avoid changing the derivation of xorg-server-for-tests, so it would cause way too many packages to be rebuilt. Here is a revised patch that ensures the derivation remains the same. For example: ------ $ guix build -e '(@@ (gnu packages xorg) xorg-server-for-tests)' --no-graft= s -d =20 /gnu/store/nhs1c9q04g6k4prxxv4kb9q5lg1p872q-xorg-server-1.20.10.drv $ ./pre-inst-env guix build -e '(@@ (gnu packages xorg) xorg-server-for-tes= ts)' --no-grafts -d /gnu/store/nhs1c9q04g6k4prxxv4kb9q5lg1p872q-xorg-server-1.20.10.drv ------ --SW0aTBK9UaEsqe/L Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="0001-gnu-xorg-server-CVE-2021-3472.patch" Content-Transfer-Encoding: quoted-printable =46rom cc4b92215511eb4cd0853438194004159964cbd4 Mon Sep 17 00:00:00 2001 =46rom: Leo Famulari Date: Sat, 24 Apr 2021 15:34:24 -0400 Subject: [PATCH] gnu: xorg-server: CVE-2021-3472. * gnu/packages/patches/xorg-server-CVE-2021-3472.patch: New file. * gnu/local.mk (dist_patch_DATA): Add it. * gnu/packages/xorg.scm (xorg-server)[source]: Use it. [xorg-server-for-tests]: Do not use it, to avoid changing the derivation of= this package. --- gnu/local.mk | 1 + .../patches/xorg-server-CVE-2021-3472.patch | 44 +++++++++++++++++++ gnu/packages/xorg.scm | 31 +++++++++++-- 3 files changed, 73 insertions(+), 3 deletions(-) create mode 100644 gnu/packages/patches/xorg-server-CVE-2021-3472.patch diff --git a/gnu/local.mk b/gnu/local.mk index 50b11a8ca2..3d076de924 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1815,6 +1815,7 @@ dist_patch_DATA =3D \ %D%/packages/patches/xfce4-panel-plugins.patch \ %D%/packages/patches/xfce4-settings-defaults.patch \ %D%/packages/patches/xmonad-dynamic-linking.patch \ + %D%/packages/patches/xorg-server-CVE-2021-3472.patch \ %D%/packages/patches/xplanet-1.3.1-cxx11-eof.patch \ %D%/packages/patches/xplanet-1.3.1-libdisplay_DisplayOutput.cpp.patch \ %D%/packages/patches/xplanet-1.3.1-libimage_gif.c.patch \ diff --git a/gnu/packages/patches/xorg-server-CVE-2021-3472.patch b/gnu/pac= kages/patches/xorg-server-CVE-2021-3472.patch new file mode 100644 index 0000000000..523a5b1dbf --- /dev/null +++ b/gnu/packages/patches/xorg-server-CVE-2021-3472.patch @@ -0,0 +1,44 @@ +Fix CVE-2021-3472: + +https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2021-3472 +https://seclists.org/oss-sec/2021/q2/20 + +Patch copied from upstream source repository: + +https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0= b884e57bcb67407a6cd + +From 7aaf54a1884f71dc363f0b884e57bcb67407a6cd Mon Sep 17 00:00:00 2001 +From: Matthieu Herrb +Date: Sun, 21 Mar 2021 18:38:57 +0100 +Subject: [PATCH] Fix XChangeFeedbackControl() request underflow + +CVE-2021-3472 / ZDI-CAN-1259 + +This vulnerability was discovered by: +Jan-Niklas Sohn working with Trend Micro Zero Day Initiative + +Signed-off-by: Matthieu Herrb +--- + Xi/chgfctl.c | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/Xi/chgfctl.c b/Xi/chgfctl.c +index 1de4da9ef..7a597e43d 100644 +--- a/Xi/chgfctl.c ++++ b/Xi/chgfctl.c +@@ -464,8 +464,11 @@ ProcXChangeFeedbackControl(ClientPtr client) + break; + case StringFeedbackClass: + { +- xStringFeedbackCtl *f =3D ((xStringFeedbackCtl *) &stuff[1]); ++ xStringFeedbackCtl *f; +=20 ++ REQUEST_AT_LEAST_EXTRA_SIZE(xChangeFeedbackControlReq, ++ sizeof(xStringFeedbackCtl)); ++ f =3D ((xStringFeedbackCtl *) &stuff[1]); + if (client->swapped) { + if (len < bytes_to_int32(sizeof(xStringFeedbackCtl))) + return BadLength; +--=20 +2.31.1 + diff --git a/gnu/packages/xorg.scm b/gnu/packages/xorg.scm index 97ff8ab92b..941958aa7a 100644 --- a/gnu/packages/xorg.scm +++ b/gnu/packages/xorg.scm @@ -5312,7 +5312,7 @@ over Xlib, including: (base32 "16bwrf0ag41l7jbrllbix8z6avc5yimga7ihvq4ch3a5hb020x4p")) (patches - (list + (cons ;; See: ;; https://lists.fedoraproject.org/archives/list/devel@lists. ;; fedoraproject.org/message/JU655YB7AM4OOEQ4MOMCRHJTYJ76VF= OK/ @@ -5324,7 +5324,8 @@ over Xlib, including: (sha256 (base32 "0mm70y058r8s9y9jiv7q2myv0ycnaw3iqzm7d274410s0ik38w7q")) - (file-name "xorg-server-use-intel-only-on-pre-gen4.diff")))))) + (file-name "xorg-server-use-intel-only-on-pre-gen4.diff")) + (search-patches "xorg-server-CVE-2021-3472.patch"))))) (build-system gnu-build-system) (propagated-inputs `(("libpciaccess" ,libpciaccess) @@ -5432,7 +5433,31 @@ draggable titlebars and borders.") (define-public xorg-server-for-tests (hidden-package (package - (inherit xorg-server)))) + (inherit xorg-server) + (version "1.20.10") + ;; Don't apply xorg-server-CVE-2021-3472.patch + (source + (origin + (method url-fetch) + (uri (string-append "mirror://xorg/individual/xserver/" + "xorg-server-" version ".tar.bz2")) + (sha256 + (base32 + "16bwrf0ag41l7jbrllbix8z6avc5yimga7ihvq4ch3a5hb020x4p")) + (patches + (list + ;; See: + ;; https://lists.fedoraproject.org/archives/list/devel@lists. + ;; fedoraproject.org/message/JU655YB7AM4OOEQ4MOMCRHJTYJ76V= FOK/ + (origin + (method url-fetch) + (uri (string-append + "http://pkgs.fedoraproject.org/cgit/rpms/xorg-x11-serve= r.git" + "/plain/06_use-intel-only-on-pre-gen4.diff")) + (sha256 + (base32 + "0mm70y058r8s9y9jiv7q2myv0ycnaw3iqzm7d274410s0ik38w7q")) + (file-name "xorg-server-use-intel-only-on-pre-gen4.diff")))))= )))) =20 (define-public xorg-server-xwayland (package/inherit xorg-server --=20 2.31.1 --SW0aTBK9UaEsqe/L-- --mm3URnLuC/e5LolR Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEsFFZSPHn08G5gDigJkb6MLrKfwgFAmCEj14ACgkQJkb6MLrK fwgdUg//cdMjEAoBDKyDpXX31YsG5xYVw0L0Wy91LyiGDMeBVuueqvfig7qYrZEF u3/BwjYSbGIxrAG2NhEvQacqj6LpttIkp205isxMaMLvz/Jm9l8TixN5iBuckPIz xuAKR5tzjL2YhQLLMCGM7jUlg7ffhFoPoXQ3sQ64pGAzUfRZO8lA8mP21PBA69YZ 2zObd8+uOE2osyJ9lt5sVaM9LPvhWaPIx1WRwhwy3TwuxEm5Y/U9jbJqJZk/mrMC VS7efAnm8lO6DLu6GYfstzQOgKalDwOrK6ks9Hlahp4RUhuu9vL1x3XEhQ9PDHJJ iYE0fueKgbALp2m0gVnLlJ+AaozUFa4v0nMtXscLLxsSRIYby7uDxWvMUJeCObEF yBeMU3X3GNRmYBmyxRBeeepAI7L39BxsX7k0wraExIFpag7Km27SdemJJP8A/d0y jQgW0Ru0o1pZAkI8mDL93q423um/GVcEeqbHPRKddkGMYm/zYKhoQfyXNAC7MUr+ pUzWfA4NKQFDb6jZIqySYTQwLO2LP0tfYbEcllgi44VsE5qXUwMmsSuD5ItVv2iy 9pdOCzEDUU/qk7NHopPz0s7n5qT5y2qZORCPkRUqJDPnj7tv0aEZpxS7BdrxBMn8 UZW8edx7RZLuSydfsKRjGY6WXG/KsU6I2AZiprkBFfezDtQtyZ8= =+JTq -----END PGP SIGNATURE----- --mm3URnLuC/e5LolR-- From debbugs-submit-bounces@debbugs.gnu.org Mon Apr 26 15:29:42 2021 Received: (at control) by debbugs.gnu.org; 26 Apr 2021 19:29:42 +0000 Received: from localhost ([127.0.0.1]:47233 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lb6vO-0008B6-8s for submit@debbugs.gnu.org; Mon, 26 Apr 2021 15:29:42 -0400 Received: from wout4-smtp.messagingengine.com ([64.147.123.20]:33963) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lb6vL-0008Ap-Oe for control@debbugs.gnu.org; Mon, 26 Apr 2021 15:29:41 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.west.internal (Postfix) with ESMTP id 9FCC81762; Mon, 26 Apr 2021 15:29:33 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Mon, 26 Apr 2021 15:29:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=date:from:to:message-id:mime-version:content-type; s=mesmtp; bh=F+rVRwDuvclSJsqRbsdpdd97dENLoKN0z+NmZlZfWp8=; b=Nf5CvO9dhRoM MEEXH/eqybll0HIwSA1v8pabR8vJdDz1/5RqeFV/5ugqC++AfAAJc9iEctiFLiHO kqbNhYrHU4N0LA0we/oOWvPhSTxjX/tl95zA2mdHQdqvzRo5B2dw4xijFOiXibJm e6tIX/B6rV6oaq1lXciIMms2jjut/Yo= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm2; bh=F+rVRwDuvclSJsqRbsdpdd97dENLoKN0z+NmZlZfW p8=; b=JH4LxgbGQkDNuRZMfUmFGISQ36kgzNaI7NA9x0Cf+bGzD/AYcGv2S8k+8 gGoVUaXRR2HmAII0cVpPoo7A4kVgjRvDKMyIlc9NXkVMtYQWokISTkpfQJHEg8M4 UZGB5cKKZZLSKaTOyI8OqR2TQiPkrWGfq7FQ4DYghiWfwwTIqiJNGVePanpuqSPI bKd3Hsxe7crBh/tK+1F9P+fEt60J7cDbhPnLvD7gUCD3QR6MlMwWnq0nssVvZjmQ QPlZz9eDphJq9Qtw8FLZ5X7E6L/hGZXFWsDululqhXZPlovfam6Ngm2HgIMXgsta RghM06hQBG3HdnnErx60doj31DrmQ== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdduledgtdegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne fgmhhpthihuchsuhgsjhgvtghtucdluddtmdenucfjughrpeffhffvkfggtggusehttder tddttddvnecuhfhrohhmpefnvghoucfhrghmuhhlrghrihcuoehlvghosehfrghmuhhlrg hrihdrnhgrmhgvqeenucggtffrrghtthgvrhhnpefhjeeigfefvedvfeetheegledtkeev uddtgedtudeiteehteegvdefffduffefffenucfkphepuddttddruddurdduieelrdduud eknecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheplhgv ohesfhgrmhhulhgrrhhirdhnrghmvg X-ME-Proxy: Received: from localhost (pool-100-11-169-118.phlapa.fios.verizon.net [100.11.169.118]) by mail.messagingengine.com (Postfix) with ESMTPA id E1F701080057 for ; Mon, 26 Apr 2021 15:29:32 -0400 (EDT) Date: Mon, 26 Apr 2021 15:29:31 -0400 From: Leo Famulari To: GNU bug tracker automated control server Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Score: 1.3 (+) X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: reassign 48039 guix-patches merge 48001 48039 Content analysis details: (1.3 points, 10.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 RCVD_IN_MSPIKE_H4 RBL: Very Good reputation (+4) [64.147.123.20 listed in wl.mailspike.net] -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at https://www.dnswl.org/, low trust [64.147.123.20 listed in list.dnswl.org] 1.8 MISSING_SUBJECT Missing Subject: header 0.2 NO_SUBJECT Extra score for no subject 0.0 RCVD_IN_MSPIKE_WL Mailspike good senders X-Debbugs-Envelope-To: control X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: 0.3 (/) reassign 48039 guix-patches merge 48001 48039 From unknown Fri Aug 08 22:17:42 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Tue, 25 May 2021 11:24:05 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator