- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
root@Blue:~# apt update
Hit:1 http://security.debian.org/debian-security trixie-security InRelease
Hit:2 http://deb.debian.org/debian trixie InRelease
Get:3 http://deb.debian.org/debian trixie-updates InRelease [47.1 kB]
Get:4 https://apt.repos.intel.com/oneapi all InRelease [5,680 B]
Err:4 https://apt.repos.intel.com/oneapi all InRelease
Sub-process /usr/bin/sqv returned an error code (1), error message is: Verifying signature: Malformed MPI: leading bit is not set: expected bit 8 to be set in 1010100 (54)
Warning: OpenPGP signature verification failed: https://apt.repos.intel.com/oneapi all InRelease: Sub-process /usr/bin/sqv returned an error code (1), error message is: Verifying signature: Malformed MPI: leading bit is not set: expected bit 8 to be set in 1010100 (54)
Error: The repository 'https://apt.repos.intel.com/oneapi all InRelease' is not signed.
Notice: Updating from such a repository can't be done securely, and is therefore disabled by default.
Notice: See apt-secure(8) manpage for repository creation and user configuration details.
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to te Debian developer at https://bugs-devel.debian.org/cgi-bin/bugreport.cgi?bug=1099438
the Intel OneAPI repository was created with a broken OpenPGP tool.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I started getting similar errors when Debian Testing switched from its old gpg verification, to a new, Rust-based, one.
So, the key still works for Debian 12, etc. But since Debian Testing became Debian 13 last month, and its new gpg verification is less forgiving, maybe a new key is needed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I am not an expert in gpg keys. I will escalate this to our repo managers. I am concerned that the new verification scheme does not accept older keys. I can imagine that Intel's repo is not the only one caught by surprise. I am concerned that if we switch to a new key that OLDER distros will accept the new key. These are the problems that concern me.
I do know that in our System Requirements document we only officially support Deb 12. Deb 13 just came out August 9th.
For perspective, for 2025.2 we hit code freeze end of April. We validated the solution with the available OS versions across Windows, Visual Studio, RHEL, Fedora, Ubuntu, Deb, etc. at that point of time in the May timeframe. My point here is that although it is tempting to stay up to date with your distribution releases, a bit of caution is required if you have 3rd party applications such as compilers, binutils, linkers, glibc, X11 headers, Python versions, etc. For Linux we are lucky that MOST OF THE TIME newer distro Update releases do not cause breakages. Visual Studio, for example, breaks us frequently with their minor version updates. In the case of Deb, you went from one major release to a new major release. Major releases are when glibc and headers may break tools, key validation schemes, pgp versions, as in this case.
I will find our repo managers and see if they are aware of the key problems with Deb 13.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Any updates? It has been a while and the broken key issue still exists.
I'm looking forward to testing oneAPI 2025.2, but am used to install oneAPI via APT.
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page