Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Usertags: unblock

Please unblock package wmbiff

I am currently adopting the wmbiff package and would like to upload a new
version to unstable.  However, there is a recent NMU version currently in
unstable which fixes #759259 [1], and the author has requested that this version
migrate to jessie before my upload [2].

The debdiff is below.  Thank you!
Doug Torrance

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759259
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767915#14

diff -Nru wmbiff-0.4.27/debian/changelog wmbiff-0.4.27/debian/changelog
--- wmbiff-0.4.27/debian/changelog      2014-08-09 08:08:45.000000000 -0500
+++ wmbiff-0.4.27/debian/changelog      2014-11-02 01:14:04.000000000 -0600
@@ -1,3 +1,15 @@
+wmbiff (0.4.27-2.3) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * 20_gnutls_set_default_priority.diff: Use gnutls_set_default_priority()
+    to get GnuTLS upstream's recommended default values (SSL/TLS versions,
+    ciphers, et al.) instead of setting local defaults using the deprecated
+    gnutls_cipher_set_priority/gnutls_protocol_set_priority/... functions.
+    This fixes transmission errors to modern systems. Closes: #759259
+    (Thanks to Nye Liu for debugging the issue and finding the solution.)
+
+ -- Andreas Metzler <ametz...@debian.org>  Sun, 02 Nov 2014 08:04:00 +0100
+
 wmbiff (0.4.27-2.2) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru wmbiff-0.4.27/debian/patches/20_gnutls_set_default_priority.diff 
wmbiff-0.4.27/debian/patches/20_gnutls_set_default_priority.diff
--- wmbiff-0.4.27/debian/patches/20_gnutls_set_default_priority.diff    
1969-12-31 18:00:00.000000000 -0600
+++ wmbiff-0.4.27/debian/patches/20_gnutls_set_default_priority.diff    
2014-11-02 01:01:15.000000000 -0600
@@ -0,0 +1,40 @@
+Description: Use gnutls_set_default_priority() to get GnuTLS upstream's
+ recommended default values (SSL/TLS versions, ciphers, et al.) instead
+ of setting local defaults using the deprecated
+ gnutls_cipher_set_priority/gnutls_protocol_set_priority/...
+ functions.
+Author: Andreas Metzler <ametz...@debian.org>, Nye Liu <n...@nyet.org>
+Bug-Debian: https://bugs.debian.org/759259
+Origin: vendor
+Forwarded: no
+Last-Update: 2014-11-02
+
+--- a/wmbiff/tlsComm.c
++++ b/wmbiff/tlsComm.c
+@@ -553,25 +553,7 @@ struct connection_state *initialize_gnut
+ 
+       assert(gnutls_init(&scs->tls_state, GNUTLS_CLIENT) == 0);
+       {
+-              const int protocols[] = { GNUTLS_TLS1, GNUTLS_SSL3, 0 };
+-              const int ciphers[] =
+-                      { GNUTLS_CIPHER_RIJNDAEL_128_CBC, 
GNUTLS_CIPHER_3DES_CBC,
+-                      GNUTLS_CIPHER_RIJNDAEL_256_CBC,
+-                      GNUTLS_CIPHER_ARCFOUR, 0
+-              };
+-              const int compress[] = { GNUTLS_COMP_ZLIB, GNUTLS_COMP_NULL, 0 
};
+-              const int key_exch[] = { GNUTLS_KX_RSA, GNUTLS_KX_DHE_DSS,
+-                      GNUTLS_KX_DHE_RSA, 0
+-              };
+-              /* mutt with gnutls doesn't use kx_srp or kx_anon_dh */
+-              const int mac[] = { GNUTLS_MAC_SHA, GNUTLS_MAC_MD5, 0 };
+-              assert(gnutls_protocol_set_priority(scs->tls_state, protocols) 
==
+-                         0);
+-              assert(gnutls_cipher_set_priority(scs->tls_state, ciphers) == 
0);
+-              assert(gnutls_compression_set_priority(scs->tls_state, 
compress) ==
+-                         0);
+-              assert(gnutls_kx_set_priority(scs->tls_state, key_exch) == 0);
+-              assert(gnutls_mac_set_priority(scs->tls_state, mac) == 0);
++              assert(gnutls_set_default_priority(scs->tls_state) == 0);
+               /* no client private key */
+               if (gnutls_certificate_allocate_credentials(&scs->xcred) < 0) {
+                       DMA(DEBUG_ERROR, "gnutls memory error\n");
diff -Nru wmbiff-0.4.27/debian/patches/series 
wmbiff-0.4.27/debian/patches/series
--- wmbiff-0.4.27/debian/patches/series 2014-08-09 07:11:55.000000000 -0500
+++ wmbiff-0.4.27/debian/patches/series 2014-11-02 01:13:57.000000000 -0600
@@ -2,3 +2,4 @@
 11_autoconfgenchanges.diff
 15_no_more_LZO.diff
 16_gnutls_deprecated.diff
+20_gnutls_set_default_priority.diff

unblock wmbiff/0.4.27-2.3

-- System Information:
Debian Release: jessie/sid
  APT prefers utopic-updates
  APT policy: (500, 'utopic-updates'), (500, 'utopic-security'), (500, 
'utopic'), (500, 'trusty'), (100, 'utopic-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-031600-generic (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141108164016.20752.57911.reportbug@toshiba

Reply via email to