Bug#965329: check_ldaps (and maybe others?) cannot be restricted to IPv4-only checks via -4 cmdline switch

2020-07-19 Thread Mike Gabriel

Package: monitoring-plugins-standard
Version: 2.2-6

Hi,

I just stumbled over a peculiar thing.

I migrated one of my LDAP server that gets monitored via Icinga2 for  
IPv6 and IPv4 connectivity separately. The LDAP hosts IPv6 setup is  
still buggy after its migration and the Icinga2 host for now gets  
blocked by the providers firewall and cannot reach the the LDAP  
server's IPv6 address (like a fw DROP or a routing problem). (I filed  
a ticket with the server hoster for that, so this is off-topic here).


However...

I'd expect the IPv4 check_ldaps test to succeed (and see a check_ldaps  
timeout for the IPv6 test). But that's not the case.


I obfuscated IPs a bit in the below strace output:

IPv4

  1.2.3.4 is the LDAP server to check
  5.6.7.8 is the Icinga2 host that does the check

IPv6

  2a01:::101 is the LDAP server to check
  2001:::2 is the Icinga2 host that does the check

The check is:

  check_ldaps -4 -3 -b dc=my,dc=domain -H ldap-server-x-on.my.domain -p636

I expect that the check happens on IPv4 only and IPv6 checking is  
totally omitted.


The check does not work. It hangs and gives a "CRITICAL - Socket  
timeout after 10 seconds"


Running this with strace -f reveals that the check is _NOT_ being done  
on the IPv4 addresses, but via the IPv6 addresses. This is not what I  
told the command to do via command line switch "-4".


Stracing the command call...

```
(root@icinga-host) {~} # strace -f /usr/lib/nagios/plugins/check_ldaps  
-4 -3 -b dc=my,dc=domain -H ldap-server-x-on.my.domain -p636


[...]
recvmsg(3, {msg_name={sa_family=AF_NETLINK, nl_pid=0,  
nl_groups=}, msg_namelen=12, msg_iov=[{iov_base={{len=20,  
type=NLMSG_DONE, flags=NLM_F_MULTI, seq=1595174041, pid=24211}, 0},  
iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20

close(3)= 0
socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_IP) = 3
connect(3, {sa_family=AF_INET, sin_port=htons(636),  
sin_addr=inet_addr("1.2.3.4")}, 16) = 0
getsockname(3, {sa_family=AF_INET, sin_port=htons(49266),  
sin_addr=inet_addr("5.6.7.8")}, [28->16]) = 0

close(3)= 0
socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_IP) = 3
connect(3, {sa_family=AF_INET6, sin6_port=htons(636),  
inet_pton(AF_INET6, "2a01:::101", _addr),  
sin6_flowinfo=htonl(0), sin6_scope_id=0}, 28) = 0
getsockname(3, {sa_family=AF_INET6, sin6_port=htons(44501),  
inet_pton(AF_INET6, "2001:::2", _addr),  
sin6_flowinfo=htonl(0), sin6_scope_id=0}, [28]) = 0

close(3)= 0
socket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3
fcntl(3, F_SETFD, FD_CLOEXEC)   = 0
setsockopt(3, SOL_SOCKET, SO_KEEPALIVE, [1], 4) = 0
setsockopt(3, SOL_TCP, TCP_NODELAY, [1], 4) = 0



connect(3, {sa_family=AF_INET6, sin6_port=htons(636),  
inet_pton(AF_INET6, "2a01:::101", _addr),  
sin6_flowinfo=htonl(0), sin6_scope_id=0}, 28) = ? ERESTARTSYS (To be  
restarted if SA_RESTART is set)

--- SIGALRM {si_signo=SIGALRM, si_code=SI_KERNEL} ---

 WTF??? Why IPv6 here...?


openat(AT_FDCWD, "/usr/share/locale/locale.alias", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0644, st_size=2995, ...}) = 0
read(4, "# Locale name alias data base.\n#"..., 4096) = 2995
read(4, "", 4096)   = 0
close(4)= 0
openat(AT_FDCWD,  
"/usr/share/locale/en_US/LC_MESSAGES/monitoring-plugins.mo", O_RDONLY)  
= -1 ENOENT (No such file or directory)
openat(AT_FDCWD,  
"/usr/share/locale/en/LC_MESSAGES/monitoring-plugins.mo", O_RDONLY) =  
-1 ENOENT (No such file or directory)

fstat(1, {st_mode=S_IFCHR|0620, st_rdev=makedev(0x88, 0x3), ...}) = 0
write(1, "CRITICAL - Socket timeout after "..., 43CRITICAL - Socket  
timeout after 10 seconds

) = 43
exit_group(2)   = ?
+++ exited with 2 +++
```

Hope this makes sense to someone and that there is a proper upstream  
issue tracker to forward this problem to. If it gets addressed by  
someone, a fix-up for buster would be great (I'd volunteer to test and  
handle the SRU for this).


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpE8KrOoRsjq.pgp
Description: Digitale PGP-Signatur


Bug#939292: puppet-development-kit

2020-07-17 Thread Gabriel Filion
Hello Thorsten,

On 2020-07-17 4:39 p.m., Thorsten Alteholz wrote:
> do you make progress with uploading puppet-development-kit? Do you need
> a hand?

thanks for suggesting your help!

the current situation is that I've packaged "most of the dependencies"
with help from folks in the ruby team.

I've sent a progression update on the puppet packaging list:

https://alioth-lists.debian.net/pipermail/pkg-puppet-devel/2020-July/012146.html

to summarize the current status:

* I'm stuck on ruby-spdx-licenses : I've asked upstream and SPDX about
what licensing should be applied to the .json file that the library
"vendors" and I still haven't received any feedback from SPDX. I
*believe* that some form of creative commons license could apply given
what I've found on their website (see details on the puppet pkg mailing
list).
  * this also blocks metadata-json-lint -- maybe we can start work on
packaging this thing regardless of the licensing issues for
spdx-licenses, then we'll be closer to the goal.

* I've worked on ruby-pathspec and I'm almost done with it. if I can
find some free time soon, I'll try and upload it to debian archives.

* the next "easy" batch of dependencies is ruby-rspec-puppet-facts,
facterdb and jgrep.



signature.asc
Description: OpenPGP digital signature


Bug#964670: gsettings-qt: FTBFS: QQmlComponent: Component is not ready

2020-07-17 Thread Mike Gabriel

Hi,

On  Fr 17 Jul 2020 16:43:39 CEST, Boyuan Yang wrote:


Control: reopen 964670
X-Debbugs-CC: sunwea...@debian.org

Hi Mike,

It seems that the latest upload still did not solve this problem and
all buildd builds are failing.


ACK. Will take a look.

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpsaJYpJAazx.pgp
Description: Digitale PGP-Signatur


Bug#964318: gosa login broken with PHP 7.4

2020-07-13 Thread Mike Gabriel

Control: forwarded -1 https://github.com/gosa-project/gosa-core/pull/33

Hi,

On  Do 09 Jul 2020 21:54:34 CEST, Wolfgang Schweer wrote:


On Mon, Jul 06, 2020 at 12:05:44PM +0200, Wolfgang Schweer wrote:

In both encrypt and decrypt cases, the chosen cipher method seems to
return 0.


This is the case because the chosen method (aes-256-ecb) doesn't use an
initialization vector ($iv) at all, causing its length ($ivlen) to be 0,
see e.g. https://usr.ed48.com/php/ssl/?xf=7

So the encrypt/decrypt implementation seems to have been sort of wrong
before (and only now with PHP 7.4 an error is thrown).

Please check and test the attached changes to
/usr/share/gosa/include/functions.inc and
/usr/sbin/gosa-encrypt-passwords; works for me, but then my skills are
low level and this is a quite sensitive issue.

Wolfgang


patch submitted upstream.

https://github.com/gosa-project/gosa-core/pull/33

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpO_IaXRLe8T.pgp
Description: Digitale PGP-Signatur


Bug#953489: fixed in php-horde-text-filter-jsmin 1.0.2-8

2020-07-13 Thread Mike Gabriel

Control: close -1

Hi Ivo,

On  Fr 10 Jul 2020 21:46:28 CEST, Ivo De Decker wrote:


On 7/10/20 8:57 PM, Mike Gabriel wrote:

Hi Ivo,


Hi Mike,

I have asked for white-listing some days back. I have pinged  
Philipp Kern explicitly once more (he white-listed  
php-horde-javascriptminify-jsmin just the other day...).


I will close this bug, once the white-listing is in place. I am not  
in a hurry with testing migration, as we need to fix autopkgtests  
first, anyway.


OK. I just wanted to make sure you were aware of the situation.

Thanks,

Ivo


Philipp just added the pkg to the buildd non-free whitelist.

Thus, closing this bug.

Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4351) 486 14 27

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgpCKFHlMzy_T.pgp
Description: Digitale PGP-Signatur


Bug#961874: Demote the dependency on Xfce libraries to suggests or recommends

2020-07-12 Thread Gabriel F. T. Gomes
Control: tags -1 + confirmed

On 30 May 2020, Amr Ibrahim wrote:
>
> In Debian pragha depends on libxfce4ui-2-0 and libxfce4util7, however, 
> according to upstream*, pragha is independent of Xfce and libxfce4ui is 
> optional and not strictly required to run the app. So I think the 
> depends is too strong especially when the app is installed in a non-Xfce 
> environment. So please demote the Xfce libraries to suggests or 
> recommends, whichever you see more appropriate.

To remove the dependency, I need to build pragha without libxfce4ui,
which disables some of pragha's features. I'm testing this new build to
understand what the removed features do.

Thanks for the report,
Gabriel



Bug#964318: gosa login broken with PHP 7.4

2020-07-10 Thread Mike Gabriel

Hi Wolfgang,

On  Do 09 Jul 2020 21:54:34 CEST, Wolfgang Schweer wrote:


On Mon, Jul 06, 2020 at 12:05:44PM +0200, Wolfgang Schweer wrote:

In both encrypt and decrypt cases, the chosen cipher method seems to
return 0.


This is the case because the chosen method (aes-256-ecb) doesn't use an
initialization vector ($iv) at all, causing its length ($ivlen) to be 0,
see e.g. https://usr.ed48.com/php/ssl/?xf=7

So the encrypt/decrypt implementation seems to have been sort of wrong
before (and only now with PHP 7.4 an error is thrown).

Please check and test the attached changes to
/usr/share/gosa/include/functions.inc and
/usr/sbin/gosa-encrypt-passwords; works for me, but then my skills are
low level and this is a quite sensitive issue.

Wolfgang


thanks for looking at this. I'll handle communication with upstream  
and gosa testing + fixing.


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpPPItmnZbV0.pgp
Description: Digitale PGP-Signatur


Bug#964811: dpkg-maintscript-helper: error: file '/usr/share/horde/themes/*' not owned by package 'php-horde'

2020-07-10 Thread Mike Gabriel

HI Andy,

On  Fr 10 Jul 2020 20:03:06 CEST, Andy Dorman wrote:


Package: php-horde
Version: 5.2.21+debian1-1
Severity: important

Dear Maintainer,

This is similar to #778750, but different enough that it probably  
needs a separate ticket.


We use Horde for it's very complete and robust webmail component.

Over the years we have developed over 100 different themes (most are  
simple color variations),

all stored in /usr/share/horde/themes/...

yorick:/etc# ls /usr/share/horde/themes/
azur  chargers-SD luc   mustangs-THHS
bluemoon  chargers-UAH lucblue   mustangs-TMC
bluewhite  chargers-UNH mobile   NeXTgrey
bulldogs-AAM  cornflower mountaineers-ASU   postnuke
bulldogs-C  deacons-BC mountaineers-BC   print
bulldogs-default  deacons-defaultmountaineers-default  purple
bulldogs-FSU  deacons-EBC mountaineers-EHS   shadow
bulldogs-FU  deacons-WFU mountaineers-EOU   silver
bulldogs-GU  default mountaineers-LHS   simplex
bulldogs-H  fadetogreen mountaineers-MBHS   sounds
bulldogs-LTU  fanmail mountaineers-MSMC   tango-blue
bulldogs-MSU  fanmail.css mountaineers-MU   usarmy
bulldogs-SU  fanmail-login.css  mountaineers-SHS   usarmy1
bulldogs-UGA  fanmail_login.css  mountaineers-SVC   usarmy10
bulldogs-YU  gamecocks-default  mountaineers-WHS   usarmy11
burntorange  gamecocks-JSU  mountaineers-WSC   usarmy12
camo  gamecocks-SCHS mountaineers-WVU   usarmy13
camouflage  gamecocks-SHS  mozilla   usarmy14
chargers-AA  gamecocks-USC  mustangs-CPSU   usarmy15
chargers-ACC  gennevilliers  mustangs-default   usarmy2
chargers-BCU  graphics mustangs-KMHS   usarmy3
chargers-CSHS  green mustangs-MC   usarmy4
chargers-default  grey mustangs-MIC   usarmy5
chargers-ELCA  hi-contrast mustangs-MSU   usarmy6
chargers-ETHS  hotpink mustangs-RVHS   usarmy7
chargers-McCHS  ideas mustangs-SMSU   usarmy8
chargers-NHS  lavander mustangs-SMU   usarmy9
chargers-PCHS  lightblue mustangs-stjbb

Possibly this was not the correct way to handle color themes?

When we tried to update this server yesterday we saw several  
thousand dpkg errors like this,

one for every directory & file in our themes directory:

dpkg-maintscript-helper: error: file  
'/usr/share/horde/themes/usarmy10' not owned by package 'php-horde'


And finally after all the individual file and directory errors...

dpkg-maintscript-helper: error: directory '/usr/share/horde/themes'  
contains files not owned by package php-horde, cannot switch to  
symlink


dpkg: error processing archive  
/var/cache/apt/archives/php-horde_5.2.23+debian0-4_all.deb (--unpack):
 new php-horde package pre-installation script subprocess returned  
error exit status 1



If our situation is unique and it is too much trouble to handle our case,
we are fine with doing the appropriate file moves and adding  
symlinks manually,
but we do not know what needs to be done. Any help in that direction  
would be appreciated.


Thank you.


Thanks for reporting this. Note that #778750 has been settled  
meanwhile. With just the default theme, the package upgrade flow now  
works.


The question now is, how to handle custom themes copied to  
/usr/share/horde/[/]themes.


My suggestion would be:

  * abort if custom theme folders are detected and provide a debconf  
notification

that tells what to do (move the custom theme folders out of the way, or
rather to: /etc/horde/themes-available.d//
  * then we need a nice script "horde-enable-theme" (and  
"horde-disable-theme")

to get the symlinking in /etc/horde/themes-enabled.d//

Please note, that  and  are swapped in  
themes-available.d and themes-enabled.d


The above explanation should also show how to deal with your personal upgrade.

Other than that: would you be interested in shipping your theme  
variations as a Debian package?


Greets,
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpQUrI99xa4s.pgp
Description: Digitale PGP-Signatur


Bug#953489: fixed in php-horde-text-filter-jsmin 1.0.2-8

2020-07-10 Thread Mike Gabriel

Hi Ivo,

On  Fr 10 Jul 2020 20:07:46 CEST, Ivo De Decker wrote:


Control: reopen -1

On Tue, Jun 30, 2020 at 05:48:37AM +, Debian FTP Masters wrote:

   * d/control: Add 'XS-Autobuild: yes' flag. (Closes: #953489).


Hi,

Adding this isn't enough to allow auto-building. It also needs to be
whitelisted as described in

https://www.debian.org/doc/manuals/developers-reference/pkgs.html#non-free-buildd

As long as this hasn't happened, the autobuild won't happen. So I suggest you
do a binary upload in the mean time, to allow the package to migrate to
testing. Note that binaries uploaded by maintainers for sources in  
contrib and

non-free are allowed to migrate to testing.

Thanks,

Ivo


I have asked for white-listing some days back. I have pinged Philipp  
Kern explicitly once more (he white-listed  
php-horde-javascriptminify-jsmin just the other day...).


I will close this bug, once the white-listing is in place. I am not in  
a hurry with testing migration, as we need to fix autopkgtests first,  
anyway.


Mike


--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4351) 486 14 27

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgp7cGiBzoW66.pgp
Description: Digitale PGP-Signatur


Bug#964755: i3: Memory leak consumes all available memory

2020-07-09 Thread Gabriel Krisman Bertazi
Michael Stapelberg  writes:

> Is this fixed with commit
> https://github.com/i3/i3/commit/025743eaf9c993e57c7fdd20127078b835bcd2c0
> already (not yet released)? Or are we talking about a separate leak?

I'm not sure. I wasn't aware of this commit but it sounds very
promising.  Let me give it some test and report back.

-- 
Gabriel Krisman Bertazi



Bug#964755: i3: Memory leak consumes all available memory

2020-07-09 Thread Gabriel Krisman Bertazi
Package: i3
Version: 4.18-1
Severity: important

Dear Maintainer,

I've seen my xorg grow in memory usage through the course of the day,
until it consumes all RAM available and starts swapping, even when the
machine is left idle.  This is 100% reproducible on my system, after
killing X and restarting it, it starts to eat memory again.

I'm reporting this against i3 instead of xorg, because I found other
Debian derivative users reporting this issue against i3, and it doesn't
seem to reproduce on other X based WM.

I reproduced this on a machine after a fresh install of bullseye, with
the package version below.

In my system, it is taking around 1 day to fill up 10GB of RAM.

I'm happy to apply patches and test packages you provide to help debug
this.

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_CA:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages i3 depends on:
ii  i3-wm  4.18-1

Versions of packages i3 recommends:
ii  dunst   1.4.1-1
ii  i3lock  2.11.1-1
ii  i3status2.13-3
ii  suckless-tools  45-1

i3 suggests no packages.

-- no debconf information



Bug#964447: plasma-workspace: please split out xembed-sni-proxy into separate bin:pkg

2020-07-07 Thread Mike Gabriel

Package: src:plasma-workspace
Severity: whishlist
X-Debbugs-Cc: debian-m...@lists.debian.org

Hi all,

I just stumbled over the xembed-sni-proxy executable from  
src:plasma-workspace. I plan to support it in  
ayatana-indicator-application [1] (and thus in the  
mate-indicator-applet of the MATE desktop environment).


For a cross-desktop use case, it would be nice to have  
xembed-sni-proxy available as a standalone package (that does not pull  
in the complete KDE package stack).


Would that be a feasible thing to do for plasma-workspace in Debian?

Thanks+Greets,
Mike

[1]  
https://github.com/AyatanaIndicators/ayatana-indicator-application/issues/1

--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpRA1i3XPoDL.pgp
Description: Digitale PGP-Signatur


Bug#964147: freerdp2-x11: xfreerdp fails with symbol lookup error

2020-07-05 Thread Mike Gabriel

Control: retitle -1 enforce same version for installed freerdp2 bin:pkgs
Control: severity -1 normal

Hi,

On  Do 02 Jul 2020 22:22:34 CEST, Michael Meier wrote:


On 02.07.20 10:06, Michael Meier wrote:

Package: freerdp2-x11
Version: 2.1.2+dfsg1-1
Severity: grave
Justification: renders package unusable

I've just updated xfreerdp. The new versions can't be executed.it  
fails with:


xfreerdp: symbol lookup error: /usr/lib/x86_64-linux-gnu/libfreerdp-
client2.so.2: undefined symbol: msusb_msconfig_write

The previous version i used: 2.0.0~git20190204.1.2693389a+dfsg1-2~bpo10+1
worked well.

Propably some library version dependency which isn't correctly stated in the
.deb package?



so after some trying out I've foudn out that I've also had to update:
libfreerdp-client2-2:amd64  
2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u1 -> 2.1.2+dfsg1-2


then it works.
The version dependency seems to be wrong somewhere...


You obviously have a half-broken setup as you seem to mix  
buster-backports packages and packages from unstable. This may well  
fail for several reasons.


On the other hand, it might be sensible to enforce all freerdp2  
bin:pkgs to be from the same version / build.


This, I think we should enforce this via debian/control.

Will look into this, but with downgraded severity.

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpH3Q81RVNTO.pgp
Description: Digitale PGP-Signatur


Bug#964285: asterisk: New upstream release: 17.5.1

2020-07-04 Thread Gabriel Filion
Source: asterisk
Severity: wishlist

Hello dear maintainers!

First, thanks for your work for keeping this package alive in debian. I use it
for work and it's greatly useful.

I've just had a quick look at upstream and it would seem as though the version
that's presently in bullseye is quite late with regards to the upstream latest
release.

The latest release is as of this writing 17.5.1. It would be fantastic to get
the 17.x branch in testing before bullseye reaches its freeze cycle.

Cheers, and many thanks in advance!

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.6.0-1-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_CA.utf8, LC_CTYPE=en_CA.utf8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_CA.utf8), LANGUAGE=en_CA.utf8 (charmap=UTF-8) (ignored: LC_ALL set to 
en_CA.utf8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#778750: theme still broken, problem with directory structure and symlink

2020-07-03 Thread Mike Gabriel

Hi Ivan Sergio,

On  Fr 03 Jul 2020 18:41:19 CEST, Ivan Sergio Borgonovo wrote:


I've just read more carefully your follow up:


The theming folder in /etc/ also needs to be moved a bit:
/etc/horde/themes-available.d/default ->   
/etc/horde/themes-available.d/default/horde


OK, it was on purpose... but it seems it's not working, at least here.

I'm going to try to do some further tests and see if I'd missed  
something with the cache... but once I "fixed" it as described in  
previous post and refreshed the cache it started to work.


I find very unlikely that both the packaged directory structure and  
my structure can both work, one has to be wrong.


Yours was correct, mine was wrong. I have fiddled with the  
themes-enabled.d/ subfolder now and swapped the order compared to  
themes-available.d/:


  /etc/horde/themes-available.d//

vs.

  /etc/horde/themes-enabled.d//

I changed the /usr/share/horde/[/]themes symlink now and point it to

  /etc/horde/themes-enabled.d/

This should fix thing. However, it makes enabling/disabling a theme  
(if there were more than on) more complex. I will see to providing a  
script for this.


Please retry. Thanks for the feedback ping-pong.

MIke
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpuTBl_2WY_M.pgp
Description: Digitale PGP-Signatur


Bug#778750: theme still broken, problem with directory structure and symlink

2020-07-03 Thread Mike Gabriel

On  Fr 03 Jul 2020 18:41:19 CEST, Ivan Sergio Borgonovo wrote:


I've just read more carefully your follow up:


The theming folder in /etc/ also needs to be moved a bit:
/etc/horde/themes-available.d/default ->   
/etc/horde/themes-available.d/default/horde


OK, it was on purpose... but it seems it's not working, at least here.

I'm going to try to do some further tests and see if I'd missed  
something with the cache... but once I "fixed" it as described in  
previous post and refreshed the cache it started to work.


I find very unlikely that both the packaged directory structure and  
my structure can both work, one has to be wrong.


I forgot to mention:

the latest fixes should be in:

  php-horde 5.2.23+debian0-3
  php-horde-imp 6.2.26-2
  php-horde-gollem 3.0.13-4

I am still unsure what your dpkg problem was. Maybe it is gone now(?).

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp96szqns3x6.pgp
Description: Digitale PGP-Signatur


Bug#778750: theme still broken, problem with directory structure and symlink

2020-07-03 Thread Mike Gabriel

Hi,

thanks for testing the upgrade. Sorry that it failed again. Let's see...

On  Fr 03 Jul 2020 18:29:40 CEST, Ivan Sergio Borgonovo wrote:


I just safe-upgraded some stuff and I came across 2 different problems:

1)

dpkg: warning: unable to delete old directory  
'/usr/share/horde/themes/default/graphics': Directory not empty


I can't hide those. Most users won't see those. They only occur when  
upgrading from 5.2.23+debian0-1.



...

dpkg: dependency problems prevent configuration of php-horde-imp:
 php-horde-imp depends on php-horde (>= 5.2.23+debian0-2~); however:
  Version of php-horde on system is 5.2.23+debian0-1.

dpkg: error processing package php-horde-imp (--configure):
 dependency problems - leaving unconfigured
Setting up php-horde-service-weather (2.5.4-7) ...
dpkg: dependency problems prevent configuration of php-horde:
 php-horde-service-weather (2.5.4-7) breaks php-horde (<<  
5.2.23+debian0-2~) and is installed.

  Version of php-horde to be configured is 5.2.23+debian0-1.

dpkg: error processing package php-horde (--configure):
 dependency problems - leaving unconfigured
Setting up re2c (1.3-2) ...
dpkg: dependency problems prevent configuration of php-horde-gollem:
 php-horde-gollem depends on php-horde (>= 5.2.23+debian0-1~); however:
  Package php-horde is not configured yet.
 php-horde-gollem depends on php-horde (<< 6.0.0~alpha1); however:
  Package php-horde is not configured yet.

dpkg: error processing package php-horde-gollem (--configure):
 dependency problems - leaving unconfigured


Oh well...


...

Errors were encountered while processing:
 php-horde-imp
 php-horde
 php-horde-gollem

This may be or may not be related to the fact that I made manual  
changes to /etc/horde/ and /usr/share/themes to make them work as I  
thought was expected.


I am not sure, yet. I'll need to investigate deeper.


2)

root@caronte:~# ls /etc/horde/themes-available.d/
default

but

root@caronte:~# ls /usr/share/horde/themes
block  embed.css  facebook.css  feed-rss.xsl  graphics  ie8.css  
info.php  mozilla.css  opera.css  rtl.css  screen.css  smartmobile  
sounds  webkit.css


wouldn't it had to be all this inside /usr/share/horde/themes/default?


Oh yes. You are right! Damn!


furthermore it seems that the content of

/etc/horde/themes-available.d/default/horde

should actually be inside

/etc/horde/themes-available.d/default/


No. All other Horde applications have their own  
/themes/ dir. So this was on purpose.



I think I've manually fixed it...



[...]


Sorry for the hassle once more!

It would be nice if there was a way to refresh the cache without  
tweaking the conf.php file.


Yeah. Maybe I can provide a script for that. Will see...

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp21feW7pxoA.pgp
Description: Digitale PGP-Signatur


Bug#778750: horde un-themed after upgrade

2020-07-02 Thread Mike Gabriel

Hi Ivan Sergio,

On  Do 02 Jul 2020 15:21:31 CEST, Mike Gabriel wrote:


Hi Ivan Sergio,

On  Do 02 Jul 2020 12:18:15 CEST, Ivan Sergio Borgonovo wrote:

Unfortunately something went wrong with this update or something  
should be added in the changelog.


As soon as I updated php-horde, horde rendered un-themed.

Everything in /etc/horde/themes-* seems fine. Horde cache in /tmp  
has been cleared but horde remains un-themed and version displayed  
is still 5.2.22


apache and php-fpm have been restarted.

Horde Administration > Configuration have been updated.

thanks in advance for your help


Urgh... I am sorry for this. Please note that I am currently in the  
process of getting Horde fully into shape for Debian 11 and things  
are not as ready as they seem.


The theme moval to /etc/ was not thought through until the very end,  
I fear...


I have now fixed php-horde and it should cleanly upgrade from any  
previous php-horde version, even the previous broken one.


The theming folder in /etc/ also needs to be moved a bit:
/etc/horde/themes-available.d/default ->  
/etc/horde/themes-available.d/default/horde


The package should handle that fairly ok.


I just identified several other packages that also need this move:

php-horde-ansel


-> not yet in unstable again (license issue)


php-horde-gollem
php-horde-imp


-> these two have been adapted to the new theme location, too.

Let me know, if the upgrade for those two work ok for you.


php-horde-ingo
php-horde-kronolith
php-horde-mnemo
php-horde-nag
php-horde-passwd
php-horde-service-weather
php-horde-sesha
php-horde-trean
php-horde-turba
php-horde-whups
php-horde-wicked


These are on my list for tomorrow night.

If you feel like helping, maybe you can file individual RC bugs  
against all the src:php-horde-* pkgs named above (except ansel, it  
has not yet been uploaded again), so we have a means for tracking  
this flaw.


Please don't do any bug reports any more. I have the issue on my list.  
Sorry for causing you pain with this.


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpCjN8pnOv1S.pgp
Description: Digitale PGP-Signatur


Bug#778750: horde un-themed after upgrade

2020-07-02 Thread Mike Gabriel

Hi Ivan Sergio,

On  Do 02 Jul 2020 12:18:15 CEST, Ivan Sergio Borgonovo wrote:

Unfortunately something went wrong with this update or something  
should be added in the changelog.


As soon as I updated php-horde, horde rendered un-themed.

Everything in /etc/horde/themes-* seems fine. Horde cache in /tmp  
has been cleared but horde remains un-themed and version displayed  
is still 5.2.22


apache and php-fpm have been restarted.

Horde Administration > Configuration have been updated.

thanks in advance for your help


Urgh... I am sorry for this. Please note that I am currently in the  
process of getting Horde fully into shape for Debian 11 and things are  
not as ready as they seem.


The theme moval to /etc/ was not thought through until the very end, I fear...

I just identified several other packages that also need this move:

php-horde-ansel
php-horde-gollem
php-horde-imp
php-horde-ingo
php-horde-kronolith
php-horde-mnemo
php-horde-nag
php-horde-passwd
php-horde-service-weather
php-horde-sesha
php-horde-trean
php-horde-turba
php-horde-whups
php-horde-wicked

I will prepare uploads/fixes within the couple of days.

If you feel like helping, maybe you can file individual RC bugs  
against all the src:php-horde-* pkgs named above (except ansel, it has  
not yet been uploaded again), so we have a means for tracking this flaw.


Thanks for noticing and getting in touch so quickly.
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpD8aNwQbV4c.pgp
Description: Digitale PGP-Signatur


Bug#951537: Resolved in 2.1.5-1 for unstable

2020-07-01 Thread Mike Gabriel

Control: close -1
Control: fixed -1 2.1.5-1

This issue has now been also resolved in Debian unstable via upload of  
php-horde-2.1.5-1. Unfortunately, closing this bug via d/changelog has  
been left out.


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp3YcaOdqpW2.pgp
Description: Digitale PGP-Signatur


Bug#949055: autofs: FTBFS with libxml2 2.9.10 (uses xml2-config)

2020-06-29 Thread Mike Gabriel

On  Mo 29 Jun 2020 15:25:26 CEST, Hugh McMaster wrote:


Hallo Andreas,

Did you ever have time to follow up with upstream about your patch?

I saw they had some feedback that needs to be addressed before the
patch can be merged.

It looks very straightforward to fix. If will not have time, I am
happy to take care of this and resubmit the final patch under your
name.

Hugh


Wow. That'd be awesome helping out on this, Hugh.

Thanks.
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp44kTBpUjaq.pgp
Description: Digitale PGP-Signatur


Bug#881719: libcdio 2.1.0 and lubcdio++

2020-06-29 Thread Gabriel F. T. Gomes
Hi, Vasyl,

On Mon, 29 Jun 2020, Vasyl Gello wrote:

> The MR I amended after Gabriel's review is stuck since June 2nd.

Yes, my bad.

> Gabriel, can you please revise the MR and upload the fixed package to the 
> queue?

Will do (I'll try to do it today)! Thanks for the heads-up.

:)



Bug#693782: auto.master.d documentation

2020-06-29 Thread Mike Gabriel

On  So 28 Jun 2020 19:18:48 CEST, Sam Morris wrote:


On Tue, Nov 20, 2012 at 11:17:09AM +0100, Stefan Skoglund wrote:

The documentation for how to use the 'auto.master.d' feature is really
non-existing. What exists is a sketch from the designer for what it is
(or how it should be.)


/etc/auto.master now has comments that describe how to use the feature:

# Include /etc/auto.master.d/*.autofs
# To add an extra map using this mechanism you will need to add
# two configuration items - one /etc/auto.master.d/extra.autofs file
# (using the same line format as the auto.master file)
# and a separate mount map (e.g. /etc/auto.extra or an auto.extra NIS 
map)
# that is referred to by the extra.autofs file.
#
+dir:/etc/auto.master.d

For instance, I have the following:

$ cat /etc/auto.master.d/work.autofs
/workfile:/etc/auto.workbrowse

$ cat /etc/auto.work
	server1-share1-fstype=cifs,sec=krb5i,cruid=$CRUID,multiuser  
://server1.example.com/share1
	server2-share1-fstype=cifs,sec=krb5i,cruid=$CRUID,multiuser  
://server2.example.com/share1


In addition, auto.master(5) describes the + inclusion feature:

Additionally, a map may be included from its source as if it were itself
present in the master map by including a line of the form:

+[maptype[,format]:map options]

and automount(8) will process the map according to the specification
described below for map entries.

... the format of a master map entry:

mount-point [map-type[,format]:]map [options]

... and describes the 'dir' map-type:

This map type can be used at + master map including notation. The
contents of files under given directory are included to the master
map. The name of file to be included must be ended with ".autofs". A
file will be ignored if its name is not ended with the suffix. In
addition a dot file, a file which name is started with "." is also
ignored.


Thanks!
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpAituwRnY5K.pgp
Description: Digitale PGP-Signatur


Bug#963033: linux-image-arm64: kexec loses EFI system tables with Debian kernels

2020-06-26 Thread Gabriel Krisman Bertazi


Hi,

This is introduced by a Debian specific patch
features/all/lockdown/arm64-add-kernel-config-option-to-lock-down-when.patch

The following patch fixes it.

>8
From: Gabriel Krisman Bertazi 
Subject: [PATCH] arm64: Don't disable EFI boot mode on linux,uefi-secure-boot
 table absence

The Debian specific out-of-tree kernel patch titled ("arm64: add kernel
config option to lock down when in Secure Boot mode") introduces a
regression for EFI-booted systems that don't have a
"linux,uefi-secure-boot" FDT entry.

In these systems, when the table is not found, it causes the FDT
function to error out and not return other UEFI tables, in particular
the System Table, which makes the kernel think it is not running on EFI
mode.

Instead, let the EFI mode boot continue with the correct System Table,
and consider the efi secureboot mode as unknown.

This regression was found at least as early as the debian port to 5.4.19,
but it still affects the most recent 5.7.6 debian kernel.

Signed-off-by: Gabriel Krisman Bertazi 
---
 drivers/firmware/efi/arm-init.c  |  2 +-
 drivers/firmware/efi/fdtparams.c | 18 +++---
 2 files changed, 12 insertions(+), 8 deletions(-)

diff --git a/drivers/firmware/efi/arm-init.c b/drivers/firmware/efi/arm-init.c
index 78fcfbe3ddb9..fcb60320e77a 100644
--- a/drivers/firmware/efi/arm-init.c
+++ b/drivers/firmware/efi/arm-init.c
@@ -206,7 +206,7 @@ void __init efi_init(void)
 {
struct efi_memory_map_data data;
u64 efi_system_table;
-   u32 secure_boot;
+   u32 secure_boot = efi_secureboot_mode_unknown;
 
/* Grab UEFI information placed in FDT by stub */
efi_system_table = efi_get_fdt_params(, _boot);
diff --git a/drivers/firmware/efi/fdtparams.c b/drivers/firmware/efi/fdtparams.c
index 152ca7cfccc9..78c36e582408 100644
--- a/drivers/firmware/efi/fdtparams.c
+++ b/drivers/firmware/efi/fdtparams.c
@@ -96,13 +96,15 @@ u64 __init efi_get_fdt_params(struct efi_memory_map_data 
*mm, u32 *secure_boot)
struct {
void*var;
int size;
+   int required;
+
} target[] = {
-   [SYSTAB] = { ,   sizeof(systab) },
-   [MMBASE] = { >phys_map, sizeof(mm->phys_map) },
-   [MMSIZE] = { >size, sizeof(mm->size) },
-   [DCSIZE] = { >desc_size,sizeof(mm->desc_size) },
-   [DCVERS] = { >desc_version, sizeof(mm->desc_version) },
-   [SBMODE] = { secure_boot,   sizeof(*secure_boot) },
+   [SYSTAB] = {,sizeof(systab), 1},
+   [MMBASE] = {>phys_map,  sizeof(mm->phys_map), 1},
+   [MMSIZE] = {>size,  sizeof(mm->size), 1},
+   [DCSIZE] = {>desc_size, sizeof(mm->desc_size), 1},
+   [DCVERS] = {>desc_version,  sizeof(mm->desc_version), 1},
+   [SBMODE] = {secure_boot,sizeof(*secure_boot), 0 },
};
 
BUILD_BUG_ON(ARRAY_SIZE(target) != ARRAY_SIZE(name));
@@ -125,8 +127,10 @@ u64 __init efi_get_fdt_params(struct efi_memory_map_data 
*mm, u32 *secure_boot)
continue;
if (!j)
goto notfound;
+
pr_err("Can't find property '%s' in DT!\n", pname);
-   return 0;
+   if (target[j].required)
+   return 0;
}
return systab;
}
-- 
2.27.0



Bug#963724: charybdis: The init script's "reload" action does not perform the intended reload

2020-06-25 Thread Gabriel Filion
Package: charybdis
Version: 4.1.1-1+b1
Severity: normal

Hello,

I've found out that the init script, as it is currently shipped by this
package does not properly perform its "reload" action.

This means that when one changes the configuration, or rotates the TLS
certificates, the service does not get to see the new configurations or
certificates.

I've found out that this was caused by the fact that start-stop-daemon refused
to act when requested to find a process by only using a PIDFILE which is not
owned by root, which is what the "reload" action is currently doing.

Adding "--user $NAME" to the action makes start-stop-daemon more confident and
permits the reload action to actually happen.

See the patch sent to salsa: 
https://salsa.debian.org/debian/charybdis/-/merge_requests/1

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.6.0-1-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_CA.utf8, LC_CTYPE=en_CA.utf8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_CA.utf8), LANGUAGE=en_CA.utf8 (charmap=UTF-8) (ignored: LC_ALL set to 
en_CA.utf8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages charybdis depends on:
ii  adduser  3.118
ii  init-system-helpers  1.57
ii  libc62.30-8
ii  libltdl7 2.4.6-14
ii  libmbedcrypto3   2.16.5-1
ii  libmbedtls12 2.16.5-1
ii  libmbedx509-02.16.5-1
ii  libsqlite3-0 3.32.3-1
ii  lsb-base 11.1.0
ii  zlib1g   1:1.2.11.dfsg-2

charybdis recommends no packages.

charybdis suggests no packages.



Bug#949196: libzypp: diff for NMU version 17.7.0-1.1

2020-06-22 Thread Mike Gabriel
Hi,

Am Montag, 22. Juni 2020 schrieb Giovanni Mascellani:
> Hi,
> 
> Il 20/06/20 19:01, Mike Gabriel ha scritto:
> > Thanks for patching libzypp. Your NMU is ok, I will include your
> > .debdiff on its VCS. In fact, I am considering orphaning libzypp and
> > zypper in Debian. Do you have interest in taking over?
> 
> Ugh, I just realized I stupidly embedded the amd64 architecture in my
> patch, leading to obvious FTBFS on the other archs. It is ok for you if
> I directly NMU libzypp replacing x86_64-linux-gnu with
> $(DEB_HOST_MULTIARCH)?

yes, please.

Mike

-- 
Gesendet von meinem Fairphone (powered by SailfishOS)

Bug#963243: linux-image-5.6.0-2-amd64: percpu ref mismatch after switching to atomic

2020-06-21 Thread Gabriel Francisco
Package: src:linux
Version: 5.6.14-1
Severity: normal

Dear Maintainer,

I found this kernel call trace in dmesg after an upgrade. I believe it might 
be important to someone because it happened during a interruption handling
or something. Feel free to close otherwise.

The computer seems to work just fine.

Thanks

-- Package-specific info:
** Version:
Linux version 5.6.0-2-amd64 (debian-ker...@lists.debian.org) (gcc version 9.3.0 
(Debian 9.3.0-13)) #1 SMP Debian 5.6.14-1 (2020-05-23)

** Command line:
BOOT_IMAGE=/vmlinuz-5.6.0-2-amd64 root=/dev/mapper/iron-system ro net.ifnames=1 
biosdevname=0 cgroup_enable=memory cgroup_enable=cpuset swapaccount=1 
scsi_mod.use_blk_mq=y dm_mod.use_blk_mq=y quiet

** Tainted: W (512)
 * kernel issued warning

** Kernel log:
[1924692.842450] systemd[1]: systemd 245.6-1 running in system mode. (+PAM 
+AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT 
+GNUTLS +ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 
default-hierarchy=hybrid)
[1924692.862637] systemd[1]: Detected architecture x86-64.
[1924692.908327] systemd[1]: /lib/systemd/system/squid.service:15: PIDFile= 
references a path below legacy directory /var/run/, updating /var/run/squid.pid 
\xe2\x86\x92 /run/squid.pid; please update the unit file accordingly.
[1924692.916731] systemd[1]: /lib/systemd/system/krb5-kdc.service:7: PIDFile= 
references a path below legacy directory /var/run/, updating 
/var/run/krb5-kdc.pid \xe2\x86\x92 /run/krb5-kdc.pid; please update the unit 
file accordingly.
[1924692.921101] systemd[1]: /lib/systemd/system/docker.socket:6: ListenStream= 
references a path below legacy directory /var/run/, updating 
/var/run/docker.sock \xe2\x86\x92 /run/docker.sock; please update the unit file 
accordingly.
[1924692.12] audit: type=1305 audit(1592733750.168:114388): op=set 
audit_pid=0 old=3072020 auid=4294967295 ses=4294967295 subj==unconfined res=1
[1924693.57] audit: type=1400 audit(1592733750.168:114389): 
apparmor="DENIED" operation="open" profile="/usr/sbin/apt-cacher-ng" 
name="/etc/ssl/openssl.cnf" pid=216596 comm="apt-cacher-ng" requested_mask="r" 
denied_mask="r" fsuid=126 ouid=0
[1924693.000942] audit: type=1131 audit(1592733750.168:114390): pid=1 uid=0 
auid=4294967295 ses=4294967295 subj==unconfined msg='unit=auditd comm="systemd" 
exe="/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
[1924693.004514] audit: type=1131 audit(1592733750.172:114391): pid=1 uid=0 
auid=4294967295 ses=4294967295 subj==unconfined msg='unit=rpc-svcgssd 
comm="systemd" exe="/lib/systemd/systemd" hostname=? addr=? terminal=? 
res=success'
[1924693.004981] audit: type=1131 audit(1592733750.172:114392): pid=1 uid=0 
auid=4294967295 ses=4294967295 subj==unconfined msg='unit=rpcbind 
comm="systemd" exe="/lib/systemd/systemd" hostname=? addr=? terminal=? 
res=success'
[1924693.005418] audit: type=1131 audit(1592733750.172:114393): pid=1 uid=0 
auid=4294967295 ses=4294967295 subj==unconfined msg='unit=dnsmasq 
comm="systemd" exe="/lib/systemd/systemd" hostname=? addr=? terminal=? 
res=success'
[1924693.007233] audit: type=1305 audit(1592733750.176:114394): op=set 
audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj==unconfined res=1
[1924693.007236] audit: type=1305 audit(1592733750.176:114395): op=set 
audit_pid=216608 old=0 auid=4294967295 ses=4294967295 subj==unconfined res=1
[1924693.034441] [ cut here ]
[1924693.034447] percpu ref (cgroup_bpf_release_fn) <= 0 (-6) after switching 
to atomic
[1924693.034458] WARNING: CPU: 1 PID: 1 at lib/percpu-refcount.c:160 
percpu_ref_switch_to_atomic_rcu+0x119/0x120
[1924693.034459] Modules linked in: veth xfrm_user xfrm_algo overlay fuse ufs 
qnx4 hfsplus hfs minix vfat msdos fat jfs xfs nf_conntrack_netlink xt_CHECKSUM 
tun rfkill cpufreq_userspace cpufreq_powersave cpufreq_conservative 
nfnetlink_log act_police sch_ingress cls_u32 sch_sfq sch_cbq nft_chain_nat 
xt_MASQUERADE nf_nat nft_counter xt_state xt_conntrack nf_conntrack 
nf_defrag_ipv6 nf_defrag_ipv4 xt_multiport ipt_REJECT nf_reject_ipv4 xt_tcpudp 
nft_compat nf_tables ip_set_hash_net ip_set nfnetlink binfmt_misc amdgpu 
snd_hda_codec_realtek snd_hda_codec_generic gpu_sched ledtrig_audio 
snd_hda_codec_hdmi ttm edac_mce_amd snd_hda_intel snd_intel_dspcfg 
drm_kms_helper snd_hda_codec kvm_amd snd_hda_core cec snd_hwdep kvm 
i2c_algo_bit sp5100_tco snd_pcm snd_timer ccp snd nct6775 joydev irqbypass 
evdev mfd_core wmi_bmof pcspkr watchdog k10temp soundcore rng_core sg button 
loop hwmon_vid acpi_cpufreq br_netfilter bridge stp llc parport_pc ppdev 
auth_rpcgss lp drm parport sunrpc ip_tables x_tables autofs4
[1924693.034494]  ext4 crc16 mbcache jbd2 btrfs blake2b_generic zstd_decompress 
zstd_compress dm_crypt dm_mod raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c crc32c_generic raid1 raid0 
multipath linear md_mod sd_mod hid_generic usbhid hid crc32_pclmul crc32c_intel 

Bug#949196: libzypp: diff for NMU version 17.7.0-1.1

2020-06-20 Thread Mike Gabriel
Hi,

Am Samstag, 20. Juni 2020 schrieb Giovanni Mascellani:
> Control: tags 949196 + patch
> Control: tags 949196 + pending
> 
> Dear maintainer,
> 
> I've prepared an NMU for libzypp (versioned as 17.7.0-1.1) and
> uploaded it to DELAYED/02. Please feel free to tell me if I
> should delay it longer.
> 
> Regards.

Thanks for patching libzypp. Your NMU is ok, I will include your .debdiff on 
its VCS. In fact, I am considering orphaning libzypp and zypper in Debian. Do 
you have interest in taking over?

Greets,
Mike
-- 
Gesendet von meinem Fairphone (powered by SailfishOS)

Bug#586413: ITA: tightvnc -- virtual network computing server software

2020-06-18 Thread Mike Gabriel

Hi Sven,

On  Mi 17 Jun 2020 20:34:39 CEST, Sven Geuer wrote:


Owner: debma...@g-e-u-e-r.de

Hi Ola,

thank you for your consent. I take ownership of this bug now. It will
be closed with the upcoming upload of tightvnc.

Thanks for having maintained tightvnc for all these years.

If there's anything in contrast to what you intended, please let me
know. We'll get it sorted out.

Sven


I have created a tightvnc repo for you.
https://salsa.debian.org/debian-remote-team/tightvnc/


As I see it, the package has never been maintained in Git. It would be  
cool to have its complete history (Debian package imports via gbp  
import-dsc) added to that new Git repo.


Sven, do you know you to do such an import (including all recent  
Debian release branches)?


If not, I am happy to help you with that.

@Ola: or do you have some packaging Git around locally that you used  
in the past?


Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4351) 486 14 27

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgpxbdqsYuQ_7.pgp
Description: Digitale PGP-Signatur


Bug#586413: RFA: a lot of packages

2020-06-17 Thread Mike Gabriel

Hi Sven,

On  Di 16 Jun 2020 23:07:27 CEST, Sven Geuer wrote:


Hi Mike,
Hi Ola,

I would be interested in maintaining tightvnc as a new member of the
Debian Remote Maintainers Team. I already started some work on it in a
private repository on salsa [1]. 'FTBFS with gcc-10' is already fixed.

Being a DM, I currently maintain two packages under the umbrella of the
Debian Security Tools Packaging Team, and had contributed to other
packages of this team [2].

@Mike: May I ask you to accept me as team member to debian-remote?
@Ola: Would you want to stay listed as uploader with moving tightvnc to
the team?

Please let me know, if you accept my application.

Best,
Sven

[1] https://salsa.debian.org/sven-geuer-guest/tightvnc
[2] https://qa.debian.org/developer.php?email=debmaint%40g-e-u-e-r.de


Awesome! Regarding your Debian Remote Team applications: Welcome in!

I'll wait for Ola's response, then I'll give you permissions on the  
tightvnc.git repo.


Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4351) 486 14 27

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgpkeY5bw_WS5.pgp
Description: Digitale PGP-Signatur


Bug#962692: puppet: Crashes due to "missing" facts.d directories

2020-06-15 Thread Gabriel Filion
Hi,

>> A quick workaround to get facter to run is to create the three
>> directories:
> 
>> /etc/facter/facts.d
>> /etc/puppetlabs/facter/facts.d
>> /opt/puppetlabs/facter/facts.d
> 
> Yup, confirmed that works.  Thank you!

thanks for the workaround.

while it seems to work when running facter as root, I'm still getting
the same crash (back trace seems to be the same) when running facter as
an unprivileged user even though the three directories are world-readable.
I'm reporting this added detail since using puppet/facter as an
unprivileged user can be important for validating syntax, running spec
tests, etc. during development.


$ ls -ld /etc/facter/facts.d/ /etc/puppetlabs/facter/facts.d
/opt/puppetlabs/facter/facts.d
drwxr-xr-x 2 root root 4096 Jun 15 17:10 /etc/facter/facts.d/
drwxr-xr-x 2 root root 4096 Jun 15 17:10 /etc/puppetlabs/facter/facts.d
drwxr-xr-x 2 root root 4096 Jun 15 17:10 /opt/puppetlabs/facter/facts.d

$ facter
free(): invalid size
Aborted

$ gdb facter
[...]
Reading symbols from facter...
(No debugging symbols found in facter)
(gdb) r
Starting program: /usr/bin/facter
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[Detaching after vfork from child process 1565235]
free(): invalid pointer

Program received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
50  ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1  0x779bf55b in __GI_abort () at abort.c:79
#2  0x77a18038 in __libc_message (action=action@entry=do_abort,
fmt=fmt@entry=0x77b24f3e "%s\n") at ../sysdeps/posix/libc_fatal.c:181
#3  0x77a1f3da in malloc_printerr (str=str@entry=0x77b230e0
"free(): invalid pointer") at malloc.c:5339
#4  0x77a20dcc in _int_free (av=, p=, have_lock=0) at malloc.c:4173
#5  0x77e775d4 in ?? () from
/usr/lib/x86_64-linux-gnu/libfacter.so.3.11.0
#6  0x77e77bd8 in
facter::facts::collection::add_external_facts(std::vector, std::allocator >,
std::allocator,
std::allocator > > > const&) () from
/usr/lib/x86_64-linux-gnu/libfacter.so.3.11.0
#7  0x5557154c in main ()



signature.asc
Description: OpenPGP digital signature


Bug#962813: does not build with ghc 8.8

2020-06-14 Thread Mike Gabriel

Hi,

On  So 14 Jun 2020 16:41:31 CEST, Picca Frédéric-Emmanuel wrote:


Source: haskell-tree-monad
Severity: critical

Hello,

this package does not build with the up-comming ghc 8.8 version.
It is not part of stackage LTS, and it was not updated by upstream  
since 2009.

It means that there is few chance to see the upstream fix this issue.

so it is considere to remove it from Debian.

Someone can salvage it by providing a patch (prefereably to the  
upstream first).


Cheers


I have pinged upstream (off-list, off-bts) on this issue and will  
provide feedback once I hear from them.


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpBxjskrIlfd.pgp
Description: Digitale PGP-Signatur


Bug#962592: autocomplete with tar command doesn't work (Debian 10.4)

2020-06-12 Thread Gabriel F. T. Gomes
On Fri, 12 Jun 2020, Sławomir Stańczak wrote:
>
> W dniu 11.06.2020 o 21:41, Gabriel F. T. Gomes pisze:
> > If I understand correctly, you would like for 'tar -cf ' to
> > complete with tar files already present in the file system.  
> 
> Yes. This prevents overwriting of an existing archive.

I am a little puzzled. Have you changed your mind and now you think
that *not* completing is the right thing to do?

> Thank you very much for your help and links.

Ah, I forgot to mention that you can always use Alt+/ to complete with
every file in the path, which will suggest *any* file, not just those
ending in '.tar*'. Anyhow, I thought that that might help you a little
before we can get this fixed (if we ever make it into upstream
bash-completion).

Cheers,
Gabriel



Bug#962592: autocomplete with tar command doesn't work (Debian 10.4)

2020-06-11 Thread Gabriel F. T. Gomes
On 10 Jun 2020, Sławomir Stańczak wrote:
>
>$ tar -cf 000/ not working

If I understand correctly, you would like for 'tar -cf ' to
complete with tar files already present in the file system. Although I
believe that this would be a reasonable thing to do, upstream
bash-completion seems to believe that there's no point in doing so, as
can be seem in the current code [1]:

  # Generate completions for -f/--file.
  __tar_file_option()
  {
local ext="$1"

case "$tar_mode" in
  c)
# no need to advise user to re-write existing tarball
_filedir -d
;;
  *)
_filedir "$ext"
;;
esac
  }

On the other hand, Ville Skyttä, the current upstream maintainer,
suggested, in the past [2], that the behavior you expect could be a
good thing.

I'll try to come up with an upstream patch.


Cheers,
Gabriel

PS: This bug is similar to https://bugs.debian.org/619548, which I
closed on the assumption that upstream wouldn't want this change. Now I
believe I shouldn't have closed it at all, so I'll use this new bug to
track this. Thanks for the report.

[1] 
https://github.com/scop/bash-completion/blob/master/completions/tar#L215-L229
[2] https://bugs.debian.org/618734#68



Bug#961600: cyrus-common: The bug remains with version 3.2.1-3

2020-06-09 Thread Gabriel Rolland
Package: cyrus-common
Version: 3.2.1-3~bpo10+1
Followup-For: Bug #961600

The bug is still present with version 3.2.1-3
How can I disable http2 support?

Thanks



Bug#962301: ITP: lomiri-ui-toolkit -- Qt Components for Lomiri Operating Environment

2020-06-05 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

* Package name: lomiri-ui-toolkit
  Version : 0.1.0
  Upstream Author : Marius Gripsgard 
* URL : https://gitlab.com/ubports/core/lomiri-ui-toolkit/
* License : LGPL-3.0 (et al.)
  Programming Lang: C++
  Description : Qt Components for Lomiri Operating Environment

 Qt Components for Lomiri offers a set of reusable user interface
 components for Qt Quick 2 / QML.
 .
 This is the essential UI toolkit for the Lomiri Operating Environment
 enhancing Qt5 to its needs.
 .
 This package will be maintained by the Debian UBports Packaging Team.



Bug#881719: libcdio 2.1.0 and lubcdio++

2020-06-02 Thread Gabriel F. T. Gomes
On Tue, 02 Jun 2020, Bálint Réczey wrote:
>
> Done. I've omitted the last commit because I suggest using -1~exp0
> Debian version for the upload to experimental. IMO looks nicer when
> the upload to unstable has -1.

Thanks for the review. I'll fix this, then upload again to mentors.



Bug#961978: buster-pu: package freerdp2/2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2

2020-06-01 Thread Mike Gabriel

Hi Adam,

On  Mo 01 Jun 2020 13:29:23 CEST, Adam D. Barratt wrote:


On Mon, 2020-06-01 at 13:20 +0200, Mike Gabriel wrote:

I just uploaded this update of freerdp2 to Debian buster. Thanks to
Bernhard Miklautz, we have several security patches available:

+  [ Bernhard Miklautz ]
+  * debian/patches - security releated backports from upstream
+* Add 0003-Fixed-6007-Boundary-checks-in-
rdp_read_flow_control.patch
+* Add 0004-Fixed-6009-Bounds-checks-in-
autodetect_recv_bandwidt.patch



Not every bug necessarily has to be fixed in stable...

For clarity, all of these are resolved in unstable already?

Regards,

Adam


another option other than a little cherry-picking hell could be  
bumping buster's version to 2.1.1+dfsg-1, too. Similar to what people  
did in Ubuntu...

https://usn.ubuntu.com/4379-1/

Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4351) 486 14 27

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgpu2cFY83SXt.pgp
Description: Digitale PGP-Signatur


Bug#881719: libcdio 2.1.0 and lubcdio++

2020-06-01 Thread Gabriel F. T. Gomes
On 01 Jun 2020, Bálint Réczey wrote:
>
>I've checked the package and it refers to
>https://salsa.debian.org/debian/libcdio as the packaging repo while it
>is not present.
>I fyou agree let me clone your packaging repo there, then I can review
>the changes.

Oh, please. And thank you. :)

>I can't upload in the next few days (weeks?) because my keys are
>expired and I'm waiting for the next keyring push to get them
>refreshed.

No problem.


Cheers,
Gabriel



Bug#961978: buster-pu: package freerdp2/2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2

2020-06-01 Thread Mike Gabriel

Hi Adam,

On  Mo 01 Jun 2020 13:29:23 CEST, Adam D. Barratt wrote:


On Mon, 2020-06-01 at 13:20 +0200, Mike Gabriel wrote:

I just uploaded this update of freerdp2 to Debian buster. Thanks to
Bernhard Miklautz, we have several security patches available:

+  [ Bernhard Miklautz ]
+  * debian/patches - security releated backports from upstream
+* Add 0003-Fixed-6007-Boundary-checks-in-
rdp_read_flow_control.patch
+* Add 0004-Fixed-6009-Bounds-checks-in-
autodetect_recv_bandwidt.patch



Not every bug necessarily has to be fixed in stable...


Well, this is only a small selection of fixes from what has been fixed  
for recent 2.1.1. The urgent once. During Corona lock down, several  
Linux security experts files PRs and bug reports against FreeRDP.



For clarity, all of these are resolved in unstable already?


Yes, all bugs are resolved in upstream release 2.1.1 (which has just  
been uploaded to unstable a couple of days ago).


Mike
--

mike gabriel aka sunweaver (Debian Developer)
mobile: +49 (1520) 1976 148
landline: +49 (4351) 486 14 27

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunwea...@debian.org, http://sunweavers.net



pgp96y2WWL1v5.pgp
Description: Digitale PGP-Signatur


Bug#961978: buster-pu: package freerdp2/2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2

2020-06-01 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I just uploaded this update of freerdp2 to Debian buster. Thanks to
Bernhard Miklautz, we have several security patches available:

+  [ Bernhard Miklautz ]
+  * debian/patches - security releated backports from upstream
+* Add 0003-Fixed-6007-Boundary-checks-in-rdp_read_flow_control.patch
+* Add 0004-Fixed-6009-Bounds-checks-in-autodetect_recv_bandwidt.patch
+* Add 0005-Fixed-6006-bounds-checks-in-update_read_synchronize.patch
+* Add 0006-Fixed-6005-Bounds-checks-in-update_read_bitmap_data.patch
+* Add 0007-Fixed-6011-Bounds-check-in-rdp_read_font_capability.patch
+* Add 0008-Fixed-6013-Check-new-length-is-0.patch
+* Add 0009-Fix-6010-Check-length-in-read_icon_info.patch
+* Add 0010-Use-substreams-to-parse-gcc_read_server_data_blocks.patch
+* Add 0011-Fixed-Stream_-macros-bracing-arguments.patch
+* Add 0012-Use-safe-seek-for-capability-parsing.patch
+* Add 0013-Fixed-CVE-2020-11525-Out-of-bounds-read-in-bitmap_ca.patch
+  (CVE-2020-11525).
+* Add 0014-Fixed-6012-CVE-2020-11526-Out-of-bounds-read-in-upda.patch
+  (CVE-2020-11526).
+* Add 0015-Fix-CVE-2020-11523-clamp-invalid-rectangles-to-size-.patch
+  (CVE-2020-11523).
+* Add 0016-Fix-CVE-2020-11524-out-of-bounds-access-in-interleav.patch
+  (CVE-2020-11524).
+* Add 0017-Fixed-CVE-2020-11522-Limit-number-of-DELTA_RECT-to-4.patch
+  (CVE-2020-11522).
+* Add 0018-Fixed-CVE-2020-11521-Out-of-bounds-write-in-planar-c.patch
+  (CVE-2020-11521).
+* Add 0019-Fixed-possible-NULL-access.patch
+* Add 0020-Check-for-int-overflow-in-gdi_InvalidateRegion.patch

-> This patchwork will be the first round of CVE closures (all no-dsa, as
discussed with Salvatore from the security team). Whenever Bernhard finds
time, he will provide more patches and a +deb10u3 is probably already in
sight.

+  [ Mike Gabriel ]
+  * debian/patches:
++ Add 0002_fix-channels-smartcard-fix-statusw-call.patch. Fix smartcard
+  login failures. (Closes: #919281).

-> a functionality fix for people using smartcard readers with FreeRDP.

Thanks+Greets,
Mike


-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru freerdp2-2.0.0~git20190204.1.2693389a+dfsg1/debian/changelog 
freerdp2-2.0.0~git20190204.1.2693389a+dfsg1/debian/changelog
--- freerdp2-2.0.0~git20190204.1.2693389a+dfsg1/debian/changelog
2019-12-16 11:36:02.0 +0100
+++ freerdp2-2.0.0~git20190204.1.2693389a+dfsg1/debian/changelog
2020-06-01 13:08:46.0 +0200
@@ -1,3 +1,39 @@
+freerdp2 (2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2) buster; urgency=medium
+
+  [ Bernhard Miklautz ]
+  * debian/patches - security releated backports from upstream
+* Add 0003-Fixed-6007-Boundary-checks-in-rdp_read_flow_control.patch
+* Add 0004-Fixed-6009-Bounds-checks-in-autodetect_recv_bandwidt.patch
+* Add 0005-Fixed-6006-bounds-checks-in-update_read_synchronize.patch
+* Add 0006-Fixed-6005-Bounds-checks-in-update_read_bitmap_data.patch
+* Add 0007-Fixed-6011-Bounds-check-in-rdp_read_font_capability.patch
+* Add 0008-Fixed-6013-Check-new-length-is-0.patch
+* Add 0009-Fix-6010-Check-length-in-read_icon_info.patch
+* Add 0010-Use-substreams-to-parse-gcc_read_server_data_blocks.patch
+* Add 0011-Fixed-Stream_-macros-bracing-arguments.patch
+* Add 0012-Use-safe-seek-for-capability-parsing.patch
+* Add 0013-Fixed-CVE-2020-11525-Out-of-bounds-read-in-bitmap_ca.patch
+  (CVE-2020-11525).
+* Add 0014-Fixed-6012-CVE-2020-11526-Out-of-bounds-read-in-upda.patch
+  (CVE-2020-11526).
+* Add 0015-Fix-CVE-2020-11523-clamp-invalid-rectangles-to-size-.patch
+  (CVE-2020-11523).
+* Add 0016-Fix-CVE-2020-11524-out-of-bounds-access-in-interleav.patch
+  (CVE-2020-11524).
+* Add 0017-Fixed-CVE-2020-11522-Limit-number-of-DELTA_RECT-to-4.patch
+  (CVE-2020-11522).
+* Add 0018-Fixed-CVE-2020-11521-Out-of-bounds-write-in-planar-c.patch
+  (CVE-2020-11521).
+* Add 0019-Fixed-possible-NULL-access.patch
+* Add 0020-Check-for-int-overflow-in-gdi_InvalidateRegion.patch
+
+  [ Mike Gabriel ]
+  * debian/patches:
++ Add 0002_fix-channels-smartcard-fix-statusw-call.patch. Fix smartcard
+  login failures. (Closes: #919281).
+
+ -- Mike Gabriel   Mon, 01 Jun 2020 13:08:46 +0200
+
 freerdp2 (2.0.0~git20190204.1.2693389a+dfsg1-1+d

Bug#881719: libcdio 2.1.0 and lubcdio++

2020-05-31 Thread Gabriel F. T. Gomes
On 31 May 2020, Gabriel F. T. Gomes wrote:
>
>we will need a sponsor.

The package is now on mentors:

https://mentors.debian.net/package/libcdio

Balint, could you review it and, if everything is fine, sponsor it?
(I'm asking because Vasyl mentioned you are guiding the packaging of
Kodi, if I got it right)


Cheers,
Gabriel



Bug#881719: libcdio 2.1.0 and lubcdio++

2020-05-31 Thread Gabriel F. T. Gomes
Hi, Vasyl,

On 24 May 2020, Vasyl Gello wrote:
>
>Yes experimental is OK for me, even though I uploaded libshairplay & 
>libudfread to unstable queue. Balint asked me initially to target Kodi 19.0 to 
>experimental so I will probably re-upload both libraries to experimental to 
>keep everything consistent.

Awesome.

I accepted your merge request and I prepared the package for
experimental. It will take a while to get there though, because I'm not
a DD yet (my process is still ongoing), so we will need a sponsor.

Also, since it adds new binary packages, it will also have to go
through the new queue.


Cheers,
Gabriel



Bug#961944: buster-pu: package php-horde/5.2.20+debian0-1+deb10u2

2020-05-31 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I have just uploaded this php-horde update to buster, fixing a no-dsa CVE:

+  * CVE-2020-8035: Don't allow to view images inline if opened directly.
+  * debian/patches/0001-Fix-rewrite-base.patch: Trivial rebase.

Greets,
Mike

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru php-horde-5.2.20+debian0/debian/changelog 
php-horde-5.2.20+debian0/debian/changelog
--- php-horde-5.2.20+debian0/debian/changelog   2019-12-14 03:13:53.0 
+0100
+++ php-horde-5.2.20+debian0/debian/changelog   2020-05-31 21:45:26.0 
+0200
@@ -1,3 +1,10 @@
+php-horde (5.2.20+debian0-1+deb10u2) buster; urgency=medium
+
+  * CVE-2020-8035: Don't allow to view images inline if opened directly.
+  * debian/patches/0001-Fix-rewrite-base.patch: Trivial rebase.
+
+ -- Mike Gabriel   Sun, 31 May 2020 21:45:26 +0200
+
 php-horde (5.2.20+debian0-1+deb10u1) buster; urgency=high
 
   * Fix CVE-2019-12095: Stored XSS vuln in the Horde Cloud Block.
diff -Nru php-horde-5.2.20+debian0/debian/patches/0001-Fix-rewrite-base.patch 
php-horde-5.2.20+debian0/debian/patches/0001-Fix-rewrite-base.patch
--- php-horde-5.2.20+debian0/debian/patches/0001-Fix-rewrite-base.patch 
2019-12-14 03:13:53.0 +0100
+++ php-horde-5.2.20+debian0/debian/patches/0001-Fix-rewrite-base.patch 
2020-05-31 21:45:26.0 +0200
@@ -6,11 +6,9 @@
  horde-5.2.20/.htaccess | 1 +
  1 file changed, 1 insertion(+)
 
-diff --git a/horde-5.2.20/.htaccess b/horde-5.2.20/.htaccess
-index 89eaf0a..348046e 100644
 --- a/horde-5.2.20/.htaccess
 +++ b/horde-5.2.20/.htaccess
-@@ -5,6 +5,7 @@ allow from all
+@@ -10,6 +10,7 @@
  
  
  RewriteEngine On
diff -Nru 
php-horde-5.2.20+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
 
php-horde-5.2.20+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
--- 
php-horde-5.2.20+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
   1970-01-01 01:00:00.0 +0100
+++ 
php-horde-5.2.20+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
   2020-05-31 21:45:26.0 +0200
@@ -0,0 +1,28 @@
+From 64127fe3c2b9843c9760218e59dae9731cc56bdf Mon Sep 17 00:00:00 2001
+From: Jan Schneider 
+Date: Mon, 20 Apr 2020 23:07:51 +0200
+Subject: [PATCH] Don't allow to view images inline if opened directly.
+
+This services is supposed to process and view images inside a web page.
+---
+ services/images/view.php | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/horde-5.2.20/services/images/view.php 
b/horde-5.2.20/services/images/view.php
+index bc7da534..f5b0cb25 100644
+--- a/horde-5.2.20/services/images/view.php
 b/horde-5.2.20/services/images/view.php
+@@ -84,6 +84,7 @@
+ 
+ /* Check if no editing action required and send the image to browser. */
+ if (empty($action)) {
++header('Content-Disposition: attachment');
+ $image->display();
+ exit;
+ }
+@@ -132,4 +133,5 @@
+ /* Write out any changes to the temporary file. */
+ file_put_contents($file_name, $image->raw());
+ 
++header('Content-Disposition: attachment');
+ $image->display();
diff -Nru php-horde-5.2.20+debian0/debian/patches/series 
php-horde-5.2.20+debian0/debian/patches/series
--- php-horde-5.2.20+debian0/debian/patches/series  2019-12-14 
03:13:53.0 +0100
+++ php-horde-5.2.20+debian0/debian/patches/series  2020-05-31 
21:45:26.0 +0200
@@ -1,2 +1,3 @@
 0001-Fix-rewrite-base.patch
 0002-CVE-2019-12095-Fix-XSS-vuln-in-the-Horde-Cloud-Block.patch
+0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch


Bug#961945: stretch-pu: package php-horde/5.2.13+debian0-1+deb9u2

2020-05-31 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I have just uploaded this php-horde update to stretch, fixing a no-dsa CVE:

+  * CVE-2020-8035: Don't allow to view images inline if opened directly.
+  * debian/patches/0001-Fix-rewrite-base.patch: Trivial rebase.

Greets,
Mike

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru php-horde-5.2.13+debian0/debian/changelog 
php-horde-5.2.13+debian0/debian/changelog
--- php-horde-5.2.13+debian0/debian/changelog   2019-12-14 03:10:06.0 
+0100
+++ php-horde-5.2.13+debian0/debian/changelog   2020-05-31 21:45:26.0 
+0200
@@ -1,3 +1,10 @@
+php-horde (5.2.13+debian0-1+deb9u2) stretch; urgency=medium
+
+  * CVE-2020-8035: Don't allow to view images inline if opened directly.
+  * debian/patches/0001-Fix-rewrite-base.patch: Trivial rebase.
+
+ -- Mike Gabriel   Sun, 31 May 2020 21:45:26 +0200
+
 php-horde (5.2.13+debian0-1+deb9u1) stretch; urgency=high
 
   * Fix CVE-2019-12095: Stored XSS vuln in the Horde Cloud Block.
diff -Nru php-horde-5.2.13+debian0/debian/patches/0001-Fix-rewrite-base.patch 
php-horde-5.2.13+debian0/debian/patches/0001-Fix-rewrite-base.patch
--- php-horde-5.2.13+debian0/debian/patches/0001-Fix-rewrite-base.patch 
2019-12-14 03:10:06.0 +0100
+++ php-horde-5.2.13+debian0/debian/patches/0001-Fix-rewrite-base.patch 
2020-05-31 21:45:26.0 +0200
@@ -6,11 +6,9 @@
  horde-5.2.13/.htaccess | 1 +
  1 file changed, 1 insertion(+)
 
-diff --git a/horde-5.2.13/.htaccess b/horde-5.2.13/.htaccess
-index 89eaf0a..348046e 100644
 --- a/horde-5.2.13/.htaccess
 +++ b/horde-5.2.13/.htaccess
-@@ -5,6 +5,7 @@ allow from all
+@@ -10,6 +10,7 @@
  
  
  RewriteEngine On
diff -Nru 
php-horde-5.2.13+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
 
php-horde-5.2.13+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
--- 
php-horde-5.2.13+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
   1970-01-01 01:00:00.0 +0100
+++ 
php-horde-5.2.13+debian0/debian/patches/0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch
   2020-05-31 21:45:26.0 +0200
@@ -0,0 +1,28 @@
+From 64127fe3c2b9843c9760218e59dae9731cc56bdf Mon Sep 17 00:00:00 2001
+From: Jan Schneider 
+Date: Mon, 20 Apr 2020 23:07:51 +0200
+Subject: [PATCH] Don't allow to view images inline if opened directly.
+
+This services is supposed to process and view images inside a web page.
+---
+ services/images/view.php | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/horde-5.2.13/services/images/view.php 
b/horde-5.2.13/services/images/view.php
+index bc7da534..f5b0cb25 100644
+--- a/horde-5.2.13/services/images/view.php
 b/horde-5.2.13/services/images/view.php
+@@ -84,6 +84,7 @@
+ 
+ /* Check if no editing action required and send the image to browser. */
+ if (empty($action)) {
++header('Content-Disposition: attachment');
+ $image->display();
+ exit;
+ }
+@@ -132,4 +133,5 @@
+ /* Write out any changes to the temporary file. */
+ file_put_contents($file_name, $image->raw());
+ 
++header('Content-Disposition: attachment');
+ $image->display();
diff -Nru php-horde-5.2.13+debian0/debian/patches/series 
php-horde-5.2.13+debian0/debian/patches/series
--- php-horde-5.2.13+debian0/debian/patches/series  2019-12-14 
03:10:06.0 +0100
+++ php-horde-5.2.13+debian0/debian/patches/series  2020-05-31 
21:45:26.0 +0200
@@ -1,2 +1,3 @@
 0001-Fix-rewrite-base.patch
 0002-CVE-2019-12095-Fix-XSS-vuln-in-the-Horde-Cloud-Block.patch
+0003-CVE-2020-8035-dont-allow-to-view-images-inline.patch


Bug#961937: stretch-pu: package ssvnc/1.0.29-3+deb9u1

2020-05-31 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I just uploaded this ssvnc update to Debian stretch:

+  * Non-maintainer upload by the LTS team.

@Magnus: Thanks for fixing ssnvc in testing/unstable regarding below CVE
issues. I saw that those issues haven't been covered for in stretch+buster,
so I was so brisk and dput fixes straight away.

+  * Porting of libvncclient security patches (Closes: #945827):
+- CVE-2018-20020: heap out-of-bound write vulnerability inside structure
+  in VNC client code.
+- CVE-2018-20021: CWE-835: Infinite loop vulnerability in VNC client code.
+- CVE-2018-20022: CWE-665: Improper Initialization vulnerability.
+- CVE-2018-20024: null pointer dereference that can result DoS.

@release team: The upload fixes the not-so-critical CVEs given above.

Thanks+Greets,
Mike

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru ssvnc-1.0.29/debian/changelog ssvnc-1.0.29/debian/changelog
--- ssvnc-1.0.29/debian/changelog   2016-07-30 23:10:11.0 +0200
+++ ssvnc-1.0.29/debian/changelog   2020-05-31 20:59:43.0 +0200
@@ -1,3 +1,15 @@
+ssvnc (1.0.29-3+deb9u1) stretch; urgency=medium
+
+  * Non-maintainer upload by the LTS team.
+  * Porting of libvncclient security patches (Closes: #945827):
+- CVE-2018-20020: heap out-of-bound write vulnerability inside structure
+  in VNC client code.
+- CVE-2018-20021: CWE-835: Infinite loop vulnerability in VNC client code.
+- CVE-2018-20022: CWE-665: Improper Initialization vulnerability.
+- CVE-2018-20024: null pointer dereference that can result DoS.
+
+ -- Mike Gabriel   Sun, 31 May 2020 20:59:43 +0200
+
 ssvnc (1.0.29-3) unstable; urgency=low
 
   * debian/rules: Add call to dh_strip_nondeterminism.
diff -Nru ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch 
ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch
--- ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch   
1970-01-01 01:00:00.0 +0100
+++ ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch   
2019-12-16 19:37:52.0 +0100
@@ -0,0 +1,22 @@
+Description: CVE-2018-20020
+ heap out-of-bound write vulnerability inside structure in VNC client code that
+ can result remote code execution
+---
+
+Author: Abhijith PA 
+Origin: 
https://github.com/LibVNC/libvncserver/commit/7b1ef0ffc4815cab9a96c7278394152bdc89dc4d
+Bug: https://github.com/LibVNC/libvncserver/issues/250
+Bug-Debian: https://bugs.debian.org/916941
+Last-Update: 2018-12-23
+
+--- a/vnc_unixsrc/vncviewer/corre.c
 b/vnc_unixsrc/vncviewer/corre.c
+@@ -76,7 +76,7 @@
+ FillRectangle(rx, ry, rw, rh, gcv.foreground);
+ #endif
+ 
+-if (!ReadFromRFBServer(buffer, hdr.nSubrects * (4 + (BPP / 8
++if (hdr.nSubrects > BUFFER_SIZE / (4 + (BPP / 8)) || 
!ReadFromRFBServer(buffer, hdr.nSubrects * (4 + (BPP / 8
+   return False;
+ 
+ ptr = (CARD8 *)buffer;
diff -Nru ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch 
ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch
--- ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch   
1970-01-01 01:00:00.0 +0100
+++ ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch   
2019-12-16 19:37:52.0 +0100
@@ -0,0 +1,22 @@
+Description: CVE-2018-20021
+ CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows
+ attacker to consume excessive amount of resources like CPU and RAM
+---
+
+Author: Abhijith PA 
+Origin: 
https://github.com/LibVNC/libvncserver/commit/c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c
+Bug: https://github.com/LibVNC/libvncserver/issues/251
+Bug-Debian: https://bugs.debian.org/916941
+Last-Update: 2018-12-23
+
+--- a/vnc_unixsrc/vncviewer/rfbproto.c
 b/vnc_unixsrc/vncviewer/rfbproto.c
+@@ -3156,7 +3156,7 @@
+   if (db) fprintf(stderr, "Raw: %dx%d+%d+%d\n", 
rect.r.w, rect.r.h, rect.r.x, rect.r.y);
+   area_raw += rect.r.w * rect.r.h;
+ 
+-  while (rect.r.h > 0) {
++  while (linesToRead && rect.r.h > 0) {
+   if (linesToRead > rect.r.h) {
+   linesToRead = rect.r.h;
+   }
diff -Nru ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20022.patch 
ssvnc-1.0.29/debian/patches/libvncclient_

Bug#961936: buster-pu: package ssvnc/1.0.29-4+deb10u1

2020-05-31 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I just uploaded this ssvnc update to Debian buster:

+  * Non-maintainer upload by the LTS team.

@Magnus: Thanks for fixing ssnvc in testing/unstable regarding below CVE
issues. I saw that those issues haven't been convered in stretch+buster,
so I was so brisk and dput fixes straight away.

+  * Porting of libvncclient security patches (Closes: #945827):
+- CVE-2018-20020: heap out-of-bound write vulnerability inside structure
+  in VNC client code.
+- CVE-2018-20021: CWE-835: Infinite loop vulnerability in VNC client code.
+- CVE-2018-20022: CWE-665: Improper Initialization vulnerability.
+- CVE-2018-20024: null pointer dereference that can result DoS.

@release team: The upload fixes the not-so-critical CVEs given above.

Thanks+Greets,
Mike


-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru ssvnc-1.0.29/debian/changelog ssvnc-1.0.29/debian/changelog
--- ssvnc-1.0.29/debian/changelog   2018-06-24 19:39:53.0 +0200
+++ ssvnc-1.0.29/debian/changelog   2020-05-31 20:58:21.0 +0200
@@ -1,3 +1,15 @@
+ssvnc (1.0.29-4+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload by the LTS team.
+  * Porting of libvncclient security patches (Closes: #945827):
+- CVE-2018-20020: heap out-of-bound write vulnerability inside structure
+  in VNC client code.
+- CVE-2018-20021: CWE-835: Infinite loop vulnerability in VNC client code.
+- CVE-2018-20022: CWE-665: Improper Initialization vulnerability.
+- CVE-2018-20024: null pointer dereference that can result DoS.
+
+ -- Mike Gabriel   Sun, 31 May 2020 20:58:21 +0200
+
 ssvnc (1.0.29-4) unstable; urgency=low
 
   * default-jdk-headless is enough to build.
diff -Nru ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch 
ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch
--- ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch   
1970-01-01 01:00:00.0 +0100
+++ ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20020.patch   
2019-12-16 19:37:52.0 +0100
@@ -0,0 +1,22 @@
+Description: CVE-2018-20020
+ heap out-of-bound write vulnerability inside structure in VNC client code that
+ can result remote code execution
+---
+
+Author: Abhijith PA 
+Origin: 
https://github.com/LibVNC/libvncserver/commit/7b1ef0ffc4815cab9a96c7278394152bdc89dc4d
+Bug: https://github.com/LibVNC/libvncserver/issues/250
+Bug-Debian: https://bugs.debian.org/916941
+Last-Update: 2018-12-23
+
+--- a/vnc_unixsrc/vncviewer/corre.c
 b/vnc_unixsrc/vncviewer/corre.c
+@@ -76,7 +76,7 @@
+ FillRectangle(rx, ry, rw, rh, gcv.foreground);
+ #endif
+ 
+-if (!ReadFromRFBServer(buffer, hdr.nSubrects * (4 + (BPP / 8
++if (hdr.nSubrects > BUFFER_SIZE / (4 + (BPP / 8)) || 
!ReadFromRFBServer(buffer, hdr.nSubrects * (4 + (BPP / 8
+   return False;
+ 
+ ptr = (CARD8 *)buffer;
diff -Nru ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch 
ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch
--- ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch   
1970-01-01 01:00:00.0 +0100
+++ ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20021.patch   
2019-12-16 19:37:52.0 +0100
@@ -0,0 +1,22 @@
+Description: CVE-2018-20021
+ CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows
+ attacker to consume excessive amount of resources like CPU and RAM
+---
+
+Author: Abhijith PA 
+Origin: 
https://github.com/LibVNC/libvncserver/commit/c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c
+Bug: https://github.com/LibVNC/libvncserver/issues/251
+Bug-Debian: https://bugs.debian.org/916941
+Last-Update: 2018-12-23
+
+--- a/vnc_unixsrc/vncviewer/rfbproto.c
 b/vnc_unixsrc/vncviewer/rfbproto.c
+@@ -3156,7 +3156,7 @@
+   if (db) fprintf(stderr, "Raw: %dx%d+%d+%d\n", 
rect.r.w, rect.r.h, rect.r.x, rect.r.y);
+   area_raw += rect.r.w * rect.r.h;
+ 
+-  while (rect.r.h > 0) {
++  while (linesToRead && rect.r.h > 0) {
+   if (linesToRead > rect.r.h) {
+   linesToRead = rect.r.h;
+   }
diff -Nru ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20022.patch 
ssvnc-1.0.29/debian/patches/libvncclient_CVE-2018-20022

Bug#961660: DebHelper dh_bash-completion broken since Stretch OS, Bash Completion scripts not installed anymore into Path according to debian/.bash-completion

2020-05-31 Thread Gabriel F. T. Gomes
On 27 May 2020, Jürgen Kuri wrote:
>
>When I build the packages for Debian Jessie, everything works as expected, 
>both completion scripts are installed into the path:
>
>   $  ls -la /etc/bash_completion.d/
>   total 24
>   drwxr-xr-x  2 root root  4096 May 26 16:58 .
>   drwxr-xr-x 92 root root  4096 May 18 12:12 ..
>   -rw-r--r--  1 root root   933 May 18 17:26 fsmtool2-completion
>   -rw-r--r--  1 root root   980 May 18 17:26 fsmtool2_mtest-completion

For some time (I don't know exactly how long, because I only adopted
bash-completion about 2 years ago), the default installation path for
completion is /usr/share/bash-completion/completions/, as you have
noticed. So, I'd say that dh_bash-completion is doing the rigth thing.

>When I build the packages for Debian OS Stretch or Buster, bash-completion 
>does not work for both command line tools any more cause the completion 
>scripts are installed below:
>
>   * /usr/share/bash-completion/completions/fsmtool2-completion 
>   * /usr/share/bash-completion/completions/fsmtool2_mtest-completion 

On the other, you are saying that the completions do not work from this
location, and that's puzzling me. Could you provide more details about
the problem you are actually getting? Bash-completion is supposed to
work with files in this location.


Cheers,
Gabriel



Bug#961921: buster-pu: package php-horde-gollem/3.0.12-3+deb10u1

2020-05-31 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I just uploaded an update for php-horde-gollem, fixing CVE-2020-8034.

+  * debian/patches:
++ Add CVE-2020-8034.patch. Fix XSS vulnerability in breadcrumb output
+  (Reported by: polict of Shielder). (Closes: #961649, CVE-2020-8034).
+

Greets,
Mike

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru php-horde-gollem-3.0.12/debian/changelog 
php-horde-gollem-3.0.12/debian/changelog
--- php-horde-gollem-3.0.12/debian/changelog2018-05-15 15:16:48.0 
+0200
+++ php-horde-gollem-3.0.12/debian/changelog2020-05-31 16:20:16.0 
+0200
@@ -1,3 +1,11 @@
+php-horde-gollem (3.0.12-3+deb10u1) buster-security; urgency=medium
+
+  * debian/patches:
++ Add CVE-2020-8034.patch. Fix XSS vulnerability in breadcrumb output
+  (Reported by: polict of Shielder). (Closes: #961649, CVE-2020-8034).
+
+ -- Mike Gabriel   Sun, 31 May 2020 16:20:16 +0200
+
 php-horde-gollem (3.0.12-3) unstable; urgency=medium
 
   * Update Standards-Version to 4.1.4, no change
diff -Nru php-horde-gollem-3.0.12/debian/patches/CVE-2020-8034.patch 
php-horde-gollem-3.0.12/debian/patches/CVE-2020-8034.patch
--- php-horde-gollem-3.0.12/debian/patches/CVE-2020-8034.patch  1970-01-01 
01:00:00.0 +0100
+++ php-horde-gollem-3.0.12/debian/patches/CVE-2020-8034.patch  2020-05-31 
16:19:48.0 +0200
@@ -0,0 +1,44 @@
+From a73bef1aef27d4cbfc7b939c2a81dea69aabb083 Mon Sep 17 00:00:00 2001
+From: Jan Schneider 
+Date: Wed, 4 Mar 2020 18:54:06 +0100
+Subject: [PATCH] [jan] SECURITY: Fix XSS vulnerability in breadcrumb output
+ (Reported by: polict of Shielder, CVE-2020-8034).
+
+---
+ doc/changelog.yml | 3 ++-
+ lib/Gollem.php| 5 +++--
+ 2 files changed, 5 insertions(+), 3 deletions(-)
+
+#diff --git a/doc/changelog.yml b/doc/changelog.yml
+#index dbad6ef..3e429bd 100644
+#--- a/doc/changelog.yml
+#+++ b/doc/changelog.yml
+#@@ -18,7 +18,8 @@
+#   license:
+# identifier: GPL-2.0
+# uri: http://www.horde.org/licenses/gpl
+#-  notes:
+#+  notes: |
+#+[jan] SECURITY: Fix XSS vulnerability in breadcrumb output (Reported by: 
polict of Shielder, CVE-2020-8034).
+# 3.0.12:
+#   api: 3.0.0
+#   state:
+diff --git a/gollem-3.0.12/lib/Gollem.php b/gollem-3.0.12/lib/Gollem.php
+index 9a4a7cd..ec255e7 100644
+--- a/gollem-3.0.12/lib/Gollem.php
 b/gollem-3.0.12/lib/Gollem.php
+@@ -692,10 +692,11 @@ public static function directoryNavLink($currdir, $url)
+ $dir = implode('/', $part);
+ if ((strstr($dir, self::$backend['root']) !== false) &&
+ (self::$backend['root'] != $dir)) {
++$part = htmlspecialchars($parts[($i - 1)]);
+ if ($i == $parts_count) {
+-$label[] = $parts[($i - 1)];
++$label[] = $part;
+ } else {
+-$label[] = Horde::link($url->add('dir', $dir), 
sprintf(_("Up to %s"), $dir)) . htmlspecialchars($parts[($i - 1)]) . '';
++$label[] = Horde::link($url->add('dir', $dir), 
sprintf(_("Up to %s"), $dir)) . $part . '';
+ }
+ }
+ }
+
diff -Nru php-horde-gollem-3.0.12/debian/patches/series 
php-horde-gollem-3.0.12/debian/patches/series
--- php-horde-gollem-3.0.12/debian/patches/series   1970-01-01 
01:00:00.0 +0100
+++ php-horde-gollem-3.0.12/debian/patches/series   2020-05-31 
16:19:48.0 +0200
@@ -0,0 +1 @@
+CVE-2020-8034.patch


Bug#961922: stretch-pu: package php-horde-gollem/3.0.10-1+deb9u1

2020-05-31 Thread Mike Gabriel
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

I just uploaded an update for php-horde-gollem to stretch, fixing
CVE-2020-8034.

+  * debian/patches:
++ Add CVE-2020-8034.patch. Fix XSS vulnerability in breadcrumb output
+  (Reported by: polict of Shielder). (Closes: #961649, CVE-2020-8034).

Greets,
Mike

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru php-horde-gollem-3.0.10/debian/changelog 
php-horde-gollem-3.0.10/debian/changelog
--- php-horde-gollem-3.0.10/debian/changelog2016-12-18 21:55:24.0 
+0100
+++ php-horde-gollem-3.0.10/debian/changelog2020-05-31 16:43:57.0 
+0200
@@ -1,3 +1,11 @@
+php-horde-gollem (3.0.10-1+deb9u1) stretch; urgency=medium
+
+  * debian/patches:
++ Add CVE-2020-8034.patch. Fix XSS vulnerability in breadcrumb output
+  (Reported by: polict of Shielder). (Closes: #961649, CVE-2020-8034).
+
+ -- Mike Gabriel   Sun, 31 May 2020 16:43:57 +0200
+
 php-horde-gollem (3.0.10-1) unstable; urgency=medium
 
   * New upstream version 3.0.10
diff -Nru php-horde-gollem-3.0.10/debian/patches/CVE-2020-8034.patch 
php-horde-gollem-3.0.10/debian/patches/CVE-2020-8034.patch
--- php-horde-gollem-3.0.10/debian/patches/CVE-2020-8034.patch  1970-01-01 
01:00:00.0 +0100
+++ php-horde-gollem-3.0.10/debian/patches/CVE-2020-8034.patch  2020-05-31 
16:43:57.0 +0200
@@ -0,0 +1,44 @@
+From a73bef1aef27d4cbfc7b939c2a81dea69aabb083 Mon Sep 17 00:00:00 2001
+From: Jan Schneider 
+Date: Wed, 4 Mar 2020 18:54:06 +0100
+Subject: [PATCH] [jan] SECURITY: Fix XSS vulnerability in breadcrumb output
+ (Reported by: polict of Shielder, CVE-2020-8034).
+
+---
+ doc/changelog.yml | 3 ++-
+ lib/Gollem.php| 5 +++--
+ 2 files changed, 5 insertions(+), 3 deletions(-)
+
+#diff --git a/doc/changelog.yml b/doc/changelog.yml
+#index dbad6ef..3e429bd 100644
+#--- a/doc/changelog.yml
+#+++ b/doc/changelog.yml
+#@@ -18,7 +18,8 @@
+#   license:
+# identifier: GPL-2.0
+# uri: http://www.horde.org/licenses/gpl
+#-  notes:
+#+  notes: |
+#+[jan] SECURITY: Fix XSS vulnerability in breadcrumb output (Reported by: 
polict of Shielder, CVE-2020-8034).
+# 3.0.12:
+#   api: 3.0.0
+#   state:
+diff --git a/gollem-3.0.10/lib/Gollem.php b/gollem-3.0.10/lib/Gollem.php
+index 9a4a7cd..ec255e7 100644
+--- a/gollem-3.0.10/lib/Gollem.php
 b/gollem-3.0.10/lib/Gollem.php
+@@ -692,10 +692,11 @@ public static function directoryNavLink($currdir, $url)
+ $dir = implode('/', $part);
+ if ((strstr($dir, self::$backend['root']) !== false) &&
+ (self::$backend['root'] != $dir)) {
++$part = htmlspecialchars($parts[($i - 1)]);
+ if ($i == $parts_count) {
+-$label[] = $parts[($i - 1)];
++$label[] = $part;
+ } else {
+-$label[] = Horde::link($url->add('dir', $dir), 
sprintf(_("Up to %s"), $dir)) . htmlspecialchars($parts[($i - 1)]) . '';
++$label[] = Horde::link($url->add('dir', $dir), 
sprintf(_("Up to %s"), $dir)) . $part . '';
+ }
+ }
+ }
+
diff -Nru php-horde-gollem-3.0.10/debian/patches/series 
php-horde-gollem-3.0.10/debian/patches/series
--- php-horde-gollem-3.0.10/debian/patches/series   1970-01-01 
01:00:00.0 +0100
+++ php-horde-gollem-3.0.10/debian/patches/series   2020-05-31 
16:40:31.0 +0200
@@ -0,0 +1 @@
+CVE-2020-8034.patch


Bug#942282: O: php-horde-core -- Core Horde Framework library (AND all php-horde*!)

2020-05-29 Thread Mike Gabriel

Hi Juri,

On  Fr 29 Mai 2020 13:24:50 CEST, debian wrote:


Hello Mike,


Let me know, if you'd still be interested in co-maintaining this massive
package pile. I'd add you to Uploaders: and grant you access to the
horde-team group on Salsa.

you can add me to Uploaders. Since 2. May I have access to horde-team.
I would try to update packages for unstable and automate packaging  
with salsa-ci. More people are

welcome.

Best Regards,
Juri Grabowski


Ok, I will add you to Uploaders: with the next upload round. I'll use  
your deb...@jugra.de address, right?


Regarding uploads to unstable: I have dput all php-horde-* packages by  
now, however, a few are still awaiting review in NEW. I will follow-up  
with a second upload round (source-only) once all packages have  
landed. I will also do the new upstream release bumps then.


What would your plans be for salsa-ci. I have far less expirience in  
that realm and I am happy to learn from what you are about to do  
regarding that. Can you explain?


Greets,
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp6Eqk6DR9Un.pgp
Description: Digitale PGP-Signatur


Bug#961753: ITP: suru-icon-theme -- Suru icon theme for Lomiri Operating Environment

2020-05-28 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

* Package name: suru-icon-theme
  Version : 20.05
  Upstream Author : Marius Gripsgard 
* URL : https://gitlab.com/ubports/core/suru-icon-theme/
* License : CC-BY-SA-3.0
  Programming Lang: 
  Description : Suru icon theme for Lomiri Operating Environment

 Lomiri Operating Environment is a convergent work shell designed
 for use cases on phone, tablet or desktop devices.
 .
 The Suru Icon Theme is the default icon theme in Lomiri (former Unity8).
 In Ubuntu, the suru-icon-theme bin:pkg is shipped as part of the ubuntu-theme
 src:pkg. The proposal is to share one suru-icon-theme between Debian
 Ubuntu (Desktop) and UBports' Ubuntu Touch.
 .
 See https://bugs.launchpad.net/ubuntu-themes/+bug/1881180 for details.
 .
 The package will be maintained by the Debian UBports team under the
 umbrella of the Debian Desktop Theme Team.
.



Bug#961698: ITP: lomiri-url-dispatcher -- Lomiri Operating Environment service for requesting URLs to be opened

2020-05-28 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

* Package name: lomiri-url-dispatcher
  Version : 0.1.0
  Upstream Author : Marius Gripsgard 
* URL : https://gitlab.com/ubports/core/lomiri-url-dispatcher
* License : LGPL-3
  Programming Lang: C / C++
  Description : Lomiri Operating Environment service for requesting URLs to 
be opened

 Lomiri's URL dispatcher allows applications to request a URL to be
 opened and handled by another process without seeing the list of other
 applications on the system, or starting them inside its own Application
 Confinement.
 .
 Lomiri URL dispatcher is a fork / continuation of Ubuntu's URL dispatcher and
 can be installed alongside of url-dispatcher.
 .
 This packaged is part of the effort of getting the Lomiri Operating Environment
 into Debian.
 



Bug#961562: cyrus-imapd: Unstable 3.2.0 LMTPD broken

2020-05-28 Thread Gabriel Rolland
Package: cyrus-imapd
Version: 3.2.0-5~bpo10+1
Followup-For: Bug #961562

Hi, same problem here.

/var/log/exim4/mainlog
2020-05-28 08:32:03 1jeC5C-0002F9-SB == assiste...@resnovae.it R=local_user 
T=local_delivery_cyrus defer (-1): LMTP connection closed after end of data

/var/log/mail.err
May 28 08:32:03 mailserver cyrus/master[20202]: process type:SERVICE 
name:lmtpunix path:/usr/lib/cyrus/bin/lmtpd age:0.563s pid:8650 signaled to 
death by signal 6 (Aborted)

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 'testing'), (50, 
'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-8-amd64 (SMP w/12 CPU cores)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8), 
LANGUAGE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages cyrus-imapd depends on:
ii  cyrus-common  3.2.0-5~bpo10+1
ii  libc6 2.28-10
ii  libcom-err2   1.44.5-1+deb10u3
ii  libsasl2-22.1.27+dfsg-1+deb10u1
ii  libssl1.1 1.1.1d-0+deb10u3
ii  libwrap0  7.6.q-28
ii  zlib1g1:1.2.11.dfsg-1

Versions of packages cyrus-imapd recommends:
ii  rsync  3.1.3-6

cyrus-imapd suggests no packages.

-- no debconf information



Bug#951565: freerdp2-x11: does not work at all, immediately exits, against xrdp server (rdesktop works)

2020-05-27 Thread Mike Gabriel

Control: close -1

Hi,

On  Fr 21 Feb 2020 20:47:57 CET, Mike Gabriel wrote:


Hi Thorsten, hi Bernhard,

On  Fr 21 Feb 2020 12:01:14 CET, Bernhard Miklautz wrote:


Hi Thorsten,

On Tue, Feb 18, 2020 at 07:18:23AM +0100, Thorsten Glaser wrote:

tglase@tglase-nb:~ $ xfreerdp /v:tglase-edge
..
[07:15:08:628] [29233:29234] [INFO][com.winpr.clipboard] -  
initialized POSIX local file subsystem
[07:15:08:744] [29233:29234] [ERROR][com.freerdp.core.update] -  
[0x03] Cache Glyph - SERVER BUG: The support for this feature was  
not announced! Use /relax-order-checks to ignore
[07:15:08:745] [29233:29234] [INFO][com.freerdp.client.common] -  
Network disconnect!
[07:15:08:745] [29233:29234] [ERROR][com.freerdp.client.x11] -  
Failed to check FreeRDP file descriptor

..

I also tried xfreerdp /size:1000x768 /v:tglase-edge but that
does not change anything.

FreeRDP does strict protocol level checks per default since a while.
xrdp does use the glyph cache without announcing/negotiating it - this
causes xfreerdp to close the connection.

Give the options /relax-order-checks (as the error above
indicates) and +glyph-cache a try.

As reference also See:

https://github.com/neutrinolabs/xrdp/issues/1229 and
https://github.com/neutrinolabs/xrdp/issues/1266

Best regards,
Bernhard


Bernhard, thanks for your answer on this.

Thorsten, shall we close or reassign to xRDP?

:-P

Mike


Closing this manually. No feedback from bug submitter. Not a bug in freerdp2.

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpE4q7LTR7UJ.pgp
Description: Digitale PGP-Signatur


Bug#767465: hello

2020-05-27 Thread Gabriel Bertrand
-- 
Bonjour

J'espère que vous allez bien. je m'appelle Gabriel. Nous pouvons être amis
J'ai des informations importantes que je voudrais partager avec vous

Passez une bonne journée

Cordialement,
Gabriel



Bug#961600: cyrus-common: High CPU usage for httpd with 3.2

2020-05-26 Thread Gabriel Rolland [Res Novae]
Package: cyrus-common
Version: 3.2.0-5~bpo10+1
Severity: normal

Hi,
After the upgrade to version 3.2, the httpd process for CARD-DAV
connections reaches very high CPU usage in a short time.

-- System Information:
Debian Release: 10.4
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 'testing'),
(50, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-8-amd64 (SMP w/12 CPU cores)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8),
LANGUAGE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages cyrus-common depends on:
ii adduser 3.118
ii db-upgrade-util 5.3.1+nmu1
ii db-util 5.3.1+nmu1
ii debconf [debconf-2.0] 1.5.71
ii e2fsprogs 1.44.5-1+deb10u3
ii exim4-daemon-heavy [mail-transport-agent] 4.92-8+deb10u4
ii gawk 1:4.2.1+dfsg-1
ii init-system-helpers 1.56+nmu1
ii libbrotli1 1.0.7-2
ii libc6 2.28-10
ii libclamav9 0.102.2+dfsg-0+deb10u1
ii libcom-err2 1.44.5-1+deb10u3
ii libgcc1 1:8.3.0-6
ii libgssapi-krb5-2 1.17-3
ii libical3 3.0.4-3
ii libicu63 63.1-6+deb10u1
ii libjansson4 2.12-1
ii libk5crypto3 1.17-3
ii libkrb5-3 1.17-3
ii libkrb5support0 1.17-3
ii libldap-2.4-2 2.4.47+dfsg-3+deb10u2
ii libnghttp2-14 1.40.0-1
ii libpcre3 2:8.39-12
ii libpq5 11.7-0+deb10u1
ii libsasl2-2 2.1.27+dfsg-1+deb10u1
ii libsasl2-modules 2.1.27+dfsg-1+deb10u1
ii libshp2 1.4.1-3
ii libsnmp30 5.7.3+dfsg-5
ii libsqlite3-0 3.27.2-3
ii libssl1.1 1.1.1d-0+deb10u3
ii libstdc++6 8.3.0-6
ii libwrap0 7.6.q-28
ii libxapian30 1.4.11-1
ii libxml2 2.9.4+dfsg1-7+b3
ii libzephyr4 3.1.2-1+b3
ii lsb-base 10.2019051400
ii netbase 5.6
ii perl 5.28.1-6
ii zlib1g 1:1.2.11.dfsg-1

Versions of packages cyrus-common recommends:
ii cyrus-admin 3.2.0-5~bpo10+1
ii cyrus-caldav 3.2.0-5~bpo10+1
ii cyrus-imapd 3.2.0-5~bpo10+1

Versions of packages cyrus-common suggests:
ii apt-listchanges 3.19
ii cyrus-admin 3.2.0-5~bpo10+1
ii cyrus-caldav 3.2.0-5~bpo10+1
ii cyrus-clients 3.2.0-5~bpo10+1
pn cyrus-doc 
ii cyrus-imapd 3.2.0-5~bpo10+1
pn cyrus-murder 
pn cyrus-nntpd 
pn cyrus-pop3d 
pn cyrus-replication 
ii sasl2-bin 2.1.27+dfsg-1+deb10u1

-- Configuration Files:
/etc/cyrus.conf changed:
START {
# do not delete this entry!
recover cmd="/usr/sbin/cyrus ctl_cyrusdb -r"
# this is only necessary if idlemethod is set to "idled" in imapd.conf
idled cmd="idled"
# this is useful on backend nodes of a Murder cluster
# it causes the backend to syncronize its mailbox list with
# the mupdate master upon startup
#mupdatepush cmd="/usr/sbin/cyrus ctl_mboxlist -m"
# this is recommended if using duplicate delivery suppression
delprune cmd="/usr/sbin/cyrus expire -E 3"
# this is recommended if caching TLS sessions
tlsprune cmd="/usr/sbin/cyrus tls_prune"
}
SERVICES {
# --- Normal cyrus spool, or Murder backends ---
# add or remove based on preferences
imap cmd="imapd -U 30" listen="imap" prefork=0 maxchild=200
imaps cmd="imapd -s -U 30" listen="imaps" prefork=0 maxchild=200
#pop3 cmd="pop3d -U 30" listen="pop3" prefork=0 maxchild=50
#pop3s cmd="pop3d -s -U 30" listen="pop3s" prefork=0 maxchild=50
#nntp cmd="nntpd -U 30" listen="nntp" prefork=0 maxchild=100
#nntps cmd="nntpd -s -U 30" listen="nntps" prefork=0 maxchild=100
#http cmd="httpd -U 30" listen="8008" prefork=0 maxchild=100
https cmd="httpd -s -U 30" listen="8443" prefork=0 maxchild=100
# At least one form of LMTP is required for delivery
# (you must keep the Unix socket name in sync with imap.conf)
#lmtp cmd="lmtpd" listen="localhost:lmtp" prefork=0 maxchild=20
lmtpunix cmd="lmtpd" listen="/run/cyrus/socket/lmtp" prefork=0 maxchild=20
# --
# useful if you need to give users remote access to sieve
# by default, we limit this to localhost in Debian
sieve cmd="timsieved" listen="localhost:sieve" prefork=0 maxchild=100
# this one is needed for the notification services
notify cmd="notifyd" listen="/run/cyrus/socket/notify" proto="udp" prefork=1
# --- Murder frontends -
# enable these and disable the matching services above, # except for
sieve (which deals automatically with Murder)
# mupdate database service - must prefork at least 1
# (mupdate slaves)
#mupdate cmd="mupdate" listen=3905 prefork=1
# (mupdate master, only one in the entire cluster)
#mupdate cmd="mupdate -m" listen=3905 prefork=1
# proxies that will connect to the backends
#imap cmd="proxyd" listen="imap" prefork=0 maxchild=100
#imaps cmd="proxyd -s" listen="imaps" prefork=0 maxchild=100
#pop3 cmd="pop3proxyd" listen="pop3" prefork=0 maxchild=50
#pop3s cmd="pop3proxyd -s" listen="pop3s" prefork=0 maxchild=50
#lmtp cmd="lmtpproxyd" listen="lmtp" prefork=1 maxchild=20
# --
}
EVENTS {
# this is required
checkpoint cmd="/usr/sbin/cyrus ctl_cyrusdb -c" period=30
# this is only necessary if using duplicate delivery suppression
delprune cmd="/usr/sbin/cyrus 

Bug#961501: remmina is calling home for update notifications

2020-05-26 Thread Mike Gabriel

On  Di 26 Mai 2020 10:00:56 CEST, Antenore Gatta wrote:


[...]


Thanks for your understanding on this issue, Antenore. Much appreciated.


I prefere to relase a clean and cleaned 1.4.6 version than playing with
workaround patches that may introduce other bugs


Yeah, I think getting this fixed in the next upstream release is fair enough.

Thanks a lot,
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpJHCzVGWDyY.pgp
Description: Digitale PGP-Signatur


Bug#961501: remmina is calling home for update notifications

2020-05-25 Thread Mike Gabriel

Hi Antenore,

Thanks for the quick reply.

On  Mo 25 Mai 2020 15:24:44 CEST, Antenore Gatta wrote:


Hi Christoph,

Upstream developer…

I think it's a bit exaggerated to say that is a privacy violation.


Debian users expect from Debian, to be a safe harbour, so all package  
maintainers are requested to patch out code that does unwanted /  
uncontrollable connections to the internet for stats collections and  
such.



We just get a plain text file from https://remmina.org (e.g. https://
remmina.org/news/remmina_news.php?ver=1.4.5) with the new changelog.


While I understand the interest in usage statistics, in Debian we  
cannot have that part of the phoning-home code. I am sorry.



Remmina on a regular basis verify if there's a new file or if the file of the
version requested (the PHP parameter) has been changed/updated.


Thanks for the explanation of the mechanism.


We do this to notify users about new versions, especially when there are
important bugs that have been fixed.


This is not helpful in a GNU distribution using a conservative-style  
release model (not sure if this is the correct term) like Debian does.  
Imagine Debian stable and oldstable users being reminded of their  
software being out of date on every upstream release. Of course, their  
software is out of date, as they use remmina from Debian (old)stable  
(not testing/unstable). They get those notifications but cannot do  
anything about it (except upgrading to Debian testing).


So, also from a usability point of view, those notification windows  
will be a disturbance to the users of Debian.


Libreoffice does something similar for instance and other software,  
in Debian,

as well.


Really? Than this must be considered as a bug. Which other packages  
have you observed doing this?



I understand it may be quite annoying and we can add an opt-out option, would
that be enough?


Nope. I'd vote for a build-time switch that disables that code. I am  
sorry. Another option could be a disabled-by-default (via build-time  
option) update notification feature. A new remmina user should not be  
bothered by update notification popups they won't be able to install  
(because their Debian version won't have that update).



Please consider that for a small project like Remmina is quite important to
keep a channel opened with our users, otherwise we keep receiving and
answering to the same issues again again, because usual people do not do the
effort of searching through our bug tracking system.


I fully understand that. People running on old software tend to report  
old bugs upstream. Please point them to the distribution they use, if  
they do that. In other projects, I use issue reporting templates that  
always ask for upstream version, package version and distro +  
distroversion. To amend the mess a little.


We do not track people and the stats is a completely separated  
system, that is

only opt-in.


I am sorry, but this won't change the policy here. Thanks for not  
tracking your users. Much appreciated.



So, let's find a solution that makes everybody happy.


I hope, you are ok with the above and the strictness of the policy.

light+love
Mike





--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpGPHeBWVslw.pgp
Description: Digitale PGP-Signatur


Bug#881719: libcdio 2.1.0 and lubcdio++

2020-05-24 Thread Gabriel F. T. Gomes
Hi, Vasyl,

on 24 May 2020, Vasyl Gello wrote:
>
>Gabriel has prepared 2.1.0 in his Salsa repo and I added C++ interfaces needed 
>by Kodi 19.0: 
>https://salsa.debian.org/gabrielftg-guest/libcdio/-/merge_requests/1

Thank you so much for writing this pull requests. I wasn't aware that
there was a C++ interface in libcdio. I'm actually very new to libcdio;
I only came across it because it is a dependency of another project
(pragha) that I mantain.

I'll review your merge request as soon as possible, then I'll prepare a
package for uploading. Initially, and because I was a little
uncomfortable with the soname change, I thought about uploading to
experimental first. Would that work for you?

>Can the version 2.1.0 be pushed into distribution?

Please bear in mind that we will have to go through the NEW queue,
because of the new binary packages (not just the C++ libraries, but
also because of the soname bump on the C library).


Cheers,
Gabriel



Bug#959545: libmateweather: FTBFS: dh_auto_test: error: make -j4 check VERBOSE=1 returned exit code 2

2020-05-22 Thread Mike Gabriel

Control: forwarded -1 https://github.com/mate-desktop/libmateweather/issues/76

Hi,

On  So 03 Mai 2020 14:55:57 CEST, Lucas Nussbaum wrote:


Source: libmateweather
Version: 1.24.0-1
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200501 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):

make[2]: Entering directory '/<>/data'
xmllint --valid --noout ../data/Locations.xml.in
./check-timezones.sh ./Locations.xml.in
Invalid timezones in ./Locations.xml.in: America/Godthab
make[2]: *** [Makefile:637: check] Error 1
make[2]: Leaving directory '/<>/data'
make[1]: *** [Makefile:490: check-recursive] Error 1
make[1]: Leaving directory '/<>'
dh_auto_test: error: make -j4 check VERBOSE=1 returned exit code 2


The full build log is available from:
   http://qa-logs.debian.net/2020/05/01/libmateweather_1.24.0-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.


I have forwarded the above upstream.
https://github.com/mate-desktop/libmateweather/issues/76

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgputhavmdr8K.pgp
Description: Digitale PGP-Signatur


Bug#961254: libpam-mklocaluser: stop enforcing logout on initial login

2020-05-22 Thread Mike Gabriel

Package: libpam-mklocaluser
Version: 0.17
Severity: important

The libpam-mklocaluser package is a core component of Debian Edu  
roaming workstations. It creates a local POSIX user account for users  
that exist e.g. in an LDAP database. The libpam-mklocaluser makes it  
possible to prep a machine for a user in a way that makes it possible  
to take the machine off-site.


The libpam-mklocaluser package especially modifies the user's home  
directory when creating this local POSIX user account. Whatever HOME  
path people have in LDAP, on the roaming workstation, all users are  
shoved into /home/.


Over years, however, there has been a design flaw in the tool which I  
could solve last night by reading the pam_python.so code.


The design flaw has been: The current version of libpam-mklocaluser  
enforces a session logout when users do their initial login into a  
machine. Thus, in class room situations, all students have to login  
twice into a notebook/tablet before they can actually use their  
computers. This takes a way 5 minutes of the class's lesson and could  
be avoided.


Attached is a patch that drops the enforcement of the re-login and  
manipulates the HOME env var after the local POSIX user account has  
been fully prepared by libpam-mklocaluser.


I'd love to see this issue solved in Debian buster, too.

This implicitly fixes Debian bug #760496.

Greets,
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de

diff --git a/debian/pam-python.py b/debian/pam-python.py
index fad6362..4780de1 100755
--- a/debian/pam-python.py
+++ b/debian/pam-python.py
@@ -147,14 +147,8 @@ def check_and_create_localuser(pamh, user):
   # FIXME Should be rewritten in python, I guess
   runcmd(pamh, "if [ -d /etc/mklocaluser.d ]; then ORIGHOMEDIR='%s' 
USER='%s' /bin/run-parts /etc/mklocaluser.d ; fi" % (homedir, user))
 
-  # Let the user know what is going on
-  msg = pamh.Message(pamh.PAM_TEXT_INFO,
- "Local user created in /home/, please log in again to 
start using it.")
-  pamh.conversation(msg)
-
-  # Throw out user, as the log process cached the home directory
-  # and need to be restarted.
-  return pamh.PAM_TRY_AGAIN
+  pamh.env['HOME'] = "/home/%s" % user
+
 except Exception as e:
   syslog.syslog("Failure while creating local user: %s " % (e))
   pass


pgpbXnk9cHRxa.pgp
Description: Digitale PGP-Signatur


Bug#843693: hello

2020-05-20 Thread Gabriel Bertrand
-- 

Hello

hope you are doing great. my name is Gabriel. We can be friends
I have important information I would like to share with you

Have a great day



Bug#960640: bash-completion: dh_bash-completion needs to record installed files for dh_missing

2020-05-16 Thread Gabriel F. T. Gomes
Hi, Andreas,

Could you point out a package that still uses dh_bash-completion? I'm
having a hard time finding one so that I can reproduce the problem
before working on the fix.

Thank you!



Bug#734788: Bonjour

2020-05-15 Thread Gabriel Bertrand
-- 
Bonjour

J'espère que vous allez bien. je m'appelle Gabriel. Nous pouvons être amis
J'ai des informations importantes que je voudrais partager avec vous

Passez une bonne journée

Cordialement,
Gabriel



Bug#906072: Ogon packages available (Linux RDP Server)

2020-05-13 Thread Mike Gabriel

Hi Marcel,

On  Do 16 Apr 2020 19:33:51 CEST, marcel wrote:


Hi,

I just wanted to let you know about ab packaged version of ogon  
(https://github.com/ogon-project (https://github.com/ogon-project),  
a linux Remote Desktop Protocol (RDP) server implementation).


https://launchpad.net/~linux-ng/+archive/ubuntu/ogon  
(https://launchpad.net/~linux-ng/+archive/ubuntu/ogon)


Maybe this can make it into Debian and helps to get ogon usable for  
a wider public.


I plan to work on Ogon as my next (unpaid) packaging project in  
Debian. It is awesome that you have already wrapped-up the Ogon  
components as DEBs. This will ease our day.


Main question is, if you'd be interested in co-maintaining Ogon in  
Debian (and consequently in all derivatives of Debian, thus in Ubuntu).


I guess, that Bernhard Miklautz (one of the upstream authors) will  
also be around for tricky issues and as our contact point on the  
upstream side.


The packaging should ideally happen in the Debian Remote Maintainers'  
namespace on salsa.debian.org [1]. Have you used Git for doing the DEB  
packaging of Ogon for your PPA? If so, could you provide access to  
those repos, so I can pull them over to salsa.debian.org (GitLab)?


Furthermore, if you'd be interested in co-maintaining there are  
several possible cooperation modes possible. I could be your reviewer  
(and tutor) regarding Debian policy conformant packaging of software  
(if you'd be interested in becoming a Debian Developer). We could also  
cooperate in a cross-distro approach: I am responsible for Ogon in  
Debian, you take care for it in one of its derivatives (e.g. Ubuntu)  
with proper upload permissions there (a model, Martin Wimpress and  
have been using for the MATE desktop packaging).


Let me know what you think!

Mike

[1] https://salsa.debian.org/debian-remote-team
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgp1goqHt6pqz.pgp
Description: Digitale PGP-Signatur


Bug#960478: xorg-server: Allow XDMCP keepalives to be disabled

2020-05-13 Thread Mike Gabriel

Hi Herbert,

On  Mi 13 Mai 2020 07:28:52 CEST, herbert wrote:


Package: xorg-server
Version: 2:1.20.4-1
Severity: wishlist

As it is, when an XDMCP session is used over TCP keepalive packets
are periodically sent and the session is torn down if no replies
come back.

During a transient network failure, this causes an X session that
could otherwise survive just fine to be terminated prematurely.

While some may wish for this behaviour, perhaps to avoid a locked-up
X terminal, it would be nice if there was an option to either
extend the timeout so that failures of a few minutes do not cause
the session to be torn down, or even better just disable the
keepalives altogether.


this is OT here, but you may want to try X2Go. Torn down sessions can  
be resumed in their previous state if connections fail.


X2Go also supports connecting to XDMCP sessions, but makes those XDMCP  
(more) sessions persistent / robust against connection drop-outs.


Greets,
Mike


--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgptHDpstggAx.pgp
Description: Digitale PGP-Signatur


Bug#959477: ITP: ckeditor3 -- Javascript rich text editor for embedding into websites (v3)

2020-05-11 Thread Mike Gabriel

Hi Bastien,

On  Mo 11 Mai 2020 01:32:53 CEST, Bastien ROUCARIES wrote:


On Sat, May 2, 2020 at 9:21 PM Mike Gabriel
 wrote:


Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

* Package name: ckeditor3
  Version : 3.6.6.1
  Upstream Author : Frederico Knabben
* URL : http://ckeditor.com/download
* License : GPL-2+
  Programming Lang: Javascript
  Description : Javascript rich text editor for embedding into  
websites (v3)


 I plan to re-upload ckeditor3 to Debian as part of my initiative to
 re-provide Horde in Debian.
 .
 Unfortunately, Horde upstream has still not moved on to ckeditor4,  
thus this

 old version of ckeditor is required for the interim.
 .
 Before Debian 11 gets released I plan to provide a patch to Horde Upstream
 that fixes this problem.


ckeditor in debian is 3 by memory


nope, ckeditor has been 4.x for a while in Debian... (4.12.1 currently  
in unstable).


Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpB74K6YJWrI.pgp
Description: Digitale PGP-Signatur


Bug#886525: ITP: rt4-extension-mergeusers -- Merge users (Request Tracker)

2020-05-10 Thread Gabriel Filion
Hello,

On Sun, 07 Jan 2018 23:39:36 +1300 Andrew Ruthven  wrote:
> Package: wnpp
> Severity: wishlist
> Owner: Andrew Ruthven 
> 
> * Package name: rt4-extension-mergeusers
>   Version : 1.03
>   Upstream Author : Best Practical Solutions, LLC 
> * URL : https://metacpan.org/release/RT-Extension-MergeUsers
> * License : GPL v2
>   Programming Lang: Perl
>   Description : Merge users (Request Tracker)
> 
>  This extension allows merging users in Request Tracker.
> 
> You always end up with duplicate users in a ticketing system since people
> use different email addresses. This extension provides a mechanism to
> manage that better.
> 
> The intial packaging work has been carried but by myself for my employer.
> Ongoing maintenance will be by the Debian Request Tracker Group (of which
> I'm a member).

I'm quite interested in seeing this extension packaged in debian. Do you
have your packaging work published somewhere that I could retrieve?



signature.asc
Description: OpenPGP digital signature


Bug#894998: ITP: rt4-extension-rest2 -- REST2 API extension (Request Tracker)

2020-05-10 Thread Gabriel Filion
Hello,

On Fri, 06 Apr 2018 14:57:30 +1200 Andrew Ruthven  wrote:
> Package: wnpp
> Severity: wishlist
> Owner: Andrew Ruthven 
> 
> * Package name: rt4-extension-rest2
>   Version : 1.03
>   Upstream Author : Best Practical Solutions 
> * URL : https://metacpan.org/release/RT-Extension-REST2
> * License : GPLv2
>   Programming Lang: Perl
>   Description : REST2 API extension (Request Tracker)
> 
>  This extension adds a modern REST API to Request Tracker.
> 
> The existing API for RT is a rather painful RFC822 (yes email) based
> system via HTTP. This extension provides a much nicer JSON based RESTful
> interface.
> 
> The intial packaging work has been carried but by myself for my employer.
> Ongoing maintenance will be by the Debian Request Tracker Group (of which
> I'm a member).

I'm quite interested in seeing this extension packaged in debian. Do you
have your packaging work published somewhere that I could retrieve?



signature.asc
Description: OpenPGP digital signature


Bug#959944: ITP: xdg-desktop-portal-wlr -- xdg-desktop-portal backend for wlroots

2020-05-07 Thread Mike Gabriel

On  Do 07 Mai 2020 10:09:14 UTC, Birger Schacht wrote:


Package: wnpp
Severity: wishlist
Owner: Birger Schacht 

* Package name: xdg-desktop-portal-wlr
  Version : 0.1.0
  Upstream Author : Simon Ser
* URL : https://github.com/emersion/xdg-desktop-portal-wlr
* License : MIT
  Programming Lang: C
  Description : xdg-desktop-portal backend for wlroots

This package will provide support for the screenshot, screencast, and
possibly remote-desktop xdg-desktop-portal interfaces for wlroots based
compositors.
I plan to maintain it in the swaywm-team.


ping me if uou need a sponsor for this...

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



Bug#882584: Found the salsa package

2020-05-07 Thread Mike Gabriel

Hi Yanu,

On  Mi 06 Mai 2020 21:44:59 CEST, yanu wrote:

On Sun, 15 Mar 2020 12:26:28 + Mike Gabriel  
 wrote:

On  So 15 Mär 2020 03:10:03 CET, Martin Quinson wrote:
> On Sat, Mar 14, 2020 at 09:02:49PM +, Mike Gabriel wrote:
>> On  Sa 14 Mär 2020 00:36:21 CET, Martin Quinson wrote:
>>
>> > https://salsa.debian.org/debian-edu-pkg-team/openboard/
>> >
>> > could we however modify this git repository to use git-buildpackage?
>> > It makes things so much easier to maintain...
>> >
>> > Thanks for your work,
>> > Mt
>>
>> Sorry, no. I see myself in a constant process of removing more and more
>> files from the upstream Git tag/tarball, because files are  
non-DFSG for this

>> or that reason. I am not willing to pollute the salsa repo with these
>> changes.
>
> Ok, you know that better than I do.
>
>> To get openboard on salsa built, these steps should work:
>>
>>   $ git clone https://salsa.debian.org/debian-edu-pkg-team/openboard.git
>>   $ cd openboard
>>   $ debian/rules get-orig-source
>>   $ debuild -uc -us -S -Zxz -d
>>   $ dpkg-source -x openboard_.dsc
>>   $ cd openboard-
>>   $ debuild -uc -us
>
> I just tried, and it fails on the last step because of missing
> dependencies. Maybe we could add a .gitlab-ci attempting these steps
> so that we see where we currently stand?
>
>> IIRC, the current version on the repo's master branch only works / builds
>> well on Debian testing/unstable.

I'll try to invest some time on OpenBoard during the next week to
bring myself and then you up to speed. I have a long feedback mail (in
German) from a teacher in Germany with several suggestions. I'll try
to translate the gist of that and post it to you (and the
debian-edu-pkg-team's mailing list).


I'm on debian/unstable (desktop and laptop) and confirms that  
openboard is working, not perfect, but good.


With the compile-steps from Mike, I could compile all the  
openboard-packages, after installing a lot of dependencies (I saved  
the list).

  openboard - Interactive White Board Application
  openboard-common - Interactive White Board Application (common files)
  openboard-dbgsym - debug symbols for openboard
  openboard-fonts-nonfree - Interactive White Board Application  
(non-free fonts)


As a electric teacher in corana-times, I'm using openboard everyday  
as my main tool to teach.

Once in a while there is a crash, but after a quick restart, nothing is lost.

I would like to use this also after they find a vaccin against corona.
Then I would like to use it more often to evaluate papers, instead  
of printing them (saving the trees).
Also bought a wacom tablet to draw sketches, graphics, ... The wacom  
pen-top is melting fast ;-)

So, it would be great to have this software in debian repositories.

My software-knowledge doesn't go further than some hobby-programming  
on arduino.

I'm willing to donate some developping-time ?

Keep up the good work !


I am sorry, that work on this is s delayed. My goal is to get this  
openboard beast into bullseye.


I'll try to give this some prio before the school term ends. Sigh...

Mike

--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpNo08Zg4hh_.pgp
Description: Digitale PGP-Signatur


Bug#942282: O: php-horde-core -- Core Horde Framework library (AND all php-horde*!)

2020-05-05 Thread Mike Gabriel

Hi Juri,

On  Do 28 Nov 2019 23:18:16 CET, debian wrote:


Hello Mike,

with this manual
https://salsa.debian.org/horde-team/tools/blob/master/README.md

I was successfully building horde packages 6 months ago.
If you want, you can add me to horde team.

Best Regards,
Juri Grabowski


after php-horde* pkgs have been removed from unstable last week  
(Mathieu missed my statement of interest in adopting php-horde*), I  
have re-uploaded the first bulk of packages (ring0.list mainly).


Let me know, if you'd still be interested in co-maintaining this  
massive package pile. I'd add you to Uploaders: and grant you access  
to the horde-team group on Salsa.


Greets,
Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler Str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4351) 850 8940

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de



pgpLSNRCO6Wfr.pgp
Description: Digitale PGP-Signatur


Bug#959477: ITP: ckeditor3 -- Javascript rich text editor for embedding into websites (v3)

2020-05-02 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

* Package name: ckeditor3
  Version : 3.6.6.1
  Upstream Author : Frederico Knabben
* URL : http://ckeditor.com/download
* License : GPL-2+
  Programming Lang: Javascript
  Description : Javascript rich text editor for embedding into websites (v3)

 I plan to re-upload ckeditor3 to Debian as part of my initiative to
 re-provide Horde in Debian.
 .
 Unfortunately, Horde upstream has still not moved on to ckeditor4, thus this
 old version of ckeditor is required for the interim.
 .
 Before Debian 11 gets released I plan to provide a patch to Horde Upstream
 that fixes this problem.



Bug#925444: smokeping: --pid-dir doesn't worj as expected

2020-05-01 Thread Gabriel Filion
Hi Cameron,

Sorry it took me so much time to reply. I've just now fixed my local
discardable VM setup for testing so I'm able to dive in again.

On Tue, 11 Feb 2020 11:23:19 +1000 Cameron Davidson
 wrote:
> This has just started hapenning to my also.
> 
> The cause, I think, that evenutally a tmpfile cleanup will delete
> /run/smokeping - maybe depends on age and/or  because it is not owned by
> root.

This is very strange.. As I've mentioned earlier in this bug report, the
systemd unit file should have a directive (RuntimeDirectory) that
automatically creates the directory /run/smokeping.
I've just verified and the sysvinit script also does create the
directory (albeit under /var/run, but that should be equivalent since
/var/run can be expected to symlink to /run).

Something that I've just discovered today though is that systemd
completely destroys the /run/smokeping directory when the service is
stopped. So this might throw some ppl off (myself included!) when trying
to debug this.


maybe one thing that might be interesting to verify is whether the
configuration file points to the right directory for "piddir". In the
default configuration that the package ships, the file
/etc/smokeping/config.d/pathnames contains the following:


root@debian-10-amd64:~# cat /etc/smokeping/config.d/pathnames
sendmail = /usr/sbin/sendmail
imgcache = /var/cache/smokeping/images
imgurl   = ../smokeping/images
datadir  = /var/lib/smokeping
piddir  = /var/run/smokeping
smokemail = /etc/smokeping/smokemail
tmail = /etc/smokeping/tmail
dyndir = /var/lib/smokeping/__cgi


check in this file if "piddir" points either to /var/run/smokeping or
/run/smokeping, otherwise try and correct the path.


and finally as I mentioned earlier, if smokeping is running in "slave"
mode, then --pid-dir behaves differently : it does not create a pid file
for some reason. if you're running smokeping using this mode, then take
a look at the example file I've added to the package:

/usr/share/doc/smokeping/examples/systemd/slave_mode.conf

this can be copied in a systemd override directory and then adapted for
the master url. the file contains some instructions in comments for
where to place it.

> One solution (I found for other systemd processes run as non-root) is to
> add a config file:
> 
> /usr/lib/tmpfiles.d/smokeping.conf
> 
> Contents should be something like:
> 
>    d    /run/smokeping   0755   smokeping   smokeping   -   -
> 
> to have systemd recreate the dir when smokeping is started.

I believe this should be non-necessary since both the init script and
the systemd units have some method to automatically create the directory.


If you're still unable to get the pid file to be created by systemd,
then maybe I'm missing something out. In this case, tell me a bit more
information about your system. e.g. what CPU architecture is being used
(amd64, arm64, i386, ...) and what version of systemd your system
currently has installed.


Cheers!



signature.asc
Description: OpenPGP digital signature


Bug#959359: ITP: php-horde-sesha -- A simple Inventory App for Horde

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: sesha
 Version : 1.0.0RC3
 Upstream Author : Jan Schneider , Ralf Lang 

 URL : http://horde.org/
 License : GPL-2.0
 Programming Lang: PHP
 Description : A simple Inventory App for Horde

 Sesha allows you to define categories with a rich set of attributes to manage 
your inventory stock
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959361: ITP: php-horde-whups -- Ticket-tracking application

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: whups
 Version : 3.0.12
 Upstream Author : Chuck Hagenbuch , Jan Schneider 

 URL : http://horde.org/
 License : BSD-2-Clause
 Programming Lang: PHP
 Description : Ticket-tracking application

 Whups is a Horde ticket-tracking application. It is very flexible in design, 
and can be used for help-desk requests, tracking software development, and 
anything else that needs to track a set of requests and their status.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959362: ITP: php-horde-wicked -- Wiki application

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: wicked
 Version : 2.0.8
 Upstream Author : Jan Schneider , Chuck Hagenbuch 

 URL : http://horde.org/
 License : GPL-2.0
 Programming Lang: PHP
 Description : Wiki application

 Wicked is a wiki application for Horde.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959360: ITP: php-horde-scheduler -- Horde Scheduler System

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Scheduler
 Version : 2.0.3
 Upstream Author : Chuck Hagenbuch 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde Scheduler System

 Horde Scheduler System
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959354: ITP: php-horde-xml-wbxml -- Horde_Xml_Wbxml provides an API for encoding and decoding WBXML documents used in SyncML and other wireless applications

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Xml_Wbxml
 Version : 2.0.3
 Upstream Author : Chuck Hagenbuch , Jan Schneider 

 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde_Xml_Wbxml provides an API for encoding and decoding 
WBXML documents used in SyncML and other wireless applications

 Encoding and decoding of WBXML (Wireless Binary XML) documents. WBXML is used 
in SyncML for transferring smaller amounts of data with wireless devices.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959352: ITP: php-horde-text-filter-jsmin -- Horde Text Filter - Jsmin PHP Driver

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Text_Filter_Jsmin
 Version : 1.0.2
 Upstream Author : Michael Slusarz 
 URL : http://horde.org/
 License : JSMin
 Programming Lang: PHP
 Description : Horde Text Filter - Jsmin PHP Driver

 The JSMin javascript minifier driver for use with the Horde_Text_Filter 
package.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959355: ITP: php-horde-lz4 -- Horde LZ4 Compression Extension

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: horde_lz4
 Version : 1.0.10
 Upstream Author : Michael Slusarz 
 URL : http://horde.org/
 License : MIT (Expat)
 Programming Lang: PHP
 Description : Horde LZ4 Compression Extension

 PHP extension that implements the LZ4 compression algorithm - an extremely 
fast lossless compression algorithm.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959347: ITP: php-horde-service-gravatar -- API accessor for gravatar.com

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Service_Gravatar
 Version : 1.0.1
 Upstream Author : Michael Slusarz , Gunnar Wrobel 

 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : API accessor for gravatar.com

 A library for accessing the Avatar services at gravatar.com.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959340: ITP: php-horde-memcache -- Horde Memcache API

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Memcache
 Version : 2.1.1
 Upstream Author : Michael Slusarz 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde Memcache API

 Provides an API to access a memcache installation.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959357: ITP: php-horde-ansel -- Photo gallery application

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: ansel
 Version : 3.0.10
 Upstream Author : Michael J Rubinsky , Jan Schneider 
, Chuck Hagenbuch 
 URL : http://horde.org/
 License : GPL-2.0
 Programming Lang: PHP
 Description : Photo gallery application

 Ansel is a full featured photo gallery application.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959349: ITP: php-horde-service-twitter -- Horde Twitter client

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Service_Twitter
 Version : 2.1.6
 Upstream Author : Michael J Rubinsky 
 URL : http://horde.org/
 License : BSD-2-Clause
 Programming Lang: PHP
 Description : Horde Twitter client

 Client libraries for the Twitter REST API.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959348: ITP: php-horde-service-weather -- Horde Weather Provider.

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Service_Weather
 Version : 2.5.4
 Upstream Author : Michael J Rubinsky 
 URL : http://horde.org/
 License : BSD-2-Clause
 Programming Lang: PHP
 Description : Horde Weather Provider.

 Set of classes that provide an abstraction to various online weather service 
providers. Includes drivers for WeatherUnderground and WorldWeatherOnline.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959353: ITP: php-horde-thrift -- Thrift

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Thrift
 Version : 2.0.3
 Upstream Author : Chuck Hagenbuch 
 URL : http://horde.org/
 License : Apache 2.0
 Programming Lang: PHP
 Description : Thrift

 Packaged version of the PHP Thrift client
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959350: ITP: php-horde-syncml -- Horde_SyncMl provides an API for processing SyncML requests

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_SyncMl
 Version : 2.0.7
 Upstream Author : Jan Schneider 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde_SyncMl provides an API for processing SyncML requests

 Classes for implementing a SyncML server.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959351: ITP: php-horde-test -- Horde testing base classes

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Test
 Version : 2.6.3
 Upstream Author : Chuck Hagenbuch , Jan Schneider 

 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde testing base classes

 Horde-specific PHPUnit base classes.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959341: ITP: php-horde-mongo -- Horde Mongo Configuration

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Mongo
 Version : 1.1.0
 Upstream Author : Michael Slusarz 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde Mongo Configuration

 Provides an API to ensure that the PECL Mongo extension can be used 
consistently across various Horde packages.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959344: ITP: php-horde-pdf -- Horde PDF library

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Pdf
 Version : 2.0.7
 Upstream Author : Jan Schneider , Chuck Hagenbuch 
, Mike Naberezny 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde PDF library

 PDF generation using only PHP, without requiring any external libraries.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959346: ITP: php-horde-service-facebook -- Horde Facebook client

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Service_Facebook
 Version : 2.0.10
 Upstream Author : Michael J Rubinsky 
 URL : http://horde.org/
 License : BSD-2-Clause
 Programming Lang: PHP
 Description : Horde Facebook client

 Client libraries for the Facebook REST API.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959345: ITP: php-horde-scribe -- Scribe

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Scribe
 Version : 2.0.3
 Upstream Author : Chuck Hagenbuch 
 URL : http://horde.org/
 License : Apache 2.0
 Programming Lang: PHP
 Description : Scribe

 Packaged version of the PHP Scribe client.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959358: ITP: php-horde-passwd -- Horde password changing application

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: passwd
 Version : 5.0.7
 Upstream Author : Jan Schneider , Michael Slusarz 

 URL : http://horde.org/
 License : GPL-2.0
 Programming Lang: PHP
 Description : Horde password changing application

 An application to change any user passwords stored in various backends like 
SQL, LDAP, Kolab, passwd files etc.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959356: ITP: php-horde-service-urlshortener -- Horde_Service_UrlShortener Class

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Service_UrlShortener
 Version : 2.0.3
 Upstream Author : Michael J Rubinsky 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde_Service_UrlShortener Class

 Interfaces to various URL shortening services.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959343: ITP: php-horde-openxchange -- Open-Xchange Connector

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_OpenXchange
 Version : 1.0.1
 Upstream Author : Jan Schneider 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Open-Xchange Connector

 Library to interact with Open-Xchange servers.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959342: ITP: php-horde-oauth -- Horde OAuth client/server

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Oauth
 Version : 2.0.4
 Upstream Author : Chuck Hagenbuch 
 URL : http://horde.org/
 License : BSD-2-Clause
 Programming Lang: PHP
 Description : Horde OAuth client/server

 An OAuth consumer (http://oauth.net) and OAuth infrastructure, and in the 
future will provide an OAuth server.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959339: ITP: php-horde-mapi -- MAPI utility library

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_Mapi
 Version : 1.0.10
 Upstream Author : Michael J Rubinsky 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : MAPI utility library

 Provides various utility classes for dealing with Microsoft MAPI structured 
data.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



Bug#959330: ITP: php-horde-hashtable -- Horde Hash Table Interface

2020-05-01 Thread Mike Gabriel
Package: wnpp
Severity: wishlist
Owner: Mike Gabriel 

 Package name: Horde_HashTable
 Version : 1.2.6
 Upstream Author : Michael Slusarz 
 URL : http://horde.org/
 License : LGPL-2.1
 Programming Lang: PHP
 Description : Horde Hash Table Interface

 Provides an abstract API to access various hash table implementations.
 .
 Unfortunately, this package has recently been removed from Debian
 unstable.
 .
 I am planning to re-upload this package and pick up maintenance of Horde
 in Debian..



<    5   6   7   8   9   10   11   12   13   14   >