Bug#684452: CVE-2012-3447 unblock: nova/2012.1.1-6

2012-08-10 Thread Christian PERRIER
Quoting Thomas Goirand (z...@debian.org):

> One last thing: in our Git, I have already a debian/po/es.po update. I
> didn't upload the package with it, because of the urgency=high. Was this
> the correct thing to do (eg: plan for a later upload then unblock), or
> should I have include the template update? Please give me the release
> team view on this, so I know how to handle such situation later on.


My personal stance on this (so, not the release team view): uploading
with the spanish translation would have been OK as it is well known
that such updates are anyway accepted. 

That would save another upload and another freeze exception request
later on..:-). But I very well understand you want to give priority to
the security fix and not "pollute" your request with an unrelated
change. 



signature.asc
Description: Digital signature


Bug#684554: unblock: rssh/2.3.3-5

2012-08-10 Thread Russ Allbery
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package rssh.  This fixes a security vulnerability in
the command-line parsing by applying upstream's patch and then
adjusting the Debian patches accordingly.

unblock rssh/2.3.3-5

Because the package uses TopGit (I intend to switch to git-dpm) and
generates a quilt series, the straight debdiff is not particularly
useful since it's a diff between various patches.  Instead, attached
is the diff between the unpacked source for 2.3.3-4 and 2.3.3-5 with
all patches already applied, excluding the debian/patches directory
from the diff.  This seems like a better diff to review.  Let me know
if you want a diff in another format, however.

There are a few unfortunate whitespace-only hunks here that are due to
applying the upstream patch verbatim.  I considered removing them, but
decided that keeping the official upstream patch applied verbatim was
a better idea since it made for easier comparisons.

There is a stable security upload pending.  I've already contacted the
security team about that.

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-2-686-pae (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -ru --exclude .pc --exclude patches rssh-2.3.3-4/debian/changelog rssh-2.3.3-5/debian/changelog
--- rssh-2.3.3-4/debian/changelog	2012-03-07 16:08:52.0 -0800
+++ rssh-2.3.3-5/debian/changelog	2012-08-10 22:14:54.0 -0700
@@ -1,3 +1,11 @@
+rssh (2.3.3-5) unstable; urgency=medium
+
+  * Apply upstream patch to close security vulnerability that permitted
+clever manipulation of environment variables on the ssh command line
+to bypass rssh checking.  (CVE-2012-3478)
+
+ -- Russ Allbery   Fri, 10 Aug 2012 22:14:34 -0700
+
 rssh (2.3.3-4) unstable; urgency=low
 
   * Force libexecdir to /usr/lib/rssh.  This is not a library package and
diff -ru --exclude .pc --exclude patches rssh-2.3.3-4/main.c.in rssh-2.3.3-5/main.c.in
--- rssh-2.3.3-4/main.c.in	2012-08-09 18:21:02.0 -0700
+++ rssh-2.3.3-5/main.c.in	2012-08-10 22:46:01.0 -0700
@@ -184,7 +184,7 @@
 	 * determine if the command in cmdline is acceptable to run, and store
 	 * name of program to exec in cmd
 	 */
-	if ( !(*cmd = check_command_line(cmdline, opts)) ) return NULL;
+	if ( !(*cmd = get_command(cmdline, opts)) ) return NULL;
 
 	/* if we need to do chroot processing, do it */
 	if ( opts->shell_flags & RSSH_USE_CHROOT ){
@@ -254,7 +254,9 @@
 	}
 
 	/* return vector of pointers to command line arguments */
-	return build_arg_vector(cmdline, 0);
+	argvec = build_arg_vector(cmdline, 0);
+	if (check_command_line(argvec, opts)) return argvec;
+	else return NULL;
 }
 
 void vers_info( void )
diff -ru --exclude .pc --exclude patches rssh-2.3.3-4/util.c rssh-2.3.3-5/util.c
--- rssh-2.3.3-4/util.c	2012-08-09 18:21:02.0 -0700
+++ rssh-2.3.3-5/util.c	2012-08-10 22:46:01.0 -0700
@@ -110,7 +110,7 @@
 	/* print error message to user and log attempt */
 	fprintf(stderr, "\nThis account is restricted by rssh.\n"
 		"%s\n\nIf you believe this is in error, please contact "
-	"your system administrator.\n\n", cmd);
+		"your system administrator.\n\n", cmd);
 	if ( argc < 3 )
 		log_msg("user %s attempted to log in with a shell",
 			username);
@@ -136,31 +136,35 @@
  */
 bool opt_exist(char *cl, char opt)
 {
-	int	i = 0;
+	int	i = 1;
 	int	len;
-	char	*token;
-	bool	optstring = FALSE;
-
 
 	len = strlen(cl);
 
 	/* process command line character by character */
-	while ( i < (len - 2) ){
-		if ( cl[i] == ' ' || cl[i] == '\t' ){
-			if ( cl[i+1] == '-' ){ 
-optstring = TRUE;
-i+=2;
-			}
-		}
-		if ( cl[i] == opt && optstring ) return TRUE;
-		if ( cl[i] == ' ' || cl[i] == '\t' || cl[i] == '-' ) 
-			optstring = FALSE;
+	if (!(cl[0] == '-')) return FALSE;
+	while ( i < (len) ){
+		if ( cl[i] == opt ) return TRUE;
 		i++;
 	}
 	return FALSE;
 }
 
 
+bool opt_filter(char **vec, const char opt)
+{
+	while (vec && *vec){
+		if (opt_exist(*vec, opt)){
+			fprintf(stderr, "\nillegal insecure %c option", opt);
+			log_msg("insecure %c option in command line!", opt);
+			return TRUE;
+		}
+		vec++;
+	}
+	return FALSE;
+}
+
+
 bool check_command( char *cl, ShellOptions_t *opts, char *cmd, int cmdflag )
 {
 	int	cl_len;		/* length of command line */
@@ -190,95 +194,98 @@
 	return FALSE;
 }
 
+
 /*
  * check_rsync_e() - take the command line passed to rssh and look for a -e
- *   option.  If one is found, make sure --server is provided
- *   and the option contains only the protocol information.
- *   Returns 1 if the command line is safe; 0 otherwise.
+ *		 option.  If one is found, make sure --server is provided
+ *		 and the option c

Bug#684452: CVE-2012-3447 unblock: nova/2012.1.1-6

2012-08-10 Thread Thomas Goirand
Hi Adam,

Thanks for your careful review.

On 08/11/2012 04:41 AM, Adam D. Barratt wrote:
> On Fri, 2012-08-10 at 14:25 +0800, Thomas Goirand wrote:
>> Please unblock the nova package. This fixes CVE-2012-3447, which is a
>> file injection vulnerability in the host filesystem, using a specially
>> crafted guest image.
>>
>> The relevant diff is available here:
>> http://anonscm.debian.org/gitweb/?p=openstack/nova.git;a=commitdiff;h=55e78f9cbaa1c4657a97c6b20797a94968030e75
> 
> Please don't do that.  It needs a context switch, doesn't work when
> reading mail offline and means that the list archive doesn't stand alone
> as a historical, well, archive of what was okayed.  There's a reason
> that the freeze policy explicitly asks for debdiffs.

I'm sorry, I wont do it again. I've attached the corresponding diff file
for this unblock request.

>> The patch comes directly from upstream, as per the patch header (I just
>> applied it manually, then did dpkg-source --commit).
>>
>> Note that this also includes a (needed) tweak in the configuration files
>> as per this commit:
>> http://anonscm.debian.org/gitweb/?p=openstack/nova.git;a=commitdiff;h=4cd725c5d164484a3ddb6bf95f37fb715cb51169
> 
> Two questions:
> 
> 1) Why is there no mention of the above changes in the changelog?
> 
> 2) Why does "Add nova-compute.conf files to nova-compute init if exist"
> require
> 
> -DAEMON_ARGS="--flagfile=/etc/nova/nova.conf"
> +DAEMON_ARGS="--config-file=/etc/nova/nova.conf"
> 
> and a bunch of
> 
> +[DEFAULT]
> 
> ?

What happened is that CVE-2012-3447 was embargoed. Ghe Rivero asked me
to take care of it, and upload the patch on the 7th of July, since he
was planing on going in holidays at that time. I'm not sure until when
he is away, he didn't send a mail to -private and I didn't ask him until
when he would go away. Ghe could you send a [VAC] message next time, please?

So I did take care of it, and was expecting to see no change in our Git.
So I did add the upstream patch for this CVE, built, then uploaded to SID.

But I was wrong, as Ghe did this commit, and didn't tell about it. He
didn't fill debian/changelog, which is why I didn't notice it either.

I hate pointing fingers at people, but here, I don't think I'm the one
to blame.

Anyway, let me explain what I believe this patch does. Previously, we
had only a single configuration file, called /etc/nova/nova.conf. But we
changed that, and we are now using /etc/nova/nova-compute.conf also,
which has hypervisor specific flags (for example, nova-compute-kvm will
have libvirt_type=kvm when nova-compute-xen will have
connection_type=xenapi).

So the important bit isn't:
-DAEMON_ARGS="--flagfile=/etc/nova/nova.conf"
+DAEMON_ARGS="--config-file=/etc/nova/nova.conf"

but this:
+test -f '/etc/nova/nova-compute.conf' && DAEMON_ARGS=${DAEMON_ARGS}"
--config-file=/etc/nova/nova-compute.conf"

which is necessary so that our new configuration files are used.

I believe that using --flagfile or --config-file does the exact same
thing. --flagfile was the old option, which has been replaced by
--config-file (and --flagfile is now deprecated). It's a good thing to
do that, so that it matches future releases of Openstack nova.

As for the [default] thing, I don't think that changes much anything,
and to be honest, I'm not really sure why Ghe has added this.
Unfortunately, it's impossible for me to ask him right away now.

Also, it seem to me that it's missing a [default] tag in
debian/nova-compute-xen.conf.dist (that one is only stored in
/usr/share/doc/nova-compute-xen, which is why it has a .dist extension
in the debian folder: /etc/nova/nova-compute.conf is maintained using
debconf in the case of nova-compute-xen). So if that has been forgotten
and is 100% necessary, then we will need to upload a fix and ask for
another unblock later on, I believe.

So, to Ghe, could you, in the future:
1/ Document your changes in debian/changelog *at the same time* as you
commit the rest of in our Git?
2/ Try to limit your changes, since we are frozen, or at least talk
about it in our Alioth list, so that I'm not in an uncomfortable
position like now? Was the addition of the [default] thing completely
necessary?

Anyway, I'm deeply concerned about this CVE. A lot more than these small
changes in the configuration files. I believe it is necessary to
unblock, even if I can't comment as much as I should on the above
changes. Holding the package to enter testing can be harmful to some users.

>> Also, Ubuntu folks already fixed the issue in 12.04.
> 
> How is that at all relevant to the Debian freeze?

This isn't relevant to the freeze, but to the patch for CVE-2012-3447.
I'm just saying that it has been applied in 12.04 and that no user
complained about its accuracy, which is reassuring of the quality of the
patch. Sorry if I didn't make it clear enough.

One last thing: in our Git, I have already a debian/po/es.po update. I
didn't upload the package with it, because of the urgency=high. Was this
the co

Upcoming d-i beta2, round 1

2012-08-10 Thread Cyril Brulebois
Hi folks,

I've started looking at:
  http://d-i.debian.org/testing-summary.html

plus the corresponding diffs against testing, and I came up with the
following things in my hints file:

unblock alsa-lib/1.0.25-4
unblock-udeb alsa-lib/1.0.25-4
unblock apt-setup/1:0.70
unblock-udeb apt-setup/1:0.70
unblock cdebconf/0.172
unblock-udeb cdebconf/0.172
unblock colo-installer/1.20
unblock-udeb colo-installer/1.20
unblock debian-installer-utils/1.92
unblock-udeb debian-installer-utils/1.92
unblock espeakup/1:0.71-10
unblock-udeb espeakup/1:0.71-10
# .gitignore files but oh well.
unblock grub-installer/1.77
unblock-udeb grub-installer/1.77
unblock gtk+2.0/2.24.10-2
unblock-udeb gtk+2.0/2.24.10-2
unblock hw-detect/1.90
unblock-udeb hw-detect/1.90
unblock live-installer/37
unblock-udeb live-installer/37
unblock partman-lvm/80
unblock-udeb partman-lvm/80
unblock partman-ufs/12
unblock-udeb partman-ufs/12
unblock prep-installer/0.16
unblock-udeb prep-installer/0.16
unblock preseed/1.54
unblock-udeb preseed/1.54
# ${misc:Depends} pulls cdebconf-udeb additionally.
unblock quik-installer/0.0.29
unblock-udeb quik-installer/0.0.29
unblock rootskel-gtk/1.25
unblock-udeb rootskel-gtk/1.25
unblock sibyl-installer/1.23
unblock-udeb sibyl-installer/1.23
unblock ttf-dejavu/2.33-3
unblock-udeb ttf-dejavu/2.33-3
unblock yaboot-installer/1.1.22
unblock-udeb yaboot-installer/1.1.22


To avoid wasting other release team member's time, I'd like to propose
adding such hints myself when it's about packages I didn't upload (with
a notification to both -release/-boot lists when it's about such big
chunks); and only bothering another RT member to get a review on my own
uploads.

If that's fine with everyone, I'll also add some age-days next time. I
wanted to come up with the above proposal before doing so…

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#684437: unblock: fpc/2.6.0-6

2012-08-10 Thread peter green

Philipp Kern wrote:

Uhm, is it really required by policy to delete backup files that weren't
created by the package in the first place?

diff -Nru fpc-2.6.0/debian/fp-compiler.postrm.in 
fpc-2.6.0/debian/fp-compiler.postrm.in
--- fpc-2.6.0/debian/fp-compiler.postrm.in  2012-05-06 21:43:32.0 
+
+++ fpc-2.6.0/debian/fp-compiler.postrm.in  2012-08-09 22:55:10.0 
+
@@ -4,12 +4,14 @@
 
 ACTION=$1
 
-CFG_FILE="/etc/fpc-${VERSION}.cfg"

+CFG_FILE="/etc/fpc-${VERSION}"
 
 # Debhelper code

 #DEBHELPER#
 
 if test "${ACTION}" = "purge"

 then
-   rm -f ${CFG_FILE}
+   rm -f  "${CFG_FILE}".cfg
+   rm -f  "${CFG_FILE}".bak
+   rm -f  "${CFG_FILE}".*dpkg*
 fi

The second part does not make me happy.
  

The .bak file is created by the package under some circumstances
(certain upgrade scenarios I believe).

I don't understand why abou put in the .*dpkg* line though. ccing
him to ask.


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50258848.7010...@p10link.net



Bug#684532: marked as done (unblock: libpng/1.2.49-2)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 22:47:12 +0100
with message-id <1344635232.2978.23.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684532: unblock: libpng/1.2.49-2
has caused the Debian Bug report #684532,
regarding unblock: libpng/1.2.49-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684532: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684532
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

Please unblock package libpng.
In version 1.2.49-2, we fixed RC bug #681408.

libpng (1.2.49-2) unstable; urgency=high

  * Change "a+w" to "u+w" in Makefile.in to fix CVE-2012-3386
Add 02-681408-CVE-2012-3386-Makefile.in.patch
Closes: #681408

 -- Anibal Monsalve Salazar   Fri, 13 Jul 2012 12:31:39 +1000

Best regards,
  Nobuhiro

unblock libpng/1.2.49-2

-- 
Nobuhiro Iwamatsu
   iwamatsu at {nigauri.org / debian.org}
   GPG ID: 40AD1FA6


libpng_1.2.49-2.debdiff
Description: Binary data
--- End Message ---
--- Begin Message ---
On Sat, 2012-08-11 at 06:25 +0900, Nobuhiro Iwamatsu wrote:
> Please unblock package libpng.
> In version 1.2.49-2, we fixed RC bug #681408.
> 
> libpng (1.2.49-2) unstable; urgency=high
> 
>   * Change "a+w" to "u+w" in Makefile.in to fix CVE-2012-3386
> Add 02-681408-CVE-2012-3386-Makefile.in.patch
> Closes: #681408

Already requested as #681414...

Regards,

Adam--- End Message ---


Bug#684534: unblock xfonts-a12k12/1-10

2012-08-10 Thread Nobuhiro Iwamatsu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

Please unblock package xfonts-a12k12.
old package is processing using old dh_installxfonts, directorys unnecessary
at the time of uninstallation remains. (Bug #682051)
This problem has been solved with covert to dh 9 in this version.

xfonts-a12k12 (1-10) unstable; urgency=low

  * Update debian/control.
Bump up Standards-Version to 3.9.3.
  * Update debian/rules.
- Convert to dh 9.
- Rebuild latest dh_installxfonts. (Closes: #682051)

 -- Nobuhiro Iwamatsu   Mon, 23 Jul 2012 05:16:46 +0900

Best regards,
  Nobuhiro

unblock xfonts-a12k12/1-10

-- 
Nobuhiro Iwamatsu
   iwamatsu at {nigauri.org / debian.org}
   GPG ID: 40AD1FA6


xfonts-a12k12_1-10.debdiff
Description: Binary data


Bug#684532: unblock: libpng/1.2.49-2

2012-08-10 Thread Nobuhiro Iwamatsu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hi,

Please unblock package libpng.
In version 1.2.49-2, we fixed RC bug #681408.

libpng (1.2.49-2) unstable; urgency=high

  * Change "a+w" to "u+w" in Makefile.in to fix CVE-2012-3386
Add 02-681408-CVE-2012-3386-Makefile.in.patch
Closes: #681408

 -- Anibal Monsalve Salazar   Fri, 13 Jul 2012 12:31:39 +1000

Best regards,
  Nobuhiro

unblock libpng/1.2.49-2

-- 
Nobuhiro Iwamatsu
   iwamatsu at {nigauri.org / debian.org}
   GPG ID: 40AD1FA6


libpng_1.2.49-2.debdiff
Description: Binary data


Bug#684530: marked as done (unblock: clutter-1.0/1.10.8-2)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 22:10:37 +0100
with message-id <1344633037.2978.22.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684530: unblock: clutter-1.0/1.10.8-2
has caused the Debian Bug report #684530,
regarding unblock: clutter-1.0/1.10.8-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684530: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684530
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package clutter-1.0

There's a fix for a build-dependency and two patches that fix
accessibility issues.

unblock clutter-1.0/1.10.8-2

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=ca_ES.UTF-8@valencia, LC_CTYPE=ca_ES.UTF-8@valencia (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 22:36 +0200, Jordi Mallach wrote:
> Please unblock package clutter-1.0
> There's a fix for a build-dependency and two patches that fix
> accessibility issues.

Unblocked; thanks.

Regards,

Adam--- End Message ---


Bug#684366: marked as done (unblock: vclt-tools/0.1.2-3)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 22:07:22 +0100
with message-id <1344632842.2978.21.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684366: unblock: vclt-tools/0.1.2-3
has caused the Debian Bug report #684366,
regarding unblock: vclt-tools/0.1.2-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684366: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684366
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package vclt-tools

It removes Philipp as maintainer.

unblock vclt-tools/0.1.2-3

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
On Thu, 2012-08-09 at 09:58 +0200, Patrick Matthäi wrote:
> Please unblock package vclt-tools
> 
> It removes Philipp as maintainer.

Unblocked.

Regards,

Adam--- End Message ---


Bug#684372: marked as done (Freeze exception for plplot)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 22:05:54 +0100
with message-id <1344632754.2978.20.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684372: Freeze exception for plplot
has caused the Debian Bug report #684372,
regarding Freeze exception for plplot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684372: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684372
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
Severity: normal

Please consider a release exception for the packages built from the
plplot source (plplot 5.9.9-5). These are currently in unstable. The
only differences from version 5.9.9-4 in testing are 3 bug fixes.

#680841 (serious), #683135 (normal): This FTBFS was a result of
changes in the new version of cmake which affected the ada build. Fixed 
by this release.

#683878 (normal): Rebuilding with the latest gfortran closes this bug.

A further FTBFS was identified as part of the testing of the fix to
#680841 which related to cmake and lua. The patch also fixes this.

No other changes are included. A debdiff patch is attached for
reference.

Many thanks

Andrew


diff -Nru plplot-5.9.9/debian/changelog plplot-5.9.9/debian/changelog
--- plplot-5.9.9/debian/changelog	2012-04-04 21:45:15.0 +0100
+++ plplot-5.9.9/debian/changelog	2012-08-08 09:35:31.0 +0100
@@ -1,3 +1,16 @@
+plplot (5.9.9-5) unstable; urgency=low
+
+  * debian/patches/series, debian/patches/fix-cmake-ada-support.diff:
+Add patch from upstream to fix cmake ada support with cmake 2.8.9 and later
+(closes: #680841).
+  * debian/patches/series, debian/patches/fix-lua-includes.diff:
+Add patch to work around problem with lua cmake support. Debian now requires 
+multiple include paths which were not found correctly. This prevents a FTBFS 
+with recent versions of lua5.1.
+  * Recompile with latest version of gfortran (closes: #683878). 
+
+ -- Andrew Ross   Wed, 08 Aug 2012 09:34:10 +0100
+
 plplot (5.9.9-4) unstable; urgency=low
 
   * debian/rules: 
diff -Nru plplot-5.9.9/debian/patches/fix-cmake-ada-support.diff plplot-5.9.9/debian/patches/fix-cmake-ada-support.diff
--- plplot-5.9.9/debian/patches/fix-cmake-ada-support.diff	1970-01-01 01:00:00.0 +0100
+++ plplot-5.9.9/debian/patches/fix-cmake-ada-support.diff	2012-07-19 23:06:14.0 +0100
@@ -0,0 +1,25 @@
+Description: Fix up cmake Ada support for compatibility with cmake 2.8.9 
+Author: Andrew Ross 
+Last-Update: 2012-07-19
+
+--- plplot-5.9.9.orig/cmake/modules/language_support/cmake/CMakeAdaInformation.cmake	2011-10-13 01:43:01.0 +0100
 plplot-5.9.9/cmake/modules/language_support/cmake/CMakeAdaInformation.cmake	2012-07-19 23:03:27.835197249 +0100
+@@ -29,6 +29,18 @@
+   SET(CMAKE_SHARED_LIBRARY_CREATE_Ada_FLAGS ${CMAKE_SHARED_LIBRARY_CREATE_C_FLAGS})
+ ENDIF(NOT CMAKE_SHARED_LIBRARY_CREATE_Ada_FLAGS)
+ 
++IF(NOT CMAKE_Ada_COMPILE_OPTIONS_PIC)
++  SET(CMAKE_Ada_COMPILE_OPTIONS_PIC ${CMAKE_C_COMPILE_OPTIONS_PIC})
++ENDIF(NOT CMAKE_Ada_COMPILE_OPTIONS_PIC)
++
++IF(NOT CMAKE_Ada_COMPILE_OPTIONS_PIE)
++  SET(CMAKE_Ada_COMPILE_OPTIONS_PIE ${CMAKE_C_COMPILE_OPTIONS_PIE})
++ENDIF(NOT CMAKE_Ada_COMPILE_OPTIONS_PIE)
++
++IF(NOT CMAKE_Ada_COMPILE_OPTIONS_DLL)
++  SET(CMAKE_Ada_COMPILE_OPTIONS_DLL ${CMAKE_C_COMPILE_OPTIONS_DLL})
++ENDIF(NOT CMAKE_Ada_COMPILE_OPTIONS_DLL)
++
+ IF(NOT CMAKE_SHARED_LIBRARY_Ada_FLAGS)
+   SET(CMAKE_SHARED_LIBRARY_Ada_FLAGS ${CMAKE_SHARED_LIBRARY_C_FLAGS})
+ ENDIF(NOT CMAKE_SHARED_LIBRARY_Ada_FLAGS)
diff -Nru plplot-5.9.9/debian/patches/fix-lua-includes.diff plplot-5.9.9/debian/patches/fix-lua-includes.diff
--- plplot-5.9.9/debian/patches/fix-lua-includes.diff	1970-01-01 01:00:00.0 +0100
+++ plplot-5.9.9/debian/patches/fix-lua-includes.diff	2012-07-20 00:12:02.0 +0100
@@ -0,0 +1,21 @@
+Description: Fix for cmake lua support to work around problem that lua needs multiple include directories on Debian
+Author: Andrew Ross 
+Last-Update: 2012-07-19
+
+===
+Index: plplot-5.9.9/cmake/modules/lua.cmake
+===
+--- plplot-5.9.9.orig/cmake/modules/lua.cmake	2011-10-13 01:43:01.0 +0100
 plplot-5.9.9/cmake/modules/lua.cmake	2012-07-20 00:11:55.295075888 +0100
+@@ -118,3 +118,11 @@
+ set(LUA_DIR ${LIB_DIR}/lua/50/plplot)
+   endif(LUA51_FOUND)
+ endif(ENABLE_lua)
++
++if(ENABLE_lua AND LUA51_FOUND)
++  pkg_check_pkgconfig(lua5.1 includedir libdir linkflags1 cflags1 version1 _LUA)
++  if(linkflag

Bug#684385: marked as done (nmu: qt4-x11_4:4.8.2-2)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 22:02:40 +0100
with message-id <1344632560.2978.19.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684385: nmu: qt4-x11_4:4.8.2-2
has caused the Debian Bug report #684385,
regarding nmu: qt4-x11_4:4.8.2-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684385: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684385
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu

Hello, there was a bug in GCC 4.7.1-2 that made apps like okular fail.
Rebuilding with -6 seems to solve this bug.

nmu qt4-x11_4:4.8.2-2 . ALL . -m "Rebuild with gcc/4.7.1-6 (Closes: #684177)."

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (101, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: mips
i386

Kernel: Linux 3.2.21+edid (SMP w/2 CPU cores)
Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---
On Thu, 2012-08-09 at 07:42 -0300, Lisandro Damián Nicanor Pérez Meyer
wrote:
> Hello, there was a bug in GCC 4.7.1-2 that made apps like okular fail.
> Rebuilding with -6 seems to solve this bug.
> 
> nmu qt4-x11_4:4.8.2-2 . ALL . -m "Rebuild with gcc/4.7.1-6 (Closes: #684177)."

Scheduled, but only for {kfreebsd-,}{amd64,i386}.  gcc-4.7 isn't the
default on most architectures, so the bug won't be manifesting
elsewhere.  hurd-i386 buildd admins CCed, as I wasn't sure if all of
their chroots had been upgraded so haven't scheduled a binNMU there.

Please note that binNMUs don't get closure mails generated by dak, so
you'll need to manually close the bug.

Regards,

Adam--- End Message ---


Bug#684358: marked as done (unblock: fontconfig/2.9.0-7)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:56:48 +0100
with message-id <1344632208.2978.15.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684358: unblock: fontconfig/2.9.0-7
has caused the Debian Bug report #684358,
regarding unblock: fontconfig/2.9.0-7
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684358: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684358
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package fontconfig

Keith Packard apparently forgot to ask for unblock so I'm doing it on
his behalf.

This upload mostly upudates 3 debconf translations. 

Keith added another fix:
* Don't clean ancient cache files on new install. Closes: #636173.

The fixed issue is not RC but, from a quick read of the bug log, it
should maybe be as the issue or more or less removing files belonging
to other packages when the package is removed.

The relevant change is:

diff -Nru fontconfig-2.9.0-testing/debian/fontconfig.postinst 
fontconfig-2.9.0/debian/fontconfig.postinst
--- fontconfig-2.9.0-testing/debian/fontconfig.postinst 2012-04-16 
23:25:20.0 +0200
+++ fontconfig-2.9.0/debian/fontconfig.postinst 2012-07-25  17:10:52.0 
+0200
@@ -12,7 +12,7 @@
 #DEBHELPER#  
  
   if [ "$1" = configure ]; then
   -  if dpkg --compare-versions "$2" lt 2.4.0-1; then
   +  if dpkg --compare-versions "$2" lt-nl 2.4.0-1; then
  printf "Cleaning up old fontconfig caches... "
 for dir in /usr/share/fonts /var/lib/defoma/fontconfig.d  
/usr/X11R6/lib/X11/fonts /usr/local/share/fonts ; do



unblock fontconfig/2.9.0-7

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-3-686-pae (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
On Thu, 2012-08-09 at 08:36 +0200, Christian Perrier wrote:
> This upload mostly upudates 3 debconf translations. 
> 
> Keith added another fix:
> * Don't clean ancient cache files on new install. Closes: #636173.
> 
> The fixed issue is not RC but, from a quick read of the bug log, it
> should maybe be as the issue or more or less removing files belonging
> to other packages when the package is removed.

Unblocked; thanks.

Regards,

Adam--- End Message ---


Bug#684449: marked as done (unblock: ufw/0.31.1-2)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:43:47 +0100
with message-id <1344631427.2978.14.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684449: unblock: ufw/0.31.1-2
has caused the Debian Bug report #684449,
regarding unblock: ufw/0.31.1-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684449: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684449
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ufw

Fixes RC bug #672439

unblock ufw/0.31.1-2

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-27-generic (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=locale: Cannot set 
LC_CTYPE to default locale: No such file or directory
locale: Cannot set LC_MESSAGES to default locale: No such file or directory
locale: Cannot set LC_ALL to default locale: No such file or directory
ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
diff -Nru ufw-0.31.1/debian/changelog ufw-0.31.1/debian/changelog
--- ufw-0.31.1/debian/changelog	2012-04-04 12:12:29.0 -0500
+++ ufw-0.31.1/debian/changelog	2012-07-20 15:06:17.0 -0500
@@ -1,3 +1,15 @@
+ufw (0.31.1-2) unstable; urgency=low
+
+  * Simplify unload of firewall and play nicely with other firewall tools by
+using ufw-init instead of iptables directly. 'ufw-init stop' by design
+leaves a few empty chains around, but they won't get in the way of
+anything and are gone after the next reboot. Using upstream's ufw-init has
+the important benefit of always cleaning what it needs. (Closes: 672439).
+- debian/prerm: call '/lib/ufw/ufw-init stop' on removal
+- debian/postrm: don't flush the chains on purge
+
+ -- Jamie Strandboge   Fri, 20 Jul 2012 15:05:39 -0500
+
 ufw (0.31.1-1) unstable; urgency=low
 
   * New upstream release (Closes: 663677, Closes: 625681)
diff -Nru ufw-0.31.1/debian/postrm ufw-0.31.1/debian/postrm
--- ufw-0.31.1/debian/postrm	2012-03-17 09:30:25.0 -0500
+++ ufw-0.31.1/debian/postrm	2012-07-20 15:05:23.0 -0500
@@ -23,21 +23,6 @@
 done
 rm -f $RULES_PATH/ufw.rules $RULES_PATH/ufw.rules.dpkg-old
 rm -f $USER_PATH/user.rules $USER_PATH/user6.rules
-
-# go back to default accept, if ufw was enabled
-if [ -f "$UFW_CONF" ] && grep -qi "^ENABLED=yes" "$UFW_CONF"; then
-for exe in iptables ip6tables
-do
-if which $exe > /dev/null 2>&1; then
-$exe -P INPUT ACCEPT 2>/dev/null || true
-$exe -P OUTPUT ACCEPT 2>/dev/null || true
-$exe -P FORWARD ACCEPT 2>/dev/null || true
-$exe -F 2>/dev/null || true
-$exe -X 2>/dev/null || true
-fi
-done
-fi
-
 rm -f "$UFW_CONF"
 ;;
 
diff -Nru ufw-0.31.1/debian/prerm ufw-0.31.1/debian/prerm
--- ufw-0.31.1/debian/prerm	1969-12-31 18:00:00.0 -0600
+++ ufw-0.31.1/debian/prerm	2012-07-20 15:05:23.0 -0500
@@ -0,0 +1,12 @@
+#!/bin/sh -e
+
+case "$1" in
+remove)
+# Unload ufw (will only happen if enabled)
+if [ -x /lib/ufw/ufw-init ]; then
+/lib/ufw/ufw-init stop || true
+fi
+;;
+esac
+
+#DEBHELPER#
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 01:05 -0500, Jamie Strandboge wrote:
> Please unblock package ufw
> 
> Fixes RC bug #672439

Unblocked; thanks.

Regards,

Adam--- End Message ---


Bug#684452: CVE-2012-3447 unblock: nova/2012.1.1-6

2012-08-10 Thread Adam D. Barratt
On Fri, 2012-08-10 at 14:25 +0800, Thomas Goirand wrote:
> Please unblock the nova package. This fixes CVE-2012-3447, which is a
> file injection vulnerability in the host filesystem, using a specially
> crafted guest image.
> 
> The relevant diff is available here:
> http://anonscm.debian.org/gitweb/?p=openstack/nova.git;a=commitdiff;h=55e78f9cbaa1c4657a97c6b20797a94968030e75

Please don't do that.  It needs a context switch, doesn't work when
reading mail offline and means that the list archive doesn't stand alone
as a historical, well, archive of what was okayed.  There's a reason
that the freeze policy explicitly asks for debdiffs.

> The patch comes directly from upstream, as per the patch header (I just
> applied it manually, then did dpkg-source --commit).
> 
> Note that this also includes a (needed) tweak in the configuration files
> as per this commit:
> http://anonscm.debian.org/gitweb/?p=openstack/nova.git;a=commitdiff;h=4cd725c5d164484a3ddb6bf95f37fb715cb51169

Two questions:

1) Why is there no mention of the above changes in the changelog?

2) Why does "Add nova-compute.conf files to nova-compute init if exist"
require

-DAEMON_ARGS="--flagfile=/etc/nova/nova.conf"
+DAEMON_ARGS="--config-file=/etc/nova/nova.conf"

and a bunch of

+[DEFAULT]

?

> Also, Ubuntu folks already fixed the issue in 12.04.

How is that at all relevant to the Debian freeze?

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1344631308.2978.13.ca...@jacala.jungle.funky-badger.org



Bug#684185: unblock: wmii/3.9.2+debian-4

2012-08-10 Thread Andrew Shadura
Hello,

On Wed, 8 Aug 2012 01:05:11 +0200
Cyril Brulebois  wrote:

> > Please review it an tell me if it fits to be uploaded to unstable
> > with a freeze exception for wheezy/testing.

> Please get your package uploaded, and let us (this bug report) know
> when it's accepted.

It's been uploaded:

http://packages.qa.debian.org/w/wmii/news/20120809T133224Z.html

-- 
WBR, Andrew


signature.asc
Description: PGP signature


Bug#684530: unblock: clutter-1.0/1.10.8-2

2012-08-10 Thread Jordi Mallach
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package clutter-1.0

There's a fix for a build-dependency and two patches that fix
accessibility issues.

unblock clutter-1.0/1.10.8-2

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=ca_ES.UTF-8@valencia, LC_CTYPE=ca_ES.UTF-8@valencia (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120810203657.21379.86811.report...@aigua.oskuro.net



Bug#684493: marked as done (unblock: python-ethtool/0.7-1.1)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:21:36 +0100
with message-id <1344630096.2978.8.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684493: unblock: python-ethtool/0.7-1.1
has caused the Debian Bug report #684493,
regarding unblock: python-ethtool/0.7-1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684493: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684493
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package python-ethtool

It fixes RC bug #683174: FTBFS: Requires internet connectivity

unblock python-ethtool/0.7-1.1
diff -Nru python-ethtool-0.7/debian/changelog python-ethtool-0.7/debian/changelog
--- python-ethtool-0.7/debian/changelog	2012-06-15 21:05:41.0 +0200
+++ python-ethtool-0.7/debian/changelog	2012-08-07 15:26:56.0 +0200
@@ -1,3 +1,11 @@
+python-ethtool (0.7-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Add docbook-xsl to Build-Depends so the build system doesn't try to
+download manpages/docbook.xsl from the internet. (Closes: #683174)
+
+ -- Felix Geyer   Tue, 07 Aug 2012 15:25:14 +0200
+
 python-ethtool (0.7-1) unstable; urgency=low
 
   * Packaging for Debian main (Closes: #549323). 
diff -Nru python-ethtool-0.7/debian/control python-ethtool-0.7/debian/control
--- python-ethtool-0.7/debian/control	2012-06-15 21:05:41.0 +0200
+++ python-ethtool-0.7/debian/control	2012-08-07 15:25:08.0 +0200
@@ -3,7 +3,7 @@
 Priority: extra
 Maintainer: Miroslav Suchý 
 Uploaders: Bernd Zeimetz 
-Build-Depends: debhelper (>= 7.0.50~), python-all-dev (>= 2.6.6-3~), libnl-dev, asciidoc, pkg-config, libxml2-utils, docbook-xml, xsltproc
+Build-Depends: debhelper (>= 7.0.50~), python-all-dev (>= 2.6.6-3~), libnl-dev, asciidoc, pkg-config, libxml2-utils, docbook-xml, docbook-xsl, xsltproc
 Standards-Version: 3.9.3
 Homepage: http://fedorapeople.org/gitweb?p=dsommers/public_git/python-ethtool.git;a=summary
 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/spacewalk/python-ethtool.git
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 15:26 +0200, Felix Geyer wrote:
> Please unblock package python-ethtool
> 
> It fixes RC bug #683174: FTBFS: Requires internet connectivity

Unblocked; thanks.

Regards,

Adam--- End Message ---


Bug#684495: marked as done (unblock: lustre/1.8.5+dfsg-3.1)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:20:21 +0100
with message-id <1344630021.2978.7.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684495: unblock: lustre/1.8.5+dfsg-3.1
has caused the Debian Bug report #684495,
regarding unblock: lustre/1.8.5+dfsg-3.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684495: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684495
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


lustre has been recently adjusted to build with more recent automake
versions than automake1.7, scheduled for removal from the archive
(#648591). The other remaining rdep was isdnutils (unblocked in
#684320), automake1.7 can hopefully go away soon.
I'm attaching a debdiff of the changes introduced.

Thanks for considering a freeze exception for lustre.


lustre.diff
Description: Binary data
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 15:31 +0200, Luca Falavigna wrote:
> lustre has been recently adjusted to build with more recent automake
> versions than automake1.7, scheduled for removal from the archive
> (#648591). The other remaining rdep was isdnutils (unblocked in
> #684320), automake1.7 can hopefully go away soon.
> I'm attaching a debdiff of the changes introduced.
> 
> Thanks for considering a freeze exception for lustre.

Unblocked.

Regards,

Adam--- End Message ---


Bug#684507: marked as done (unblock: rygel/0.14.3-1)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:19:02 +0100
with message-id <1344629942.2978.6.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684507: unblock: rygel/0.14.3-1
has caused the Debian Bug report #684507,
regarding unblock: rygel/0.14.3-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684507: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684507
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package rygel

It contains an important fix (workaround for gstreamer bug apparently)
to avoid initial indexing of media taking really long time.
This fix was recommended by upstreams Jens Georg (thanks) to include
in Debian.

(The new upstream release also contains another fix which we are
already shipping as a patch, plus two translations Hopefully
you agree that the changes are uncontroversal. Diff could be smaller
if I continued patching, but I prefer shipping a proper release.
I went ahead and uploaded it when I noticed that my Pre-approval
request somehow had not reached the debian-release list.)

Fwiw, please don't waste too much time reviewing the pre-generated
C changes shipped in the upstream tarball since we rebuild
everything with our own valac during package build anyway...

unblock rygel/0.14.3-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (300, 'unstable'), (100, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 16:37 +0200, Andreas Henriksson wrote:
> Please unblock package rygel
> 
> It contains an important fix (workaround for gstreamer bug apparently)
> to avoid initial indexing of media taking really long time.
> This fix was recommended by upstreams Jens Georg (thanks) to include
> in Debian.

fwiw, I debated grumbling about the package relationships change:

+  * rygel suggests -playbin, and -playbin enhances rygel

I didn't because neither of them make any real difference.  Although
that's also arguably a reason not to accept them during a freeze.
*shrug*

> (The new upstream release also contains another fix which we are
> already shipping as a patch, plus two translations Hopefully
> you agree that the changes are uncontroversal. Diff could be smaller
> if I continued patching, but I prefer shipping a proper release.
> I went ahead and uploaded it when I noticed that my Pre-approval
> request somehow had not reached the debian-release list.)

Did it by any chance contain a copy of the full debdiff, particularly
the changelog?

 ChangeLog  |15267 +-

Unblocked.

Regards,

Adam--- End Message ---


Bug#684518: marked as done (unblock: ruby-actionpack-3.2/3.2.6-4)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:11:23 +0100
with message-id <1344629483.2978.3.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684518: unblock: ruby-actionpack-3.2/3.2.6-4
has caused the Debian Bug report #684518,
regarding unblock: ruby-actionpack-3.2/3.2.6-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684518: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684518
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ruby-actionpack-3.2

This new versio includes fixes for two security problems (CVE-2012-3463,
CVE-2012-3465), closing 1 RC bug (#684454).

Follows a debdiff between the version in testing and this new version,
which was just uploaded to untable.

unblock ruby-actionpack-3.2/3.2.6-4

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Antonio Terceiro 
diff -Nru ruby-actionpack-3.2-3.2.6/debian/changelog ruby-actionpack-3.2-3.2.6/debian/changelog
--- ruby-actionpack-3.2-3.2.6/debian/changelog	2012-08-04 09:29:24.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/changelog	2012-08-10 13:33:44.0 -0300
@@ -1,3 +1,16 @@
+ruby-actionpack-3.2 (3.2.6-4) unstable; urgency=high
+
+  * Add patches for security problems (Closes: #684454):
++ CVE-2012-3463 - Ruby on Rails Potential XSS Vulnerability in select_tag
+  prompt
++ CVE-2012-3465 - XSS Vulnerability in strip_tags
++ Both patches were edited from their original versions in two ways:
+  - the leading a/ and b/ from the filenames were stripped
+  - changes over test files were removed, since the Debian package
+contains no test files.
+
+ -- Antonio Terceiro   Fri, 10 Aug 2012 13:08:08 -0300
+
 ruby-actionpack-3.2 (3.2.6-3) unstable; urgency=high
 
   * Add patch by Aaron Patterson for CVE-2012-3424 (Closes: #683370)
diff -Nru ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch
--- ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch	1969-12-31 21:00:00.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch	2012-08-10 13:31:17.0 -0300
@@ -0,0 +1,30 @@
+From ec30fba02d2d3a0c90dfc9a38629d2c0d55bf8c1 Mon Sep 17 00:00:00 2001
+From: Santiago Pastorino 
+Date: Wed, 8 Aug 2012 15:10:35 -0700
+Subject: [PATCH] escape select_tag :prompt values
+
+---
+ actionpack/lib/action_view/helpers/form_tag_helper.rb | 4 ++--
+ 2 files changed, 8 insertions(+), 2 deletions(-)
+
+diff --git actionpack/lib/action_view/helpers/form_tag_helper.rb actionpack/lib/action_view/helpers/form_tag_helper.rb
+index 066b98d..9e0ec17 100644
+--- actionpack/lib/action_view/helpers/form_tag_helper.rb
 actionpack/lib/action_view/helpers/form_tag_helper.rb
+@@ -122,11 +122,11 @@ module ActionView
+ html_name = (options[:multiple] == true && !name.to_s.ends_with?("[]")) ? "#{name}[]" : name
+ 
+ if options.delete(:include_blank)
+-  option_tags = "".html_safe + option_tags
++  option_tags = content_tag(:option, '', :value => '').safe_concat(option_tags)
+ end
+ 
+ if prompt = options.delete(:prompt)
+-  option_tags = "#{prompt}".html_safe + option_tags
++  option_tags = content_tag(:option, prompt, :value => '').safe_concat(option_tags)
+ end
+ 
+ content_tag :select, option_tags, { "name" => html_name, "id" => sanitize_to_id(name) }.update(options.stringify_keys)
+-- 
+1.7.11.1
+
diff -Nru ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch
--- ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch	1969-12-31 21:00:00.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch	2012-08-10 13:31:39.0 -0300
@@ -0,0 +1,26 @@
+From bb98352d42d654970299450b009223968a53c6f8 Mon Sep 17 00:00:00 2001
+From: Santiago Pastorino 
+Date: Wed, 8 Aug 2012 14:33:39 -0700
+Subject: [PATCH] Do not mark strip_tags result as html_safe
+
+Thanks to Marek Labos & Nethemba
+---
+ actionpack/lib/action_view/helpers/sanitize_helper.rb | 2 +-
+ 2 files changed, 3 insertions(+), 3 deletions(-)
+
+diff --git actionpack/lib/action_view/helpers/sanitize_helper.

Bug#684519: marked as done (unblock: mantis/1.2.11-1.1)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:09:59 +0100
with message-id <1344629399.2978.2.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684519: unblock: mantis/Accepted 1.2.11-1.1
has caused the Debian Bug report #684519,
regarding unblock: mantis/1.2.11-1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684519: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684519
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package mantis

This NMU, made unfortunately without ACK from the maintainer, fixes a
pending Czech translation of debconf templates.

unblock mantis/Accepted 1.2.11-1.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-3-686-pae (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 19:25 +0200, Christian Perrier wrote:
> Please unblock package mantis
> 
> This NMU, made unfortunately without ACK from the maintainer, fixes a
> pending Czech translation of debconf templates.

Unblocked.

Regards,

Adam--- End Message ---


Re: xz compression and mysql-5.5

2012-08-10 Thread Nicholas Bamber
On 10/08/12 09:23, Ansgar Burchardt wrote:
> On 08/08/2012 10:43 PM, Nicholas Bamber wrote:
>>  I have not finished testing your patch but I have a few questions.
>>
>>  Firstly it raises a new lintian error requiring a Pre-Depends on dpkg
>> (=> 1.15.6~). I know that this is more of an issue for Ubuntu and that
>> Ubuntu won't in this case be syncing from wheezy, so I guess we can live
>> with the warning. But to be careful I thought I had better run it past
>> you. I certainly would want to follow lintian's advice post-wheezy.
> 
> The Pre-Depends should be safe to include, but it was mostly included
> for Ubuntu as they support upgrading from a release with an older dpkg.
> 
>>  Also you say " please keep in mind to not include additional changes."
>> however I also have #683733  to fix which I think I should be in the
>> same release.
> 
> Feel free to include additional changes for wheezy as long as you are
> confident that the release team will approve them.  I included that
> sentence to prevent people from including changes not intended for wheezy.
> 
> Ansgar
> 

Well it builds okay so far. I just feel I should test a bit more.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50256a8b.5050...@periapt.co.uk



Bug#684522: marked as done (unblock: ruby-activesupport-3.2/3.2.6-4)

2012-08-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Aug 2012 21:05:13 +0100
with message-id <1344629113.2978.0.ca...@jacala.jungle.funky-badger.org>
and subject line Re: Bug#684522: unblock: ruby-activesupport-3.2/3.2.6-4
has caused the Debian Bug report #684522,
regarding unblock: ruby-activesupport-3.2/3.2.6-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
684522: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684522
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ruby-activesupport-3.2

This version fixes one security problem (CVE-2012-3464), closing one RC
bug (#684517).

The debdiff between the version in testing and this one, which was just
uploaded to unstable, is attached.

unblock ruby-activesupport-3.2/3.2.6-4

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Antonio Terceiro 
diff -Nru ruby-activesupport-3.2-3.2.6/debian/changelog ruby-activesupport-3.2-3.2.6/debian/changelog
--- ruby-activesupport-3.2-3.2.6/debian/changelog	2012-06-24 18:58:16.0 -0300
+++ ruby-activesupport-3.2-3.2.6/debian/changelog	2012-08-10 14:23:44.0 -0300
@@ -1,3 +1,10 @@
+ruby-activesupport-3.2 (3.2.6-4) unstable; urgency=high
+
+  * debian/patches/CVE-2012-3464.patch: fixes potential XSS vulnerability.
+CVE-2012-3464 (Closes: #684517).
+
+ -- Antonio Terceiro   Fri, 10 Aug 2012 14:10:41 -0300
+
 ruby-activesupport-3.2 (3.2.6-3) unstable; urgency=low
 
   * Bump build dependency on gem2deb to >= 0.3.0~
diff -Nru ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch
--- ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch	1969-12-31 21:00:00.0 -0300
+++ ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch	2012-08-10 14:10:25.0 -0300
@@ -0,0 +1,32 @@
+Description: [PATCH] html_escape should escape single quotes
+ This patch was adapted by Antonio Terceiro  to
+ activesupport 3.2.6, which was the version in testing at the time.
+Author: Santiago Pastorino 
+
+---
+
+Origin: upstream
+Bug: https://github.com/rails/rails/issues/7215
+Reviewed-By: Antonio Terceiro 
+Last-Update: 2012-08-10
+
+--- ruby-activesupport-3.2-3.2.6.orig/lib/active_support/core_ext/string/output_safety.rb
 ruby-activesupport-3.2-3.2.6/lib/active_support/core_ext/string/output_safety.rb
+@@ -3,7 +3,7 @@ require 'active_support/core_ext/kernel/
+ 
+ class ERB
+   module Util
+-HTML_ESCAPE = { '&' => '&',  '>' => '>',   '<' => '<', '"' => '"' }
++HTML_ESCAPE = { '&' => '&',  '>' => '>',   '<' => '<', '"' => '"', "'" => ''' }
+ JSON_ESCAPE = { '&' => '\u0026', '>' => '\u003E', '<' => '\u003C' }
+ 
+ # Detect whether 1.9 can transcode with XML escaping.
+@@ -22,7 +22,7 @@ class ERB
+ if s.html_safe?
+   s
+ else
+-  s.encode(s.encoding, :xml => :attr)[1...-1].html_safe
++  s.gsub(/[&"'><]/, HTML_ESCAPE).html_safe
+ end
+   end
+ else
diff -Nru ruby-activesupport-3.2-3.2.6/debian/patches/series ruby-activesupport-3.2-3.2.6/debian/patches/series
--- ruby-activesupport-3.2-3.2.6/debian/patches/series	1969-12-31 21:00:00.0 -0300
+++ ruby-activesupport-3.2-3.2.6/debian/patches/series	2012-08-10 14:07:22.0 -0300
@@ -0,0 +1 @@
+CVE-2012-3464.patch


signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
On Fri, 2012-08-10 at 14:31 -0300, Antonio Terceiro wrote:
> Please unblock package ruby-activesupport-3.2
> 
> This version fixes one security problem (CVE-2012-3464), closing one RC
> bug (#684517).

Unblocked; thanks.

Regards,

Adam--- End Message ---


Processed: retitle 684519 to unblock: mantis/1.2.11-1.1

2012-08-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 684519 unblock: mantis/1.2.11-1.1
Bug #684519 [release.debian.org] unblock: mantis/Accepted 1.2.11-1.1
Changed Bug title to 'unblock: mantis/1.2.11-1.1' from 'unblock: 
mantis/Accepted 1.2.11-1.1'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
684519: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684519
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.134462181820475.transcr...@bugs.debian.org



Bug#684522: unblock: ruby-activesupport-3.2/3.2.6-4

2012-08-10 Thread Antonio Terceiro
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ruby-activesupport-3.2

This version fixes one security problem (CVE-2012-3464), closing one RC
bug (#684517).

The debdiff between the version in testing and this one, which was just
uploaded to unstable, is attached.

unblock ruby-activesupport-3.2/3.2.6-4

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Antonio Terceiro 
diff -Nru ruby-activesupport-3.2-3.2.6/debian/changelog ruby-activesupport-3.2-3.2.6/debian/changelog
--- ruby-activesupport-3.2-3.2.6/debian/changelog	2012-06-24 18:58:16.0 -0300
+++ ruby-activesupport-3.2-3.2.6/debian/changelog	2012-08-10 14:23:44.0 -0300
@@ -1,3 +1,10 @@
+ruby-activesupport-3.2 (3.2.6-4) unstable; urgency=high
+
+  * debian/patches/CVE-2012-3464.patch: fixes potential XSS vulnerability.
+CVE-2012-3464 (Closes: #684517).
+
+ -- Antonio Terceiro   Fri, 10 Aug 2012 14:10:41 -0300
+
 ruby-activesupport-3.2 (3.2.6-3) unstable; urgency=low
 
   * Bump build dependency on gem2deb to >= 0.3.0~
diff -Nru ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch
--- ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch	1969-12-31 21:00:00.0 -0300
+++ ruby-activesupport-3.2-3.2.6/debian/patches/CVE-2012-3464.patch	2012-08-10 14:10:25.0 -0300
@@ -0,0 +1,32 @@
+Description: [PATCH] html_escape should escape single quotes
+ This patch was adapted by Antonio Terceiro  to
+ activesupport 3.2.6, which was the version in testing at the time.
+Author: Santiago Pastorino 
+
+---
+
+Origin: upstream
+Bug: https://github.com/rails/rails/issues/7215
+Reviewed-By: Antonio Terceiro 
+Last-Update: 2012-08-10
+
+--- ruby-activesupport-3.2-3.2.6.orig/lib/active_support/core_ext/string/output_safety.rb
 ruby-activesupport-3.2-3.2.6/lib/active_support/core_ext/string/output_safety.rb
+@@ -3,7 +3,7 @@ require 'active_support/core_ext/kernel/
+ 
+ class ERB
+   module Util
+-HTML_ESCAPE = { '&' => '&',  '>' => '>',   '<' => '<', '"' => '"' }
++HTML_ESCAPE = { '&' => '&',  '>' => '>',   '<' => '<', '"' => '"', "'" => ''' }
+ JSON_ESCAPE = { '&' => '\u0026', '>' => '\u003E', '<' => '\u003C' }
+ 
+ # Detect whether 1.9 can transcode with XML escaping.
+@@ -22,7 +22,7 @@ class ERB
+ if s.html_safe?
+   s
+ else
+-  s.encode(s.encoding, :xml => :attr)[1...-1].html_safe
++  s.gsub(/[&"'><]/, HTML_ESCAPE).html_safe
+ end
+   end
+ else
diff -Nru ruby-activesupport-3.2-3.2.6/debian/patches/series ruby-activesupport-3.2-3.2.6/debian/patches/series
--- ruby-activesupport-3.2-3.2.6/debian/patches/series	1969-12-31 21:00:00.0 -0300
+++ ruby-activesupport-3.2-3.2.6/debian/patches/series	2012-08-10 14:07:22.0 -0300
@@ -0,0 +1 @@
+CVE-2012-3464.patch


signature.asc
Description: Digital signature


Bug#683243: unblock: keystone/2012.1.1-2

2012-08-10 Thread Christian PERRIER
Quoting Thomas Goirand (z...@debian.org):

> > Thomas, it seems that you forgot to answer this question from
> > Julienwhich, in turn, leaves the unblock request unadressed. Any
> > chance that you can do so?
> 
> I didn't forget. That's because we are still waiting for new debconf
> translations from you (eg: the template that went away in 2012.1.1-2),
> so I didn't think it was needed to bother the release team until this is
> fixed.

Oh sure, you're right. Forgot about it (the call for  translations is
indeed running onright now) as I didn't add a note about that in my
status file.




signature.asc
Description: Digital signature


Bug#684519: unblock: mantis/Accepted 1.2.11-1.1

2012-08-10 Thread Christian Perrier
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package mantis

This NMU, made unfortunately without ACK from the maintainer, fixes a
pending Czech translation of debconf templates.

unblock mantis/Accepted 1.2.11-1.1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-3-686-pae (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120810172555.19744.62636.report...@mykerinos.kheops.frmug.org



Bug#684518: unblock: ruby-actionpack-3.2/3.2.6-4

2012-08-10 Thread Antonio Terceiro
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ruby-actionpack-3.2

This new versio includes fixes for two security problems (CVE-2012-3463,
CVE-2012-3465), closing 1 RC bug (#684454).

Follows a debdiff between the version in testing and this new version,
which was just uploaded to untable.

unblock ruby-actionpack-3.2/3.2.6-4

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Antonio Terceiro 
diff -Nru ruby-actionpack-3.2-3.2.6/debian/changelog ruby-actionpack-3.2-3.2.6/debian/changelog
--- ruby-actionpack-3.2-3.2.6/debian/changelog	2012-08-04 09:29:24.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/changelog	2012-08-10 13:33:44.0 -0300
@@ -1,3 +1,16 @@
+ruby-actionpack-3.2 (3.2.6-4) unstable; urgency=high
+
+  * Add patches for security problems (Closes: #684454):
++ CVE-2012-3463 - Ruby on Rails Potential XSS Vulnerability in select_tag
+  prompt
++ CVE-2012-3465 - XSS Vulnerability in strip_tags
++ Both patches were edited from their original versions in two ways:
+  - the leading a/ and b/ from the filenames were stripped
+  - changes over test files were removed, since the Debian package
+contains no test files.
+
+ -- Antonio Terceiro   Fri, 10 Aug 2012 13:08:08 -0300
+
 ruby-actionpack-3.2 (3.2.6-3) unstable; urgency=high
 
   * Add patch by Aaron Patterson for CVE-2012-3424 (Closes: #683370)
diff -Nru ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch
--- ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch	1969-12-31 21:00:00.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3463.patch	2012-08-10 13:31:17.0 -0300
@@ -0,0 +1,30 @@
+From ec30fba02d2d3a0c90dfc9a38629d2c0d55bf8c1 Mon Sep 17 00:00:00 2001
+From: Santiago Pastorino 
+Date: Wed, 8 Aug 2012 15:10:35 -0700
+Subject: [PATCH] escape select_tag :prompt values
+
+---
+ actionpack/lib/action_view/helpers/form_tag_helper.rb | 4 ++--
+ 2 files changed, 8 insertions(+), 2 deletions(-)
+
+diff --git actionpack/lib/action_view/helpers/form_tag_helper.rb actionpack/lib/action_view/helpers/form_tag_helper.rb
+index 066b98d..9e0ec17 100644
+--- actionpack/lib/action_view/helpers/form_tag_helper.rb
 actionpack/lib/action_view/helpers/form_tag_helper.rb
+@@ -122,11 +122,11 @@ module ActionView
+ html_name = (options[:multiple] == true && !name.to_s.ends_with?("[]")) ? "#{name}[]" : name
+ 
+ if options.delete(:include_blank)
+-  option_tags = "".html_safe + option_tags
++  option_tags = content_tag(:option, '', :value => '').safe_concat(option_tags)
+ end
+ 
+ if prompt = options.delete(:prompt)
+-  option_tags = "#{prompt}".html_safe + option_tags
++  option_tags = content_tag(:option, prompt, :value => '').safe_concat(option_tags)
+ end
+ 
+ content_tag :select, option_tags, { "name" => html_name, "id" => sanitize_to_id(name) }.update(options.stringify_keys)
+-- 
+1.7.11.1
+
diff -Nru ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch
--- ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch	1969-12-31 21:00:00.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/patches/CVE-2012-3465.patch	2012-08-10 13:31:39.0 -0300
@@ -0,0 +1,26 @@
+From bb98352d42d654970299450b009223968a53c6f8 Mon Sep 17 00:00:00 2001
+From: Santiago Pastorino 
+Date: Wed, 8 Aug 2012 14:33:39 -0700
+Subject: [PATCH] Do not mark strip_tags result as html_safe
+
+Thanks to Marek Labos & Nethemba
+---
+ actionpack/lib/action_view/helpers/sanitize_helper.rb | 2 +-
+ 2 files changed, 3 insertions(+), 3 deletions(-)
+
+diff --git actionpack/lib/action_view/helpers/sanitize_helper.rb actionpack/lib/action_view/helpers/sanitize_helper.rb
+index 7768c8c..0f6a5ed 100644
+--- actionpack/lib/action_view/helpers/sanitize_helper.rb
 actionpack/lib/action_view/helpers/sanitize_helper.rb
+@@ -80,7 +80,7 @@ module ActionView
+   #   strip_tags("Welcome to my website!")
+   #   # => Welcome to my website!
+   def strip_tags(html)
+-self.class.full_sanitizer.sanitize(html).try(:html_safe)
++self.class.full_sanitizer.sanitize(html)
+   end
+ 
+   # Strips all link tags from +text+ leaving just the link text.
+-- 
+1.7.11.1
+
diff -Nru ruby-actionpack-3.2-3.2.6/debian/patches/series ruby-actionpack-3.2-3.2.6/debian/patches/series
--- ruby-actionpack-3.2-3.2.6/debian/patches/series	2012-08-04 09:26:26.0 -0300
+++ ruby-actionpack-3.2-3.2.6/debian/patches/series	2012-08-10 13:29:41.0 -0300
@@ -1 +1

Bug#684507: unblock: rygel/0.14.3-1

2012-08-10 Thread Andreas Henriksson
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package rygel

It contains an important fix (workaround for gstreamer bug apparently)
to avoid initial indexing of media taking really long time.
This fix was recommended by upstreams Jens Georg (thanks) to include
in Debian.

(The new upstream release also contains another fix which we are
already shipping as a patch, plus two translations Hopefully
you agree that the changes are uncontroversal. Diff could be smaller
if I continued patching, but I prefer shipping a proper release.
I went ahead and uploaded it when I noticed that my Pre-approval
request somehow had not reached the debian-release list.)

Fwiw, please don't waste too much time reviewing the pre-generated
C changes shipped in the upstream tarball since we rebuild
everything with our own valac during package build anyway...

unblock rygel/0.14.3-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (300, 'unstable'), (100, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120810143744.1530.88382.report...@amd64.fatal.se



Bug#684495: unblock: lustre/1.8.5+dfsg-3.1

2012-08-10 Thread Luca Falavigna
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception


lustre has been recently adjusted to build with more recent automake
versions than automake1.7, scheduled for removal from the archive
(#648591). The other remaining rdep was isdnutils (unblocked in
#684320), automake1.7 can hopefully go away soon.
I'm attaching a debdiff of the changes introduced.

Thanks for considering a freeze exception for lustre.


lustre.diff
Description: Binary data


Bug#684493: unblock: python-ethtool/0.7-1.1

2012-08-10 Thread Felix Geyer
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package python-ethtool

It fixes RC bug #683174: FTBFS: Requires internet connectivity

unblock python-ethtool/0.7-1.1
diff -Nru python-ethtool-0.7/debian/changelog python-ethtool-0.7/debian/changelog
--- python-ethtool-0.7/debian/changelog	2012-06-15 21:05:41.0 +0200
+++ python-ethtool-0.7/debian/changelog	2012-08-07 15:26:56.0 +0200
@@ -1,3 +1,11 @@
+python-ethtool (0.7-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Add docbook-xsl to Build-Depends so the build system doesn't try to
+download manpages/docbook.xsl from the internet. (Closes: #683174)
+
+ -- Felix Geyer   Tue, 07 Aug 2012 15:25:14 +0200
+
 python-ethtool (0.7-1) unstable; urgency=low
 
   * Packaging for Debian main (Closes: #549323). 
diff -Nru python-ethtool-0.7/debian/control python-ethtool-0.7/debian/control
--- python-ethtool-0.7/debian/control	2012-06-15 21:05:41.0 +0200
+++ python-ethtool-0.7/debian/control	2012-08-07 15:25:08.0 +0200
@@ -3,7 +3,7 @@
 Priority: extra
 Maintainer: Miroslav Suchý 
 Uploaders: Bernd Zeimetz 
-Build-Depends: debhelper (>= 7.0.50~), python-all-dev (>= 2.6.6-3~), libnl-dev, asciidoc, pkg-config, libxml2-utils, docbook-xml, xsltproc
+Build-Depends: debhelper (>= 7.0.50~), python-all-dev (>= 2.6.6-3~), libnl-dev, asciidoc, pkg-config, libxml2-utils, docbook-xml, docbook-xsl, xsltproc
 Standards-Version: 3.9.3
 Homepage: http://fedorapeople.org/gitweb?p=dsommers/public_git/python-ethtool.git;a=summary
 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/spacewalk/python-ethtool.git


Bug#684437: unblock: fpc/2.6.0-6

2012-08-10 Thread Philipp Kern
On Fri, Aug 10, 2012 at 01:24:09AM +0100, peter green wrote:
> I have just sponsored a fpc upload by Abou Al Montacir to unstable, fixing two
> important bugs (note: one of the bugs was initially filed as normal but 
> speaking as a co-maintainer of the package I judge it to be important and have
> upped the severity accordingly).

Uhm, is it really required by policy to delete backup files that weren't
created by the package in the first place?

diff -Nru fpc-2.6.0/debian/fp-compiler.postrm.in 
fpc-2.6.0/debian/fp-compiler.postrm.in
--- fpc-2.6.0/debian/fp-compiler.postrm.in  2012-05-06 21:43:32.0 
+
+++ fpc-2.6.0/debian/fp-compiler.postrm.in  2012-08-09 22:55:10.0 
+
@@ -4,12 +4,14 @@
 
 ACTION=$1
 
-CFG_FILE="/etc/fpc-${VERSION}.cfg"
+CFG_FILE="/etc/fpc-${VERSION}"
 
 # Debhelper code
 #DEBHELPER#
 
 if test "${ACTION}" = "purge"
 then
-   rm -f ${CFG_FILE}
+   rm -f  "${CFG_FILE}".cfg
+   rm -f  "${CFG_FILE}".bak
+   rm -f  "${CFG_FILE}".*dpkg*
 fi

The second part does not make me happy.

Kind regards
Philipp Kern


signature.asc
Description: Digital signature


Bug#684459: unblock: iceweasel/10.0.6esr-2

2012-08-10 Thread Mike Hommey
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package iceweasel as per 
https://lists.debian.org/debian-release/2012/07/msg01620.html

unblock iceweasel/10.0.6esr-2

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120810074941.1994.43001.report...@jigen.glandium.org



Bug#684460: unblock: iceape/2.7.6-1

2012-08-10 Thread Mike Hommey
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package iceape, as per 
https://lists.debian.org/debian-release/2012/07/msg01652.html
and https://lists.debian.org/debian-release/2012/07/msg01620.html

unblock iceape/2.7.6-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20120810074907.1792.8149.report...@jigen.glandium.org



Bug#683243: unblock: keystone/2012.1.1-2

2012-08-10 Thread Thomas Goirand
On 08/09/2012 02:40 PM, Christian PERRIER wrote:
> Quoting Julien Cristau (jcris...@debian.org):
>> On Mon, Jul 30, 2012 at 13:19:57 +0800, Thomas Goirand wrote:
>>
>>> Package: release.debian.org
>>> Severity: normal
>>> User: release.debian@packages.debian.org
>>> Usertags: unblock
>>>
>>> Dear Release Team,
>>>
>>> The new Keystone package, currently available in SID, contains
>>> reviewed Debconf templates and lots of translations, thanks to
>>> the work of Bubulle.
>>>
>>> Please unblock keystone/2012.1.1-2.
>>>
>> 2012.1.1-1 to 2012.1.1-3 has a change to
>> debian/docs/scripts/keystone.base-deployment.sh that doesn't seem to be
>> mentioned in the changelog.  Why, and what does it do?
>>
>> Cheers,
>> Julien
> 
> Thomas, it seems that you forgot to answer this question from
> Julienwhich, in turn, leaves the unblock request unadressed. Any
> chance that you can do so?

I didn't forget. That's because we are still waiting for new debconf
translations from you (eg: the template that went away in 2012.1.1-2),
so I didn't think it was needed to bother the release team until this is
fixed.

By the way, let me reply this: I uploaded whatever was in the Git, and I
wasn't aware of this change. This has been changed by Ghe Rivero, with
the following comment in the Git:

"Small fixes in keystone.base-deployment.sh"

This file, by the way, is from debian/docs (and later packaged in
/usr/share/doc/keystone/scripts), so this can be considered a a
documentation update with very little consequence. I regret that this
hasn't been documented in debian/changelog, but this hasn't done by me.
If I understand well, this file is a script to create keystone roles in
order to later administer Openstack (eg: creating the necessary auth
user for nova and glance). I don't think we should worry too much about
it (it's only an example script...).

By the way, git blame shows that this file has been written fully by Ghe
Rivero, who is currently in holidays. Maybe he will be able to reply
what his change is about later on (eg: what it fixes).

Thomas


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5024bac6.1020...@debian.org