Bug#696671: tpu: isc-dhcp/4.2.2.dfsg.1-5+deb70u3
On Tue, Dec 25, 2012 at 4:01 PM, Julien Cristau wrote: > On Tue, Dec 25, 2012 at 10:11:22 -0500, Michael Gilbert wrote: > >> Package: release.debian.org >> User: release.debian@packages.debian.org >> Usertags: tpu >> Severity: normal >> >> I plan to upload a tpu for isc-dhcp fixing two important issues. One >> fixes an unclean error situation, and the other sets up the default >> dhclient configuration to work in ipv6-only configurations. The first >> change is less important, so I can drop it if needed. Please review >> the proposed patch attached. >> > Was that first one forwarded/applied upstream? It was forwarded a long time ago, but it's apparently been ignored. Upstream is quite opaque, so who knows what the deal is. > The report's over 4 years old, why is it suddenly important now? As seen in #695810 (merged with #486520), ifupdown switched to calling dhclient with the -1 option, and in past releases it had not, so it is now a more prevalent problem. Although sure severity is questionable, and I'm not willing to exert much effort to include it. I'll remove if that's what is wanted. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CANTw=mn9sbcmkj2qx5kjx+gcacytd23dpzhty42efrsb4-8...@mail.gmail.com
Bug#690283: marked as done (some packages testing migration link is missing (no contrib package?))
Your message dated Wed, 26 Dec 2012 12:08:13 +0800 with message-id <1356494893.6960.465.camel@chianamo> and subject line qa.debian.org: 678242: fixed has caused the Debian Bug report #678242, regarding some packages testing migration link is missing (no contrib package?) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 678242: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678242 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal Hi, http://packages.qa.debian.org/r/ruby-pgplot.html says "problems The package has not yet entered testing even though the 10-day delay is over. Check why." However, link to http://release.debian.org/migration/testing.pl?package=ruby-pgplot is missing. "Not Found The requested URL /migration/testing.pl?package=ruby-pgplot was not found on this server." It seems to be not checked with contrib package but I cannot find such limitation note for it, and it helps to check contrib (maybe non-free) package migration to testing. -- Regards, Hideki Yamane henrich @ debian.or.jp/org http://wiki.debian.org/HidekiYamane --- End Message --- --- Begin Message --- I've fixed this bug in SVN, DDPO (both versions), excuses.php and the PTS were all affected by it. -- bye, pabs http://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part --- End Message ---
Bug#678242: marked as done (qa.debian.org: Package with a problem link to a broken link: check why)
Your message dated Wed, 26 Dec 2012 12:08:13 +0800 with message-id <1356494893.6960.465.camel@chianamo> and subject line qa.debian.org: 678242: fixed has caused the Debian Bug report #678242, regarding qa.debian.org: Package with a problem link to a broken link: check why to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 678242: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678242 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: qa.debian.org Severity: minor Dear Maintainer, I was lookig at one of my packages netlib-java (http://packages.qa.debian.org/n/netlib-java.html) and web interface shows a "problem" section with content: "The package has not yet entered testing even though the 10-day delay is over. Check why." The link "Check why" to http://release.debian.org/migration/testing.pl?package=netlib-java is broken. I don't know if it is specific to my package or a more global issue. Thanks Olivier -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.0.0-1-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash --- End Message --- --- Begin Message --- I've fixed this bug in SVN, DDPO (both versions), excuses.php and the PTS were all affected by it. -- bye, pabs http://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part --- End Message ---
Bug#691188: unblock: [pre-approval] ncmpcpp/0.5.10-1.1
Hi! Julien Cristau writes: > On Mon, Oct 22, 2012 at 21:10:13 +0200, Christoph Egger wrote: > >> I would really like to get #676627 fixed for wheezy. Although it >> might not be strictly RC I think failing to display the content (when >> no configuration is present and Playlist should be shown in column >> mode) is really confusing and there exists a small patch applied >> upstream that works for the package in unstable (I built and tested >> it). Is the attached diff OK for a freeze exception? If yes I would >> work with the maintainer to get it uploaded or push an NMU. >> > That should be fine. Sorry for the delayed answer. Package is now on the way (DELAYED/3) Regards Christoph -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/87wqw5eevo@mitoraj.siccegge.de
Bug#673063: britney: doop_source possibly broken
On 2012-12-25 22:23, Adam D. Barratt wrote: > [...] IRC chat log for future reference. ~Niels nthykier: I'm attempting to write an explanation for what's going on in #673063, although I'm not sure how helpful it'll turn out to be I'm now remembering how much figuring that code out in the first place made my head hurt adsb: It is not a priority, but I would like us to eventually get that code path straight so we can play around with different algorithms :) I know what it's doing, it's just explaining it without it getting too waffly or confused :) I don't mind if it is terse. Clarity is more important than fluent/interesting language. alternatively if it can be broken into cases, that would probably work too we just need it until one of us comes up with smarter and more self-descriptive rewrite of it :P well, I've sent what I can come up with at the moment. had to go back through the history and remind myself of a couple of things (like why I added the else) adsb: Your comment/commit suggests that this lundo part is only relevant when processing hints. So in the main run lundo could be empty and it shouldn't make any difference? Also, can you produce a test cases for us breaking the else branch? that sounds right, yeah. and probably, but not tonight :) okay, because I suspect that right that lundo might not be empty in the main run... (and I don't mind waiting a day or two on a new test case :D ) I'll add a note, not sure how quick it'll be. a chunk of tomorrow will be travelling home and thursday's back to work great I know it fixed a real issue we had at the time. whether I can remember more than I managed to deduce in that mail is a different question Well, we know now it will involve at least an "easy" or "hint" (I suspect it could also involve a "force-hint", but...) or I chose really bad names or misunderstood what was going on :P but yeah, logically it should be a hint of some kind nthykier: fwiw, looking through my mail history suggests it was #625792 why I didn't record that in the commit message... meh to be honest, I am not quite happy with code-flow vs. your explaination... I still see "if binary in binaries[parch][0]: " (line 1936) as the "if binary was hijacked: " To me it looks like the binary will not be in "binaries[parch][0]" if it was built from the source (From "del binaries[parch][0][binary]" in line 1908) it won't be if it was built from the source we're about to migrate, indeed. I thought I'd explained that; obviously not :( s/the source/old version of &/ they're both essentially testing for hijacks. the difference is that the else branch gets hit if the package it's being hijacked from was processed earlier in the same hint, in which case the package will no longer be in binaries[parch][0] well, the else branch is more movement rather than hijacks - i.e. package A stops producing binary X, package B starts migrating it, so they need to migrate at the same time s/migrating/producing/ I suspect that is a good "note-to-self" for writing that test case but I also notice that if we merged "affected" for all migration items involved in a hint, that else branch is starting to look redundant (and we might be saving a few installability checks) it would also help if my connectivity would stop siezing up :( mind if I attach this part of the IRC log to the bug for future reference? if you think it'll help, sure :)
Bug#673063: britney: doop_source possibly broken
On 15.05.2012 19:56, Niels Thykier wrote: In doop_source britney has the following if-statement (indentation reduced): """ # if the binary already exists (built from another source) if binary in binaries[parch][0]: [...] else: # if the binary was previously built by a different # source package in testing, all of the reverse # dependencies of the old binary are affected. # reverse dependencies built from this source can be # ignored as their reverse trees are already handled # by this function # XXX: and the reverse conflict tree? [...] """ The comments are slightly confusing on which branch is the "built from other source"-case, but most likely it is the "else" branch. From this I would expect that the majority of the "runs" will pass through the other branch... but it is actually not the case. The comments could certainly do with some improvement, but I'm not actually sure anything else is broken. Ignoring the special case of single binary removals, doop_source essentially does 1) Remove any binaries built by the version of the package currently in testing 2) Remove the old source package 3) Add binaries built by the new version 4) Add the new source package The code fragment above forms part of step 3. We've already removed the binary packages previously built by the testing version of the source package we're migrating in step 1. As a result, if the binary package we're considering is already in testing when we hit step 3 then it is currently being built by a different source package which is still in testing - i.e. the new version of the source package is "taking over" the binary package. In that case, we remove the record of the binary package built by the other source package and mark the reverse dependencies of /that/ binary package as affected. The "else" branch checks whether the binary package used to be built by a different source package which was removed earlier in the same run (either entirely or by being superseded by a new version which dropped the binary package). In this case, the RDEPENDS element of the binary package we're attempting to add will reflect the reverse-dependencies of the package currently in unstable. However, it may be the case that for instance testing's version of bar depends on the binary package, but that dependency has since been dropped in unstable. When we migrate the new binary, we need to ensure that the reverse-dependencies of the existing testing package (i.e. the one we removed earlier in the run) are still installable; see commit 709ea952 where the branch was originally introduced to solve a problem we'd had with a migration with such a dropped dependency in unstable leading to britney allowing the migration even though it introduced new breakage. In hindsight, the comment could have been much less confusing. Hope that helps Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e0bc62f780fe1297ab62e73b82c34...@mail.adsl.funky-badger.org
Bug#696671: tpu: isc-dhcp/4.2.2.dfsg.1-5+deb70u3
On Tue, Dec 25, 2012 at 10:11:22 -0500, Michael Gilbert wrote: > Package: release.debian.org > User: release.debian@packages.debian.org > Usertags: tpu > Severity: normal > > I plan to upload a tpu for isc-dhcp fixing two important issues. One > fixes an unclean error situation, and the other sets up the default > dhclient configuration to work in ipv6-only configurations. The first > change is less important, so I can drop it if needed. Please review > the proposed patch attached. > Was that first one forwarded/applied upstream? The report's over 4 years old, why is it suddenly important now? Cheers, Julien signature.asc Description: Digital signature
Bug#695423: unblock: cups/1.5.3-2.9
On Tue, Dec 25, 2012 at 21:45:41 +0100, Julien Cristau wrote: > I can buy the rest of this. > Actually, one more: the validate_utf8 thing uses en_US.UTF-8, which may or may not exist. You might want to use C.UTF-8 instead, which is in our libc since 2.13. Cheers, Julien signature.asc Description: Digital signature
Processed: Re: Bug#689822: release.debian.org: please accept the package wims_4.03a-8 into testing-proposed-updates
Processing control commands: > tags -1 + moreinfo Bug #689822 [release.debian.org] release.debian.org: please accept the package wims_4.03a-8 into testing-proposed-updates Added tag(s) moreinfo. -- 689822: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689822 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b689822.135646858625841.transcr...@bugs.debian.org
Bug#689822: release.debian.org: please accept the package wims_4.03a-8 into testing-proposed-updates
Control: tags -1 + moreinfo On 08.10.2012 17:31, Mehdi Dogguy wrote: On 06/10/2012 20:24, Georges Khaznadar wrote: Please would you accept the new package wims_4.03a-8 into testing-proposed-updates? It provides a fix for the RC bug #687947 which was sent three weeks ago. PLease take a look at the attached debdiff file. I shall await your response before uploading the new package. Please go ahead with upload and notify us as soon as the package is uploaded. I'll then add an unblock hint for the other two packages as well. Nothing appears to have happened there? Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/0382a1de8a32336fea8219c93bb9f...@mail.adsl.funky-badger.org
Processed: user release.debian....@packages.debian.org, usertagging 696498, usertagging 696671 ...
Processing commands for cont...@bugs.debian.org: > user release.debian@packages.debian.org Setting user to release.debian@packages.debian.org (was a...@adam-barratt.org.uk). > usertags 696498 + unblock There were no usertags set. Usertags are now: unblock. > usertags 696671 + unblock Usertags were: tpu. Usertags are now: unblock tpu. > usertags 696680 + britney There were no usertags set. Usertags are now: britney. > usertags 696158 + pu There were no usertags set. Usertags are now: pu. > usertags 696032 + unblock Usertags were: tpu. Usertags are now: unblock tpu. > usertags 695166 + unblock There were no usertags set. Usertags are now: unblock. > severity 695166 normal Bug #695166 {Done: Niels Thykier } [release.debian.org] unblock: kbibtex/0.4-4 Severity set to 'normal' from 'important' > thanks Stopping processing here. Please contact me if you need assistance. -- 695166: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695166 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.135646835124097.transcr...@bugs.debian.org
Bug#695423: unblock: cups/1.5.3-2.9
On Fri, Dec 7, 2012 at 22:31:33 +0100, Didier Raboud wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > > Please unblock package cups as 1.5.3-2.9 fixes the security bug in > #692791 (lpadmin-to-root privilege escalation). In addition to that, it > also fixes a series of other "nice-to-have"'s from either upstream or > RedHat, some dependency-tightening between libraries and some > documentation fixes (such as putting under the Debian Printing Team > umbrella). > > The debdiff is attached (but it has many diff-of-diff's) and you can > find all that in the git repository too: > > http://anonscm.debian.org/gitweb/?p=pkg-cups/cups.git;a=shortlog;h=refs/heads/master-wheezy > > > I'm aware the diff is quite extensive but I made sure to keep the > changes self-contained (mostly) and in different patches. Don't hesitate > to ask for details on specific parts of that diff, I'm open to dropping > specific patches if it helps migrating that important security fix into > Wheezy. > Questions: - what does "mv /etc/cups/cupsd.conf /etc/cups/cupsd.conf.conffile-bak" in preinst achieve? - in cups-dbus-utf8.patch, I'm wondering if the "if (str_len > buflen)" check isn't off-by-one? I can buy the rest of this. Cheers, Julien signature.asc Description: Digital signature
Bug#696663: marked as done (unblock: xkeyboard-config/2.5.1-3)
Your message dated Tue, 25 Dec 2012 20:32:21 + with message-id <3eadf95d13c8f2c7758ad461e58ef...@mail.adsl.funky-badger.org> and subject line Re: Bug#696663: unblock: xkeyboard-config/2.5.1-3 has caused the Debian Bug report #696663, regarding unblock: xkeyboard-config/2.5.1-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696663: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696663 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package xkeyboard-config This upload has one important fix for fr/oss, a minor addition to gr, and a revert of a change for is that upset some people (https://bugs.freedesktop.org/show_bug.cgi?id=43173). unblock xkeyboard-config/2.5.1-3 Cheers, Julien signature.asc Description: Digital signature --- End Message --- --- Begin Message --- On 25.12.2012 15:06, Julien Cristau wrote: On Tue, Dec 25, 2012 at 16:02:38 +0100, Cyril Brulebois wrote: Adam D. Barratt (25/12/2012): > Looks okay to me, but has a udeb; you know the drill :) Assuming > this gets acked, do we want it urgenting for RC1? /me drills a d-i ack. I don't mind having it urgented for RC1, better spot any regressions now. Well any regressions wouldn't affect d-i directly, afaict, so I don't think timing wrt rc1 matters much. unblock-udeb added; thanks. I've skipped the urgent for now; yell if you want one adding. Regards, Adam--- End Message ---
Re: unblock(-udeb)s for d-i wheezy rc1, round 3
On 25.12.2012 18:22, Cyril Brulebois wrote: ### l10n, armhf/vexpress, powerc vs. smp: unblock base-installer/1.130 unblock-udeb base-installer/1.130 ### fix l10n bugs: unblock espeakup/1:0.71-13 unblock-udeb espeakup/1:0.71-13 ### kernel: unblock linux/3.2.35-2 unblock-udeb linux/3.2.35-2 ### doc: unblock lowmem/1.37 unblock-udeb lowmem/1.37 ### better detection/improved error handling: unblock os-prober/1.57 unblock-udeb os-prober/1.57 All done. No urgents added as yet, as I wasn't sure of timescales; we can always add them if/when required. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/9456eab687cb2bfb4274ce08bb1a5...@mail.adsl.funky-badger.org
Bug#693068: marked as done (release.debian.org: arch-specific dependency should invalidate arch-specific candidate)
Your message dated Tue, 25 Dec 2012 20:04:35 + with message-id <507fb732d7cb766417106b725517b...@mail.adsl.funky-badger.org> and subject line Re: Bug#693068: release.debian.org: arch-specific dependency should invalidate arch-specific candidate has caused the Debian Bug report #693068, regarding release.debian.org: arch-specific dependency should invalidate arch-specific candidate to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 693068: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693068 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: minor User: release.debian@packages.debian.org Usertags: britney $ grep-excuses hlint/amd64 hlint/amd64 (1.8.28-1 to 1.8.28-1) Maintainer: Debian Haskell Group Updated binary: hlint (1.8.28-1+b1 to 1.8.28-1+b2) Updated binary: libghc-hlint-dev (1.8.28-1+b1 to 1.8.28-1+b2) Ignoring libghc-hlint-doc 1.8.28-1 (from 1.8.28-1) as it is arch: all Updated binary: libghc-hlint-prof (1.8.28-1+b1 to 1.8.28-1+b2) Ignoring removal of libghc-hlint-doc as it is arch: all Depends: hlint/amd64 haskell-uniplate Valid candidate $ grep-excuses haskell-uniplate/amd64 haskell-uniplate/amd64 (1.6.7-1 to 1.6.7-1) Maintainer: Debian Haskell Group Updated binary: libghc-uniplate-dev (1.6.7-1 to 1.6.7-1+b1) Ignoring libghc-uniplate-doc 1.6.7-1 (from 1.6.7-1) as it is arch: all Updated binary: libghc-uniplate-prof (1.6.7-1 to 1.6.7-1+b1) Ignoring removal of libghc-uniplate-doc as it is arch: all Invalidated by dependency Not considered Depends: haskell-uniplate/amd64 haskell-unordered-containers (not considered) $ grep-excuses haskell-unordered-containers haskell-unordered-containers (0.2.1.0-1 to 0.2.2.1-2~sid) Maintainer: Debian Haskell Group 21 days old (needed 10 days) Not touching package due to block request by freeze (contact debian-release if update is needed) Not considered I'd expect hlint/amd64 to get invalidated because of its dependency on haskell-uniplate. Cheers, Julien signature.asc Description: Digital signature --- End Message --- --- Begin Message --- On 25.12.2012 09:24, Julien Cristau wrote: On Mon, Dec 24, 2012 at 14:08:07 +, Adam D. Barratt wrote: On 12.11.2012 16:24, Julien Cristau wrote: >$ grep-excuses hlint/amd64 >hlint/amd64 (1.8.28-1 to 1.8.28-1) [...] >Depends: hlint/amd64 haskell-uniplate >Valid candidate >$ grep-excuses haskell-uniplate/amd64 >haskell-uniplate/amd64 (1.6.7-1 to 1.6.7-1) [...] >Invalidated by dependency >Not considered [...] >I'd expect hlint/amd64 to get invalidated because of its >dependency on >haskell-uniplate. The attached patch appears to dtrt in my tests; I've not applied it yet as I'd appreciate another set of eyes to check if there's anything obviously broken. [...] Doesn't look obviously broken to me. Maybe even sane. :) I've applied a version that maintains the existing excuses format as c95169c8. Regards, Adam--- End Message ---
Bug#679829: marked as done (britney: breakage of packages on removal of virtual packages)
Your message dated Tue, 25 Dec 2012 20:05:45 + with message-id <7312326435e8eb7bd6b66b50a2558...@mail.adsl.funky-badger.org> and subject line Re: Bug#679829: britney: breakage of packages on removal of virtual packages has caused the Debian Bug report #679829, regarding britney: breakage of packages on removal of virtual packages to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 679829: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679829 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal Tags: patch User: release.debian@packages.debian.org Usertags: britney Hi, As mentioned on IRC, I believe I found a bug in Britney2. As far as I can tell the bug is only triggered in certain "special" cases. The conditions are: * There must be a real package "R" and a package "V" in testing. * "V" must provide "R". * Another package "P" must have an unversioned dependency on "R" and "R" must be unable to satisfy the relation. (e.g. "R" can conflict with "P"). * Britney must attempt to remove "V". The bug happens because Britney (in register_reverse) does not record providing packages in a package's RDEPENDS if there is a real package for that given dependency. In the example above, Britney will think that "V" has no rdepends. This bug can be seen in the test "basic-uninstallable-deep-breaks-rm-virtual" (in t-unsupported) in britney2-tests. Once I have the bug number I will push a minimal test for this case as well. ~Niels >From 2b00f6c27c7240546487880c8ffdd39b3a92884b Mon Sep 17 00:00:00 2001 From: Niels Thykier Date: Sun, 1 Jul 2012 23:52:48 +0200 Subject: [PATCH] Always include providers of virtual packages in rdepends Signed-off-by: Niels Thykier --- britney.py |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/britney.py b/britney.py index 5205f64..c456460 100755 --- a/britney.py +++ b/britney.py @@ -600,8 +600,8 @@ class Britney(object): # register real packages if a[0] in packages and (not check_doubles or pkg not in packages[a[0]][RDEPENDS]): packages[a[0]][RDEPENDS].append(pkg) -# register packages which provide a virtual package -elif a[0] in provides: +# also register packages which provide a virtual package (if any) +if a[0] in provides: for i in provides.get(a[0]): if i not in packages: continue if not check_doubles or pkg not in packages[i][RDEPENDS]: -- 1.7.10 --- End Message --- --- Begin Message --- On 01.07.2012 22:28, Niels Thykier wrote: On 2012-07-02 00:19, Adam D. Barratt wrote: On Mon, 2012-07-02 at 00:12 +0200, Niels Thykier wrote: --- a/britney.py +++ b/britney.py @@ -600,8 +600,8 @@ class Britney(object): # register real packages if a[0] in packages and (not check_doubles or pkg not in packages[a[0]][RDEPENDS]): packages[a[0]][RDEPENDS].append(pkg) -# register packages which provide a virtual package -elif a[0] in provides: +# also register packages which provide a virtual package (if any) +if a[0] in provides: for i in provides.get(a[0]): if i not in packages: continue if not check_doubles or pkg not in packages[i][RDEPENDS]: Hmmm, does the rconflicts block immediately below not need the same change? [...] Seems reasonable. I am not able to produce a test for that case. However, that may just be a lack of imagination on my part, so here is an updated patch. Applied, thanks. Regards, Adam--- End Message ---
unblock(-udeb)s for d-i wheezy rc1, round 3
Cyril Brulebois (22/12/2012): > Here's a second list: And a third one: ### l10n, armhf/vexpress, powerc vs. smp: unblock base-installer/1.130 unblock-udeb base-installer/1.130 ### fix l10n bugs: unblock espeakup/1:0.71-13 unblock-udeb espeakup/1:0.71-13 ### kernel: unblock linux/3.2.35-2 unblock-udeb linux/3.2.35-2 ### doc: unblock lowmem/1.37 unblock-udeb lowmem/1.37 ### better detection/improved error handling: unblock os-prober/1.57 unblock-udeb os-prober/1.57 Tor those wondering, still no grub-installer since there are still more fixes needed for that package. Mraw, KiBi. signature.asc Description: Digital signature
Processed: retitle 696680 to [britney] excuses should be clearer for arch-specific dependencies
Processing commands for cont...@bugs.debian.org: > retitle 696680 [britney] excuses should be clearer for arch-specific > dependencies Bug #696680 [release.debian.org] [britney] excuses should be clearer for Changed Bug title to '[britney] excuses should be clearer for arch-specific dependencies' from '[britney] excuses should be clearer for' > thanks Stopping processing here. Please contact me if you need assistance. -- 696680: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696680 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.135645726713558.transcr...@bugs.debian.org
Bug#693068: release.debian.org: arch-specific dependency should invalidate arch-specific candidate
Control: clone -1 -2 Control: retitle -2 [britney] excuses should be clearer for arch-specific dependencies On 24.12.2012 14:08, Adam D. Barratt wrote: The attached patch appears to dtrt in my tests; I've not applied it yet as I'd appreciate another set of eyes to check if there's anything obviously broken. I've also attached the difference in the excuses.html generated by this morning's britney run and a test run with the patch applied and the same input data - the output is now more noisy in the case of source to binNMU dependencies (e.g. the haskell-wai-eventsource entry at the end of the excuses list) but I'm not entirely sure that's a bad thing. I'm decoupling the bug fix from the excuses format change as there's at least two systems outside of team tools that parse excuses output. I'll file patches for the PTS and DDPO for the format change and we can look at that further another time. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/232680dcd2e408e27c7960f7d093d...@mail.adsl.funky-badger.org
Processed: Re: Bug#693068: release.debian.org: arch-specific dependency should invalidate arch-specific candidate
Processing control commands: > clone -1 -2 Bug #693068 [release.debian.org] release.debian.org: arch-specific dependency should invalidate arch-specific candidate Bug 693068 cloned as bug 696680 > retitle -2 [britney] excuses should be clearer for Bug #696680 [release.debian.org] release.debian.org: arch-specific dependency should invalidate arch-specific candidate Changed Bug title to '[britney] excuses should be clearer for' from 'release.debian.org: arch-specific dependency should invalidate arch-specific candidate' -- 693068: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693068 696680: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696680 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.b693068.135645697911714.transcr...@bugs.debian.org
Bug#696679: unblock: libmikmod/3.1.12-5
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Please unblock package libmikmod The current package in testing suffers from a serious issue (not reported though, only observed while preparing -5): in certain cases, applications that rely on libmikmod will not see any driver but the nosound one, effectively rendering them useless. As it turns out, enabling the fortify hardening flags breaks libmikmod's module loading, so -5 turns that off, as a temporary measure until I figure out what the underlying problem really is. It also rearranges the order of sound drivers, so nosound is preferred over saving to music.raw, as to not pollute the filesystem with huge music files. With this change in place, the pulseaudio-esound-compat | oss-compat recommendation could be lowered to suggests. All of these are fairly trivial changes, but nevertheless, would make the libmikmod version in wheezy much more useful, so I'd like to request an unblock for it. A debdiff between -4.1 (currently in wheezy) and -5 (in unstable) has been attached. Some parts of the diff have been omitted, as they're just noise (timestamp changes under debian/patches, and other noops like that). Thanks in advance! unblock libmikmod/3.1.12-5 -- |8] diff -Nru libmikmod-3.1.12/debian/changelog libmikmod-3.1.12/debian/changelog --- libmikmod-3.1.12/debian/changelog 2012-10-19 23:06:31.0 +0200 +++ libmikmod-3.1.12/debian/changelog 2012-12-21 16:41:16.0 +0100 @@ -1,13 +1,26 @@ +libmikmod (3.1.12-5) unstable; urgency=low + + * Acknowledge the NMU, thanks Simon! + * Make the nosound driver have higher priority than the disk +writers. (Closes: #690943) + * Demote the pulseaudio-esound-compat | oss-compat recommendation to +Suggests, now that the fallback is not the disk writer. +(Closes: #696013) + * Build with hardening=-fortify, as enabling fortification breaks the +driver loading. + + -- Gergely Nagy Fri, 21 Dec 2012 16:41:15 +0100 + libmikmod (3.1.12-4.1) unstable; urgency=low - * Non-maintainer upload (acknowledged by maintainer). + * Non-maintainer upload. * Apply patches from Hans de Goede and Pantelis Koukousoulas to enable the ESD driver, so we can interoperate with PulseAudio (Closes: #385844) * Recommend pulseaudio-esound-compat | oss-compat because if we don't have one of those, the fallback path is to write output to ./music.raw, which is unlikely to be what you want! - -- Simon McVittie Fri, 19 Oct 2012 22:05:18 +0100 + -- Simon McVittie Fri, 19 Oct 2012 09:12:08 +0100 libmikmod (3.1.12-4) unstable; urgency=low diff -Nru libmikmod-3.1.12/debian/control libmikmod-3.1.12/debian/control --- libmikmod-3.1.12/debian/control 2012-10-19 23:04:43.0 +0200 +++ libmikmod-3.1.12/debian/control 2012-12-21 16:12:03.0 +0100 @@ -32,7 +32,7 @@ Multi-Arch: same Pre-Depends: ${misc:Pre-Depends} Depends: ${shlibs:Depends}, ${misc:Depends} -Recommends: pulseaudio-esound-compat | oss-compat +Suggests: pulseaudio-esound-compat | oss-compat Description: Portable sound library This library is capable of playing samples as well as module files and was originally written by Jean-Paul Mikkers (MikMak) for DOS. It has diff -Nru libmikmod-3.1.12/debian/libmikmod2.lintian-overrides libmikmod-3.1.12/debian/libmikmod2.lintian-overrides --- libmikmod-3.1.12/debian/libmikmod2.lintian-overrides 1970-01-01 01:00:00.0 +0100 +++ libmikmod-3.1.12/debian/libmikmod2.lintian-overrides 2012-12-21 16:48:37.0 +0100 @@ -0,0 +1,3 @@ +# Fortification has been explicitly disabled, as it breaks module +# loading for some reason. +libmikmod2: hardening-no-fortify-functions usr/lib/*/libmikmod.so.2.0.4 diff -Nru libmikmod-3.1.12/debian/patches/0014-playercode-mdreg-Register-the-NULL-driver-before-the.patch libmikmod-3.1.12/debian/patches/0014-playercode-mdreg-Register-the-NULL-driver-before-the.patch --- libmikmod-3.1.12/debian/patches/0014-playercode-mdreg-Register-the-NULL-driver-before-the.patch 1970-01-01 01:00:00.0 +0100 +++ libmikmod-3.1.12/debian/patches/0014-playercode-mdreg-Register-the-NULL-driver-before-the.patch 2012-12-21 16:09:51.0 +0100 @@ -0,0 +1,37 @@ +From: Gergely Nagy +Date: Fri, 21 Dec 2012 16:07:43 +0100 +Subject: playercode/mdreg: Register the NULL driver before the file writers + +Register the NULL driver sooner, as having no sound is preferable to +writing to music.raw: file writing should be used only when explicitly +selected. + +Reported-by: Simon McVittie +Closes: #690943 +Signed-off-by: Gergely Nagy +--- + playercode/mdreg.c |4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/playercode/mdreg.c b/playercode/mdreg.c +index 4018c7e..f158e18 100644 +--- a/playercode/mdreg.c b/playercode/mdreg.c +@@ -82,6 +82,8 @@ void _mm_registeralldrivers(void) + _mm_registerdriver(&drv_mac); + #endif + ++ _mm_registerdriver(&drv_nos); ++ + /* Regist
Bug#696671: tpu: isc-dhcp/4.2.2.dfsg.1-5+deb70u3
Package: release.debian.org User: release.debian@packages.debian.org Usertags: tpu Severity: normal I plan to upload a tpu for isc-dhcp fixing two important issues. One fixes an unclean error situation, and the other sets up the default dhclient configuration to work in ipv6-only configurations. The first change is less important, so I can drop it if needed. Please review the proposed patch attached. Thanks, Mike isc-dhcp.patch Description: Binary data
Bug#696663: unblock: xkeyboard-config/2.5.1-3
On Tue, Dec 25, 2012 at 16:02:38 +0100, Cyril Brulebois wrote: > Adam D. Barratt (25/12/2012): > > Looks okay to me, but has a udeb; you know the drill :) Assuming > > this gets acked, do we want it urgenting for RC1? > > /me drills a d-i ack. I don't mind having it urgented for RC1, better > spot any regressions now. > Well any regressions wouldn't affect d-i directly, afaict, so I don't think timing wrt rc1 matters much. Cheers, Julien signature.asc Description: Digital signature
Bug#696663: unblock: xkeyboard-config/2.5.1-3
Adam D. Barratt (25/12/2012): > Looks okay to me, but has a udeb; you know the drill :) Assuming > this gets acked, do we want it urgenting for RC1? /me drills a d-i ack. I don't mind having it urgented for RC1, better spot any regressions now. Mraw, KiBi. signature.asc Description: Digital signature
Bug#696670: marked as done (unblock: mahara/1.5.1-3.1)
Your message dated Tue, 25 Dec 2012 14:51:18 + with message-id and subject line Re: Bug#696670: unblock: mahara/1.5.1-3.1 has caused the Debian Bug report #696670, regarding unblock: mahara/1.5.1-3.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696670: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696670 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package mahara It provides a fix, cherry-picked from upstream repository, for a XSS vulnerability as described in bug #695789 unblock mahara/1.5.1-3.1 -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru mahara-1.5.1/debian/changelog mahara-1.5.1/debian/changelog --- mahara-1.5.1/debian/changelog 2012-11-16 09:33:12.0 +0100 +++ mahara-1.5.1/debian/changelog 2012-12-23 15:02:25.0 +0100 @@ -1,3 +1,14 @@ +mahara (1.5.1-3.1) unstable; urgency=high + + * Non-maintainer upload. + * SECURITY UPDATE: Fix a cross-site scripting (XSS) vulnerability +which allowed remote attackers to inject arbitrary web script or +HTML via the query parameter. +- debian/patches/CVE-2012-2253.patch +- Closes: #695789 + + -- Luca Falavigna Sun, 23 Dec 2012 14:53:41 +0100 + mahara (1.5.1-3) unstable; urgency=high * SECURITY UPDATE: Disable XML entity parsing to prevent XEE diff -Nru mahara-1.5.1/debian/patches/CVE-2012-2253.patch mahara-1.5.1/debian/patches/CVE-2012-2253.patch --- mahara-1.5.1/debian/patches/CVE-2012-2253.patch 1970-01-01 01:00:00.0 +0100 +++ mahara-1.5.1/debian/patches/CVE-2012-2253.patch 2012-12-23 15:02:25.0 +0100 @@ -0,0 +1,24 @@ +Author: Hugh Davenport +Subject: Cross-site scripting (XSS) vulnerability +Origin: upstream +Bug: https://bugs.launchpad.net/mahara/+bug/1079498 + +CVE-2012-2253 + +Cross-site scripting (XSS) vulnerability which allowed remote +attackers to inject arbitrary web script or HTML via the query +parameter. + +Index: mahara/htdocs/lib/web.php +=== +--- mahara.orig/htdocs/lib/web.php 2012-12-23 14:44:57.009756577 +0100 mahara/htdocs/lib/web.php 2012-12-23 14:47:02.405760418 +0100 +@@ -3273,7 +3273,7 @@ + } + else { + $return .= '">' +-. '' . $text . ''; + } + diff -Nru mahara-1.5.1/debian/patches/series mahara-1.5.1/debian/patches/series --- mahara-1.5.1/debian/patches/series 2012-11-16 09:32:59.0 +0100 +++ mahara-1.5.1/debian/patches/series 2012-12-23 15:02:25.0 +0100 @@ -10,3 +10,4 @@ CVE-2012-2244-0003.patch CVE-2012-2246.patch CVE-2012-2247.patch +CVE-2012-2253.patch --- End Message --- --- Begin Message --- On 25.12.2012 14:41, Luca Falavigna wrote: Please unblock package mahara It provides a fix, cherry-picked from upstream repository, for a XSS vulnerability as described in bug #695789 Unblocked; thanks. Regards, Adam--- End Message ---
Bug#696669: unblock: network-manager/0.9.4.0-7
On Tue, Dec 25, 2012 at 15:39:19 +0100, Michael Biebl wrote: > On 25.12.2012 15:29, Julien Cristau wrote: > > On Tue, Dec 25, 2012 at 15:06:12 +0100, Michael Biebl wrote: > > > >> * Install a PolicyKit pkla file which allows members of group netdev or > >> sudo > >> to create system-wide network connections without being prompted for > >> the > >> admin password. (Closes: #642136) > > > > The location for this file doesn't make much sense to me. Either /usr > > or /etc I would understand, but AIUI /var means it's stuff that gets > > written to at runtime by NM, which doesn't seem appropriate here. > > Basically I agree with you, but that's simply where PolicyKit version > 0.105 (and older) store the pklocalauthority files [1] for pkla files > shipped by distro/3rd-party packages. /etc/polkit-1 is reserved for the > local admin to override settings from /var. > There's a /etc/polkit-1/localauthority/10-vendor.d directory, which seems appropriate for use by... the vendor? Cheers, Julien signature.asc Description: Digital signature
Bug#696670: unblock: mahara/1.5.1-3.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package mahara It provides a fix, cherry-picked from upstream repository, for a XSS vulnerability as described in bug #695789 unblock mahara/1.5.1-3.1 -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru mahara-1.5.1/debian/changelog mahara-1.5.1/debian/changelog --- mahara-1.5.1/debian/changelog 2012-11-16 09:33:12.0 +0100 +++ mahara-1.5.1/debian/changelog 2012-12-23 15:02:25.0 +0100 @@ -1,3 +1,14 @@ +mahara (1.5.1-3.1) unstable; urgency=high + + * Non-maintainer upload. + * SECURITY UPDATE: Fix a cross-site scripting (XSS) vulnerability +which allowed remote attackers to inject arbitrary web script or +HTML via the query parameter. +- debian/patches/CVE-2012-2253.patch +- Closes: #695789 + + -- Luca Falavigna Sun, 23 Dec 2012 14:53:41 +0100 + mahara (1.5.1-3) unstable; urgency=high * SECURITY UPDATE: Disable XML entity parsing to prevent XEE diff -Nru mahara-1.5.1/debian/patches/CVE-2012-2253.patch mahara-1.5.1/debian/patches/CVE-2012-2253.patch --- mahara-1.5.1/debian/patches/CVE-2012-2253.patch 1970-01-01 01:00:00.0 +0100 +++ mahara-1.5.1/debian/patches/CVE-2012-2253.patch 2012-12-23 15:02:25.0 +0100 @@ -0,0 +1,24 @@ +Author: Hugh Davenport +Subject: Cross-site scripting (XSS) vulnerability +Origin: upstream +Bug: https://bugs.launchpad.net/mahara/+bug/1079498 + +CVE-2012-2253 + +Cross-site scripting (XSS) vulnerability which allowed remote +attackers to inject arbitrary web script or HTML via the query +parameter. + +Index: mahara/htdocs/lib/web.php +=== +--- mahara.orig/htdocs/lib/web.php 2012-12-23 14:44:57.009756577 +0100 mahara/htdocs/lib/web.php 2012-12-23 14:47:02.405760418 +0100 +@@ -3273,7 +3273,7 @@ + } + else { + $return .= '">' +-. '' . $text . ''; + } + diff -Nru mahara-1.5.1/debian/patches/series mahara-1.5.1/debian/patches/series --- mahara-1.5.1/debian/patches/series 2012-11-16 09:32:59.0 +0100 +++ mahara-1.5.1/debian/patches/series 2012-12-23 15:02:25.0 +0100 @@ -10,3 +10,4 @@ CVE-2012-2244-0003.patch CVE-2012-2246.patch CVE-2012-2247.patch +CVE-2012-2253.patch
Bug#696669: unblock: network-manager/0.9.4.0-7
On 25.12.2012 15:29, Julien Cristau wrote: > On Tue, Dec 25, 2012 at 15:06:12 +0100, Michael Biebl wrote: > >> * Install a PolicyKit pkla file which allows members of group netdev or >> sudo >> to create system-wide network connections without being prompted for the >> admin password. (Closes: #642136) > > The location for this file doesn't make much sense to me. Either /usr > or /etc I would understand, but AIUI /var means it's stuff that gets > written to at runtime by NM, which doesn't seem appropriate here. Basically I agree with you, but that's simply where PolicyKit version 0.105 (and older) store the pklocalauthority files [1] for pkla files shipped by distro/3rd-party packages. /etc/polkit-1 is reserved for the local admin to override settings from /var. Michael [1] http://www.freedesktop.org/software/polkit/docs/0.105/pklocalauthority.8.html (Directory Structure). -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature
Bug#695764: partial review of unblock: packagekit/0.7.6-2
Hi, I am touching on this bug as part of the request by the RT [1]. Some remarks: - The package is in unstable now. - The debdiff in the first message is the same as created from the archive by "debdiff packagekit_0.7.6-1.dsc packagekit_0.7.6-2.dsc" - It would be good to mention bug numbers against packagekit and/or references to the upstream bug tracker. I/we don't know where to find the information trivially, making the assessment harder than necessary. Isn't patch 03 fixing bug 688133? - It would be nice (for next time maybe, or just in this bug) to store the URL of where the patches were obtained, see DEP3 [2] - Patch 01 looks ok - My C/C++ is not good enough to really follow patches 02 and 03, but 02 contains a spurious empty line removal. Paul [1] https://lists.debian.org/debian-devel-announce/2012/11/msg3.html [ Unblocks and Freeze Policy ] [2] http://dep.debian.net/deps/dep3/ signature.asc Description: OpenPGP digital signature
Bug#696669: unblock: network-manager/0.9.4.0-7
On Tue, Dec 25, 2012 at 15:06:12 +0100, Michael Biebl wrote: > * Install a PolicyKit pkla file which allows members of group netdev or sudo > to create system-wide network connections without being prompted for the > admin password. (Closes: #642136) The location for this file doesn't make much sense to me. Either /usr or /etc I would understand, but AIUI /var means it's stuff that gets written to at runtime by NM, which doesn't seem appropriate here. Cheers, Julien signature.asc Description: Digital signature
Bug#696669: unblock: network-manager/0.9.4.0-7
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package network-manager It fixes two RC bugs. The patches for the libnm-glib are somewhat largeish, but they are taken from upstream and have been part of network-manager 0.9.6, which has been released for quite some time and is also available from experimental for over 2 months without any related bug report. The full changelog is network-manager (0.9.4.0-7) unstable; urgency=low * Install a PolicyKit pkla file which allows members of group netdev or sudo to create system-wide network connections without being prompted for the admin password. (Closes: #642136) * Cherry-pick patches for libnm-glib which fix various segfaults e.g. in gnome-control-center when switching between overview and network settings panel or in gnome-shell and nm-applet when restarting NetworkManager. (Closes: #696143) (bgo: #674473) -- Michael Biebl Fri, 21 Dec 2012 03:48:18 +0100 Complete debdiff is attached. Cheers, Michael unblock network-manager/0.9.4.0-7 -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (200, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.6-trunk-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff --git a/debian/changelog b/debian/changelog index 8b905b9..1d27379 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,15 @@ +network-manager (0.9.4.0-7) unstable; urgency=low + + * Install a PolicyKit pkla file which allows members of group netdev or sudo +to create system-wide network connections without being prompted for the +admin password. (Closes: #642136) + * Cherry-pick patches for libnm-glib which fix various segfaults e.g. in +gnome-control-center when switching between overview and network settings +panel or in gnome-shell and nm-applet when restarting NetworkManager. +(Closes: #696143) (bgo: #674473) + + -- Michael Biebl Fri, 21 Dec 2012 03:48:18 +0100 + network-manager (0.9.4.0-6) unstable; urgency=low * debian/rules: Use xz compression for binary packages. diff --git a/debian/network-manager.install b/debian/network-manager.install index 35b81be..6bd49d2 100644 --- a/debian/network-manager.install +++ b/debian/network-manager.install @@ -21,3 +21,4 @@ lib/udev/rules.d/*.rules lib/systemd/system/NetworkManager.service lib/systemd/system/NetworkManager-wait-online.service debian/NetworkManager.conf etc/NetworkManager/ +debian/org.freedesktop.NetworkManager.pkla var/lib/polkit-1/localauthority/10-vendor.d/ diff --git a/debian/org.freedesktop.NetworkManager.pkla b/debian/org.freedesktop.NetworkManager.pkla new file mode 100644 index 000..7acba4e --- /dev/null +++ b/debian/org.freedesktop.NetworkManager.pkla @@ -0,0 +1,6 @@ +[Adding or changing system-wide NetworkManager connections] +Identity=unix-group:netdev;unix-group:sudo +Action=org.freedesktop.NetworkManager.settings.modify.system +ResultAny=no +ResultInactive=no +ResultActive=yes diff --git a/debian/patches/18-libnm-glib-NULL-out-priv-fields-on-dispose.patch b/debian/patches/18-libnm-glib-NULL-out-priv-fields-on-dispose.patch new file mode 100644 index 000..74a86a4 --- /dev/null +++ b/debian/patches/18-libnm-glib-NULL-out-priv-fields-on-dispose.patch @@ -0,0 +1,670 @@ +From be18dd06cd138be232ff68ec7af19cfcf2f969ed Mon Sep 17 00:00:00 2001 +From: Dan Winship +Date: Mon, 23 Apr 2012 15:02:48 + +Subject: libnm-glib: NULL out priv fields on dispose() + +In some situations, objects might get used after being disposed, so +clear out their various priv fields so we don't try to access unreffed +objects, freed strings, etc. + +https://bugzilla.gnome.org/show_bug.cgi?id=674473 +--- +Index: network-manager/include/nm-glib-compat.h +=== +--- network-manager.orig/include/nm-glib-compat.h 2012-10-30 21:02:36.779282426 +0100 network-manager/include/nm-glib-compat.h 2012-12-21 01:13:58.030742565 +0100 +@@ -42,6 +42,16 @@ + g_simple_async_result_set_from_error (result, __error); \ + g_error_free (__error); \ + } G_STMT_END ++ ++#define g_clear_object(object_ptr) \ ++ G_STMT_START { \ ++ GObject **__obj_p = object_ptr; \ ++ if (*__obj_p) { \ ++ g_object_unref (*__obj_p); \ ++ *__obj_p = NULL; \ ++ } \ ++ } G_STMT_END ++ + #endif + + #endif /* NM_GLIB_COMPAT_H */ +Index: network-manager/libnm-glib/nm-access-point.c +=== +--- network-manager.orig/libnm-glib/nm-access-point.c 2012-10-30 21:02:36.783282401 +0100 network-manager/libnm-glib/nm-access-point.c 2012-12-21 01:13:58.030742565 +0100 +@@ -41,7 +41,6 @@ + #define NM_ACCESS_POINT_GET_PRIVATE(o) (G_TYPE_INSTANCE_GET_PRIVATE ((o), NM_TYPE_ACCESS_POINT, NMAccessPointPrivate)) + + typedef s
Re: Pre-approval request for upload of iproute
On Wed, Oct 10, 2012 at 10:44:57PM +0200, Andreas Henriksson wrote: > I won't push for this inclusion in wheezy myself anymore, but I did > consider it a waste to not give users the many small improvements that > has been made later on. Also as indicated many will probably want CoDeL > since it's part of the magic recepie for fixing bufferbloat > (and since backporting BQL was approved, why not fully support this > out of the box on wheezy with a matching iproute2 version?). Possibly I already asked that at some point, or somebody else did: Can this "single" change be backported to the version in testing/unstable? Kind regards Philipp Kern signature.asc Description: Digital signature
Bug#696635: marked as done (unblock: base-files/7.1)
Your message dated Tue, 25 Dec 2012 13:41:17 +0100 with message-id <20121225124117.gq5...@radis.cristau.org> and subject line Re: Bug#696635: unblock: base-files/7.1 has caused the Debian Bug report #696635, regarding unblock: base-files/7.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696635: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696635 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Greetings. This release is the one finally saying 7.0 in /etc/debian_version so I would naturally like to see it in wheezy. If this may be done before the upcoming debian installer release candidate, even better. Changes from 6.11 are what everybody would expect for a stable release plus some easy and low risk fixes (which means things like #681489 will have to wait for jessie). unblock: base-files/7.1 Thanks a lot. --- End Message --- --- Begin Message --- On Mon, Dec 24, 2012 at 17:27:00 +0100, Santiago Vila wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > > Greetings. > > This release is the one finally saying 7.0 in /etc/debian_version so I > would naturally like to see it in wheezy. If this may be done before > the upcoming debian installer release candidate, even better. > > Changes from 6.11 are what everybody would expect for a stable release > plus some easy and low risk fixes (which means things like #681489 > will have to wait for jessie). > > unblock: base-files/7.1 > The /run mess never stops... Unblocked, thanks! Cheers, Julien signature.asc Description: Digital signature --- End Message ---
Processed: tagging 696663
Processing commands for cont...@bugs.debian.org: > tags 696663 + confirmed d-i Bug #696663 [release.debian.org] unblock: xkeyboard-config/2.5.1-3 Added tag(s) d-i and confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 696663: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696663 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.135643858016824.transcr...@bugs.debian.org
Bug#696516: marked as done (unblock: lemonldap-ng/1.1.2-5+deb70u1)
Your message dated Tue, 25 Dec 2012 12:26:11 + with message-id and subject line Re: Bug#696516: unblock: lemonldap-ng/1.1.2-5+deb70u1 has caused the Debian Bug report #696516, regarding unblock: lemonldap-ng/1.1.2-5+deb70u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696516: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696516 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package lemonldap-ng Hi all, We'd like to have an unblock to push lemonldap-ng_1.1.2-5+deb70u1 This release will contain : * the security fix to close #696329 * the pt_BR.po file to close #693366 Best regards, Xavier unblock lemonldap-ng/1.1.2-5+deb70u1 -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (800, 'testing'), (700, 'stable'), (600, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru lemonldap-ng-1.1.2/debian/changelog lemonldap-ng-1.1.2/debian/changelog --- lemonldap-ng-1.1.2/debian/changelog 2012-03-24 17:59:00.0 +0100 +++ lemonldap-ng-1.1.2/debian/changelog 2012-12-21 06:03:04.0 +0100 @@ -1,3 +1,10 @@ +lemonldap-ng (1.1.2-5+deb70u1) testing-proposed-updates; urgency=high + + * Fix for CVE-2012-6426 (Closes: #696329) + * Brazilian translation (Closes: #693366) + + -- Xavier Guimard Thu, 20 Dec 2012 06:41:50 +0100 + lemonldap-ng (1.1.2-5) unstable; urgency=low * Remove some mistakes reported by diff -Nru lemonldap-ng-1.1.2/debian/patches/series lemonldap-ng-1.1.2/debian/patches/series --- lemonldap-ng-1.1.2/debian/patches/series 1970-01-01 01:00:00.0 +0100 +++ lemonldap-ng-1.1.2/debian/patches/series 2012-12-19 22:16:19.0 +0100 @@ -0,0 +1 @@ +verify-saml-signatures.patch diff -Nru lemonldap-ng-1.1.2/debian/patches/verify-saml-signatures.patch lemonldap-ng-1.1.2/debian/patches/verify-saml-signatures.patch --- lemonldap-ng-1.1.2/debian/patches/verify-saml-signatures.patch 1970-01-01 01:00:00.0 +0100 +++ lemonldap-ng-1.1.2/debian/patches/verify-saml-signatures.patch 2012-12-19 22:21:48.0 +0100 @@ -0,0 +1,146 @@ +Description: Verify SAML signature + Due to a bad use of Lasso library, SAML signatures are never checked, even if + we force signature check. + [CVE-2012-6426] +Author: Clément OUDOT +Bug: http://jira.ow2.org/browse/LEMONLDAP-570 +Bug-Debian: http://bugs.debian.org/696329 +Forwarded: yes +Reviewed-By: Xavier Guimard +Last-Update: 2012-12-19 + +--- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/_SAML.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/_SAML.pm +@@ -2218,6 +2218,21 @@ + return $self->checkLassoError($@); + } + ++## @method boolean forceSignatureVerification(Lasso::Profile profile) ++# Modify Lasso signature hint to force signature verification ++# @param profile Lasso profile object ++# @return result ++sub forceSignatureVerification { ++my ( $self, $profile ) = splice @_; ++ ++eval { ++Lasso::Profile::set_signature_verify_hint( $profile, ++Lasso::Constants::PROFILE_SIGNATURE_VERIFY_HINT_FORCE ); ++}; ++ ++return $self->checkLassoError($@); ++} ++ + ## @method string getAuthnContext(string context) + # Convert configuration string into SAML2 AuthnContextClassRef string + # @param context configuration string +@@ -3223,6 +3238,10 @@ + + Modify Lasso signature hint to disable signature verification + ++=head2 forceSignatureVerification ++ ++Modify Lasso signature hint to force signature verification ++ + =head2 getAuthnContext + + Convert configuration string into SAML2 AuthnContextClassRef string +--- a/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/AuthSAML.pm b/lemonldap-ng-portal/lib/Lemonldap/NG/Portal/AuthSAML.pm +@@ -125,7 +125,18 @@ + ->{samlIDPMetaDataOptionsCheckSSOMessageSignature}; + + if ($checkSSOMessageSignature) { +-unless ( $self->checkSignatureStatus($login) ) { ++ ++$self->forceSignatureVerification($login); ++ ++if ($artifact) { ++$result = $self->processArtResponseMsg( $login, $response ); ++} ++else { ++$result = ++ $self->processAuthnResponseMsg( $login, $response ); ++} ++ ++unless ($result) { + $self->lmLog( "Signature is no
Bug#696663: unblock: xkeyboard-config/2.5.1-3
On 25.12.2012 11:55, Julien Cristau wrote: Please unblock package xkeyboard-config This upload has one important fix for fr/oss, a minor addition to gr, and a revert of a change for is that upset some people (https://bugs.freedesktop.org/show_bug.cgi?id=43173). Looks okay to me, but has a udeb; you know the drill :) Assuming this gets acked, do we want it urgenting for RC1? Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4d436085f08c8c61722cc5defa583...@mail.adsl.funky-badger.org
Bug#696663: unblock: xkeyboard-config/2.5.1-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package xkeyboard-config This upload has one important fix for fr/oss, a minor addition to gr, and a revert of a change for is that upset some people (https://bugs.freedesktop.org/show_bug.cgi?id=43173). unblock xkeyboard-config/2.5.1-3 Cheers, Julien signature.asc Description: Digital signature
Bug#696652: marked as done (unblock: fuseiso/20070708-3)
Your message dated Tue, 25 Dec 2012 11:43:41 + with message-id <32f19826c9d039467bb34c2bb47d3...@mail.adsl.funky-badger.org> and subject line Re: Bug#696652: unblock: fuseiso/20070708-3 has caused the Debian Bug report #696652, regarding unblock: fuseiso/20070708-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 696652: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696652 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package fuseiso. The new version in sid fixes an RC bug, and a typo in the sourcecode. unblock fuseiso/20070708-3 Attaching the "git diff". Thanks for your work! David -- . ''`. Debian developer | http://wiki.debian.org/DavidPaleino : :' : Linuxer #334216 --|-- http://www.hanskalabs.net/ `. `'` GPG: 1392B174 | http://deb.li/dapal `- 2BAB C625 4E66 E7B8 450A C3E1 E6AA 9017 1392 B174 diff --git a/debian/changelog b/debian/changelog index 6205145..21d4dbd 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +fuseiso (20070708-3) unstable; urgency=low + + * Renamed dependency from fuse-utils to fuse (Closes: #689009) + * Fixed typo in sourcecode (Closes: #598021) + * Updated years in debian/copyright + + -- David Paleino Tue, 25 Dec 2012 08:47:20 +0100 + fuseiso (20070708-2) unstable; urgency=low * Maintenance release diff --git a/debian/control b/debian/control index d37c9ef..6b96d30 100644 --- a/debian/control +++ b/debian/control @@ -18,7 +18,7 @@ Architecture: any Depends: ${shlibs:Depends} , ${misc:Depends} - , fuse-utils + , fuse Description: FUSE module to mount ISO filesystem images This package provides a module to mount ISO filesystem images using FUSE. diff --git a/debian/copyright b/debian/copyright index 0184527..016abbb 100644 --- a/debian/copyright +++ b/debian/copyright @@ -1,7 +1,7 @@ Format-Specification: http://dep.debian.net/deps/dep5 Files: debian/* -Copyright: © 2007-2010, David Paleino +Copyright: © 2007-2012, David Paleino License: GPL-2+ Files: * diff --git a/debian/patches/01-fix_typo.patch b/debian/patches/01-fix_typo.patch new file mode 100644 index 000..eb80d15 --- /dev/null +++ b/debian/patches/01-fix_typo.patch @@ -0,0 +1,20 @@ +From: Jakub Wilk +Subject: fix typo in sourcecode +Origin: vendor, http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598021 +Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598021 + +--- + src/fuseiso.c |2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- fuseiso.orig/src/fuseiso.c fuseiso/src/fuseiso.c +@@ -295,7 +295,7 @@ void usage(const char* prog) { + "-f -- run in foreground, do not daemonize\n" + "-d -- run in foreground and print debug information\n" + "-s -- run single-threaded\n" +-"\nPlease consult with FUSE ducumentation for more information\n", ++"\nPlease consult with FUSE documentation for more information\n", + VERSION, + prog); + }; diff --git a/debian/patches/series b/debian/patches/series index ed05433..d5f1cf6 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 00-support_large_iso.patch +01-fix_typo.patch signature.asc Description: PGP signature --- End Message --- --- Begin Message --- On 25.12.2012 08:07, David Paleino wrote: Please unblock package fuseiso. The new version in sid fixes an RC bug, and a typo in the sourcecode. Arguably the bug doesn't affect wheezy, as we'll still be shipping the transitional package there (yay for dropping it from sid before the release!); the change will help partial upgrades from wheezy work, so unblocked, thanks. Regards, Adam--- End Message ---
Bug#687916: Seconded
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I second that the 1.8.x packages should be removed from Debian. Upstream is not putting much effort into it any more and fixing security issues becomes increasingly hard. We can only hope that 2.x gets included into Wheezy. Otherwise we will continue to provide Zabbix packages in a third-party repository because we know that many people are interested to have Debian packages of Zabbix. Regards …Christoph -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iEYEARECAAYFAlDZiD0ACgkQCV53xXnMZYZCjwCgpMil2bbTJoVVwIp4EQLvNVdx hcoAnj+rHU3JwguWOnxwxLJRkjMLfpPz =B1Xy -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/50d98841.5040...@debian.org
Bug#693385: expecting no as an answer to unblock: bind9/1:9.8.4.dfsg-1
Hi, I am touching on this bug as part of the request by the RT [1]. Reading through the discussion of a later CVE bug in bind9 [2], my expectation regarding the unblock bind9/1:9.8.4.dfsg-1 request is that the answer will be no, due to: """ And then we're talking about a version that does this over the version in testing: 2248 files changed, 71094 insertions(+), 36757 deletions(-) And about software whose bug tracking system and VCS are both proprietary. So one cannot even sanely review it as the context information from the RT tickets is not publicly available. """ [typo corrected] Paul [1] https://lists.debian.org/debian-devel-announce/2012/11/msg3.html [ Unblocks and Freeze Policy ] [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695192 signature.asc Description: OpenPGP digital signature
Processed: closing 692919
Processing commands for cont...@bugs.debian.org: > close 692919 Bug #692919 [release.debian.org] unblock: wicd/1.7.2.4-4 Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 692919: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692919 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.135642955122246.transcr...@bugs.debian.org
Bug#693068: release.debian.org: arch-specific dependency should invalidate arch-specific candidate
On Mon, Dec 24, 2012 at 14:08:07 +, Adam D. Barratt wrote: > Control: tags -1 + patch > > On 12.11.2012 16:24, Julien Cristau wrote: > >$ grep-excuses hlint/amd64 > >hlint/amd64 (1.8.28-1 to 1.8.28-1) > [...] > >Depends: hlint/amd64 haskell-uniplate > >Valid candidate > >$ grep-excuses haskell-uniplate/amd64 > >haskell-uniplate/amd64 (1.6.7-1 to 1.6.7-1) > [...] > >Invalidated by dependency > >Not considered > [...] > >I'd expect hlint/amd64 to get invalidated because of its > >dependency on > >haskell-uniplate. > > The attached patch appears to dtrt in my tests; I've not applied it > yet as I'd appreciate another set of eyes to check if there's > anything obviously broken. I've also attached the difference in the > excuses.html generated by this morning's britney run and a test run > with the patch applied and the same input data - the output is now > more noisy in the case of source to binNMU dependencies (e.g. the > haskell-wai-eventsource entry at the end of the excuses list) but > I'm not entirely sure that's a bad thing. > Doesn't look obviously broken to me. Maybe even sane. :) Cheers, Julien signature.asc Description: Digital signature
Bug#696652: unblock: fuseiso/20070708-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package fuseiso. The new version in sid fixes an RC bug, and a typo in the sourcecode. unblock fuseiso/20070708-3 Attaching the "git diff". Thanks for your work! David -- . ''`. Debian developer | http://wiki.debian.org/DavidPaleino : :' : Linuxer #334216 --|-- http://www.hanskalabs.net/ `. `'` GPG: 1392B174 | http://deb.li/dapal `- 2BAB C625 4E66 E7B8 450A C3E1 E6AA 9017 1392 B174 diff --git a/debian/changelog b/debian/changelog index 6205145..21d4dbd 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +fuseiso (20070708-3) unstable; urgency=low + + * Renamed dependency from fuse-utils to fuse (Closes: #689009) + * Fixed typo in sourcecode (Closes: #598021) + * Updated years in debian/copyright + + -- David Paleino Tue, 25 Dec 2012 08:47:20 +0100 + fuseiso (20070708-2) unstable; urgency=low * Maintenance release diff --git a/debian/control b/debian/control index d37c9ef..6b96d30 100644 --- a/debian/control +++ b/debian/control @@ -18,7 +18,7 @@ Architecture: any Depends: ${shlibs:Depends} , ${misc:Depends} - , fuse-utils + , fuse Description: FUSE module to mount ISO filesystem images This package provides a module to mount ISO filesystem images using FUSE. diff --git a/debian/copyright b/debian/copyright index 0184527..016abbb 100644 --- a/debian/copyright +++ b/debian/copyright @@ -1,7 +1,7 @@ Format-Specification: http://dep.debian.net/deps/dep5 Files: debian/* -Copyright: © 2007-2010, David Paleino +Copyright: © 2007-2012, David Paleino License: GPL-2+ Files: * diff --git a/debian/patches/01-fix_typo.patch b/debian/patches/01-fix_typo.patch new file mode 100644 index 000..eb80d15 --- /dev/null +++ b/debian/patches/01-fix_typo.patch @@ -0,0 +1,20 @@ +From: Jakub Wilk +Subject: fix typo in sourcecode +Origin: vendor, http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598021 +Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598021 + +--- + src/fuseiso.c |2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- fuseiso.orig/src/fuseiso.c fuseiso/src/fuseiso.c +@@ -295,7 +295,7 @@ void usage(const char* prog) { + "-f -- run in foreground, do not daemonize\n" + "-d -- run in foreground and print debug information\n" + "-s -- run single-threaded\n" +-"\nPlease consult with FUSE ducumentation for more information\n", ++"\nPlease consult with FUSE documentation for more information\n", + VERSION, + prog); + }; diff --git a/debian/patches/series b/debian/patches/series index ed05433..d5f1cf6 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 00-support_large_iso.patch +01-fix_typo.patch signature.asc Description: PGP signature