Processed: bug 726385 is forwarded to http://release.debian.org/transitions/html/harfbuzz.html

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forwarded 726385 http://release.debian.org/transitions/html/harfbuzz.html
Bug #726385 [release.debian.org] transition: harfbuzz
Set Bug forwarded-to-address to 
'http://release.debian.org/transitions/html/harfbuzz.html'.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
726385: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726385
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138615189623002.transcr...@bugs.debian.org



Processed: tagging 726385

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 726385 + pending
Bug #726385 [release.debian.org] transition: harfbuzz
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
726385: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726385
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138615242126168.transcr...@bugs.debian.org



Bug#717418: marked as done (transition: libudev)

2013-12-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Dec 2013 11:57:05 +0100
with message-id 20131204105705.ge4...@betterave.cristau.org
and subject line Re: Bug#717418: transition: libudev
has caused the Debian Bug report #717418,
regarding transition: libudev
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
717418: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717418
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

In version 183, the following symbols were dropped from libudev
  udev_monitor_from_socket()
  udev_queue_get_failed_list_entry()
  udev_get_{dev,sys,run}_path()
In addition, upstream introduced symbol versioning.

The soversion was bumped from 0 to 1.

We currently have libudev1 in experimental. I've filed bugs against
affected packages quite a while ago, and they've been updated to no
longer use that API. So we should only need a round of binNMUs.

Please let us know, when we can move the package from experimental to
unstable to start this transition.

Michael,
on behalf of the pkg-systemd-maintainers team.

Ben file:

title = libudev;
is_affected = .depends ~ libudev0 | .depends ~ libudev1;
is_good = .depends ~ libudev1;
is_bad = .depends ~ libudev0;


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.10-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
On Sat, Jul 20, 2013 at 19:09:24 +0200, Michael Biebl wrote:

 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: transition
 
 In version 183, the following symbols were dropped from libudev
   udev_monitor_from_socket()
   udev_queue_get_failed_list_entry()
   udev_get_{dev,sys,run}_path()
 In addition, upstream introduced symbol versioning.
 
 The soversion was bumped from 0 to 1.
 
With libvirt finally migrating yesterday, there are no libudev0 rdeps
left in testing.  Waiting on #731210 being processed for it to go away,
but let's close this one now.

Cheers,
Julien


signature.asc
Description: Digital signature
---End Message---


Processed: tagging 714398

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 714398 + pending
Bug #714398 [release.debian.org] transition: glpk
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
714398: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714398
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138615720525343.transcr...@bugs.debian.org



SQLAlchemy updates in stable

2013-12-04 Thread Piotr Ożarowski
Hi guys,

I want to start updating sqlalchemy source package in stable to the
latest point release. Upstream is sane and makes sure 3rd party code
doesn't break by 0.X.Y releases (every bug fix has a test case,
testsuite is huge¹, changelog is very verbose², each 0.X→0.Y update is
described in a migration guide³). Once 0.X+1 is released, 0.X.* versions
get bug fixes mostly, sometimes additional features are also backported
which makes debdiff not small (big enough to not call it release team
friendly).

My question is: is it worth my time or will you reject it basing on
debdiff size?

I can start with preparing 0.7.10 (released upstream in February) upload
to stable

[¹] http://sources.debian.net/src/sqlalchemy/latest/test
[²] http://docs.sqlalchemy.org/en/latest/changelog/changelog_08.html
[³] http://docs.sqlalchemy.org/en/latest/changelog/migration_08.html

PS please CC me on replies
-- 
Piotr Ożarowski Debian GNU/Linux Developer
www.ozarowski.pl  www.griffith.cc   www.debian.org
GPG Fingerprint: 1D2F A898 58DA AF62 1786 2DF7 AEF6 F1A2 A745 7645


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131204122802.gp3...@sts0.p1otr.com



Bug#731343: pu: package gtk+3.0/3.4.2-7

2013-12-04 Thread Josselin Mouette
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu

Hi,

I’d like to upload an update (prepared by Raphaël) for gtk+3.0, which is 
necessary in order to fix librsvg’s CVE-2013-1881.

Thanks for considering.
-- 
Josselin Mouette
Index: debian/changelog
===
--- debian/changelog	(révision 40301)
+++ debian/changelog	(copie de travail)
@@ -1,3 +1,11 @@
+gtk+3.0 (3.4.2-7) stable; urgency=low
+
+  [ Raphaël Geissert ]
+  * Workaround new behaviour of librsvg (which implemented an origin
+policy) by loading the file icon via a data: URI.
+
+ -- Josselin Mouette j...@debian.org  Wed, 04 Dec 2013 14:06:28 +0100
+
 gtk+3.0 (3.4.2-6) unstable; urgency=low
 
   * Team upload.
Index: debian/patches/001_use_data_uris_for_symbolic_icons.patch
===
--- debian/patches/001_use_data_uris_for_symbolic_icons.patch	(révision 0)
+++ debian/patches/001_use_data_uris_for_symbolic_icons.patch	(copie de travail)
@@ -0,0 +1,37 @@
+Index: gtk+3.0-3.4.2/gtk/gtkicontheme.c
+===
+--- gtk+3.0-3.4.2.orig/gtk/gtkicontheme.c	2012-05-02 14:46:50.0 +0200
 gtk+3.0-3.4.2/gtk/gtkicontheme.c	2013-11-27 14:16:27.393901153 +0100
+@@ -3170,6 +3170,8 @@ _gtk_icon_info_load_symbolic_internal (G
+   GdkPixbuf *pixbuf;
+   gchar *data;
+   gchar *success, *warning, *err;
++  gchar *file_data, *escaped_file_data;
++  gsize file_len;
+ 
+   /* css_fg can't possibly have failed, otherwise
+* that would mean we have a broken style */
+@@ -3193,6 +3195,11 @@ _gtk_icon_info_load_symbolic_internal (G
+   err = gdk_color_to_css (error_default_color);
+ }
+ 
++  if (!g_file_get_contents (icon_info-filename, file_data, file_len, NULL))
++return NULL;
++
++  escaped_file_data = g_markup_escape_text (file_data, file_len);
++  g_free (file_data);
+ 
+   data = g_strconcat (?xml version=\1.0\ encoding=\UTF-8\ standalone=\no\?\n
+   svg version=\1.1\\n
+@@ -3214,9 +3221,10 @@ _gtk_icon_info_load_symbolic_internal (G
+ fill: , css_success ? css_success : success, !important;\n
+   }\n
+ /style\n
+-xi:include href=\, icon_info-filename, \/\n
++xi:include href=\data:text/xml,, escaped_file_data, \/\n
+   /svg,
+   NULL);
++  g_free (escaped_file_data);
+   g_free (warning);
+   g_free (err);
+   g_free (success);
Index: debian/patches/series
===
--- debian/patches/series	(révision 40301)
+++ debian/patches/series	(copie de travail)
@@ -1,3 +1,4 @@
+001_use_data_uris_for_symbolic_icons.patch
 015_default-fallback-icon-theme.patch
 016_no_offscreen_widgets_grabbing.patch
 017_no_offscreen_device_grabbing.patch


Processed: libllvm-3.3-ocaml-dev: missing ABI dependency

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 730196 731277 726010 731218
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731344
Warning: Unknown package 'src:libllvm-3.3-ocaml-dev'

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731344: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731344
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.13861629581879.transcr...@bugs.debian.org



Bug#729531: transition: icu

2013-12-04 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 I'd like to upgrade the version of ICU from 4.8 to 52.  They changed
 their version numbering scheme essentially multiplying everything by 10.
 We skipped a few versions (49, 50, 51) because of the freeze before
 wheezy.  This is the first major version to be released since Wheezy.
 (A major ICU version is released every six months.)  ICU 52 should be
 source compatible but not binary compile with ICU 4.8.  Many bugs have
 been fixed since ICU 4.8.  I have basically done a library transition
 approximately every other ICU version, and they have all gone smoothly
 up to this point.  The dev package name is versionless (libicu-dev) so
 this transition should be able to be done with just a forced rebuild of
 ICU's reverse dependencies.

 Please go ahead, and let us know when icu 52 is installed on all archs
 so we can start the rebuilds.

ICU 52 is installed on all architectures now.  Thanks!

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131204082445.0398451667.qww314...@soup.q.qbilt.org



Bug#693216: pu: firebird2.5/2.5.2.26539.ds4-1

2013-12-04 Thread Julien Cristau
On Tue, Dec  3, 2013 at 22:50:18 +0200, Damyan Ivanov wrote:

 -=| Damyan Ivanov, 06.10.2013 23:57:15 +0300 |=-
  -=| Cyril Brulebois, 29.09.2013 22:59:31 +0200 |=-
   looking at it for 7.2 now, sorry it took so long.
 
 Is there a chance to have firebird2.5 updated with 7.3? What can I do 
 about it?  (#693216 has the story so far).
 
Assuming this has been tested in a wheezy environment, please go ahead
and upload.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#731285: pu: package kexec-tools/1:2.0.3-1

2013-12-04 Thread Jonathan Wiltshire

Hi,

On 2013-12-04 00:04, Khalid Aziz wrote:

A debdiff of proposed changes is attached.


Please go ahead.

(For reference, the real bug is #708034.)


--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

directhex i have six years of solaris sysadmin experience, from
8-10. i am well qualified to say it is made from bonghits
layered on top of bonghits


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/3ae78e0b6bc6823be4d83dca0dad2...@hogwarts.powdarrmonkey.net



Bug#699818: pre-approval for pu: eglibc - timer_settime broken on kfreebsd-amd64

2013-12-04 Thread Julien Cristau
On Wed, Oct  2, 2013 at 16:44:41 +0100, Adam D. Barratt wrote:

 On 2013-10-02 16:14, Adam Conrad wrote:
 On Tue, Oct 01, 2013 at 10:23:22PM +0100, Adam D. Barratt wrote:
 
 That looks okay. In terms of the other suggested updates, as a
 non-release architecture for wheezy, hurd-specific patches
 aren't really
 appropriate for a stable update.
 
 Perhaps not appropriate to upload just for Hurd, but hurd-specific
 patches that don't touch other arches also seem harmless.  I'm happy
 to back them out, though, if it's a sticking point.
 
 Well, they don't really meet the definition of minimal changes. :-)
 If someone puts together a debdiff including them, I'm more than
 happy to look at that and we can make a call from there. (Bearing in
 mind that the window for 7.2 closes over the coming weekend.)
 
Any news here?  We're now nearing the end of the window for 7.3.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#704601: marked as done (pu: hdf5/1.8.8-9+deb7u1)

2013-12-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Dec 2013 15:04:13 +0100
with message-id 20131204140413.gh4...@betterave.cristau.org
and subject line Re: Bug#704601: unblock: hdf5/1.8.8-9.1
has caused the Debian Bug report #704601,
regarding pu: hdf5/1.8.8-9+deb7u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704601: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704601
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package hdf5

This update fixes several upgrade issues (see #667599 and duplicates)
involving hdf5. While it is not a perfect solution (there are still some
upgrade paths failing), it is an improvement over what is currently in
wheezy. A better solution would require significant reorganization of
the hdf5 package stack.

Andreas

unblock hdf5/1.8.8-9.1
diffstat for hdf5-1.8.8 hdf5-1.8.8

 changelog  |   21 +
 control|   43 ---
 control.in |   43 ---
 3 files changed, 77 insertions(+), 30 deletions(-)

diff -Nru hdf5-1.8.8/debian/changelog hdf5-1.8.8/debian/changelog
--- hdf5-1.8.8/debian/changelog	2012-03-08 11:09:55.0 +0100
+++ hdf5-1.8.8/debian/changelog	2013-03-18 16:25:07.0 +0100
@@ -1,3 +1,24 @@
+hdf5 (1.8.8-9.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Remove unneded Conflicts/Replaces/Provides to help apt finding a proper
+upgrade path. Suggested by Margarita Manterola.  (Closes: #667599)
+- Drop Conflicts/Provides: libhdf5-@MAJOR_VERSION@.
+- Drop Conflicts/Replaces: libhdf5-1.8.4, libhdf5-*-1.8.4. The library
+  packages from squeeze are co-installable without file conflicts.
+  * libhdf5{,-mpich2,-openmpi}-7: Add Breaks: libnetcdf6 ( 1:4.1.1-7~) to
+ease upgrades from squeeze. Apt (the squeeze version) may assign
+priorities that cause a precedence of libhdf5-7  libnetcdf6  libnetcdfc7
+resulting in netcdf not being upgraded in some upgrade paths.
+  * libhdf5{,-mpich2,-openmpi}-dev: Add unversioned Conflicts: libjpeg62-dev
+to fix the libjpeg-dev transition on some upgrade paths by preventing
+apt from holding back libjpeg62-dev/squeeze (to satisfy Depends:
+libjpeg-dev) instead of installing libjpeg8-dev/wheezy and removing
+libjpeg62-dev. Versioned Breaks/Conflicts did not achieve this, causing
+the hdf5 stack not being upgraded in some cases.
+
+ -- Andreas Beckmann a...@debian.org  Mon, 25 Feb 2013 11:26:57 +0100
+
 hdf5 (1.8.8-9) unstable; urgency=low
 
   * Force the dependency on the serpack for hdf5-tools  hdf5-helpers.
diff -Nru hdf5-1.8.8/debian/control hdf5-1.8.8/debian/control
--- hdf5-1.8.8/debian/control	2012-03-08 11:18:22.0 +0100
+++ hdf5-1.8.8/debian/control	2013-03-18 16:26:18.0 +0100
@@ -17,11 +17,15 @@
 Section: libs
 Architecture: any
 Depends: ${shlibs:Depends}, ${misc:Depends}
-Conflicts: libhdf5-7, libhdf5-1.8,
- libhdf5-1.8.4, libhdf5-serial-1.8.4, libhdf5-1.8.6, libhdf5-serial-1.8.6,
+Conflicts: libhdf5-7,
+ libhdf5-1.8.6, libhdf5-serial-1.8.6,
  libhdf5-1.8.7, libhdf5-serial-1.8.7
-Provides: libhdf5-7, libhdf5-1.8
-Replaces: libhdf5-1.8.4, libhdf5-serial-1.8.4, libhdf5-1.8.6, libhdf5-serial-1.8.6, libhdf5-1.8.7, libhdf5-serial-1.8.7
+Provides: libhdf5-7,
+Replaces:
+ libhdf5-1.8.6, libhdf5-serial-1.8.6,
+ libhdf5-1.8.7, libhdf5-serial-1.8.7
+Breaks:
+ libnetcdf6 ( 1:4.1.1-7~),
 Description: Hierarchical Data Format 5 (HDF5) - runtime files - serial version
  HDF5 is a file format and library for storing scientific data. 
  HDF5 was designed and implemented to address the deficiencies of
@@ -52,7 +56,8 @@
 Suggests: libhdf5-doc
 Provides: libhdf5-serial-dev
 Replaces: libhdf5-serial-dev ( 1.8.8-2)
-Conflicts: libhdf5-serial-dev ( 1.8.8-2)
+Conflicts: libhdf5-serial-dev ( 1.8.8-2),
+ libjpeg62-dev,
 Description: Hierarchical Data Format 5 (HDF5) - development files - serial version
  HDF5 is a file format and library for storing scientific data. 
  HDF5 was designed and implemented to address the deficiencies of
@@ -78,12 +83,15 @@
 Priority: extra
 Architecture: alpha armel armhf amd64 i386 ia64 powerpc sparc kfreebsd-i386 kfreebsd-amd64 hurd-i386
 Depends: ${shlibs:Depends}, ${misc:Depends}
-Conflicts: libhdf5-7, libhdf5-1.8,
- libhdf5-1.8.4, libhdf5-openmpi-1.8.4, libhdf5-1.8.6, libhdf5-openmpi-1.8.6,
+Conflicts: libhdf5-7,
+ libhdf5-1.8.6, libhdf5-openmpi-1.8.6,
  libhdf5-1.8.7, libhdf5-openmpi-1.8.7
-Provides: libhdf5-7, libhdf5-1.8

Bug#706281: marked as done (pu: libusb/0.1.12-20+nmu2)

2013-12-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Dec 2013 15:08:24 +0100
with message-id 20131204140824.gi4...@betterave.cristau.org
and subject line Re: Bug#706281: t-p-u: libusb/0.1.12-20+nmu2
has caused the Debian Bug report #706281,
regarding pu: libusb/0.1.12-20+nmu2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
706281: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706281
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I identified three packages that don't ship a SONAME symlink and cause
spurious creation and removal of this link by ldconfig. Spurious since
the packages themselves don't call ldconfig, so another installation
will trigger the ldconfig run - 2 seconds or 2 months later.

As this makes the (dis-)appearance nondeterministic, this could produce
heisenbugs that will be hard to debug. So better ship the link in the
package and let dpkg instead of ldconfig manage creation/removal.

libusb-dev is one of them (#706278), due to the
/usr/lib/triplet/libusb.so - /lib/triplet/libusb-0.1.so.4.4.4 link.
The SONAME is libusb-0.1.so.4 and ldconfig will create
/usr/lib/triplet/libusb-0.1.so.4 - libusb.so

The attached patch adds this link to the libusb-dev package:
/usr/lib/triplet/libusb-0.1.so.4  /lib/triplet/libusb-0.1.so.4

As libusb builds an udeb, too, this will probably have to wait for r1.

libusb currently has a non-standard NMU version, we could fix this into
0.1.12-20.1 (or 0.1.12-20.2), but using the more canonical +deb7u1
suffix will be difficult. So I just incremented the bad version.


Andreas

unblock libusb/0.1.12-20+nmu2
diff -Nru libusb-0.1.12/debian/changelog libusb-0.1.12/debian/changelog
--- libusb-0.1.12/debian/changelog	2012-09-22 16:02:30.0 +0200
+++ libusb-0.1.12/debian/changelog	2013-04-27 18:22:54.0 +0200
@@ -1,3 +1,12 @@
+libusb (2:0.1.12-20+nmu2) testing; urgency=low
+
+  * Non-maintainer upload.
+  * libusb-dev: Ship /usr/lib/triplet/libusb-0.1.so.4 -
+/lib/triplet/libusb-0.1.so.4 symlink to prevent spurious creation of
+that SONAME link by ldconfig.  (Closes: #706278)
+
+ -- Andreas Beckmann a...@debian.org  Sat, 27 Apr 2013 18:16:00 +0200
+
 libusb (2:0.1.12-20+nmu1) testing-proposed-updates; urgency=low
 
   * Non-maintainer upload.
diff -Nru libusb-0.1.12/debian/libusb-dev.install libusb-0.1.12/debian/libusb-dev.install
--- libusb-0.1.12/debian/libusb-dev.install	2011-07-16 12:59:12.0 +0200
+++ libusb-0.1.12/debian/libusb-dev.install	2013-04-27 18:15:47.0 +0200
@@ -1,5 +1,6 @@
 usr/bin/libusb-config
 usr/include/usb.h
 usr/lib/*/libusb.a
+usr/lib/*/libusb-0.1.so.4
 usr/lib/*/libusb.so
 usr/lib/*/pkgconfig/libusb.pc
diff -Nru libusb-0.1.12/debian/rules libusb-0.1.12/debian/rules
--- libusb-0.1.12/debian/rules	2011-12-31 01:56:04.0 +0100
+++ libusb-0.1.12/debian/rules	2013-04-27 18:34:34.0 +0200
@@ -147,6 +147,8 @@
 	   $(CURDIR)/debian/tmp/lib/$(DEB_HOST_MULTIARCH)
 	ln -sf /lib/$(DEB_HOST_MULTIARCH)/libusb-0.1.so.4.4.4 \
 	   $(CURDIR)/debian/tmp/usr/lib/$(DEB_HOST_MULTIARCH)/libusb.so
+	ln -sf /lib/$(DEB_HOST_MULTIARCH)/libusb-0.1.so.4 \
+	   $(CURDIR)/debian/tmp/usr/lib/$(DEB_HOST_MULTIARCH)/libusb-0.1.so.4
 
 	# Move all files in their corresponding package
 	dh_install -s -Nlibusb-0.1-udeb --list-missing --sourcedir=debian/tmp
---End Message---
---BeginMessage---
On Mon, Sep 30, 2013 at 00:24:13 +0200, Cyril Brulebois wrote:

 Control: tag -1 moreinfo
 
 Andreas Beckmann a...@debian.org (2013-06-03):
  On 2013-05-22 01:57, Cyril Brulebois wrote:
   I'm not sure about the practical impact, besides “it's not nice to
   have undeterministic behaviours”. AFAICT, the extra .so doesn't hurt
   when it's here (you wouldn't suggest shipping it in the package
   otherwise, right?), and nobody has ever complained about its being
   missing AFAICT from your bug report.
  
  the src:json-c packages in unstable have a similar problem and people
  are getting spurious libjson0: error while loading shared libraries:
  libjson.so.0 errors (#709512), maybe that could be attributed to this
  ldconfig issue: leaving around a dangling SONAME symlink for an
  indefinite time
 
 That's not really an answer to the question about practical impacts.
 
   So I guess I'll prefer sticking to the current status quo…
 
 Accordingly, that's still true.
 
NAKing this one until/unless it stops being a merely theoretical issue.

Cheers,
Julien


signature.asc
Description: Digital signature
---End Message---


Bug#706286: marked as done (pu: libpng/1.2.49-1+deb7u1)

2013-12-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Dec 2013 15:09:13 +0100
with message-id 20131204140913.gj4...@betterave.cristau.org
and subject line Re: Bug#706286: pre-approve: libpng/1.2.49-4
has caused the Debian Bug report #706286,
regarding pu: libpng/1.2.49-1+deb7u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
706286: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706286
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I identified three packages that don't ship a SONAME symlink and cause
spurious creation and removal of this link by ldconfig. Spurious since
the packages themselves don't call ldconfig, so another installation
will trigger the ldconfig run - 2 seconds or 2 months later.

As this makes the (dis-)appearance nondeterministic, this could produce
heisenbugs that will be hard to debug. So better ship the link in the
package and let dpkg instead of ldconfig manage creation/removal.

libpng12-dev is one of them (#706181), due to the
/usr/lib/triplet/libpng12.so - /lib/triplet/libpng12.so.0
link. ldconfig would create 
/usr/lib/triplet/libpng12.so.0 - libpng.so

The attached patch changes the symlinks in the -dev package to
/usr/lib/triplet/libpng12.so - libpng12.so.0 - /lib/triplet/libpng12.so.0

Anibal has already signaled to prepare an updated package, so I filed an
unblock versioned as a new maintainer upload.

This fix could go via unstable, the only difference between sid and
wheezy are some changelog entries.

Andreas

unblock libpng/1.2.49-4
diff -Nru libpng-1.2.49/debian/changelog libpng-1.2.49/debian/changelog
--- libpng-1.2.49/debian/changelog	2012-04-09 04:14:09.0 +0200
+++ libpng-1.2.49/debian/changelog	2013-04-27 20:04:03.0 +0200
@@ -1,3 +1,27 @@
+libpng (1.2.49-3.1) UNRELEASED; urgency=low
+
+  * Non-maintainer upload.
+  * libpng12-dev: Ship /usr/lib/${DEB_HOST_MULTIARCH}/libpng12.so.0 -
+/lib/${DEB_HOST_MULTIARCH}/libpng12.so.0 symlink, too, to prevent ldconfig
+from playing ping-pong with the SONAME link.  (Closes: #706181)
+
+ -- Andreas Beckmann a...@debian.org  Fri, 26 Apr 2013 00:33:36 +0200
+
+libpng (1.2.49-3) unstable; urgency=low
+
+  * Remove patches/02-681408-CVE-2012-3386-Makefile.in.patch.
+This patch is unnecessary. This issue is already fixed in automake.
+
+ -- Nobuhiro Iwamatsu iwama...@debian.org  Tue, 28 Aug 2012 16:22:51 +0900
+
+libpng (1.2.49-2) unstable; urgency=high
+
+  * Change a+w to u+w in Makefile.in to fix CVE-2012-3386
+Add 02-681408-CVE-2012-3386-Makefile.in.patch
+Closes: #681408
+
+ -- Anibal Monsalve Salazar ani...@debian.org  Fri, 13 Jul 2012 12:31:39 +1000
+
 libpng (1.2.49-1) unstable; urgency=high
 
   * New upstream version 1.2.49
diff -Nru libpng-1.2.49/debian/libpng12-dev.links.in libpng-1.2.49/debian/libpng12-dev.links.in
--- libpng-1.2.49/debian/libpng12-dev.links.in	2011-07-18 13:52:43.0 +0200
+++ libpng-1.2.49/debian/libpng12-dev.links.in	2013-04-26 00:32:55.0 +0200
@@ -1,3 +1,4 @@
 /usr/share/man/man1/libpng12-config.1.gz /usr/share/man/man1/libpng-config.1.gz
 /usr/include/libpng12 /usr/include/libpng
-/lib/${DEB_HOST_MULTIARCH}/libpng12.so.0 /usr/lib/${DEB_HOST_MULTIARCH}/libpng12.so
+/lib/${DEB_HOST_MULTIARCH}/libpng12.so.0 /usr/lib/${DEB_HOST_MULTIARCH}/libpng12.so.0
+/usr/lib/${DEB_HOST_MULTIARCH}/libpng12.so.0 /usr/lib/${DEB_HOST_MULTIARCH}/libpng12.so
[The following lists of changes regard files as different if they have
different names, permissions or owners.]

Files in second .deb but not in first
-
lrwxrwxrwx  root/root   /usr/lib/x86_64-linux-gnu/libpng12.so - libpng12.so.0
lrwxrwxrwx  root/root   /usr/lib/x86_64-linux-gnu/libpng12.so.0 - 
/lib/x86_64-linux-gnu/libpng12.so.0

Files in first .deb but not in second
-
lrwxrwxrwx  root/root   /usr/lib/x86_64-linux-gnu/libpng12.so - 
/lib/x86_64-linux-gnu/libpng12.so.0

Control files: lines which differ (wdiff format)

Depends: libpng12-0 (= [-1.2.49-1),-] {+1.2.49-3.1),+} zlib1g-dev
Installed-Size: [-588-] {+589+}
Version: [-1.2.49-1-] {+1.2.49-3.1+}
---End Message---
---BeginMessage---
On Wed, May 22, 2013 at 01:59:21 +0200, Cyril Brulebois wrote:

 Control: tag -1 moreinfo
 
 Andreas Beckmann a...@debian.org (27/04/2013):
  I identified three packages that don't ship a SONAME symlink and cause
  spurious creation and removal of this link by ldconfig. Spurious since
  the packages themselves 

Bug#731351: pu: package librsvg/2.36.1-2

2013-12-04 Thread Josselin Mouette
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu

Hi,

Raphaël has prepared a stable update for librsvg in order to fix 
CVE-2013-1881.

Thanks for considering.
-- 
 .''`.Josselin Mouette
: :' :
`. `'
  `-
Index: debian/changelog
===
--- debian/changelog	(révision 40303)
+++ debian/changelog	(copie de travail)
@@ -1,3 +1,11 @@
+librsvg (2.36.1-2) stable; urgency=low
+
+  [ Raphaël Geissert ]
+  * Fix CVE-2013-1881: disable loading of external entities.
+Closes: #724741.
+
+ -- Josselin Mouette j...@debian.org  Wed, 04 Dec 2013 15:06:01 +0100
+
 librsvg (2.36.1-1) unstable; urgency=low
 
   * New upstream release.
Index: debian/patches/01_CVE-2013-1881_policy.patch
===
--- debian/patches/01_CVE-2013-1881_policy.patch	(révision 0)
+++ debian/patches/01_CVE-2013-1881_policy.patch	(copie de travail)
@@ -0,0 +1,165 @@
+From f01aded72c38f0e18bc7ff67dee800e380251c8e Mon Sep 17 00:00:00 2001
+From: Christian Persch c...@gnome.org
+Date: Mon, 11 Feb 2013 21:36:58 +
+Subject: io: Implement strict load policy
+
+Allow any file to load from data:, and any resource to load from other
+resources. Only allow file: to load other file: URIs from below the path
+of the base file. Any other loads are denied.
+
+Bug #691708.
+---
+Index: librsvg-2.36.1/rsvg-base.c
+===
+--- librsvg-2.36.1.orig/rsvg-base.c	2012-03-26 14:25:08.0 +0200
 librsvg-2.36.1/rsvg-base.c	2013-11-26 16:07:42.481471848 +0100
+@@ -25,6 +25,7 @@
+ */
+ 
+ #include config.h
++#define _GNU_SOURCE 1
+ 
+ #include rsvg.h
+ #include rsvg-private.h
+@@ -1001,6 +1002,7 @@ void
+ rsvg_handle_set_base_uri (RsvgHandle * handle, const char *base_uri)
+ {
+ gchar *uri;
++GFile *file;
+ 
+ g_return_if_fail (handle != NULL);
+ 
+@@ -1012,11 +1014,10 @@ rsvg_handle_set_base_uri (RsvgHandle * h
+ else
+ uri = rsvg_get_base_uri_from_filename (base_uri);
+ 
+-if (uri) {
+-if (handle-priv-base_uri)
+-g_free (handle-priv-base_uri);
+-handle-priv-base_uri = uri;
+-}
++file = g_file_new_for_uri (uri ? uri : data:);
++rsvg_handle_set_base_gfile (handle, file);
++g_object_unref (file);
++g_free (uri);
+ }
+ 
+ /**
+@@ -2146,12 +2147,84 @@ _rsvg_handle_allow_load (RsvgHandle *han
+  const char *uri,
+  GError **error)
+ {
+-RsvgLoadPolicy policy = handle-priv-load_policy;
++RsvgHandlePrivate *priv = handle-priv;
++GFile *base;
++char *path, *dir;
++char *scheme = NULL, *cpath = NULL, *cdir = NULL;
+ 
+-if (policy == RSVG_LOAD_POLICY_ALL_PERMISSIVE)
+-return TRUE;
++g_assert (handle-priv-load_policy == RSVG_LOAD_POLICY_STRICT);
++
++scheme = g_uri_parse_scheme (uri);
++
++/* Not a valid URI */
++if (scheme == NULL)
++goto deny;
++
++/* Allow loads of data: from any location */
++if (g_str_equal (scheme, data))
++goto allow;
++
++/* No base to compare to? */
++if (priv-base_gfile == NULL)
++goto deny;
++
++/* Deny loads from differing URI schemes */
++if (!g_file_has_uri_scheme (priv-base_gfile, scheme))
++goto deny;
++
++/* resource: is allowed to load anything from other resources */
++if (g_str_equal (scheme, resource))
++goto allow;
+ 
++/* Non-file: isn't allowed to load anything */
++if (!g_str_equal (scheme, file))
++goto deny;
++
++base = g_file_get_parent (priv-base_gfile);
++if (base == NULL)
++goto deny;
++
++dir = g_file_get_path (base);
++g_object_unref (base);
++
++/* FIXME portability */
++cdir = canonicalize_file_name (dir);
++g_free (dir);
++if (cdir == NULL)
++goto deny;
++
++path = g_filename_from_uri (uri, NULL, NULL);
++if (path == NULL)
++goto deny;
++
++/* FIXME portability */
++cpath = canonicalize_file_name (path);
++g_free (path);
++
++if (cpath == NULL)
++goto deny;
++
++/* Now check that @cpath is below @cdir */
++if (!g_str_has_prefix (cpath, cdir) ||
++cpath[strlen (cdir)] != G_DIR_SEPARATOR)
++goto deny;
++
++/* Allow load! */
++
++ allow:
++g_free (scheme);
++free (cpath);
++free (cdir);
+ return TRUE;
++
++ deny:
++g_free (scheme);
++free (cpath);
++free (cdir);
++
++g_set_error (error, G_IO_ERROR, G_IO_ERROR_PERMISSION_DENIED,
++ File may not link to URI \%s\, uri);
++return FALSE;
+ }
+ 
+ guint8* 
+Index: librsvg-2.36.1/rsvg-io.c
+===
+--- librsvg-2.36.1.orig/rsvg-io.c	2012-03-26 14:25:08.0 +0200
 librsvg-2.36.1/rsvg-io.c	2013-11-26 16:07:25.021364586 +0100
+@@ -79,7 +79,7 @@ 

Bug#729747: pu: package apt-listbugs/0.1.8

2013-12-04 Thread Jonathan Wiltshire

Control: tag -1 confirmed

Hi,

On 2013-11-16 16:43, Francesco Poli (wintermute) wrote:

Hence, I prepared apt-listbugs/0.1.8+deb7u1 for wheezy:
please find the source diff attached (the only other changes
are the result of running  make update-po  in order to update
the .pot and .po l10n files).

If you agree, I can ask my usual sponsor to upload the prepared
package to stable, so that it will end up in the next point release.


Yes, please. Be aware that the window closes on Saturday.


P.S.: after this, I may perhaps find the time to do the same for
oldstable (squeeze), unless you say I shouldn't bother...


Please do.

--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

directhex i have six years of solaris sysadmin experience, from
8-10. i am well qualified to say it is made from bonghits
layered on top of bonghits


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/78398791c0bafb91e0a90b9d20182...@hogwarts.powdarrmonkey.net



Processed: Re: Bug#729747: pu: package apt-listbugs/0.1.8

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 confirmed
Bug #729747 [release.debian.org] pu: package apt-listbugs/0.1.8+deb7u1
Added tag(s) confirmed.

-- 
729747: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729747
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b729747.138616647924490.transcr...@bugs.debian.org



Processed: Re: Bug#706386: unblock: lua-sql/2.3.0-1+build1

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 confirmed
Bug #706386 [release.debian.org] pu: lua-sql/2.3.0-1+build0
Added tag(s) confirmed.

-- 
706386: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706386
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b706386.138616697727651.transcr...@bugs.debian.org



Bug#714140: marked as done (pu: package tgt/1.0.17-1)

2013-12-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Dec 2013 15:25:00 +0100
with message-id 20131204142500.gl4...@betterave.cristau.org
and subject line Re: Bug#714140: pu: package tgt/1.0.17-1
has caused the Debian Bug report #714140,
regarding pu: package tgt/1.0.17-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
714140: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714140
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu

Dear release team,

Wheezy has been released with a version of tgt which doesn't have an init
script. I fixed the version in Sid on the 2013-05-21 (adding the missing
init.d script).

Now, I would like to upload a fix for Wheezy. The debdiff between
1:1.0.17-1 and 1:1.0.17-1.1 is attached.

Would you allow me to upload the fixed tgt package into s-p-u?

Cheers,

Thomas Goirand (zigo)
diff -Nru tgt-1.0.17/debian/changelog tgt-1.0.17/debian/changelog
--- tgt-1.0.17/debian/changelog	2011-06-21 17:48:54.0 +0800
+++ tgt-1.0.17/debian/changelog	2013-05-14 22:35:02.0 +0800
@@ -1,3 +1,13 @@
+tgt (1:1.0.17-1.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Adds an init script:
+- Depends: lsb-base
+- Adds dh_installinit call in debian/rules
+- adds debian/init
+
+ -- Thomas Goirand z...@debian.org  Thu, 11 Apr 2013 23:25:08 +0800
+
 tgt (1:1.0.17-1) unstable; urgency=low
 
   * New upstream release.
diff -Nru tgt-1.0.17/debian/control tgt-1.0.17/debian/control
--- tgt-1.0.17/debian/control	2011-06-21 21:55:45.0 +0800
+++ tgt-1.0.17/debian/control	2013-05-14 22:34:21.0 +0800
@@ -9,7 +9,7 @@
 
 Package: tgt
 Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, libconfig-general-perl, sg3-utils
+Depends: ${shlibs:Depends}, ${misc:Depends}, lsb-base, libconfig-general-perl, sg3-utils
 Description: Linux SCSI target user-space tools
  The Linux target framework (tgt) allows a Linux system to provide SCSI
  devices (targets) over networked SCSI transports.
diff -Nru tgt-1.0.17/debian/init tgt-1.0.17/debian/init
--- tgt-1.0.17/debian/init	1970-01-01 08:00:00.0 +0800
+++ tgt-1.0.17/debian/init	2013-05-14 22:51:08.0 +0800
@@ -0,0 +1,178 @@
+#!/bin/bash
+### BEGIN INIT INFO
+# Provides:  tgtd
+# Required-Start:$remote_fs $syslog
+# Required-Stop: $remote_fs $syslog
+# Should-Start:  zfs
+# Should-Stop:   zfs
+# Default-Start: 2 3 4 5
+# Default-Stop:  0 1 6
+# Short-Description: iscsi target daemon
+# Description:   iscsi target daemon
+### END INIT INFO
+
+DESC=target framework daemon
+NAME=tgtd
+DAEMON=/usr/sbin/${NAME}
+
+TGTD_CONFIG=/etc/tgt/targets.conf
+
+TASK=$1
+
+. /lib/lsb/init-functions
+
+[ -x $DAEMON ] || exit 0
+
+start()
+{
+	log_daemon_msg Starting $DESC $NAME
+	# Start tgtd first.
+	tgtd /dev/null
+	RETVAL=$?
+	if [ $RETVAL -ne 0 ] ; then
+		log_end_msg 1
+		exit 1
+	else
+		log_end_msg 0
+	fi
+	# Put tgtd into offline state until all the targets are configured.
+	# We don't want initiators to (re)connect and fail the connection
+	# if it's not ready.
+	tgtadm --op update --mode sys --name State -v offline
+	# Configure the targets.
+	tgt-admin -e -c $TGTD_CONFIG
+	# Put tgtd into ready state.
+	tgtadm --op update --mode sys --name State -v ready
+}
+
+stop()
+{
+	if [ $RUNLEVEL == 0 -o $RUNLEVEL == 6 ] ; then
+	forcedstop
+	fi
+	log_daemon_msg Stopping $DESC $NAME
+	# Remove all targets. It only removes targets which are not in use.
+	tgt-admin --update ALL -c /dev/null /dev/null
+	# tgtd will exit if all targets were removed
+	tgtadm --op delete --mode system /dev/null
+	RETVAL=$?
+	if [ $RETVAL -eq 107 ] ; then
+		if [ $TASK != restart ] ; then
+			log_end_msg 1
+			exit 1
+		else
+			log_end_msg 0
+		fi
+	elif [ $RETVAL -ne 0 ] ; then
+		log_end_msg 1
+		echo Some initiators are still connected - could not stop tgtd
+		exit 2
+	else
+		log_end_msg 0
+	fi
+	echo -n
+}
+
+forcedstop()
+{
+	# NOTE: Forced shutdown of the iscsi target may cause data corruption
+	# for initiators that are connected.
+	echo Force-stopping target framework daemon
+	# Offline everything first. May be needed if we're rebooting, but
+	# expect the initiators to reconnect cleanly when we boot again
+	# (i.e. we don't want them to reconnect to a tgtd which is still
+	# working, but the target is gone).
+	tgtadm --op update --mode sys --name State -v offline /dev/null
+	RETVAL=$?
+	if [ $RETVAL -eq 107 ] ; then
+	echo tgtd is not running
+	[ $TASK != restart ]  exit 1
+	else
+	

Bug#706386: unblock: lua-sql/2.3.0-1+build1

2013-12-04 Thread Julien Cristau
Control: tag -1 confirmed

On Mon, Apr 29, 2013 at 15:17:15 +0200, Andreas Beckmann wrote:

 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock
 
 Please unblock package lua-sql
 
 No-change rebuild to clear binNMU state and restore multiarch
 co-installability.
 
 Uploaded to DELAYED/1.
 
 No udebs involved, binary debdiff shows no artefacts.
 
Please go ahead.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#731357: opu: package librsvg/2.26.3-2

2013-12-04 Thread Josselin Mouette
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: opu

Hi,

Raphaël has prepared an oldstable update for librsvg in order to fix 
CVE-2013-1881.

Thanks for considering.
-- 
 .''`.Josselin Mouette
: :' :
`. `'
  `-
Index: debian/changelog
===
--- debian/changelog	(révision 40310)
+++ debian/changelog	(copie de travail)
@@ -1,3 +1,11 @@
+librsvg (2.26.3-2) oldstable; urgency=low
+
+  [ Raphaël Geissert ]
+  * Fix CVE-2013-1881: disable loading of external entities.
+Closes: #724741.
+
+ -- Josselin Mouette j...@debian.org  Wed, 04 Dec 2013 15:35:15 +0100
+
 librsvg (2.26.3-1) unstable; urgency=low
 
   * New upstream bugfix release.
Index: debian/patches/CVE-2013-1881.policy.patch
===
--- debian/patches/CVE-2013-1881.policy.patch	(révision 0)
+++ debian/patches/CVE-2013-1881.policy.patch	(copie de travail)
@@ -0,0 +1,90 @@
+Index: librsvg-2.26.3/rsvg-image.c
+===
+--- librsvg-2.26.3.orig/rsvg-image.c	2013-11-28 12:01:22.865236793 +0100
 librsvg-2.26.3/rsvg-image.c	2013-11-28 12:17:25.242370794 +0100
+@@ -356,6 +356,51 @@ rsvg_acquire_vfs_resource (const char *f
+ }
+ #endif
+ 
++/* Partial origin-based policy, based on the one implemented in f01aded72c38f0e1  */
++gboolean
++_rsvg_acquire_xlink_allow_load (const char *href, const char *base_uri, GError ** err)
++{
++char *base_scheme = NULL, *href_scheme = NULL;
++
++if (base_uri)
++base_scheme = g_uri_parse_scheme (base_uri);
++if (href)
++href_scheme = g_uri_parse_scheme (href);
++
++/* Not a valid URI */
++if (href_scheme == NULL)
++goto deny;
++
++/* Allow loads of data: from any location */
++if (g_str_equal (href_scheme, data))
++return TRUE;
++
++/* no valid base URI */
++if (base_scheme == NULL)
++goto deny;
++
++/* Deny loads from differing URI schemes */
++if (href_scheme == NULL || !g_str_equal (href_scheme, base_scheme))
++goto deny;
++
++/* resource: is allowed to load anything from other resources */
++if (g_str_equal (href_scheme, resource))
++return TRUE;
++
++/* Non-file: isn't allowed to load anything */
++if (!g_str_equal (href_scheme, file))
++goto deny;
++
++/* no local-file policy is applied here */
++
++return TRUE;
++
++deny:
++g_set_error (err, G_IO_ERROR, G_IO_ERROR_PERMISSION_DENIED,
++ File may not link to URI \%s\, href);
++return FALSE;
++}
++
+ GByteArray *
+ _rsvg_acquire_xlink_href_resource (const char *href, const char *base_uri, GError ** err)
+ {
+@@ -367,6 +412,9 @@ _rsvg_acquire_xlink_href_resource (const
+ if (!strncmp (href, data:, 5))
+ arr = rsvg_acquire_base64_resource (href, NULL);
+ 
++if (!_rsvg_acquire_xlink_allow_load(href, base_uri, err))
++return NULL;
++
+ if (!arr)
+ arr = rsvg_acquire_file_resource (href, base_uri, NULL);
+ 
+Index: librsvg-2.26.3/rsvg-base.c
+===
+--- librsvg-2.26.3.orig/rsvg-base.c	2013-11-28 12:01:22.865236793 +0100
 librsvg-2.26.3/rsvg-base.c	2013-11-28 12:13:54.913248784 +0100
+@@ -1049,12 +1049,13 @@ rsvg_handle_set_base_uri (RsvgHandle * h
+ else
+ uri = rsvg_get_base_uri_from_filename (base_uri);
+ 
+-if (uri) {
+-if (handle-priv-base_uri)
+-g_free (handle-priv-base_uri);
+-handle-priv-base_uri = uri;
+-rsvg_defs_set_base_uri (handle-priv-defs, handle-priv-base_uri);
+-}
++if (!uri)
++uri = g_strdup(data:);
++
++if (handle-priv-base_uri)
++g_free (handle-priv-base_uri);
++handle-priv-base_uri = uri;
++rsvg_defs_set_base_uri (handle-priv-defs, handle-priv-base_uri);
+ }
+ 
+ /**
Index: debian/patches/CVE-2013-1881.xmlentities.patch
===
--- debian/patches/CVE-2013-1881.xmlentities.patch	(révision 0)
+++ debian/patches/CVE-2013-1881.xmlentities.patch	(copie de travail)
@@ -0,0 +1,20 @@
+Index: librsvg-2.26.3/rsvg-base.c
+===
+--- librsvg-2.26.3.orig/rsvg-base.c	2010-05-01 01:10:51.0 +0200
 librsvg-2.26.3/rsvg-base.c	2013-11-26 16:24:02.903472891 +0100
+@@ -602,6 +602,7 @@ rsvg_start_xinclude (RsvgHandle * ctx, R
+ int result;
+ 
+ xml_parser = xmlCreatePushParserCtxt (rsvgSAXHandlerStruct, ctx, NULL, 0, NULL);
++xml_parser-options |= XML_PARSE_NONET;
+ result = xmlParseChunk (xml_parser, (char *) data-data, data-len, 0);
+ result = xmlParseChunk (xml_parser, , 0, TRUE);
+ 
+@@ -1118,6 +1119,7 @@ rsvg_handle_write_impl (RsvgHandle * han
+ if (handle-priv-ctxt == NULL) {

NEW changes in stable-new

2013-12-04 Thread Debian FTP Masters
Processing changes file: openjpeg_1.3+dfsg-4.7_i386.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_amd64.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_armel.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_armhf.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_ia64.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_kfreebsd-amd64.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_kfreebsd-i386.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_mips.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_mipsel.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_powerpc.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_s390.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_s390x.changes
  ACCEPT
Processing changes file: openjpeg_1.3+dfsg-4.7_sparc.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1voecq-00088v...@franck.debian.org



Bug#731261: transition: Qt5 switching qreal == double for all platforms

2013-12-04 Thread Lisandro Damián Nicanor Pérez Meyer
On Tue, Dec 3, 2013 at 3:09 PM, Lisandro Damián Nicanor Pérez Meyer
lisan...@debian.org wrote:
[snip]
 I've called other distro's maintainers in Qt's devel ML [QTMSG] with little
 feedback and over IRC to Fedora and OpenSuse people. Over Fedora lands, one
 Qt maintainer told me they where going to push the ABI change without SONAME
 bump while an ARM maintainer cried for a SONAME bump. I had no reply from
 OpenSuse.

Just for the record, the Fedora guys have just told me that they went
away swiching qreal to double
in Qt5 without SONAME bump because they also had few packages builded
against it.

-- 
Lisandro Damián Nicanor Pérez Meyer
http://perezmeyer.com.ar/
http://perezmeyer.blogspot.com/


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CA+QPbz2A8_7tAi2fC9X=pgtt_e_-e6rucxtagodoavb0bt8...@mail.gmail.com



Bug#731261: transition: Qt5 switching qreal == double for all platforms

2013-12-04 Thread Julien Cristau
On Tue, Dec  3, 2013 at 15:09:18 -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:

 So I would like what the RT and arm* porters thinks.
 
This is just my opinion, but if you decide to break ABI, I think you
should bump SONAME, and I think you must change package names.

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: Re: Bug#730119: pu: package gnome-settings-daemon/3.4.2+git20121218.7c1322-3+deb7u3

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #730119 [release.debian.org] pu: package 
gnome-settings-daemon/3.4.2+git20121218.7c1322-3+deb7u3
Added tag(s) confirmed.

-- 
730119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730119
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b730119.138618618421014.transcr...@bugs.debian.org



Bug#730119: pu: package gnome-settings-daemon/3.4.2+git20121218.7c1322-3+deb7u3

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Thu, 2013-11-21 at 17:19 +0100, Josselin Mouette wrote:
 I’ve prepared another update for gnome-settings-daemon. It is just to 
 remove an obsolete patch that makes things very annoying for some 
 touchpad users.
 
 The change should be harmless and was already done in jessie.

Please go ahead; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386186173.18166.13.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#731343: pu: package gtk+3.0/3.4.2-7

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + wheezy moreinfo
Bug #731343 [release.debian.org] pu: package gtk+3.0/3.4.2-7
Added tag(s) wheezy and moreinfo.

-- 
731343: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731343
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b731343.138618663523567.transcr...@bugs.debian.org



Bug#731343: pu: package gtk+3.0/3.4.2-7

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + wheezy moreinfo

On Wed, 2013-12-04 at 14:13 +0100, Josselin Mouette wrote:
 I’d like to upload an update (prepared by Raphaël) for gtk+3.0, which is 
 necessary in order to fix librsvg’s CVE-2013-1881.

Does this work correctly in conjunction with a librsvg which does not
include the CVE fix?

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386186627.18166.17.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#731351: pu: package librsvg/2.36.1-2

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + wheezy confirmed
Bug #731351 [release.debian.org] pu: package librsvg/2.36.1-2
Added tag(s) wheezy and confirmed.

-- 
731351: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731351
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b731351.138618658623225.transcr...@bugs.debian.org



Bug#731357: opu: package librsvg/2.26.3-2

2013-12-04 Thread Adam D. Barratt
user release.debian@packages.debian.org
usertags 731357 = pu
tags 731357 + squeeze confirmed
retitle 731357 pu: package librsvg/2.26.3-2
thanks

On Wed, 2013-12-04 at 15:45 +0100, Josselin Mouette wrote:
 Raphaël has prepared an oldstable update for librsvg in order to fix 
 CVE-2013-1881.

Please go ahead; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386186551.18166.15.ca...@jacala.jungle.funky-badger.org



Bug#731351: pu: package librsvg/2.36.1-2

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + wheezy confirmed

On Wed, 2013-12-04 at 15:12 +0100, Josselin Mouette wrote:
 Raphaël has prepared a stable update for librsvg in order to fix 
 CVE-2013-1881.

Please go ahead; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386186578.18166.16.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#731357: opu: package librsvg/2.26.3-2

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 user release.debian@packages.debian.org
Setting user to release.debian@packages.debian.org (was 
a...@adam-barratt.org.uk).
 usertags 731357 = pu
Usertags were: opu.
Usertags are now: pu.
 tags 731357 + squeeze confirmed
Bug #731357 [release.debian.org] opu: package librsvg/2.26.3-2
Added tag(s) squeeze and confirmed.
 retitle 731357 pu: package librsvg/2.26.3-2
Bug #731357 [release.debian.org] opu: package librsvg/2.26.3-2
Changed Bug title to 'pu: package librsvg/2.26.3-2' from 'opu: package 
librsvg/2.26.3-2'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
731357: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731357
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138618655923077.transcr...@bugs.debian.org



Processed: tagging 731285

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 731285 + wheezy
Bug #731285 [release.debian.org] pu: package kexec-tools/1:2.0.3-1
Added tag(s) wheezy.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
731285: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731285
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138618685425152.transcr...@bugs.debian.org



Bug#731343: pu: package gtk+3.0/3.4.2-7

2013-12-04 Thread Josselin Mouette
Le mercredi 04 décembre 2013 à 19:50 +, Adam D. Barratt a écrit :
 Control: tags -1 + wheezy moreinfo
 
 On Wed, 2013-12-04 at 14:13 +0100, Josselin Mouette wrote:
  I’d like to upload an update (prepared by Raphaël) for gtk+3.0, which is 
  necessary in order to fix librsvg’s CVE-2013-1881.
 
 Does this work correctly in conjunction with a librsvg which does not
 include the CVE fix?

It does. This change makes gtk+ stop using the “feature” that the
librsvg upload removes.

On the other hand, you might want to see a Breaks: libgtk-3-0  3.4.2-7
in the updated librsvg – I have forgotten it so far.

Cheers,
-- 
.''`.  Josselin Mouette
: :' :
`. `'
  `-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1386186779.5639.20.camel@tomoe



Processed: tagging 731285

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # See message #10
 tags 731285 + confirmed
Bug #731285 [release.debian.org] pu: package kexec-tools/1:2.0.3-1
Added tag(s) confirmed.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
731285: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731285
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138618689125291.transcr...@bugs.debian.org



Processed: Re: Bug#730783: pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix for CVE-2013-6411)

2013-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 clone 730783 -1
Bug #730783 [release.debian.org] pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix 
for CVE-2013-6411)
Bug 730783 cloned as bug 731380
 user release.debian@packages.debian.org
Setting user to release.debian@packages.debian.org (was 
a...@adam-barratt.org.uk).
 usertags 730783 = pu
Usertags were: opu pu.
Usertags are now: pu.
 tags 730783 + confirmed wheezy
Bug #730783 [release.debian.org] pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix 
for CVE-2013-6411)
Added tag(s) wheezy and confirmed.
 retitle 730783 pu: openttd/1.2.1-3
Bug #730783 [release.debian.org] pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix 
for CVE-2013-6411)
Changed Bug title to 'pu: openttd/1.2.1-3' from 'pu: openttd/1.2.1-3 opu: 
openttd/1.0.4-7 (Fix for CVE-2013-6411)'
 usertags -1 = pu
There were no usertags set.
Usertags are now: pu.
 tags -1 + confirmed squeeze
Bug #731380 [release.debian.org] pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix 
for CVE-2013-6411)
Added tag(s) squeeze and confirmed.
 retitle -1 pu: openttd/1.0.4-7
Bug #731380 [release.debian.org] pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix 
for CVE-2013-6411)
Changed Bug title to 'pu: openttd/1.0.4-7' from 'pu: openttd/1.2.1-3 opu: 
openttd/1.0.4-7 (Fix for CVE-2013-6411)'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
730783: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730783
731380: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731380
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138618728927920.transcr...@bugs.debian.org



Bug#730783: pu: openttd/1.2.1-3 opu: openttd/1.0.4-7 (Fix for CVE-2013-6411)

2013-12-04 Thread Adam D. Barratt
clone 730783 -1
user release.debian@packages.debian.org
usertags 730783 = pu
tags 730783 + confirmed wheezy
retitle 730783 pu: openttd/1.2.1-3
usertags -1 = pu
tags -1 + confirmed squeeze
retitle -1 pu: openttd/1.0.4-7
thanks

On Fri, 2013-11-29 at 15:35 +0100, Matthijs Kooijman wrote:
 upstream developers for the openttd package have identified a remote
 denial-of-service (program crash) in the openttd game. They have made
 patches available, which I'd like to include in wheezy and squeeze.
[...]
 Attached are debdiffs against the current squeeze and wheezy versions,
 which add the upstream patches. The debdiff still uses the -security
 archives, for the actual upload I'll change that to stable/oldstable
 instead.

Please use wheezy and squeeze instead. With that change, please go
ahead; thanks.

 I don't think special care wrt including orig tarballs is needed, like
 with the security archive?

No, it's still the same archive so you can just treat it like any other
upload.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386187281.18166.21.ca...@jacala.jungle.funky-badger.org



Bug#731343: pu: package gtk+3.0/3.4.2-7

2013-12-04 Thread Adam D. Barratt
Control: tags -1 -moreinfo +confirmed

On Wed, 2013-12-04 at 20:52 +0100, Josselin Mouette wrote:
 Le mercredi 04 décembre 2013 à 19:50 +, Adam D. Barratt a écrit :
  On Wed, 2013-12-04 at 14:13 +0100, Josselin Mouette wrote:
   I’d like to upload an update (prepared by Raphaël) for gtk+3.0, which is 
   necessary in order to fix librsvg’s CVE-2013-1881.
[...]
 On the other hand, you might want to see a Breaks: libgtk-3-0  3.4.2-7
 in the updated librsvg – I have forgotten it so far.

That would be good; thanks.

Assuming that the resulting packages have been tested in a wheezy
environment, please go ahead.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386187478.18166.24.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#731343: pu: package gtk+3.0/3.4.2-7

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 -moreinfo +confirmed
Bug #731343 [release.debian.org] pu: package gtk+3.0/3.4.2-7
Removed tag(s) moreinfo.
Bug #731343 [release.debian.org] pu: package gtk+3.0/3.4.2-7
Added tag(s) confirmed.

-- 
731343: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731343
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b731343.138618748728573.transcr...@bugs.debian.org



Processed: Re: Bug#724861: pu: package intel-microcode/1.20130906.1

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #724861 [release.debian.org] pu: package intel-microcode/1.20130906.1
Added tag(s) confirmed.

-- 
724861: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724861
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b724861.138618789231520.transcr...@bugs.debian.org



Bug#724861: pu: package intel-microcode/1.20130906.1

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sun, 2013-09-29 at 03:04 -0300, Henrique de Moraes Holschuh wrote:
 On Sun, 29 Sep 2013, Cyril Brulebois wrote:
  There is not much data on what release managers think about rushing
  upgrades into p-u, but the fact there's no definitive data point on the
  microcode update, and the fact that it has been available for less than
  a week seem to point out that letting this update reach p-u before the
  next point release is highly unlikely.
 
 Let it cook for a while if you think its best, it is not like we really know
 how emergencial these updates are (or are not).  wheezy-backports is there
 to help anyone that requires less latency on microcode updates.

Assuming this is still (a|the) version that you'd like to provide via
p-u, please go ahead; apologies for the delay.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386187881.18166.25.ca...@jacala.jungle.funky-badger.org



Bug#728253: pu: package libnet-smtp-tls-butmaintained-perl/0.17-1+deb7u1

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Tue, 2013-10-29 at 23:50 +0100, Salvatore Bonaccorso wrote:
 The Perl module found int libnet-smtp-tls-butmaintained-perl
 (Net::SMTP::TLS::ButMaintained) suffers from an error in the use of
 SSL_version in the code, which in the version in wheezy is used as
 
 SSL_version = SSLv3 TLSv1
 
 I have opened http://bugs.debian.org/728248. This causes first a error
 message and sending a mail actually fails.

Please go ahead; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386188686.18166.26.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#728253: pu: package libnet-smtp-tls-butmaintained-perl/0.17-1+deb7u1

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #728253 [release.debian.org] pu: package 
libnet-smtp-tls-butmaintained-perl/0.17-1+deb7u1
Added tag(s) confirmed.

-- 
728253: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728253
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b728253.13861886943021.transcr...@bugs.debian.org



Bug#729708: pu: package fcitx-cloudpinyin/0.2.2-1+deb7u1

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Sat, 2013-11-16 at 11:13 +0800, Aron Xu wrote:
 I would like to apply the following patch to fcitx-cloudpinyin. It
 uses an anonymous web API service provided Sogou by default, but the
 API is gone for quite some time and upstream has switched to use
 Google's similar service by default in newer versions. The service
 provided by Google is using HTTPS by default, while the original one
 isn't.

Please go ahead; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386189011.18166.29.ca...@jacala.jungle.funky-badger.org



Bug#728575: pu: package calendarserver/3.2.dfsg-4

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + moreinfo

On Sun, 2013-11-03 at 14:05 +0530, Rahul Amaram wrote:
 Updated zoneinfo data

Is there a plan for doing so in unstable?

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386189104.18166.30.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#729708: pu: package fcitx-cloudpinyin/0.2.2-1+deb7u1

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #729708 [release.debian.org] pu: package fcitx-cloudpinyin/0.2.2-1+deb7u1
Added tag(s) confirmed.

-- 
729708: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729708
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b729708.13861890195070.transcr...@bugs.debian.org



Processed: Re: Bug#728575: pu: package calendarserver/3.2.dfsg-4

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + moreinfo
Bug #728575 [release.debian.org] pu: package calendarserver/3.2.dfsg-4
Added tag(s) moreinfo.

-- 
728575: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728575
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b728575.13861891135935.transcr...@bugs.debian.org



Bug#730764: pu: package ctdb/1.12+git20120201-4

2013-12-04 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Fri, 2013-11-29 at 12:23 +0100, Mathieu Parent wrote:
 2013/11/29 Cyril Brulebois k...@debian.org:
 (...)
  If that's not the case, please adjust
  found/fixed version in the BTS.
 
 done. This was fixed in 2.3 (or maybe before).

Please go ahead.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1386189310.18166.31.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#730764: pu: package ctdb/1.12+git20120201-4

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #730764 [release.debian.org] pu: package ctdb/1.12+git20120201-4
Added tag(s) confirmed.

-- 
730764: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730764
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b730764.13861893187035.transcr...@bugs.debian.org



Bug#729747: pu: package apt-listbugs/0.1.8

2013-12-04 Thread Francesco Poli
On Wed, 04 Dec 2013 14:04:41 + Jonathan Wiltshire wrote:

[...]
 On 2013-11-16 16:43, Francesco Poli (wintermute) wrote:
[...]
  If you agree, I can ask my usual sponsor to upload the prepared
  package to stable, so that it will end up in the next point release.
 
 Yes, please.

OK, thanks for your reply.
I've just asked my usual sponsor to perform the upload.

 Be aware that the window closes on Saturday.

That's a close deadline... What happens if the upload does not make it
before Saturday? Would it be just postponed to the successive stable
update?

 
  P.S.: after this, I may perhaps find the time to do the same for
  oldstable (squeeze), unless you say I shouldn't bother...
 
 Please do.

I'll see what I can do: when will the current window for oldstable
(squeeze) close? Is there an already decided deadline?



-- 
 http://www.inventati.org/frx/frx-gpg-key-transition-2010.txt
 New GnuPG key, see the transition document!
. Francesco Poli .
 GnuPG key fpr == CA01 1147 9CD2 EFDF FB82  3925 3E1C 27E1 1F69 BFFE


pgphIW_PUlVU7.pgp
Description: PGP signature


Bug#717923: transition: tiff 4.x (libtiff5)

2013-12-04 Thread Jay Berkenbilt
Julien Cristau jcris...@debian.org wrote:

 On Tue, Dec  3, 2013 at 16:02:17 -0500, Jay Berkenbilt wrote:

 If you're good with this plan, give me the word, and I will do the
 upload.  I can probably take care of the mass bug filing...I can script
 it locally unless you have a quick way to do it.
 
 Sounds good to me, I think we can go ahead with this.

I've got it ready to go but with two changes, so I wanted to get
confirmation.

1. Why is it necessary for the transition packages to depend on the
binary libraries and not just the dev package?  If libtiff4-dev and
libtiff5-alt-dev depend on libtiff5-dev ( 4.0.3-6~), isn't this
sufficient?  Is there some special reason that the dependency on
libtiff5 (and presumably also libtiffxx5) has to be explicit?

2. I think I'm going punt on libtiff4-alt-dev.  Fedora switched over
to tiff 4.x a while ago and never provided any way for people to build
against 3.x libraries.  There were only something like 3 packages that
had any issues, and by now, fixes are available in all cases.  Also,
unlike libtiff5-alt-dev, which was totally transparent because of
pkg-config, tiff 3.x doesn't use pkg-config, so having people use it
would require changes to their builds anyway.

The new package will 4.0.3-6.  For libtiff4-dev and libtiff5-alt-dev,
both provided by the tiff source package, I have

Depends: ${misc:Depends}, libtiff5-dev ( 4.0.3-6~)

and for libtiff5-dev, I have

Replaces: libtiff5-alt-dev ( 4.0.3-6~), libtiff4-dev ( 4.0.3-6~)
Conflicts: libtiff5-alt-dev ( 4.0.3-6~), libtiff4-dev ( 4.0.3-6~)
Provides: libtiff-dev

For the tiff3 package, I just dropped the libtiff4-dev package and the
provides of libtiff-dev along with it.  There will be no -dev package
for tiff 3.x.

I won't upload today because I want to compose a message to debian-devel
first, but if this sounds okay, I will do the upload tomorrow.  I did
various tests including installing libtiff4-dev and libtiff5-alt-dev and
upgrading.  The upgrade pulled in libtiff5-dev and libtiff5xx (libtiff5
was already on my system) and autoremoved libtiffxx0c2, and then it was
safe for me to remove the two transitional packages as expected.  I also
tested building vips in a chroot with the updated packages.  vips has
tons of dependencies including both tiff4 and tiff5 indirectly.
Everything looks good there as well.

-- 
Jay Berkenbilt q...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131204165927.0208763127.qww314...@jberkenbilt-linux.appiancorp.com



Bug#731261: transition: Qt5 switching qreal == double for all platforms

2013-12-04 Thread Sune Vuorela
On Wednesday 04 December 2013 20:38:09 Julien Cristau wrote:
 On Tue, Dec  3, 2013 at 15:09:18 -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:
  So I would like what the RT and arm* porters thinks.
 
 This is just my opinion, but if you decide to break ABI, I think you
 should bump SONAME, and I think you must change package names.

Had it been part of a stable release or had it been used by more packages than 
what I can count on my fingers. Then maybe.
Had it been on all architectures. Then maybe.
Or hadn't it been a package where in general the abi is actually the same 
across several distributions, then maybe.

But all in all, the fallout is minimal, and breaking compatibility with the 
rest of the world isn't worth it.

So let's paper it over and not repeat it again in the future.

/sune
-- 
Genius, I cannot explore a tool from the control drawer menu inside Flash 3.2, 
how does it work?

From the file within Office you should never link with the FPU, in such way 
then 
from the control options menu inside Outlook Express you must disable a Fast 
periferic of the memory for saving the controller to the secret code.


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1730515.14yUBsGM5O@dabney



Bug#717923: transition: tiff 4.x (libtiff5)

2013-12-04 Thread Julien Cristau
On Wed, Dec  4, 2013 at 16:59:27 -0500, Jay Berkenbilt wrote:

 Julien Cristau jcris...@debian.org wrote:
 
  On Tue, Dec  3, 2013 at 16:02:17 -0500, Jay Berkenbilt wrote:
 
  If you're good with this plan, give me the word, and I will do the
  upload.  I can probably take care of the mass bug filing...I can script
  it locally unless you have a quick way to do it.
  
  Sounds good to me, I think we can go ahead with this.
 
 I've got it ready to go but with two changes, so I wanted to get
 confirmation.
 
 1. Why is it necessary for the transition packages to depend on the
 binary libraries and not just the dev package?  If libtiff4-dev and
 libtiff5-alt-dev depend on libtiff5-dev ( 4.0.3-6~), isn't this
 sufficient?  Is there some special reason that the dependency on
 libtiff5 (and presumably also libtiffxx5) has to be explicit?
 
None, as far as I know.

 2. I think I'm going punt on libtiff4-alt-dev.  Fedora switched over
 to tiff 4.x a while ago and never provided any way for people to build
 against 3.x libraries.  There were only something like 3 packages that
 had any issues, and by now, fixes are available in all cases.  Also,
 unlike libtiff5-alt-dev, which was totally transparent because of
 pkg-config, tiff 3.x doesn't use pkg-config, so having people use it
 would require changes to their builds anyway.
 
 The new package will 4.0.3-6.  For libtiff4-dev and libtiff5-alt-dev,
 both provided by the tiff source package, I have
 
 Depends: ${misc:Depends}, libtiff5-dev ( 4.0.3-6~)
 
 and for libtiff5-dev, I have
 
 Replaces: libtiff5-alt-dev ( 4.0.3-6~), libtiff4-dev ( 4.0.3-6~)
 Conflicts: libtiff5-alt-dev ( 4.0.3-6~), libtiff4-dev ( 4.0.3-6~)
 Provides: libtiff-dev
 
 For the tiff3 package, I just dropped the libtiff4-dev package and the
 provides of libtiff-dev along with it.  There will be no -dev package
 for tiff 3.x.
 
Seems fine to me.  I think the Conflicts could be Breaks, but that can
always be changed later anyway.

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#728253: pu: package libnet-smtp-tls-butmaintained-perl/0.17-1+deb7u1

2013-12-04 Thread Salvatore Bonaccorso
Hi Adam,

On Wed, Dec 04, 2013 at 08:24:46PM +, Adam D. Barratt wrote:
 Control: tags -1 + confirmed
 
 On Tue, 2013-10-29 at 23:50 +0100, Salvatore Bonaccorso wrote:
  The Perl module found int libnet-smtp-tls-butmaintained-perl
  (Net::SMTP::TLS::ButMaintained) suffers from an error in the use of
  SSL_version in the code, which in the version in wheezy is used as
  
  SSL_version = SSLv3 TLSv1
  
  I have opened http://bugs.debian.org/728248. This causes first a error
  message and sending a mail actually fails.
 
 Please go ahead; thanks.

Thanks a lot Adam. Just uploaded the package.

Regards,
Salvatore


signature.asc
Description: Digital signature


Bug#731261: transition: Qt5 switching qreal == double for all platforms

2013-12-04 Thread Timo Jyrinki
2013/12/3 Lisandro Damián Nicanor Pérez Meyer lisan...@debian.org:
 So we think the best thing we could do is, for this very exceptional case, set
 qreal to double on all archs and break ABI on arm* and sh4, which could be 
 fixed
 by [bin]NMUing the three apps that currently build-depend against it (I think
 python's bindings will need a sourcefull upload too).

I'd also support not bumping in this special case, and following the
upstream default change of switching for those archs.

-Timo


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAJtFfxm9hmyu-zXVtJ4UtsPqk5Hm2eqJ+UVTBk=xb_so37f...@mail.gmail.com



PostgreSQL 8.4.19/9.1.11 stable updates

2013-12-04 Thread Martin Pitt
Hello Adam, release team,

Adam D. Barratt [2013-11-26 22:53 +]:
 On Mon, 2013-11-25 at 10:29 +0100, Christoph Berg wrote:
  Re: Adam D. Barratt 2013-11-15 
  ea713561bd4ba8b10305bba85e1e2...@mail.adsl.funky-badger.org
   On 2013-11-05 9:59, Martin Pitt wrote:
   *brown paper bag* Thanks for pointing out, signed and all uploaded
   now.
   
   All flagged for acceptance; thanks.
  
  A critical/annoying/bad replication bug was discovered in 9.1.10 (in
  s-p-u) that doesn't exist in 9.1.9 (in stable). 9.1.11 will be
  released on Dec 5th, so it would be a good idea if 9.1.10 wouldn't
  leave s-p-u until then.
  
  https://wiki.postgresql.org/wiki/Nov2013ReplicationIssue
 
 Thanks for the note. There won't be a point release before that date,
 but I guess we should get 9.1.11 in p-u as soon as feasible. :|

Christoph already prepared 9.1.11/9.3.2 for unstable, I prepared
squeeze (8.4.19) and wheezy (8.4.19/9.1.11) updates:

  http://people.debian.org/~mpitt/psql/squeeze/
  http://people.debian.org/~mpitt/psql/wheezy/

It's going to be publicly announced at some point today, until then we
should hold the uploads. But you can already review the updates.

Same old story really, built/tested, upstream and p-common tests pass,
no packaging/patch changes, full and filtered debdiffs available in
above directories.

OK to upload these once upstream sends out the announcement?

Thank you,

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature


Processed: galax: FTBFS with ocaml 4.01.0

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 730196 726010 731277 731344 731218
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731398

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731398: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731398
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.138622541325887.transcr...@bugs.debian.org



Processed: jocaml: needs update for ocaml 4.01.0

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 730196 731398 731277 726010 731344 731218
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731399

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731399: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731399
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.138622553126298.transcr...@bugs.debian.org



Processed: ocamlduce: needs update for ocaml 4.01.0

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 730196 731398 726010 731277 731344 731399 731218
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731400

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731400: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731400
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.138622559226696.transcr...@bugs.debian.org



Processed: otags: needs update for ocaml 4.01.0

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 731400 730196 726010 731398 731277 731344 731399 731218
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731401

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731401: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731401
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.138622572527991.transcr...@bugs.debian.org



Bug#731402: transition: spatialite

2013-12-04 Thread Bas Couwenberg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Dear Release Team,

For the Debian GIS team I'd like to request a transition slot for the
SpatiaLite transition. The upgrade from spatialite 3.1.0~rc2 to 4.1.1
involves a SONAME bump from libspatialite.so.3 to libspatialite.so.5.

Several packages in the SpatiaLite family and related Gaia-SINS software
are updated to support the new libspatialite. This includes
librasterlite, a former dependency of spatialite-gui, which is updated from
librasterlite1 (1.1~svn11) to librasterlite2 (1.1g). A seperate
transition slot will be requested for librasterlite.

The SpatiaLite packages were updated in experimental to 4.0.0 some time
ago but this effort was stalled. The packages FTBFS on several
architectures due to improper sqlite3 linking. These problems have been
adressed in the 4.1.1 packages.

The following packages were updated for the SpatiaLite transition:

 1) libgaiagraphics  (0.5-1)  available in experimental
 2) freexl   (1.0.0f-2)   available in unstable
 3) readosm  (1.0.0b+dfsg1-2) available in unstable
 4) spatialite   (4.1.1-4)available in experimental
 5) librasterlite(1.1g-2) available in experimental
 6) spatialite-tools (4.1.1-1)available in experimental
 7) spatialite-gui   (1.7.1-1)available in experimental
 8) pyspatialite (3.0.1-3)available in experimental

The spatialite transition affects the following source packages:

 1) gdal(build OK)
 2) merkaartor  (build OK)
 3) librasterlite   (build OK)
 4) spatialite-gui  (build OK)requires libgaiagraphics (0.5)
 5) spatialite-tools(build OK)
 6) pyspatialite(build OK)
 7) qgis(build OK)requires fixed OpenSceneGraph packages

Only BinNMUs are required for gdal, merkaartor and qgis. The other
packages can be copied from experimental.

The gdal package has its own transition from 1.9.x to 1.10.x in the queue,
and is tracked in #712688.

Rebuilding qgis is currently not possible because libopenscenegraph99 is
uninstabable due to the libav transition. The openscenegraph transition
is tracked in #729289.

More information about the changes made for the spatialite transition,
see the thread on debian-gis@ starting at:

https://lists.debian.org/debian-gis/2013/10/msg9.html

For the spatialite transition the following Ben file is suggested:

title = libspatialite5;
is_affected = .build-depends ~ libspatialite-dev;
is_good = .depends ~ libspatialite5;
is_bad = .depends ~ libspatialite3;


Kind Regards,

Bas


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131205065148.29760.94229.report...@osiris.linuxminded.xs4all.nl



Bug#731403: transition: librasterlite

2013-12-04 Thread Bas Couwenberg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Dear Release Team,

For the Debian GIS team I've requested a transition slot for the
SpatiaLite transition, it includes an update of librasterlite
requiring its own transition.

The upgrade from librasterlite 1.1~svn11 to 1.1g involves a SONAME bump
from librasterlite.so.1 to librasterlite.so.2. And affects the following
source packages in unstable:

 1) mapnik (build OK)
 2) spatialite-gui (build OK)

Only a BinNMU is required for mapnik. The spatialite-gui package in
experimental can be copied to unstable.

The updated spatialite-gui package requires the libgaiagraphics and
spatialite packages available in experimental. The 1.2.1 version of
spatialite-gui in unstable depends on librasterlite, but the new 1.7.1
version no longer links to librasterlite.

The librasterlite transition goes hand in hand with the spatialite
transition (#731402). The new librasterlite package will build with the
spatialite version in unstable, but it should be built with the new
spatialite version also used by spatialite-gui and spatialite-tools.

For more information about the librasterlite and spatialite transitions,
see the thread on debian-gis@ starting at:

https://lists.debian.org/debian-gis/2013/10/msg9.html

For the librasterlite transition the following Ben file is suggested:

title = librasterlite2;
is_affected = .build-depends ~ librasterlite-dev;
is_good = .depends ~ librasterlite2;
is_bad = .depends ~ librasterlite1;


Kind Regards,

Bas


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131205065532.30352.92501.report...@osiris.linuxminded.xs4all.nl



Re: Bug#731261: transition: Qt5 switching qreal == double for all platforms

2013-12-04 Thread Bastian Blank
On Tue, Dec 03, 2013 at 03:09:18PM -0300, Lisandro Damián Nicanor Pérez Meyer 
wrote:
 So I would like what the RT and arm* porters thinks.

Would Qt5 really work with two versions linked into one process?  This
would happen with a changed SONAME.  Qt works with a lot of plugins and
other stuff.

The correct way to do that would be:
- Change the binary package name and make it break the old one (see the
  long double transition some years ago)
- Don't change the SONAME

Bastian

-- 
You're dead, Jim.
-- McCoy, Amok Time, stardate 3372.7


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131205064551.ga21...@mail.waldi.eu.org



Bug#731402: transition: spatialite

2013-12-04 Thread Sebastiaan Couwenberg
On 12/05/2013 07:51 AM, Bas Couwenberg wrote:
 Several packages in the SpatiaLite family and related Gaia-SINS software
 are updated to support the new libspatialite. This includes
 librasterlite, a former dependency of spatialite-gui, which is updated from
 librasterlite1 (1.1~svn11) to librasterlite2 (1.1g). A seperate
 transition slot will be requested for librasterlite.

For reference, the librasterlite transition is tracked in #731403.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52a0263e.3040...@xs4all.nl



Processed: ocaml-data-notation: FTBFS with ocaml 4.01.0

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 730196 731400 726010 731398 731277 731344 731401 731399 
731218
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731404

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731404: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731404
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.138622818712457.transcr...@bugs.debian.org



Processed: ocamldap: FTBFS with ocaml 4.01.0

2013-12-04 Thread Debian Bug Tracking System
Processing control commands:

 block 718767 with -1
Bug #718767 [release.debian.org] transition: ocaml 4.01.0
718767 was blocked by: 731400 730196 726010 731398 731277 731404 731344 731218 
731401 731399
718767 was not blocking any bugs.
Added blocking bug(s) of 718767: 731405

-- 
718767: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718767
731405: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731405
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b.138622830412991.transcr...@bugs.debian.org