Bug#778505: unblock: gnome-orca/3.14.0-4
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gnome-orca Upstream Orca fixed an issue with LibreOffice which improves its accessibility a lot with a very simple change. I have uploaded it as 3.14.0-4, as attached. unblock gnome-orca/3.14.0-4 -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (990, 'testing'), (500, 'buildd-unstable'), (500, 'unstable'), (500, 'stable'), (500, 'oldstable'), (1, 'buildd-experimental'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.19.0 (SMP w/8 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Init: systemd (via /run/systemd/system) -- Samuel (03:13:14) bon (03:13:19) il est tard :p (03:13:25) c'est l'heure de manger (03:13:38) hm j'ai mangé à 1h moi, j'ai des horaires raisonnables diff -Nru gnome-orca-3.14.0/debian/changelog gnome-orca-3.14.0/debian/changelog --- gnome-orca-3.14.0/debian/changelog 2015-02-07 20:49:39.0 +0100 +++ gnome-orca-3.14.0/debian/changelog 2015-02-15 23:51:26.0 +0100 @@ -1,3 +1,11 @@ +gnome-orca (3.14.0-4) unstable; urgency=medium + + * Team upload. + * patches/libreoffice: New patch to fix various issues with LibreOffice. +Closes: #766686. + + -- Samuel Thibault Sun, 15 Feb 2015 23:51:25 +0100 + gnome-orca (3.14.0-3) unstable; urgency=medium * Team upload. diff -Nru gnome-orca-3.14.0/debian/control gnome-orca-3.14.0/debian/control --- gnome-orca-3.14.0/debian/control2015-02-07 20:51:42.0 +0100 +++ gnome-orca-3.14.0/debian/control2015-02-15 23:56:10.0 +0100 @@ -6,7 +6,7 @@ Section: gnome Priority: optional Maintainer: Debian Accessibility Team -Uploaders: Andreas Henriksson , Debian GNOME Maintainers , Jordi Mallach , Mario Lang , Michael Biebl +Uploaders: Andreas Henriksson , Debian GNOME Maintainers , Mario Lang , Michael Biebl Build-Depends: cdbs (>= 0.4.90~), debhelper (>= 9), autotools-dev, diff -Nru gnome-orca-3.14.0/debian/patches/libreoffice gnome-orca-3.14.0/debian/patches/libreoffice --- gnome-orca-3.14.0/debian/patches/libreoffice1970-01-01 01:00:00.0 +0100 +++ gnome-orca-3.14.0/debian/patches/libreoffice2015-02-15 23:50:42.0 +0100 @@ -0,0 +1,22 @@ +commit 9dc9b6dc8b6bb4d7092e2c0ad6e7973340fa023a +Author: Joanmarie Diggs +Date: Mon Feb 9 13:02:00 2015 -0500 + +Work around another case of dead LibreOffice accessible objects + +diff --git a/src/orca/scripts/apps/soffice/script_utilities.py b/src/orca/scripts/apps/soffice/script_utilities.py +index 3409e73..0e3508f 100644 +--- a/src/orca/scripts/apps/soffice/script_utilities.py b/src/orca/scripts/apps/soffice/script_utilities.py +@@ -83,7 +83,10 @@ class Utilities(script_utilities.Utilities): + if text.strip(): + return text + +-text = script_utilities.Utilities.displayedText(self, obj) ++try: ++text = script_utilities.Utilities.displayedText(self, obj) ++except: ++return "" + + # TODO - JD: This is needed because the default behavior is to fall + # back on the name, which is bogus. Once that has been fixed, this diff -Nru gnome-orca-3.14.0/debian/patches/series gnome-orca-3.14.0/debian/patches/series --- gnome-orca-3.14.0/debian/patches/series 2015-02-07 20:37:37.0 +0100 +++ gnome-orca-3.14.0/debian/patches/series 2015-02-15 23:50:51.0 +0100 @@ -1,2 +1,3 @@ mate-notifications.diff lightdm +libreoffice
Bug#776458: unblock: dolibarr/3.5.5+dfsg1-1
This is my point of view of what to do for this case: My first choice was to not send any unblock request. Reaon is that CVE need privileged account to be exploited, so it is not a high risk, and I would not like to bother anybody. However, Moritz Muehlenhoff ask me to provide a fix. A fix was already done before the CVE was reported on debian. It is the version 3.5.5. So idea was to send an unblock request to validate this version. That's what Raphael did for me (i received a bounce when doing it myself). This is clearly the choice I recommand for 2 reasons: - On debian, only one CVE was reported, but several others were reported to project directly. Why adding a CVE fix that will include only fixes for the debian CVE and not others ? I think it is better to include others too. - This version and package 3.5.5 is a long term production version. Even if not into debian, it has been released several month ago into tgz package and is really very more stable than current 3.5.4. So if stability of application is a consideration, i think this package is a best choice than a target fix because it fixes other stability bugs (3.5.5 fixes only bugs). I think it is a better choice more secure because the CVE reported into debian is not "one" security report but a long list of several holes (all require privileged account however), so fixing it need a lof of changes on a lof of files. Reporting locally all fixes for only this CVE is a high risk to forget and miss something where we are sure that 3.5.5 is complete and stable. I share point of view of Rapĥael thinking that making a targeted fix does not bring us more security, i will tell more, I think a targetted fix is less secured than 3.5.5 since this version is the official version in production for branch 3.5.5 since begin of october 2014 and no other packages depends on it. 2015-02-09 10:02 GMT+01:00 Raphael Hertzog : > Hi, > > On Sun, 08 Feb 2015, Ivo De Decker wrote: > > On Wed, Jan 28, 2015 at 09:50:30AM +0100, Raphael Hertzog wrote: > > > Please unblock package dolibarr > > > > > Version 3.5.5+dfsg1-1 fixes a security issue: CVE-2014-7137 (Closes: > #770313) > > > > This bug was filed by the security team as 'grave', but downgraded by the > > maintainer to 'important' without explanation. If the issue is actually > grave, > > the severity should be increased again. > > Well, the maintainer explained (to me only apparently) that the issue is > only exploitable with privileged accounts so that the threat is not very > high and I thus instructed him that it's his reponsibility to downgrade > the bug if he doesn't want the packages to be removed from Jessie. > > Later the security team contacted him about this CVE and asked him to > request an unblock because it would be better to release Jessie without > an open CVE on dolibarr. > > > The diff is very large, and it probably contains lots of changes that > are not > > appropriate at this point of the freeze. If you think this is not the > case, > > please explain why. > > It's certainly the case, but the package is a leaf package and the fixed > version has been well tested in sid. > > The package maintainer is also the upstream author. > > > A targeted fix for this issue is probably better. > > I don't see what a targeted fix brings us given that the only risk of > regression is in dolibarr itself (and Dolibarr is maintained). > > Laurent, what's you opinion? Would you be willing to prepare a targeted > fix? > > Cheers, > -- > Raphaël Hertzog ◈ Debian Developer > > Support Debian LTS: http://www.freexian.com/services/debian-lts.html > Learn to master Debian: http://debian-handbook.info/get/ >
Bug#767781: marked as done (unblock: matplotlib/1.4.2-3.1)
Your message dated Sun, 15 Feb 2015 22:56:54 +0100 with message-id <20150215215653.ga27...@ugent.be> and subject line Re: Bug#767781: unblock: matplotlib/1.4.2-3 has caused the Debian Bug report #767781, regarding unblock: matplotlib/1.4.2-3.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 767781: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767781 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package matplotlib 1.4 series is the latest release of mpl, and it will be the one upstream will support during Jessie lifecycle. It has been in Debian since Sept (in experimental) and it would have made the cut for the freeze if not for some uploads for upstream bugfixes and build system deadlock fixes. This version is built on all the buildd except mips, but that arch has a long queue, with big packages still to build before mpl. Please consider unblocking it. unblock matplotlib/1.4.2-3 -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 'oldstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash --- End Message --- --- Begin Message --- Hi, On Sat, Feb 14, 2015 at 12:00:19AM -0500, Michael Gilbert wrote: > It seems like it might be worse to go with an unsupported and untested > wx/matplotlib configuration, so even though the changes are big > between testing and unstable, 1.4 is probably a much better choice for > jessie. Unblocked matplotlib/1.4.2-3.1 Cheers, Ivo--- End Message ---
Bug#778492: unblock: ndisc6/1.0.1-2
package: release.debian.org user: release.debian@packages.debian.org usertags: unblock severity: normal x-debbugs-cc: debian-b...@lists.debian.org Please consider unblocking ndisc6. I did a QA upload to fix bug #740998. The kfreebsd builds are missing because of #764692, which sounds unlikely to be fixed for jessie. unblock ndisc6/1.0.1-2 unblock-udeb ndisc6/1.0.1-2 diff -u ndisc6-1.0.1/debian/control ndisc6-1.0.1/debian/control --- ndisc6-1.0.1/debian/control +++ ndisc6-1.0.1/debian/control @@ -1,7 +1,7 @@ Source: ndisc6 Section: net Priority: optional -Maintainer: Rémi Denis-Courmont +Maintainer: Debian QA Group Build-Depends: cdbs, debhelper (>= 7), autotools-dev, gettext Standards-Version: 3.9.1 Homepage: http://www.remlab.net/ndisc6/ @@ -40,6 +40,7 @@ Depends: ${shlibs:Depends}, ${perl:Depends}, ${misc:Depends} Recommends: resolvconf Suggests: ndisc6 +Conflicts: network-manager Description: IPv6 recursive DNS server discovery daemon rdnssd autoconfigures recursive DNS servers on IPv6 networks using ICMPv6 Neighbor Discovery (RFC 5006), and can update the diff -u ndisc6-1.0.1/debian/changelog ndisc6-1.0.1/debian/changelog --- ndisc6-1.0.1/debian/changelog +++ ndisc6-1.0.1/debian/changelog @@ -1,3 +1,11 @@ +ndisc6 (1.0.1-2) unstable; urgency=medium + + * QA upload. + * Set maintainer to the Debian QA Group (see #713004). + * Add conflicts between rdnssd and network-manager (closes: #740998). + + -- Michael Gilbert Sat, 14 Feb 2015 01:16:37 + + ndisc6 (1.0.1-1) unstable; urgency=low * New upstream release:
Processed: tagging 778434
Processing commands for cont...@bugs.debian.org: > tags 778434 - moreinfo Bug #778434 [release.debian.org] pre-approval: unblock: deluge/1.3.10-3 Removed tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 778434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778434 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.1424020035643.transcr...@bugs.debian.org
Bug#778465: marked as done (unblock: i3-wm/4.8-2)
Your message dated Sun, 15 Feb 2015 17:12:10 +0100 with message-id <20150215161210.gb2...@ugent.be> and subject line Re: Bug#778465: unblock: i3-wm/4.8-2 has caused the Debian Bug report #778465, regarding unblock: i3-wm/4.8-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 778465: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778465 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package i3-wm 4.8-2 (which I have just uploaded) contains two backported bugfixes from upstream to address the serious issues #778460 and #778461. Both bugfixes are well-tested for many weeks and address common problems that users report over and over. Having them in the next stable release would be a great service to our users. debdiff: diff -Nru i3-wm-4.8/debian/changelog i3-wm-4.8/debian/changelog --- i3-wm-4.8/debian/changelog 2014-06-15 19:21:51.0 +0200 +++ i3-wm-4.8/debian/changelog 2015-02-15 13:24:57.0 +0100 @@ -1,3 +1,11 @@ +i3-wm (4.8-2) unstable; urgency=medium + + * Backport two bugfixes: +- backport-dpi-fix.patch (Closes: #778460) +- backport-i3bar-tray-fix.patch (Closes: #778461) + + -- Michael Stapelberg Sun, 15 Feb 2015 13:24:42 +0100 + i3-wm (4.8-1) unstable; urgency=medium * New upstream release. diff -Nru i3-wm-4.8/debian/patches/backport-dpi-fix.patch i3-wm-4.8/debian/patches/backport-dpi-fix.patch --- i3-wm-4.8/debian/patches/backport-dpi-fix.patch 1970-01-01 01:00:00.0 +0100 +++ i3-wm-4.8/debian/patches/backport-dpi-fix.patch 2015-02-15 13:22:18.0 +0100 @@ -0,0 +1,25 @@ +Description: Treat everything up to 120 dpi as 96 dpi +Author: Michael Stapelberg +Origin: https://github.com/i3/i3/commit/33d1d5d3c61a2136eb4b42ffd29870fd68d2d766 +Last-Update: 2015-02-15 + +--- + +Index: i3-wm-4.8/libi3/dpi.c +=== +--- i3-wm-4.8.orig/libi3/dpi.c i3-wm-4.8/libi3/dpi.c +@@ -12,5 +12,13 @@ extern xcb_screen_t *root_screen; + int logical_px(const int logical) { + const int dpi = (double)root_screen->height_in_pixels * 25.4 / + (double)root_screen->height_in_millimeters; ++/* There are many misconfigurations out there, i.e. systems with screens ++ * whose dpi is in fact higher than 96 dpi, but not significantly higher, ++ * so software was never adapted. We could tell people to reconfigure their ++ * systems to 96 dpi in order to get the behavior they expect/are used to, ++ * but since we can easily detect this case in code, let’s do it for them. ++ */ ++if ((dpi / 96.0) < 1.25) ++return logical; + return ceil((dpi / 96.0) * logical); + } diff -Nru i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch --- i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch 1970-01-01 01:00:00.0 +0100 +++ i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch 2015-02-15 13:23:19.0 +0100 @@ -0,0 +1,25 @@ +Description: add a sync call to i3bar to confirm reparents before exiting + Without this call, sometimes the tray icon windows are reparented into + i3’s container around the i3bar window, i.e. into the next remaining + window in the window hierarchy. Since i3 then closes that container + (since the i3bar window itself was closed), the tray window will also + get closed. In general, this weird interaction (getting reparented and + then closed) is not well received by tray icon providers :). +Author: Michael Stapelberg +Origin: https://github.com/i3/i3/commit/4699c714b33afb1c264f3d19911b880267165b94 +Last-Update: 2015-02-15 + +--- + +Index: i3-wm-4.8/i3bar/src/xcb.c +=== +--- i3-wm-4.8.orig/i3bar/src/xcb.c i3-wm-4.8/i3bar/src/xcb.c +@@ -1290,6 +1290,7 @@ void clean_xcb(void) { + FREE(outputs); + + xcb_flush(xcb_connection); ++xcb_aux_sync(xcb_connection); + xcb_disconnect(xcb_connection); + + ev_check_stop(main_loop, xcb_chk); diff -Nru i3-wm-4.8/debian/patches/series i3-wm-4.8/debian/patches/series --- i3-wm-4.8/debian/patches/series 2014-06-15 19:16:10.0 +0200 +++ i3-wm-4.8/debian/patches/series 2015-02-15 13:19:12.0 +0100 @@ -1,2 +1,4 @@ use-x-terminal-emulator.patch manpage-x-terminal-emulator.patch +backport-i3bar-tray-fix.patch +backport-dpi-fix.patch unblock i3-wm/4.8-2 -- System Information
Bug#774428: marked as done (unblock: simpleburn/1.7.0-2)
Your message dated Sun, 15 Feb 2015 17:09:53 +0100 with message-id <20150215160953.ga2...@ugent.be> and subject line Re: Bug#774428: unblock: simpleburn/1.7.0-2 has caused the Debian Bug report #774428, regarding unblock: simpleburn/1.7.0-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 774428: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774428 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal Tags: patch User: release.debian@packages.debian.org Usertags: unblock Hello! I just reviewed and uploaded simpleburn 1.7.0-2 which contains a patch by Georges Khaznadar to address #772365 which is an RC bug. I am attaching the debdiff which shows the additional patch to fix the bashisms as well as the respective changelog entry in debian/changelog. Please unblock simpleburn_1.7.0-2 so we can fix this bug for Jessie. Thanks! Cheers, Adrian unblock simpleburn/1.7.0-2 -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (500, 'testing'), (99, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru simpleburn-1.7.0/debian/changelog simpleburn-1.7.0/debian/changelog --- simpleburn-1.7.0/debian/changelog 2014-07-28 14:22:17.0 +0200 +++ simpleburn-1.7.0/debian/changelog 2015-01-02 17:03:12.0 +0100 @@ -1,3 +1,12 @@ +simpleburn (1.7.0-2) unstable; urgency=medium + + * Add patch to fix bashism in /bin/sh script -- thanks to +Georges Khaznadar for the help. +(Closes: #772365) + * Bump Standards-Version to 3.9.6 (no changes needed). + + -- Mateusz Łukasik Wed, 31 Dec 2014 15:22:53 +0100 + simpleburn (1.7.0-1) unstable; urgency=medium * New upstream release. (LP: #1279659) diff -Nru simpleburn-1.7.0/debian/control simpleburn-1.7.0/debian/control --- simpleburn-1.7.0/debian/control 2014-02-11 12:18:00.0 +0100 +++ simpleburn-1.7.0/debian/control 2014-12-31 15:13:28.0 +0100 @@ -4,7 +4,7 @@ Maintainer: Mateusz Łukasik Build-Depends: debhelper (>= 9), cmake (>= 2.6), pkg-config, libudev-dev, libburn-dev, libgtk2.0-dev (>= 2.12) -Standards-Version: 3.9.5 +Standards-Version: 3.9.6 Homepage: http://simpleburn.tuxfamily.org Vcs-Git: git://github.com/mati75/simpleburn.git Vcs-Browser: https://github.com/mati75/simpleburn.git diff -Nru simpleburn-1.7.0/debian/patches/fix-bashisms.patch simpleburn-1.7.0/debian/patches/fix-bashisms.patch --- simpleburn-1.7.0/debian/patches/fix-bashisms.patch 1970-01-01 01:00:00.0 +0100 +++ simpleburn-1.7.0/debian/patches/fix-bashisms.patch 2014-12-31 15:16:21.0 +0100 @@ -0,0 +1,588 @@ +Description: fix bashism in /bin/sh script +Author: Georges Khaznadar +Bug-Debian: https://bugs.debian.org/772365 + +--- a/scripts/simpleburn-detect.sh b/scripts/simpleburn-detect.sh +@@ -1,6 +1,6 @@ + #!/bin/sh + +-function detect() { ++detect() { + device=$1 #assumes it is a valid CD / DVD device + readcd dev=$device -fulltoc 2>/dev/null; rm -f ~/toc.dat; rm -f toc.dat #wait for loading + if cdrom_id $device | grep -q "ID_CDROM_MEDIA"; then +@@ -22,7 +22,7 @@ function detect() { + if [ -z "$mediacapacity" ]; then + mediacapacity=`cdrecord -atip dev=$device 2>&1 | grep "phys size:..." | tail -1 | sed 's/phys size:... \+//'` + fi +-let mediacapacity=mediacapacity*2048 ++mediacapacity=$((mediacapacity*2048)) + fi + { mplayer -dvd-device $device dvd://1 -identify -vo null -ao null -frames 0 2>&1 > /tmp/simpleburn-detect.$$ ;} 2>&1 >/dev/null + if grep -q "ID_DVD_TITLES" /tmp/simpleburn-detect.$$; then +@@ -31,13 +31,13 @@ function detect() { + for title in `cat /tmp/simpleburn-detect.$$ | grep "TITLE_[0-9]\+_LENGTH"`; do #for each title during more than 3' + titlenum=`echo $title | cut -d'_' -f4` + titlelenght=`echo $title | cut -d'=' -f2 | cut -f1 -d'.'` +- let minutes=titlelenght/60 +- if (( minutes > 3 )); then +- if (( $titlenum != 1 )); then ++ minutes=$((titlelenght/60)) ++ if [ $(( minutes > 3 )) = 1 ]; then ++ if [ $(( $titlenum != 1 )) = 1 ]; then + { mplayer -dvd-device $device dvd://$titlenum -identify -vo null -ao null -frames 0 2>&1 > /tmp/simpleburn-detect.$$; } 2>&1 >/dev/null + fi + if grep -q "ID_AID" /tmp/simpleburn-detect.$$ && grep -q "ID_SID" /tmp/simpleburn-detect.
Bug#778475: marked as done (unblock: librcsb-core-wrapper/1.005-3)
Your message dated Sun, 15 Feb 2015 15:54:56 + with message-id <1424015696.3384.9.ca...@adam-barratt.org.uk> and subject line Re: Bug#778475: unblock: librcsb-core-wrapper/1.005-3 has caused the Debian Bug report #778475, regarding unblock: librcsb-core-wrapper/1.005-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 778475: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778475 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package librcsb-core-wrapper A security problem was reported (#778397) against this package which is fixed by this upload (see debdiff). Thanks for your work on the Debian release Andreas. unblock librcsb-core-wrapper/1.005-3 -- System Information: Debian Release: 7.8 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru librcsb-core-wrapper-1.005/debian/changelog librcsb-core-wrapper-1.005/debian/changelog --- librcsb-core-wrapper-1.005/debian/changelog 2014-09-18 21:53:44.0 +0200 +++ librcsb-core-wrapper-1.005/debian/changelog 2015-02-14 18:08:44.0 +0100 @@ -1,3 +1,11 @@ +librcsb-core-wrapper (1.005-3) unstable; urgency=medium + + * Patch for Henry Spencer regular expressions (regex) library contains +a heap overflow vulnerability +Closes: #778397 + + -- Andreas Tille Sat, 14 Feb 2015 17:56:49 +0100 + librcsb-core-wrapper (1.005-2) unstable; urgency=medium * Added libtool-bin as a build-dep (Closes: #761768). diff -Nru librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch --- librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch 1970-01-01 01:00:00.0 +0100 +++ librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch 2015-02-14 18:07:41.0 +0100 @@ -0,0 +1,43 @@ +Author: Andreas Tille +Last-Update: Sat, 14 Feb 2015 17:51:06 +0100 +Origin: https://gitweb.dragonflybsd.org/dragonfly.git/blobdiff_plain/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c +Bug-Debian: http://bugs.debian.org/778397 +Forwarded: sw-h...@rcsb.rutgers.edu, Vladimir Guranovic +Description: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability + This patch adapts the patch found at Origin (see above) to the + regex code found in librcsb-core-wrapper. + +--- librcsb-core-wrapper-1.005.orig/regex/src/regcomp.c librcsb-core-wrapper-1.005/regex/src/regcomp.c +@@ -93,6 +93,7 @@ int cflags; + register struct parse *p = &pa; + register int i; + register size_t len; ++ register size_t maxlen; + #ifdef REDEBUG + # define GOODFLAGS(f) (f) + #else +@@ -115,7 +116,23 @@ int cflags; + (NC-1)*sizeof(cat_t)); + if (g == NULL) + return(REG_ESPACE); ++ /* ++ * Limit the pattern space to avoid a 32-bit overflow on buffer ++ * extension. Also avoid any signed overflow in case of conversion ++ * so make the real limit based on a 31-bit overflow. ++ * ++ * Likely not applicable on 64-bit systems but handle the case ++ * generically (who are we to stop people from using ~715MB+ ++ * patterns?). ++ */ ++ maxlen = ((size_t)-1 >> 1) / sizeof(sop) * 2 / 3; ++ if (len >= maxlen) { ++ free((char *)g); ++ return(REG_ESPACE); ++ } + p->ssize = len/(size_t)2*(size_t)3 + (size_t)1; /* ugh */ ++ assert(p->ssize >= len); ++ + p->strip = (sop *)malloc(p->ssize * sizeof(sop)); + p->slen = 0; + if (p->strip == NULL) { diff -Nru librcsb-core-wrapper-1.005/debian/patches/series librcsb-core-wrapper-1.005/debian/patches/series --- librcsb-core-wrapper-1.005/debian/patches/series 2014-09-18 21:11:53.0 +0200 +++ librcsb-core-wrapper-1.005/debian/patches/series 2015-02-14 17:44:47.0 +0100 @@ -11,3 +11,4 @@ spelling exit-in-shlib make_test_target +regcomp_cert_fix.patch --- End Message --- --- Begin Message --- On Sun, 2015-02-15 at 16:31 +0100, Andreas Tille wrote: > Please unblock package librcsb-core-wrapper > > A security problem was reported (#778397) against this package which is > fixed by this upload (see debdiff). Unblocked. Regards, Adam--- End Message ---
Bug#778444: unblock: brltty/5.2~20141018-4
On Sun, 2015-02-15 at 16:37 +0100, Samuel Thibault wrote: > Adam D. Barratt, le Sun 15 Feb 2015 12:20:57 +, a écrit : > > On Sun, 2015-02-15 at 02:53 +0100, Samuel Thibault wrote: > > > Please unblock package brltty > > > > > > While testing for bug #777377, we noticed that in some cases xbrlapi > > > erroneously writes some text, completely hiding the Orca screen reader > > > output until Orca is restarted (Bug #777574. In version 5.2~20141018-4 > > > of brltty I have uploaded the very trivial upstream fix for this. > > > > Unblocked, needs a d-i ack. > > xbrlapi is actually not part of d-i :) We were asked to get acks for unblocks for any source package that currently has a block-udeb hint. My understanding was that Cyril's request applied whether the changes affect the udeb(s) or not, but I'm happy for him to disagree. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1424015568.3384.8.ca...@adam-barratt.org.uk
Bug#773653: unblock: slim/1.3.6-4
Bump. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/54e0bed3.5090...@linuxmint.pl
Bug#778444: unblock: brltty/5.2~20141018-4
Adam D. Barratt, le Sun 15 Feb 2015 12:20:57 +, a écrit : > On Sun, 2015-02-15 at 02:53 +0100, Samuel Thibault wrote: > > Please unblock package brltty > > > > While testing for bug #777377, we noticed that in some cases xbrlapi > > erroneously writes some text, completely hiding the Orca screen reader > > output until Orca is restarted (Bug #777574. In version 5.2~20141018-4 > > of brltty I have uploaded the very trivial upstream fix for this. > > Unblocked, needs a d-i ack. xbrlapi is actually not part of d-i :) Samuel -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150215153722.gn4...@type.youpi.perso.aquilenet.fr
Bug#778475: unblock: librcsb-core-wrapper/1.005-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package librcsb-core-wrapper A security problem was reported (#778397) against this package which is fixed by this upload (see debdiff). Thanks for your work on the Debian release Andreas. unblock librcsb-core-wrapper/1.005-3 -- System Information: Debian Release: 7.8 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash diff -Nru librcsb-core-wrapper-1.005/debian/changelog librcsb-core-wrapper-1.005/debian/changelog --- librcsb-core-wrapper-1.005/debian/changelog 2014-09-18 21:53:44.0 +0200 +++ librcsb-core-wrapper-1.005/debian/changelog 2015-02-14 18:08:44.0 +0100 @@ -1,3 +1,11 @@ +librcsb-core-wrapper (1.005-3) unstable; urgency=medium + + * Patch for Henry Spencer regular expressions (regex) library contains +a heap overflow vulnerability +Closes: #778397 + + -- Andreas Tille Sat, 14 Feb 2015 17:56:49 +0100 + librcsb-core-wrapper (1.005-2) unstable; urgency=medium * Added libtool-bin as a build-dep (Closes: #761768). diff -Nru librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch --- librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch 1970-01-01 01:00:00.0 +0100 +++ librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch 2015-02-14 18:07:41.0 +0100 @@ -0,0 +1,43 @@ +Author: Andreas Tille +Last-Update: Sat, 14 Feb 2015 17:51:06 +0100 +Origin: https://gitweb.dragonflybsd.org/dragonfly.git/blobdiff_plain/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c +Bug-Debian: http://bugs.debian.org/778397 +Forwarded: sw-h...@rcsb.rutgers.edu, Vladimir Guranovic +Description: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability + This patch adapts the patch found at Origin (see above) to the + regex code found in librcsb-core-wrapper. + +--- librcsb-core-wrapper-1.005.orig/regex/src/regcomp.c librcsb-core-wrapper-1.005/regex/src/regcomp.c +@@ -93,6 +93,7 @@ int cflags; + register struct parse *p = &pa; + register int i; + register size_t len; ++ register size_t maxlen; + #ifdef REDEBUG + # define GOODFLAGS(f) (f) + #else +@@ -115,7 +116,23 @@ int cflags; + (NC-1)*sizeof(cat_t)); + if (g == NULL) + return(REG_ESPACE); ++ /* ++ * Limit the pattern space to avoid a 32-bit overflow on buffer ++ * extension. Also avoid any signed overflow in case of conversion ++ * so make the real limit based on a 31-bit overflow. ++ * ++ * Likely not applicable on 64-bit systems but handle the case ++ * generically (who are we to stop people from using ~715MB+ ++ * patterns?). ++ */ ++ maxlen = ((size_t)-1 >> 1) / sizeof(sop) * 2 / 3; ++ if (len >= maxlen) { ++ free((char *)g); ++ return(REG_ESPACE); ++ } + p->ssize = len/(size_t)2*(size_t)3 + (size_t)1; /* ugh */ ++ assert(p->ssize >= len); ++ + p->strip = (sop *)malloc(p->ssize * sizeof(sop)); + p->slen = 0; + if (p->strip == NULL) { diff -Nru librcsb-core-wrapper-1.005/debian/patches/series librcsb-core-wrapper-1.005/debian/patches/series --- librcsb-core-wrapper-1.005/debian/patches/series 2014-09-18 21:11:53.0 +0200 +++ librcsb-core-wrapper-1.005/debian/patches/series 2015-02-14 17:44:47.0 +0100 @@ -11,3 +11,4 @@ spelling exit-in-shlib make_test_target +regcomp_cert_fix.patch
Bug#778465: unblock: i3-wm/4.8-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package i3-wm 4.8-2 (which I have just uploaded) contains two backported bugfixes from upstream to address the serious issues #778460 and #778461. Both bugfixes are well-tested for many weeks and address common problems that users report over and over. Having them in the next stable release would be a great service to our users. debdiff: diff -Nru i3-wm-4.8/debian/changelog i3-wm-4.8/debian/changelog --- i3-wm-4.8/debian/changelog 2014-06-15 19:21:51.0 +0200 +++ i3-wm-4.8/debian/changelog 2015-02-15 13:24:57.0 +0100 @@ -1,3 +1,11 @@ +i3-wm (4.8-2) unstable; urgency=medium + + * Backport two bugfixes: +- backport-dpi-fix.patch (Closes: #778460) +- backport-i3bar-tray-fix.patch (Closes: #778461) + + -- Michael Stapelberg Sun, 15 Feb 2015 13:24:42 +0100 + i3-wm (4.8-1) unstable; urgency=medium * New upstream release. diff -Nru i3-wm-4.8/debian/patches/backport-dpi-fix.patch i3-wm-4.8/debian/patches/backport-dpi-fix.patch --- i3-wm-4.8/debian/patches/backport-dpi-fix.patch 1970-01-01 01:00:00.0 +0100 +++ i3-wm-4.8/debian/patches/backport-dpi-fix.patch 2015-02-15 13:22:18.0 +0100 @@ -0,0 +1,25 @@ +Description: Treat everything up to 120 dpi as 96 dpi +Author: Michael Stapelberg +Origin: https://github.com/i3/i3/commit/33d1d5d3c61a2136eb4b42ffd29870fd68d2d766 +Last-Update: 2015-02-15 + +--- + +Index: i3-wm-4.8/libi3/dpi.c +=== +--- i3-wm-4.8.orig/libi3/dpi.c i3-wm-4.8/libi3/dpi.c +@@ -12,5 +12,13 @@ extern xcb_screen_t *root_screen; + int logical_px(const int logical) { + const int dpi = (double)root_screen->height_in_pixels * 25.4 / + (double)root_screen->height_in_millimeters; ++/* There are many misconfigurations out there, i.e. systems with screens ++ * whose dpi is in fact higher than 96 dpi, but not significantly higher, ++ * so software was never adapted. We could tell people to reconfigure their ++ * systems to 96 dpi in order to get the behavior they expect/are used to, ++ * but since we can easily detect this case in code, let’s do it for them. ++ */ ++if ((dpi / 96.0) < 1.25) ++return logical; + return ceil((dpi / 96.0) * logical); + } diff -Nru i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch --- i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch 1970-01-01 01:00:00.0 +0100 +++ i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch 2015-02-15 13:23:19.0 +0100 @@ -0,0 +1,25 @@ +Description: add a sync call to i3bar to confirm reparents before exiting + Without this call, sometimes the tray icon windows are reparented into + i3’s container around the i3bar window, i.e. into the next remaining + window in the window hierarchy. Since i3 then closes that container + (since the i3bar window itself was closed), the tray window will also + get closed. In general, this weird interaction (getting reparented and + then closed) is not well received by tray icon providers :). +Author: Michael Stapelberg +Origin: https://github.com/i3/i3/commit/4699c714b33afb1c264f3d19911b880267165b94 +Last-Update: 2015-02-15 + +--- + +Index: i3-wm-4.8/i3bar/src/xcb.c +=== +--- i3-wm-4.8.orig/i3bar/src/xcb.c i3-wm-4.8/i3bar/src/xcb.c +@@ -1290,6 +1290,7 @@ void clean_xcb(void) { + FREE(outputs); + + xcb_flush(xcb_connection); ++xcb_aux_sync(xcb_connection); + xcb_disconnect(xcb_connection); + + ev_check_stop(main_loop, xcb_chk); diff -Nru i3-wm-4.8/debian/patches/series i3-wm-4.8/debian/patches/series --- i3-wm-4.8/debian/patches/series 2014-06-15 19:16:10.0 +0200 +++ i3-wm-4.8/debian/patches/series 2015-02-15 13:19:12.0 +0100 @@ -1,2 +1,4 @@ use-x-terminal-emulator.patch manpage-x-terminal-emulator.patch +backport-i3bar-tray-fix.patch +backport-dpi-fix.patch unblock i3-wm/4.8-2 -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (990, 'testing'), (600, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150215131031.5646.47605.report...@x200.zekjur.net
Processed: Re: Bug#774428: unblock: simpleburn/1.7.0-2
Processing control commands: > tags -1 + confirmed moreinfo Bug #774428 [release.debian.org] unblock: simpleburn/1.7.0-2 Added tag(s) confirmed. -- 774428: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774428 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b774428.14240032245329.transcr...@bugs.debian.org
Bug#774428: unblock: simpleburn/1.7.0-2
Control: tags -1 + confirmed moreinfo On Sun, 2015-02-15 at 11:07 +0100, John Paul Adrian Glaubitz wrote: > On 02/14/2015 03:54 PM, Mateusz Łukasik wrote: > > I think now it's done: > > http://mentors.debian.net/debian/pool/main/s/simpleburn/simpleburn_1.7.0-3.dsc > > Thanks! I trimmed down your changes a bit to increase the chance for an > unblock. > > Attaching the debdiff with the changes between 1.7.0-1 and 1.7.0-3 for > the release team. Please go ahead, and remove the "moreinfo" tag once the package is in unstable. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1424003214.3384.5.ca...@adam-barratt.org.uk
Processed: Re: Bug#778434: pre-approval: unblock: deluge/1.3.10-3
Processing control commands: > tags -1 + confirmed moreinfo Bug #778434 [release.debian.org] pre-approval: unblock: deluge/1.3.10-3 Added tag(s) confirmed and moreinfo. -- 778434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778434 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b778434.14240031234302.transcr...@bugs.debian.org
Bug#778434: pre-approval: unblock: deluge/1.3.10-3
Control: tags -1 + confirmed moreinfo On Sat, 2015-02-14 at 17:36 -0500, Andrew Starr-Bochicchio wrote: > Bug #770628 against deluged leaves the init script unusable, and more > importantly leaves dpkg in a broken state when purging the package. > I'd like to request pre-approval for the unblock request. > > + * Fix permissions on /var/lib/deluged/config/ in > +deluged.postinst and properly remove all > +dpkg-statoverrides in deluged.postrm (Closes: #770628). Please go ahead, and remove the "moreinfo" tag once the package is in unstable. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1424003115.3384.4.ca...@adam-barratt.org.uk
Processed: Re: Bug#778444: unblock: brltty/5.2~20141018-4
Processing control commands: > tags -1 + confirmed d-i Bug #778444 [release.debian.org] unblock: brltty/5.2~20141018-4 Added tag(s) d-i and confirmed. -- 778444: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778444 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b778444.14240028673211.transcr...@bugs.debian.org
Bug#778444: unblock: brltty/5.2~20141018-4
Control: tags -1 + confirmed d-i On Sun, 2015-02-15 at 02:53 +0100, Samuel Thibault wrote: > Please unblock package brltty > > While testing for bug #777377, we noticed that in some cases xbrlapi > erroneously writes some text, completely hiding the Orca screen reader > output until Orca is restarted (Bug #777574. In version 5.2~20141018-4 > of brltty I have uploaded the very trivial upstream fix for this. Unblocked, needs a d-i ack. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1424002857.3384.2.ca...@adam-barratt.org.uk
Re: Bug#777597: perl-modules: upgrade regression: dpkg: dependency problems prevent configuration of perl-modules
(Dropping Sven and Andreas but adding the release team; there's a question for you lower in the mail.) On Tue, Feb 10, 2015 at 10:19:18PM +0200, Niko Tyni wrote: > It looks like a bug in apt to me. The perl/perl-modules circular dependency > has been around for ages and should be easy to break, but I suppose apt > is trying to configure them in separate dpkg runs or something like that. > > If it's actually reproducible this time (I haven't tried yet), that > hopefully helps in understanding the issue. Sven Joachim's analysis in > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767734#10 > sounds good, but it doesn't quite fit here as that particular apt bug > shouldn't be present in wheezy (or jessie, for that matter) at all. FWIW I wasn't able to reproduce it on Wednesday or Friday, which is a bit strange as Gregor said he could. Apt maintainers: there's plenty of debug output in the log Andreas supplied. Is that enough for you to understand the problem, or would you like something more? > Relaxing the circular dependency is a workaround that might be doable, > even though it would be 'incorrect'. There are modules in perl that > need others in perl-modules, and vice versa. However, I count only 21 > binary packages in sid [1] that depend on perl-modules but not perl. > As perl is transitively build essential (via dpkg-dev and libdpkg-perl), > build dependencies should not be a concern at all. There are a few packages that pull in perl indirectly through their other dependencies, which brings the count of binary packages that only depend on perl-modules down to 15: cli-common patcher polygen-data pristine-tar pure-ftpd-common rinse shorewall shorewall-core snort-common # not in jessie squid# not in jessie tvtime mono-apache-server2 mono-apache-server4 mono-fastcgi-server2 mono-fastcgi-server4 I haven't checked if these would actually be broken if the perl-modules -> perl dependency was relaxed. Even if they wouldn't break, I would very much prefer if they were fixed to depend on perl instead, to lower chances of users encountering systems with perl-modules but not perl. Release team: if we don't find another solution, would you be willing to allow changes in these packages replacing Depends: perl-modules with Depends: perl into jessie? (Unfortunately my Debian time will be quite scarce for the next week or so, so I won't be able to work much on this.) -- Niko Tyni nt...@debian.org -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150215115732.GC5711@estella.local.invalid
Bug#774428: unblock: simpleburn/1.7.0-2
On 02/14/2015 03:54 PM, Mateusz Łukasik wrote: > I think now it's done: > http://mentors.debian.net/debian/pool/main/s/simpleburn/simpleburn_1.7.0-3.dsc Thanks! I trimmed down your changes a bit to increase the chance for an unblock. Attaching the debdiff with the changes between 1.7.0-1 and 1.7.0-3 for the release team. Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer - glaub...@debian.org `. `' Freie Universitaet Berlin - glaub...@physik.fu-berlin.de `-GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913 diff -Nru simpleburn-1.7.0/debian/changelog simpleburn-1.7.0/debian/changelog --- simpleburn-1.7.0/debian/changelog 2014-07-28 14:22:17.0 +0200 +++ simpleburn-1.7.0/debian/changelog 2015-02-15 10:52:28.0 +0100 @@ -1,3 +1,21 @@ +simpleburn (1.7.0-3) unstable; urgency=medium + + * Drop fix-bashisms.patch which contained errors and was +too invasive to be considered during the Jessie freeze. + * Add debian/patches/replace_shebangs.patch to replace all +#!/bin/sh shebangs with #!/bin/bash. (Closes: #772365) + + -- Mateusz Åukasik Sat, 14 Feb 2015 15:46:32 +0100 + +simpleburn (1.7.0-2) unstable; urgency=medium + + * Add patch to fix bashism in /bin/sh script -- thanks to +Georges Khaznadar for the help. +(Closes: #772365) + * Bump Standards-Version to 3.9.6 (no changes needed). + + -- Mateusz Åukasik Wed, 31 Dec 2014 15:22:53 +0100 + simpleburn (1.7.0-1) unstable; urgency=medium * New upstream release. (LP: #1279659) diff -Nru simpleburn-1.7.0/debian/control simpleburn-1.7.0/debian/control --- simpleburn-1.7.0/debian/control 2014-02-11 12:18:00.0 +0100 +++ simpleburn-1.7.0/debian/control 2014-12-31 15:13:28.0 +0100 @@ -4,7 +4,7 @@ Maintainer: Mateusz Åukasik Build-Depends: debhelper (>= 9), cmake (>= 2.6), pkg-config, libudev-dev, libburn-dev, libgtk2.0-dev (>= 2.12) -Standards-Version: 3.9.5 +Standards-Version: 3.9.6 Homepage: http://simpleburn.tuxfamily.org Vcs-Git: git://github.com/mati75/simpleburn.git Vcs-Browser: https://github.com/mati75/simpleburn.git diff -Nru simpleburn-1.7.0/debian/patches/replace_shebangs.patch simpleburn-1.7.0/debian/patches/replace_shebangs.patch --- simpleburn-1.7.0/debian/patches/replace_shebangs.patch 1970-01-01 01:00:00.0 +0100 +++ simpleburn-1.7.0/debian/patches/replace_shebangs.patch 2015-02-15 10:43:08.0 +0100 @@ -0,0 +1,34 @@ +Description: Replace all #!/bin/sh shebangs with #!/bin/bash +Author: Mateusz Åukasik +Bug-Debian: https://bugs.debian.org/772365 + +Index: simpleburn-1.7.0/scripts/simpleburn-detect.sh +=== +--- simpleburn-1.7.0.orig/scripts/simpleburn-detect.sh simpleburn-1.7.0/scripts/simpleburn-detect.sh +@@ -1,4 +1,4 @@ +-#!/bin/sh ++#!/bin/bash + + function detect() { + device=$1 #assumes it is a valid CD / DVD device +Index: simpleburn-1.7.0/scripts/simpleburn-gauges.sh +=== +--- simpleburn-1.7.0.orig/scripts/simpleburn-gauges.sh simpleburn-1.7.0/scripts/simpleburn-gauges.sh +@@ -1,4 +1,4 @@ +-#!/bin/sh ++#!/bin/bash + + function mencodergauge () { + totalsize=$1 #bytes +Index: simpleburn-1.7.0/scripts/simpleburn.sh +=== +--- simpleburn-1.7.0.orig/scripts/simpleburn.sh simpleburn-1.7.0/scripts/simpleburn.sh +@@ -1,4 +1,4 @@ +-#!/bin/sh ++#!/bin/bash + + function printusage() { + echo "error: invalid parameters" diff -Nru simpleburn-1.7.0/debian/patches/series simpleburn-1.7.0/debian/patches/series --- simpleburn-1.7.0/debian/patches/series 2013-07-23 00:00:00.0 +0200 +++ simpleburn-1.7.0/debian/patches/series 2015-02-15 10:51:29.0 +0100 @@ -1 +1,2 @@ fix_desktop.patch +replace_shebangs.patch
Bug#778430: marked as done (unblock: vigor/0.016-24)
Your message dated Sun, 15 Feb 2015 10:17:48 +0100 with message-id <20150215091747.ga...@ugent.be> and subject line Re: Bug#778430: unblock: vigor/0.016-24 has caused the Debian Bug report #778430, regarding unblock: vigor/0.016-24 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 778430: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778430 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock vigor; it fixes a heap overflow in the best possible way, by no longer building the affected code and letting libc take care of it instead. (I've had the Vcs-Browser change staged for ages, and it didn't seem worth moving off to a different branch.) diff --git a/debian/changelog b/debian/changelog index 1a213b4..9c70f3e 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +vigor (0.016-24) unstable; urgency=medium + + * Update Vcs-Browser URL for alioth cgit. + * Use libc's regex routines rather than the bundled ones, to avoid needing +to apply security patches independently (closes: #778409). + + -- Colin Watson Sat, 14 Feb 2015 21:17:07 + + vigor (0.016-23) unstable; urgency=low * Add a header to debian/patches/client-side-fonts.patch. diff --git a/debian/control b/debian/control index 4a5dc15..30f88de 100644 --- a/debian/control +++ b/debian/control @@ -6,7 +6,7 @@ Build-Depends: dpkg-dev (>= 1.16.1~), debhelper (>= 9~), dh-autoreconf, autotool Standards-Version: 3.5.7 Homepage: http://vigor.sourceforge.net/ Vcs-Git: git://anonscm.debian.org/users/cjwatson/vigor.git -Vcs-Browser: http://anonscm.debian.org/gitweb/?p=users/cjwatson/vigor.git +Vcs-Browser: http://anonscm.debian.org/cgit/users/cjwatson/vigor.git/ Package: vigor Architecture: any diff --git a/debian/rules b/debian/rules index 8eea6eb..d1c64c9 100755 --- a/debian/rules +++ b/debian/rules @@ -19,7 +19,7 @@ override_dh_autoreconf: dh_autoreconf debian/rules -- autoreconf override_dh_auto_configure: - dh_auto_configure -- --with-x --enable-db --enable-re + dh_auto_configure -- --with-x --enable-db ifneq ($(DEB_BUILD_GNU_TYPE),$(DEB_HOST_GNU_TYPE)) override_dh_auto_build: unblock vigor/0.016-24 Thanks, -- Colin Watson [cjwat...@debian.org] --- End Message --- --- Begin Message --- Hi, On Sat, Feb 14, 2015 at 10:11:56PM +, Colin Watson wrote: > Please unblock vigor; Unblocked. Cheers, Ivo--- End Message ---