Bug#778505: unblock: gnome-orca/3.14.0-4

2015-02-15 Thread Samuel Thibault
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package gnome-orca

Upstream Orca fixed an issue with LibreOffice which improves its
accessibility a lot with a very simple change.  I have uploaded it as
3.14.0-4, as attached.

unblock gnome-orca/3.14.0-4

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'buildd-unstable'), (500, 'unstable'), 
(500, 'stable'), (500, 'oldstable'), (1, 'buildd-experimental'), (1, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.19.0 (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)

-- 
Samuel
(03:13:14)  bon
(03:13:19)  il est tard :p
(03:13:25)  c'est l'heure de manger
(03:13:38)  hm j'ai mangé à 1h moi, j'ai des horaires raisonnables
diff -Nru gnome-orca-3.14.0/debian/changelog gnome-orca-3.14.0/debian/changelog
--- gnome-orca-3.14.0/debian/changelog  2015-02-07 20:49:39.0 +0100
+++ gnome-orca-3.14.0/debian/changelog  2015-02-15 23:51:26.0 +0100
@@ -1,3 +1,11 @@
+gnome-orca (3.14.0-4) unstable; urgency=medium
+
+  * Team upload.
+  * patches/libreoffice: New patch to fix various issues with LibreOffice.
+Closes: #766686.
+
+ -- Samuel Thibault   Sun, 15 Feb 2015 23:51:25 +0100
+
 gnome-orca (3.14.0-3) unstable; urgency=medium
 
   * Team upload.
diff -Nru gnome-orca-3.14.0/debian/control gnome-orca-3.14.0/debian/control
--- gnome-orca-3.14.0/debian/control2015-02-07 20:51:42.0 +0100
+++ gnome-orca-3.14.0/debian/control2015-02-15 23:56:10.0 +0100
@@ -6,7 +6,7 @@
 Section: gnome
 Priority: optional
 Maintainer: Debian Accessibility Team 
-Uploaders: Andreas Henriksson , Debian GNOME Maintainers 
, Jordi Mallach 
, Mario Lang , Michael Biebl 

+Uploaders: Andreas Henriksson , Debian GNOME Maintainers 
, Mario Lang , 
Michael Biebl 
 Build-Depends: cdbs (>= 0.4.90~),
debhelper (>= 9),
autotools-dev,
diff -Nru gnome-orca-3.14.0/debian/patches/libreoffice 
gnome-orca-3.14.0/debian/patches/libreoffice
--- gnome-orca-3.14.0/debian/patches/libreoffice1970-01-01 
01:00:00.0 +0100
+++ gnome-orca-3.14.0/debian/patches/libreoffice2015-02-15 
23:50:42.0 +0100
@@ -0,0 +1,22 @@
+commit 9dc9b6dc8b6bb4d7092e2c0ad6e7973340fa023a
+Author: Joanmarie Diggs 
+Date:   Mon Feb 9 13:02:00 2015 -0500
+
+Work around another case of dead LibreOffice accessible objects
+
+diff --git a/src/orca/scripts/apps/soffice/script_utilities.py 
b/src/orca/scripts/apps/soffice/script_utilities.py
+index 3409e73..0e3508f 100644
+--- a/src/orca/scripts/apps/soffice/script_utilities.py
 b/src/orca/scripts/apps/soffice/script_utilities.py
+@@ -83,7 +83,10 @@ class Utilities(script_utilities.Utilities):
+ if text.strip():
+ return text
+ 
+-text = script_utilities.Utilities.displayedText(self, obj)
++try:
++text = script_utilities.Utilities.displayedText(self, obj)
++except:
++return ""
+ 
+ # TODO - JD: This is needed because the default behavior is to fall
+ # back on the name, which is bogus. Once that has been fixed, this
diff -Nru gnome-orca-3.14.0/debian/patches/series 
gnome-orca-3.14.0/debian/patches/series
--- gnome-orca-3.14.0/debian/patches/series 2015-02-07 20:37:37.0 
+0100
+++ gnome-orca-3.14.0/debian/patches/series 2015-02-15 23:50:51.0 
+0100
@@ -1,2 +1,3 @@
 mate-notifications.diff
 lightdm
+libreoffice


Bug#776458: unblock: dolibarr/3.5.5+dfsg1-1

2015-02-15 Thread Laurent Destailleur (aka Eldy)
This is my point of view of what to do for this case:

My first choice was to not send any unblock request. Reaon is that CVE need
privileged account to be exploited, so it is not a high risk, and I would
not like to bother anybody.

However, Moritz Muehlenhoff ask me to provide a fix. A fix was already done
before the CVE was reported on debian. It is the version 3.5.5. So idea was
to send an unblock request to validate this version. That's what Raphael
did for me (i received a bounce when doing it myself).
This is clearly the choice I recommand for 2 reasons:
- On debian, only one CVE was reported, but several others were reported to
project directly. Why adding a CVE fix that will include only fixes for the
debian CVE and not others ? I think it is better to include others too.
- This version and package 3.5.5 is a long term production version. Even if
not into debian, it has been released several month ago into tgz package
and is really very more stable than current 3.5.4. So if stability of
application is a consideration, i think this package is a best choice than
a target fix because it fixes other stability bugs (3.5.5 fixes only bugs).
I think it is a better choice more secure because the CVE reported into
debian is not "one" security report but a long list of several holes (all
require privileged account however), so fixing it need a lof of changes on
a lof of files. Reporting locally all fixes for only this CVE is a high
risk to forget and miss something where we are sure that 3.5.5 is complete
and stable.

I share point of view of Rapĥael thinking that making a targeted fix does
not bring us more security, i will tell more, I think a targetted fix is
less secured than 3.5.5 since this version is the official version in
production for branch 3.5.5  since begin of october 2014 and no other
packages depends on it.




2015-02-09 10:02 GMT+01:00 Raphael Hertzog :

> Hi,
>
> On Sun, 08 Feb 2015, Ivo De Decker wrote:
> > On Wed, Jan 28, 2015 at 09:50:30AM +0100, Raphael Hertzog wrote:
> > > Please unblock package dolibarr
> >
> > > Version 3.5.5+dfsg1-1 fixes a security issue: CVE-2014-7137 (Closes:
> #770313)
> >
> > This bug was filed by the security team as 'grave', but downgraded by the
> > maintainer to 'important' without explanation. If the issue is actually
> grave,
> > the severity should be increased again.
>
> Well, the maintainer explained (to me only apparently) that the issue is
> only exploitable with privileged accounts so that the threat is not very
> high and I thus instructed him that it's his reponsibility to downgrade
> the bug if he doesn't want the packages to be removed from Jessie.
>
> Later the security team contacted him about this CVE and asked him to
> request an unblock because it would be better to release Jessie without
> an open CVE on dolibarr.
>
> > The diff is very large, and it probably contains lots of changes that
> are not
> > appropriate at this point of the freeze. If you think this is not the
> case,
> > please explain why.
>
> It's certainly the case, but the package is a leaf package and the fixed
> version has been well tested in sid.
>
> The package maintainer is also the upstream author.
>
> > A targeted fix for this issue is probably better.
>
> I don't see what a targeted fix brings us given that the only risk of
> regression is in dolibarr itself (and Dolibarr is maintained).
>
> Laurent, what's you opinion? Would you be willing to prepare a targeted
> fix?
>
> Cheers,
> --
> Raphaël Hertzog ◈ Debian Developer
>
> Support Debian LTS: http://www.freexian.com/services/debian-lts.html
> Learn to master Debian: http://debian-handbook.info/get/
>


Bug#767781: marked as done (unblock: matplotlib/1.4.2-3.1)

2015-02-15 Thread Debian Bug Tracking System
Your message dated Sun, 15 Feb 2015 22:56:54 +0100
with message-id <20150215215653.ga27...@ugent.be>
and subject line Re: Bug#767781: unblock: matplotlib/1.4.2-3
has caused the Debian Bug report #767781,
regarding unblock: matplotlib/1.4.2-3.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
767781: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767781
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package matplotlib

1.4 series is the latest release of mpl, and it will be the one upstream will
support during Jessie lifecycle. It has been in Debian since Sept (in
experimental) and it would have made the cut for the freeze if not for some
uploads for upstream bugfixes and build system deadlock fixes.

This version is built on all the buildd except mips, but that arch has a long
queue, with big packages still to build before mpl.

Please consider unblocking it.

unblock matplotlib/1.4.2-3

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 
'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
Hi,

On Sat, Feb 14, 2015 at 12:00:19AM -0500, Michael Gilbert wrote:
> It seems like it might be worse to go with an unsupported and untested
> wx/matplotlib configuration, so even though the changes are big
> between testing and unstable, 1.4 is probably a much better choice for
> jessie.

Unblocked matplotlib/1.4.2-3.1

Cheers,

Ivo--- End Message ---


Bug#778492: unblock: ndisc6/1.0.1-2

2015-02-15 Thread Michael Gilbert
package: release.debian.org
user: release.debian@packages.debian.org
usertags: unblock
severity: normal
x-debbugs-cc: debian-b...@lists.debian.org

Please consider unblocking ndisc6.  I did a QA upload to fix bug #740998.

The kfreebsd builds are missing because of #764692, which sounds
unlikely to be fixed for jessie.

unblock ndisc6/1.0.1-2
unblock-udeb ndisc6/1.0.1-2
diff -u ndisc6-1.0.1/debian/control ndisc6-1.0.1/debian/control
--- ndisc6-1.0.1/debian/control
+++ ndisc6-1.0.1/debian/control
@@ -1,7 +1,7 @@
 Source: ndisc6
 Section: net
 Priority: optional
-Maintainer: Rémi Denis-Courmont 
+Maintainer: Debian QA Group 
 Build-Depends: cdbs, debhelper (>= 7), autotools-dev, gettext
 Standards-Version: 3.9.1
 Homepage: http://www.remlab.net/ndisc6/
@@ -40,6 +40,7 @@
 Depends: ${shlibs:Depends}, ${perl:Depends}, ${misc:Depends}
 Recommends: resolvconf
 Suggests: ndisc6
+Conflicts: network-manager
 Description: IPv6 recursive DNS server discovery daemon
  rdnssd autoconfigures recursive DNS servers on IPv6 networks
  using ICMPv6 Neighbor Discovery (RFC 5006), and can update the
diff -u ndisc6-1.0.1/debian/changelog ndisc6-1.0.1/debian/changelog
--- ndisc6-1.0.1/debian/changelog
+++ ndisc6-1.0.1/debian/changelog
@@ -1,3 +1,11 @@
+ndisc6 (1.0.1-2) unstable; urgency=medium
+
+  * QA upload.
+  * Set maintainer to the Debian QA Group (see #713004).
+  * Add conflicts between rdnssd and network-manager (closes: #740998).
+
+ -- Michael Gilbert   Sat, 14 Feb 2015 01:16:37 +
+
 ndisc6 (1.0.1-1) unstable; urgency=low
 
   * New upstream release:


Processed: tagging 778434

2015-02-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 778434 - moreinfo
Bug #778434 [release.debian.org] pre-approval: unblock: deluge/1.3.10-3
Removed tag(s) moreinfo.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
778434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778434
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.1424020035643.transcr...@bugs.debian.org



Bug#778465: marked as done (unblock: i3-wm/4.8-2)

2015-02-15 Thread Debian Bug Tracking System
Your message dated Sun, 15 Feb 2015 17:12:10 +0100
with message-id <20150215161210.gb2...@ugent.be>
and subject line Re: Bug#778465: unblock: i3-wm/4.8-2
has caused the Debian Bug report #778465,
regarding unblock: i3-wm/4.8-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
778465: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778465
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package i3-wm

4.8-2 (which I have just uploaded) contains two backported bugfixes from
upstream to address the serious issues #778460 and #778461. Both bugfixes are
well-tested for many weeks and address common problems that users report over
and over. Having them in the next stable release would be a great service to
our users.

debdiff:

diff -Nru i3-wm-4.8/debian/changelog i3-wm-4.8/debian/changelog
--- i3-wm-4.8/debian/changelog  2014-06-15 19:21:51.0 +0200
+++ i3-wm-4.8/debian/changelog  2015-02-15 13:24:57.0 +0100
@@ -1,3 +1,11 @@
+i3-wm (4.8-2) unstable; urgency=medium
+
+  * Backport two bugfixes:
+- backport-dpi-fix.patch (Closes: #778460)
+- backport-i3bar-tray-fix.patch (Closes: #778461)
+
+ -- Michael Stapelberg   Sun, 15 Feb 2015 13:24:42 +0100
+
 i3-wm (4.8-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru i3-wm-4.8/debian/patches/backport-dpi-fix.patch 
i3-wm-4.8/debian/patches/backport-dpi-fix.patch
--- i3-wm-4.8/debian/patches/backport-dpi-fix.patch 1970-01-01 
01:00:00.0 +0100
+++ i3-wm-4.8/debian/patches/backport-dpi-fix.patch 2015-02-15 
13:22:18.0 +0100
@@ -0,0 +1,25 @@
+Description: Treat everything up to 120 dpi as 96 dpi
+Author: Michael Stapelberg 
+Origin: 
https://github.com/i3/i3/commit/33d1d5d3c61a2136eb4b42ffd29870fd68d2d766
+Last-Update: 2015-02-15
+
+---
+
+Index: i3-wm-4.8/libi3/dpi.c
+===
+--- i3-wm-4.8.orig/libi3/dpi.c
 i3-wm-4.8/libi3/dpi.c
+@@ -12,5 +12,13 @@ extern xcb_screen_t *root_screen;
+ int logical_px(const int logical) {
+ const int dpi = (double)root_screen->height_in_pixels * 25.4 /
+ (double)root_screen->height_in_millimeters;
++/* There are many misconfigurations out there, i.e. systems with screens
++ * whose dpi is in fact higher than 96 dpi, but not significantly higher,
++ * so software was never adapted. We could tell people to reconfigure 
their
++ * systems to 96 dpi in order to get the behavior they expect/are used to,
++ * but since we can easily detect this case in code, let’s do it for them.
++ */
++if ((dpi / 96.0) < 1.25)
++return logical;
+ return ceil((dpi / 96.0) * logical);
+ }
diff -Nru i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch 
i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch
--- i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch  1970-01-01 
01:00:00.0 +0100
+++ i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch  2015-02-15 
13:23:19.0 +0100
@@ -0,0 +1,25 @@
+Description: add a sync call to i3bar to confirm reparents before exiting
+ Without this call, sometimes the tray icon windows are reparented into
+ i3’s container around the i3bar window, i.e. into the next remaining
+ window in the window hierarchy. Since i3 then closes that container
+ (since the i3bar window itself was closed), the tray window will also
+ get closed. In general, this weird interaction (getting reparented and
+ then closed) is not well received by tray icon providers :).
+Author: Michael Stapelberg 
+Origin: 
https://github.com/i3/i3/commit/4699c714b33afb1c264f3d19911b880267165b94
+Last-Update: 2015-02-15
+
+---
+
+Index: i3-wm-4.8/i3bar/src/xcb.c
+===
+--- i3-wm-4.8.orig/i3bar/src/xcb.c
 i3-wm-4.8/i3bar/src/xcb.c
+@@ -1290,6 +1290,7 @@ void clean_xcb(void) {
+ FREE(outputs);
+ 
+ xcb_flush(xcb_connection);
++xcb_aux_sync(xcb_connection);
+ xcb_disconnect(xcb_connection);
+ 
+ ev_check_stop(main_loop, xcb_chk);
diff -Nru i3-wm-4.8/debian/patches/series i3-wm-4.8/debian/patches/series
--- i3-wm-4.8/debian/patches/series 2014-06-15 19:16:10.0 +0200
+++ i3-wm-4.8/debian/patches/series 2015-02-15 13:19:12.0 +0100
@@ -1,2 +1,4 @@
 use-x-terminal-emulator.patch
 manpage-x-terminal-emulator.patch
+backport-i3bar-tray-fix.patch
+backport-dpi-fix.patch


unblock i3-wm/4.8-2

-- System Information

Bug#774428: marked as done (unblock: simpleburn/1.7.0-2)

2015-02-15 Thread Debian Bug Tracking System
Your message dated Sun, 15 Feb 2015 17:09:53 +0100
with message-id <20150215160953.ga2...@ugent.be>
and subject line Re: Bug#774428: unblock: simpleburn/1.7.0-2
has caused the Debian Bug report #774428,
regarding unblock: simpleburn/1.7.0-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
774428: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774428
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: patch
User: release.debian@packages.debian.org
Usertags: unblock

Hello!

I just reviewed and uploaded simpleburn 1.7.0-2 which contains
a patch by Georges Khaznadar to address #772365 which is an
RC bug.

I am attaching the debdiff which shows the additional patch
to fix the bashisms as well as the respective changelog
entry in debian/changelog.

Please unblock simpleburn_1.7.0-2 so we can fix this bug
for Jessie. Thanks!

Cheers,
Adrian

unblock simpleburn/1.7.0-2

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (500, 'testing'), (99, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru simpleburn-1.7.0/debian/changelog simpleburn-1.7.0/debian/changelog
--- simpleburn-1.7.0/debian/changelog	2014-07-28 14:22:17.0 +0200
+++ simpleburn-1.7.0/debian/changelog	2015-01-02 17:03:12.0 +0100
@@ -1,3 +1,12 @@
+simpleburn (1.7.0-2) unstable; urgency=medium
+
+  * Add patch to fix bashism in /bin/sh script -- thanks to
+Georges Khaznadar  for the help.
+(Closes: #772365)
+  * Bump Standards-Version to 3.9.6 (no changes needed).
+
+ -- Mateusz Łukasik   Wed, 31 Dec 2014 15:22:53 +0100
+
 simpleburn (1.7.0-1) unstable; urgency=medium
 
   * New upstream release. (LP: #1279659)
diff -Nru simpleburn-1.7.0/debian/control simpleburn-1.7.0/debian/control
--- simpleburn-1.7.0/debian/control	2014-02-11 12:18:00.0 +0100
+++ simpleburn-1.7.0/debian/control	2014-12-31 15:13:28.0 +0100
@@ -4,7 +4,7 @@
 Maintainer: Mateusz Łukasik 
 Build-Depends: debhelper (>= 9), cmake (>= 2.6), pkg-config, libudev-dev,
  libburn-dev, libgtk2.0-dev (>= 2.12) 
-Standards-Version: 3.9.5
+Standards-Version: 3.9.6
 Homepage: http://simpleburn.tuxfamily.org
 Vcs-Git: git://github.com/mati75/simpleburn.git
 Vcs-Browser: https://github.com/mati75/simpleburn.git
diff -Nru simpleburn-1.7.0/debian/patches/fix-bashisms.patch simpleburn-1.7.0/debian/patches/fix-bashisms.patch
--- simpleburn-1.7.0/debian/patches/fix-bashisms.patch	1970-01-01 01:00:00.0 +0100
+++ simpleburn-1.7.0/debian/patches/fix-bashisms.patch	2014-12-31 15:16:21.0 +0100
@@ -0,0 +1,588 @@
+Description: fix bashism in /bin/sh script
+Author: Georges Khaznadar 
+Bug-Debian: https://bugs.debian.org/772365
+
+--- a/scripts/simpleburn-detect.sh
 b/scripts/simpleburn-detect.sh
+@@ -1,6 +1,6 @@
+ #!/bin/sh
+ 
+-function detect() {
++detect() {
+ 	device=$1 #assumes it is a valid CD / DVD device
+ 	readcd dev=$device -fulltoc 2>/dev/null; rm -f  ~/toc.dat; rm -f toc.dat #wait for loading
+ 	if cdrom_id $device | grep -q "ID_CDROM_MEDIA"; then
+@@ -22,7 +22,7 @@ function detect() {
+ if [ -z "$mediacapacity" ]; then
+ 	mediacapacity=`cdrecord -atip dev=$device 2>&1 | grep "phys size:..." | tail -1 | sed 's/phys size:... \+//'`
+ fi
+-let mediacapacity=mediacapacity*2048
++mediacapacity=$((mediacapacity*2048))
+ 			fi
+ 			{ mplayer -dvd-device $device dvd://1 -identify -vo null -ao null -frames 0 2>&1 > /tmp/simpleburn-detect.$$ ;} 2>&1 >/dev/null
+ 			if grep -q "ID_DVD_TITLES" /tmp/simpleburn-detect.$$; then
+@@ -31,13 +31,13 @@ function detect() {
+ for title in `cat  /tmp/simpleburn-detect.$$ | grep "TITLE_[0-9]\+_LENGTH"`; do #for each title during more than 3'
+ 	titlenum=`echo $title | cut -d'_' -f4`
+ 	titlelenght=`echo $title | cut -d'=' -f2 | cut -f1 -d'.'`
+-	let minutes=titlelenght/60
+-	if (( minutes > 3 )); then
+-		if (( $titlenum != 1 )); then
++	minutes=$((titlelenght/60))
++	if [ $(( minutes > 3 )) = 1 ]; then
++		if [ $(( $titlenum != 1 )) = 1 ]; then
+ 			{ mplayer -dvd-device $device dvd://$titlenum -identify -vo null -ao null -frames 0 2>&1 > /tmp/simpleburn-detect.$$; } 2>&1 >/dev/null
+ 		fi
+ 		if grep -q "ID_AID" /tmp/simpleburn-detect.$$ && grep -q "ID_SID" /tmp/simpleburn-detect.

Bug#778475: marked as done (unblock: librcsb-core-wrapper/1.005-3)

2015-02-15 Thread Debian Bug Tracking System
Your message dated Sun, 15 Feb 2015 15:54:56 +
with message-id <1424015696.3384.9.ca...@adam-barratt.org.uk>
and subject line Re: Bug#778475: unblock: librcsb-core-wrapper/1.005-3
has caused the Debian Bug report #778475,
regarding unblock: librcsb-core-wrapper/1.005-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
778475: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778475
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package librcsb-core-wrapper

A security problem was reported (#778397) against this package which is
fixed by this upload (see debdiff).

Thanks for your work on the Debian release

 Andreas.


unblock librcsb-core-wrapper/1.005-3

-- System Information:
Debian Release: 7.8
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru librcsb-core-wrapper-1.005/debian/changelog librcsb-core-wrapper-1.005/debian/changelog
--- librcsb-core-wrapper-1.005/debian/changelog	2014-09-18 21:53:44.0 +0200
+++ librcsb-core-wrapper-1.005/debian/changelog	2015-02-14 18:08:44.0 +0100
@@ -1,3 +1,11 @@
+librcsb-core-wrapper (1.005-3) unstable; urgency=medium
+
+  * Patch for Henry Spencer regular expressions (regex) library contains
+a heap overflow vulnerability
+Closes: #778397
+
+ -- Andreas Tille   Sat, 14 Feb 2015 17:56:49 +0100
+
 librcsb-core-wrapper (1.005-2) unstable; urgency=medium
 
   * Added libtool-bin as a build-dep (Closes: #761768).
diff -Nru librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch
--- librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch	1970-01-01 01:00:00.0 +0100
+++ librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch	2015-02-14 18:07:41.0 +0100
@@ -0,0 +1,43 @@
+Author: Andreas Tille 
+Last-Update: Sat, 14 Feb 2015 17:51:06 +0100
+Origin: https://gitweb.dragonflybsd.org/dragonfly.git/blobdiff_plain/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c
+Bug-Debian: http://bugs.debian.org/778397
+Forwarded: sw-h...@rcsb.rutgers.edu, Vladimir Guranovic 
+Description: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability
+ This patch adapts the patch found at Origin (see above) to the
+ regex code found in librcsb-core-wrapper.
+
+--- librcsb-core-wrapper-1.005.orig/regex/src/regcomp.c
 librcsb-core-wrapper-1.005/regex/src/regcomp.c
+@@ -93,6 +93,7 @@ int cflags;
+ 	register struct parse *p = &pa;
+ 	register int i;
+ 	register size_t len;
++	register size_t maxlen;
+ #ifdef REDEBUG
+ #	define	GOODFLAGS(f)	(f)
+ #else
+@@ -115,7 +116,23 @@ int cflags;
+ 			(NC-1)*sizeof(cat_t));
+ 	if (g == NULL)
+ 		return(REG_ESPACE);
++	/*
++	 * Limit the pattern space to avoid a 32-bit overflow on buffer
++	 * extension.  Also avoid any signed overflow in case of conversion
++	 * so make the real limit based on a 31-bit overflow.
++	 *
++	 * Likely not applicable on 64-bit systems but handle the case
++	 * generically (who are we to stop people from using ~715MB+
++	 * patterns?).
++	 */
++	maxlen = ((size_t)-1 >> 1) / sizeof(sop) * 2 / 3;
++	if (len >= maxlen) {
++		free((char *)g);
++		return(REG_ESPACE);
++	}
+ 	p->ssize = len/(size_t)2*(size_t)3 + (size_t)1;	/* ugh */
++	assert(p->ssize >= len);
++
+ 	p->strip = (sop *)malloc(p->ssize * sizeof(sop));
+ 	p->slen = 0;
+ 	if (p->strip == NULL) {
diff -Nru librcsb-core-wrapper-1.005/debian/patches/series librcsb-core-wrapper-1.005/debian/patches/series
--- librcsb-core-wrapper-1.005/debian/patches/series	2014-09-18 21:11:53.0 +0200
+++ librcsb-core-wrapper-1.005/debian/patches/series	2015-02-14 17:44:47.0 +0100
@@ -11,3 +11,4 @@
 spelling
 exit-in-shlib
 make_test_target
+regcomp_cert_fix.patch
--- End Message ---
--- Begin Message ---
On Sun, 2015-02-15 at 16:31 +0100, Andreas Tille wrote:
> Please unblock package librcsb-core-wrapper
> 
> A security problem was reported (#778397) against this package which is
> fixed by this upload (see debdiff).

Unblocked.

Regards,

Adam--- End Message ---


Bug#778444: unblock: brltty/5.2~20141018-4

2015-02-15 Thread Adam D. Barratt
On Sun, 2015-02-15 at 16:37 +0100, Samuel Thibault wrote:
> Adam D. Barratt, le Sun 15 Feb 2015 12:20:57 +, a écrit :
> > On Sun, 2015-02-15 at 02:53 +0100, Samuel Thibault wrote:
> > > Please unblock package brltty
> > > 
> > > While testing for bug #777377, we noticed that in some cases xbrlapi
> > > erroneously writes some text, completely hiding the Orca screen reader
> > > output until Orca is restarted (Bug #777574.  In version 5.2~20141018-4
> > > of brltty I have uploaded the very trivial upstream fix for this.
> > 
> > Unblocked, needs a d-i ack.
> 
> xbrlapi is actually not part of d-i :)

We were asked to get acks for unblocks for any source package that
currently has a block-udeb hint. My understanding was that Cyril's
request applied whether the changes affect the udeb(s) or not, but I'm
happy for him to disagree.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/1424015568.3384.8.ca...@adam-barratt.org.uk



Bug#773653: unblock: slim/1.3.6-4

2015-02-15 Thread Mateusz Łukasik

Bump.


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54e0bed3.5090...@linuxmint.pl



Bug#778444: unblock: brltty/5.2~20141018-4

2015-02-15 Thread Samuel Thibault
Adam D. Barratt, le Sun 15 Feb 2015 12:20:57 +, a écrit :
> On Sun, 2015-02-15 at 02:53 +0100, Samuel Thibault wrote:
> > Please unblock package brltty
> > 
> > While testing for bug #777377, we noticed that in some cases xbrlapi
> > erroneously writes some text, completely hiding the Orca screen reader
> > output until Orca is restarted (Bug #777574.  In version 5.2~20141018-4
> > of brltty I have uploaded the very trivial upstream fix for this.
> 
> Unblocked, needs a d-i ack.

xbrlapi is actually not part of d-i :)

Samuel


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150215153722.gn4...@type.youpi.perso.aquilenet.fr



Bug#778475: unblock: librcsb-core-wrapper/1.005-3

2015-02-15 Thread Andreas Tille
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package librcsb-core-wrapper

A security problem was reported (#778397) against this package which is
fixed by this upload (see debdiff).

Thanks for your work on the Debian release

 Andreas.


unblock librcsb-core-wrapper/1.005-3

-- System Information:
Debian Release: 7.8
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru librcsb-core-wrapper-1.005/debian/changelog librcsb-core-wrapper-1.005/debian/changelog
--- librcsb-core-wrapper-1.005/debian/changelog	2014-09-18 21:53:44.0 +0200
+++ librcsb-core-wrapper-1.005/debian/changelog	2015-02-14 18:08:44.0 +0100
@@ -1,3 +1,11 @@
+librcsb-core-wrapper (1.005-3) unstable; urgency=medium
+
+  * Patch for Henry Spencer regular expressions (regex) library contains
+a heap overflow vulnerability
+Closes: #778397
+
+ -- Andreas Tille   Sat, 14 Feb 2015 17:56:49 +0100
+
 librcsb-core-wrapper (1.005-2) unstable; urgency=medium
 
   * Added libtool-bin as a build-dep (Closes: #761768).
diff -Nru librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch
--- librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch	1970-01-01 01:00:00.0 +0100
+++ librcsb-core-wrapper-1.005/debian/patches/regcomp_cert_fix.patch	2015-02-14 18:07:41.0 +0100
@@ -0,0 +1,43 @@
+Author: Andreas Tille 
+Last-Update: Sat, 14 Feb 2015 17:51:06 +0100
+Origin: https://gitweb.dragonflybsd.org/dragonfly.git/blobdiff_plain/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c
+Bug-Debian: http://bugs.debian.org/778397
+Forwarded: sw-h...@rcsb.rutgers.edu, Vladimir Guranovic 
+Description: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability
+ This patch adapts the patch found at Origin (see above) to the
+ regex code found in librcsb-core-wrapper.
+
+--- librcsb-core-wrapper-1.005.orig/regex/src/regcomp.c
 librcsb-core-wrapper-1.005/regex/src/regcomp.c
+@@ -93,6 +93,7 @@ int cflags;
+ 	register struct parse *p = &pa;
+ 	register int i;
+ 	register size_t len;
++	register size_t maxlen;
+ #ifdef REDEBUG
+ #	define	GOODFLAGS(f)	(f)
+ #else
+@@ -115,7 +116,23 @@ int cflags;
+ 			(NC-1)*sizeof(cat_t));
+ 	if (g == NULL)
+ 		return(REG_ESPACE);
++	/*
++	 * Limit the pattern space to avoid a 32-bit overflow on buffer
++	 * extension.  Also avoid any signed overflow in case of conversion
++	 * so make the real limit based on a 31-bit overflow.
++	 *
++	 * Likely not applicable on 64-bit systems but handle the case
++	 * generically (who are we to stop people from using ~715MB+
++	 * patterns?).
++	 */
++	maxlen = ((size_t)-1 >> 1) / sizeof(sop) * 2 / 3;
++	if (len >= maxlen) {
++		free((char *)g);
++		return(REG_ESPACE);
++	}
+ 	p->ssize = len/(size_t)2*(size_t)3 + (size_t)1;	/* ugh */
++	assert(p->ssize >= len);
++
+ 	p->strip = (sop *)malloc(p->ssize * sizeof(sop));
+ 	p->slen = 0;
+ 	if (p->strip == NULL) {
diff -Nru librcsb-core-wrapper-1.005/debian/patches/series librcsb-core-wrapper-1.005/debian/patches/series
--- librcsb-core-wrapper-1.005/debian/patches/series	2014-09-18 21:11:53.0 +0200
+++ librcsb-core-wrapper-1.005/debian/patches/series	2015-02-14 17:44:47.0 +0100
@@ -11,3 +11,4 @@
 spelling
 exit-in-shlib
 make_test_target
+regcomp_cert_fix.patch


Bug#778465: unblock: i3-wm/4.8-2

2015-02-15 Thread Michael Stapelberg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package i3-wm

4.8-2 (which I have just uploaded) contains two backported bugfixes from
upstream to address the serious issues #778460 and #778461. Both bugfixes are
well-tested for many weeks and address common problems that users report over
and over. Having them in the next stable release would be a great service to
our users.

debdiff:

diff -Nru i3-wm-4.8/debian/changelog i3-wm-4.8/debian/changelog
--- i3-wm-4.8/debian/changelog  2014-06-15 19:21:51.0 +0200
+++ i3-wm-4.8/debian/changelog  2015-02-15 13:24:57.0 +0100
@@ -1,3 +1,11 @@
+i3-wm (4.8-2) unstable; urgency=medium
+
+  * Backport two bugfixes:
+- backport-dpi-fix.patch (Closes: #778460)
+- backport-i3bar-tray-fix.patch (Closes: #778461)
+
+ -- Michael Stapelberg   Sun, 15 Feb 2015 13:24:42 +0100
+
 i3-wm (4.8-1) unstable; urgency=medium
 
   * New upstream release.
diff -Nru i3-wm-4.8/debian/patches/backport-dpi-fix.patch 
i3-wm-4.8/debian/patches/backport-dpi-fix.patch
--- i3-wm-4.8/debian/patches/backport-dpi-fix.patch 1970-01-01 
01:00:00.0 +0100
+++ i3-wm-4.8/debian/patches/backport-dpi-fix.patch 2015-02-15 
13:22:18.0 +0100
@@ -0,0 +1,25 @@
+Description: Treat everything up to 120 dpi as 96 dpi
+Author: Michael Stapelberg 
+Origin: 
https://github.com/i3/i3/commit/33d1d5d3c61a2136eb4b42ffd29870fd68d2d766
+Last-Update: 2015-02-15
+
+---
+
+Index: i3-wm-4.8/libi3/dpi.c
+===
+--- i3-wm-4.8.orig/libi3/dpi.c
 i3-wm-4.8/libi3/dpi.c
+@@ -12,5 +12,13 @@ extern xcb_screen_t *root_screen;
+ int logical_px(const int logical) {
+ const int dpi = (double)root_screen->height_in_pixels * 25.4 /
+ (double)root_screen->height_in_millimeters;
++/* There are many misconfigurations out there, i.e. systems with screens
++ * whose dpi is in fact higher than 96 dpi, but not significantly higher,
++ * so software was never adapted. We could tell people to reconfigure 
their
++ * systems to 96 dpi in order to get the behavior they expect/are used to,
++ * but since we can easily detect this case in code, let’s do it for them.
++ */
++if ((dpi / 96.0) < 1.25)
++return logical;
+ return ceil((dpi / 96.0) * logical);
+ }
diff -Nru i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch 
i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch
--- i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch  1970-01-01 
01:00:00.0 +0100
+++ i3-wm-4.8/debian/patches/backport-i3bar-tray-fix.patch  2015-02-15 
13:23:19.0 +0100
@@ -0,0 +1,25 @@
+Description: add a sync call to i3bar to confirm reparents before exiting
+ Without this call, sometimes the tray icon windows are reparented into
+ i3’s container around the i3bar window, i.e. into the next remaining
+ window in the window hierarchy. Since i3 then closes that container
+ (since the i3bar window itself was closed), the tray window will also
+ get closed. In general, this weird interaction (getting reparented and
+ then closed) is not well received by tray icon providers :).
+Author: Michael Stapelberg 
+Origin: 
https://github.com/i3/i3/commit/4699c714b33afb1c264f3d19911b880267165b94
+Last-Update: 2015-02-15
+
+---
+
+Index: i3-wm-4.8/i3bar/src/xcb.c
+===
+--- i3-wm-4.8.orig/i3bar/src/xcb.c
 i3-wm-4.8/i3bar/src/xcb.c
+@@ -1290,6 +1290,7 @@ void clean_xcb(void) {
+ FREE(outputs);
+ 
+ xcb_flush(xcb_connection);
++xcb_aux_sync(xcb_connection);
+ xcb_disconnect(xcb_connection);
+ 
+ ev_check_stop(main_loop, xcb_chk);
diff -Nru i3-wm-4.8/debian/patches/series i3-wm-4.8/debian/patches/series
--- i3-wm-4.8/debian/patches/series 2014-06-15 19:16:10.0 +0200
+++ i3-wm-4.8/debian/patches/series 2015-02-15 13:19:12.0 +0100
@@ -1,2 +1,4 @@
 use-x-terminal-emulator.patch
 manpage-x-terminal-emulator.patch
+backport-i3bar-tray-fix.patch
+backport-dpi-fix.patch


unblock i3-wm/4.8-2

-- System Information:
Debian Release: 8.0
  APT prefers testing
  APT policy: (990, 'testing'), (600, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20150215131031.5646.47605.report...@x200.zekjur.net



Processed: Re: Bug#774428: unblock: simpleburn/1.7.0-2

2015-02-15 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed moreinfo
Bug #774428 [release.debian.org] unblock: simpleburn/1.7.0-2
Added tag(s) confirmed.

-- 
774428: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774428
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b774428.14240032245329.transcr...@bugs.debian.org



Bug#774428: unblock: simpleburn/1.7.0-2

2015-02-15 Thread Adam D. Barratt
Control: tags -1 + confirmed moreinfo

On Sun, 2015-02-15 at 11:07 +0100, John Paul Adrian Glaubitz wrote:
> On 02/14/2015 03:54 PM, Mateusz Łukasik wrote:
> > I think now it's done:
> > http://mentors.debian.net/debian/pool/main/s/simpleburn/simpleburn_1.7.0-3.dsc
> 
> Thanks! I trimmed down your changes a bit to increase the chance for an
> unblock.
> 
> Attaching the debdiff with the changes between 1.7.0-1 and 1.7.0-3 for
> the release team.

Please go ahead, and remove the "moreinfo" tag once the package is in
unstable.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/1424003214.3384.5.ca...@adam-barratt.org.uk



Processed: Re: Bug#778434: pre-approval: unblock: deluge/1.3.10-3

2015-02-15 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed moreinfo
Bug #778434 [release.debian.org] pre-approval: unblock: deluge/1.3.10-3
Added tag(s) confirmed and moreinfo.

-- 
778434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778434
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b778434.14240031234302.transcr...@bugs.debian.org



Bug#778434: pre-approval: unblock: deluge/1.3.10-3

2015-02-15 Thread Adam D. Barratt
Control: tags -1 + confirmed moreinfo

On Sat, 2015-02-14 at 17:36 -0500, Andrew Starr-Bochicchio wrote:
> Bug #770628 against deluged leaves the init script unusable, and more
> importantly leaves dpkg in a broken state when purging the package.
> I'd like to request pre-approval for the unblock request.
> 
> +  * Fix permissions on /var/lib/deluged/config/ in
> +deluged.postinst and properly remove all
> +dpkg-statoverrides in deluged.postrm (Closes: #770628).

Please go ahead, and remove the "moreinfo" tag once the package is in
unstable.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/1424003115.3384.4.ca...@adam-barratt.org.uk



Processed: Re: Bug#778444: unblock: brltty/5.2~20141018-4

2015-02-15 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed d-i
Bug #778444 [release.debian.org] unblock: brltty/5.2~20141018-4
Added tag(s) d-i and confirmed.

-- 
778444: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778444
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b778444.14240028673211.transcr...@bugs.debian.org



Bug#778444: unblock: brltty/5.2~20141018-4

2015-02-15 Thread Adam D. Barratt
Control: tags -1 + confirmed d-i

On Sun, 2015-02-15 at 02:53 +0100, Samuel Thibault wrote:
> Please unblock package brltty
> 
> While testing for bug #777377, we noticed that in some cases xbrlapi
> erroneously writes some text, completely hiding the Orca screen reader
> output until Orca is restarted (Bug #777574.  In version 5.2~20141018-4
> of brltty I have uploaded the very trivial upstream fix for this.

Unblocked, needs a d-i ack.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/1424002857.3384.2.ca...@adam-barratt.org.uk



Re: Bug#777597: perl-modules: upgrade regression: dpkg: dependency problems prevent configuration of perl-modules

2015-02-15 Thread Niko Tyni
(Dropping Sven and Andreas but adding the release team; there's a question
for you lower in the mail.)

On Tue, Feb 10, 2015 at 10:19:18PM +0200, Niko Tyni wrote:

> It looks like a bug in apt to me. The perl/perl-modules circular dependency
> has been around for ages and should be easy to break, but I suppose apt
> is trying to configure them in separate dpkg runs or something like that.
> 
> If it's actually reproducible this time (I haven't tried yet), that
> hopefully helps in understanding the issue. Sven Joachim's analysis in
>  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767734#10
> sounds good, but it doesn't quite fit here as that particular apt bug
> shouldn't be present in wheezy (or jessie, for that matter) at all.

FWIW I wasn't able to reproduce it on Wednesday or Friday, which is
a bit strange as Gregor said he could.

Apt maintainers: there's plenty of debug output in the log Andreas
supplied. Is that enough for you to understand the problem, or
would you like something more?
 
> Relaxing the circular dependency is a workaround that might be doable,
> even though it would be 'incorrect'. There are modules in perl that
> need others in perl-modules, and vice versa.  However, I count only 21
> binary packages in sid [1] that depend on perl-modules but not perl.
> As perl is transitively build essential (via dpkg-dev and libdpkg-perl),
> build dependencies should not be a concern at all.

There are a few packages that pull in perl indirectly through their other
dependencies, which brings the count of binary packages that only depend
on perl-modules down to 15:

  cli-common
  patcher
  polygen-data
  pristine-tar
  pure-ftpd-common
  rinse
  shorewall
  shorewall-core
  snort-common # not in jessie
  squid# not in jessie
  tvtime
  mono-apache-server2
  mono-apache-server4
  mono-fastcgi-server2
  mono-fastcgi-server4
 
I haven't checked if these would actually be broken if the perl-modules
-> perl dependency was relaxed. Even if they wouldn't break, I would
very much prefer if they were fixed to depend on perl instead, to lower
chances of users encountering systems with perl-modules but not perl.

Release team: if we don't find another solution, would you be willing to
allow changes in these packages replacing
 Depends: perl-modules
with
 Depends: perl
into jessie?

(Unfortunately my Debian time will be quite scarce for the next week or so,
 so I won't be able to work much on this.)
-- 
Niko Tyni   nt...@debian.org


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150215115732.GC5711@estella.local.invalid



Bug#774428: unblock: simpleburn/1.7.0-2

2015-02-15 Thread John Paul Adrian Glaubitz
On 02/14/2015 03:54 PM, Mateusz Łukasik wrote:
> I think now it's done:
> http://mentors.debian.net/debian/pool/main/s/simpleburn/simpleburn_1.7.0-3.dsc

Thanks! I trimmed down your changes a bit to increase the chance for an
unblock.

Attaching the debdiff with the changes between 1.7.0-1 and 1.7.0-3 for
the release team.

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
diff -Nru simpleburn-1.7.0/debian/changelog simpleburn-1.7.0/debian/changelog
--- simpleburn-1.7.0/debian/changelog	2014-07-28 14:22:17.0 +0200
+++ simpleburn-1.7.0/debian/changelog	2015-02-15 10:52:28.0 +0100
@@ -1,3 +1,21 @@
+simpleburn (1.7.0-3) unstable; urgency=medium
+
+  * Drop fix-bashisms.patch which contained errors and was
+too invasive to be considered during the Jessie freeze.
+  * Add debian/patches/replace_shebangs.patch to replace all
+#!/bin/sh shebangs with #!/bin/bash. (Closes: #772365)
+
+ -- Mateusz Łukasik   Sat, 14 Feb 2015 15:46:32 +0100
+
+simpleburn (1.7.0-2) unstable; urgency=medium
+
+  * Add patch to fix bashism in /bin/sh script -- thanks to
+Georges Khaznadar  for the help.
+(Closes: #772365)
+  * Bump Standards-Version to 3.9.6 (no changes needed).
+
+ -- Mateusz Łukasik   Wed, 31 Dec 2014 15:22:53 +0100
+
 simpleburn (1.7.0-1) unstable; urgency=medium
 
   * New upstream release. (LP: #1279659)
diff -Nru simpleburn-1.7.0/debian/control simpleburn-1.7.0/debian/control
--- simpleburn-1.7.0/debian/control	2014-02-11 12:18:00.0 +0100
+++ simpleburn-1.7.0/debian/control	2014-12-31 15:13:28.0 +0100
@@ -4,7 +4,7 @@
 Maintainer: Mateusz Łukasik 
 Build-Depends: debhelper (>= 9), cmake (>= 2.6), pkg-config, libudev-dev,
  libburn-dev, libgtk2.0-dev (>= 2.12) 
-Standards-Version: 3.9.5
+Standards-Version: 3.9.6
 Homepage: http://simpleburn.tuxfamily.org
 Vcs-Git: git://github.com/mati75/simpleburn.git
 Vcs-Browser: https://github.com/mati75/simpleburn.git
diff -Nru simpleburn-1.7.0/debian/patches/replace_shebangs.patch simpleburn-1.7.0/debian/patches/replace_shebangs.patch
--- simpleburn-1.7.0/debian/patches/replace_shebangs.patch	1970-01-01 01:00:00.0 +0100
+++ simpleburn-1.7.0/debian/patches/replace_shebangs.patch	2015-02-15 10:43:08.0 +0100
@@ -0,0 +1,34 @@
+Description: Replace all #!/bin/sh shebangs with #!/bin/bash
+Author: Mateusz Łukasik 
+Bug-Debian: https://bugs.debian.org/772365
+
+Index: simpleburn-1.7.0/scripts/simpleburn-detect.sh
+===
+--- simpleburn-1.7.0.orig/scripts/simpleburn-detect.sh
 simpleburn-1.7.0/scripts/simpleburn-detect.sh
+@@ -1,4 +1,4 @@
+-#!/bin/sh
++#!/bin/bash
+ 
+ function detect() {
+ 	device=$1 #assumes it is a valid CD / DVD device
+Index: simpleburn-1.7.0/scripts/simpleburn-gauges.sh
+===
+--- simpleburn-1.7.0.orig/scripts/simpleburn-gauges.sh
 simpleburn-1.7.0/scripts/simpleburn-gauges.sh
+@@ -1,4 +1,4 @@
+-#!/bin/sh
++#!/bin/bash
+ 
+ function mencodergauge () {
+ 	totalsize=$1 #bytes
+Index: simpleburn-1.7.0/scripts/simpleburn.sh
+===
+--- simpleburn-1.7.0.orig/scripts/simpleburn.sh
 simpleburn-1.7.0/scripts/simpleburn.sh
+@@ -1,4 +1,4 @@
+-#!/bin/sh
++#!/bin/bash
+ 
+ function printusage() {
+ 	echo "error: invalid parameters"
diff -Nru simpleburn-1.7.0/debian/patches/series simpleburn-1.7.0/debian/patches/series
--- simpleburn-1.7.0/debian/patches/series	2013-07-23 00:00:00.0 +0200
+++ simpleburn-1.7.0/debian/patches/series	2015-02-15 10:51:29.0 +0100
@@ -1 +1,2 @@
 fix_desktop.patch
+replace_shebangs.patch


Bug#778430: marked as done (unblock: vigor/0.016-24)

2015-02-15 Thread Debian Bug Tracking System
Your message dated Sun, 15 Feb 2015 10:17:48 +0100
with message-id <20150215091747.ga...@ugent.be>
and subject line Re: Bug#778430: unblock: vigor/0.016-24
has caused the Debian Bug report #778430,
regarding unblock: vigor/0.016-24
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
778430: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778430
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock vigor; it fixes a heap overflow in the best possible way,
by no longer building the affected code and letting libc take care of it
instead.

(I've had the Vcs-Browser change staged for ages, and it didn't seem
worth moving off to a different branch.)

diff --git a/debian/changelog b/debian/changelog
index 1a213b4..9c70f3e 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+vigor (0.016-24) unstable; urgency=medium
+
+  * Update Vcs-Browser URL for alioth cgit.
+  * Use libc's regex routines rather than the bundled ones, to avoid needing
+to apply security patches independently (closes: #778409).
+
+ -- Colin Watson   Sat, 14 Feb 2015 21:17:07 +
+
 vigor (0.016-23) unstable; urgency=low
 
   * Add a header to debian/patches/client-side-fonts.patch.
diff --git a/debian/control b/debian/control
index 4a5dc15..30f88de 100644
--- a/debian/control
+++ b/debian/control
@@ -6,7 +6,7 @@ Build-Depends: dpkg-dev (>= 1.16.1~), debhelper (>= 9~), 
dh-autoreconf, autotool
 Standards-Version: 3.5.7
 Homepage: http://vigor.sourceforge.net/
 Vcs-Git: git://anonscm.debian.org/users/cjwatson/vigor.git
-Vcs-Browser: http://anonscm.debian.org/gitweb/?p=users/cjwatson/vigor.git
+Vcs-Browser: http://anonscm.debian.org/cgit/users/cjwatson/vigor.git/
 
 Package: vigor
 Architecture: any
diff --git a/debian/rules b/debian/rules
index 8eea6eb..d1c64c9 100755
--- a/debian/rules
+++ b/debian/rules
@@ -19,7 +19,7 @@ override_dh_autoreconf:
dh_autoreconf debian/rules -- autoreconf
 
 override_dh_auto_configure:
-   dh_auto_configure -- --with-x --enable-db --enable-re
+   dh_auto_configure -- --with-x --enable-db
 
 ifneq ($(DEB_BUILD_GNU_TYPE),$(DEB_HOST_GNU_TYPE))
 override_dh_auto_build:

unblock vigor/0.016-24

Thanks,

-- 
Colin Watson   [cjwat...@debian.org]
--- End Message ---
--- Begin Message ---
Hi,

On Sat, Feb 14, 2015 at 10:11:56PM +, Colin Watson wrote:
> Please unblock vigor;

Unblocked.

Cheers,

Ivo--- End Message ---