Bug#785198: transition: GStreamer 0.10 removal
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Hi, see rationale in this mailing list thread: https://lists.debian.org/debian-devel/2015/05/msg00335.html It was suggested in that thread to also set up a transition tracker for this. The main package involved here would be libgstreamer0.10-0, which should go away and has libgstreamer1.0-0 as replacement already. The qt-gstreamer transition (#760003) already clears part of the remaining GStreamer 0.10 dependencies. Additionally there are further GStreamer 0.10 bindings: python-gst0.10 is replaced by python-gst1.0 / python3-gst1.0 libgstreamer0.9-cil is replaced by libgstreamer1.0-cil (which is not yet uploaded, upstream release exists) libgstreamermm-0.10-2 would be replaced by libgstreamermm-1.0-XXX (which is also not yet uploaded, upstream release exists) libgstreamer-perl, haskell-gstreamer I'm not aware what the plans there are, the latter also has nothing depending on it. Sebastian signature.asc Description: This is a digitally signed message part
Processed: block 731121 with 760003
Processing commands for cont...@bugs.debian.org: block 731121 with 760003 Bug #731121 [ktp-call-ui] ktp-call-ui: depends on obsolete Farstream 0.1 731121 was not blocked by any bugs. 731121 was blocking: 735974 Added blocking bug(s) of 731121: 760003 thanks Stopping processing here. Please contact me if you need assistance. -- 731121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731121 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14315109718287.transcr...@bugs.debian.org
Bug#785184: jessie-pu: package pdf2djvu/0.7.17-4
Control: tags -1 + confirmed On 2015-05-13 9:12, Daniel Stender wrote: I propose an update of pdf2djvu in jessie, 0.7.17-4+deb8u1. The patch is a security fix of #784889 in stable. Please see the attached debdiff for details. The issue is marked as minor/no-dsa, so I would upload it to stable as proposed update. Please go ahead. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/dfecb42ebe23122393ab27b665be8...@mowgli.jungle.funky-badger.org
Bug#785201: jessie-pu: package virtualbox/4.3.18-dfsg-3
Package: release.debian.org Severity: normal Tags: jessie User: release.debian@packages.debian.org Usertags: pu Attached patch is targetted for Jessie. In Debian Bug #783142, it was reported that VBox fails to run on machines with Intel Broadwell architecture. Thanks for Gianfranco for preparing the patch, and Moritz Muhlenhoff for reporting the bug and cherry picking the fix from upstream. Please review and respond back to this email. Upon receiving your ACK, I will do the upload. -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.0.2+ (SMP w/4 CPU cores) Locale: LANG=en_IN.utf8, LC_CTYPE=en_IN.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff --git a/debian/changelog b/debian/changelog index bbdde7a..9748983 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +virtualbox (4.3.18-dfsg-4) jessie; urgency=medium + + [ Moritz Mühlenhoff ] + * d/p/37-disable-smap.patch, cherry-pick upstream patch to fix a kernel +paging issue (LP: #1437845, Closes: #783142). + + -- Ritesh Raj Sarraf r...@debian.org Wed, 13 May 2015 13:53:36 +0530 + virtualbox (4.3.18-dfsg-3) unstable; urgency=medium * Conflict with upstream proprietary packages 4.3 series. diff --git a/debian/patches/37-disable-smap.patch b/debian/patches/37-disable-smap.patch new file mode 100644 index 000..c4f52bc --- /dev/null +++ b/debian/patches/37-disable-smap.patch @@ -0,0 +1,58 @@ +Description: Disable SMAP when during VirtualBox kernel calls +This fixes virtualbox on Broadwell CPUs + +https://www.virtualbox.org/ticket/13820 +Author: frank.mehn...@oracle.com + +--- virtualbox-4.3.18-dfsg.orig/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c virtualbox-4.3.18-dfsg/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c +@@ -48,6 +48,12 @@ + # include iprt/power.h + # define VBOX_WITH_SUSPEND_NOTIFICATION + #endif ++#if LINUX_VERSION_CODE = KERNEL_VERSION(3, 7, 0) ++# include asm/smap.h ++#else ++static inline void clac(void) { } ++static inline void stac(void) { } ++#endif + + #include linux/sched.h + #ifdef CONFIG_DEVFS_FS +@@ -622,6 +628,7 @@ static int VBoxDrvLinuxIOCtl(struct inod + #endif + { + PSUPDRVSESSION pSession = (PSUPDRVSESSION)pFilp-private_data; ++int rc; + + /* + * Deal with the two high-speed IOCtl that takes it's arguments from +@@ -632,12 +639,15 @@ static int VBoxDrvLinuxIOCtl(struct inod + || uCmd == SUP_IOCTL_FAST_DO_HM_RUN + || uCmd == SUP_IOCTL_FAST_DO_NOP) +pSession-fUnrestricted == true)) +-return supdrvIOCtlFast(uCmd, ulArg, g_DevExt, pSession); ++{ ++stac(); ++rc = supdrvIOCtlFast(uCmd, ulArg, g_DevExt, pSession); ++clac(); ++return rc; ++} + return VBoxDrvLinuxIOCtlSlow(pFilp, uCmd, ulArg, pSession); + + #else /* !HAVE_UNLOCKED_IOCTL */ +- +-int rc; + unlock_kernel(); + if (RT_LIKELY( ( uCmd == SUP_IOCTL_FAST_DO_RAW_RUN + || uCmd == SUP_IOCTL_FAST_DO_HM_RUN +@@ -715,7 +725,9 @@ static int VBoxDrvLinuxIOCtlSlow(struct + /* + * Process the IOCtl. + */ ++stac(); + rc = supdrvIOCtl(uCmd, g_DevExt, pSession, pHdr, cbBuf); ++clac(); + + /* + * Copy ioctl data and output buffer back to user space. diff --git a/debian/patches/series b/debian/patches/series index 5b32c83..2af312a 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -14,3 +14,4 @@ 32-disable-guest-version-check.patch 35-libvdeplug-soname.patch 36-fix-vnc-version-string.patch +37-disable-smap.patch
Bug#785240: jessie-pu: package open-iscsi/2.0.873+git0.3b4b4500-8
On 05/13/2015 09:04 PM, Cyril Brulebois wrote: The issue is fixed in unstable (-9) in such a way that it won't resurface again if the control file is updated to build the udeb for even more architectures in the future. I suppose you mean 3ea68751abe4f3cf4c44a9695fff8742f80f43b4; Yes. but you're actually backporting 41c7ecab07e1a26b78d81c250daa79ac53bd9ca0 which was first shipped with debian/2.0.873+git0.3b4b4500-4, (For posteriority:) No, that was actually the commit that introduced the problem because only the debian/control file was updated, and not debian/rules. The attached debdiff also updates debian/rules to fix the issue. 3ea68751 (part of -9 in unstable) also fixes the bug because it completely reworks debian/rules to not have an explicit list of architectures in debian/rules but rather now uses debhelper and *.install to take care of this - now only the list in debian/control needs to be updated (and there's a single place). The bug metadata is therefore correct (except for the fact that one could say that the bug is already found in -4; but since stable is on -8 and oldstable is way older, I don't see much point in dealing with this detail). Please review and consider this for the next Jessie point release. Ritesh would upload the package upon receiving your ACK. No objections from my point of view. Thanks! Christian -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/5553a265.2050...@iwakd.de
Bug#785240: jessie-pu: package open-iscsi/2.0.873+git0.3b4b4500-8
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: jessie Severity: normal X-Debbugs-CC: r...@debian.org, debian-b...@lists.debian.org (Cc'ing debian-boot because this affects the installer.) Attached is a patch that fixes the RC bug #784092 targeting Jessie. I've noticed this issue while reworking the packaging in unstable; the udeb produced by the open-iscsi package was simply empty on some architectures (see the bug report for details). The issue is fixed in unstable (-9) in such a way that it won't resurface again if the control file is updated to build the udeb for even more architectures in the future. The attached debdiff for stable fixes the immediate problem for Jessie (but does not include other changes from unstable). Please review and consider this for the next Jessie point release. Ritesh would upload the package upon receiving your ACK. Thank you! -- System Information: Debian Release: 8.0 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru open-iscsi-2.0.873+git0.3b4b4500/debian/changelog open-iscsi-2.0.873+git0.3b4b4500/debian/changelog --- open-iscsi-2.0.873+git0.3b4b4500/debian/changelog 2015-02-10 18:17:18.0 +0100 +++ open-iscsi-2.0.873+git0.3b4b4500/debian/changelog 2015-05-13 20:03:45.0 +0200 @@ -1,3 +1,10 @@ +open-iscsi (2.0.873+git0.3b4b4500-8+deb8u1) stable; urgency=medium + + * [725c5c6] Populate udebs in every architecture they are built +(Closes: #784092) + + -- Christian Seiler christ...@iwakd.de Wed, 13 May 2015 20:01:02 +0200 + open-iscsi (2.0.873+git0.3b4b4500-8) unstable; urgency=medium * [e707e75] Exclude iscsid.conf from dh_fixperms. (Closes: #735773) diff -Nru open-iscsi-2.0.873+git0.3b4b4500/debian/rules open-iscsi-2.0.873+git0.3b4b4500/debian/rules --- open-iscsi-2.0.873+git0.3b4b4500/debian/rules 2015-02-10 18:17:18.0 +0100 +++ open-iscsi-2.0.873+git0.3b4b4500/debian/rules 2015-05-13 20:03:45.0 +0200 @@ -10,7 +10,7 @@ DEB_UPSTREAM_VERSION=$(shell dpkg-parsechangelog | sed -rne 's,^Version: ([^-]+).*,\1,p') DEB_HOST_ARCH?=$(shell dpkg-architecture -qDEB_HOST_ARCH) -SUPPORTED_ARCH_UDEB = amd64 arm64 i386 ia64 mips mipsel powerpc +SUPPORTED_ARCH_UDEB = amd64 arm64 i386 ia64 mips mipsel powerpc s390x ppc64el ppc64 armhf get-orig-source: [ ! -f $(ORIG_FILE).gz ] || rm -f $(ORIG_FILE).gz
Bug#785254: jessie-pu: package didjvu/0.2.8-1
Package: release.debian.org Severity: normal Tags: jessie User: release.debian@packages.debian.org Usertags: pu I propose an update of didjvu in jessie, 0.2.8-1+deb8u1 The patch is a security fix of #784888 in stable. Please see the attached debdiff for details. The issue is marked as minor/no-dsa, so I would upload it to stable as proposed update. Thank you, Daniel Stender -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru didjvu-0.2.8/debian/changelog didjvu-0.2.8/debian/changelog --- didjvu-0.2.8/debian/changelog 2014-06-19 11:18:11.0 +0200 +++ didjvu-0.2.8/debian/changelog 2015-05-13 22:38:11.0 +0200 @@ -1,3 +1,11 @@ +didjvu (0.2.8-1+deb8u1) stable; urgency=medium + + * add fix-insecure-use-of-tmp-when-calling-c44.diff, fix +of security issue TEMP-0784889-495CCA, see #784888 (closed +in Sid by 0.4-1). + + -- Daniel Stender deb...@danielstender.com Wed, 13 May 2015 22:38:00 +0200 + didjvu (0.2.8-1) unstable; urgency=low * New upstream release (Closes: #743677). diff -Nru didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff --- didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff 1970-01-01 01:00:00.0 +0100 +++ didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff 2015-05-13 22:32:13.0 +0200 @@ -0,0 +1,83 @@ +Description: fix for security issue TEMP-0784889-495CCA + CVE request: http://www.openwall.com/lists/oss-security/2015/05/09/7 +Author: Daniel Stender deb...@danielstender.com +Origin: https://bitbucket.org/jwilk/didjvu/commits/c975bca6dfc67bfcec8ad32ac64a7516a18379f1 +Bug: https://bugs.debian.org/784888 + +--- a/lib/djvu_extra.py b/lib/djvu_extra.py +@@ -76,25 +76,25 @@ + + def photo_to_djvu(image, dpi=100, slices=IW44_SLICES_DEFAULT, gamma=2.2, mask_image=None, crcb=CRCB.normal): + ppm_file = temporary.file(suffix='.ppm') +-temporaries = [ppm_file] + image.save(ppm_file.name) +-djvu_file = temporary.file(suffix='.djvu', mode='r+b') + if not isinstance(crcb, Crcb): + raise TypeError +-args = [ +-'c44', +-'-dpi', str(dpi), +-'-slice', ','.join(map(str, slices)), +-'-gamma', '%.1f' % gamma, +-'-crcb%s' % crcb, +-] +-if mask_image is not None: +-pbm_file = temporary.file(suffix='.pbm') +-mask_image.save(pbm_file.name) +-args += ['-mask', pbm_file.name] +-temporaries += [pbm_file] +-args += [ppm_file.name, djvu_file.name] +-return ipc.Proxy(djvu_file, ipc.Subprocess(args).wait, temporaries) ++with temporary.directory() as djvu_dir: ++args = [ ++'c44', ++'-dpi', str(dpi), ++'-slice', ','.join(map(str, slices)), ++'-gamma', '%.1f' % gamma, ++'-crcb%s' % crcb, ++] ++if mask_image is not None: ++pbm_file = temporary.file(suffix='.pbm') ++mask_image.save(pbm_file.name) ++args += ['-mask', pbm_file.name] ++djvu_path = os.path.join(djvu_dir, 'result.djvu') ++args += [ppm_file.name, djvu_path] ++ipc.Subprocess(args).wait() ++return temporary.hardlink(djvu_path, suffix='.djvu') + + def djvu_to_iw44(djvu_file): + # TODO: Use Multichunk. +--- a/lib/temporary.py b/lib/temporary.py +@@ -15,6 +15,7 @@ + + import contextlib + import functools ++import os + import shutil + import tempfile + +@@ -22,6 +23,14 @@ + name = functools.partial(tempfile.mktemp, prefix='didjvu.') + wrapper = tempfile._TemporaryFileWrapper + ++def hardlink(path, suffix='', prefix='didjvu.', dir=None): ++new_path = name(suffix=suffix, prefix=prefix, dir=dir) ++os.link(path, new_path) ++return wrapper( ++open(new_path, 'r+b'), ++new_path ++) ++ + @contextlib.contextmanager + def directory(*args, **kwargs): + kwargs = dict(kwargs) +@@ -32,6 +41,6 @@ + finally: + shutil.rmtree(tmpdir) + +-__all__ = ['file', 'directory', 'name', 'wrapper'] ++__all__ = ['file', 'hardlink', 'directory', 'name', 'wrapper'] + + # vim:ts=4 sw=4 et diff -Nru didjvu-0.2.8/debian/patches/series didjvu-0.2.8/debian/patches/series --- didjvu-0.2.8/debian/patches/series 1970-01-01 01:00:00.0 +0100 +++ didjvu-0.2.8/debian/patches/series 2015-05-13 21:01:42.0 +0200 @@ -0,0 +1 @@ +fix-insecure-use-of-tmp-when-calling-c44.diff
Bug#785184: jessie-pu: package pdf2djvu/0.7.17-4
On 13.05.2015 14:25, Adam D. Barratt wrote: Control: tags -1 + confirmed On 2015-05-13 9:12, Daniel Stender wrote: I propose an update of pdf2djvu in jessie, 0.7.17-4+deb8u1. The patch is a security fix of #784889 in stable. Please see the attached debdiff for details. The issue is marked as minor/no-dsa, so I would upload it to stable as proposed update. Please go ahead. Regards, Adam Done, ACCEPTED into proposed-updates-stable-new Thanks, Daniel Stender -- http://qa.debian.org/developer.php?login=debian%40danielstender.com 4096R/DF5182C8 46CB 1CA8 9EA3 B743 7676 1DB9 15E0 9AF4 DF51 82C8 -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/5553b873.3060...@danielstender.com
Bug#785201: jessie-pu: package virtualbox/4.3.18-dfsg-3
Control: tags -1 + confirmed On 2015-05-13 13:50, Ritesh Raj Sarraf wrote: Attached patch is targetted for Jessie. In Debian Bug #783142, it was reported that VBox fails to run on machines with Intel Broadwell architecture. Thanks for Gianfranco for preparing the patch, and Moritz Muhlenhoff for reporting the bug and cherry picking the fix from upstream. +virtualbox (4.3.18-dfsg-4) jessie; urgency=medium + + [ Moritz Mühlenhoff ] + * d/p/37-disable-smap.patch, cherry-pick upstream patch to fix a kernel +paging issue (LP: #1437845, Closes: #783142). 4.3.18-dfsg-3+deb8u1 is more conventional. With that in mind, please go ahead. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/c2e883dd9268d763b6f21e8b55acf...@mowgli.jungle.funky-badger.org
Processed: Re: Bug#785201: jessie-pu: package virtualbox/4.3.18-dfsg-3
Processing control commands: tags -1 + confirmed Bug #785201 [release.debian.org] jessie-pu: package virtualbox/4.3.18-dfsg-3 Added tag(s) confirmed. -- 785201: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785201 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b785201.143153559726685.transcr...@bugs.debian.org
Bug#784998: jessie-pu: package ulogd2/2.0.4-2+deb8u1
Control: tags -1 + pending On 12/05/15 21:46, Adam D. Barratt wrote: Please go ahead, thanks. Thanks for accepting. Uploaded. Chris -- Chris Boot deb...@bootc.net GPG: 8467 53CB 1921 3142 C56D C918 F5C8 3C05 D9CE -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/5552f310.4060...@bootc.net
Processed: Re: Bug#784998: jessie-pu: package ulogd2/2.0.4-2+deb8u1
Processing control commands: tags -1 + pending Bug #784998 [release.debian.org] jessie-pu: package ulogd2/2.0.4-2+deb8u1 Added tag(s) pending. -- 784998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784998 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b784998.143150011031018.transcr...@bugs.debian.org
Bug#785184: jessie-pu: package pdf2djvu/0.7.17-4
Package: release.debian.org Severity: normal Tags: jessie User: release.debian@packages.debian.org Usertags: pu I propose an update of pdf2djvu in jessie, 0.7.17-4+deb8u1. The patch is a security fix of #784889 in stable. Please see the attached debdiff for details. The issue is marked as minor/no-dsa, so I would upload it to stable as proposed update. Thanks, Daniel Stender -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru pdf2djvu-0.7.17/debian/changelog pdf2djvu-0.7.17/debian/changelog --- pdf2djvu-0.7.17/debian/changelog 2014-07-05 14:14:36.0 +0200 +++ pdf2djvu-0.7.17/debian/changelog 2015-05-13 09:54:46.0 +0200 @@ -1,3 +1,11 @@ +pdf2djvu (0.7.17-4+deb8u1) stable; urgency=medium + + * added fix-insecure-use-of-tmp-when-executing-c44.diff, fix +of security issue TEMP-0784889-495CCA, see #784889 (closed +in Sid by 0.7.21-1). + + -- Daniel Stender deb...@danielstender.com Wed, 13 May 2015 09:54:31 +0200 + pdf2djvu (0.7.17-4) unstable; urgency=low * Bumped standards to 3.9.5 (no changes needed). diff -Nru pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff --- pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff 1970-01-01 01:00:00.0 +0100 +++ pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff 2015-05-12 20:19:53.0 +0200 @@ -0,0 +1,18 @@ +Description: fix for security issue TEMP-0784889-495CCA + CVE request: http://www.openwall.com/lists/oss-security/2015/05/09/7 +Author: Daniel Stender deb...@danielstender.com +Origin: https://bitbucket.org/jwilk/pdf2djvu/commits/62c3c48098d6232f09ecabcf8d0176d42b714041 +Bug: https://bugs.debian.org/784889 + +--- a/pdf2djvu.cc b/pdf2djvu.cc +@@ -1537,7 +1537,8 @@ + } + else if (nonwhite_background_color) + { +-TemporaryFile c44_file; ++TemporaryDirectory c44_dir; ++TemporaryFile c44_file(c44_dir, bg.djvu); + c44_file.close(); + { /* Create solid-color PPM image with subsample ratio 12: */ + TemporaryFile ppm_file; diff -Nru pdf2djvu-0.7.17/debian/patches/series pdf2djvu-0.7.17/debian/patches/series --- pdf2djvu-0.7.17/debian/patches/series 1970-01-01 01:00:00.0 +0100 +++ pdf2djvu-0.7.17/debian/patches/series 2015-05-12 20:11:42.0 +0200 @@ -0,0 +1 @@ +fix-insecure-use-of-tmp-when-executing-c44.diff