Bug#785198: transition: GStreamer 0.10 removal

2015-05-13 Thread Sebastian Dröge
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Hi,

see rationale in this mailing list thread:
https://lists.debian.org/debian-devel/2015/05/msg00335.html

It was suggested in that thread to also set up a transition tracker for
this. The main package involved here would be libgstreamer0.10-0, which
should go away and has libgstreamer1.0-0 as replacement already.

The qt-gstreamer transition (#760003) already clears part of the
remaining GStreamer 0.10 dependencies. Additionally there are further
GStreamer 0.10 bindings:

python-gst0.10 is replaced by python-gst1.0 / python3-gst1.0

libgstreamer0.9-cil is replaced by libgstreamer1.0-cil
  (which is not yet uploaded, upstream release exists)

libgstreamermm-0.10-2 would be replaced by libgstreamermm-1.0-XXX
  (which is also not yet uploaded, upstream release exists)

libgstreamer-perl, haskell-gstreamer
  I'm not aware what the plans there are, the latter also has nothing
  depending on it.

Sebastian


signature.asc
Description: This is a digitally signed message part


Processed: block 731121 with 760003

2015-05-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 block 731121 with 760003
Bug #731121 [ktp-call-ui] ktp-call-ui: depends on obsolete Farstream 0.1
731121 was not blocked by any bugs.
731121 was blocking: 735974
Added blocking bug(s) of 731121: 760003
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
731121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731121
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14315109718287.transcr...@bugs.debian.org



Bug#785184: jessie-pu: package pdf2djvu/0.7.17-4

2015-05-13 Thread Adam D. Barratt

Control: tags -1 + confirmed

On 2015-05-13 9:12, Daniel Stender wrote:

I propose an update of pdf2djvu in jessie, 0.7.17-4+deb8u1.

The patch is a security fix of #784889 in stable.

Please see the attached debdiff for details.

The issue is marked as minor/no-dsa, so I would upload it
to stable as proposed update.


Please go ahead.

Regards,

Adam


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/dfecb42ebe23122393ab27b665be8...@mowgli.jungle.funky-badger.org



Bug#785201: jessie-pu: package virtualbox/4.3.18-dfsg-3

2015-05-13 Thread Ritesh Raj Sarraf
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu

Attached patch is targetted for Jessie. In Debian Bug #783142, it was
reported that VBox fails to run on machines with Intel Broadwell
architecture.

Thanks for Gianfranco for preparing the patch, and Moritz Muhlenhoff for
reporting the bug and cherry picking the fix from upstream.


Please review and respond back to this email. Upon receiving your ACK, I
will do the upload.

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.0.2+ (SMP w/4 CPU cores)
Locale: LANG=en_IN.utf8, LC_CTYPE=en_IN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff --git a/debian/changelog b/debian/changelog
index bbdde7a..9748983 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+virtualbox (4.3.18-dfsg-4) jessie; urgency=medium
+
+  [ Moritz Mühlenhoff ]
+  * d/p/37-disable-smap.patch, cherry-pick upstream patch to fix a kernel
+paging issue (LP: #1437845, Closes: #783142).
+
+ -- Ritesh Raj Sarraf r...@debian.org  Wed, 13 May 2015 13:53:36 +0530
+
 virtualbox (4.3.18-dfsg-3) unstable; urgency=medium
 
   * Conflict with upstream proprietary packages 4.3 series.
diff --git a/debian/patches/37-disable-smap.patch b/debian/patches/37-disable-smap.patch
new file mode 100644
index 000..c4f52bc
--- /dev/null
+++ b/debian/patches/37-disable-smap.patch
@@ -0,0 +1,58 @@
+Description: Disable SMAP when during VirtualBox kernel calls
+This fixes virtualbox on Broadwell CPUs
+
+https://www.virtualbox.org/ticket/13820
+Author: frank.mehn...@oracle.com
+
+--- virtualbox-4.3.18-dfsg.orig/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c
 virtualbox-4.3.18-dfsg/src/VBox/HostDrivers/Support/linux/SUPDrv-linux.c
+@@ -48,6 +48,12 @@
+ # include iprt/power.h
+ # define VBOX_WITH_SUSPEND_NOTIFICATION
+ #endif
++#if LINUX_VERSION_CODE = KERNEL_VERSION(3, 7, 0)
++# include asm/smap.h
++#else
++static inline void clac(void) { }
++static inline void stac(void) { }
++#endif
+ 
+ #include linux/sched.h
+ #ifdef CONFIG_DEVFS_FS
+@@ -622,6 +628,7 @@ static int VBoxDrvLinuxIOCtl(struct inod
+ #endif
+ {
+ PSUPDRVSESSION pSession = (PSUPDRVSESSION)pFilp-private_data;
++int rc;
+ 
+ /*
+  * Deal with the two high-speed IOCtl that takes it's arguments from
+@@ -632,12 +639,15 @@ static int VBoxDrvLinuxIOCtl(struct inod
+   || uCmd == SUP_IOCTL_FAST_DO_HM_RUN
+   || uCmd == SUP_IOCTL_FAST_DO_NOP)
+pSession-fUnrestricted == true))
+-return supdrvIOCtlFast(uCmd, ulArg, g_DevExt, pSession);
++{
++stac();
++rc = supdrvIOCtlFast(uCmd, ulArg, g_DevExt, pSession);
++clac();
++return rc;
++}
+ return VBoxDrvLinuxIOCtlSlow(pFilp, uCmd, ulArg, pSession);
+ 
+ #else   /* !HAVE_UNLOCKED_IOCTL */
+-
+-int rc;
+ unlock_kernel();
+ if (RT_LIKELY(   (   uCmd == SUP_IOCTL_FAST_DO_RAW_RUN
+   || uCmd == SUP_IOCTL_FAST_DO_HM_RUN
+@@ -715,7 +725,9 @@ static int VBoxDrvLinuxIOCtlSlow(struct
+ /*
+  * Process the IOCtl.
+  */
++stac();
+ rc = supdrvIOCtl(uCmd, g_DevExt, pSession, pHdr, cbBuf);
++clac();
+ 
+ /*
+  * Copy ioctl data and output buffer back to user space.
diff --git a/debian/patches/series b/debian/patches/series
index 5b32c83..2af312a 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -14,3 +14,4 @@
 32-disable-guest-version-check.patch
 35-libvdeplug-soname.patch
 36-fix-vnc-version-string.patch
+37-disable-smap.patch


Bug#785240: jessie-pu: package open-iscsi/2.0.873+git0.3b4b4500-8

2015-05-13 Thread Christian Seiler
On 05/13/2015 09:04 PM, Cyril Brulebois wrote:
 The issue is fixed in unstable (-9) in such a way that it won't
 resurface again if the control file is updated to build the udeb for
 even more architectures in the future.
 
 I suppose you mean 3ea68751abe4f3cf4c44a9695fff8742f80f43b4;

Yes.

 but you're
 actually backporting 41c7ecab07e1a26b78d81c250daa79ac53bd9ca0 which was
 first shipped with debian/2.0.873+git0.3b4b4500-4,

(For posteriority:)

No, that was actually the commit that introduced the problem because
only the debian/control file was updated, and not debian/rules. The
attached debdiff also updates debian/rules to fix the issue.

3ea68751 (part of -9 in unstable) also fixes the bug because it
completely reworks debian/rules to not have an explicit list of
architectures in debian/rules but rather now uses debhelper and
*.install to take care of this - now only the list in debian/control
needs to be updated (and there's a single place).

The bug metadata is therefore correct (except for the fact that one
could say that the bug is already found in -4; but since stable is on -8
and oldstable is way older, I don't see much point in dealing with this
detail).

 Please review and consider this for the next Jessie point release.
 Ritesh would upload the package upon receiving your ACK.
 
 No objections from my point of view.

Thanks!

Christian


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/5553a265.2050...@iwakd.de



Bug#785240: jessie-pu: package open-iscsi/2.0.873+git0.3b4b4500-8

2015-05-13 Thread Christian Seiler
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: jessie
Severity: normal
X-Debbugs-CC: r...@debian.org, debian-b...@lists.debian.org

(Cc'ing debian-boot because this affects the installer.)

Attached is a patch that fixes the RC bug #784092 targeting Jessie.
I've noticed this issue while reworking the packaging in unstable; the
udeb produced by the open-iscsi package was simply empty on some
architectures (see the bug report for details).

The issue is fixed in unstable (-9) in such a way that it won't
resurface again if the control file is updated to build the udeb for
even more architectures in the future.

The attached debdiff for stable fixes the immediate problem for Jessie
(but does not include other changes from unstable).

Please review and consider this for the next Jessie point release.
Ritesh would upload the package upon receiving your ACK.

Thank you!

-- System Information:
Debian Release: 8.0
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru open-iscsi-2.0.873+git0.3b4b4500/debian/changelog 
open-iscsi-2.0.873+git0.3b4b4500/debian/changelog
--- open-iscsi-2.0.873+git0.3b4b4500/debian/changelog   2015-02-10 
18:17:18.0 +0100
+++ open-iscsi-2.0.873+git0.3b4b4500/debian/changelog   2015-05-13 
20:03:45.0 +0200
@@ -1,3 +1,10 @@
+open-iscsi (2.0.873+git0.3b4b4500-8+deb8u1) stable; urgency=medium
+
+  * [725c5c6] Populate udebs in every architecture they are built
+(Closes: #784092)
+
+ -- Christian Seiler christ...@iwakd.de  Wed, 13 May 2015 20:01:02 +0200
+
 open-iscsi (2.0.873+git0.3b4b4500-8) unstable; urgency=medium
 
   * [e707e75] Exclude iscsid.conf from dh_fixperms. (Closes: #735773)
diff -Nru open-iscsi-2.0.873+git0.3b4b4500/debian/rules 
open-iscsi-2.0.873+git0.3b4b4500/debian/rules
--- open-iscsi-2.0.873+git0.3b4b4500/debian/rules   2015-02-10 
18:17:18.0 +0100
+++ open-iscsi-2.0.873+git0.3b4b4500/debian/rules   2015-05-13 
20:03:45.0 +0200
@@ -10,7 +10,7 @@
 DEB_UPSTREAM_VERSION=$(shell dpkg-parsechangelog | sed -rne 's,^Version: 
([^-]+).*,\1,p')
 
 DEB_HOST_ARCH?=$(shell dpkg-architecture -qDEB_HOST_ARCH)
-SUPPORTED_ARCH_UDEB = amd64 arm64 i386 ia64 mips mipsel powerpc
+SUPPORTED_ARCH_UDEB = amd64 arm64 i386 ia64 mips mipsel powerpc s390x ppc64el 
ppc64 armhf
 
 get-orig-source:
[ ! -f $(ORIG_FILE).gz ] || rm -f $(ORIG_FILE).gz


Bug#785254: jessie-pu: package didjvu/0.2.8-1

2015-05-13 Thread Daniel Stender
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu

I propose an update of didjvu in jessie, 0.2.8-1+deb8u1

The patch is a security fix of #784888 in stable.

Please see the attached debdiff for details.

The issue is marked as minor/no-dsa, so I would upload
it to stable as proposed update.

Thank you,
Daniel Stender

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru didjvu-0.2.8/debian/changelog didjvu-0.2.8/debian/changelog
--- didjvu-0.2.8/debian/changelog	2014-06-19 11:18:11.0 +0200
+++ didjvu-0.2.8/debian/changelog	2015-05-13 22:38:11.0 +0200
@@ -1,3 +1,11 @@
+didjvu (0.2.8-1+deb8u1) stable; urgency=medium
+
+  * add fix-insecure-use-of-tmp-when-calling-c44.diff, fix
+of security issue TEMP-0784889-495CCA, see #784888 (closed
+in Sid by 0.4-1).
+
+ -- Daniel Stender deb...@danielstender.com  Wed, 13 May 2015 22:38:00 +0200
+
 didjvu (0.2.8-1) unstable; urgency=low
 
   * New upstream release (Closes: #743677).
diff -Nru didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff
--- didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff	1970-01-01 01:00:00.0 +0100
+++ didjvu-0.2.8/debian/patches/fix-insecure-use-of-tmp-when-calling-c44.diff	2015-05-13 22:32:13.0 +0200
@@ -0,0 +1,83 @@
+Description: fix for security issue TEMP-0784889-495CCA
+ CVE request: http://www.openwall.com/lists/oss-security/2015/05/09/7
+Author: Daniel Stender deb...@danielstender.com
+Origin: https://bitbucket.org/jwilk/didjvu/commits/c975bca6dfc67bfcec8ad32ac64a7516a18379f1
+Bug: https://bugs.debian.org/784888
+
+--- a/lib/djvu_extra.py
 b/lib/djvu_extra.py
+@@ -76,25 +76,25 @@
+ 
+ def photo_to_djvu(image, dpi=100, slices=IW44_SLICES_DEFAULT, gamma=2.2, mask_image=None, crcb=CRCB.normal):
+ ppm_file = temporary.file(suffix='.ppm')
+-temporaries = [ppm_file]
+ image.save(ppm_file.name)
+-djvu_file = temporary.file(suffix='.djvu', mode='r+b')
+ if not isinstance(crcb, Crcb):
+ raise TypeError
+-args = [
+-'c44',
+-'-dpi', str(dpi),
+-'-slice', ','.join(map(str, slices)),
+-'-gamma', '%.1f' % gamma,
+-'-crcb%s' % crcb,
+-]
+-if mask_image is not None:
+-pbm_file = temporary.file(suffix='.pbm')
+-mask_image.save(pbm_file.name)
+-args += ['-mask', pbm_file.name]
+-temporaries += [pbm_file]
+-args += [ppm_file.name, djvu_file.name]
+-return ipc.Proxy(djvu_file, ipc.Subprocess(args).wait, temporaries)
++with temporary.directory() as djvu_dir:
++args = [
++'c44',
++'-dpi', str(dpi),
++'-slice', ','.join(map(str, slices)),
++'-gamma', '%.1f' % gamma,
++'-crcb%s' % crcb,
++]
++if mask_image is not None:
++pbm_file = temporary.file(suffix='.pbm')
++mask_image.save(pbm_file.name)
++args += ['-mask', pbm_file.name]
++djvu_path = os.path.join(djvu_dir, 'result.djvu')
++args += [ppm_file.name, djvu_path]
++ipc.Subprocess(args).wait()
++return temporary.hardlink(djvu_path, suffix='.djvu')
+ 
+ def djvu_to_iw44(djvu_file):
+ # TODO: Use Multichunk.
+--- a/lib/temporary.py
 b/lib/temporary.py
+@@ -15,6 +15,7 @@
+ 
+ import contextlib
+ import functools
++import os
+ import shutil
+ import tempfile
+ 
+@@ -22,6 +23,14 @@
+ name = functools.partial(tempfile.mktemp, prefix='didjvu.')
+ wrapper = tempfile._TemporaryFileWrapper
+ 
++def hardlink(path, suffix='', prefix='didjvu.', dir=None):
++new_path = name(suffix=suffix, prefix=prefix, dir=dir)
++os.link(path, new_path)
++return wrapper(
++open(new_path, 'r+b'),
++new_path
++)
++
+ @contextlib.contextmanager
+ def directory(*args, **kwargs):
+ kwargs = dict(kwargs)
+@@ -32,6 +41,6 @@
+ finally:
+ shutil.rmtree(tmpdir)
+ 
+-__all__ = ['file', 'directory', 'name', 'wrapper']
++__all__ = ['file', 'hardlink', 'directory', 'name', 'wrapper']
+ 
+ # vim:ts=4 sw=4 et
diff -Nru didjvu-0.2.8/debian/patches/series didjvu-0.2.8/debian/patches/series
--- didjvu-0.2.8/debian/patches/series	1970-01-01 01:00:00.0 +0100
+++ didjvu-0.2.8/debian/patches/series	2015-05-13 21:01:42.0 +0200
@@ -0,0 +1 @@
+fix-insecure-use-of-tmp-when-calling-c44.diff


Bug#785184: jessie-pu: package pdf2djvu/0.7.17-4

2015-05-13 Thread Daniel Stender
On 13.05.2015 14:25, Adam D. Barratt wrote:
 Control: tags -1 + confirmed
 
 On 2015-05-13 9:12, Daniel Stender wrote:
 I propose an update of pdf2djvu in jessie, 0.7.17-4+deb8u1.

 The patch is a security fix of #784889 in stable.

 Please see the attached debdiff for details.

 The issue is marked as minor/no-dsa, so I would upload it
 to stable as proposed update.
 
 Please go ahead.
 
 Regards,
 
 Adam

Done, ACCEPTED into proposed-updates-stable-new

Thanks,
Daniel Stender

-- 
http://qa.debian.org/developer.php?login=debian%40danielstender.com
4096R/DF5182C8
46CB 1CA8 9EA3 B743 7676 1DB9 15E0 9AF4 DF51 82C8


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/5553b873.3060...@danielstender.com



Bug#785201: jessie-pu: package virtualbox/4.3.18-dfsg-3

2015-05-13 Thread Adam D. Barratt

Control: tags -1 + confirmed

On 2015-05-13 13:50, Ritesh Raj Sarraf wrote:

Attached patch is targetted for Jessie. In Debian Bug #783142, it was
reported that VBox fails to run on machines with Intel Broadwell
architecture.

Thanks for Gianfranco for preparing the patch, and Moritz Muhlenhoff 
for

reporting the bug and cherry picking the fix from upstream.


+virtualbox (4.3.18-dfsg-4) jessie; urgency=medium
+
+  [ Moritz Mühlenhoff ]
+  * d/p/37-disable-smap.patch, cherry-pick upstream patch to fix a 
kernel

+paging issue (LP: #1437845, Closes: #783142).

4.3.18-dfsg-3+deb8u1 is more conventional. With that in mind, please go 
ahead.


Regards,

Adam


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/c2e883dd9268d763b6f21e8b55acf...@mowgli.jungle.funky-badger.org



Processed: Re: Bug#785201: jessie-pu: package virtualbox/4.3.18-dfsg-3

2015-05-13 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #785201 [release.debian.org] jessie-pu: package virtualbox/4.3.18-dfsg-3
Added tag(s) confirmed.

-- 
785201: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785201
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b785201.143153559726685.transcr...@bugs.debian.org



Bug#784998: jessie-pu: package ulogd2/2.0.4-2+deb8u1

2015-05-13 Thread Chris Boot
Control: tags -1 + pending

On 12/05/15 21:46, Adam D. Barratt wrote:
 Please go ahead, thanks.

Thanks for accepting. Uploaded.

Chris

-- 
Chris Boot
deb...@bootc.net
GPG: 8467 53CB 1921 3142 C56D  C918 F5C8 3C05 D9CE 


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/5552f310.4060...@bootc.net



Processed: Re: Bug#784998: jessie-pu: package ulogd2/2.0.4-2+deb8u1

2015-05-13 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + pending
Bug #784998 [release.debian.org] jessie-pu: package ulogd2/2.0.4-2+deb8u1
Added tag(s) pending.

-- 
784998: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784998
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b784998.143150011031018.transcr...@bugs.debian.org



Bug#785184: jessie-pu: package pdf2djvu/0.7.17-4

2015-05-13 Thread Daniel Stender
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu

I propose an update of pdf2djvu in jessie, 0.7.17-4+deb8u1.

The patch is a security fix of #784889 in stable.

Please see the attached debdiff for details.

The issue is marked as minor/no-dsa, so I would upload it
to stable as proposed update.

Thanks,
Daniel Stender

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru pdf2djvu-0.7.17/debian/changelog pdf2djvu-0.7.17/debian/changelog
--- pdf2djvu-0.7.17/debian/changelog	2014-07-05 14:14:36.0 +0200
+++ pdf2djvu-0.7.17/debian/changelog	2015-05-13 09:54:46.0 +0200
@@ -1,3 +1,11 @@
+pdf2djvu (0.7.17-4+deb8u1) stable; urgency=medium
+
+  * added fix-insecure-use-of-tmp-when-executing-c44.diff, fix
+of security issue TEMP-0784889-495CCA, see #784889 (closed
+in Sid by 0.7.21-1).
+
+ -- Daniel Stender deb...@danielstender.com  Wed, 13 May 2015 09:54:31 +0200
+
 pdf2djvu (0.7.17-4) unstable; urgency=low
 
   * Bumped standards to 3.9.5 (no changes needed).
diff -Nru pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff
--- pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff	1970-01-01 01:00:00.0 +0100
+++ pdf2djvu-0.7.17/debian/patches/fix-insecure-use-of-tmp-when-executing-c44.diff	2015-05-12 20:19:53.0 +0200
@@ -0,0 +1,18 @@
+Description: fix for security issue TEMP-0784889-495CCA
+ CVE request: http://www.openwall.com/lists/oss-security/2015/05/09/7
+Author: Daniel Stender deb...@danielstender.com
+Origin: https://bitbucket.org/jwilk/pdf2djvu/commits/62c3c48098d6232f09ecabcf8d0176d42b714041
+Bug: https://bugs.debian.org/784889
+
+--- a/pdf2djvu.cc
 b/pdf2djvu.cc
+@@ -1537,7 +1537,8 @@
+   }
+   else if (nonwhite_background_color)
+   {
+-TemporaryFile c44_file;
++TemporaryDirectory c44_dir;
++TemporaryFile c44_file(c44_dir, bg.djvu);
+ c44_file.close();
+ { /* Create solid-color PPM image with subsample ratio 12: */
+   TemporaryFile ppm_file;
diff -Nru pdf2djvu-0.7.17/debian/patches/series pdf2djvu-0.7.17/debian/patches/series
--- pdf2djvu-0.7.17/debian/patches/series	1970-01-01 01:00:00.0 +0100
+++ pdf2djvu-0.7.17/debian/patches/series	2015-05-12 20:11:42.0 +0200
@@ -0,0 +1 @@
+fix-insecure-use-of-tmp-when-executing-c44.diff