Re: Bits from the Release Team: ride like the wind, Bullseye!

2019-08-01 Thread Stéphane Glondu
Le 07/07/2019 à 03:47, Jonathan Wiltshire a écrit :
> No binary maintainer uploads for bullseye
> =
> 
> The release of buster also means the bullseye release cycle is about to begin.
> From now on, we will no longer allow binaries uploaded by maintainers to
> migrate to testing. This means that you will need to do source-only uploads if
> you want them to reach bullseye.
> 
> 
>   Q: I already did a binary upload, do I need to do a new (source-only) 
> upload?
>   A: Yes (preferably with other changes, not just a version bump).
> 
>   Q: I needed to do a binary upload because my upload went to the NEW queue,
>  do I need to do a new (source-only) upload for it to reach bullseye?
>   A: Yes. We also suggest going through NEW in experimental instead of 
> unstable
>  where possible, to avoid disruption in unstable.
> 
>   Q: Does this also apply to contrib and non-free?
>   A: No. Not all packages in contrib and non-free can be built on the buildds,
>  so maintainer uploads will still be allowed to migrate for packages
>  outside main.

Q: BinNMUs of packages uploaded before this new policy that have
   arch:all binaries can no longer migrate to testing. Is that
   intentional?

See for example ocaml-migrate-parsetree/amd64 (there are others).

This will make transitions that involve lots of binNMUs (such as
OCaml-related ones) much harder. For example, there is one such ongoing
(mini-)transition involving ocaml-migrate-parsetree, 26 other binNMUed
packages, and 7 updated packages. It will be delayed by the time to
upload all these binNMUed package and their aging. Meanwhile, this
transition may become bigger and longer as people unaware of this update
their OCaml-related packages.

Is there a public API to query the built-on-buildd flag for a given
binary package?


Cheers,

-- 
Stéphane

Please CC: me or debian-ocaml-maint on reply



Bug#933685: transition: http-parser

2019-08-01 Thread Christoph Biedl
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Hello,

following the procedures as written in the Debian wiki, I am requesting
a transition slot for the http-parser library 2.9.2, accepted in
experimental earlier today.

A test rebuild of all the the packages listed at the transition page¹
result in one failure:

* python-httptools 0.0.11-1
  Bug report with upstream fix filed as #933684

All other packages passed:

* jabberd2 2.7.0-1
* libgit2 0.27.7+dfsg.1-0.2
* ocserv 0.12.2-3
* purple-matrix 0.0.0+git20180325-1
* ruby-http-parser.rb 0.6.0-4
* tang 7-1
* tcpflow 1.5.2+repack1-1

Kind regards,

Christoph

¹ https://release.debian.org/transitions/html/auto-http-parser.html


Ben file:

title = "http-parser";
is_affected = .depends ~ /\b(libhttp\-parser2\.8)\b/ | .depends ~ 
/\b(libhttp\-parser2\.9)\b/;
is_good = .depends ~ /\b(libhttp\-parser2\.9)\b/;
is_bad = .depends ~ /\b(libhttp\-parser2\.8)\b/;



signature.asc
Description: PGP signature


Bug#933672: transition: cfitsio

2019-08-01 Thread Aurelien Jarno
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

I would like to request a transition slot for cfitsio, changing the
library name from libcfitsio7 to libcfitsio8. The API has only been
extended, not changed, so I don't expect any big issue.

Due to a mistake on my side with sbuild, I wrongly uploaded the package
to sid instead of experimental. The distribution in the changelog is
experimental, but the one in the changes file is sid... Sorry about
that.

If it is not possible to proceed with the transition in the next days,
I'll just reupload the previous version with +really to sid.

Ben file:

title = "cfitsio";
is_affected = .depends ~ "libcfitsio7" | .depends ~ "libcfitsio8";
is_good = .depends ~ "libcfitsio8";
is_bad = .depends ~ "libcfitsio7";

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)



Bug#933653: stretch-pu: package libconvert-units-perl/0.43-11~deb9u1

2019-08-01 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

This is a no-change rebuild to bump the version number in order to avoid
reusing a pre-epoch version number.


Andreas
diff -Nru libconvert-units-perl-0.43/debian/changelog 
libconvert-units-perl-0.43/debian/changelog
--- libconvert-units-perl-0.43/debian/changelog 2015-07-21 22:16:26.0 
+0200
+++ libconvert-units-perl-0.43/debian/changelog 2019-08-01 14:50:24.0 
+0200
@@ -1,3 +1,20 @@
+libconvert-units-perl (1:0.43-11~deb9u1) stretch; urgency=medium
+
+  * Non-maintainer upload.
+  * Rebuild for stretch.
+
+ -- Andreas Beckmann   Thu, 01 Aug 2019 14:50:24 +0200
+
+libconvert-units-perl (1:0.43-11) unstable; urgency=medium
+
+  * Team upload.
+  * Re-upload with version bumped to 1:0.43-11 in order to avoid filename
+clashes between 1:0.43-2 and the pre-epoch 0.43-2 version.
+Thanks: Andreas Beckmann for the bug report.
+Closes: #929615
+
+ -- gregor herrmann   Tue, 28 May 2019 23:00:33 +0200
+
 libconvert-units-perl (1:0.43-2) unstable; urgency=low
 
   [ Damyan Ivanov ]


Bug#933651: stretch-pu: package t-digest/3.0-1+deb9u1

2019-08-01 Thread Andreas Beckmann
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

This is a no-change rebuild to bump the version number in order to avoid
reusing a pre-epoch version number.


Andreas
diff -Nru t-digest-3.0/debian/changelog t-digest-3.0/debian/changelog
--- t-digest-3.0/debian/changelog   2015-05-11 04:13:48.0 +0200
+++ t-digest-3.0/debian/changelog   2019-08-01 14:26:46.0 +0200
@@ -1,3 +1,11 @@
+t-digest (1:3.0-1+deb9u1) stretch; urgency=medium
+
+  * Non-maintainer upload.
+  * No-change rebuild to avoid reuse of pre-epoch version 3.0-1
+(Closes: #929618)
+
+ -- Andreas Beckmann   Thu, 01 Aug 2019 14:26:46 +0200
+
 t-digest (1:3.0-1) unstable; urgency=medium
 
   * Reverted to t-digest 3.0 because 3.1 had introduced grave API/ABI


Bug#933645: transition: libvpx

2019-08-01 Thread Ondřej Nový
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition

Hi,

libvpx6 is ABI incompatible with libvpx5. libvpx6 is ready in experimental.

Thanks for transition.

Ben file:

title = "libvpx";
is_affected = .depends ~ "libvpx5" | .depends ~ "libvpx6";
is_good = .depends ~ "libvpx6";
is_bad = .depends ~ "libvpx5";


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=cs_CZ.UTF-8, LC_CTYPE=cs_CZ.UTF-8 (charmap=UTF-8), 
LANGUAGE=cs_CZ.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#933636: stretch-pu: package pdfresurrect/0.12-6

2019-08-01 Thread Francois Marier
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

I'd like to fix a buffer overflow in the pdfresurrect version that's in
stretch.

See https://security-tracker.debian.org/tracker/CVE-2019-14267.

Attached is the debdiff.

Francois
diff -Nru pdfresurrect-0.12/debian/changelog pdfresurrect-0.12/debian/changelog
--- pdfresurrect-0.12/debian/changelog	2015-09-13 18:30:02.0 -0700
+++ pdfresurrect-0.12/debian/changelog	2019-07-30 08:54:01.0 -0700
@@ -1,3 +1,9 @@
+pdfresurrect (0.12-6+deb9u1) stretch; urgency=high
+
+  * Fix buffer overflow (CVE-2019-14267).
+
+ -- Francois Marier   Tue, 30 Jul 2019 08:54:01 -0700
+
 pdfresurrect (0.12-6) unstable; urgency=medium
 
   * Run wrap-and-sort
diff -Nru pdfresurrect-0.12/debian/patches/CVE-2019-14267.patch pdfresurrect-0.12/debian/patches/CVE-2019-14267.patch
--- pdfresurrect-0.12/debian/patches/CVE-2019-14267.patch	1969-12-31 16:00:00.0 -0800
+++ pdfresurrect-0.12/debian/patches/CVE-2019-14267.patch	2019-07-30 08:54:01.0 -0700
@@ -0,0 +1,47 @@
+commit 4ea7a6f4f51d0440da651d099247e2273f811dbc
+Author: Matt Davis 
+Date:   Thu Jul 25 20:30:04 2019 -0700
+Last-Update: 2019-07-30
+
+Prevent a buffer overflow in possibly corrupt PDFs.
+
+The startxref identification logic assumed a worse case of having to
+inspect 256 bytes.  However, that is not always the case (e.g.,
+corrupted PDFs).  This patch prevents that situation.
+
+This bug was identified by j0lamma.  Thanks!
+
+CVE-2019-14267
+
+diff --git a/main.c b/main.c
+index d274acc..18ba696 100644
+--- a/main.c
 b/main.c
+@@ -230,7 +230,10 @@ static pdf_t *init_pdf(FILE *fp, const char *name)
+ 
+ pdf = pdf_new(name);
+ pdf_get_version(fp, pdf);
+-pdf_load_xrefs(fp, pdf);
++if (pdf_load_xrefs(fp, pdf) == -1) {
++  pdf_delete(pdf);
++  return NULL;
++}
+ pdf_load_pages_kids(fp, pdf);
+ 
+ return pdf;
+diff --git a/pdf.c b/pdf.c
+index 27b09a1..b671537 100644
+--- a/pdf.c
 b/pdf.c
+@@ -210,6 +210,11 @@ int pdf_load_xrefs(FILE *fp, pdf_t *pdf)
+   fseek(fp, pos - (++pos_count), SEEK_SET);
+ 
+ /* Suck in end of "startxref" to start of %%EOF */
++if (pos_count >= sizeof(buf)) {
++  ERR("Failed to locate the startxref token. "
++  "This might be a corrupt PDF.\n");
++  return -1;
++}
+ memset(buf, 0, sizeof(buf));
+ fread(buf, 1, pos_count, fp);
+ c = buf;
diff -Nru pdfresurrect-0.12/debian/patches/series pdfresurrect-0.12/debian/patches/series
--- pdfresurrect-0.12/debian/patches/series	2015-09-13 18:30:02.0 -0700
+++ pdfresurrect-0.12/debian/patches/series	2019-07-30 08:54:01.0 -0700
@@ -1 +1,2 @@
 fix_manpage_path.patch
+CVE-2019-14267.patch


Bug#933637: buster-pu: package pdfresurrect/0.15-2

2019-08-01 Thread Francois Marier
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

I'd like to fix a buffer overflow in the pdfresurrect version that's in
buster.

See https://security-tracker.debian.org/tracker/CVE-2019-14267.

Attached is the debdiff.

Francois
diff -Nru pdfresurrect-0.15/debian/changelog pdfresurrect-0.15/debian/changelog
--- pdfresurrect-0.15/debian/changelog	2019-03-01 23:12:55.0 -0800
+++ pdfresurrect-0.15/debian/changelog	2019-07-30 08:41:35.0 -0700
@@ -1,3 +1,9 @@
+pdfresurrect (0.15-2+deb10u1) buster; urgency=high
+
+  * Fix buffer overflow (CVE-2019-14267).
+
+ -- Francois Marier   Tue, 30 Jul 2019 08:41:35 -0700
+
 pdfresurrect (0.15-2) unstable; urgency=medium
 
   * Bump Standars-Version up to 4.3.0
diff -Nru pdfresurrect-0.15/debian/patches/CVE-2019-14267.patch pdfresurrect-0.15/debian/patches/CVE-2019-14267.patch
--- pdfresurrect-0.15/debian/patches/CVE-2019-14267.patch	1969-12-31 16:00:00.0 -0800
+++ pdfresurrect-0.15/debian/patches/CVE-2019-14267.patch	2019-07-30 08:41:35.0 -0700
@@ -0,0 +1,46 @@
+commit 4ea7a6f4f51d0440da651d099247e2273f811dbc
+Author: Matt Davis 
+Date:   Thu Jul 25 20:30:04 2019 -0700
+
+Prevent a buffer overflow in possibly corrupt PDFs.
+
+The startxref identification logic assumed a worse case of having to
+inspect 256 bytes.  However, that is not always the case (e.g.,
+corrupted PDFs).  This patch prevents that situation.
+
+This bug was identified by j0lamma.  Thanks!
+
+CVE-2019-14267
+
+diff --git a/main.c b/main.c
+index d604613..de2f8e9 100644
+--- a/main.c
 b/main.c
+@@ -203,7 +203,10 @@ static pdf_t *init_pdf(FILE *fp, const char *name)
+ 
+ pdf = pdf_new(name);
+ pdf_get_version(fp, pdf);
+-pdf_load_xrefs(fp, pdf);
++if (pdf_load_xrefs(fp, pdf) == -1) {
++  pdf_delete(pdf);
++  return NULL;
++}
+ pdf_load_pages_kids(fp, pdf);
+ 
+ return pdf;
+diff --git a/pdf.c b/pdf.c
+index 4cd7f12..b23b50a 100644
+--- a/pdf.c
 b/pdf.c
+@@ -233,6 +233,11 @@ int pdf_load_xrefs(FILE *fp, pdf_t *pdf)
+   fseek(fp, pos - (++pos_count), SEEK_SET);
+ 
+ /* Suck in end of "startxref" to start of %%EOF */
++if (pos_count >= sizeof(buf)) {
++  ERR("Failed to locate the startxref token. "
++  "This might be a corrupt PDF.\n");
++  return -1;
++}
+ memset(buf, 0, sizeof(buf));
+ SAFE_E(fread(buf, 1, pos_count, fp), pos_count,
+"Failed to read startxref.\n");
diff -Nru pdfresurrect-0.15/debian/patches/series pdfresurrect-0.15/debian/patches/series
--- pdfresurrect-0.15/debian/patches/series	1969-12-31 16:00:00.0 -0800
+++ pdfresurrect-0.15/debian/patches/series	2019-07-30 08:41:35.0 -0700
@@ -0,0 +1 @@
+CVE-2019-14267.patch


Parking Euratechnologies

2019-08-01 Thread Felice
View this email in your browser   /  VERSION FRANÇAISE

 

Tijdelijke actie: Zomerpromotie!

 

Waarom is investeren in parkings interessant?

Weinig onderhoud - Gegarandeerde huurinkomsten!

Investeren in parkeerplaatsen onderscheidt zich van het investeren in
andere onroerende goederen doordat betalingsproblemen, huurachterstand,
schade en leegstand niet voorkomen. Een parkeerplaats, dat is immers
slechts enkele lijnen op de grond en een slagboom.

**Makkelijk toch?**

* Profiteer van de stijgende parkeertarieven

* Geen zorgen dankzij de professionele uitbating

* 38.2% winststijging behaald in 2018!

* Gegarandeerde huurinkomsten

Wilt u meegenieten van deze unieke opportuniteit?

 

 

VRAAG HIER VRIJBLIJVEND MEER INFORMATIE

 

 

Geldig tot 31/08/2019

http://creadomus.acemlnc.com/lt.php?s=aad4c2688298a7ecdef3a2dcd95ba996=63A145A41A275
 

 

http://creadomus.acemlnc.com/lt.php?s=aad4c2688298a7ecdef3a2dcd95ba996=63A145A41A276
 

 

http://creadomus.acemlnc.com/lt.php?s=aad4c2688298a7ecdef3a2dcd95ba996=63A145A41A274
 

 

mailto:market...@creadomus.be 

 

If you would like to be removed from our mailing list, click here to
unsubscribe 
Creadomus , Kortrijksesteenweg 1041, 9051 Gent, Belgium

Bug#903211: Checking for removal of BD [was Re: release.debian.org: How to handle unbuildable packages in buster]

2019-08-01 Thread Niels Thykier
Paul Gevers:
> Hi all,
> 
> On Thu, 09 Aug 2018 09:32:00 + Niels Thykier  wrote:
>>  3) Build-Depends are not enforced on removal.  That is packages
>> /can/ be removed while packages are build depending on them.
>>
>> Limitation 2+3 are slightly more involved and may take quite a while for
>> us to implement.
> 
> Seems like this is really in need of attention. [...]
> 

Ack.

> I may be saying something stupid, but shouldn't the build-depends not
> *just* be added to the depends in the migration phase? Or is that still
> quite involved due to -arch/-indep?
> 
> Paul
> 

The migration phase never concerned itself with source packages (if you
are thinking of the is_installable check).  And adding
Build-Depends(-Indep|-Arch) to a random binary of the source would have
its own issues - notably, a binary is not required to be co-installable
with its source's build-depends.

It is not that it is impossible, it is just a question of spoons, time
and test cases.  If you have any trivial test cases, please by all means
begin to collect/commit them (it makes life so much easier later).

Thanks,
~Niels