Re: Bug#1033492: unblock: php8.2/8.2.4-1 ????

2023-03-25 Thread Ondřej Surý
Paul,

just a quick reply - PHP already has a security (and if I remember correctly 
release) team exception from the last time. So, we already had this talk about 
upstream policies.

I’m happy to fill the template though when it’s not Sunday.

Ondrej
--
Ondřej Surý  (He/Him)

> On 26. 3. 2023, at 8:15, Paul Gevers  wrote:
> 
> Package: release.debian.org
> Tags: moreinfo
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: ond...@sury.org
> Control: affects -1 src:php8.2
> 
> Dear Ondřej,
> 
> I just noticed that security bug 1031368 is fixed in unstable was fixed in 
> php8.2 version 8.2.3-1. That didn't migrate to testing because we're in the 
> freeze [1], you didn't request an unblock and (to be honest) I deferred when 
> I looked a while back because it involves a new upstream release. New 
> upstream versions are in principle against the freeze policy unless it's a 
> targeted-fix-only release. From a quick look at the upstream NEWS file, that 
> could very well be the case, can you confirm that? I'd like you to provide us 
> the usual information we use in the unblock process so I have added the 
> reportbug template below as an aid; the biggest question I have is: can you 
> point us at the upstream policy that explains what goes into their stable 
> releases?
> 
> php8.2 is a key package.
> 
> Paul
> 
> [1] https://release.debian.org/testing/freeze_policy.html#hard
> 
> Please unblock package php8.2
> 
> (Please provide enough (but not too much) information to help
> the release team to judge the request efficiently. E.g. by
> filling in the sections below.)
> 
> [ Reason ]
> (Explain what the reason for the unblock request is.)
> 
> [ Impact ]
> (What is the impact for the user if the unblock isn't granted?)
> 
> [ Tests ]
> (What automated or manual tests cover the affected code?)
> 
> [ Risks ]
> (Discussion of the risks involved. E.g. code is trivial or
> complex, key package vs leaf package, alternatives available.)
> 
> [ Checklist ]
>  [ ] all changes are documented in the d/changelog
>  [ ] I reviewed all changes and I approve them
>  [ ] attach debdiff against the package in testing
> 
> [ Other info ]
> (Anything else the release team should know.)
> 
> unblock php8.2/8.2.4-1
> 



Processed: unblock: php8.2/8.2.4-1 ????

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 src:php8.2
Bug #1033492 [release.debian.org] unblock: php8.2/8.2.4-1 
Added indication that 1033492 affects src:php8.2

-- 
1033492: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033492
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



unblock: php8.2/8.2.4-1 ????

2023-03-25 Thread Paul Gevers

Package: release.debian.org
Tags: moreinfo
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: ond...@sury.org
Control: affects -1 src:php8.2

Dear Ondřej,

I just noticed that security bug 1031368 is fixed in unstable was fixed 
in php8.2 version 8.2.3-1. That didn't migrate to testing because we're 
in the freeze [1], you didn't request an unblock and (to be honest) I 
deferred when I looked a while back because it involves a new upstream 
release. New upstream versions are in principle against the freeze 
policy unless it's a targeted-fix-only release. From a quick look at the 
upstream NEWS file, that could very well be the case, can you confirm 
that? I'd like you to provide us the usual information we use in the 
unblock process so I have added the reportbug template below as an aid; 
the biggest question I have is: can you point us at the upstream policy 
that explains what goes into their stable releases?


php8.2 is a key package.

Paul

[1] https://release.debian.org/testing/freeze_policy.html#hard

Please unblock package php8.2

(Please provide enough (but not too much) information to help
the release team to judge the request efficiently. E.g. by
filling in the sections below.)

[ Reason ]
(Explain what the reason for the unblock request is.)

[ Impact ]
(What is the impact for the user if the unblock isn't granted?)

[ Tests ]
(What automated or manual tests cover the affected code?)

[ Risks ]
(Discussion of the risks involved. E.g. code is trivial or
complex, key package vs leaf package, alternatives available.)

[ Checklist ]
  [ ] all changes are documented in the d/changelog
  [ ] I reviewed all changes and I approve them
  [ ] attach debdiff against the package in testing

[ Other info ]
(Anything else the release team should know.)

unblock php8.2/8.2.4-1



OpenPGP_signature
Description: OpenPGP digital signature


Bug#1031042: mariadb-10.5 10.5.19-0+deb11u1 flagged for acceptance

2023-03-25 Thread Paul Gevers

Hi Otto,

On 26-03-2023 06:48, Otto Kekäläinen wrote:

Based on 
https://packages.debian.org/search?keywords=mariadb-server&searchon=names&suite=all§ion=all
this 10.5.19-0+deb11u1 is still pending and a stable update of Debian
11 "Bullseye" has not yet been made in March 2023?


https://lists.debian.org/debian-live/2023/03/msg00025.html


Is it OK if I merge in one regression fix and upload a new version?


I'm not a stable release manager, but I'm pretty sure it's better to 
file a new bug for that request than updating this bug (it's part of the 
workflow).


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Processed: Re: Bug#1033464: unblock: fish/3.6.0-3

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 confirmed moreinfo
Bug #1033464 [release.debian.org] unblock: fish/3.6.0-3
Added tag(s) moreinfo and confirmed.

-- 
1033464: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033464
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033464: unblock: fish/3.6.0-3

2023-03-25 Thread Paul Gevers

Control: tags -1 confirmed moreinfo

Hi Mo,

On 25-03-2023 15:39, M. Zhou wrote:

Please unblock package fish
Not yet uploaded. This package does not have a proper
autopkgtest, manual unblock needed.


Please go ahead and remove the moreinfo tag once that happened.

Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1031042: mariadb-10.5 10.5.19-0+deb11u1 flagged for acceptance

2023-03-25 Thread Otto Kekäläinen
Hi!

Based on 
https://packages.debian.org/search?keywords=mariadb-server&searchon=names&suite=all§ion=all
this 10.5.19-0+deb11u1 is still pending and a stable update of Debian
11 "Bullseye" has not yet been made in March 2023?

Is it OK if I merge in one regression fix and upload a new version?

https://salsa.debian.org/mariadb-team/mariadb-10.5/-/merge_requests/13



Bug#1033490: unblock: py7zr/0.11.3+dfsg-5

2023-03-25 Thread Sandro Tosi
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: py...@packages.debian.org, mo...@debian.org
Control: affects -1 + src:py7zr

Please unblock package py7zr

This package fixes CVE-2022-44900 aka #1032091

[ Reason ]
fixes a security issue and makes the package RC-free, allowing calibre to stay
in bookwork

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

The package diff is visible 
https://salsa.debian.org/python-team/packages/py7zr/-/compare/debian%2F0.11.3+dfsg-4...debian%2F0.11.3+dfsg-5?from_project_id=56010&straight=false
 (if you prefer an actual debdiff file attached, let me know)

unblock py7zr/0.11.3+dfsg-5



Processed: unblock: py7zr/0.11.3+dfsg-5

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:py7zr
Bug #1033490 [release.debian.org] unblock: py7zr/0.11.3+dfsg-5
Added indication that 1033490 affects src:py7zr

-- 
1033490: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033490
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033374: marked as done (unblock: ruby-rack/2.2.6.4-1)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 23:23:19 +
with message-id 
and subject line unblock ruby-rack
has caused the Debian Bug report #1033374,
regarding unblock: ruby-rack/2.2.6.4-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: ruby-r...@packages.debian.org
Control: affects -1 + src:ruby-rack

Please see these changes for ruby-rack (I have not uploaded yet) is ok.

[ Reason ]
It fixes two CVEs (though it includes some other bug fixes too)

[ Impact ]
Some of the changes included in this release are already included in 
the debian package as patches, this just reduces maintenance effort.


[ Tests ]
Upstream testsuite passes, gitlab is already using the 2.2.6.4 version.

[ Risks ]
If this is not unblocked, two CVEs would have to be backported to 2.2.4


[ Checklist ]
 [x] all changes are documented in the d/changelog
 [x] I reviewed all changes and I approve them
 [x] attach debdiff against the package in testing

[ Other info ]

unblock ruby-rack/2.2.6.4-1


diff -Nru ruby-rack-2.2.4/CHANGELOG.md ruby-rack-2.2.6.4/CHANGELOG.md
--- ruby-rack-2.2.4/CHANGELOG.md	2022-07-01 03:48:29.0 +0530
+++ ruby-rack-2.2.6.4/CHANGELOG.md	2023-03-13 23:37:51.0 +0530
@@ -2,6 +2,33 @@
 
 All notable changes to this project will be documented in this file. For info on how to format all future additions to this file please reference [Keep A Changelog](https://keepachangelog.com/en/1.0.0/).
 
+## [2.2.6.4] - 2023-03-13
+
+- [CVE-2023-27539] Avoid ReDoS in header parsing
+
+## [2.2.6.3] - 2023-03-02
+
+- [CVE-2023-27530] Introduce multipart_total_part_limit to limit total parts
+
+## [2.2.6.2] - 2022-01-17
+
+- [CVE-2022-44570] Fix ReDoS in Rack::Utils.get_byte_ranges
+
+## [2.2.6.1] - 2022-01-17
+
+- [CVE-2022-44571] Fix ReDoS vulnerability in multipart parser
+- [CVE-2022-44572] Forbid control characters in attributes (also ReDoS)
+
+## [2.2.6] - 2022-01-17
+
+- Extend `Rack::MethodOverride` to handle `QueryParser::ParamsTooDeepError` error. ([#2011](https://github.com/rack/rack/pull/2011), [@byroot](https://github.com/byroot))
+
+## [2.2.5] - 2022-12-27
+
+### Fixed
+
+- `Rack::URLMap` uses non-deprecated form of `Regexp.new`. ([#1998](https://github.com/rack/rack/pull/1998), [@weizheheng](https://github.com/weizheheng))
+
 ## [2.2.4] - 2022-06-30
 
 - Better support for lower case headers in `Rack::ETag` middleware. ([#1919](https://github.com/rack/rack/pull/1919), [@ioquatix](https://github.com/ioquatix))
diff -Nru ruby-rack-2.2.4/debian/changelog ruby-rack-2.2.6.4/debian/changelog
--- ruby-rack-2.2.4/debian/changelog	2023-02-09 16:17:17.0 +0530
+++ ruby-rack-2.2.6.4/debian/changelog	2023-03-24 01:32:43.0 +0530
@@ -1,3 +1,10 @@
+ruby-rack (2.2.6.4-1) unstable; urgency=medium
+
+  * Team Upload
+  * New upstream version 2.2.6.4 (Fixes: CVE-2023-27530, CVE-2023-27539)
+
+ -- Pirate Praveen   Fri, 24 Mar 2023 01:32:43 +0530
+
 ruby-rack (2.2.4-3) unstable; urgency=high
 
   * Team upload
diff -Nru ruby-rack-2.2.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch
--- ruby-rack-2.2.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch	2023-02-09 16:17:17.0 +0530
+++ ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch	1970-01-01 05:30:00.0 +0530
@@ -1,26 +0,0 @@
 a/lib/rack/utils.rb
-+++ b/lib/rack/utils.rb
-@@ -348,17 +348,18 @@
-   return nil unless http_range && http_range =~ /bytes=([^;]+)/
-   ranges = []
-   $1.split(/,\s*/).each do |range_spec|
--return nil  unless range_spec =~ /(\d*)-(\d*)/
--r0, r1 = $1, $2
--if r0.empty?
--  return nil  if r1.empty?
-+return nil unless range_spec.include?('-')
-+range = range_spec.split('-')
-+r0, r1 = range[0], range[1]
-+if r0.nil? || r0.empty?
-+  return nil if r1.nil?
-   # suffix-byte-range-spec, represents trailing suffix of file
-   r0 = size - r1.to_i
-   r0 = 0  if r0 < 0
-   r1 = size - 1
- else
-   r0 = r0.to_i
--  if r1.empty?
-+  if r1.nil?
- r1 = size - 1
-   else
- r1 = r1.to_i
diff -Nru ruby-rack-2.2.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.

NEW changes in stable-new

2023-03-25 Thread Debian FTP Masters
Processing changes file: 
intel-microcode_3.20230214.1~deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: 
intel-microcode_3.20230214.1~deb11u1_i386-buildd.changes
  ACCEPT



Bug#1033006: unblock: openvpn/2.6.1-1 (preapproval)

2023-03-25 Thread Sebastian Ramacher
Control: tags -1 moreinfo

On 2023-03-24 23:46:56 +0100, Bernhard Schmidt wrote:
> On 15/03/23 04:57 PM, Bernhard Schmidt wrote:
> 
> Hi,
> 
> > The upcoming DCO change will involve a new version of src:openvpn and a new 
> > version
> > of src:openvpn-dco-dkms. The list of changes on the kernel side is already 
> > visible
> > on https://github.com/OpenVPN/ovpn-dco/commits/master .
> > 
> > In the past we managed to break DCO on above mentioned really heavily loaded
> > OpenVPN server within a few hours. The new version is a major overhaul and 
> > more
> > in-line with code upstreamable in Linux, and did survive torture tests.
> > 
> > I know this is kind of late, but I think it would be better to include it 
> > as well
> > as soon as it is released because
> > 
> > - we cannot support the old deprecated module
> > - openvpn uses DCO (of the right version) automatically and will 
> > transparently
> >   fall-back to non-DCO mode if the module is not found (or the wrong 
> > version)
> > - it has not been in Bullseye previously, so if we see that DCO is too 
> > unstable
> >   with the new version we can just drop it before the release
> 
> So, the release of 2.6.2 with the new DCO module has been done
> yesterday, fixing a number of bugs already present in 2.6.0.
> 
> https://github.com/OpenVPN/openvpn/blob/release/2.6/Changes.rst
> 
> ---
> New control packets flow for data channel offloading on Linux. 2.6.2+
> changes the way OpenVPN control packets are handled on Linux when DCO is
> active, fixing the lockups observed with 2.6.0/2.6.1 under high client
> connect/disconnect activity. This is an INCOMPATIBLE change and
> therefore an ovpn-dco kernel module older than v0.2.20230323 (commit ID
> 726fdfe0fa21) will not work anymore and must be upgraded. The kernel
> module was renamed to "ovpn-dco-v2.ko" in order to highlight this change
> and ensure that users and userspace software could easily understand
> which version is loaded. Attempting to use the old ovpn-dco with 2.6.2+
> will lead to disabling DCO at runtime.
> ---
> 
> So I need some guidance from the release team how to proceed. I can
> think of
> 
> - abandoning all of this, leading to a bookworm release using a buggy
>   OpenVPN version with a DCO kernel interface that noone else uses
> - update experimental to 2.6.2 and the new DCO module, then ask for a
>   approval for upload to unstable (2.6.1+2.6.2) in one go
> - upload 2.6.2 and the new DCO module to unstable right away
> - upload 2.6.1 from experimental to unstable, then stage 2.6.2 and the
>   new DCO in experimental for the second review round
> 
> I would prefer the last option.

Let's go ahead with the last option. Please let us know once openvpn
2.6.1 is in unstable.

Cheers
-- 
Sebastian Ramacher



Processed: Re: Bug#1033006: unblock: openvpn/2.6.1-1 (preapproval)

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #1033006 [release.debian.org] unblock: openvpn/2.6.1-1 (preapproval)
Added tag(s) moreinfo.

-- 
1033006: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033006
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033476: marked as done (unblock: lios/2.7.2-4)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 19:35:57 +
with message-id 
and subject line unblock lios
has caused the Debian Bug report #1033476,
regarding unblock: lios/2.7.2-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033476: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033476
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: l...@packages.debian.org
Control: affects -1 + src:lios

Hello,

I have uploaded a fixed version of lios (thanks Gunnar Hjalmarsson!)

[ Reason ]
lios cannot start when gtk4 is installed, because lios is compatible
with gtk3 only, but was not specifying it to gi.

[ Impact ]
So a user would have to choose between installing applications depending
on gtk4 and installing lios.

[ Tests ]
It was tested manually and confirmed by the submitter.

[ Risks ]
The code is very trivial

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock lios/2.7.2-4
diff -Nru lios-2.7.2/debian/changelog lios-2.7.2/debian/changelog
--- lios-2.7.2/debian/changelog 2022-10-23 12:24:21.0 +0200
+++ lios-2.7.2/debian/changelog 2023-03-13 20:00:26.0 +0100
@@ -1,3 +1,17 @@
+lios (2.7.2-4) unstable; urgency=medium
+
+  * Upload fix to unstable, thanks Gunnar!
+
+ -- Samuel Thibault   Mon, 13 Mar 2023 20:00:26 +0100
+
+lios (2.7.2-3.1) experimental; urgency=medium
+
+  * Non-maintainer upload
+  * Use exact versions when importing Gtk and friends
+- Cherry picked upstream commit (closes: #1032895)
+
+ -- Gunnar Hjalmarsson   Mon, 13 Mar 2023 18:03:42 +0100
+
 lios (2.7.2-3) unstable; urgency=medium
 
   [ Samuel Thibault ]
diff -Nru lios-2.7.2/debian/patches/series lios-2.7.2/debian/patches/series
--- lios-2.7.2/debian/patches/series2020-02-09 00:13:30.0 +0100
+++ lios-2.7.2/debian/patches/series2023-03-13 19:57:48.0 +0100
@@ -1,2 +1,3 @@
 tesseract_langpath
 typo
+Use-exact-versions-when-importing-Gtk-and-friends.patch
diff -Nru 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
--- 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
   1970-01-01 01:00:00.0 +0100
+++ 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
   2023-03-13 19:57:48.0 +0100
@@ -0,0 +1,274 @@
+From: Mikhail Rudenko 
+Date: Mon, 21 Jun 2021 21:29:30 +0300
+Subject: Use exact versions when importing Gtk and friends
+
+This is necessary in environments where Gtk-3 and Gtk-4 are both
+installed. Otherwise, multiple `AttributeError`s arise, e.g.
+
+```
+Traceback (most recent call last):
+  File "/usr/bin/lios", line 19, in 
+from lios.main import *
+  File "/usr/lib/python3.9/site-packages/lios/main.py", line 27, in 
+from lios import scanner, editor, imageview, cam, ocr, preferences, speech
+  File "/usr/lib/python3.9/site-packages/lios/editor.py", line 20, in 
+from lios.ui.gtk import text_view, tree_view, widget, dialog, 
file_chooser, containers, window
+  File "/usr/lib/python3.9/site-packages/lios/ui/gtk/widget.py", line 166, in 

+class Separator(Gtk.HSeparator):
+  File "/usr/lib/python3.9/site-packages/gi/overrides/__init__.py", line 32, 
in __getattr__
+return getattr(self._introspection_module, name)
+  File "/usr/lib/python3.9/site-packages/gi/module.py", line 123, in 
__getattr__
+raise AttributeError("%r object has no attribute %r" % (
+AttributeError: 'gi.repository.Gtk' object has no attribute 'HSeparator'
+```
+
+Origin: https://github.com/zendalona/lios/commit/73fc343c
+Bug-Debian: https://bugs.debian.org/1032895
+---
+ lios/cam.py | 5 +
+ lios/ui/gtk/about.py| 3 +++
+ lios/ui/gtk/containers.py   | 5 -
+ lios/ui/gtk/dialog.py   | 3 +++
+ lios/ui/gtk/drawing_area.py | 7 +--
+ lios/ui/gtk/file_chooser.py | 3 +++
+ lios/ui/gtk/icon_view.py| 4 
+ lios/ui/gtk/loop.py | 9 ++---
+ lios/ui/gtk/menu.py | 5 -
+ lios/ui/gtk/print_dialog.py | 3 +++
+ lios/ui/gtk/terminal.py | 3 +++
+ lios/ui/gtk/text_view.py| 3 +++
+ lios/ui/gtk/tree_view.py| 4 
+ lios/ui/gtk/widget.py   | 3 +++
+ lios/ui/gtk/window.py   | 4 
+ 15 files changed, 57 insertions(+), 7 deletions(-)
+
+diff --git a/lios/cam.py b/lios/cam.py
+index db0a06f..2

Bug#1033473: marked as done (unblock: espeakup/1:0.90-13)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 19:35:31 +
with message-id 
and subject line unblock espeakup
has caused the Debian Bug report #1033473,
regarding unblock: espeakup/1:0.90-13
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033473: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033473
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: espea...@packages.debian.org
Control: affects -1 + src:espeakup

Hello,

I have uploaded version 1:0.90-13 of the espeakup package in unstable.

[ Reason ]
It introduces some more debugging logs in the debian installer, in case
several audio cards are detected, to make sure how the kernel calls
them, to make discussion about installation reports easier.

[ Impact ]
Without the change it will be less clear which cards the user has.
(it is quite common for blind users to have several sound cards)

[ Tests ]
It was tested manually.

[ Risks ]
The code is very trivial.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

Thanks!

unblock espeakup/1:0.90-13
diff -Nru espeakup-0.90/debian/changelog espeakup-0.90/debian/changelog
--- espeakup-0.90/debian/changelog  2022-11-29 01:13:54.0 +0100
+++ espeakup-0.90/debian/changelog  2023-03-08 00:09:40.0 +0100
@@ -1,3 +1,9 @@
+espeakup (1:0.90-13) unstable; urgency=medium
+
+  * espeakup-udeb.start: Log the number and ids of detected audio cards.
+
+ -- Samuel Thibault   Wed, 08 Mar 2023 00:09:40 +0100
+
 espeakup (1:0.90-12) unstable; urgency=medium
 
   * espeakup-udeb.restart: Avoid warning about missing mbrola voice in 
installer.
diff -Nru espeakup-0.90/debian/espeakup-udeb.start 
espeakup-0.90/debian/espeakup-udeb.start
--- espeakup-0.90/debian/espeakup-udeb.start2022-11-29 01:07:45.0 
+0100
+++ espeakup-0.90/debian/espeakup-udeb.start2023-03-08 00:06:48.0 
+0100
@@ -44,6 +44,8 @@
N=$(echo $IDS | wc -w)
 
echo "Found $N audio card(s)."
+   echo "Found $N audio card(s):" >> /var/log/espeakup.log
+   echo "$IDS" >> /var/log/espeakup.log
 
case $N in
1)
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Bug#1033292: marked as done (unblock: amanda/1:3.5.1-11)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 19:34:47 +
with message-id 
and subject line unblock amanda
has caused the Debian Bug report #1033292,
regarding unblock: amanda/1:3.5.1-11
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033292: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033292
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: ama...@packages.debian.org, jose.calha...@tecnico.ulisboa.pt, 
calha...@debian.org, ns-l...@dsi.ist.utl.pt
Control: affects -1 + src:amanda

Please unblock package amanda


[ Reason ]

The previous version on the fix for CVE-CVE-2022-37705 introduced a
regression that is fixed by this version.  


[ Impact ]

Breaks the use of tar, for backups in some setups, on the affected
clients, i.e., the use of package amanda-client.  The server can not
backup itself, but can backups clients with good amanda client
software,



[ Tests ]

I manually tested the affected version and the fixed version, using a
VM running testing (bookworm) with a amanda compiled for sid.  The
test is to do backup of the server.  The detail that breaks or not is
two options in a dumptype that specifies what program to use for
backup.  When using traditional and old interface for gnutar it
breaks.  When using the new interface it is not affected.

I do not have experience in C language to do a proper review of the
patch that is very simple, but broken in 3.5.1-10.


[ Risks ]

The fix in 3.5.1-10 for the three CVEs are a low risks ones because
user backup is a restricted user.  Only people with previliges already
can login as user backup and try to run the setgid binaries.  For the
people affected by regression 3.5.1-10 can workaround using an older
version on the affected clients.  This bugs does not affect other
packages as amanda-client is a leaf package.



[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

[ Other info ]

for name in amanda-client amanda-common amanda-server ; do debdiff 
"/var/cache/apt/archives/${name}_1%3a3.5.1-10_amd64.deb" 
"/root/${name}_3.5.1-11_amd64.deb" ; done

File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)

Depends: amanda-common (= [-1:3.5.1-10),-] {+1:3.5.1-11),+} libxml-simple-perl, 
perl:any, libc6 (>= 2.34), libglib2.0-0 (>= 2.31.8), libreadline8 (>= 6.0)
Version: [-1:3.5.1-10-] {+1:3.5.1-11+}
File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)

Suggests: amanda-server (= [-1:3.5.1-10)-] {+1:3.5.1-11)+} | amanda-client (= 
[-1:3.5.1-10)-] {+1:3.5.1-11)+}
Version: [-1:3.5.1-10-] {+1:3.5.1-11+}
File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)

Depends: amanda-common (= [-1:3.5.1-10),-] {+1:3.5.1-11),+} bsd-mailx | mailx, 
libjson-perl, perl:any, libc6 (>= 2.34), libcurl4 (>= 7.16.2), libglib2.0-0 (>= 
2.31.8)
Installed-Size: [-1076-] {+1077+}
Suggests: amanda-client (= [-1:3.5.1-10),-] {+1:3.5.1-11),+} cpio | mt-st, 
gnuplot
Version: [-1:3.5.1-10-] {+1:3.5.1-11+}




unblock amanda/1:3.5.1-11
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Bug#1033292: Subject:Re: Bug#1033292: unblock: amanda/1:3.5.1-11

2023-03-25 Thread Jose M Calhariz
Hi,

I have updated the git repository on salsa abount amanda and created a
signed tag.  g...@salsa.debian.org:debian/amanda.git

As the debdiff amanda_3.5.1-10_source.changes
amanda_3.5.1-11_source.changes did not work as I expected I am 
doing a git diff:

diff --git a/debian/changelog b/debian/changelog
index d4e1821..498f6f9 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+amanda (1:3.5.1-11) unstable; urgency=medium
+
+  * d/p/49-fix-CVE-2022-37705_part_2: 48-fix-CVE-2022-37705 broken one use
+case at least, this patch fix it, fixing the following two bugs.
+  * Bug fix: "backups fail with the following summary "FAILED [no
+backup size line]"", thanks to Norman Lyon (Closes: #1032330).
+  * Bug fix: "Amanda is unusable", thanks to Kamil Jonca (Closes:
+#1032884).
+
+ -- Jose M Calhariz   Tue, 21 Mar 2023 17:35:47 +
+
 amanda (1:3.5.1-10) unstable; urgency=medium
 
   * d/p/48-fix-CVE-2022-37705: Fix CVE-2022-37705.
diff --git a/debian/patches/49-fix-CVE-2022-37705_part_2 
b/debian/patches/49-fix-CVE-2022-37705_part_2
new file mode 100644
index 000..74341a6
--- /dev/null
+++ b/debian/patches/49-fix-CVE-2022-37705_part_2
@@ -0,0 +1,24 @@
+Description: Fix the fix for CVE-2022-37705
+Author: pcahyna https://github.com/pcahyna
+
+Index: amanda.git/client-src/runtar.c
+===
+--- amanda.git.orig/client-src/runtar.c2023-03-05 00:10:46.916884175 
+
 amanda.git/client-src/runtar.c 2023-03-05 00:15:52.189417756 +
+@@ -191,9 +191,13 @@ main(
+   g_str_has_prefix(argv[i],"--newer") ||
+   g_str_has_prefix(argv[i],"--exclude-from") ||
+   g_str_has_prefix(argv[i],"--files-from")) {
+-  good_option++;
+-  } else if (argv[i][0] != '-') {
+-  /* argument values are accounted for here */
++  if (strchr(argv[i], '=')) {
++  good_option++;
++  } else {
++  /* Accept theses options with the following argument */
++  good_option += 2;
++  }
++} else if (argv[i][0] != '-') {
+   good_option++;
+   }
+   }
diff --git a/debian/patches/series b/debian/patches/series
index 92dde9d..2be2df4 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -45,6 +45,7 @@ reproducible-build
 ##
 # Patches to fix CVEs from 2022
 48-fix-CVE-2022-37705
+49-fix-CVE-2022-37705_part_2
 50-fix-CVE-2022-37704
 52-fix-CVE-2022-37704_part_2
 56-fix-CVE-2022-37703






I have attached the two patches for CVE-2022-37705 that I use in the
package, the one with the regression and the fix.

Kind regards
Jose M Calhariz





-- 
--
Ha alguma coisa nos armarios que deixa os esqueletos
inquietos.
-- John Barrymore
Description: Fix CVE-2022-37705
Author: Prajwal T R https://github.com/prajwaltr93

Index: amanda.git/client-src/runtar.c
===
--- amanda.git.orig/client-src/runtar.c 2021-06-20 21:02:56.627301251 +0100
+++ amanda.git/client-src/runtar.c  2023-02-24 12:40:05.041286442 +
@@ -191,9 +191,9 @@ main(
g_str_has_prefix(argv[i],"--newer") ||
g_str_has_prefix(argv[i],"--exclude-from") ||
g_str_has_prefix(argv[i],"--files-from")) {
-   /* Accept theses options with the following argument */
-   good_option += 2;
+   good_option++;
} else if (argv[i][0] != '-') {
+   /* argument values are accounted for here */
good_option++;
}
}
Description: Fix the fix for CVE-2022-37705
Author: pcahyna https://github.com/pcahyna

Index: amanda.git/client-src/runtar.c
===
--- amanda.git.orig/client-src/runtar.c 2023-03-05 00:10:46.916884175 +
+++ amanda.git/client-src/runtar.c  2023-03-05 00:15:52.189417756 +
@@ -191,9 +191,13 @@ main(
g_str_has_prefix(argv[i],"--newer") ||
g_str_has_prefix(argv[i],"--exclude-from") ||
g_str_has_prefix(argv[i],"--files-from")) {
-   good_option++;
-   } else if (argv[i][0] != '-') {
-   /* argument values are accounted for here */
+   if (strchr(argv[i], '=')) {
+   good_option++;
+   } else {
+   /* Accept theses options with the following argument */
+   good_option += 2;
+   }
+} else if (argv[i][0] != '-') {
good_option++;
}
}


signature.asc
Description: PGP signature


Bug#1033476: unblock: lios/2.7.2-4

2023-03-25 Thread Samuel Thibault
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: l...@packages.debian.org
Control: affects -1 + src:lios

Hello,

I have uploaded a fixed version of lios (thanks Gunnar Hjalmarsson!)

[ Reason ]
lios cannot start when gtk4 is installed, because lios is compatible
with gtk3 only, but was not specifying it to gi.

[ Impact ]
So a user would have to choose between installing applications depending
on gtk4 and installing lios.

[ Tests ]
It was tested manually and confirmed by the submitter.

[ Risks ]
The code is very trivial

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

unblock lios/2.7.2-4
diff -Nru lios-2.7.2/debian/changelog lios-2.7.2/debian/changelog
--- lios-2.7.2/debian/changelog 2022-10-23 12:24:21.0 +0200
+++ lios-2.7.2/debian/changelog 2023-03-13 20:00:26.0 +0100
@@ -1,3 +1,17 @@
+lios (2.7.2-4) unstable; urgency=medium
+
+  * Upload fix to unstable, thanks Gunnar!
+
+ -- Samuel Thibault   Mon, 13 Mar 2023 20:00:26 +0100
+
+lios (2.7.2-3.1) experimental; urgency=medium
+
+  * Non-maintainer upload
+  * Use exact versions when importing Gtk and friends
+- Cherry picked upstream commit (closes: #1032895)
+
+ -- Gunnar Hjalmarsson   Mon, 13 Mar 2023 18:03:42 +0100
+
 lios (2.7.2-3) unstable; urgency=medium
 
   [ Samuel Thibault ]
diff -Nru lios-2.7.2/debian/patches/series lios-2.7.2/debian/patches/series
--- lios-2.7.2/debian/patches/series2020-02-09 00:13:30.0 +0100
+++ lios-2.7.2/debian/patches/series2023-03-13 19:57:48.0 +0100
@@ -1,2 +1,3 @@
 tesseract_langpath
 typo
+Use-exact-versions-when-importing-Gtk-and-friends.patch
diff -Nru 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
--- 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
   1970-01-01 01:00:00.0 +0100
+++ 
lios-2.7.2/debian/patches/Use-exact-versions-when-importing-Gtk-and-friends.patch
   2023-03-13 19:57:48.0 +0100
@@ -0,0 +1,274 @@
+From: Mikhail Rudenko 
+Date: Mon, 21 Jun 2021 21:29:30 +0300
+Subject: Use exact versions when importing Gtk and friends
+
+This is necessary in environments where Gtk-3 and Gtk-4 are both
+installed. Otherwise, multiple `AttributeError`s arise, e.g.
+
+```
+Traceback (most recent call last):
+  File "/usr/bin/lios", line 19, in 
+from lios.main import *
+  File "/usr/lib/python3.9/site-packages/lios/main.py", line 27, in 
+from lios import scanner, editor, imageview, cam, ocr, preferences, speech
+  File "/usr/lib/python3.9/site-packages/lios/editor.py", line 20, in 
+from lios.ui.gtk import text_view, tree_view, widget, dialog, 
file_chooser, containers, window
+  File "/usr/lib/python3.9/site-packages/lios/ui/gtk/widget.py", line 166, in 

+class Separator(Gtk.HSeparator):
+  File "/usr/lib/python3.9/site-packages/gi/overrides/__init__.py", line 32, 
in __getattr__
+return getattr(self._introspection_module, name)
+  File "/usr/lib/python3.9/site-packages/gi/module.py", line 123, in 
__getattr__
+raise AttributeError("%r object has no attribute %r" % (
+AttributeError: 'gi.repository.Gtk' object has no attribute 'HSeparator'
+```
+
+Origin: https://github.com/zendalona/lios/commit/73fc343c
+Bug-Debian: https://bugs.debian.org/1032895
+---
+ lios/cam.py | 5 +
+ lios/ui/gtk/about.py| 3 +++
+ lios/ui/gtk/containers.py   | 5 -
+ lios/ui/gtk/dialog.py   | 3 +++
+ lios/ui/gtk/drawing_area.py | 7 +--
+ lios/ui/gtk/file_chooser.py | 3 +++
+ lios/ui/gtk/icon_view.py| 4 
+ lios/ui/gtk/loop.py | 9 ++---
+ lios/ui/gtk/menu.py | 5 -
+ lios/ui/gtk/print_dialog.py | 3 +++
+ lios/ui/gtk/terminal.py | 3 +++
+ lios/ui/gtk/text_view.py| 3 +++
+ lios/ui/gtk/tree_view.py| 4 
+ lios/ui/gtk/widget.py   | 3 +++
+ lios/ui/gtk/window.py   | 4 
+ 15 files changed, 57 insertions(+), 7 deletions(-)
+
+diff --git a/lios/cam.py b/lios/cam.py
+index db0a06f..23087ad 100644
+--- a/lios/cam.py
 b/lios/cam.py
+@@ -16,6 +16,11 @@
+ #You should have received a copy of the GNU General Public License
+ #along with this program.  If not, see .
+ ###
++
++import gi
++gi.require_version("Gtk", "3.0")
++gi.require_version('GstVideo', '1.0')
++
+ from gi.repository import GdkX11, GstVideo
+ from gi.repository import Gtk
+ from gi.repository import Gst
+diff --git a/lios/ui/gtk/about.py b/lios/ui/gtk/about.py
+index b98196c..cfd8e1e 100644
+--- a/lios/ui/gtk/about.py
 b/lios/ui/gtk/about.py
+@@ -18,6 +18,9 @@
+ #along with this program.  If not, see .
+ 

Processed: unblock: lios/2.7.2-4

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:lios
Bug #1033476 [release.debian.org] unblock: lios/2.7.2-4
Added indication that 1033476 affects src:lios

-- 
1033476: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033476
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033473: unblock: espeakup/1:0.90-13

2023-03-25 Thread Samuel Thibault
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: espea...@packages.debian.org
Control: affects -1 + src:espeakup

Hello,

I have uploaded version 1:0.90-13 of the espeakup package in unstable.

[ Reason ]
It introduces some more debugging logs in the debian installer, in case
several audio cards are detected, to make sure how the kernel calls
them, to make discussion about installation reports easier.

[ Impact ]
Without the change it will be less clear which cards the user has.
(it is quite common for blind users to have several sound cards)

[ Tests ]
It was tested manually.

[ Risks ]
The code is very trivial.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

Thanks!

unblock espeakup/1:0.90-13
diff -Nru espeakup-0.90/debian/changelog espeakup-0.90/debian/changelog
--- espeakup-0.90/debian/changelog  2022-11-29 01:13:54.0 +0100
+++ espeakup-0.90/debian/changelog  2023-03-08 00:09:40.0 +0100
@@ -1,3 +1,9 @@
+espeakup (1:0.90-13) unstable; urgency=medium
+
+  * espeakup-udeb.start: Log the number and ids of detected audio cards.
+
+ -- Samuel Thibault   Wed, 08 Mar 2023 00:09:40 +0100
+
 espeakup (1:0.90-12) unstable; urgency=medium
 
   * espeakup-udeb.restart: Avoid warning about missing mbrola voice in 
installer.
diff -Nru espeakup-0.90/debian/espeakup-udeb.start 
espeakup-0.90/debian/espeakup-udeb.start
--- espeakup-0.90/debian/espeakup-udeb.start2022-11-29 01:07:45.0 
+0100
+++ espeakup-0.90/debian/espeakup-udeb.start2023-03-08 00:06:48.0 
+0100
@@ -44,6 +44,8 @@
N=$(echo $IDS | wc -w)
 
echo "Found $N audio card(s)."
+   echo "Found $N audio card(s):" >> /var/log/espeakup.log
+   echo "$IDS" >> /var/log/espeakup.log
 
case $N in
1)


Processed: unblock: espeakup/1:0.90-13

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:espeakup
Bug #1033473 [release.debian.org] unblock: espeakup/1:0.90-13
Added indication that 1033473 affects src:espeakup

-- 
1033473: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033473
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-25 Thread Jan Wagner

Hi Sebastian,

Am 25.03.23 um 10:31 schrieb Sebastian Ramacher:

What's the rationale to include these patches? Do they fix bugs reported
in the BTS or upstream?


upstream

With kind regards, Jan



Bug#1033404: marked as done (unblock: debvm/0.2.10)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 15:54:18 +
with message-id 
and subject line unblock debvm
has caused the Debian Bug report #1033404,
regarding unblock: debvm/0.2.10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033404: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033404
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: de...@packages.debian.org
Control: affects -1 + src:debvm

Please unblock package debvm

[ Reason ]

debvm is fairly new and was stabilizing right into the freeze. Thus
there are a few late changes that I hope to get into bookworm.

[ Impact ]

There are some notable changes indeed:
 * The biggest chunk of difference is documentation updates in various
   places. In particular, this includes adding examples for usage.
 * The biggest user facing change is the deprecation of the
   --architecture option for debvm-create. I paid attention to not just
   delete it (to avoid breaking things that already use it), but it no
   longer is documented and getting rid of it in bookworm already would
   make phasing it out later easier.
 * The --graphical option to debvm-run is fixed and improved.
 * Support for using 64bit kernels on mipsel.
 * An autopkgtest workaround for kernel bug #1029270 is being deleted.

[ Tests ]

autopkgtests succeed. The reason for the need on an unblock is that I
had to disable 32bit arm, because qemu tcg emulation is too slow to boot
Linux there. Other than that, it would migrate as a non-key package with
autopkgtests. On salsa, more tests are run. I've used the updated
version for quite some time now and not encountered more issues.

[ Risks ]

The affected functionality is not central to debvm or (in case of
--architecture) explicitly kept backwards-compatible. Thus I see little
risk for breakage.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]

There is one possible change missing. Due to the archival of jessie,
using it with debvm now requires passing a mirror. If there is a need
for another update of debvm in bookworm, I intend to piggy-back an
example to the documentation about how to use jessie with
archive.debian.org.

unblock debvm/0.2.10

Thanks in advance

Helmut
diff --git a/README.md b/README.md
index 6fdda9e..1ccda36 100644
--- a/README.md
+++ b/README.md
@@ -77,9 +77,11 @@ The debvm tools are licensed under the MIT license.
 Contributors
 
 
+ * Arnd Bergmann
+ * Gioele Barabucci
  * Helmut Grohne (main author)
- * Johannes Schauer Marin Rodrigues (main author of `mmdebstrap`)
  * Jochen Sprickerhof
+ * Johannes Schauer Marin Rodrigues (main author of `mmdebstrap`)
 
 [^1] This technically is a lie. It employs user namespaces and thus requires
  the setuid binary `newuidmap` as well as a suitable subuid allocation.
diff --git a/bin/debvm-create b/bin/debvm-create
index 89256eb..1c7c29d 100755
--- a/bin/debvm-create
+++ b/bin/debvm-create
@@ -11,7 +11,7 @@ debvm-create - Create a VM image for various Debian releases and architectures
 
 =head1 SYNOPSIS
 
-B [B<-a> I] [B<-h> I] [B<-k> F] [B<-o> F] [B<-r> I] [B<-s> ] [B<-z> I] [B<--> I]
+B [B<-h> I] [B<-k> F] [B<-o> F] [B<-r> I] [B<-s> ] [B<-z> I] [B<--> I]
 
 =head1 DESCRIPTION
 
@@ -26,12 +26,6 @@ No user account is created and root can login without specifying a password.
 
 =over 8
 
-=item B<-a> I, B<--architecture>=I
-
-Specify a Debian architecture name.
-By default, the native architecture is being used.
-A suitable kernel image is automatically selected and installed into the image.
-
 =item B<-h> I, B<--hostname>=I
 
 Set the hostname of the virtual machine.
@@ -131,15 +125,43 @@ All options beyond a double dash are passed to B after the suite and
 This can be used to provide additional hooks for image customization.
 You can also request additional packages to be installed into the image using B's B<--include> option.
 Any positional arguments passed here will be treated as mirror specifications by B.
+In particular, you can also change the architecture of the resulting image using the B<--architecture> option.
 
 =back
 
 =head1 EXAMPLES
 
-In order to create images for Debian ports architectures, you can pass two options to mmdebstrap:
+When creating an image with multiple architectures, the kernel selection will prefer the sibling 64bit architecture.
+
+debvm-create ... -- --architecture=ar

Bug#1033467: marked as done (unblock: golang-github-yuin-goldmark/1.5.4-1)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 15:53:02 +
with message-id 
and subject line unblock golang-github-yuin-goldmark
has caused the Debian Bug report #1033467,
regarding unblock: golang-github-yuin-goldmark/1.5.4-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033467: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033467
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: golang-github-yuin-goldm...@packages.debian.org, 
debian...@lists.debian.org, f...@debian.org
Control: affects -1 + src:golang-github-yuin-goldmark

Please unblock package golang-github-yuin-goldmark

[ Reason ]
golang-github-yuin-goldmark/1.5.4-1 contains two bug fixes:

 * ARIA role attribute in Markdown content is not rendered
   https://github.com/gohugoio/hugo/issues/10661
   https://github.com/yuin/goldmark/issues/357
 * Blockquote tag appears after HTML not ending with newline
   https://github.com/yuin/goldmark/issues/361

and this version is specified in hugo/0.111.3-1 go.mod as its dependency.

[ Impact ]
If the unblock isn't granted, hugo/0.111.3-1 and other bug-fix uploads for
other packages would not be able to migrate Debian 12 bookworm.

[ Tests ]
I used ratt to test rebuild of all 193 packages that directly
or indirectly depend on golang-github-yuin-goldmark.
All 193 packages passed except for the following 5:

  FAILED: dnscrypt-proxy (see buildlogs/dnscrypt-proxy_2.0.45+ds1-1)
  FAILED: gitaly (see buildlogs/gitaly_13.4.6+dfsg1-2)
  FAILED: nomad (see buildlogs/nomad_0.12.10+dfsg1-3)
  FAILED: nomad-driver-podman (see buildlogs/nomad-driver-podman_0.1.0-2)
  FAILED: golang-github-prometheus-common (see 
buildlogs/golang-github-prometheus-common_0.15.0-2)

The first 4 (dnscrypt-proxy, gitaly, nomad, nomad-driver-podman)
currently FTBFS and were removed from testing/bookworm some time ago.
(I've just uploaded an NMU for dnscrypt-proxy as its FTBFS is trivial to
fix.)

The last one "golang-github-prometheus-common" failed because dose-ceve
(which ratt uses) incorrectly returned the version in stable/bullseye.
Rebuilding for golang-github-prometheus-common_0.39.0-2 manually with
the following command completes successfully:

sbuild --arch-all --dist=unstable --nolog \
golang-github-prometheus-common_0.39.0-2 \
--extra-package=../golang-github-yuin-goldmark-dev_1.5.4-1_all.deb

[ Risks ]
I must admit I did not know that golang-github-yuin-goldmark is marked
as a key package, but with the successful "ratt" rebuild of all affected
packages, as well as the minimal bug fixes that simply corrects its HTML
output, there is no risk in upgrading golang-github-yuin-goldmark from
1.5.3-1 to 1.5.4-1.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock golang-github-yuin-goldmark/1.5.4-1

Many thanks!

Anthony Fok
diff -Nru golang-github-yuin-goldmark-1.5.3/debian/changelog 
golang-github-yuin-goldmark-1.5.4/debian/changelog
--- golang-github-yuin-goldmark-1.5.3/debian/changelog  2023-01-23 
07:12:53.0 -0700
+++ golang-github-yuin-goldmark-1.5.4/debian/changelog  2023-03-08 
19:19:12.0 -0700
@@ -1,3 +1,9 @@
+golang-github-yuin-goldmark (1.5.4-1) unstable; urgency=medium
+
+  * New upstream version 1.5.4
+
+ -- Anthony Fok   Wed, 08 Mar 2023 19:19:12 -0700
+
 golang-github-yuin-goldmark (1.5.3-1) unstable; urgency=medium
 
   * New upstream version 1.5.3
diff -Nru golang-github-yuin-goldmark-1.5.3/parser/html_block.go 
golang-github-yuin-goldmark-1.5.4/parser/html_block.go
--- golang-github-yuin-goldmark-1.5.3/parser/html_block.go  2022-11-12 
04:13:03.0 -0700
+++ golang-github-yuin-goldmark-1.5.4/parser/html_block.go  2023-02-02 
05:02:21.0 -0700
@@ -149,7 +149,7 @@
}
}
if node != nil {
-   reader.Advance(segment.Len() - 1)
+   reader.Advance(segment.Len() - util.TrimRightSpaceLength(line))
node.Lines().Append(segment)
return node, NoChildren
}
@@ -172,7 +172,7 @@
}
if htmlBlockType1CloseRegexp.Match(line) {
htmlBlock.ClosureLine = segment
-   reader.Advance(segment.Len() - 1)
+   reader.Advance(segment.Len() - 
util.TrimRightSpaceLength(line))
return Close
}
case ast.HTMLBl

Bug#1033469: marked as done (unblock: curl/7.88.1-7)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 15:51:07 +
with message-id 
and subject line unblock curl
has caused the Debian Bug report #1033469,
regarding unblock: curl/7.88.1-7
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033469: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033469
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Control: affects -1 + src:curl
X-Debbugs-Cc: c...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: sergi...@debian.org, samuel...@debian.org
Severity: normal

Please unblock package curl

I would like to push the fix for the recent 6 CVEs disclosed:
- CVE-2023-27533: TELNET option IAC injection
- CVE-2023-27534: SFTP path ~ resolving discrepancy
- CVE-2023-27535: FTP too eager connection reuse
- CVE-2023-27536: GSS delegation too eager connection re-use
- CVE-2023-27537: HSTS double-free
- CVE-2023-27538: SSH connection too eager reuse still

I have also prepared the fixes for stable and oldstable and will be
requesting a p-u upload for them shortly (already pushed the commits
to the repo).

I would also appreciate it if the wait time for the migration could be
cut short due to the nature of the changes (low risk and the sooner
they get to testing the better).

[ Reason ]
CVE fixes, the security team said no DSAs will be assigned to them.

[ Impact ]
The highest severity of the CVEs is moderate as per upstream, the
security team considered all of them low (thus no DSA).

[ Tests ]
Curl's test suite passed (the build succeeded on all archs).

[ Risks ]
Only minimal changes were required in order to backport CVE-2023-27533.
There has been no bugfixes related to these CVE fixes in 8.0.1.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]

Other small changes in the debdiff are:
Bump Standards-Version to 4.6.2
d/p/06_always-disable-valgrind.patch: Remove unused patch
d/patches: Refresh all patches

None of these three changes modifies the resulting binaries.

I am planning to push 7.88.1-8 after 7.88.1-7 migrates and I will be
requesting an unblock for that revision as well, I figured it's better
to not bundle the changes together to make the review easier and to
let the CVE fixes get to testing sooner.

The changes for -8 will be:
1) Inclusion of autopkgtests.
2) Inclusion of new build profiles to limit the builds to certain TLS
backends (to be used by manual tests or autopkgtests only).
3) And possibly a fix for the multi-arch issue #913995 (the lintian
error that the package has).

I would also like to ask the release team to consider unblocking curl'
s latest release 8.0.1 due to the delta consisting of mostly bugfixes
(biggest change is removal of support for systems that don't have 64
bit data types).
Being able to ship 8.0.1 will make maintenance easier on the long term
(stable, oldstable...). But I want to first get these CVE fixes and
the autopkgtests (coming in rev 8) in testing before asking for
8.0.1's unblock.

PS.: I've made a typo in the changelog entry where I mention "5 CVEs"
rather than 6, but it's fine since all of the 6 CVEs are listed
anyway.

unblock curl/7.88.1-7

-- 
Samuel Henrique 


curl_7.88.1-7.debdiff
Description: Binary data
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Bug#1033470: unblock: libopenmpt/0.6.9-1

2023-03-25 Thread Sebastian Ramacher
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libopen...@packages.debian.org, sramac...@debian.org
Control: affects -1 + src:libopenmpt

Please unblock package libopenmpt.

[ Reason ]
libopenmpt 0.6.7 is a bugfix release only that fixes issues with
parsing/rending (potentially untrusted) media files:

[**Bug**] An exception could be thrown during rendering when trying to
access the release node of an empty envelope.

(from upstream's changelog)

It also contains some targetted bug fixes, but no new features.

[ Impact ]
Users may observe crashes when opening and playing certain media files.

[ Tests ]
The package has autopkgtests that succeed.

[ Risks ]
The package is a key-package because of ffmpeg.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock libopenmpt/0.6.9-1


Cheers
-- 
Sebastian Ramacher
diff -Nru libopenmpt-0.6.8/common/versionNumber.h 
libopenmpt-0.6.9/common/versionNumber.h
--- libopenmpt-0.6.8/common/versionNumber.h 2023-01-29 12:59:32.0 
+0100
+++ libopenmpt-0.6.9/common/versionNumber.h 2023-03-05 13:24:48.0 
+0100
@@ -17,7 +17,7 @@
 // Version definitions. The only thing that needs to be changed when changing 
version number.
 #define VER_MAJORMAJOR  1
 #define VER_MAJOR  30
-#define VER_MINOR  10
+#define VER_MINOR  11
 #define VER_MINORMINOR 00
 
 OPENMPT_NAMESPACE_END
diff -Nru libopenmpt-0.6.8/configure libopenmpt-0.6.9/configure
--- libopenmpt-0.6.8/configure  2023-01-29 13:25:43.0 +0100
+++ libopenmpt-0.6.9/configure  2023-03-05 13:49:28.0 +0100
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.69 for libopenmpt 0.6.8+release.autotools.
+# Generated by GNU Autoconf 2.69 for libopenmpt 0.6.9+release.autotools.
 #
 # Report bugs to .
 #
@@ -590,8 +590,8 @@
 # Identity of this package.
 PACKAGE_NAME='libopenmpt'
 PACKAGE_TARNAME='libopenmpt'
-PACKAGE_VERSION='0.6.8+release.autotools'
-PACKAGE_STRING='libopenmpt 0.6.8+release.autotools'
+PACKAGE_VERSION='0.6.9+release.autotools'
+PACKAGE_STRING='libopenmpt 0.6.9+release.autotools'
 PACKAGE_BUGREPORT='https://bugs.openmpt.org/'
 PACKAGE_URL='https://lib.openmpt.org/'
 
@@ -1475,7 +1475,7 @@
   # Omit some internal or obsolete options to make the list less imposing.
   # This message is too long to be a string in the A/UX 3.1 sh.
   cat <<_ACEOF
-\`configure' configures libopenmpt 0.6.8+release.autotools to adapt to many 
kinds of systems.
+\`configure' configures libopenmpt 0.6.9+release.autotools to adapt to many 
kinds of systems.
 
 Usage: $0 [OPTION]... [VAR=VALUE]...
 
@@ -1546,7 +1546,7 @@
 
 if test -n "$ac_init_help"; then
   case $ac_init_help in
- short | recursive ) echo "Configuration of libopenmpt 
0.6.8+release.autotools:";;
+ short | recursive ) echo "Configuration of libopenmpt 
0.6.9+release.autotools:";;
esac
   cat <<\_ACEOF
 
@@ -1732,7 +1732,7 @@
 test -n "$ac_init_help" && exit $ac_status
 if $ac_init_version; then
   cat <<\_ACEOF
-libopenmpt configure 0.6.8+release.autotools
+libopenmpt configure 0.6.9+release.autotools
 generated by GNU Autoconf 2.69
 
 Copyright (C) 2012 Free Software Foundation, Inc.
@@ -,7 +,7 @@
 This file contains any messages produced by compilers while
 running configure, to aid debugging if configure makes a mistake.
 
-It was created by libopenmpt $as_me 0.6.8+release.autotools, which was
+It was created by libopenmpt $as_me 0.6.9+release.autotools, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   $ $0 $@
@@ -3086,7 +3086,7 @@
 
 # Define the identity of the package.
  PACKAGE='libopenmpt'
- VERSION='0.6.8+release.autotools'
+ VERSION='0.6.9+release.autotools'
 
 
 cat >>confdefs.h <<_ACEOF
@@ -17253,13 +17253,13 @@
 
 
 
-$as_echo "#define MPT_SVNURL 
\"https://source.openmpt.org/svn/openmpt/tags/libopenmpt-0.6.8\""; >>confdefs.h
+$as_echo "#define MPT_SVNURL 
\"https://source.openmpt.org/svn/openmpt/tags/libopenmpt-0.6.9\""; >>confdefs.h
 
 
-$as_echo "#define MPT_SVNVERSION \"18680\"" >>confdefs.h
+$as_echo "#define MPT_SVNVERSION \"18817\"" >>confdefs.h
 
 
-$as_echo "#define MPT_SVNDATE \"2023-01-29T12:13:49.877060Z\"" >>confdefs.h
+$as_echo "#define MPT_SVNDATE \"2023-03-05T12:41:15.297347Z\"" >>confdefs.h
 
 
 $as_echo "#define MPT_PACKAGE true" >>confdefs.h
@@ -22545,7 +22545,7 @@
 # report actual input values of CONFIG_FILES etc. instead of their
 # values after options handling.
 ac_log="
-This file was extended by libopenmpt $as_me 0.6.8+release.autotools, which was
+This file was extended by libopenmpt $as_me 0.6.9+release.autotools, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   CONFIG_FILES= $CONFIG_FILES
@@ -22603,7 +22603,7 @@
 cat >>$CO

Bug#1033460: marked as done (unblock: xscreensaver/6.06+dfsg1-3)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 15:50:06 +
with message-id 
and subject line unblock xscreensaver
has caused the Debian Bug report #1033460,
regarding unblock: xscreensaver/6.06+dfsg1-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033460
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Control: affects -1 + src:xscreensaver
X-Debbugs-Cc: xscreensa...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package xscreensaver 6.06+dfsg1-3

[ Reason ]
A couple of upstream crash regressions were introduced in 6.06,
and these are fixed in 6.06+dfsg1-3 (#1030909, #1030659).
There was also a regression where DPMS settings were reset,
causing lack of power saving, the patch from upstream was included
for this (#1031076). A missing dependency was fixed together with a
correction of internal dependencies between the binary packages.
A translation was broken simply because of wrong po file encoding
(seen on l10n status report).

[ Impact ]
The user won't be able to set XScreenSaver preferences because
the preference window crashes.
The user will unknowingly leave the power settings disabled and
waste electricity.
The missing dependencies would prevent screensaver modes from
functioning.

[ Tests ]
Bug reporters have verified the fixes in 6.06+dfsg1-3.
I could myself reproduce the issues and their fixes.
There have been no new issues or regressions reported since
6.06+dfsg1-3 was uploaded 21 days ago.

[ Risks ]
The most complex crash issue was analyzed in depth by upstream
and GTK developers, so the applied solution is well understood. The
other fixes are relatively trivial and the risk is low that they have any
unintentional effects.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

[ Other info ]

Attachments: xscreensaver_6.06+dfsg1-3.debdiff


xscreensaver_6.06+dfsg1-3.debdiff
Description: Binary data
--- End Message ---
--- Begin Message ---
Unblocked.--- End Message ---


Bug#1033449: marked as done (unblock: fbb/7.011-2)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 15:50:22 +
with message-id 
and subject line unblock fbb
has caused the Debian Bug report #1033449,
regarding unblock: fbb/7.011-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033449: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033449
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: f...@packages.debian.org, Debian Hamradio Maintainers 

Control: affects -1 + src:fbb

Please unblock package fbb. The new version fixes a segfault when
listing subdirectories. (Closes: #1032223)

The diff is unfortunately quite noisy since different quilt flags were
used when refreshing the patch where the bug was in. The effective
interdiff is this:

+Index: fbb-7.011/src/ibm.c
+===
+--- fbb-7.011.orig/src/ibm.c
 fbb-7.011/src/ibm.c
-@@ -205,13 +204,10 @@
+@@ -205,13 +204,13 @@ void format_ffblk (struct ffblk *blk, st
else
sprintf (filename, "%s/%s", blk->ff_base, dir->d_name);

 -  ret = lstat (filename, &st);
--
++lstat (filename, &st);
+
if (S_ISLNK (st.st_mode))
{
/* printf ("link\n"); */
blk->ff_attrib |= FA_LINK;
 -  ret = stat (filename, &st);
++stat (filename, &st);
if (S_ISDIR (st.st_mode))
{
blk->ff_attrib |= FA_DIREC;

I.e. the original patch mistakenly removed lstat, and the new patch
restores it to the original place. "ret" is dropped since the code
doesn't use it.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach git diff against the package in testing

unblock fbb/7.011-2

Christoph
diff --git a/debian/changelog b/debian/changelog
index 313edc3..4620c2c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+fbb (7.011-2) unstable; urgency=medium
+
+  * Team upload.
+  * Address segfault when listing subdirectories (Closes: #1032223)
+Thank you to Mike Quin for the bug report and patch.
+
+ -- tony mancill   Sun, 05 Mar 2023 09:53:13 -0800
+
 fbb (7.011-1) unstable; urgency=medium
 
   * Team upload.
diff --git a/debian/patches/05-fix-compile-warnings b/debian/patches/05-fix-compile-warnings
index 485541e..0e87f45 100644
--- a/debian/patches/05-fix-compile-warnings
+++ b/debian/patches/05-fix-compile-warnings
@@ -1,9 +1,14 @@
-Fix trivial compiler warnings, mostly unused vars
+Description: Fix trivial compiler warnings, mostly unused vars
+  Thank you to Mike Quin for patching the patch.
+  See:  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032223
 Author: Colin Tuckley col...@debian.org
+Last-Update: 2023-03-02
 
 a/src/console.c
-+++ b/src/console.c
-@@ -254,7 +254,6 @@
+Index: fbb-7.011/src/console.c
+===
+--- fbb-7.011.orig/src/console.c
 fbb-7.011/src/console.c
+@@ -254,7 +254,6 @@ void connect_fen (void)
  
  void winputs (int voie, int attr, char *ptr)
  {
@@ -11,7 +16,7 @@ Author: Colin Tuckley col...@debian.org
  	int header;
  
  	if (attr == -1)
-@@ -265,7 +264,6 @@
+@@ -265,7 +264,6 @@ void winputs (int voie, int attr, char *
  	else
  		header = 0;
  
@@ -19,9 +24,11 @@ Author: Colin Tuckley col...@debian.org
  	window_write (voie, ptr, strlen (ptr), attr, header);
  }
  
 a/src/drv_mod.c
-+++ b/src/drv_mod.c
-@@ -575,11 +575,6 @@
+Index: fbb-7.011/src/drv_mod.c
+===
+--- fbb-7.011.orig/src/drv_mod.c
 fbb-7.011/src/drv_mod.c
+@@ -575,11 +575,6 @@ int lit_port_modem (int port)
  			ioctl (ptrcom->comfd, TIOCMGET, &mcs);
  			con = (mcs & TIOCM_CAR) ? 1 : 0;
  
@@ -33,7 +40,7 @@ Author: Colin Tuckley col...@debian.org
  			if ((svoie[voie]->sta.connect > 1) && (svoie[voie]->sta.connect < 17) && (!con))
  			{
  md_no_echo (voie);
-@@ -851,10 +846,12 @@
+@@ -851,10 +846,12 @@ int lit_port_modem (int port)
  			con = (nstat & 0x80) ? 1 : 0;
  #endif
  
@@ -46,9 +53,11 @@ Author: Colin Tuckley col...@debian.org
  
  			if ((svoie[voie]->sta.connect > 1) && (svoie[voie]->sta.connect < 17) && (!con))
  			{
 a/src/fwdovl5.c
-+++ b/src/fwdovl5.c
-@@ -737,14 +737,9 @@
+Index: fbb-7.011/src/fwdovl5.c
+===
+--- fbb-7.011.orig/src/fwdovl5.c
 fbb-7.011/src/fwdovl5.c
+@@ -73

Processed: unblock: libopenmpt/0.6.9-1

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:libopenmpt
Bug #1033470 [release.debian.org] unblock: libopenmpt/0.6.9-1
Added indication that 1033470 affects src:libopenmpt

-- 
1033470: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033470
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2023-03-25 Thread Debian FTP Masters
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_amd64-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_arm64-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_armel-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_armhf-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_i386-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_mipsel-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_ppc64el-buildd.changes
  ACCEPT



NEW changes in stable-new

2023-03-25 Thread Debian FTP Masters
Processing changes file: 
libdatetime-timezone-perl_2.47-1+2023b_all-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_all-buildd.changes
  ACCEPT
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_s390x-buildd.changes
  ACCEPT
Processing changes file: tzdata_2021a-1+deb11u9_all-buildd.changes
  ACCEPT



Bug#1033469: unblock: curl/7.88.1-7

2023-03-25 Thread Samuel Henrique
Package: release.debian.org
Control: affects -1 + src:curl
X-Debbugs-Cc: c...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: sergi...@debian.org, samuel...@debian.org
Severity: normal

Please unblock package curl

I would like to push the fix for the recent 6 CVEs disclosed:
- CVE-2023-27533: TELNET option IAC injection
- CVE-2023-27534: SFTP path ~ resolving discrepancy
- CVE-2023-27535: FTP too eager connection reuse
- CVE-2023-27536: GSS delegation too eager connection re-use
- CVE-2023-27537: HSTS double-free
- CVE-2023-27538: SSH connection too eager reuse still

I have also prepared the fixes for stable and oldstable and will be
requesting a p-u upload for them shortly (already pushed the commits
to the repo).

I would also appreciate it if the wait time for the migration could be
cut short due to the nature of the changes (low risk and the sooner
they get to testing the better).

[ Reason ]
CVE fixes, the security team said no DSAs will be assigned to them.

[ Impact ]
The highest severity of the CVEs is moderate as per upstream, the
security team considered all of them low (thus no DSA).

[ Tests ]
Curl's test suite passed (the build succeeded on all archs).

[ Risks ]
Only minimal changes were required in order to backport CVE-2023-27533.
There has been no bugfixes related to these CVE fixes in 8.0.1.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

[ Other info ]

Other small changes in the debdiff are:
Bump Standards-Version to 4.6.2
d/p/06_always-disable-valgrind.patch: Remove unused patch
d/patches: Refresh all patches

None of these three changes modifies the resulting binaries.

I am planning to push 7.88.1-8 after 7.88.1-7 migrates and I will be
requesting an unblock for that revision as well, I figured it's better
to not bundle the changes together to make the review easier and to
let the CVE fixes get to testing sooner.

The changes for -8 will be:
1) Inclusion of autopkgtests.
2) Inclusion of new build profiles to limit the builds to certain TLS
backends (to be used by manual tests or autopkgtests only).
3) And possibly a fix for the multi-arch issue #913995 (the lintian
error that the package has).

I would also like to ask the release team to consider unblocking curl'
s latest release 8.0.1 due to the delta consisting of mostly bugfixes
(biggest change is removal of support for systems that don't have 64
bit data types).
Being able to ship 8.0.1 will make maintenance easier on the long term
(stable, oldstable...). But I want to first get these CVE fixes and
the autopkgtests (coming in rev 8) in testing before asking for
8.0.1's unblock.

PS.: I've made a typo in the changelog entry where I mention "5 CVEs"
rather than 6, but it's fine since all of the 6 CVEs are listed
anyway.

unblock curl/7.88.1-7

-- 
Samuel Henrique 


curl_7.88.1-7.debdiff
Description: Binary data


Processed: unblock: curl/7.88.1-7

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:curl
Bug #1033469 [release.debian.org] unblock: curl/7.88.1-7
Added indication that 1033469 affects src:curl

-- 
1033469: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033469
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033467: unblock: golang-github-yuin-goldmark/1.5.4-1

2023-03-25 Thread Anthony Fok
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: golang-github-yuin-goldm...@packages.debian.org, 
debian...@lists.debian.org, f...@debian.org
Control: affects -1 + src:golang-github-yuin-goldmark

Please unblock package golang-github-yuin-goldmark

[ Reason ]
golang-github-yuin-goldmark/1.5.4-1 contains two bug fixes:

 * ARIA role attribute in Markdown content is not rendered
   https://github.com/gohugoio/hugo/issues/10661
   https://github.com/yuin/goldmark/issues/357
 * Blockquote tag appears after HTML not ending with newline
   https://github.com/yuin/goldmark/issues/361

and this version is specified in hugo/0.111.3-1 go.mod as its dependency.

[ Impact ]
If the unblock isn't granted, hugo/0.111.3-1 and other bug-fix uploads for
other packages would not be able to migrate Debian 12 bookworm.

[ Tests ]
I used ratt to test rebuild of all 193 packages that directly
or indirectly depend on golang-github-yuin-goldmark.
All 193 packages passed except for the following 5:

  FAILED: dnscrypt-proxy (see buildlogs/dnscrypt-proxy_2.0.45+ds1-1)
  FAILED: gitaly (see buildlogs/gitaly_13.4.6+dfsg1-2)
  FAILED: nomad (see buildlogs/nomad_0.12.10+dfsg1-3)
  FAILED: nomad-driver-podman (see buildlogs/nomad-driver-podman_0.1.0-2)
  FAILED: golang-github-prometheus-common (see 
buildlogs/golang-github-prometheus-common_0.15.0-2)

The first 4 (dnscrypt-proxy, gitaly, nomad, nomad-driver-podman)
currently FTBFS and were removed from testing/bookworm some time ago.
(I've just uploaded an NMU for dnscrypt-proxy as its FTBFS is trivial to
fix.)

The last one "golang-github-prometheus-common" failed because dose-ceve
(which ratt uses) incorrectly returned the version in stable/bullseye.
Rebuilding for golang-github-prometheus-common_0.39.0-2 manually with
the following command completes successfully:

sbuild --arch-all --dist=unstable --nolog \
golang-github-prometheus-common_0.39.0-2 \
--extra-package=../golang-github-yuin-goldmark-dev_1.5.4-1_all.deb

[ Risks ]
I must admit I did not know that golang-github-yuin-goldmark is marked
as a key package, but with the successful "ratt" rebuild of all affected
packages, as well as the minimal bug fixes that simply corrects its HTML
output, there is no risk in upgrading golang-github-yuin-goldmark from
1.5.3-1 to 1.5.4-1.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock golang-github-yuin-goldmark/1.5.4-1

Many thanks!

Anthony Fok
diff -Nru golang-github-yuin-goldmark-1.5.3/debian/changelog 
golang-github-yuin-goldmark-1.5.4/debian/changelog
--- golang-github-yuin-goldmark-1.5.3/debian/changelog  2023-01-23 
07:12:53.0 -0700
+++ golang-github-yuin-goldmark-1.5.4/debian/changelog  2023-03-08 
19:19:12.0 -0700
@@ -1,3 +1,9 @@
+golang-github-yuin-goldmark (1.5.4-1) unstable; urgency=medium
+
+  * New upstream version 1.5.4
+
+ -- Anthony Fok   Wed, 08 Mar 2023 19:19:12 -0700
+
 golang-github-yuin-goldmark (1.5.3-1) unstable; urgency=medium
 
   * New upstream version 1.5.3
diff -Nru golang-github-yuin-goldmark-1.5.3/parser/html_block.go 
golang-github-yuin-goldmark-1.5.4/parser/html_block.go
--- golang-github-yuin-goldmark-1.5.3/parser/html_block.go  2022-11-12 
04:13:03.0 -0700
+++ golang-github-yuin-goldmark-1.5.4/parser/html_block.go  2023-02-02 
05:02:21.0 -0700
@@ -149,7 +149,7 @@
}
}
if node != nil {
-   reader.Advance(segment.Len() - 1)
+   reader.Advance(segment.Len() - util.TrimRightSpaceLength(line))
node.Lines().Append(segment)
return node, NoChildren
}
@@ -172,7 +172,7 @@
}
if htmlBlockType1CloseRegexp.Match(line) {
htmlBlock.ClosureLine = segment
-   reader.Advance(segment.Len() - 1)
+   reader.Advance(segment.Len() - 
util.TrimRightSpaceLength(line))
return Close
}
case ast.HTMLBlockType2:
@@ -211,7 +211,7 @@
}
}
node.Lines().Append(segment)
-   reader.Advance(segment.Len() - 1)
+   reader.Advance(segment.Len() - util.TrimRightSpaceLength(line))
return Continue | NoChildren
 }
 
diff -Nru golang-github-yuin-goldmark-1.5.3/README.md 
golang-github-yuin-goldmark-1.5.4/README.md
--- golang-github-yuin-goldmark-1.5.3/README.md 2022-11-12 04:13:03.0 
-0700
+++ golang-github-yuin-goldmark-1.5.4/README.md 2023-02-02 05:02:21.0 
-0700
@@ -446,6 +446,8 @@
 - [goldmark-embed](https://github.com/13rac1/goldmark-embed): Adds support for 
rendering embeds from YouTube links.
 - [goldmark-latex](https://github.com/soypat/goldmark-latex): A $\LaTeX$ 
renderer that can be passed to `goldmark.WithRenderer()`.
 - [goldmark-fences]

Processed: unblock: golang-github-yuin-goldmark/1.5.4-1

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:golang-github-yuin-goldmark
Bug #1033467 [release.debian.org] unblock: golang-github-yuin-goldmark/1.5.4-1
Added indication that 1033467 affects src:golang-github-yuin-goldmark

-- 
1033467: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033467
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2023-03-25 Thread Debian FTP Masters
Processing changes file: chromium_111.0.5563.110-1~deb11u1_source.changes
  ACCEPT
Processing changes file: chromium_111.0.5563.110-1~deb11u1_all-buildd.changes
  ACCEPT
Processing changes file: chromium_111.0.5563.110-1~deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: chromium_111.0.5563.110-1~deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: chromium_111.0.5563.110-1~deb11u1_armhf-buildd.changes
  ACCEPT
Processing changes file: chromium_111.0.5563.110-1~deb11u1_i386-buildd.changes
  ACCEPT
Processing changes file: 
chromium_111.0.5563.110-1~deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: intel-microcode_3.20230214.1~deb11u1_source.changes
  ACCEPT



Bug#1033464: unblock: fish/3.6.0-3

2023-03-25 Thread M. Zhou
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package fish
Not yet uploaded. This package does not have a proper
autopkgtest, manual unblock needed.

[ Reason ]

I cherry picked two upstream fixes. One of them fixes
crash, while the other fixes undesired behavior.
https://github.com/fish-shell/fish-shell/commit/e84f588d11a86d38ff708d4c16aab1316ac09b6c
https://github.com/fish-shell/fish-shell/commit/37575c5f7983cb5338a1ba23541bbd86a4fd2a4e

And I also added the missing dependency on procps.
It absence leads to unwanted and unnecessary errors:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029940

[ Impact ]

Fish is an interactive shell. These changes would fix unwanted
behavior of the shell.

[ Tests ]
The patches are cherry-picked from the upstream 3.6.1 release
and has been coverted by their CI. My default shell is fish and
it has been locally tested on both sid and the current stable.

[ Risks ]

The two patches are simple. Adding dependency on procps induces
zero risk.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock fish/3.6.0-3
Thank you for using reportbug
diff -Nru fish-3.6.0/debian/changelog fish-3.6.0/debian/changelog
--- fish-3.6.0/debian/changelog	2023-02-17 20:05:29.0 -0500
+++ fish-3.6.0/debian/changelog	2023-03-25 10:20:50.0 -0400
@@ -1,3 +1,10 @@
+fish (3.6.0-3) unstable; urgency=medium
+
+  * Cherry-pick upstream fixes from the v3.6.1 branch.
+  * Add the missing Depends on procps (Closes: #1029940).
+
+ -- Mo Zhou   Sat, 25 Mar 2023 10:20:50 -0400
+
 fish (3.6.0-2) unstable; urgency=medium
 
   * Ignore several flaky tests for armel.
diff -Nru fish-3.6.0/debian/control fish-3.6.0/debian/control
--- fish-3.6.0/debian/control	2023-01-07 11:28:46.0 -0500
+++ fish-3.6.0/debian/control	2023-03-25 10:19:55.0 -0400
@@ -26,6 +26,7 @@
  bsdextrautils,
  groff-base,
  man-db,
+ procps,
  python3,
  ${misc:Depends},
  ${shlibs:Depends}
diff -Nru fish-3.6.0/debian/patches/0001-reader-make-Escape-during-history-search-restore-com.patch fish-3.6.0/debian/patches/0001-reader-make-Escape-during-history-search-restore-com.patch
--- fish-3.6.0/debian/patches/0001-reader-make-Escape-during-history-search-restore-com.patch	1969-12-31 19:00:00.0 -0500
+++ fish-3.6.0/debian/patches/0001-reader-make-Escape-during-history-search-restore-com.patch	2023-03-25 10:18:29.0 -0400
@@ -0,0 +1,58 @@
+From: Johannes Altmanninger 
+Date: Tue, 17 Jan 2023 09:14:54 +0100
+Subject: reader: make Escape during history search restore commandline again
+
+Commit 3b30d92b6 (Commit transient edit when closing pager, 2022-08-31)
+inadvertently introduced two regressions to history search:
+
+1. It made Escape keeps the selected history entry,
+   instead of restoring the commandline before history search.
+2. It made history search commands add undo entries.
+
+Fix both of this issues.
+---
+ src/reader.cpp|  3 ++-
+ tests/checks/tmux-history-search.fish | 12 
+ 2 files changed, 14 insertions(+), 1 deletion(-)
+
+diff --git a/src/reader.cpp b/src/reader.cpp
+index c50426f..9fe2d7e 100644
+--- a/src/reader.cpp
 b/src/reader.cpp
+@@ -4477,7 +4477,8 @@ maybe_t reader_data_t::readline(int nchars_or_0) {
+ 
+ // Clear the pager if necessary.
+ bool focused_on_search_field = (active_edit_line() == &pager.search_field_line);
+-if (command_ends_paging(readline_cmd, focused_on_search_field)) {
++if (!history_search.active() &&
++command_ends_paging(readline_cmd, focused_on_search_field)) {
+ clear_pager();
+ }
+ 
+diff --git a/tests/checks/tmux-history-search.fish b/tests/checks/tmux-history-search.fish
+index 9dc1b4f..92bab0b 100644
+--- a/tests/checks/tmux-history-search.fish
 b/tests/checks/tmux-history-search.fish
+@@ -3,6 +3,9 @@
+ # disable on github actions because it's flakey
+ #REQUIRES: test -z "$CI"
+ 
++set -g isolated_tmux_fish_extra_args -C '
++set -g fish_autosuggestion_enabled 0
++'
+ isolated-tmux-start
+ 
+ isolated-tmux send-keys 'true needle' Enter
+@@ -15,3 +18,12 @@ isolated-tmux send-keys C-p C-a M-f M-f M-f M-.
+ # CHECK: prompt 2> true hay needle hay
+ tmux-sleep
+ isolated-tmux capture-pane -p
++
++isolated-tmux send-keys C-e C-u true Up Up Escape
++tmux-sleep
++isolated-tmux capture-pane -p | grep 'prompt 2'
++# CHECK: prompt 2> true
++isolated-tmux send-keys C-z _
++tmux-sleep
++isolated-tmux capture-pane -p | grep 'prompt 2'
++# CHECK: prompt 2> _
diff -Nru fish-3.6.0/debian/patches/0002-reader-Remove-assert-in-history-search.patch fish-3.6.0/debian/patches/0002-reader-Remove-assert-in-history-search.patch
--- fish-3.6.0/debian/patches/0002-reader-Remove-assert-in-his

Processed: intel-microcode 3.20230214.1~deb11u1 flagged for acceptance

2023-03-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1033079 = bullseye pending
Bug #1033079 [release.debian.org] bullseye-pu: package 
intel-microcode/3.20230214.1~deb11u1
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1033079: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033079
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033079: intel-microcode 3.20230214.1~deb11u1 flagged for acceptance

2023-03-25 Thread Adam D Barratt
package release.debian.org
tags 1033079 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: intel-microcode
Version: 3.20230214.1~deb11u1

Explanation: new upstream bug-fix release



Bug#1033374: pre-unblock: ruby-rack/2.2.6.4-1

2023-03-25 Thread Pirate Praveen

Control: tags -1 -moreinfo
Control: retitle -1 unblock: ruby-rack/2.2.6.4-1

On Fri, Mar 24 2023 at 06:45:30 PM +01:00:00 +01:00:00, Sebastian 
Ramacher  wrote:

Control: tags -1 moreinfo

On 2023-03-24 01:50:25 +0530, Pirate Praveen wrote:

 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock
 X-Debbugs-Cc: ruby-r...@packages.debian.org
 Control: affects -1 + src:ruby-rack

 Please see these changes for ruby-rack (I have not uploaded yet) is 
ok.


Please go ahead and let us know once the package is available in
unstable.


Uploaded ruby-rack/2.2.6.4-1 to unstable.



Cheers



 [ Reason ]
 It fixes two CVEs (though it includes some other bug fixes too)

 [ Impact ]
 Some of the changes included in this release are already included 
in the

 debian package as patches, this just reduces maintenance effort.

 [ Tests ]
 Upstream testsuite passes, gitlab is already using the 2.2.6.4 
version.


 [ Risks ]
 If this is not unblocked, two CVEs would have to be backported to 
2.2.4



 [ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

 [ Other info ]

 unblock ruby-rack/2.2.6.4-1


 diff -Nru ruby-rack-2.2.4/CHANGELOG.md 
ruby-rack-2.2.6.4/CHANGELOG.md

 --- ruby-rack-2.2.4/CHANGELOG.md   2022-07-01 03:48:29.0 +0530
 +++ ruby-rack-2.2.6.4/CHANGELOG.md	2023-03-13 23:37:51.0 
+0530

 @@ -2,6 +2,33 @@

  All notable changes to this project will be documented in this 
file. For info on how to format all future additions to this file 
please reference [Keep A 
Changelog](https://keepachangelog.com/en/1.0.0/).


 +## [2.2.6.4] - 2023-03-13
 +
 +- [CVE-2023-27539] Avoid ReDoS in header parsing
 +
 +## [2.2.6.3] - 2023-03-02
 +
 +- [CVE-2023-27530] Introduce multipart_total_part_limit to limit 
total parts

 +
 +## [2.2.6.2] - 2022-01-17
 +
 +- [CVE-2022-44570] Fix ReDoS in Rack::Utils.get_byte_ranges
 +
 +## [2.2.6.1] - 2022-01-17
 +
 +- [CVE-2022-44571] Fix ReDoS vulnerability in multipart parser
 +- [CVE-2022-44572] Forbid control characters in attributes (also 
ReDoS)

 +
 +## [2.2.6] - 2022-01-17
 +
 +- Extend `Rack::MethodOverride` to handle 
`QueryParser::ParamsTooDeepError` error. 
([#2011](https://github.com/rack/rack/pull/2011), 
[@byroot](https://github.com/byroot))

 +
 +## [2.2.5] - 2022-12-27
 +
 +### Fixed
 +
 +- `Rack::URLMap` uses non-deprecated form of `Regexp.new`. 
([#1998](https://github.com/rack/rack/pull/1998), 
[@weizheheng](https://github.com/weizheheng))

 +
  ## [2.2.4] - 2022-06-30

  - Better support for lower case headers in `Rack::ETag` 
middleware. ([#1919](https://github.com/rack/rack/pull/1919), 
[@ioquatix](https://github.com/ioquatix))
 diff -Nru ruby-rack-2.2.4/debian/changelog 
ruby-rack-2.2.6.4/debian/changelog
 --- ruby-rack-2.2.4/debian/changelog	2023-02-09 16:17:17.0 
+0530
 +++ ruby-rack-2.2.6.4/debian/changelog	2023-03-24 
01:32:43.0 +0530

 @@ -1,3 +1,10 @@
 +ruby-rack (2.2.6.4-1) unstable; urgency=medium
 +
 +  * Team Upload
 +  * New upstream version 2.2.6.4 (Fixes: CVE-2023-27530, 
CVE-2023-27539)

 +
 + -- Pirate Praveen   Fri, 24 Mar 2023 01:32:43 
+0530

 +
  ruby-rack (2.2.4-3) unstable; urgency=high

* Team upload
 diff -Nru 
ruby-rack-2.2.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch 
ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch
 --- 
ruby-rack-2.2.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch	2023-02-09 
16:17:17.0 +0530
 +++ 
ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch	1970-01-01 
05:30:00.0 +0530

 @@ -1,26 +0,0 @@
  a/lib/rack/utils.rb
 -+++ b/lib/rack/utils.rb
 -@@ -348,17 +348,18 @@
 -   return nil unless http_range && http_range =~ 
/bytes=([^;]+)/

 -   ranges = []
 -   $1.split(/,\s*/).each do |range_spec|
 --return nil  unless range_spec =~ /(\d*)-(\d*)/
 --r0, r1 = $1, $2
 --if r0.empty?
 --  return nil  if r1.empty?
 -+return nil unless range_spec.include?('-')
 -+range = range_spec.split('-')
 -+r0, r1 = range[0], range[1]
 -+if r0.nil? || r0.empty?
 -+  return nil if r1.nil?
 -   # suffix-byte-range-spec, represents trailing suffix of 
file

 -   r0 = size - r1.to_i
 -   r0 = 0  if r0 < 0
 -   r1 = size - 1
 - else
 -   r0 = r0.to_i
 --  if r1.empty?
 -+  if r1.nil?
 - r1 = size - 1
 -   else
 - r1 = r1.to_i
 diff -Nru 
ruby-rack-2.2.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.patch 
ruby-rack-2.2.6.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.patch
 --- 
ruby-rack-2.2.4/debian/patches/Fix-ReDoS-vulnerability-in-multipart-parser.patch	2023-02-09 
16:17:17.0 +0530
 +++ 
ruby-rack-2.2.6.4/debian/patches/F

Processed: Re: Bug#1033374: pre-unblock: ruby-rack/2.2.6.4-1

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 -moreinfo
Bug #1033374 [release.debian.org] pre-unblock: ruby-rack/2.2.6.4-1
Removed tag(s) moreinfo.
> retitle -1 unblock: ruby-rack/2.2.6.4-1
Bug #1033374 [release.debian.org] pre-unblock: ruby-rack/2.2.6.4-1
Changed Bug title to 'unblock: ruby-rack/2.2.6.4-1' from 'pre-unblock: 
ruby-rack/2.2.6.4-1'.

-- 
1033374: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033374
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: unblock: xscreensaver/6.06+dfsg1-3

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:xscreensaver
Bug #1033460 [release.debian.org] unblock: xscreensaver/6.06+dfsg1-3
Added indication that 1033460 affects src:xscreensaver

-- 
1033460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033460
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033460: unblock: xscreensaver/6.06+dfsg1-3

2023-03-25 Thread Tormod Volden
Package: release.debian.org
Control: affects -1 + src:xscreensaver
X-Debbugs-Cc: xscreensa...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package xscreensaver 6.06+dfsg1-3

[ Reason ]
A couple of upstream crash regressions were introduced in 6.06,
and these are fixed in 6.06+dfsg1-3 (#1030909, #1030659).
There was also a regression where DPMS settings were reset,
causing lack of power saving, the patch from upstream was included
for this (#1031076). A missing dependency was fixed together with a
correction of internal dependencies between the binary packages.
A translation was broken simply because of wrong po file encoding
(seen on l10n status report).

[ Impact ]
The user won't be able to set XScreenSaver preferences because
the preference window crashes.
The user will unknowingly leave the power settings disabled and
waste electricity.
The missing dependencies would prevent screensaver modes from
functioning.

[ Tests ]
Bug reporters have verified the fixes in 6.06+dfsg1-3.
I could myself reproduce the issues and their fixes.
There have been no new issues or regressions reported since
6.06+dfsg1-3 was uploaded 21 days ago.

[ Risks ]
The most complex crash issue was analyzed in depth by upstream
and GTK developers, so the applied solution is well understood. The
other fixes are relatively trivial and the risk is low that they have any
unintentional effects.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing

[ Other info ]

Attachments: xscreensaver_6.06+dfsg1-3.debdiff


xscreensaver_6.06+dfsg1-3.debdiff
Description: Binary data


NEW changes in stable-new

2023-03-25 Thread Debian FTP Masters
Processing changes file: openvswitch_2.15.0+ds1-2+deb11u3_source.changes
  ACCEPT



NEW changes in stable-new

2023-03-25 Thread Debian FTP Masters
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_source.changes
  ACCEPT
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_all-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_i386-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.8.0esr-1~deb11u1_s390x-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_source.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_all-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_amd64-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_arm64-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_armhf-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_i386-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_102.9.0esr-1~deb11u1_s390x-buildd.changes
  ACCEPT
Processing changes file: libdatetime-timezone-perl_2.47-1+2023b_source.changes
  ACCEPT
Processing changes file: tzdata_2021a-1+deb11u9_source.changes
  ACCEPT



Processed: openvswitch 2.15.0+ds1-2+deb11u3 flagged for acceptance

2023-03-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1030113 = bullseye pending
Bug #1030113 [release.debian.org] bullseye-pu: package 
openvswitch/2.15.0+ds1-2+deb11u2
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1030113: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030113
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1030113: openvswitch 2.15.0+ds1-2+deb11u3 flagged for acceptance

2023-03-25 Thread Adam D Barratt
package release.debian.org
tags 1030113 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: openvswitch
Version: 2.15.0+ds1-2+deb11u3

Explanation: fix "openvswitch-switch update leaves interfaces down"



Bug#1033412: libdatetime-timezone-perl 2.47-1+2023b flagged for acceptance

2023-03-25 Thread Adam D Barratt
package release.debian.org
tags 1033412 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: libdatetime-timezone-perl
Version: 2.47-1+2023b

Explanation: update included data



Processed: libdatetime-timezone-perl 2.47-1+2023b flagged for acceptance

2023-03-25 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1033412 = bullseye pending
Bug #1033412 [release.debian.org] bullseye-pu: package 
libdatetime-timezone-perl/1:2.47-1+2023b
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1033412: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033412
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033449: unblock: fbb/7.011-2

2023-03-25 Thread Christoph Berg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: f...@packages.debian.org, Debian Hamradio Maintainers 

Control: affects -1 + src:fbb

Please unblock package fbb. The new version fixes a segfault when
listing subdirectories. (Closes: #1032223)

The diff is unfortunately quite noisy since different quilt flags were
used when refreshing the patch where the bug was in. The effective
interdiff is this:

+Index: fbb-7.011/src/ibm.c
+===
+--- fbb-7.011.orig/src/ibm.c
 fbb-7.011/src/ibm.c
-@@ -205,13 +204,10 @@
+@@ -205,13 +204,13 @@ void format_ffblk (struct ffblk *blk, st
else
sprintf (filename, "%s/%s", blk->ff_base, dir->d_name);

 -  ret = lstat (filename, &st);
--
++lstat (filename, &st);
+
if (S_ISLNK (st.st_mode))
{
/* printf ("link\n"); */
blk->ff_attrib |= FA_LINK;
 -  ret = stat (filename, &st);
++stat (filename, &st);
if (S_ISDIR (st.st_mode))
{
blk->ff_attrib |= FA_DIREC;

I.e. the original patch mistakenly removed lstat, and the new patch
restores it to the original place. "ret" is dropped since the code
doesn't use it.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach git diff against the package in testing

unblock fbb/7.011-2

Christoph
diff --git a/debian/changelog b/debian/changelog
index 313edc3..4620c2c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+fbb (7.011-2) unstable; urgency=medium
+
+  * Team upload.
+  * Address segfault when listing subdirectories (Closes: #1032223)
+Thank you to Mike Quin for the bug report and patch.
+
+ -- tony mancill   Sun, 05 Mar 2023 09:53:13 -0800
+
 fbb (7.011-1) unstable; urgency=medium
 
   * Team upload.
diff --git a/debian/patches/05-fix-compile-warnings b/debian/patches/05-fix-compile-warnings
index 485541e..0e87f45 100644
--- a/debian/patches/05-fix-compile-warnings
+++ b/debian/patches/05-fix-compile-warnings
@@ -1,9 +1,14 @@
-Fix trivial compiler warnings, mostly unused vars
+Description: Fix trivial compiler warnings, mostly unused vars
+  Thank you to Mike Quin for patching the patch.
+  See:  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032223
 Author: Colin Tuckley col...@debian.org
+Last-Update: 2023-03-02
 
 a/src/console.c
-+++ b/src/console.c
-@@ -254,7 +254,6 @@
+Index: fbb-7.011/src/console.c
+===
+--- fbb-7.011.orig/src/console.c
 fbb-7.011/src/console.c
+@@ -254,7 +254,6 @@ void connect_fen (void)
  
  void winputs (int voie, int attr, char *ptr)
  {
@@ -11,7 +16,7 @@ Author: Colin Tuckley col...@debian.org
  	int header;
  
  	if (attr == -1)
-@@ -265,7 +264,6 @@
+@@ -265,7 +264,6 @@ void winputs (int voie, int attr, char *
  	else
  		header = 0;
  
@@ -19,9 +24,11 @@ Author: Colin Tuckley col...@debian.org
  	window_write (voie, ptr, strlen (ptr), attr, header);
  }
  
 a/src/drv_mod.c
-+++ b/src/drv_mod.c
-@@ -575,11 +575,6 @@
+Index: fbb-7.011/src/drv_mod.c
+===
+--- fbb-7.011.orig/src/drv_mod.c
 fbb-7.011/src/drv_mod.c
+@@ -575,11 +575,6 @@ int lit_port_modem (int port)
  			ioctl (ptrcom->comfd, TIOCMGET, &mcs);
  			con = (mcs & TIOCM_CAR) ? 1 : 0;
  
@@ -33,7 +40,7 @@ Author: Colin Tuckley col...@debian.org
  			if ((svoie[voie]->sta.connect > 1) && (svoie[voie]->sta.connect < 17) && (!con))
  			{
  md_no_echo (voie);
-@@ -851,10 +846,12 @@
+@@ -851,10 +846,12 @@ int lit_port_modem (int port)
  			con = (nstat & 0x80) ? 1 : 0;
  #endif
  
@@ -46,9 +53,11 @@ Author: Colin Tuckley col...@debian.org
  
  			if ((svoie[voie]->sta.connect > 1) && (svoie[voie]->sta.connect < 17) && (!con))
  			{
 a/src/fwdovl5.c
-+++ b/src/fwdovl5.c
-@@ -737,14 +737,9 @@
+Index: fbb-7.011/src/fwdovl5.c
+===
+--- fbb-7.011.orig/src/fwdovl5.c
 fbb-7.011/src/fwdovl5.c
+@@ -737,14 +737,9 @@ void init_part (void)
  	}
  	else
  	{
@@ -63,9 +72,11 @@ Author: Colin Tuckley col...@debian.org
  		if (jour < 0)
  			jour += 31;
  		if (jour > 15)
 a/src/ibm.c
-+++ b/src/ibm.c
-@@ -190,7 +190,6 @@
+Index: fbb-7.011/src/ibm.c
+===
+--- fbb-7.011.orig/src/ibm.c
 fbb-7.011/src/ibm.c
+@@ -190,7 +190,6 @@ int getftime (int fd, struct ftime *ft)
  
  void format_ffblk (struct ffblk *blk, struct dirent *dir)
  {
@@ -73,23 +84,27 @@ Author: Colin Tuckley col...@debian.org
  	int year;
  	struct stat st;
  	struct tm *tm;
-@@ -205,13 +204,10 @@
+@@ -205,13 +204,13 @@ void format_ffblk (struct ffblk *blk, st
  	else
  		sprintf (filename, "%s/%s",

Processed: unblock: fbb/7.011-2

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + src:fbb
Bug #1033449 [release.debian.org] unblock: fbb/7.011-2
Added indication that 1033449 affects src:fbb

-- 
1033449: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033449
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033399: marked as done (pre-approve unblock: tryton-server/6.0.29-2)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 10:33:49 +0100
with message-id 
and subject line Re: Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2
has caused the Debian Bug report #1033399,
regarding pre-approve unblock: tryton-server/6.0.29-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033399
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: tryton-ser...@packages.debian.org
Control: affects -1 + src:tryton-server

Please pre-approve the unblock of package tryton-server

[ Reason ]
This release targets several fixes that should go into bookworm:

  * Add missing quotes in maintainer scripts (Closes: #1033055).
  * Make conf file parsing section aware (Closes: #1033055).
  * Correct a variable typo (Closes: #1033055).
  * Remove lsb-base from Depends.


[ Impact ]
There can be errors when using spaces or something alike in the debconf related
questions.

[ Tests ]
Salsa CI tests are passing
https://salsa.debian.org/tryton-team/tryton-server/-/pipelines/513249
as well as all build tests.

I did a full manual test over all packages.


[ Risks ]

The code changes are trivial enough to not expect regressions.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock tryton-server/6.0.29-2



-- 

Mathias Behrle
PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6
AC29 7E5C 46B9 D0B6 1C71  7681 D6D0 9BE4 8405 BBF6


tryton-server_6.0.29_-1_tryton-server_6.0.29-2.debdiff
Description: Binary data
--- End Message ---
--- Begin Message ---
On 2023-03-25 10:07:02 +0100, Mathias Behrle wrote:
> Control: tags -1 - moreinfo
> 
> Hi Sebastian, hi all,
> 
> > On 2023-03-24 13:07:57 +0100, Mathias Behrle wrote:
> > > Package: release.debian.org
> > > Severity: normal
> > > User: release.debian@packages.debian.org
> > > Usertags: unblock
> > > X-Debbugs-Cc: tryton-ser...@packages.debian.org
> > > Control: affects -1 + src:tryton-server
> > > 
> > > Please pre-approve the unblock of package tryton-server
> > 
> > Please go ahead and let us know once the package is available in
> > unstable.
> 
> The package was accepted in unstable.

Turns out that the package has successful autopkgtests and will migrate
on its own. Be aware that #1032517 may cause its removal if nginx is not
fixed in time.

Cheers
-- 
Sebastian Ramacher--- End Message ---


Bug#1033285: marked as done (unblock: libpaper/1.1.29)

2023-03-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Mar 2023 09:29:19 +
with message-id 
and subject line unblock libpaper
has caused the Debian Bug report #1033285,
regarding unblock: libpaper/1.1.29
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033285: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033285
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libpaper. This new version only includes non-code
changes: a few typos corrections in manual pages and a new language
translation.

[ Reason ]
While this is not a necessary update, it would benefits users without
having any functional impact.

[ Impact ]
ditto

[ Tests ]
nothing

[ Risks ]
No code changes are present. There should not be any risks.

[ Checklist ]
  [ X ] all changes are documented in the d/changelog
  [ X ] I reviewed all changes and I approve them
  [ X ] attach debdiff against the package in testing

[ Other info ]
nothing

Thank you very much,
Giuseppe

unblock libpaper/1.1.29

diff -Nru libpaper-1.1.28/debian/changelog libpaper-1.1.29/debian/changelog
--- libpaper-1.1.28/debian/changelog	2019-06-26 00:04:32.0 +0200
+++ libpaper-1.1.29/debian/changelog	2023-03-17 14:44:15.0 +0100
@@ -1,3 +1,14 @@
+libpaper (1.1.29) unstable; urgency=medium
+
+  * Fix for parallel build. See #857058
+  * Added romanian translation. See #1032333
+  * Updated standards-version to 4.6.0 (no changes)
+  * Update papersize manual page. See #959403
+  * Update paperconf manual page. See #959404
+  * Update paperconfig manual page. See #959405
+
+ -- Giuseppe Sacco   Fri, 17 Mar 2023 14:44:15 +0100
+
 libpaper (1.1.28) unstable; urgency=medium
 
   * Completely fixed #927226.
diff -Nru libpaper-1.1.28/debian/control libpaper-1.1.29/debian/control
--- libpaper-1.1.28/debian/control	2016-07-16 18:06:42.0 +0200
+++ libpaper-1.1.29/debian/control	2023-03-17 14:29:31.0 +0100
@@ -2,7 +2,7 @@
 Section: libs
 Priority: optional
 Maintainer: Giuseppe Sacco 
-Standards-Version: 3.9.8
+Standards-Version: 4.6.0
 Build-Depends: autotools-dev, dpkg-dev (>= 1.16.1~), debhelper (>= 9), dh-autoreconf, dh-exec(>= 0.3), po-debconf, autoconf
 
 Package: libpaper1
diff -Nru libpaper-1.1.28/debian/po/ro.po libpaper-1.1.29/debian/po/ro.po
--- libpaper-1.1.28/debian/po/ro.po	1970-01-01 01:00:00.0 +0100
+++ libpaper-1.1.29/debian/po/ro.po	2023-03-17 14:22:38.0 +0100
@@ -0,0 +1,316 @@
+# Mesajele în limba română pentru pachetul libpaper.
+# Romanian translation of libpaper.
+# Copyright © 2023 THE PACKAGE'S COPYRIGHT HOLDER
+# This file is distributed under the same license as the libpaper package.
+#
+# Remus-Gabriel Chelu , 2023.
+#
+# Cronologia traducerii fișierului „libpaper”:
+# Traducerea inițială, făcută de R-GC, pentru versiunea libpaper 1.1.28(2009-07-18).
+# Actualizare a traducerii pentru versiunea Y, făcută de X, Y(anul).
+#
+msgid ""
+msgstr ""
+"Project-Id-Version: libpaper 1.1.28\n"
+"Report-Msgid-Bugs-To: eppes...@debian.org\n"
+"POT-Creation-Date: 2007-07-18 19:50+0200\n"
+"PO-Revision-Date: 2023-02-26 11:30+0100\n"
+"Last-Translator: Remus-Gabriel Chelu \n"
+"Language-Team: Romanian \n"
+"Language: ro\n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+"Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n==0 || (n!=1 && n%100>=1 && "
+"n%100<=19) ? 1 : 2);\n"
+"X-Bugs: Report translation errors to the Language-Team address.\n"
+"X-Generator: Poedit 3.2.2\n"
+
+# R-GC, scrie:
+# cum multe dintre dimensiunile ce apar aici,
+# au nume englezești(a se citi, americane),
+# ce traduse, nu ne spun mare lucru și care
+# pe aici pe colo, induc în eroare, am extras
+# dimensiunile acestora (în milimetri), din
+# pagina de Wikipedia:
+# 
+#. Type: select
+#. Choices
+#: ../libpaper1.templates:2001
+msgid "letter"
+msgstr "Letter(scrisoare) [216 x 279mm]"
+
+#. Type: select
+#. Choices
+#: ../libpaper1.templates:2001
+msgid "a4"
+msgstr "A4 [210 x 297mm]"
+
+#. Type: select
+#. Choices
+#: ../libpaper1.templates:2001
+msgid "note"
+msgstr "Note(notă) [220 x 280mm]"
+
+#. Type: select
+#. Choices
+#: ../libpaper1.templates:2001
+msgid "legal"
+msgstr "Legal [216 x 356mm]"
+
+#. Type: select
+#. Choices
+#: ../libpaper1.templates:2001
+msgid "executive"
+msgstr "Executive [184 x 267mm]"
+
+#. Type: select
+#. Choices
+#: ../libpaper1.templates:2001
+msgid "halfletter"
+msgstr "Half Letter(½ scrisoare) [140 

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-25 Thread Sebastian Ramacher
Control: tags -1 moreinfo

On 2023-03-24 20:55:28 +0100, Jan Wagner wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
> X-Debbugs-Cc: pkg-nagios-de...@lists.alioth.debian.org
> Control: affects -1 + src:monitoring-plugins
> 
> Please see these changes for monitoring-plugins. 2.3.3-4 is already uploaded
> into unstable (containing one fix from upstream) but is blocked due missing
> autopkgtests. I prepared another upload containing two fixes from upstream,
> which is not uploaded yet.
> 
> [ Reason ]
> This release targets several fixes that should go into bookworm:
> 
> * [953ee52] Adding d/p/13_check_icmp_improvements from upstream
> * [6fb8e25] Adding d/p/14_check_curl_fix_SSL_with_multiple_IPs from upstream
> * [eab1e1d] Adding d/p/15_check_swap_remove_includes from upstream

What's the rationale to include these patches? Do they fix bugs reported
in the BTS or upstream?

Cheers

> 
> [ Impact ]
> Included patches fixes regressions from latest upstream release.
> 
> [ Tests ]
> Upstream testsuite passes as well as Salsa CI
> (https://salsa.debian.org/nagios-team/monitoring-plugins/-/pipelines/514242)
> tests (ignoring the blhc).
> 
> [ Risks ]
> The code changes are trivial enough to not expect regressions.
> 
> [ Checklist ]
>  [x] all changes are documented in the d/changelog
>  [x] I reviewed all changes and I approve them
>  [x] attach debdiff against the package in testing
> 
> [ Other info ]
> 
> unblock monitoring-plugins/2.3.3-5

> diff --git a/debian/changelog b/debian/changelog
> index caf2e31..c738c88 100644
> --- a/debian/changelog
> +++ b/debian/changelog
> @@ -1,3 +1,16 @@
> +monitoring-plugins (2.3.3-5) unstable; urgency=medium
> +
> +  * [6fb8e25] Adding d/p/14_check_curl_fix_SSL_with_multiple_IPs from 
> upstream
> +  * [eab1e1d] Adding d/p/15_check_swap_remove_includes from upstream
> +
> + -- Jan Wagner   Fri, 24 Mar 2023 19:16:16 +
> +
> +monitoring-plugins (2.3.3-4) unstable; urgency=medium
> +
> +  * [953ee52] Adding d/p/13_check_icmp_improvements from upstream
> +
> + -- Jan Wagner   Tue, 07 Mar 2023 13:29:35 +
> +
>  monitoring-plugins (2.3.3-3) unstable; urgency=medium
>  
>* [15d0c56] Adding d/p/12_check_curl_improvements from upstream
> diff --git a/debian/patches/13_check_icmp_improvements 
> b/debian/patches/13_check_icmp_improvements
> new file mode 100644
> index 000..0eb2748
> --- /dev/null
> +++ b/debian/patches/13_check_icmp_improvements
> @@ -0,0 +1,200 @@
> +From 413af1955538b06803458c628099f1ba9da1966b Mon Sep 17 00:00:00 2001
> +From: RincewindsHat <12514511+rincewinds...@users.noreply.github.com>
> +Date: Fri, 4 Nov 2022 16:51:32 +0100
> +Subject: [PATCH 1/5] Remove trailing whitespaces
> +
> +---
> + plugins-root/check_icmp.c | 24 
> + 1 file changed, 12 insertions(+), 12 deletions(-)
> +
> +diff --git a/plugins-root/check_icmp.c b/plugins-root/check_icmp.c
> +index f8f153512..abd88c4e7 100644
> +--- a/plugins-root/check_icmp.c
>  b/plugins-root/check_icmp.c
> +@@ -1,39 +1,39 @@
> + 
> /*
> +-* 
> ++*
> + * Monitoring check_icmp plugin
> +-* 
> ++*
> + * License: GPL
> + * Copyright (c) 2005-2008 Monitoring Plugins Development Team
> + * Original Author : Andreas Ericsson 
> +-* 
> ++*
> + * Description:
> +-* 
> ++*
> + * This file contains the check_icmp plugin
> +-* 
> ++*
> + * Relevant RFC's: 792 (ICMP), 791 (IP)
> +-* 
> ++*
> + * This program was modeled somewhat after the check_icmp program,
> + * which was in turn a hack of fping (www.fping.org) but has been
> + * completely rewritten since to generate higher precision rta values,
> + * and support several different modes as well as setting ttl to control.
> + * redundant routes. The only remainders of fping is currently a few
> + * function names.
> +-* 
> +-* 
> ++*
> ++*
> + * This program is free software: you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation, either version 3 of the License, or
> + * (at your option) any later version.
> +-* 
> ++*
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> +-* 
> ++*
> + * You should have received a copy of the GNU General Public License
> + * along with this program.  If not, see .
> +-* 
> +-* 
> ++*
> ++*
> + 
> */
> + 
> + /* progname may change */
> +
> +From 7d074091dba8c1d4081971bf62e694d0b1a03d41 Mon Sep 17 00:00:00 2001
> +From: RincewindsHat <12514511+rincewinds...@users.noreply.github.com>
> +Date: Fri, 4 Nov 2022 16:53:57 +0100
> +Subject: [PATCH 2/5] Remo

Processed: Re: Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 moreinfo
Bug #1033439 [release.debian.org] pre-unblock: monitoring-plugins/2.3.3-5
Added tag(s) moreinfo.

-- 
1033439: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033439
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033285: unblock: libpaper/1.1.29

2023-03-25 Thread Sebastian Ramacher
On 2023-03-23 09:16:49 +0100, Giuseppe Sacco wrote:
> Hello Sebastian,
> 
> Il giorno mer, 22/03/2023 alle 21.18 +0100, Sebastian Ramacher ha scritto:
> > Control: tags -1 moreinfo
> > 
> > On 2023-03-21 12:03:30 +0100, Giuseppe Sacco wrote:
> > > Package: release.debian.org
> > > Severity: normal
> > > User: release.debian@packages.debian.org
> > > Usertags: unblock
> > > 
> > > Please unblock package libpaper. This new version only includes non-code
> > > changes: a few typos corrections in manual pages and a new language
> > > translation.
> > > 
> > > [ Reason ]
> > > While this is not a necessary update, it would benefits users without
> > > having any functional impact.
> > > 
> > > [ Impact ]
> > > ditto
> > > 
> > > [ Tests ]
> > > nothing
> > > 
> > > [ Risks ]
> > > No code changes are present. There should not be any risks.
> > > 
> > > [ Checklist ]
> > >   [ X ] all changes are documented in the d/changelog
> > >   [ X ] I reviewed all changes and I approve them
> > >   [ X ] attach debdiff against the package in testing
> > > 
> > > [ Other info ]
> > > nothing
> > > 
> > > Thank you very much,
> > > Giuseppe
> > > 
> > > unblock libpaper/1.1.29
> > > 
> > 
> > > diff -Nru libpaper-1.1.28/debian/changelog libpaper-
> > > 1.1.29/debian/changelog
> > > --- libpaper-1.1.28/debian/changelog2019-06-26 00:04:32.0
> > > +0200
> > > +++ libpaper-1.1.29/debian/changelog2023-03-17 14:44:15.0
> > > +0100
> > > @@ -1,3 +1,14 @@
> > > +libpaper (1.1.29) unstable; urgency=medium
> > > +
> > > +  * Fix for parallel build. See #857058
> > 
> > How does this upload fix parallel building? The diff only contains
> > changes to translations?
> > 
> 
> You are right, that was my mistake. I've got a bug about parallel build and
> started fixing it, but later on I found the problem had already been fixed by
> another patch already applied, so I reverted my unnecessary changes and I
> forgot to the remove the line from changelog. My bad.

Okay, unblocked. Please remember to fix up the changelog of 1.1.29 for
the next upload.

Cheers

> 
> Bye,
> Giuseppe
> 

-- 
Sebastian Ramacher



Processed: Re: Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 - moreinfo
Bug #1033399 [release.debian.org] pre-approve unblock: tryton-server/6.0.29-2
Removed tag(s) moreinfo.

-- 
1033399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033399
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033399: pre-approve unblock: tryton-server/6.0.29-2

2023-03-25 Thread Mathias Behrle
Control: tags -1 - moreinfo

Hi Sebastian, hi all,

> On 2023-03-24 13:07:57 +0100, Mathias Behrle wrote:
> > Package: release.debian.org
> > Severity: normal
> > User: release.debian@packages.debian.org
> > Usertags: unblock
> > X-Debbugs-Cc: tryton-ser...@packages.debian.org
> > Control: affects -1 + src:tryton-server
> > 
> > Please pre-approve the unblock of package tryton-server
> 
> Please go ahead and let us know once the package is available in
> unstable.

The package was accepted in unstable.

Cheers
Mathias


-- 

Mathias Behrle
PGP/GnuPG key availabable from any keyserver, ID: 0xD6D09BE48405BBF6
AC29 7E5C 46B9 D0B6 1C71  7681 D6D0 9BE4 8405 BBF6



Processed: Re: Bug#1033401: unblock: src:dino-im/0.4.2-1

2023-03-25 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 - moreinfo
Bug #1033401 [release.debian.org] unblock: src:dino-im/0.4.2-1
Removed tag(s) moreinfo.

-- 
1033401: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033401
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1033401: unblock: src:dino-im/0.4.2-1

2023-03-25 Thread Salvatore Bonaccorso
Control: tags -1 - moreinfo

Hi

On Fri, Mar 24, 2023 at 06:57:55PM +0100, Sebastian Ramacher wrote:
> Control: tags -1 moreinfo
> 
> On 2023-03-24 12:45:41 +, Martin wrote:
> > Package: release.debian.org
> > Severity: normal
> > User: release.debian@packages.debian.org
> > Usertags: unblock
> > 
> > Dear release team,
> > 
> > I like to get clearance for uploading dino-im 0.4.2 to unstable, to get
> > it into bookworm.
> 
> Please go ahead and let us know once the package is available in
> unstable.

FWIW, this is now in unstable.

https://tracker.debian.org/news/1427745/accepted-dino-im-042-1-source-into-unstable/

Regards,
Salvatore