Re: concerns about the state of buildds for jessie
Hi, 2015-02-11 20:46 GMT+01:00 Peter Palfrader wea...@debian.org: It seems the buildd team is severely understaffed and needs help. If this rumor turns to be a reality, are there some prerequisites potential volunteers could have a look to in the event they want to apply for the role? Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/cadk7b0o_ehd36evqf08j1sjocg7e1u8mrnuw4p9f9z0xwet...@mail.gmail.com
Bug#770501: unblock: libvncserver/0.9.9+dfsg-7 (pre-approval)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock I prepared an upload to fix grave bug #762745, cherry-picking patches from upstream to fix multiple vulnerabilities. I also took the chance to include fixes for #766257 and #758754. Please tell me whether I should drop these instead. The problem with this (tentative) upload is related to this commit, needed to fix CVE-2014-6055: https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e It seems there's an API/ABI break, also reported in RedHat, as per https://bugzilla.redhat.com/show_bug.cgi?id=1144293#c2, which could be problematic at this point. What would be the recommended way to proceed from here? -- System Information: Debian Release: jessie/sid APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.16-3-amd64 (SMP w/8 CPU cores) diff --git a/debian/changelog b/debian/changelog index 4cb521d..77de074 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,19 @@ +libvncserver (0.9.9+dfsg-7) UNRELEASED; urgency=medium + + * debian/patches/CVE-2014.patch: +- Fix multiple vulnerabilities (Closes: #762745). + - CVE-2014-6051 Integer overflow in MallocFrameBuffer() on client side. + - CVE-2014-6052 Lack of malloc() return value checking on client side. + - CVE-2014-6053 Server crash on a very large ClientCutText message. + - CVE-2014-6054 Server crash when scaling factor is set to zero. + - CVE-2014-6055 Multiple stack overflows in File Transfer feature. + * debian/patches/novnc.patch: +- Set opcode correctly for binary frames (Closes: #766257). + * debian/control: +- Use uppercase VNC in short descriptions (Closes: #758754). + + -- Luca Falavigna dktrkr...@debian.org Fri, 21 Nov 2014 20:51:50 +0100 + libvncserver (0.9.9+dfsg-6) unstable; urgency=medium [ Luca Falavigna ] diff --git a/debian/control b/debian/control index 9e188be..17ebbe6 100644 --- a/debian/control +++ b/debian/control @@ -22,7 +22,7 @@ Depends: ${shlibs:Depends}, Breaks: libvncserver0 ( 0.9.9+dfsg-3) Replaces: libvncserver0 ( 0.9.9+dfsg-3) Multi-Arch: same -Description: API to write one's own vnc server - client library +Description: API to write one's own VNC server - client library LibVNCServer makes writing a VNC server (or more correctly, a program exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides the programmer from the tedious task of managing clients and compression. @@ -35,7 +35,7 @@ Pre-Depends: ${misc:Pre-Depends} Depends: ${shlibs:Depends}, ${misc:Depends} Multi-Arch: same -Description: API to write one's own vnc server +Description: API to write one's own VNC server LibVNCServer makes writing a VNC server (or more correctly, a program exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides the programmer from the tedious task of managing clients and compression. @@ -53,7 +53,7 @@ Depends: ${misc:Depends}, zlib1g-dev, libvncserver-config Multi-Arch: same -Description: API to write one's own vnc server - development files +Description: API to write one's own VNC server - development files LibVNCServer makes writing a VNC server (or more correctly, a program exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides the programmer from the tedious task of managing clients and compression. @@ -68,7 +68,7 @@ Depends: ${misc:Depends}, libvncclient0 (= ${binary:Version}), libvncserver0 (= ${binary:Version}) Multi-Arch: foreign -Description: API to write one's own vnc server - library utility +Description: API to write one's own VNC server - library utility LibVNCServer makes writing a VNC server (or more correctly, a program exporting a framebuffer via the Remote Frame Buffer protocol) easy. It hides the programmer from the tedious task of managing clients and compression. diff --git a/debian/patches/CVE-2014.patch b/debian/patches/CVE-2014.patch new file mode 100644 index 000..3931854 --- /dev/null +++ b/debian/patches/CVE-2014.patch @@ -0,0 +1,293 @@ +Description: Fix CVE-2014-6051 CVE-2014-6052 CVE-2014-6053 + CVE-2014-6054 CVE-2014-6055 +Author: Nicolas Ruff nr...@google.com + +Index: libvncserver/libvncclient/rfbproto.c +=== +--- libvncserver.orig/libvncclient/rfbproto.c 2014-11-21 20:35:19.488146693 +0100 libvncserver/libvncclient/rfbproto.c 2014-11-21 20:45:30.973828663 +0100 +@@ -1807,7 +1807,8 @@ + client-updateRect.x = client-updateRect.y = 0; + client-updateRect.w = client-width; + client-updateRect.h = client-height; +- client-MallocFrameBuffer(client); ++ if (!client-MallocFrameBuffer(client)) ++return FALSE; + SendFramebufferUpdateRequest(client, 0, 0, rect.r.w, rect.r.h, FALSE); + rfbClientLog(Got new framebuffer size
Bug#770381: unblock: remmina/1.1.1-2 (pre-approval)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, Please consider unblocking a tentative remmina 1.1.1-2 upload, debdiff attached. This upload cherry-picks patches from upstream Git to fix #766671. I reproduced the crash (it's very trivial to test it), and the patch actually solves the problem. unblock remmina/1.1.1-2 -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores) diff --git a/debian/changelog b/debian/changelog index 42e466f..f69d17c 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,11 @@ +remmina (1.1.1-2) unstable; urgency=medium + + * debian/patches/RDP_certificate_crash.patch: +- Cherry-pick patches from upstream to fix a crash when not + accepting certificate for RDP server (Closes: #766671). + + -- Luca Falavigna dktrkr...@debian.org Thu, 20 Nov 2014 21:08:11 +0100 + remmina (1.1.1-1) unstable; urgency=medium * New upstream release. diff --git a/debian/patches/RDP_certificate_crash.patch b/debian/patches/RDP_certificate_crash.patch new file mode 100644 index 000..40c7bf3 --- /dev/null +++ b/debian/patches/RDP_certificate_crash.patch @@ -0,0 +1,154 @@ +Description: Fix crash when not accepting certificate for RDP server +Author: Giovanni Panozzo giova...@panozzo.it + +Index: remmina/remmina-plugins/rdp/rdp_event.c +=== +--- remmina.orig/remmina-plugins/rdp/rdp_event.c remmina/remmina-plugins/rdp/rdp_event.c +@@ -54,6 +54,9 @@ static void remmina_rdp_event_on_focus_i + #endif + + rfi = GET_DATA(gp); ++ if ( !rfi ) ++ return; ++ + input = rfi-instance-input; + UINT32 toggle_keys_state = 0; + +@@ -88,6 +91,8 @@ static void remmina_rdp_event_event_push + RemminaPluginRdpEvent* event; + + rfi = GET_DATA(gp); ++ if ( !rfi ) ++ return; + + if (rfi-event_queue) + { +@@ -454,6 +459,8 @@ static gboolean remmina_rdp_event_on_key + DWORD scancode; + + rfi = GET_DATA(gp); ++ if ( !rfi ) return TRUE; ++ + rdp_event.type = REMMINA_RDP_EVENT_TYPE_SCANCODE; + rdp_event.key_event.up = (event-type == GDK_KEY_PRESS ? False : True); + rdp_event.key_event.extended = False; +@@ -535,6 +542,8 @@ void remmina_rdp_event_init(RemminaProto + GtkClipboard* clipboard; + + rfi = GET_DATA(gp); ++ if ( !rfi ) return; ++ + rfi-drawing_area = gtk_drawing_area_new(); + gtk_widget_show(rfi-drawing_area); + gtk_container_add(GTK_CONTAINER(gp), rfi-drawing_area); +@@ -608,7 +617,7 @@ void remmina_rdp_event_uninit(RemminaPro + RemminaPluginRdpUiObject* ui; + + rfi = GET_DATA(gp); +- ++ if ( !rfi ) return; + + /* unregister the clipboard monitor */ + if (rfi-clipboard_handler) +Index: remmina/remmina-plugins/rdp/rdp_plugin.c +=== +--- remmina.orig/remmina-plugins/rdp/rdp_plugin.c remmina/remmina-plugins/rdp/rdp_plugin.c +@@ -338,6 +338,7 @@ static BOOL remmina_rdp_post_connect(fre + instance-update-DesktopResize = rf_desktop_resize; + + freerdp_channels_post_connect(instance-context-channels, instance); ++ rfi-connected = True; + + remmina_plugin_service-protocol_plugin_emit_signal(gp, connect); + +@@ -664,7 +665,7 @@ static gboolean remmina_rdp_main(Remmina + dest_server = remmina_plugin_service-file_get_string(remminafile, server); + if ( dest_server ) { + remmina_plugin_service-get_server_port(dest_server, 0, dest_host, dest_port); +- rfi-settings-CertificateName = _strdup( dest_host ); ++ rfi-settings-CertificateName = strdup( dest_host ); + g_free(dest_host); + } + } +@@ -701,12 +702,17 @@ static gboolean remmina_rdp_main(Remmina + + if (remmina_plugin_service-file_get_string(remminafile, clientname)) + { +- strncpy(rfi-settings-ClientHostname, remmina_plugin_service-file_get_string(remminafile, clientname), +- sizeof(rfi-settings-ClientHostname) - 1); ++ s = remmina_plugin_service-file_get_string(remminafile, clientname); ++ if ( s ) { ++ free( rfi-settings-ClientHostname ); ++ rfi-settings-ClientHostname = strdup(s); ++ g_free(s); ++ } + } + else + { +- strncpy(rfi-settings-ClientHostname, g_get_host_name(), sizeof(rfi-settings-ClientHostname) - 1); ++ free( rfi-settings-ClientHostname ); ++ rfi-settings-ClientHostname = strdup( g_get_host_name() ); + } + + if (remmina_plugin_service-file_get_string(remminafile, exec)) +@@ -938,6 +944,7 @@ static void remmina_rdp_init(RemminaProt + rfi-instance = instance; + rfi-settings = instance-settings; + rfi-instance-context-channels = freerdp_channels_new(); ++ rfi-connected = False; + + pthread_mutex_init(rfi-mutex, NULL); + +@@ -995,13 +1002,12 @@ static gboolean remmina_rdp_close_connec + + if (instance) + { +- if (instance-context-channels) +- { +- //freerdp_channels_close(rfi-channels, instance); +- freerdp_channels_free
Bug#770381: unblock: remmina/1.1.1-2 (pre-approval)
2014-11-20 22:17 GMT+01:00 Jonathan Wiltshire j...@debian.org: Please go ahead. Thanks a lot for the quick reply! Package uploaded and built everywhere but sparc (but, oh well...) Awesome job, as always! Keep up with the good work! :-) Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/cadk7b0pzjqow13mulfgbnrq9vj4lcn3p5wecdnus7na0ql5...@mail.gmail.com
Bug#739415: transition: libraw
2014-02-26 11:58 GMT+01:00 Julien Cristau jcris...@debian.org: Looks like you took the spot. But the new version FTBFS all over the place. My fault, I erroneously set unstable as distribution target. By the way, I uploaded -2, which fixed the FTBFS. Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/CADk7b0MUMVW=c4arkvvefqughzkcxpfqhoy5_d3aqrrw0ak...@mail.gmail.com
Bug#739415: transition: libraw
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition I'd like to request a slot for taking care of the libraw transition. I rebuilt all the reverse dependencies, and they all built correctly. Reverse dependencies * entangle * evas-loaders * freeimage * luminance-hdr * shotwell Ben file: title = libraw; is_affected = .build-depends ~ /libraw-dev/; is_good = .depends ~ libraw10; is_bad = .depends ~ libraw9; Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0PkvGiHgOe=KmLiHqSfd3CW=qq43tgvujjqhr7aazf...@mail.gmail.com
Bug#734860: nmu: libvncserver0 - libvncclient0 split
Package: release.debian.org User: release.debian@packages.debian.org Usertags: binnmu Severity: normal Please schedule binNMUs for libvncserver reverse dependencies. libvncclient0 is now a separate binary package, no longer provided by libvncserver0. nmu aqemu_0.8.2-2 . amd64 armel armhf i386 ia64 mips mipsel powerpc sparc . -m Rebuild for libvncserver split nmu guacamole-server_0.8.3-1 . ALL . -m Rebuild for libvncserver split dw guacamole-server_0.8.3-1 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3) nmu kcemu_0.5.1+dfsg-6 . ALL . -m Rebuild for libvncserver split dw kcemu_0.5.1+dfsg-6 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3) nmu kdenetwork_4:4.10.5-3 . ALL -hurd-i386 . -m Rebuild for libvncserver split nmu krdc_4:4.11.3-1 . ALL -hurd-i386 . -m Rebuild for libvncserver split nmu lcd4linux_0.11.0~svn1200-1 . ALL . -m Rebuild for libvncserver split dw lcd4linux_0.11.0~svn1200-1 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3) nmu netsurf_2.9-2 . ALL -hurd-i386 . -m Rebuild for libvncserver split nmu remmina_1.0.0-6 . ALL . -m Rebuild for libvncserver split dw remmina_1.0.0-6 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3) nmu virtualbox_4.3.2-dfsg-1 . amd64 i386 . -m Rebuild for libvncserver split nmu x11vnc_0.9.13-1.1 . ALL . -m Rebuild for libvncserver split dw x11vnc_0.9.13-1.1 . hurd-i386 . -m libvncserver-dev (= 0.9.9+dfsg-3) Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20140110123943.GA1777@winterfell
Bug#725477: pu: shotwell/0.12.3-2+deb7u1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: pu I'd like to upload a fix for #722909, submitter confirmed the patch solves the issue, and is already part of 0.14, which is in Jessie already. Debdiff of the change is attached. Cheers, Luca 0.12.3-2+deb7u1.debdiff Description: Binary data
Bug#725477: pu: shotwell/0.12.3-2+deb7u1
2013/10/6 Adam D. Barratt a...@adam-barratt.org.uk: Please go ahead (bearing in mind that the window for 7.2 closes today); thanks. Uploaded, thanks (also thanks for the very fast reply for this late fix). Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0pa_6t0cpzk1+ja+ngzk+g7sngdx-qwdsmvc0y+2uq...@mail.gmail.com
Bug#718782: RM: llvm-toolchain-snapshot/3.4~svn183914-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm Please remove llvm-toolchain-snapshot from Jessie, it is not meant to be part of a stable release, as described in #714686. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0OYVR81GqeYDt5_wQSvo=xCqEsSW5Y3km=arkfmeqa...@mail.gmail.com
Bug#718663: RM: subunit/0.0.8+bzr176-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm Please consider removing subunit in Jessie. It has unresolved RC bugs (#708077 and #712203), and is the last blocker for python2.6 removal. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20130803223116.3643.54453.reportbug@utumno
Bug#710143: transition: libraw
2013/7/10 Julien Cristau jcris...@debian.org: Assuming you're prepared to nmu the rdeps feel free to move this to sid. Thanks! libraw 0.15.3-1 built everywhere, and I just uploaded fixed packages for shotwell and freeimage. Could you please schedule binNMUs for the other two packages? nmu entangle_0.5.1-1 . ALL . -m 'Rebuild against libraw9' nmu luminance-hdr_2.3.0-3 . ALL . -m 'Rebuild against libraw9' Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0pwkwtmuklke737fofgkn7mbrxyxryaagxopufdvse...@mail.gmail.com
Bug#714266: RM: zope-maildrophost_2.3-1, zope-mysqlda_3.1.1-1, zope-quotafolder_1:0.1.1-1, zope-replacesupport_1.0.3-6
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm Please remove these packages from Jessie: * zope-maildrophost 2.3-1 * zope-mysqlda 3.1.1-1 * zope-quotafolder 1:0.1.1-1 * zope-replacesupport 1.0.3-6 They depend on zope2.12, which has been removed from unstable, and will block python2.6 removal from testing when it will be removed from unstable (#714116). They will be probably become installable in unstable again when zope2.13 will enter unstable; if that will not happen, packages will be removed from unstable as well. Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0M=oraav65ocggtwqtgdya8tftvx4j+2wtu84e5p38...@mail.gmail.com
Bug#710143: transition: libraw
2013/5/28 Luca Falavigna dktrkr...@debian.org: freeimage FTBFS (#710133), but upstream already has a patch to fix it. Also shotwell FTBFS (#710141), issue has been forwarded upstream. Blockers have patches to allow build against newer libraw, so this transition should proceed smoothly. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0oeafwvh2oahufz851r+wz1tpnoggwk9b0jdr_kjdx...@mail.gmail.com
Bug#710143: transition: libraw
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Control: block -1 by 710133 710141 I'd like to request a slot for taking care of the libraw transition. The new upstream release (in experimental) has bumped soname. Reverse dependencies * entangle * freeimage * luminance-hdr * shotwell freeimage FTBFS (#710133), but upstream already has a patch to fix it. Also shotwell FTBFS (#710141), issue has been forwarded upstream. Ben file: title = libraw; is_affected = .build-depends ~ /libraw-dev/; is_good = .depends ~ libraw9; is_bad = .depends ~ libraw5; Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0nbfq-x35-hj3hgts62emvybglkdksjaqoeqbzq7pc...@mail.gmail.com
Bug#709629: nmu: libavg/1.7.1-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Please schedule binNMUs for libavg to drop python2.6 dependencies. #701304 shouldn't be a problem anymore, I was able to reproduce the build failure some days ago, but it seems the cause of the problem has been somehow fixed (it was related to boost1.53, IIRC), as I'm currently able to rebuild libavg now. nmu libavg_1.7.1-3 . ALL . -m 'Drop python2.6' -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0N+J=jBfkqNKjvMnx4ZYUqi7Hw4B5wf24YYNvrodY5B=g...@mail.gmail.com
Bug#707954: A binNMU should be enough
retitle 707954 nmu: more python2.6 removal binNMUs thanks pykcs11 needs a binNMU too, here's the updated list: nmu pykcs11_1.2.4-1 . ALL . -m 'Drop python2.6' nmu shogun_1.1.0-6 . ALL . -m 'Drop python2.6' -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0MqfQ6fTb1LEg2C1rqG7xR=wozdrj7knybdr-omz9q...@mail.gmail.com
Bug#707677: nmu: python2.6 removal
Right! I've rebuilt every package listed, here's the list of the verified ones. nmu aster_11.3.0-2-2 . amd64 kfreebsd-i386 . -m 'Drop python2.6' nmu cheetah_2.4.4-3 . armel armhf hurd-i386 i386 ia64 kfreebsd-amd64 kfreebsd-i386 mips mipsel powerpc sparc . -m 'Drop python2.6' nmu dff_1.2.0+dfsg.1-1 . ALL . -m 'Drop python2.6' nmu dolfin_1.0.0-7 . ALL . -m 'Drop python2.6' nmu fife_0.3.3+r3-3 . ALL . -m 'Drop python2.6' nmu ldns_1.6.13-4 . ALL . -m 'Drop python2.6' nmu libcap-ng_0.7.3-1 . amd64 . -m 'Drop python2.6' nmu libgetdata_0.7.3-6 . ALL . -m 'Drop python2.6' nmu libmimic_1.0.4-2.1 . ALL . -m 'Drop python2.6' nmu libvigraimpex_1.7.1+dfsg1-3 . hurd-i386 . -m 'Drop python2.6' nmu mitmproxy_0.8-2 . amd64 armel armhf i386 kfreebsd-i386 powerpc s390 s390x sparc . -m 'Drop python2.6' nmu mlpy_2.2.0~dfsg1-2 . ALL . -m 'Drop python2.6' nmu nflog-bindings_0.2-3 . ALL . -m 'Drop python2.6' nmu nfqueue-bindings_0.4-3 . ALL . -m 'Drop python2.6' nmu plplot_5.9.9-5 . ALL . -m 'Drop python2.6' nmu snimpy_0.6.3-1 . amd64 . -m 'Drop python2.6' nmu syfi_1.0.0.dfsg-1 . ALL . -m 'Drop python2.6' nmu ufc_2.0.5-3 . ALL . -m 'Drop python2.6' nmu uwsgi_1.2.3+dfsg-5 . ALL . -m 'Drop python2.6' nmu xdelta3_3.0.0.dfsg-1 . ALL . -m 'Drop python2.6' 2013/5/10 Adam D. Barratt a...@adam-barratt.org.uk: Control: tags -1 + moreinfo On Fri, 2013-05-10 at 08:53 +, Luca Falavigna wrote: python2.6 has been removed from the list of supported versions, these packages need to be binNMUed to get rid of python2.6 dependencies: At least some of them have FTBFS bugs filed against them for exactly that reason - e.g. #707711 against python-initgroups. :-( At the very least, the list needs cross-referencing against the list of bugs before we look at binNMUs. Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0M9xx=a0jji30hb-we3ci_x9w3mmn98zjwgrdmbfir...@mail.gmail.com
Bug#707677: nmu: python2.6 removal
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu python2.6 has been removed from the list of supported versions, these packages need to be binNMUed to get rid of python2.6 dependencies: nmu aster_11.3.0-2-2 . amd64 kfreebsd-i386 . -m 'Drop python2.6' nmu cheetah_2.4.4-3 . armel armhf hurd-i386 i386 ia64 kfreebsd-amd64 kfreebsd-i386 mips mipsel powerpc sparc . -m 'Drop python2.6' nmu crystalspace_1.4.0+dfsg-4 . ALL . -m 'Drop python2.6' nmu dff_1.2.0+dfsg.1-1 . ALL . -m 'Drop python2.6' nmu dolfin_1.0.0-7 . ALL . -m 'Drop python2.6' nmu fife_0.3.3+r3-3 . ALL . -m 'Drop python2.6' nmu ldns_1.6.13-4 . ALL . -m 'Drop python2.6' nmu libavg_1.7.1-3 . ALL . -m 'Drop python2.6' nmu libcap-ng_0.7.3-1 . amd64 . -m 'Drop python2.6' nmu libgetdata_0.7.3-6 . ALL . -m 'Drop python2.6' nmu libmimic_1.0.4-2.1 . ALL . -m 'Drop python2.6' nmu libvigraimpex_1.7.1+dfsg1-3 . hurd-i386 . -m 'Drop python2.6' nmu mitmproxy_0.8-2 . amd64 armel armhf i386 kfreebsd-i386 powerpc s390 s390x sparc . -m 'Drop python2.6' nmu mlpy_2.2.0~dfsg1-2 . ALL . -m 'Drop python2.6' nmu mod-wsgi_3.3-4 . ALL . -m 'Drop python2.6' nmu nflog-bindings_0.2-3 . ALL . -m 'Drop python2.6' nmu nfqueue-bindings_0.4-3 . ALL . -m 'Drop python2.6' nmu plplot_5.9.9-5 . ALL . -m 'Drop python2.6' nmu pyside_1.1.1-3 . ALL . -m 'Drop python2.6' nmu python-initgroups_2.13.0-1 . ALL . -m 'Drop python2.6' nmu shiboken_1.1.1-1 . ALL . -m 'Drop python2.6' nmu snimpy_0.6.3-1 . amd64 . -m 'Drop python2.6' nmu syfi_1.0.0.dfsg-1 . ALL . -m 'Drop python2.6' nmu ufc_2.0.5-3 . ALL . -m 'Drop python2.6' nmu uwsgi_1.2.3+dfsg-5 . ALL . -m 'Drop python2.6' nmu xdelta3_3.0.0.dfsg-1 . ALL . -m 'Drop python2.6' Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20130510085311.ga2...@franck.debian.org
Bug#703238: unblock: remmina/1.0.0-4+deb7u1 (pre-approval)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock I'd like to receive a pre-approval to upload into unstable a fix for bug #668020 (and its merged ones), which could result very annoying. One of the submitters confirmed the proposed patch fixes the bug for him (thanks to Bernhard Schmidt for his efforts!), so it received a first testing in advance. I chose 1.0.0-4+deb7u1 as version because I already uploaded 1.0.0-5 to experimental. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru remmina-1.0.0/debian/changelog remmina-1.0.0/debian/changelog --- remmina-1.0.0/debian/changelog 2012-05-24 22:37:17.0 +0200 +++ remmina-1.0.0/debian/changelog 2013-03-17 14:39:39.0 +0100 @@ -1,3 +1,11 @@ +remmina (1.0.0-4+deb7u1) unstable; urgency=low + + [ Bernhard Schmidt ] + * Cherry-pick commit 9243d35 from upstream Git repository to fix a +crash when resizing window to fit remote resolution (Closes: #668020). + + -- Luca Falavigna dktrkr...@debian.org Sun, 17 Mar 2013 14:37:39 +0100 + remmina (1.0.0-4) unstable; urgency=low [ Martijn van Brummelen ] diff -Nru remmina-1.0.0/debian/patches/fix-crash-on-resize.patch remmina-1.0.0/debian/patches/fix-crash-on-resize.patch --- remmina-1.0.0/debian/patches/fix-crash-on-resize.patch 1970-01-01 01:00:00.0 +0100 +++ remmina-1.0.0/debian/patches/fix-crash-on-resize.patch 2013-03-07 15:13:50.0 +0100 @@ -0,0 +1,25 @@ +From 1901a1e9e5282c1deca2f5f98476e2c7e9243d35 Mon Sep 17 00:00:00 2001 +From: Jean-Louis Dupond jean-lo...@dupond.be +Date: Mon, 10 Sep 2012 14:12:11 +0200 +Subject: [PATCH] Closes #63: fix typo when fitting window + +--- + remmina/src/remmina_connection_window.c |2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/remmina/src/remmina_connection_window.c b/remmina/src/remmina_connection_window.c +index 7ff1246..2ba8193 100644 +--- a/remmina/src/remmina_connection_window.c b/remmina/src/remmina_connection_window.c +@@ -436,7 +436,7 @@ static gboolean remmina_connection_holder_toolbar_autofit_restore(RemminaConnect + remmina_connection_holder_get_desktop_size(cnnhld, width, height, TRUE); + gtk_widget_get_allocation(priv-notebook, na); + gtk_widget_get_allocation(cnnobj-scrolled_container, ca); +- gtk_widget_get_allocation(priv-toolbar, ca); ++ gtk_widget_get_allocation(priv-toolbar, ta); + gtk_window_resize(GTK_WINDOW(cnnhld-cnnwin), MAX(1, width + na.width - ca.width), + MAX(1, height + ta.height + na.height - ca.height)); + gtk_container_check_resize(GTK_CONTAINER(cnnhld-cnnwin)); +-- +1.7.10 + diff -Nru remmina-1.0.0/debian/patches/series remmina-1.0.0/debian/patches/series --- remmina-1.0.0/debian/patches/series 2012-05-24 22:37:17.0 +0200 +++ remmina-1.0.0/debian/patches/series 2013-03-07 15:13:50.0 +0100 @@ -7,3 +7,4 @@ fullname.patch systray.patch scroll.patch +fix-crash-on-resize.patch
Bug#703238: unblock: remmina/1.0.0-4+deb7u1 (pre-approval)
Uploaded, thanks! -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0NbTiCb9ow5R5Xy4acSryEKRBx+2AFOBj-JJk5J0i=e...@mail.gmail.com
Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)
Oops, I somehow missed the previous mail. I just uploaded a fixed revision to t-p-u with wrapper functions marked as static and symbols file change reverted. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0ojltque81uttbjkoe0z5qn6pysvl8uf2qzkhheqls...@mail.gmail.com
Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)
2013/1/7 Julien Cristau jcris...@debian.org: So yes I think I'd prefer an upload reverting the .symbols change. Unfortunately, simply reverting the .symbols change is not enough, as dpkg-gensymbols is passed -c4 option which makes freerdp FTBFS due to newly added symbols. What do you suggest? Lowering -c4 to -c3 to ignore the symbols change? Adjusting the patch to flag the recently added functions as static? -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0Mco-KqBdGS=i6urtp8yftprth4-7qrr9anevjorjp...@mail.gmail.com
Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)
2013/1/6 Julien Cristau jcris...@debian.org: If the symbols are added in this 1.0.1-1.1+deb7u1 version, why did you make the symbols file claim they're in 1.0.1? I blindly picked those suggested by dh_makeshlibs. Should I prepare a new upload fixing this? -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0nloiau15lcqvh9tvevjeffn0aymxnxltgvgdtx60k...@mail.gmail.com
Bug#697411: unblock: zendframework/1.11.13-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package zendframework It contains a fix for CVE-2012-5657 (as seen in bug #696483), taken from upstream SVN repository. unblock zendframework/1.11.13-1.1 -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -u zendframework-1.11.13/debian/changelog zendframework-1.11.13/debian/changelog --- zendframework-1.11.13/debian/changelog +++ zendframework-1.11.13/debian/changelog @@ -1,3 +1,14 @@ +zendframework (1.11.13-1.1) unstable; urgency=high + + * Non-maintainer upload. + * debian/patches/02-ZF2012-05: +- Fix for CVE-2012-5657: remove the XXE vector by calling + libxml_disable_entity_loader() before attempting to parse the + feed via DOMDocument::loadXML(). Patch taken from upstream SVN + repository, revision 25159 (Closes: #696483). + + -- Luca Falavigna dktrkr...@debian.org Tue, 25 Dec 2012 17:32:10 +0100 + zendframework (1.11.13-1) unstable; urgency=high * new upstream release diff -u zendframework-1.11.13/debian/patches/series zendframework-1.11.13/debian/patches/series --- zendframework-1.11.13/debian/patches/series +++ zendframework-1.11.13/debian/patches/series @@ -1,0 +2 @@ +02-ZF2012-05 only in patch2: unchanged: --- zendframework-1.11.13.orig/debian/patches/02-ZF2012-05 +++ zendframework-1.11.13/debian/patches/02-ZF2012-05 @@ -0,0 +1,446 @@ +Index: zendframework-1.11.13/library/Zend/Feed.php +=== +--- zendframework-1.11.13.orig/library/Zend/Feed.php 2012-01-05 22:27:01.0 +0100 zendframework-1.11.13/library/Zend/Feed.php 2012-12-25 17:31:38.238088865 +0100 +@@ -191,7 +191,8 @@ + public static function importString($string) + { + // Load the feed as an XML DOMDocument object +-$libxml_errflag = libxml_use_internal_errors(true); ++$libxml_errflag = libxml_use_internal_errors(true); ++$libxml_entity_loader = libxml_disable_entity_loader(true); + $doc = new DOMDocument; + if (trim($string) == '') { + require_once 'Zend/Feed/Exception.php'; +@@ -199,9 +200,9 @@ + . ' is an Empty string or comes from an empty HTTP response'); + } + $status = $doc-loadXML($string); ++libxml_disable_entity_loader($libxml_entity_loader); + libxml_use_internal_errors($libxml_errflag); + +- + if (!$status) { + // prevent the class to generate an undefined variable notice (ZF-2590) + // Build error message +Index: zendframework-1.11.13/library/Zend/Feed/Abstract.php +=== +--- zendframework-1.11.13.orig/library/Zend/Feed/Abstract.php 2012-01-05 22:27:01.0 +0100 zendframework-1.11.13/library/Zend/Feed/Abstract.php 2012-12-25 17:31:38.234088865 +0100 +@@ -81,9 +81,9 @@ + * @see Zend_Feed_Exception + */ + require_once 'Zend/Feed/Exception.php'; +-throw new Zend_Feed_Exception('Feed failed to load, got response code ' . $response-getStatus()); ++throw new Zend_Feed_Exception('Feed failed to load, got response code ' . $response-getStatus() . '; request: ' . $client-getLastRequest() . \nresponse: . $response-asString()); + } +-$this-_element = $response-getBody(); ++$this-_element = $this-_importFeedFromString($response-getBody()); + $this-__wakeup(); + } elseif ($string !== null) { + // Retrieve the feed from $string +@@ -256,4 +256,49 @@ + * @return void + */ + abstract public function send(); ++ ++/** ++ * Import a feed from a string ++ * ++ * Protects against XXE attack vectors. ++ * ++ * @param string $feed ++ * @return string ++ * @throws Zend_Feed_Exception on detection of an XXE vector ++ */ ++protected function _importFeedFromString($feed) ++{ ++// Load the feed as an XML DOMDocument object ++$libxml_errflag = libxml_use_internal_errors(true); ++$libxml_entity_loader = libxml_disable_entity_loader(true); ++$doc = new DOMDocument; ++if (trim($feed) == '') { ++require_once 'Zend/Feed/Exception.php'; ++throw new Zend_Feed_Exception('Remote feed being imported' ++. ' is an Empty string or comes from an empty HTTP response'); ++} ++$status = $doc-loadXML($feed); ++libxml_disable_entity_loader($libxml_entity_loader); ++libxml_use_internal_errors($libxml_errflag); ++ ++if (!$status) { ++// prevent the class to generate an undefined variable notice (ZF-2590) ++// Build error message
Bug#697414: tpu: owncloud/4.0.4debian2-3.2 (pre-approval)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock I'd like to see if it's feasible to upload a targeted fix to testing-proposed- updates to address #696574. This bug has been fixed in unstable already, but given it has a newer upstream version, it's unlikely it will migrate, hence this request. -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru owncloud-4.0.4debian2/debian/changelog owncloud-4.0.4debian2/debian/changelog --- owncloud-4.0.4debian2/debian/changelog 2012-12-05 22:12:11.0 +0100 +++ owncloud-4.0.4debian2/debian/changelog 2013-01-04 23:31:11.0 +0100 @@ -1,3 +1,14 @@ +owncloud (4.0.4debian2-3.2) testing-proposed-updates; urgency=high + + * Non-maintainer upload. + * Multiple security fixes (Closes: #696574): ++ debian/patches/10_oc-sa-2012-006.patch: + - CVE-2012-5665: Auth bypass in user_webdavauth and user_ldap ++ debian/patches/11_oc-sa-2012-007.patch: + - CVE-2012-5666: XSS vulnerability in bookmarks + + -- Luca Falavigna dktrkr...@debian.org Fri, 04 Jan 2013 23:30:46 +0100 + owncloud (4.0.4debian2-3.1) testing-proposed-updates; urgency=high * Non-maintainer upload, fixes several security issues (Closes: #693990). diff -Nru owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch --- owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch 1970-01-01 01:00:00.0 +0100 +++ owncloud-4.0.4debian2/debian/patches/10_oc-sa-2012-006.patch 2013-01-04 23:28:29.0 +0100 @@ -0,0 +1,48 @@ +Index: owncloud-4.0.8debian/apps/files_encryption/settings.php +=== +--- owncloud-4.0.8debian.orig/apps/files_encryption/settings.php 2012-10-09 17:09:46.0 +0200 owncloud-4.0.8debian/apps/files_encryption/settings.php 2012-12-25 16:29:57.110214044 +0100 +@@ -6,6 +6,8 @@ + * See the COPYING-README file. + */ + ++OC_Util::checkAdminUser(); ++ + $tmpl = new OCP\Template( 'files_encryption', 'settings'); + $blackList=explode(',',OCP\Config::getAppValue('files_encryption','type_blacklist','jpg,png,jpeg,avi,mpg,mpeg,mkv,mp3,oga,ogv,ogg')); + $enabled=(OCP\Config::getAppValue('files_encryption','enable_encryption','true')=='true'); +Index: owncloud-4.0.8debian/apps/user_ldap/settings.php +=== +--- owncloud-4.0.8debian.orig/apps/user_ldap/settings.php 2012-10-09 17:10:37.0 +0200 owncloud-4.0.8debian/apps/user_ldap/settings.php 2012-12-25 16:29:57.114214045 +0100 +@@ -20,6 +20,9 @@ + * License along with this library. If not, see http://www.gnu.org/licenses/. + * + */ ++ ++OC_Util::checkAdminUser(); ++ + $params = array('ldap_host', 'ldap_port', 'ldap_dn', 'ldap_agent_password', 'ldap_base', 'ldap_base_users', 'ldap_base_groups', 'ldap_userlist_filter', 'ldap_login_filter', 'ldap_group_filter', 'ldap_display_name', 'ldap_group_display_name', 'ldap_tls', 'ldap_nocase', 'ldap_quota_def', 'ldap_quota_attr', 'ldap_email_attr', 'ldap_group_member_assoc_attribute'); + + OCP\Util::addscript('user_ldap', 'settings'); +Index: owncloud-4.0.8debian/apps/user_migrate/settings.php +=== +--- owncloud-4.0.8debian.orig/apps/user_migrate/settings.php 2012-10-09 17:10:37.0 +0200 owncloud-4.0.8debian/apps/user_migrate/settings.php 2012-12-25 16:29:57.114214045 +0100 +@@ -22,6 +22,9 @@ + * License along with this library. If not, see http://www.gnu.org/licenses/. + * + */ ++ ++OC_Util::checkLoggedIn(); ++ + OCP\App::checkAppEnabled('user_migrate'); + if (isset($_POST['user_import'])) { + $root = OC::$SERVERROOT . /; +@@ -86,4 +89,4 @@ + // fill template + $tmpl = new OCP\Template('user_migrate', 'settings'); + return $tmpl-fetchPage(); +-} +\ No newline at end of file ++} diff -Nru owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch --- owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch 1970-01-01 01:00:00.0 +0100 +++ owncloud-4.0.4debian2/debian/patches/11_oc-sa-2012-007.patch 2013-01-04 23:28:29.0 +0100 @@ -0,0 +1,13 @@ +Index: owncloud-4.0.8debian/apps/bookmarks/js/bookmarks.js +=== +--- owncloud-4.0.8debian.orig/apps/bookmarks/js/bookmarks.js 2012-10-09 17:10:37.0 +0200 owncloud-4.0.8debian/apps/bookmarks/js/bookmarks.js 2012-12-25 16:25:21.050223382 +0100 +@@ -141,7 +141,7 @@ + var taglist = ''; + for ( var i=0, len=tags.length; ilen; ++i ){ + if(tags[i] != '') +- taglist = taglist + 'a class=bookmark_tag href='+replaceQueryString( String(window.location), 'tag', encodeURIComponent(tags
Remove packages in t-p-u which migrated already?
Hi, I ran a patched version of dak cruft-report [0] to consider as cruft packages with an higher or equal version of those available in an enhanced suite (unstable vs. experimental and testing vs. testing-proposed-updates). Currently, cruft-reports checks for higher versions only. As of today, cruft-report marked bind9 as the only candidate for removal (1:9.8.4.dfsg.P1-1 1:9.8.1.dfsg.P1-4.4), while my patched version revealed a much longer list [1]. I wonder whether it could be possible to safely decruft those packages (by eventually deploying my patch in dak), or whether it is better to leave them in place. [0] http://ftp-master.debian.org/users/dktrkranz/cruft-report.patch [1] http://ftp-master.debian.org/users/dktrkranz/t-p-u.cruft Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0PCh2vkZUsh_rj3Qj5y7E5XJF6hRf+uSn71R8SgUA=9...@mail.gmail.com
Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock I'd like to see if it's feasible to upload a targeted fix to testing-proposed- updates to address #662854. This bug has been fixed in unstable already, also introducing changes [0] which should not fit release policy anymore, so I'd like to prepare an upload which provided the upstream fix only [1], plus a proper changelog entry. If that's OK for you, I'll coordinate with Otavio to have this bug finally solved in Wheezy. Thanks. [0] http://anonscm.debian.org/gitweb/?p=collab- maint/freerdp.git;a=commitdiff;h=debian/1.0.1-2;hp=debian/1.0.1-1 [1] https://github.com/FreeRDP/FreeRDP/commit/5617af901a4269d7fe9688793135b79ed43aecd4 -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20130101135432.7238.26081.reportbug@utumno
Bug#697101: tpu: freerdp/1.0.1-1.1+deb7u1 (pre-approval)
I hadn't realized the patch added new symbols (altough they're quite harmless), and I had to refresh debian/libfreerdp1.symbols accordingly. Full debdiff of the changes is attached. Otavio, as freerdp is listed as LowNMU, I uploaded it to DELAYED/5. 1.0.1-1.1+deb7u1.debdiff Description: Binary data
Bug#696670: unblock: mahara/1.5.1-3.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package mahara It provides a fix, cherry-picked from upstream repository, for a XSS vulnerability as described in bug #695789 unblock mahara/1.5.1-3.1 -- System Information: Debian Release: 7.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru mahara-1.5.1/debian/changelog mahara-1.5.1/debian/changelog --- mahara-1.5.1/debian/changelog 2012-11-16 09:33:12.0 +0100 +++ mahara-1.5.1/debian/changelog 2012-12-23 15:02:25.0 +0100 @@ -1,3 +1,14 @@ +mahara (1.5.1-3.1) unstable; urgency=high + + * Non-maintainer upload. + * SECURITY UPDATE: Fix a cross-site scripting (XSS) vulnerability +which allowed remote attackers to inject arbitrary web script or +HTML via the query parameter. +- debian/patches/CVE-2012-2253.patch +- Closes: #695789 + + -- Luca Falavigna dktrkr...@debian.org Sun, 23 Dec 2012 14:53:41 +0100 + mahara (1.5.1-3) unstable; urgency=high * SECURITY UPDATE: Disable XML entity parsing to prevent XEE diff -Nru mahara-1.5.1/debian/patches/CVE-2012-2253.patch mahara-1.5.1/debian/patches/CVE-2012-2253.patch --- mahara-1.5.1/debian/patches/CVE-2012-2253.patch 1970-01-01 01:00:00.0 +0100 +++ mahara-1.5.1/debian/patches/CVE-2012-2253.patch 2012-12-23 15:02:25.0 +0100 @@ -0,0 +1,24 @@ +Author: Hugh Davenport h...@catalyst.net.nz +Subject: Cross-site scripting (XSS) vulnerability +Origin: upstream +Bug: https://bugs.launchpad.net/mahara/+bug/1079498 + +CVE-2012-2253 + +Cross-site scripting (XSS) vulnerability which allowed remote +attackers to inject arbitrary web script or HTML via the query +parameter. + +Index: mahara/htdocs/lib/web.php +=== +--- mahara.orig/htdocs/lib/web.php 2012-12-23 14:44:57.009756577 +0100 mahara/htdocs/lib/web.php 2012-12-23 14:47:02.405760418 +0100 +@@ -3273,7 +3273,7 @@ + } + else { + $return .= '' +-. 'a href=' . $url . ' title=' . $title ++. 'a href=' . hsc($url) . ' title=' . $title + . '' . $text . '/a/span'; + } + diff -Nru mahara-1.5.1/debian/patches/series mahara-1.5.1/debian/patches/series --- mahara-1.5.1/debian/patches/series 2012-11-16 09:32:59.0 +0100 +++ mahara-1.5.1/debian/patches/series 2012-12-23 15:02:25.0 +0100 @@ -10,3 +10,4 @@ CVE-2012-2244-0003.patch CVE-2012-2246.patch CVE-2012-2247.patch +CVE-2012-2253.patch
Bug#694305: unblock: canna/3.7p3-11
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package canna This upload fixes RC bug #694266 (file conflict between two packages). unblock canna/3.7p3-11 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru canna-3.7p3/debian/changelog canna-3.7p3/debian/changelog --- canna-3.7p3/debian/changelog 2012-07-28 06:44:49.0 +0200 +++ canna-3.7p3/debian/changelog 2012-11-25 10:14:36.0 +0100 @@ -1,3 +1,12 @@ +canna (3.7p3-11) unstable; urgency=medium + + * QA upload. + * debian/control: +- Add Breaks/Replaces ( 3.7p3-10) to canna-utils, which now owns + /usr/bin/chmoddic (Closes: #694266). + + -- Luca Falavigna dktrkr...@debian.org Sun, 25 Nov 2012 10:13:32 +0100 + canna (3.7p3-10) unstable; urgency=low * QA upload. diff -Nru canna-3.7p3/debian/control canna-3.7p3/debian/control --- canna-3.7p3/debian/control 2012-03-30 16:49:13.0 +0200 +++ canna-3.7p3/debian/control 2012-11-25 10:13:28.0 +0100 @@ -26,6 +26,8 @@ Package: canna-utils Architecture: any Depends: ${misc:Depends}, ${shlibs:Depends} +Breaks: canna ( 3.7p3-10) +Replaces: canna ( 3.7p3-10) Description: input system for Japanese - utilities Canna provides a unified user interface for Japanese input. It is based on a client-server model and supports automatic kana-to-kanji conversion.
Bug#692183: unblock: gdebi/0.8.7
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gdebi This upload fixes RC bug #691998, plus some crashes bugs reported in Launchpad: * Do not set a busy cursor if there is no X11 window https://launchpad.net/bugs/1055181 * Define apt.Cache in class initialization https://launchpad.net/bugs/1072799 * Add file to gdebi-core dependencies https://launchpad.net/bugs/1067306 I'm attaching a debdiff of the changes introduced. unblock gdebi/0.8.7 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) === modified file 'GDebi/GDebi.py' --- GDebi/GDebi.py 2012-10-11 19:21:07 + +++ GDebi/GDebi.py 2012-10-11 20:09:07 + @@ -145,13 +145,19 @@ self.synaptic_config = apt_pkg.Configuration() if file != and os.path.exists(file): -self.window_main.get_window().set_cursor(Gdk.Cursor.new(Gdk.CursorType.WATCH)) +self.open(file) +self.window_main.set_sensitive(True) + +def _show_busy_cursor(self, show_busy_cursor): +win = self.window_main.get_window() +if not win: +return +if show_busy_cursor: +win.set_cursor(Gdk.Cursor.new(Gdk.CursorType.WATCH)) while Gtk.events_pending(): Gtk.main_iteration() -self.open(file) -self.window_main.get_window().set_cursor(None) - -self.window_main.set_sensitive(True) +else: +win.set_cursor(None) def gio_progress_callback(self, bytes_read, bytes_total, data): self.progressbar_download.set_fraction(bytes_read/float(bytes_total)) @@ -224,14 +230,12 @@ path = self._get_file_path_from_dnd_dropped_uri(uri) #print 'path to open', path if path.endswith(.deb): -self.window_main.get_window().set_cursor(Gdk.Cursor.new(Gdk.CursorType.WATCH)) -while Gtk.events_pending(): -Gtk.main_iteration() self.open(path) -self.window_main.get_window().set_cursor(None) def open(self, file, downloaded=False): +self._show_busy_cursor(True) res = GDebiCommon.open(self, file, downloaded) +self._show_busy_cursor(False) if res == False: self.show_alert(Gtk.MessageType.ERROR, self.error_header, self.error_body) return False === modified file 'GDebi/GDebiCli.py' --- GDebi/GDebiCli.py 2012-10-11 19:23:54 + +++ GDebi/GDebiCli.py 2012-11-02 13:29:24 + @@ -122,10 +122,7 @@ iprogress = apt.progress.base.InstallProgress() try: res = self._cache.commit(fprogress,iprogress) -except apt.cache.FetchFailedException, e: -sys.stderr.write(_(Error during install: '%s') % e) -return 1 -except SystemError, e: +except (apt.cache.FetchFailedException, SystemError), e: sys.stderr.write(_(Error during install: '%s') % e) return 1 === modified file 'GDebi/GDebiCommon.py' --- GDebi/GDebiCommon.py 2012-09-12 21:28:17 + +++ GDebi/GDebiCommon.py 2012-11-02 13:29:24 + @@ -52,6 +52,7 @@ # cprogress may be different in child classes def __init__(self, datadir, options, file=): self.cprogress = None +self._cache = None self.deps = self.version_info_title = self.version_info_msg = === modified file 'debian/changelog' --- debian/changelog 2012-10-11 20:07:12 + +++ debian/changelog 2012-11-02 16:36:21 + @@ -1,3 +1,23 @@ +gdebi (0.8.7) unstable; urgency=low + + [ Michael Vogt ] + * GDebi/GDebi.py: +- do not set a busy cursor if there is no X11 window (LP: #1055181). + + [ Jason Conti ] + * GDebi/GDebiCommon.py: +- Define apt.Cache in class initialization (LP: #1072799). + + [ Luca Falavigna ] + * gdebi-kde: +- Do not use unicode in help options (Closes: #691998, LP: #1063114). + * GDebi/GDebiCli.py: +- Improve exception handling. + * debian/control: +- Add file to gdebi-core dependencies (LP: #1067306). + + -- Luca Falavigna dktrkr...@debian.org Fri, 02 Nov 2012 17:36:06 +0100 + gdebi (0.8.6) unstable; urgency=low * gdebi, GDebi/GDebiCli.py: === modified file 'debian/control' --- debian/control 2012-09-12 21:17:04 + +++ debian/control 2012-11-02 12:30:07 + @@ -16,7 +16,8 @@ Depends: ${python:Depends}, ${misc:Depends}, python-apt (= 0.7.97), - python-debian (= 0.1.15) + python-debian (= 0.1.15), + file Suggests: xz-utils | xz-lzma Description: simple tool to install deb files gdebi lets you install local deb packages resolving and installing === modified file 'gdebi-kde' --- gdebi-kde 2012
Bug#691541: unblock: fife/0.3.3+r3-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package fife This upload fixes RC bug #690370 (copyright issue), plus a fix for embedded- library lintian autoreject, which prevents fife from being accepted. unblock fife/0.3.3+r3-1.1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores) diff -Nru fife-0.3.3+r3/debian/changelog fife-0.3.3+r3/debian/changelog --- fife-0.3.3+r3/debian/changelog 2012-04-22 19:52:01.0 +0200 +++ fife-0.3.3+r3/debian/changelog 2012-10-26 20:55:12.0 +0200 @@ -1,3 +1,12 @@ +fife (0.3.3+r3-1.1) unstable; urgency=low + + * Non-maintainer upload. + * Add engine/core/util/utf8/utf8* to copyright file (Closes: #690370) + * Use packaged version of Glee-library to fix lintian embedded-library +autoreject tag. + + -- Anton Gladky gladky.an...@gmail.com Wed, 24 Oct 2012 21:15:06 +0200 + fife (0.3.3+r3-1) unstable; urgency=low * New upstream release diff -Nru fife-0.3.3+r3/debian/control fife-0.3.3+r3/debian/control --- fife-0.3.3+r3/debian/control 2012-04-22 20:17:37.0 +0200 +++ fife-0.3.3+r3/debian/control 2012-10-26 20:49:50.0 +0200 @@ -24,7 +24,8 @@ libguichan-dev, libtinyxml-dev, libpng-dev, - libunittest++-dev + libunittest++-dev, + glee-dev X-Python-Version: = 2.6 Vcs-Git: git://git.debian.org/git/pkg-games/fife.git Vcs-Browser: http://git.debian.org/?p=pkg-games/fife.git diff -Nru fife-0.3.3+r3/debian/copyright fife-0.3.3+r3/debian/copyright --- fife-0.3.3+r3/debian/copyright 2012-03-27 19:27:15.0 +0200 +++ fife-0.3.3+r3/debian/copyright 2012-10-26 20:53:35.0 +0200 @@ -13,6 +13,10 @@ Copyright: 2009 Ben Woodhouse License: BSD-2-clause +Files: engine/core/util/utf8/utf8.h engine/core/util/utf8/* +Copyright: 2006 Nemanja Trifunovic +License: Boost-Software-License + Files: engine/core/ext/tinyxml Copyright: 2000-2006 Lee Thomason, Yves Berquin, @@ -110,3 +114,27 @@ 3. This notice may not be removed or altered from any source distribution. + +License: Boost-Software-License + Permission is hereby granted, free of charge, to any person or organization + obtaining a copy of the software and accompanying documentation covered by + this license (the Software) to use, reproduce, display, distribute, + execute, and transmit the Software, and to prepare derivative works of the + Software, and to permit third-parties to whom the Software is furnished to + do so, all subject to the following: + . + The copyright notices in the Software and this entire statement, including + the above license grant, this restriction and the following disclaimer, + must be included in all copies of the Software, in whole or in part, and + all derivative works of the Software, unless such copies or derivative + works are solely in the form of machine-executable object code generated by + a source language processor. + . + THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT + SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE + FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, + ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER + DEALINGS IN THE SOFTWARE. + diff -Nru fife-0.3.3+r3/debian/patches/remove_glee.patch fife-0.3.3+r3/debian/patches/remove_glee.patch --- fife-0.3.3+r3/debian/patches/remove_glee.patch 1970-01-01 01:00:00.0 +0100 +++ fife-0.3.3+r3/debian/patches/remove_glee.patch 2012-10-26 20:49:50.0 +0200 @@ -0,0 +1,64 @@ +Description: use packaged version of glee +Author: Anton Gladky gladky.an...@gmail.com +Last-Update: 2012-10-24 + +--- a/engine/core/video/opengl/fife_opengl.h b/engine/core/video/opengl/fife_opengl.h +@@ -25,7 +25,7 @@ + // Standard C++ library includes + + // 3rd party library includes +-#include ext/glee/GLee.h ++#include GLee.h + + // GLee.h includes windows.h when on a windows platform + // In winnt.h (which is included from windows.h) DELETE +--- a/doc/dependencies/filedeps.dot b/doc/dependencies/filedeps.dot +@@ -111,7 +111,6 @@ + engine/core/eventchannel/key/ec_keyevent.h - eventchannel/source/ec_ieventsource.h + engine/core/eventchannel/mouse/ec_mouseevent.h - eventchannel/base/ec_inputevent.h + engine/core/eventchannel/source/ec_ieventsource.h - ec_eventsourcetypes.h +-engine/core/ext/glee/GLee.cpp - GLee.h + engine/core/ext/tinyxml/fife_tinyxml.h - tinyxml.h + engine/core/ext/tinyxml/tinystr.cpp - tinystr.h + engine/core/ext/tinyxml/tinyxml.cpp - tinyxml.h +@@ -633,7 +632,6 @@ + engine/core/video/imagemanager.h -
Bug#691267: unblock: vfu/4.10-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Please unblock vfu/4.10-1.1. It contains a fix for #685662 (adding missing copyright information). Debdiff attached. vfu-4.10-1.1-nmu.diff Description: Binary data
Bug#691268: unblock: libvoikko/3.5-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Please unblock libvoikko/3.5-1.1. It contains a fix for # 690392 (adding missing copyright information). Debdiff attached. libvoikko-3.5-1.1-nmu.diff Description: Binary data
Bug#691269: unblock: megaglest/3.6.0.3-1.2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception Please unblock megaglest/3.6.0.3-1.2. It contains a fix for #690371 (adding missing copyright information). Debdiff attached. megaglest-3.6.0.3-1.2-nmu.diff Description: Binary data
Bug#687614: unblock: gdebi/0.8.6 (pre-approval)
gDebi has been uploaded some time ago, and nobody played Vodoo on me, so it seems it's behaving good ;) Please consider unblocking it. Other than the changes listed in the debdiff, I refreshed translations as anticipated in my first message. Thanks in advance! -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0osjg1spt8bhbdvss43jsy59a6fmey7rxbtkxnuhen...@mail.gmail.com
Bug#687614: unblock: gdebi/0.8.6 (pre-approval)
tags 687614 - moreinfo thanks 2012/10/6 Niels Thykier ni...@thykier.net: In the 0.8.5 code, there are a couple of places where GDebiCli.install returns False on error[1], which I believe python translates to 0 leading to exit 0 with errors (and I suspect that is not what you wanted). Good catch! I'm attaching a new debdiff implementing a fix for the return value. 0.8.6.debdiff Description: Binary data
Bug#687614: unblock: gdebi/0.8.6 (pre-approval)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Dear Release Team, I'd like to upload a new gdebi version in unstable fixing some bugs I recently triaged. They were reported on Launchpad, but most of them affect Debian too. Here's a description of the changes introduced since 0.8.5: * Add xz-utils to gdebi Suggests field (fixing #685193) http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/421 * Handle ValueError exception to fix a crash with malformed packages http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/422 * Convert help options with unicode, fix crash displaying help in some locales http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/423 * Return dpkg error code instead of always return 0 http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/424 * Fix translation string which caused a crash due to unmatched format string http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/425 * Port to new GIO API to fix a crash when accessing packages on GVFS mounts http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/426 * Fall-back on kdesu if kdesudo is not avaliable, this is a no-op for Debian, but makes gdebi-kde almost useless in Ubuntu, and I'd like to sync package there http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/427 * Mark menu and labels as sensitive at startup, this causes a visual glitch http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/428 Other than those, I plan to include new translations in the package, I'm currently waiting for Launchpad to finalize them. I'm attaching a full debdiff (not including translations, at the moment) of the changes I'd like to introduce. Cheers, Luca 0.8.6.debdiff Description: Binary data
Re: Comments regarding libcitadel_8.14-1_amd64.changes
2012/8/18 Adam D. Barratt a...@adam-barratt.org.uk: Given my RM hat, I realise that. ;p In any case, whatever the fate of the packages currently in unstable, the libcitadel in NEW is an improvement over what's currently in unstable so there's no objections to accepting it from NEW from the release team side. I've marked package for acceptance, it will enter unstable during next processing run. Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0mmho7w7un4ob78970qzmdlgy9stmkxplett-gxmjr...@mail.gmail.com
Bug#684557: unblock: conduit/0.3.17-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package conduit it FTBFS when network is not available in the buildds, as reported in #680814). I'm attaching a debdiff of the changes. unblock conduit/0.3.17-1.1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) diff -u conduit-0.3.17/debian/control conduit-0.3.17/debian/control --- conduit-0.3.17/debian/control +++ conduit-0.3.17/debian/control @@ -12,6 +12,7 @@ python-gtk2-dev, intltool, gnome-doc-utils, + docbook-xml, python-dbus (= 0.80.0), python-webkit-dev, python-dateutil diff -u conduit-0.3.17/debian/changelog conduit-0.3.17/debian/changelog --- conduit-0.3.17/debian/changelog +++ conduit-0.3.17/debian/changelog @@ -1,3 +1,12 @@ +conduit (0.3.17-1.1) unstable; urgency=medium + + * Non-maintainer upload. + * debian/control: +- Add docbook-xml to Build-Depends to allow document parsing on + systems with no or disabled network access (Closes: #680814). + + -- Luca Falavigna dktrkr...@debian.org Wed, 08 Aug 2012 21:07:13 +0200 + conduit (0.3.17-1) unstable; urgency=low * New upstream release.
Bug#684495: unblock: lustre/1.8.5+dfsg-3.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: freeze-exception lustre has been recently adjusted to build with more recent automake versions than automake1.7, scheduled for removal from the archive (#648591). The other remaining rdep was isdnutils (unblocked in #684320), automake1.7 can hopefully go away soon. I'm attaching a debdiff of the changes introduced. Thanks for considering a freeze exception for lustre. lustre.diff Description: Binary data
Getting rid of automake1.7 for Wheezy?
Hi, bug #648591 asks for removal of automake1,7, superseded by newer versions. It wasn't processed in time for the freeze because of two rdeps, isdnutils and lustre. Both packages have been recently adjusted to migrate to a newer automake (debdiffs attached), so I wonder whether you are inclined to grant a freeze exception for these packages to eventually let automake1.7 to be removed from Wheezy after its removal from unstable. If that's unsuitable for Wheezy, would you like FTP Team to wait to remove automake1.7 from unstable too? isdnutils.diff Description: Binary data lustre.diff Description: Binary data
Bug#684292: unblock pylucene/3.5.0-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package pylucene It contains a fix for FTBFS bug #684084, builds are fine now. Debdiff of changes attached. unblock pylucene/3.5.0-1.1 pylucene-3.5.0-1.1-debdiff Description: Binary data
Bug#684292: unblock pylucene/3.5.0-1.1
2012/8/8 Luca Falavigna dktrkr...@debian.org: It contains a fix for FTBFS bug #684084, builds are fine now. Err... correct bug is #679368. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0MtZOEEf4UaX6en1bH36NQUkh=axqxz+262zjlyj1j...@mail.gmail.com
Re: Fix for bug #680814
Thanks for the suggestions. I changed the patch following your advices and uploaded a NMU to DELAYED/2, patch attached. 680814.patch Description: Binary data
Bug#684221: unblock: hexer/0.1.7-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package hexer It contains a fix for bug #684084; debdiff is attached to that bug. unblock hexer/0.1.7-1.1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120807222932.3955.3292.reportbug@utumno
Re: Fix for bug #680814
2012/8/6 David Prévot taf...@debian.org: Ouch, wouldn't that break the validity of the XML files? Maybe using the --nonet option of xsltproc would be proper. I just tried using --nonet, using different positions, but I always get failed to load external entity http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd; -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0nx3dbd5e-doiduyc+uv2xalykaf9xretem23dmnu0...@mail.gmail.com
Bug#684084: unblock: xfonts-naga10/1.1-13.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package xfonts-naga10 It contains a fix for FTBFS as reported in #682058; debdiff is attached to that bug. unblock xfonts-naga10/1.1-13.1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120806195150.3927.72435.reportbug@utumno
Bug#683924: unblock: shotwell/0.12.3-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package shotwell It provides a fix for #665498, which has been tested and applied upstream. unblock shotwell/0.12.3-2 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) diff -Nru shotwell-0.12.3/debian/changelog shotwell-0.12.3/debian/changelog --- shotwell-0.12.3/debian/changelog 2012-06-03 15:18:23.0 +0200 +++ shotwell-0.12.3/debian/changelog 2012-08-05 14:54:36.0 +0200 @@ -1,3 +1,12 @@ +shotwell (0.12.3-2) unstable; urgency=low + + * Team upload. + * debian/patches/metadata.patch: +- Cherry-pick patches from upstream repository to fix crashes while + managing metadata (Closes: #665498). + + -- Luca Falavigna dktrkr...@debian.org Sun, 22 Jul 2012 11:56:51 +0200 + shotwell (0.12.3-1) unstable; urgency=low * Team upload. diff -Nru shotwell-0.12.3/debian/patches/metadata.patch shotwell-0.12.3/debian/patches/metadata.patch --- shotwell-0.12.3/debian/patches/metadata.patch 1970-01-01 01:00:00.0 +0100 +++ shotwell-0.12.3/debian/patches/metadata.patch 2012-07-22 11:56:42.0 +0200 @@ -0,0 +1,33 @@ +Description: Writing metadata ends up in a neverending cycle +Author: Clinton Rogers + +Index: shotwell-0.12.3/src/MetadataWriter.vala +=== +--- shotwell-0.12.3.orig/src/MetadataWriter.vala 2012-05-08 23:46:35.0 +0200 shotwell-0.12.3/src/MetadataWriter.vala 2012-07-22 11:55:09.212907651 +0200 +@@ -103,7 +103,24 @@ + } + + // tags (keywords) ... replace (or clear) entirely rather than union or intersection +-if (!equal_sets(current_keywords, metadata.get_keywords())) { ++ ++Gee.Setstring safe_keywords = new Gee.HashSetstring(); ++ ++// Since the tags are stored in an image file's `keywords' field in ++// non-hierarchical format, before checking whether the tags that ++// should be associated with this image have been written, we'll need ++// to produce non-hierarchical versions of the tags to be tested. ++// get_user_visible_name() does this by returning the most deeply-nested ++// portion of a given hierarchical tag; that is, for a tag /a/b/c, ++// it'll return c, which is exactly the form we want here. ++if (current_keywords != null) { ++foreach(string tmp in current_keywords) { ++Tag tag = Tag.for_path(tmp); ++safe_keywords.add(tag.get_user_visible_name()); ++} ++} ++ ++if (!equal_sets(safe_keywords, metadata.get_keywords())) { + metadata.set_keywords(current_keywords); + changed = true; + } diff -Nru shotwell-0.12.3/debian/patches/series shotwell-0.12.3/debian/patches/series --- shotwell-0.12.3/debian/patches/series 2012-06-03 12:23:14.0 +0200 +++ shotwell-0.12.3/debian/patches/series 2012-07-22 11:35:17.0 +0200 @@ -1,3 +1,4 @@ gettext.patch format_string.patch openmp.patch +metadata.patch
Fix for bug #680814
tags 680814 + patch thanks This bug is reproducible only on systems without networking access. I'm attaching a patch which fixes the issue. Hi Release Team, would you consider this patch acceptable for an unblock request? 680814.patch Description: Binary data
Bug#683977: unblock: gnome-games/3.4.2-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gnome-games It provides a fix for #675003, which has been prepared and applied upstream, and I confirm it works as expected. unblock gnome-games/3.4.2-3 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) diff -ruN gnome-games/debian/changelog gnome-games-3.4.2/debian/changelog --- gnome-games/debian/changelog 2012-08-05 23:35:37.890618139 +0200 +++ gnome-games-3.4.2/debian/changelog 2012-08-05 23:16:13.0 +0200 @@ -1,3 +1,12 @@ +gnome-games (1:3.4.2-3) unstable; urgency=medium + + * Team upload. + * debian/patches/91_glchess_engine.patch: +- Cherry-pick patch from upstream Git to kill gnuchess engine + processes on new game/exit (Closes: #675003). + + -- Luca Falavigna dktrkr...@debian.org Sun, 05 Aug 2012 23:14:54 +0200 + gnome-games (1:3.4.2-2) unstable; urgency=low * debian/patches/02_swell-foop-datadir.patch: Install data files into diff -ruN gnome-games/debian/control gnome-games-3.4.2/debian/control --- gnome-games/debian/control 2012-08-05 23:35:37.890618139 +0200 +++ gnome-games-3.4.2/debian/control 2012-08-05 23:20:22.0 +0200 @@ -7,7 +7,7 @@ Section: gnome Priority: optional Maintainer: Josselin Mouette j...@debian.org -Uploaders: Debian GNOME Maintainers pkg-gnome-maintain...@lists.alioth.debian.org, Emilio Pozuelo Monfort po...@debian.org, Jordi Mallach jo...@debian.org, Michael Biebl bi...@debian.org +Uploaders: Debian GNOME Maintainers pkg-gnome-maintain...@lists.alioth.debian.org, Jordi Mallach jo...@debian.org, Michael Biebl bi...@debian.org Build-Depends: cdbs (= 0.4.90~), debhelper (= 8), dh-autoreconf, diff -ruN gnome-games/debian/patches/91_glchess_engine.patch gnome-games-3.4.2/debian/patches/91_glchess_engine.patch --- gnome-games/debian/patches/91_glchess_engine.patch 1970-01-01 01:00:00.0 +0100 +++ gnome-games-3.4.2/debian/patches/91_glchess_engine.patch 2012-08-05 23:14:39.0 +0200 @@ -0,0 +1,110 @@ +From 1eb18e95bad9135b516fbf6f77f516fa1ab8b402 Mon Sep 17 00:00:00 2001 +From: Robert Ancell robert.anc...@canonical.com +Date: Sat, 14 Jul 2012 05:13:12 + +Subject: glchess: Kill engine processes on new game/exit + +Index: gnome-games-3.4.2/glchess/src/chess-engine.vala +=== +--- gnome-games-3.4.2.orig/glchess/src/chess-engine.vala 2012-05-15 06:37:48.0 +0200 gnome-games-3.4.2/glchess/src/chess-engine.vala 2012-08-05 23:13:21.586577206 +0200 +@@ -35,9 +35,9 @@ + try + { + Process.spawn_async_with_pipes (null, argv, null, +- SpawnFlags.SEARCH_PATH, +- null, +- out pid, out stdin_fd, out stdout_fd, out stderr_fd); ++SpawnFlags.SEARCH_PATH | SpawnFlags.DO_NOT_REAP_CHILD, ++null, ++out pid, out stdin_fd, out stdout_fd, out stderr_fd); + } + catch (SpawnError e) + { +@@ -45,6 +45,8 @@ + return false; + } + ++ChildWatch.add (pid, engine_stopped_cb); ++ + stdout_channel = new IOChannel.unix_new (stdout_fd); + try + { +@@ -60,7 +62,12 @@ + + return true; + } +- ++ ++private void engine_stopped_cb (Pid pid, int status) ++{ ++stopped (); ++} ++ + public virtual void start_game () + { + } +@@ -79,8 +86,8 @@ + + public void stop () + { +-// FIXME +-stopped (); ++if (pid != 0) ++Posix.kill (pid, Posix.SIGTERM); + } + + private bool read_cb (IOChannel source, IOCondition condition) +Index: gnome-games-3.4.2/glchess/src/glchess.vala +=== +--- gnome-games-3.4.2.orig/glchess/src/glchess.vala 2012-05-15 06:37:48.0 +0200 gnome-games-3.4.2/glchess/src/glchess.vala 2012-08-05 23:13:21.586577206 +0200 +@@ -124,6 +124,13 @@ + settings_changed_cb (settings, show-3d); + } + ++protected override void shutdown () ++{ ++base.shutdown (); ++if (opponent_engine != null) ++opponent_engine.stop (); ++} ++ + public void quit_game () + { + if (save_duration_timeout != 0) +@@ -298,7 +305,14 @@ + black_level = normal; + + opponent = null; +-opponent_engine = null; ++if (opponent_engine != null) ++{ ++opponent_engine.stop (); ++opponent_engine.ready_changed.disconnect (engine_ready_cb
Bug#682267: unblock: r-base/2.15.1-4
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package r-base. It contains a workaround to let packages build on armel and armhf architectures. Give-backs were all successful, so the fix is proven good by itself :) unblock r-base/2.15.1-4 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) diff -u r-base-2.15.1/debian/changelog r-base-2.15.1/debian/changelog --- r-base-2.15.1/debian/changelog +++ r-base-2.15.1/debian/changelog @@ -1,3 +1,27 @@ +r-base (2.15.1-4) unstable; urgency=low + + * src/library/tools/R/install.R: Pass perl = TRUE parameter to sub() +really passing it to sub and not to grep (Closes: #679180) + + -- Dirk Eddelbuettel e...@debian.org Sun, 15 Jul 2012 17:56:35 -0500 + +r-base (2.15.1-3) unstable; urgency=low + + * src/library/tools/R/install.R: Pass perl = TRUE parameter to sub() +and correcting error in logic of patch used in -2. (Closes: #679180) + + -- Dirk Eddelbuettel e...@debian.org Sun, 15 Jul 2012 16:17:25 -0500 + +r-base (2.15.1-2) unstable; urgency=low + + * src/library/tools/R/install.R: Pass perl = TRUE parameter to sub() +function when defining SHLIB_* macros to work-around an erroneus +string replacement which causes build failures on arm* architectures +but make the change conditonal on actually being on arm*. +With big thanks to Luca Falavigna for finding this fix. (Closes: #679180) + + -- Dirk Eddelbuettel e...@debian.org Sat, 14 Jul 2012 09:44:24 -0500 + r-base (2.15.1-1) unstable; urgency=low * New upstream version released this morning only in patch2: unchanged: --- r-base-2.15.1.orig/src/library/tools/R/install.R +++ r-base-2.15.1/src/library/tools/R/install.R @@ -52,7 +52,11 @@ SHLIB_EXT - if (WINDOWS) .dll else { ## can we do better? mconf - file.path(R.home(), paste0(etc, rarch), Makeconf) -sub(.*= , , grep(^SHLIB_EXT, readLines(mconf), value = TRUE)) +if (substr( Sys.info()[machine], 1, 3) == arm) { # arm has broken regexps in libc +sub(.*= , , grep(^SHLIB_EXT, readLines(mconf), value = TRUE), perl = TRUE) +} else { +sub(.*= , , grep(^SHLIB_EXT, readLines(mconf), value = TRUE)) +} } options(warn = 1) @@ -1597,8 +1601,13 @@ mconf - readLines(file.path(R.home(), paste0(etc, Sys.getenv(R_ARCH)), Makeconf)) -SHLIB_EXT - sub(.*= , , grep(^SHLIB_EXT, mconf, value = TRUE)) -SHLIB_LIBADD - sub(.*= , , grep(^SHLIB_LIBADD, mconf, value = TRUE)) +if (substr( Sys.info()[machine], 1, 3) == arm) { # arm has broken regexps in libc +SHLIB_EXT - sub(.*= , , grep(^SHLIB_EXT, mconf, value = TRUE), perl = TRUE) +SHLIB_LIBADD - sub(.*= , , grep(^SHLIB_LIBADD, mconf, value = TRUE), perl = TRUE) +} else { +SHLIB_EXT - sub(.*= , , grep(^SHLIB_EXT, mconf, value = TRUE)) +SHLIB_LIBADD - sub(.*= , , grep(^SHLIB_LIBADD, mconf, value = TRUE)) +} MAKE - Sys.getenv(MAKE) rarch - Sys.getenv(R_ARCH) } else {
Bug#680725: unblock: aolserver4-nsxml/1.5-2.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package aolserver4-nsxml It fixes RC bug #680033. Changelog entry follows: aolserver4-nsxml (1.5-2.1) unstable; urgency=medium . * Non-maintainer upload. * debian/dirs: - Create /usr/lib/aolserver4/lib directory. * debian/rules: - Install libnsxml.so under /usr/lib/aolserver4/lib to allow nsmxl module to be loaded by aolserver4 (Closes: #680033). unblock aolserver4-nsxml/1.5-2.1 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/8 CPU cores) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120708093632.4187.26071.reportbug@utumno
Re: Bug#620322: libvncserver package split
2012/5/25 Julien Cristau jcris...@debian.org: Probably 2. OK, I'll prepare the changes and do some tests to verify everything is fine. Once I'm confident, I'll get in touch again to see whether I'm still in time to target Wheezy. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0OX4sx=z61D5C7ZQHzy=8uzv_4eu2p8oj2ee8g9fkk...@mail.gmail.com
Re: Comments regarding automake1.12_1.12-1_amd64.changes
2012/5/23 Eric Dorland e...@debian.org: I'll still be able to upload new versions of automake 1.11 if this upload is rejected right? Yes, a rejected upload won't interfere at all with other packages. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0ONqg7cRrysw0rEvs8UuKpoejuin4TXwOC2Fn=hx7p...@mail.gmail.com
libvncserver package split
Hi, In #620322 it is proposed to ship libvncclient library in a separate binary package. In order to do this, the following steps have to be performed: * put libvncclient library into a new libvncclient0 binary package * libvncclient0 binary must break and replace older libvncserver0 binary packages * libvncserver0 binary should depend on the exact version of libvncclient0 binary at least until every rdep has been rebuilt with the new structure * rdeps have to be rebuilt to pick the new dependencies As long as libvncserver0 depends on the new libvncclient0, this shouldn't be a problem, but I'd like to coordinate this transition with you to avoid problems. Which option would you like the most between the following? 1) leave libvncserver untouched until Wheezy is released 2) perform the switch, keep the libvncserver0 - libvncclient0 dependency, remove it when every rdep is rebuilt to pick the new structure 3) perform the switch, schedule binNMUs immediately, and drop the libvncserver0 - libvncclient0 dependency ASAP Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0NEvsNUJPCJBhmFM2cOeym=spwekwv3ptpfogwwygy...@mail.gmail.com
Re: Comments regarding automake1.12_1.12-1_amd64.changes
Also adding debian-release mailing list in the loop. 2012/5/22 Luca Falavigna ftpmas...@debian.org: Hi, I fear your automake 1.12 upload won't end up in unstable so soon. As you know, Release Team is planning to freeze Wheezy within June, and uploading a new major version of automake now could lead to more RC bugs, forcing the delay of the freeze or the release date. I blocked the upload for now pending a OK from the Release Team first, you should get in touch with them to see whether it's OK to have the new automake in unstable. Cheers, Luca -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/cadk7b0oo4shw1x6raxzumbngso8fqhreaygv0pjk7nl-qog...@mail.gmail.com
Re: Bug#653823: transition: boost-defaults
Il 03/03/2012 19:21, Steve M. Robbins ha scritto: Last Sunday I uploaded another new version (1.49). It's still in NEW, but I'd like to transition boost-defaults to 1.49 ASAP. FYI, I just accepted it. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4f526b3a.9010...@debian.org
Bug#656829: transition: exiv2 - libexiv2-9 - libexiv2-11
Il 22/01/2012 02:18, Mark Purcell ha scritto: libgexiv2-0 requires newer gexiv2 0.3.1 #656749 gexiv2 0.3.1 just uploaded to experimental. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4f34509f.2070...@debian.org
Bug#651940: nmu: koffice_1:2.3.3-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu koffice_1:2.3.3-2 . ALL . -m Rebuild for libpqxx3 transition Please schedule binNMUs for koffice 1:2.3.3-2 to be rebuilt against new libpqxx3 to get rid of libpqxx-3.0 and libpqxx-3.0-dbg binaries, no longer built from source. -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0P+ygsqd3xperOwfo7Y+2+Fkm806RKFTnjVjv=_96u...@mail.gmail.com
Removal of kcollectd from testing
Hi, would it be possible to remove kcollectd from wheezy? It requires collectd to properly work [0], but collectd is not going to migrate soon [1]. This should allow boost1.42 removal from wheezy [2]. [0] http://bugs.debian.org/620023 [1] http://qa.debian.org/excuses.php?package=collectd [2] http://release.debian.org/migration/testing.pl?package=boost1.42 -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4ebfa4f0.20...@debian.org
Bug#645296: Rationale
Rationale for the binNMU request: with libvncserver 0.9.8 release, upstream broke ABI by adding new members in the middle of a struct. This issue has been reported upstream [0] and fixed with 0.9.8.1 release. remmina-plugins was built with 0.9.8, and needs a rebuild to make remmina-plugin-vnc able to connect to VNC servers again. [0] http://sourceforge.net/tracker/?func=detailaid=3419816group_id=32584atid=405858 -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CADk7b0N1OS9NeF3B0C0A+4arxdzmG+AZzZEj=x=lpbbrf9d...@mail.gmail.com
Bug#646340: nmu: yiff_2.14.5-7
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu yiff_2.14.5-7 . ALL . -m Restore liby-dev binary package Rationale: a recent bison upload [0] incorrectly overwrote yiff's liby-dev, which has been dominated later on. A subsequent bison upload fixed previous mistake [1], yiff's liby-dev has to be restored, though. Hopefully, binNMUing yiff would be enough to solve the issue, otherwise I will convert this bug in a request to upload a fixed yiff with proper epoch to restore missing binaries. [0] http://packages.qa.debian.org/b/bison/news/20111003T063216Z.html [1] http://packages.qa.debian.org/b/bison/news/20111011T161715Z.html -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4ea40be6.20...@debian.org
Bug#637653: pu: gdebi/0.6.4+squeeze1
Il 21/09/2011 21:29, Adam D. Barratt ha scritto: Thanks. Please feel free to go ahead with the stable upload. Uploaded, thanks! -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#637653: pu: gdebi/0.6.4+squeeze1
Il 17/09/2011 16:38, Adam D. Barratt ha scritto: Thanks. Is there an (even vague) ETA for the other fix being in a suitable condition to be uploaded? Not soon enough to rush an early commit. I could finalize other little changes (mostly translations), and upload a new revision to unstable including the regex change. That could happen within today. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#637653: pu: gdebi/0.6.4+squeeze1
gdebi 0.8.2 just landed in unstable. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#637653: pu: gdebi/0.6.4+squeeze1
Il 29/08/2011 17:47, Adam D. Barratt ha scritto: As I understand the intent, the following appears to match more closely: msg = a|b|c[y/n]hello print findall([[(](\S+)/\S+[])], msg) ['y'] Looking more closely, your regex is simpler, and even more robust. Thanks for the hint! Would it be OK to upload with the suggested regex? That would require fixing in unstable too, I could commit change in trunk, so next unstable upload would address that as well. Are there actually any translations using parentheses rather than brackets as delimiters? Not that I'm aware of, at the moment. I also looked at more recent translations, and everything uses brackets. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#637731: binNMUs for some cruft-report packages
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Hi, These are some binNMU requests for some packages in cruft-report: nmu diagnostics_0.3.3-1.1 . ALL . -m 'Rebuild for ace transition.' nmu ivtools_1.2.8a1-5 . amd64 i386 ia64 mips mipsel powerpc s390 sparc . -m 'Rebuild for ace transition' dw ivtools_1.2.8a1-5 . armel . -m 'libace-dev (= 6.0.3)' nmu engine-pkcs11_1.2.8a1-5 . ALL . -m 'Rebuild for libp11 transition.' nmu pam-p11_0.1.8-2 . amd64 armel i386 ia64 kfreebsd-amd64 kfreebsd-i386 mips mipsel powerpc s390 sparc . -m 'Rebuild for libp11 transition.' nmu starpu-contrib_0.9.1-2 . i386 amd64 . -m 'Rebuild for nvidia-cuda-toolkit transition.' Cheers, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Re: [SRM] kupfer_0+v201-2+squeeze1
Il 09/07/2011 19:19, Adam D. Barratt ha scritto: Please go ahead; thanks. Uploaded, thanks! -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
[SRM] kupfer_0+v201-2+squeeze1
Hi SRMs, I'd like to get your permission to upload to stable a fix for bug #632933, which has been addressed upstream some time ago. I attach a debdiff of the proposed changes. Thanks in advance, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- diff -Nru kupfer-0+v201/debian/changelog kupfer-0+v201/debian/changelog --- kupfer-0+v201/debian/changelog 2011-04-30 12:48:21.0 +0200 +++ kupfer-0+v201/debian/changelog 2011-07-08 19:40:23.0 +0200 @@ -1,3 +1,10 @@ +kupfer (0+v201-2+squeeze2) stable; urgency=low + + * debian/patches/evolution_contacts.patch: +- Do not crash if Evolution address book is missing (Closes: #632933). + + -- Luca Falavigna dktrkr...@debian.org Fri, 08 Jul 2011 19:39:20 +0200 + kupfer (0+v201-2+squeeze1) stable; urgency=low * debian/patches/TYPE_UINT.patch: diff -Nru kupfer-0+v201/debian/patches/evolution_contacts.patch kupfer-0+v201/debian/patches/evolution_contacts.patch --- kupfer-0+v201/debian/patches/evolution_contacts.patch 1970-01-01 01:00:00.0 +0100 +++ kupfer-0+v201/debian/patches/evolution_contacts.patch 2011-07-08 19:38:41.0 +0200 @@ -0,0 +1,17 @@ +Description: Do not crash if Evolution address book is missing +Author: Luca Falavigna dktrkr...@debian.org +Forwarded: https://bugs.launchpad.net/kupfer/+bug/691305 + +Index: kupfer-v203/kupfer/plugin/evolution.py +=== +--- kupfer-v203.orig/kupfer/plugin/evolution.py2010-12-16 22:56:12.860901147 +0100 kupfer-v203/kupfer/plugin/evolution.py 2010-12-16 22:56:23.076394741 +0100 +@@ -101,6 +101,8 @@ + + def get_items(self): + ebook_ = evolution.ebook.open_addressbook(default) ++ if not ebook_: ++ return + for contact in ebook_.get_all_contacts(): + name = contact.get_property(full-name) + email = contact.get_property(email-1) diff -Nru kupfer-0+v201/debian/patches/series kupfer-0+v201/debian/patches/series --- kupfer-0+v201/debian/patches/series 2011-04-30 12:50:59.0 +0200 +++ kupfer-0+v201/debian/patches/series 2011-07-08 19:40:17.0 +0200 @@ -1,2 +1,3 @@ debian_path.patch TYPE_UINT.patch +evolution_contacts.patch signature.asc Description: OpenPGP digital signature
Removal hints
Hi, would you consider adding removal hints for the following packages? * libfreenect (needs removed glut, #616525) * bitlbee-skype (needs removed skype4py, #622739) Thanks -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#626690: nmu: ldb transition
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu openchange_1:0.10~bzr1804-1 . armel . -m 'Rebuild against ldb' nmu samba4_4.0.0~alpha14~bzr13684.dfsg1-1 . armel . -m 'Rebuild against ldb' nmu sssd_1.2.1-4.1 . armel . -m 'Rebuild against ldb' -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#626691: nmu: rasmol/2.7.5-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu rasmol_2.7.5-3 . ALL . -m 'Rebuild against neartree' -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#626692: nmu: lbdb/0.37
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu lbdb_0.37 . ALL . -m 'Rebuild against libvformat' -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#626197: RM: nagios-statd/3.12-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm As python2.5 is going to be removed soon [0], and given that support for newer python releases is unlikely to happen [1], nagios-statd should be better removed from wheezy until a proper solution is found. [0] http://bugs.debian.org/623820 [1] http://penguinpackets.com/~kelly/kblog/blog/01207948699 -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Re: [SRU] kupfer_0+v201-2+squeeze1
Il 01/05/2011 01:30, Philipp Kern ha scritto: Yep, please go ahead. Uploaded, thanks! -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Re: [SRU] kupfer_0+v201-2+squeeze1
Il 15/04/2011 20:06, Luca Falavigna ha scritto: Il 14/04/2011 23:29, Philipp Kern ha scritto: After staring at the code a little longer: what keybinder returns from that function is a guint32, so shouldn't it be TYPE_UINT? And why does it overflow? I guess the reason it overflows comes from the X server (where it's a CARD32 so uint32, too). It's not entirely clear to me why, though. After talking with Ulrik (upstream developer), he made me notice current upstream code has TYPE_UINT, so using it should be a better choice. He told me this bug could be caused by X server being active for a lot of time, making its timestamp bigger than the variable defined by Kupfer. Attaching debdiff this time. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- diff -Nru kupfer-0+v201/debian/changelog kupfer-0+v201/debian/changelog --- kupfer-0+v201/debian/changelog 2010-07-17 14:29:47.0 +0200 +++ kupfer-0+v201/debian/changelog 2011-04-30 12:48:21.0 +0200 @@ -1,3 +1,11 @@ +kupfer (0+v201-2+squeeze1) stable; urgency=low + + * debian/patches/TYPE_UINT.patch: +- Backport a fix from upstream git repository, use UINT signal + parameter type to fix an issue with ui.keybindings (Closes: #615060). + + -- Luca Falavigna dktrkr...@debian.org Sat, 30 Apr 2011 12:52:09 +0200 + kupfer (0+v201-2) unstable; urgency=low * debian/control: diff -Nru kupfer-0+v201/debian/patches/series kupfer-0+v201/debian/patches/series --- kupfer-0+v201/debian/patches/series 2009-11-01 22:35:57.0 +0100 +++ kupfer-0+v201/debian/patches/series 2011-04-30 12:50:59.0 +0200 @@ -1 +1,2 @@ debian_path.patch +TYPE_UINT.patch diff -Nru kupfer-0+v201/debian/patches/TYPE_UINT.patch kupfer-0+v201/debian/patches/TYPE_UINT.patch --- kupfer-0+v201/debian/patches/TYPE_UINT.patch 1970-01-01 01:00:00.0 +0100 +++ kupfer-0+v201/debian/patches/TYPE_UINT.patch 2011-04-30 12:47:59.0 +0200 @@ -0,0 +1,16 @@ +Description: Use UINT signal parameter type +Origin: http://git.gnome.org/browse/kupfer/commit/?id=4b72c5317ba35462d8974efc5d35c0906febcdf7 + +Index: kupfer-0+v201/kupfer/ui/keybindings.py +=== +--- kupfer-0+v201.orig/kupfer/ui/keybindings.py 2011-04-14 22:24:52.954179649 +0200 kupfer-0+v201/kupfer/ui/keybindings.py 2011-04-14 22:25:11.642179656 +0200 +@@ -34,7 +34,7 @@ + self.emit(keybinding, target, time) + + gobject.signal_new(keybinding, KeyboundObject, gobject.SIGNAL_RUN_LAST, +- gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_INT)) ++ gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_UINT)) + + _currently_bound = {} + signature.asc Description: OpenPGP digital signature
Re: [SRU] kupfer_0+v201-2+squeeze1
Il 14/04/2011 23:29, Philipp Kern ha scritto: After staring at the code a little longer: what keybinder returns from that function is a guint32, so shouldn't it be TYPE_UINT? And why does it overflow? I guess the reason it overflows comes from the X server (where it's a CARD32 so uint32, too). It's not entirely clear to me why, though. After talking with Ulrik (upstream developer), he made me notice current upstream code has TYPE_UINT, so using it should be a better choice. He told me this bug could be caused by X server being active for a lot of time, making its timestamp bigger than the variable defined by Kupfer. Would the same upload, using TYPE_UINT instead, be acceptable? Regards, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
[SRU] kupfer_0+v201-2+squeeze1
Hi SRMs, I'd like to get your permission to upload to stable a fix for bug #615060, which has been addressed by a patch provided by upstream, and confirmed to work by bug submitter. I attach a debdiff of the proposed changes. Thanks in advance, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- diff -Nru kupfer-0+v201/debian/changelog kupfer-0+v201/debian/changelog --- kupfer-0+v201/debian/changelog 2010-07-17 14:29:47.0 +0200 +++ kupfer-0+v201/debian/changelog 2011-04-14 22:30:48.0 +0200 @@ -1,3 +1,11 @@ +kupfer (0+v201-2+squeeze1) stable; urgency=low + + * debian/patches/TYPE_INT64.patch: +- Backport a fix from upstream git repository, use INT64 signal + parameter type to fix an issue with ui.keybindings (Closes: #615060). + + -- Luca Falavigna dktrkr...@debian.org Thu, 14 Apr 2011 22:26:38 +0200 + kupfer (0+v201-2) unstable; urgency=low * debian/control: diff -Nru kupfer-0+v201/debian/patches/series kupfer-0+v201/debian/patches/series --- kupfer-0+v201/debian/patches/series 2009-11-01 22:35:57.0 +0100 +++ kupfer-0+v201/debian/patches/series 2011-04-14 22:24:37.0 +0200 @@ -1 +1,2 @@ debian_path.patch +TYPE_INT64.patch diff -Nru kupfer-0+v201/debian/patches/TYPE_INT64.patch kupfer-0+v201/debian/patches/TYPE_INT64.patch --- kupfer-0+v201/debian/patches/TYPE_INT64.patch 1970-01-01 01:00:00.0 +0100 +++ kupfer-0+v201/debian/patches/TYPE_INT64.patch 2011-04-14 22:26:18.0 +0200 @@ -0,0 +1,16 @@ +Description: Use INT64 signal parameter type +Origin: http://git.gnome.org/browse/kupfer/commit/?id=4b72c5317ba35462d8974efc5d35c0906febcdf7 + +Index: kupfer-0+v201/kupfer/ui/keybindings.py +=== +--- kupfer-0+v201.orig/kupfer/ui/keybindings.py 2011-04-14 22:24:52.954179649 +0200 kupfer-0+v201/kupfer/ui/keybindings.py 2011-04-14 22:25:11.642179656 +0200 +@@ -34,7 +34,7 @@ + self.emit(keybinding, target, time) + + gobject.signal_new(keybinding, KeyboundObject, gobject.SIGNAL_RUN_LAST, +- gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_INT)) ++ gobject.TYPE_BOOLEAN, (gobject.TYPE_INT, gobject.TYPE_INT64)) + + _currently_bound = {} + signature.asc Description: OpenPGP digital signature
Re: Permission to upload vanessa-logger_0.0.10-1.1 (NMU)
Il 14/11/2010 14:06, Julien Cristau ha scritto: The Breaks field seems unnecessary, as you already have Depends on the exact version. If you agree please drop the Breaks and go ahead. Correct, thanks for spotting. Simon ACKed the first NMU proposal, so I'm going to upload the revised version (as per attached debdiff) without delay. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- only in patch2: unchanged: --- vanessa-logger-0.0.10.orig/debian/changelog +++ vanessa-logger-0.0.10/debian/changelog @@ -1,3 +1,12 @@ +vanessa-logger (0.0.10-1.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add Replaces field on libvanessa-logger0 ( 0.0.8-1) for +libvanessa-logger-dev package to fix overwrite issues with +/usr/share/doc/libvanessa-logger-dev/README file (Closes: #601989). + + -- Luca Falavigna dktrkr...@debian.org Sun, 14 Nov 2010 16:06:16 +0100 + vanessa-logger (0.0.10-1) unstable; urgency=low * New upstream only in patch2: unchanged: --- vanessa-logger-0.0.10.orig/debian/control +++ vanessa-logger-0.0.10/debian/control @@ -20,6 +20,7 @@ Architecture: any Section: libdevel Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends} +Replaces: libvanessa-logger0 ( 0.0.8-1) Description: Headers and static libraries for libvanessa-logger Headers and static libraries required to develop against vanessa-logger. Vanessa logger is a generic logging layer that may be used to log to signature.asc Description: OpenPGP digital signature
Bug#603362: nmu: remmina-plugins_0.8.4-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu I'm asking a binNMU for remmina-plugins to catch correct dependency against freerdp package (see #602218). nmu remmina-plugins_0.8.4-1 . ALL . -m Rebuild with versioned freerdp dw remmina-plugins_0.8.4-1 . hppa . -m 'libfreerdp-dev (= 0.8.1-2)' -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Permission to upload vanessa-logger_0.0.10-1.1 (NMU)
Hi, I'm attaching a debdiff of a proposed NMU I plan to upload to DELAYED/2 to fix bug #601989. Release Team, would you consider an unblock request for this upload? Thanks, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- only in patch2: unchanged: --- vanessa-logger-0.0.10.orig/debian/changelog +++ vanessa-logger-0.0.10/debian/changelog @@ -1,3 +1,12 @@ +vanessa-logger (0.0.10-1.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add Breaks/Replaces fields on libvanessa-logger0 ( 0.0.8-1) +for libvanessa-logger-dev package to fix overwrite issues with +/usr/share/doc/libvanessa-logger-dev/README (Closes: #601989). + + -- Luca Falavigna dktrkr...@debian.org Sun, 14 Nov 2010 01:35:07 +0100 + vanessa-logger (0.0.10-1) unstable; urgency=low * New upstream only in patch2: unchanged: --- vanessa-logger-0.0.10.orig/debian/control +++ vanessa-logger-0.0.10/debian/control @@ -20,6 +20,8 @@ Architecture: any Section: libdevel Depends: libvanessa-logger0 (= ${binary:Version}), ${misc:Depends} +Breaks: libvanessa-logger0 ( 0.0.8-1) +Replaces: libvanessa-logger0 ( 0.0.8-1) Description: Headers and static libraries for libvanessa-logger Headers and static libraries required to develop against vanessa-logger. Vanessa logger is a generic logging layer that may be used to log to signature.asc Description: OpenPGP digital signature
Re: [MBF proposal] Empty packages in the archive
I've just submitted relevant bugs, list can be found here: http://bugs.debian.org/cgi-bin/pkgreport.cgi?users=debian...@lists.debian.org;tag=empty-package -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
[MBF proposal] Empty packages in the archive
Hi, I've conducted an analysis looking for empty binary packages. Here is a dd-list of binary packages packages which would get a bug with severity serious: Jesus Climent mo...@debian.org libdspam7-drv-db4 (U) Julien Danjou a...@debian.org libpthread-stubs0 (U) Debian DSPAM Maintainers pkg-dspam-m...@lists.alioth.debian.org libdspam7-drv-db4 Debian Mono Group pkg-mono-gr...@lists.alioth.debian.org libmono-windowsbase-cil-dev mono-winforms-a11y Debian Pkg-e Team pkg-e-de...@lists.alioth.debian.org efl-dev Debian Science Team debian-science-maintain...@lists.alioth.debian.org fenics XCB Developers x...@lists.freedesktop.org libpthread-stubs0 Christoph Haas h...@debian.org libdspam7-drv-db4 (U) Kurt B. Kaiser k...@shore.net libdspam7-drv-db4 (U) Aurelien Labrosse aurelien.labro...@free.fr libdspam7-drv-db4 (U) Jan Lübbe jlue...@debian.org efl-dev (U) Matthijs Mohlmann matth...@cacholong.nl libdspam7-drv-db4 (U) Christophe Prud'homme prudh...@debian.org fenics (U) Johannes Ring joha...@simula.no fenics (U) Jamey Sharp sharp...@debian.org libpthread-stubs0 (U) Albin Tonnerre lu...@debian.org efl-dev (U) Josh Triplett j...@freedesktop.org libpthread-stubs0 (U) Ray Wang raw...@novell.com libmono-windowsbase-cil-dev (U) mono-winforms-a11y (U) Rudolf Weber rud...@faveve.uni-stuttgart.de libdspam7-drv-db4 (U) These packages would receive severity important: Wolfgang Baer wb...@gmx.de libjmock-java-doc (U) Debian Java Maintainers pkg-java-maintain...@lists.alioth.debian.org libjmock-java-doc liblayout-java-doc librepository-java-doc Debian Octave Group pkg-octave-de...@lists.alioth.debian.org octave3.2-dbg [mips, mipsel] Debian Ruby Extras Maintainers pkg-ruby-extras-maintain...@lists.alioth.debian.org libimage-science-ruby-doc (U) libkrb5-ruby-doc (U) Rene Engelhard r...@debian.org liblayout-java-doc (U) librepository-java-doc (U) Michael Koch konque...@gmx.de librepository-java-doc (U) Trygve Laugstøl tryg...@inamo.n libjmock-java-doc (U) Ryan Niebur ryanrya...@gmail.com libkrb5-ruby-doc Ryan Niebur r...@debian.org midori-dbg [hppa] Thomas Weber twe...@debian.org octave3.2-dbg (U) [mips, mipsel] Torsten Werner twer...@debian.org librepository-java-doc (U) Gunnar Wolf gw...@debian.org libimage-science-ruby-doc Other bugs have been already filed: libatlas-test_3.8.3-27 588418 libqthreads-12_1.6.8-10 397238 libslepc3.0.0_3.0.0-p7.dfsg-7 595396 google-perftools-dbg_1.5-1 595184 inventor-doc_2.1.5-10-14595405 mono-uia-dbg_1.0-2 595399 Please note test results have been gathered using a semi-automated process, so there could be some false positives. Feel free to correct me in case a package is empty on purpose. Regards, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Processing binary-NEW packages? (Was: List of binary-NEW packages)
Il 10/08/2010 12.10, Luca Falavigna ha scritto: For your convenience, I've set up a slightly modified NEW page which only displays binary-NEW packages, you can find it at [1]. If that turns useful, I'll have a look how to properly differentiate these information in the default NEW.html page [2]. binary-NEW packages can now be displayed from http://ftp-master.debian.org/NEW.html Backlog is getting quite big, could we process binary-NEW packages targeted to experimental and those targeted unstable which do not trigger new transitions (i.e. NEW -doc package)? Cheers, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Re: Permission to upload gdebi_0.6.4
Il 25/09/2010 17:52, Adam D. Barratt ha scritto: On Sat, 2010-09-25 at 11:42 +0200, Luca Falavigna wrote: I'm asking permission to upload (and to be granted subsequent unblock) for gdebi_0.6.4 Please go ahead with the upload. Uploaded, thanks! -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Permission to upload gdebi_0.6.4
[ Sending again, as it seems it hasn't been correctly delivered due to my recent MTA problems, sorry in case you receive this multiple times ] Hi, I'm asking permission to upload (and to be granted subsequent unblock) for gdebi_0.6.4, which fixes an important bug during installation of a package (#597139), together with a couple of bugs reported in Ubuntu which affects Debian as well, and some translation updates. Diff of changes can be seen online at [0], and downloaded at [1]. [0] http://bazaar.launchpad.net/~gdebi-developers/gdebi/trunk/revision/346?compare_revid=334 [1] http://bazaar.launchpad.net/%7Egdebi-developers/gdebi/trunk/diff/346/334 -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#597251: nmu: libppl-swi_0.10.2-8
Il 18/09/2010 10:36, Adam D. Barratt ha scritto: Before I schedule a 22-hour build to get one binary package back :) I'm assuming dak can't easily be persuaded to re-introduce the old version of the package? (I'm guessing not given the time since removal, but it's always worth asking...) Unluckily, it seems the best solution is scheduling a binNMU, sorry :( -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Bug#597251: nmu: libppl-swi_0.10.2-8
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu I erroneously removed libppl-swi_0.10.2-8 from hppa instead of mips (see #596501), so I ask a binNMU on hppa to restore removed binary. nmu libppl-swi_0.10.2-8 . hppa . -m Rebuild for erroneous removal signature.asc Description: PGP signature
Bug#597251: nmu: libppl-swi_0.10.2-8
Il giorno Sat, 18 Sep 2010 09:36:57 +0100 Adam D. Barratt a...@adam-barratt.org.uk ha scritto: That should be ppl, i.e. the source package. Ups, sorry. Before I schedule a 22-hour build to get one binary package back :) I'm assuming dak can't easily be persuaded to re-introduce the old version of the package? (I'm guessing not given the time since removal, but it's always worth asking...) I'll check if it can be done The Fast Way :) -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: PGP signature
Bug#597268: nmu: libppl-swi_0.10.2-8
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu I erroneously removed libppl-swi_0.10.2-8 from hppa instead of mips (see #596501), so I ask a binNMU on hppa to restore removed binary. nmu libppl-swi_0.10.2-8 . hppa . -m Rebuild for erroneous removal -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20100917235446.12225.18928.report...@utumno
Re: samba_3.4.9~dfsg-1_i386.changes REJECTED
Il 16/09/2010 7.52, Christian PERRIER ha scritto: $ dak ls -s unstable samba samba-doc samba | 2:3.4.8~dfsg-2 | unstable | source, hurd-i386 samba | 2:3.5.4~dfsg-2 | unstable | source, hppa, mips, mipsel, sparc samba | 2:3.5.5~dfsg-1 | unstable | source, alpha, amd64, armel, hppa, i386, ia64, kfreebsd-amd64, kfreebsd-i386, powerpc, s390 samba-doc | 2:3.4.8~dfsg-2 | unstable | all samba-doc | 2:3.5.4~dfsg-2 | unstable | all samba-doc | 2:3.5.5~dfsg-1 | unstable | all $ Hmmm, so indeed this check prevents us to fix samba in testing through t-p-u. Ftpmasters, is there something that can be done on your side? This is #584909. I'll try to see if I can provide a fix. -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Permission to upload gtg_0.2.4-4 (fixes RC bug and locale issues)
Hi, I ask permission to upload to unstable (and to be granted subsequent unblock) for gtg_0.2.4-4. It fixes a RC bug (#595430) and a couple of locale issues (#595436 and #595440). Debdiff of proposed changes attached. Regards, -- Luca gtg_0.2.4-4.debdiff Description: Binary data signature.asc Description: PGP signature
Re: Permission to upload bugfix/translation updates for remmina stack
Il giorno Sat, 4 Sep 2010 20:16:44 +0200 Julien Cristau jcris...@debian.org ha scritto: -if (client-thread) pthread_join (client-thread, NULL); +while (client-thread) +{ +gdk_threads_leave (); +sleep (1); +gdk_threads_enter (); +} what's the reasoning for this one? This is to fix a window hang when transfering files with SFTP: http://remmina.svn.sourceforge.net/viewvc/remmina?view=revisionrevision=221 Also it seems src/remminaftpclient.c (and a few other files) doesn't include config.h, that's a recipe for impossible debugging later on. I'll report this upstream. * remmina-plugins_0.8.3-1 Not quite sure what this is fixing either, and there's no changelog to explain. New upstream version ships fix for this bug reported upstream: http://sourceforge.net/tracker/?func=detailaid=3049236group_id=278330atid=1181674 signature.asc Description: PGP signature
Re: Permission to upload gtg_0.2.4-4 (fixes RC bug and locale issues)
Il giorno Sun, 5 Sep 2010 14:23:18 +0200 Julien Cristau jcris...@debian.org ha scritto: I ask permission to upload to unstable (and to be granted subsequent unblock) for gtg_0.2.4-4. It fixes a RC bug (#595430) and a couple of locale issues (#595436 and #595440). Ack, let us know when the package is accepted. Uploaded, thanks! signature.asc Description: PGP signature
Re: Permission to upload bugfix/translation updates for remmina stack
Il giorno Sun, 5 Sep 2010 14:07:55 +0200 Julien Cristau jcris...@debian.org ha scritto: Thanks for the explanations, I've unblocked the last two packages. Thanks! Regarding #595581, I've ready 0.8.3-2 upload fixing it (it's just B-D change, and related changelog entry). Could I proceed with the upload? signature.asc Description: PGP signature
Bug#594681: unblock: gdebi/0.6.3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gdebi It fixes two important bugs (#591306 and #593647), the only feature added is a check to remember auto-close status when installation is over. The rest of the changes are translation updates. unblock gdebi/0.6.3 -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20100828102721.3939.69137.report...@valar
Re: Permission to upload gtg_0.2.4-3 [UPLOADED]
Il 11/08/2010 0.38, Philipp Kern ha scritto: You can go ahead with the upload. Please ping us when it got accepted. Uploaded, and accepted. Thanks! -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature
Re: Permission to upload gtg_0.2.4-3 (fixes Important bug)
Il 07/08/2010 15.50, Luca Falavigna ha scritto: Is there any particular reason why this does not use the defined standard Python library class TemporaryFile (or NamedTemporaryFile)? gtg uses a fixed temp file to be able to see if a previous write attempt was successful, and to use it in case of data corruption. Any news on this? Regards, -- .''`. : :' : Luca Falavigna dktrkr...@debian.org `. `' `- signature.asc Description: OpenPGP digital signature