Bug#689147: unblock: gajim/0.15.1-1

2012-12-12 Thread Yann Leboulanger

On 12/12/2012 01:37 AM, intrigeri wrote:

Hi,

Yann Leboulanger wrote (14 Oct 2012 16:35:07 GMT) :

On 10/14/2012 06:18 PM, Jakub Wilk wrote:

FWIW, it _is_ packaged as python-gnupg.



right, but we have a small change in it for logging:
logger = logging.getLogger('gajim.c.gnupg')


Looks like this should be added to the embedded code copies list,
regardless of the minor diff:
https://wiki.debian.org/EmbeddedCodeCopies


This can also be in Gajim itself, and I'll do that for next release.

--
Yann


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c838ea.9090...@lagaule.org



Bug#689588: Please unblock cracklib2/2.8.19-2

2012-12-12 Thread Niels Thykier
Control: tags -1 moreinfo

On 2012-12-08 12:25, Jan Dittberner wrote:
 retitle 689588 unblock: cracklib2/2.8.19-2
 thanks
 
 Dear release managers,
 
 please unblock cracklib2/2.8.19-2 that I uploaded to unstable. See the
 debdiff that is already attached to the bug. The change is minimal and
 backward compatible. The test suite runs without problems with all supported
 Python versions (2.6, 2.7, 3.2).
 
 
 Best regards
 Jan
 

Hi,

I have to admit, I would have appreciated if this change had been
upstreamed.  Anyhow, I guess that will be your headache and not mine... :)

In regards to the actual changes, I suspect they are flawed in the
error-path, see cracklib2.review.

~Niels

+-const char *result;
++int result;
++char *errmsg;
^^
Uninitialized, but almost certainly not NULL

[...]

+ LOCK();
+-result = FascistCheck(candidate, dict ? dict : defaultdict);
++result = __DEBIAN_SPECIFIC__SafeFascistCheck(candidate,
++  dict ? dict : defaultdict, errmsg);

Passed as char * and not char **, so the call will not change
to which string errmsg is pointing (but could change the content).

Note that __DEBIAN_SPECIFIC__SafeFascistCheck is trying to use it
by assigning to errmsg (see below), so I suspect you wanted to use
errmsg here (and the changed below).

+ UNLOCK();

++  if (errmsg != NULL)
++  {
++  PyErr_SetString(PyExc_ValueError, errmsg);
  ^^

Use of uninitialized pointer...




++int
++__DEBIAN_SPECIFIC__SafeFascistCheck(password, path, errstr)
++const char *password;
++const char *path;
++char *errstr;
  ^
I think this should have been char **errstr;



++errstr = FascistLook(pwp, pwtrunced);
  ^^

... and this should have been:

  *errstr = FascistLook(pwp, pwtrunced);



Processed: Re: Bug#689588: Please unblock cracklib2/2.8.19-2

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 moreinfo
Bug #689588 [release.debian.org] unblock: cracklib2/2.8.19-2
Added tag(s) moreinfo.

-- 
689588: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689588
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b689588.135529944725272.transcr...@bugs.debian.org



Bug#689588: Please unblock cracklib2/2.8.19-2

2012-12-12 Thread Niels Thykier
On 2012-12-12 09:04, Niels Thykier wrote:
 Control: tags -1 moreinfo
 
 On 2012-12-08 12:25, Jan Dittberner wrote:
 retitle 689588 unblock: cracklib2/2.8.19-2
 thanks

 Dear release managers,

 please unblock cracklib2/2.8.19-2 that I uploaded to unstable. See the
 debdiff that is already attached to the bug. The change is minimal and
 backward compatible. The test suite runs without problems with all supported
 Python versions (2.6, 2.7, 3.2).


 Best regards
 Jan

 
 Hi,
 
 I have to admit, I would have appreciated if this change had been
 upstreamed.  Anyhow, I guess that will be your headache and not mine... :)
 
 [...]


I just saw your original mail from Oct. 4th, so never mind the above
comment.  I think the use of __DEBIAN_SPECIFIC__SafeFascistCheck will be
okay for Wheezy (considering it avoids an API transition).

Sorry for the delay in getting back to you (on your mail from Oct.),
~Niels


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c83f99.6020...@thykier.net



Bug#695748: unblock: ferm/2.1-4

2012-12-12 Thread Alexander Wirt
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ferm

Hi,

I fixed two nasty bugs (I think at least #694334 is RC) in 2.1-4.

#694334: ferm: modifies files under /etc:
if an admin decided to have different permissions for
/etc/ferm those will be overwritten with the wheezy update

#695677: domain within a function produces syntax error
having a function where domain (ip ip6) is used is rejected
by the version in wheezy which is a regression, the patch got
backported from upstreams git.

The fixes are both oneliners and I think having them in wheezy would
be good. The debdiff is attached. 

diff --git a/debian/changelog b/debian/changelog
index e1109cc..d5ba908 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+ferm (2.1-4) unstable; urgency=low
+
+  * [4ede608] Backport a patch that fixes a regression in functions containing
+ip and ip6 domains
+(Closes: #695677)
+  * [22d4a48] don't modify permissions on /etc/ferm during upgrade
+(Closes: #694334)
+
+ -- Alexander Wirt formo...@debian.org  Tue, 11 Dec 2012 22:59:18 +0100
+
 ferm (2.1-3) unstable; urgency=low
 
   [ Salvatore Bonaccorso ]
diff --git a/debian/ferm.postinst b/debian/ferm.postinst
index 0f8ea64..ab50cb2 100644
--- a/debian/ferm.postinst
+++ b/debian/ferm.postinst
@@ -43,7 +43,7 @@ if [ $action = configure ]; then
 sed -i s/^ENABLED=.*$/ENABLED=\$VALUE\/ /etc/default/ferm
 
 # make the firewall configuration readable only by root and group adm
-if [ -d /etc/ferm ]; then
+if [ -d /etc/ferm ]  [ -z $version ]; then
 chown -R root:adm /etc/ferm
 chmod 2750 /etc/ferm
 fi
diff --git a/src/ferm b/src/ferm
index b83048d..2214969 100755
--- a/src/ferm
+++ b/src/ferm
@@ -2052,7 +2052,7 @@ sub enter($$) {
 new_level(%inner, \%rule);
 set_domain(%inner, $domain) or next;
 $script-{tokens} = [ @$tokens ];
-enter($lev, \%inner);
+enter(0, \%inner);
 }
 
 $script-{tokens} = $old_tokens;

unblock ferm/2.1-4

Thanks in advance

Alex


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20121212092116.5745.71675.report...@hawking.credativ.lan



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Neil Williams
On Wed, 12 Dec 2012 04:18:18 +0100
Nick Andrik nick.and...@gmail.com wrote:

 First of all I also CC the DD that follows my work on packaging the
 new version, since I am not an expert on all debian procedures yet.
 
 About removing kismet or not, I don't know what are the arguments for
 and against.
 I need to know the exact implications in order to give an informed answer.
 
 If we include it, what is the disadvantage?

The Debian package is not available for new installations. It doesn't
show up in apt-cache searches.

The advantage is that the poor quality of the package no longer
reflects badly on Debian - as it does currently.

 It is not installed by default anyway, and I don't expect anyone to be
 using the version shipped with debian.

So remove it already.

 The upstream also provides a .deb which works quite well and my
 estimation is that everybody uses that one.
 This means, I don't think anyone will file any new bugs, functionality wise.

It also means that there's no loss by removing it.

 If we remove the package, do we also lose all the bugs filed against it?

No. Bugs which only apply to the version(s) in testing or unstable will
be closed by the removal, bugs found in versions in oldstable and
stable will remain open. (oldstable until the next stable freeze
starts). Packages are not removed from stable or oldstable.

Bugs are never deleted (except spam ones) - the bug will be closed and
archived but it can always be unarchived and reopened (in that order).

 Some of them are still valid issues which will be addressed in the new 
 package.

If the package is reintroduced, the old bugs will be available to be
re-opened and tested with the new version. The bug numbers remain the
same and because there is a version of the package in stable, the index
page for the package will remain too. It is trivial to switch that page
to looking at archived bugs instead of the default unarchived.

 For the functionality bugs, I plan to give a notice to try the new
 package once it is released and close the ones I get no answer after
 some period (e.g. 1-2 months)

Does that mean you will be adopting kismet as maintainer after the
Wheezy release? 

 Also, I think the procedures for uploading new/heavily updated
 packages is different.

During a release freeze, yes - major changes and new packages should
be uploaded to experimental only. Outside the freeze, major changes and
new packages can go to either experimental or unstable.

 One should pass through the new queue, the
 other through experimental.

No. A package which has been removed will always go back through NEW if
it is reintroduced. After going through the NEW queue, it can go into
either experimental or unstable.

If the package has not been removed, a new upload won't go through NEW
whether it's aimed at experimental or unstable.

-- 


Neil Williams
=
http://www.linux.codehelp.co.uk/



pgpjYa2hGRc9I.pgp
Description: PGP signature


Bug#695355: marked as done (unblock: libwmf/0.2.8.4-10.2)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 10:39:35 +0100
with message-id 50c850d7.70...@thykier.net
and subject line Re: Bug#695355: unblock: libwmf/0.2.8.4-10.2
has caused the Debian Bug report #695355,
regarding unblock: libwmf/0.2.8.4-10.2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695355: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695355
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libwmf

The version in unstable fixes

 * #685802 RC. Failure to load fonts.
 * #677786 missing Multi-Arch blocks ia32-libs-gtk.

Please find a debdiff from wheezy to sid attached. Observe that the only
two files changed are debian/changelog and debian/control.

unblock libwmf/0.2.8.4-10.2

Helmut
diff -Nru libwmf-0.2.8.4/debian/changelog libwmf-0.2.8.4/debian/changelog
--- libwmf-0.2.8.4/debian/changelog 2012-01-06 00:53:36.0 +0100
+++ libwmf-0.2.8.4/debian/changelog 2012-11-29 17:28:35.0 +0100
@@ -1,3 +1,20 @@
+libwmf (0.2.8.4-10.2) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Add Multi-Arch headers. (Closes: #677786)
+The support was basically there. libwmf0.2-7 already ships libraries in
+/usr/lib/triplet. No changes besides adding headers were necessary.
+
+ -- Helmut Grohne hel...@subdivi.de  Thu, 29 Nov 2012 17:26:47 +0100
+
+libwmf (0.2.8.4-10.1) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * debian/control
+- libwmf-bin: Depends: gsfonts fixes font load error (Closes: #685802)
+
+ -- Hideki Yamane henr...@debian.org  Thu, 20 Sep 2012 13:09:11 +0900
+
 libwmf (0.2.8.4-10) unstable; urgency=low
 
   * Read libwmf binary package name from control in rules.
diff -Nru libwmf-0.2.8.4/debian/control libwmf-0.2.8.4/debian/control
--- libwmf-0.2.8.4/debian/control   2012-01-06 00:29:18.0 +0100
+++ libwmf-0.2.8.4/debian/control   2012-11-29 17:26:39.0 +0100
@@ -22,6 +22,7 @@
 Pre-Depends: ${misc:Pre-Depends}
 Depends: ${misc:Depends}, ${shlibs:Depends}
 Recommends: gsfonts
+Multi-Arch: same
 Description: Windows metafile conversion library
  Windows metafile (WMF) is a picture format used by many Windows
  programs, e.g. Microsoft Word.  libwmf is a library for interpreting
@@ -34,6 +35,8 @@
 Section: graphics
 Architecture: any
 Depends: ${misc:Depends}, ${shlibs:Depends}
+Recommends: gsfonts
+Multi-Arch: foreign
 Description: Windows metafile conversion tools
  Windows metafile (WMF) is a picture format used by many Windows
  programs, e.g. Microsoft Word.  libwmf is a library for interpreting
---End Message---
---BeginMessage---
On 2012-12-07 15:29, Helmut Grohne wrote:
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: unblock
 
 Please unblock package libwmf
 
 The version in unstable fixes
 
  * #685802 RC. Failure to load fonts.
  * #677786 missing Multi-Arch blocks ia32-libs-gtk.
 
 Please find a debdiff from wheezy to sid attached. Observe that the only
 two files changed are debian/changelog and debian/control.
 
 unblock libwmf/0.2.8.4-10.2
 
 Helmut

Unblocked, thanks.

~Niels---End Message---


Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Dominik George
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear release managers,

today, I chose to fix RC bug #694998. It is a security issue with 
MediaWiki 1.19.2 currently in testing, and there are two ways of fixing 
this issue. The easiest would be to get the new upstream version 1.19.3 
into testing. I created the new package and a debdiff [2]. This diff is 
quite large because the update also incorporates tons of translation 
updates.

The other possibility is to backport the changes for the security fixes to 
1.19.2, which is also non-problematic. I prepared a debdiff for that as 
well [3].

The question is if the release team would grant a freeze exception for the 
new upstream version 1.19.3, maybe considering the translation changes 
non-critical?

Looking forward to your feedback,
Nik

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694998
[2] http://shore.naturalnet.de/~nik/mediawiki_1.19.2-2_1.19.3-0.1.debdiff
[3] http://shore.naturalnet.de/~nik/mediawiki_1.19.2-2_1.19.2-2.1.debdiff

- -- 
* mirabilos is handling my post-1990 smartphone *
mirabilos Aaah, it vibrates! Wherefor art thou, daemonic device??

PGP fingerprint: 2086 9A4B E67D 1DCD FFF6  F6C1 59FC 8E1D 6F2A 8001
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQFOBAEBCAA4BQJQyFTLMRpodHRwczovL3d3dy5kb21pbmlrLWdlb3JnZS5kZS9n
cGctcG9saWN5LnR4dC5hc2MACgkQWfyOHW8qgAGdNQgAjgT7dKHee7zBD+PD5991
PmNTsx+r84ynlUaibX8i5R7OUErC8h5wRraAe/XYHEeHSRyjYnEFatbMbYvKRzZD
CZxBlbNNvDcTV/UjhgBMIaNfaQZxYoxCktuMVuhdDrFv6A6T7flAJPNEmh7ATS+Q
fci4QLLtZg2F1v1y+8NyWQHk8CwEoXtOplZBR9kHgVTZMWVBUI//wsJr0wIAY11A
5c9yhaUFUHIWAx1c2zw74+MaqMAbBiYav3LGXBdTbMscihFcxtql4/s8+xgVHeCn
aYrSsHE984MdjI1BiYqygiBWNWjBiEc4hTGZI2GPWByORJMBM1QjqZUha3KzSZ5Z
+w==
=xOmo
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/alpine.deb.2.02.1212121002080.5...@keks.naturalnet.de



Re: Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Niels Thykier
On 2012-12-12 10:58, Dominik George wrote:
 Dear release managers,
 
 today, I chose to fix RC bug #694998. It is a security issue with 
 MediaWiki 1.19.2 currently in testing, and there are two ways of fixing 
 this issue. The easiest would be to get the new upstream version 1.19.3 
 into testing. I created the new package and a debdiff [2]. This diff is 
 quite large because the update also incorporates tons of translation 
 updates.
 
 The other possibility is to backport the changes for the security fixes to 
 1.19.2, which is also non-problematic. I prepared a debdiff for that as 
 well [3].
 
 The question is if the release team would grant a freeze exception for the 
 new upstream version 1.19.3, maybe considering the translation changes 
 non-critical?
 
 Looking forward to your feedback,
 Nik
 
 [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694998
 [2] http://shore.naturalnet.de/~nik/mediawiki_1.19.2-2_1.19.3-0.1.debdiff
 [3] http://shore.naturalnet.de/~nik/mediawiki_1.19.2-2_1.19.2-2.1.debdiff
 
 
 

Hi,

If 1.19.3 is just the security fix + translations, I'd be willing to
allow the translations as well.  If there is more changes beyond that
then it depends (defaulting to no).
  Can you provide us with a filtered debfiff of the 1.19.3?  Just
remember to let us know what filtering you used (e.g. filterdiff -x
'*/messages/Messages*.php' ).

~Niels


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c85c0a.7020...@thykier.net



Bug#691115: unblock libdvdread/4.2.0+20120521-3

2012-12-12 Thread intrigeri
Hi,

Dmitry Smirnov wrote (12 Dec 2012 01:16:15 GMT) :
 There were no reply from maintainer in #688574 so perhaps it would
 be better to set Daniel as owner of this bug...

Please do it if you feel it's useful.

A full new upstream version was uploaded to unstable since
then, so an update in testing would now have to go through t-p-u.
Given the crash fixed by 4.2.0+20120521-3 has severity normal,
I'm unsure it's worth the effort.

Dmitry, you filed the unblock request that is now outdated,
what do you think?

 IMHO even if fix is not implemented properly it is still prevent certain 
 crashes which can't be worse than what's in testing right now.

I'm not sure this would be worse than what's in testing right now, but
let's acknowledge that the fix has potential for future regressions,
and does not only bring good: using internal implementation details of
other libraries results in code that can break without notice, in the
future, when the depended upon library is updated.

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85txrr8sw9@boum.org



Re: Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Thorsten Glaser
On Wed, 12 Dec 2012, Niels Thykier wrote:

 On 2012-12-12 10:58, Dominik George wrote:
  Dear release managers,
  
  today, I chose to fix RC bug #694998. It is a security issue with 

To be exact, I asked Dominik whether he can have a look at it
and review it (and ask the Release Team) because I currently
lack time to do that in-depth and he’s eager to help RC bug fixing…

  MediaWiki 1.19.2 currently in testing, and there are two ways of fixing 
  this issue. The easiest would be to get the new upstream version 1.19.3 
  into testing.

From the pkg-mw side this would of course be preferred because
it would make later fixes easier, and the MW upstream sort of
agreed to support 1.19 longer for us, when we in turn keep MW
in good shape in Debian ;-)

  I created the new package and a debdiff [2]. This diff is 
  quite large because the update also incorporates tons of translation 
  updates.

I suggested to use diff -wup and exclude the translations;
I’ve already done that for 1.19.2.

 If 1.19.3 is just the security fix + translations, I'd be willing to
 allow the translations as well.

OK, thanks. Let’s hope it’ll be just fixes.

Thanks Dominik for having a look.

bye,
//mirabilos
-- 
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-314
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Boris Esser, Sebastian Mancke


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/alpine.deb.2.02.1212121130150.2...@tglase.lan.tarent.de



Processed: tagging 662513

2012-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 662513 - moreinfo
Bug #662513 [release.debian.org] RM: emboss/6.3.1-6
Removed tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
662513: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662513
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.135530836822481.transcr...@bugs.debian.org



Bug#689147: unblock: gajim/0.15.1-1

2012-12-12 Thread intrigeri
Hi,

Yann Leboulanger wrote (12 Dec 2012 07:57:30 GMT) :
 On 12/12/2012 01:37 AM, intrigeri wrote:
 Looks like this should be added to the embedded code copies list,
 regardless of the minor diff:
 https://wiki.debian.org/EmbeddedCodeCopies

 This can also be in Gajim itself, and I'll do that for next release.

Great!

However, given this next release is highly unlikely to be in Wheezy,
it looks like Wheezy will ship with a Gajim that *has* a python-gnupg
embedded code copy -- and perhaps Squeeze has too?

Regardless of the future (much welcome!) upstream fixes, information
about the existing code duplication needs to be put on the dedicated
list, so that the security team can react appropriately in case
a security issue is discovered in the duplicated library.

(Adding secure-testing-team into the loop, keeping the unblock bug in
the Cc list too, as I doubt the package should be unblocked without
having a clear view of what's happening with the embedded
python-gnupg.)

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85lid38sf9@boum.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread intrigeri
Hi,

Neil Williams wrote (12 Dec 2012 09:16:52 GMT) :
 One should pass through the new queue, the
 other through experimental.

 No. A package which has been removed will always go back through NEW if
 it is reintroduced. After going through the NEW queue, it can go into
 either experimental or unstable.

Since the discussion has drifted to full removal from the archive,
I'd like to point out that a removal from testing only was requested.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85ehiv8s1l@boum.org



Re: [Pkg-mediawiki-devel] Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Jonathan Wiltshire

On 2012-12-12 10:33, Thorsten Glaser wrote:

On Wed, 12 Dec 2012, Niels Thykier wrote:

If 1.19.3 is just the security fix + translations, I'd be willing to
allow the translations as well.


OK, thanks. Let’s hope it’ll be just fixes.


In general we have been able to trust upstream security releases to be 
well-targeted, so there should be minimal problems for migration to 
Wheezy.



Thanks Dominik for having a look.


Indeed, thanks! Please make sure you take the credit in 
debian/changelog and one of us can sponsor the package.



--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

directhex i have six years of solaris sysadmin experience, from
8-10. i am well qualified to say it is made from bonghits
layered on top of bonghits


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1ee6dad6051392610d0932a8a120f...@hogwarts.powdarrmonkey.net



Re: Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Dominik George
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

   Can you provide us with a filtered debfiff of the 1.19.3?  Just
 remember to let us know what filtering you used (e.g. filterdiff -x
 '*/messages/Messages*.php' ).

find attached the filtered diff. It was created using:

filterdiff \
 -x '*/includes/installer/Installer.i18n.php' \
 -x '*/languages/messages/Messages*.php' \
 -x '*/tests/phpunit/languages/*.php' \
 mediawiki_1.19.2-2_1.19.3-0.1.debdiff \ 
 mediawiki_1.19.2-2_1.19.3-0.1_wo_translations.diff

I'd really appreciate your acknowledgement of 1.19.3 because it would 
really ease life for everyone involved.

Cheers,
Nik

- -- 
* mirabilos is handling my post-1990 smartphone *
mirabilos Aaah, it vibrates! Wherefor art thou, daemonic device??

PGP fingerprint: 2086 9A4B E67D 1DCD FFF6  F6C1 59FC 8E1D 6F2A 8001
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)

iQFOBAEBCAA4BQJQyF7VMRpodHRwczovL3d3dy5kb21pbmlrLWdlb3JnZS5kZS9n
cGctcG9saWN5LnR4dC5hc2MACgkQWfyOHW8qgAHh1gf/S/DBIbBnYJrsamSeU07g
/6rETCAfm2f0EnumpiV6AG8M9+mW8f9u4OmNna3btAErgtg/H+WlN0clTK32/AB/
k3JD7hSwTmG4nTAP7jabPVZO6zdDjpPn1vk4CiKrqKDdf+lr+LrEmgliIjc3Bk21
CQllneMniT7JSpMQoDxb+Ywrwno1XTFfmZrw3RxavhxmV4rxEWLCYBWQP+HpPnNq
+cnprcg3iEd+sDJT7SqWvcmV+jrmN2RfPwKOn3dlIQaNsfyGqayl+fUkn15ClCKG
/hGZ5kKFiFASx6F0qon+QF7/02qpbHE6q1QXEuyuvJ9PIRe2ewuxzUFqZW75H3q3
0w==
=vsZB
-END PGP SIGNATURE-diff -Nru mediawiki-1.19.2/debian/changelog mediawiki-1.19.3/debian/changelog
--- mediawiki-1.19.2/debian/changelog	2012-10-02 14:09:51.0 +0200
+++ mediawiki-1.19.3/debian/changelog	2012-12-12 09:47:27.0 +0100
@@ -1,3 +1,14 @@
+mediawiki (1:1.19.3-0.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * New upstream version fixes security issues (Closes: 694998).
++ Prevent session fixation in Special:UserLogin (CVE-2012-5391)
+  https://bugzilla.wikimedia.org/show_bug.cgi?id=40995
++ Prevent linker regex from exceeding PCRE backtrack limit
+  https://bugzilla.wikimedia.org/show_bug.cgi?id=41400
+
+ -- Dominik George n...@naturalnet.de  Wed, 12 Dec 2012 09:44:08 +0100
+
 mediawiki (1:1.19.2-2) unstable; urgency=low
 
   * debian/watch: mangle the epoch away so DDPO is green again
diff -Nru mediawiki-1.19.2/includes/DefaultSettings.php mediawiki-1.19.3/includes/DefaultSettings.php
--- mediawiki-1.19.2/includes/DefaultSettings.php	2012-08-31 00:25:34.0 +0200
+++ mediawiki-1.19.3/includes/DefaultSettings.php	2012-11-29 19:36:12.0 +0100
@@ -33,7 +33,7 @@
 /** @endcond */
 
 /** MediaWiki version number */
-$wgVersion = '1.19.2';
+$wgVersion = '1.19.3';
 
 /** Name of the site. It must be changed in LocalSettings.php */
 $wgSitename = 'MediaWiki';
diff -Nru mediawiki-1.19.2/includes/GlobalFunctions.php mediawiki-1.19.3/includes/GlobalFunctions.php
--- mediawiki-1.19.2/includes/GlobalFunctions.php	2012-08-31 00:25:34.0 +0200
+++ mediawiki-1.19.3/includes/GlobalFunctions.php	2012-11-29 19:36:12.0 +0100
@@ -3293,6 +3293,23 @@
 }
 
 /**
+ * Check if there is sufficent entropy in php's built-in session generation
+ * PHP's built-in session entropy is enabled if:
+ * - entropy_file is set or you're on Windows with php 5.3.3+
+ * - AND entropy_length is  0
+ * We treat it as disabled if it doesn't have an entropy length of at least 32
+ *
+ * @return bool true = there is sufficient entropy
+ */
+function wfCheckEntropy() {
+	return (
+			( wfIsWindows()  version_compare( PHP_VERSION, '5.3.3', '=' ) )
+			|| ini_get( 'session.entropy_file' )
+		)
+		 intval( ini_get( 'session.entropy_length' ) ) = 32;
+}
+
+/**
  * Override session_id before session startup if php's built-in
  * session generation code is not secure.
  */
@@ -3302,16 +3319,8 @@
 		return;
 	}
 
-	// PHP's built-in session entropy is enabled if:
-	// - entropy_file is set or you're on Windows with php 5.3.3+
-	// - AND entropy_length is  0
-	// We treat it as disabled if it doesn't have an entropy length of at least 32
-	$entropyEnabled = (
-			( wfIsWindows()  version_compare( PHP_VERSION, '5.3.3', '=' ) )
-			|| ini_get( 'session.entropy_file' )
-		)
-		 intval( ini_get( 'session.entropy_length' ) ) = 32;
-	
+	$entropyEnabled = wfCheckEntropy();
+
 	// If built-in entropy is not enabled or not sufficient override php's built in session id generation code
 	if ( !$entropyEnabled ) {
 		wfDebug( __METHOD__ . : PHP's built in entropy is disabled or not sufficient, overriding session id generation using our cryptrand source.\n );
diff -Nru mediawiki-1.19.2/includes/installer/Installer.i18n.php mediawiki-1.19.3/includes/installer/Installer.i18n.php
diff -Nru mediawiki-1.19.2/includes/installer/Installer.php mediawiki-1.19.3/includes/installer/Installer.php
--- mediawiki-1.19.2/includes/installer/Installer.php	2012-08-31 00:25:34.0 +0200
+++ mediawiki-1.19.3/includes/installer/Installer.php	2012-11-29 19:36:12.0 +0100
@@ -756,6 +756,11 @@
 
 	/**
 	 * Environment check for the PCRE module.
+	 *
+	 * @note 

Re: Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Niels Thykier
On 2012-12-12 11:39, Dominik George wrote:
 Hi,
 
Can you provide us with a filtered debfiff of the 1.19.3?  Just
  remember to let us know what filtering you used (e.g. filterdiff -x
  '*/messages/Messages*.php' ).
 find attached the filtered diff. It was created using:
 
 filterdiff \
  -x '*/includes/installer/Installer.i18n.php' \
  -x '*/languages/messages/Messages*.php' \
  -x '*/tests/phpunit/languages/*.php' \
  mediawiki_1.19.2-2_1.19.3-0.1.debdiff \ 
  mediawiki_1.19.2-2_1.19.3-0.1_wo_translations.diff
 
 I'd really appreciate your acknowledgement of 1.19.3 because it would 
 really ease life for everyone involved.
 
 Cheers,

The filtered diff looks reasonable, feel free to upload 1.19.3-0.1 to
unstable.  Please file an unblock bug for it after it has been in
unstable for some time.

~Niels


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c863e0.2050...@thykier.net



Bug#695755: release.debian.org: RM: vserver-debiantools/0.8.1

2012-12-12 Thread intrigeri
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Hi,

I'm requesting removal of vserver-debiantools from Wheezy.
Background is at #693275.
Maintainer's approval is in message #22 there.

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/857gon8rg8@boum.org



Bug#689588: Please unblock cracklib2/2.8.19-2

2012-12-12 Thread Markus Wanner
Niels,

On 12/12/2012 09:04 AM, Niels Thykier wrote:
 In regards to the actual changes, I suspect they are flawed in the
 error-path, see cracklib2.review.

Doh! You are absolutely right. Nice catch, thanks.

I can confirm that I (still) get the correct error message with your
suggested changes (from python, in case of a missing dict, that is):

 exception thrown: [Errno 2] No such file or directory: 
 '/var/cache/cracklib/cracklib_dict.pwd'

That is on my usual work machine (amd64) as well as on a kirkwood
(armv5tel) (both on Debian wheezy).

(I'm surprised it worked before. It certainly did work as expected on
the amd64 system... extensive use of compiler magic, I guess).

The modified patch is attached, as I tested it. I'm sorry for not
getting this correct the first time.

Regards

Markus Wanner
Subject: add a safer check variant
Author: Markus Wanner mar...@bluegap.ch
Bug-Debian: http://bugs.debian.org/682735
--- a/lib/fascist.c
+++ b/lib/fascist.c
@@ -879,6 +879,48 @@
 return res;
 }
 
+/* This Debian specific method is a work-around for Debian #682735. Please
+   do not rely on it being available in future verisons of cracklib2. */
+int
+__DEBIAN_SPECIFIC__SafeFascistCheck(password, path, errstr)
+const char *password;
+const char *path;
+char **errstr;
+{
+PWDICT *pwp;
+char pwtrunced[STRINGSIZE];
+
+/* If passed null for the path, use a compiled-in default */
+if ( ! path )
+{
+	path = DEFAULT_CRACKLIB_DICT;
+}
+
+/* security problem: assume we may have been given a really long
+   password (buffer attack) and so truncate it to a workable size;
+   try to define workable size as something from which we cannot
+   extend a buffer beyond its limits in the rest of the code */
+
+strncpy(pwtrunced, password, TRUNCSTRINGSIZE);
+pwtrunced[TRUNCSTRINGSIZE - 1] = '\0'; /* enforce */
+
+/* perhaps someone should put something here to check if password
+   is really long and syslog() a message denoting buffer attacks?  */
+
+if (!(pwp = PWOpen(path, r)))
+{
+	return 0;
+}
+
+/* sure seems like we should close the database, since we're only likely to check one password */
+*errstr = FascistLook(pwp, pwtrunced);
+
+PWClose(pwp);
+pwp = (PWDICT *)0;
+
+return 1;
+}
+
 const char *
 GetDefaultCracklibDict()
 {
--- a/python/_cracklibmodule.c
+++ b/python/_cracklibmodule.c
@@ -42,6 +42,7 @@
 #ifdef HAVE_LIBINTL_H
 #include libintl.h
 #endif
+#include errno.h
 
 #ifdef HAVE_PTHREAD_H
 static pthread_mutex_t cracklib_mutex = PTHREAD_MUTEX_INITIALIZER;
@@ -74,7 +75,8 @@
 {
 char *candidate, *dict;
 char *defaultdict = NULL;
-const char *result;
+int result;
+char *errmsg;
 struct stat st;
 char *keywords[] = {pw, dictpath, NULL};
 char *dictfile;
@@ -148,7 +150,8 @@
 #endif
 
 LOCK();
-result = FascistCheck(candidate, dict ? dict : defaultdict);
+result = __DEBIAN_SPECIFIC__SafeFascistCheck(candidate,
+		dict ? dict : defaultdict, errmsg);
 UNLOCK();
 
 if (defaultdict != NULL)
@@ -156,11 +159,26 @@
 free(defaultdict);
 }
 
-if (result != NULL)
+if (result)
 {
-	PyErr_SetString(PyExc_ValueError, result);
-return NULL;
+	if (errmsg != NULL)
+	{
+	PyErr_SetString(PyExc_ValueError, errmsg);
+	return NULL;
+	}
+} else {
+	if (errno == 0)
+	{
+	PyErr_SetString(PyExc_RuntimeError, Unable to read cracklib dictionary.);
+	return NULL;
+	}
+	else
+	{
+	PyErr_SetFromErrnoWithFilename(PyExc_ValueError, /var/cache/cracklib_dict.*);
+	return NULL;
+	}
 }
+
 return Py_BuildValue(s, candidate);
 }
 
--- a/lib/crack.h
+++ b/lib/crack.h
@@ -15,6 +15,14 @@
 
 extern const char *FascistCheck(const char *pw, const char *dictpath);
 
+/* This Debian specific method is a work-around for Debian #682735. Please
+   do not rely on it being available in future verisons of cracklib2.
+   Returns 1 (true) for success and 0 (false) in case an error occurred
+   opening or reading the dictionary. In the later case, please check
+   errno. */
+extern int __DEBIAN_SPECIFIC__SafeFascistCheck(const char *pw,
+const char *dictpath, char **errmsg);
+
 /* This function returns the compiled in value for DEFAULT_CRACKLIB_DICT.
  */
 extern const char *GetDefaultCracklibDict(void);
--- a/lib/packlib.c
+++ b/lib/packlib.c
@@ -16,6 +16,7 @@
 #ifdef HAVE_STDINT_H
 #include stdint.h
 #endif
+#include errno.h
 #include packer.h
 
 static const char vers_id[] = packlib.c : v2.3p2 Alec Muffett 18 May 1993;
@@ -156,6 +157,7 @@
 	if (!fread((char *) pdesc.header, sizeof(pdesc.header), 1, ifp))
 	{
 	fprintf(stderr, %s: error reading header\n, prefix);
+	errno = 0;
 
 	pdesc.header.pih_magic = 0;
 	fclose(ifp);
@@ -179,6 +181,7 @@
 if (!fread((char *) pdesc64.header, sizeof(pdesc64.header), 1, ifp))
 {
 fprintf(stderr, %s: error reading header\n, prefix);
+errno = 

Processed: block 693275 with 695755

2012-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 block 693275 with 695755
Bug #693275 [release.debian.org] RM: util-vserver/0.30.216-pre2864-2.1
693275 was not blocked by any bugs.
693275 was not blocking any bugs.
Added blocking bug(s) of 693275: 695755
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
693275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693275
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13553103394033.transcr...@bugs.debian.org



Processed: retitle 695755 to RM: vserver-debiantools/0.8.1

2012-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 695755 RM: vserver-debiantools/0.8.1
Bug #695755 [release.debian.org] release.debian.org: RM: 
vserver-debiantools/0.8.1
Changed Bug title to 'RM: vserver-debiantools/0.8.1' from 'release.debian.org: 
RM: vserver-debiantools/0.8.1'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
695755: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695755
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13553103043753.transcr...@bugs.debian.org



Bug#693275: RM: util-vserver/0.30.216-pre2864-2.1

2012-12-12 Thread intrigeri
Ola Lundqvist wrote (12 Dec 2012 05:35:25 GMT) :
 Please remove vserver-debiantools as well.

Requested in #695755, thanks.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85zk1j7coh@boum.org



Bug#695756: unblock: ample/0.5.7-7

2012-12-12 Thread Michael Stapelberg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ample

The new version moves the pidfile to /var/run/ample.pid and drops
privileges in ample itself (instead of via start-stop-daemon), both to
fix #689769)

Debdiff is attached.

unblock ample/0.5.7-7

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (600, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.3.4-1-suspendconsole (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
diff -u ample-0.5.7/debian/init.d ample-0.5.7/debian/init.d
--- ample-0.5.7/debian/init.d
+++ ample-0.5.7/debian/init.d
@@ -17,8 +17,8 @@
 DESC=AMPLE mp3 server
 NAME=ample
 DAEMON=/usr/bin/$NAME
-DAEMON_ARGS=-c /etc/ample/ample.conf -i /var/run/ample/$NAME.pid
-PIDFILE=/var/run/ample/$NAME.pid
+DAEMON_ARGS=-c /etc/ample/ample.conf -i /var/run/$NAME.pid
+PIDFILE=/var/run/$NAME.pid
 SCRIPTNAME=/etc/init.d/$NAME
 
 # Exit if the package is not installed
@@ -36,29 +36,22 @@
 fi
 
 if [ $DEFUSER -a $DEFGROUP ] ; then
-	CHUID=--chuid $DEFUSER:$DEFGROUP
+	DAEMON_ARGS=$DAEMON_ARGS -u $DEFUSER -g $DEFGROUP
 fi
 
 test $STARTAMPLE = yes || exit 0
 
 . /lib/lsb/init-functions
 
-if ! [ -d /var/run/ample ] ; then
-	mkdir -p /var/run/ample || true
-	if [ -d /var/run/ample ] ; then
-		chown ${DEFUSER:-nobody}:${DEFGROUP:-nogroup} /var/run/ample
-	fi
-fi
-
 do_start()
 {
 	# Return
 	#   0 if daemon has been started
 	#   1 if daemon was already running
 	#   2 if daemon could not be started
-	start-stop-daemon --start $CHUID --pidfile $PIDFILE --exec $DAEMON --test  /dev/null \
+	start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON --test  /dev/null \
 		|| return 1
-	start-stop-daemon --start $CHUID --pidfile $PIDFILE --exec $DAEMON -- \
+	start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON -- \
 		$DAEMON_ARGS \
 		|| return 2
 }
diff -u ample-0.5.7/debian/changelog ample-0.5.7/debian/changelog
--- ample-0.5.7/debian/changelog
+++ ample-0.5.7/debian/changelog
@@ -1,3 +1,12 @@
+ample (0.5.7-7) unstable; urgency=low
+
+  * QA upload.
+  * Move pidfile to /var/run/ample.pid (Closes: #689769)
+  * Drop privileges in ample, not with start-stop-daemon, so that pidfile can
+be created without being owned by nobody:nogroup.
+
+ -- Michael Stapelberg stapelb...@debian.org  Tue, 04 Dec 2012 22:05:44 +0100
+
 ample (0.5.7-6.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -u ample-0.5.7/debian/postrm ample-0.5.7/debian/postrm
--- ample-0.5.7/debian/postrm
+++ ample-0.5.7/debian/postrm
@@ -3,12 +3,7 @@
 set -e
 
 case $1 in
-purge|remove)
-if [ -d /var/run/ample ]; then
-rmdir /var/run/ample || true
-fi
-;;
-upgrade|abort-upgrade|failed-upgrade|abort-install|disapper)
+purge|remove|upgrade|abort-upgrade|failed-upgrade|abort-install|disapper)
 ;;
 
 *)
diff -u ample-0.5.7/debian/control ample-0.5.7/debian/control
--- ample-0.5.7/debian/control
+++ ample-0.5.7/debian/control
@@ -1,7 +1,7 @@
 Source: ample
 Section: sound
 Priority: optional
-Maintainer: Rene Mayorga rmayo...@debian.org.sv
+Maintainer: Debian QA Group packa...@qa.debian.org
 Build-Depends: debhelper (= 7), libwrap0-dev, quilt, lsb-base (= 3.0-6)
 Standards-Version: 3.8.0
 Homepage: http://ample.sourceforge.net
diff -u ample-0.5.7/debian/patches/series ample-0.5.7/debian/patches/series
--- ample-0.5.7/debian/patches/series
+++ ample-0.5.7/debian/patches/series
@@ -4,2 +4,3 @@
 add_pidfile_option.patch
+add_user_group.patch
 #add_i_option_to_manpage.patch
only in patch2:
unchanged:
--- ample-0.5.7.orig/debian/patches/add_user_group.patch
+++ ample-0.5.7/debian/patches/add_user_group.patch
@@ -0,0 +1,80 @@
+diff --git i/src/ample.c w/src/ample.c
+index da14086..622a152 100644
+--- i/src/ample.c
 w/src/ample.c
+@@ -54,6 +54,8 @@
+ int allow_severity = LOG_INFO;
+ int deny_severity = LOG_WARNING;
+ #endif
++#include pwd.h
++#include grp.h
+ 
+ 
+ #include ample.h
+@@ -502,6 +504,23 @@ main(int argc, char *argv[])
+ 	/**/
+ 
+ 	preparelog();
++
++if(gconf.group) {
++struct group *pwent = getgrnam(gconf.group);
++if (pwent == NULL)
++die(No such group);
++if (setgid(pwent-gr_gid) != 0)
++die(Could not setgid());
++}
++
++if(gconf.user) {
++struct passwd *pwent = getpwnam(gconf.user);
++if (pwent == NULL)
++die(No such user);
++if (setuid(pwent-pw_uid) != 0)
++die(Could not change to specified user);
++}
++
+ 	if(!gconf.inetd)
+ 		logmsg(Ample/%s started\n, AMPLE_VERSION);
+ 
+diff --git i/src/ample.h w/src/ample.h
+index 68f0f90..297f9d7 100644
+--- i/src/ample.h
 w/src/ample.h
+@@ -37,6 +37,8 @@ struct global_config 

Bug#689588: Please unblock cracklib2/2.8.19-2

2012-12-12 Thread Jan Dittberner
On Wed, Dec 12, 2012 at 11:55:14AM +0100, Markus Wanner wrote:
 Niels,
 
 On 12/12/2012 09:04 AM, Niels Thykier wrote:
  In regards to the actual changes, I suspect they are flawed in the
  error-path, see cracklib2.review.
 
 Doh! You are absolutely right. Nice catch, thanks.
 
 I can confirm that I (still) get the correct error message with your
 suggested changes (from python, in case of a missing dict, that is):
 
  exception thrown: [Errno 2] No such file or directory: 
  '/var/cache/cracklib/cracklib_dict.pwd'
 
 That is on my usual work machine (amd64) as well as on a kirkwood
 (armv5tel) (both on Debian wheezy).
 
 (I'm surprised it worked before. It certainly did work as expected on
 the amd64 system... extensive use of compiler magic, I guess).
 
 The modified patch is attached, as I tested it. I'm sorry for not
 getting this correct the first time.

Thanks for the updated patch. I'll create an updated package and send a new
debdiff ASAP.


Best regards
Jan

-- 
Jan Dittberner - Debian Developer
GPG-key: 4096R/558FB8DD 2009-05-10
 B2FF 1D95 CE8F 7A22 DF4C  F09B A73E 0055 558F B8DD
http://www.dittberner.info/


signature.asc
Description: Digital signature


Bug#690075: unblock: dnsmasq/2.63-4

2012-12-12 Thread intrigeri
Hi,

intrigeri wrote (14 Nov 2012 23:58:44 GMT) :
 Simon Kelley wrote (12 Nov 2012 21:05:35 GMT) :
 I'd strongly suggest moving to 2.63-4, rather than backporting.
 The changes for the security fix are not trivial, and probablity of
 introducing a bug backporting is much larger that the probablity
 that there's an un-found bug in 2.63 which is not in 2.62. There are
 no intended backwards incompatibilities between 2.63 and 2.62, and
 no un-intended ones have been found in the three months since 2.63
 was released.

 Then, this matter goes way out of the scope of my humble help the
 release team with a few easy reviews effort.

A new upstream release was uploaded to unstable since then, so this
unblock request can't be satisfied as is. Please either update or
close it.

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85pq2f7cfj@boum.org



Re: [Pkg-mediawiki-devel] Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Platonides
 If 1.19.3 is just the security fix + translations, I'd be willing to
 allow the translations as well.
 
 OK, thanks. Let’s hope it’ll be just fixes.
 
 Thanks Dominik for having a look.


From the changelog of 1.19.3:
 +=== Changes since 1.19.2 ===
 +* (bug 40995) Prevent session fixation in Special:UserLogin (CVE-2012-5391)
 +* (bug 41400) Prevent linker regex from exceeding PCRE backtrack limit
 +* Increase permitted runtime for testParserTest (only used for continuous
 +  integration).
 +* Updated messages translations from http://translatewiki.net/

There's also a change in an error path (b45cb08) which could or could
not be related to the pcre changes (same author).

The Increase permitted runtime for testParserTest is a comment in the
docblock to tag the test as slow (67c844ca).
Specifically, it's unrelated to the change in LanguageTest.php which was
needed due to the localisation update to the time abbreviatures (8319670).

The changes can be viewed with:
 git diff 1.19.2  1.19.3 | filterdiff -x
*/languages/messages/Messages*.php -x
*/includes/installer/Installer.i18n.php -x
*/tests/phpunit/languages/LanguageTest.php


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c863bd.4040...@gmail.com



Bug#693275: marked as done (RM: util-vserver/0.30.216-pre2864-2.1)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 12:19:53 +0100
with message-id 50c86859.9080...@thykier.net
and subject line Re: Bug#693275: RM: util-vserver/0.30.216-pre2864-2.1
has caused the Debian Bug report #693275,
regarding RM: util-vserver/0.30.216-pre2864-2.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
693275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693275
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Hi,

I'm requesting removal of util-vserver from wheezy. 

Due to the fact that the kernel team decided not to provide Linux-Vserver
patches, I have not updated the user-space utilities.  As a result, the version
that is in wheezy now is the same as is in squeeze. It is too late to update
them to a newer upstream version due to the freeze, so I am requesting the
removal as this version is too old to be useful for anyone.

Micah

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
On 2012-12-12 12:05, intrigeri wrote:
 Ola Lundqvist wrote (12 Dec 2012 05:35:25 GMT) :
 Please remove vserver-debiantools as well.
 
 Requested in #695755, thanks.
 
 

Removal hint for both packages added, thanks.

~Niels---End Message---


Bug#695755: marked as done (RM: vserver-debiantools/0.8.1)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 12:18:06 +0100
with message-id 50c867ee.5020...@thykier.net
and subject line Re: Bug#695755: release.debian.org: RM: 
vserver-debiantools/0.8.1
has caused the Debian Bug report #695755,
regarding RM: vserver-debiantools/0.8.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695755: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695755
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Hi,

I'm requesting removal of vserver-debiantools from Wheezy.
Background is at #693275.
Maintainer's approval is in message #22 there.

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
---End Message---
---BeginMessage---
On 2012-12-12 12:01, intrig...@debian.org wrote:
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: rm
 
 Hi,
 
 I'm requesting removal of vserver-debiantools from Wheezy.
 Background is at #693275.
 Maintainer's approval is in message #22 there.
 
 Cheers,
 --
   intrigeri
   | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
   | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
 
 

Removal hint added, thanks.

~Niels---End Message---


Bug#695756: marked as done (unblock: ample/0.5.7-7)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 12:22:08 +0100
with message-id 50c868e0.6030...@thykier.net
and subject line Re: Bug#695756: unblock: ample/0.5.7-7
has caused the Debian Bug report #695756,
regarding unblock: ample/0.5.7-7
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695756: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695756
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package ample

The new version moves the pidfile to /var/run/ample.pid and drops
privileges in ample itself (instead of via start-stop-daemon), both to
fix #689769)

Debdiff is attached.

unblock ample/0.5.7-7

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (600, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.3.4-1-suspendconsole (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
diff -u ample-0.5.7/debian/init.d ample-0.5.7/debian/init.d
--- ample-0.5.7/debian/init.d
+++ ample-0.5.7/debian/init.d
@@ -17,8 +17,8 @@
 DESC=AMPLE mp3 server
 NAME=ample
 DAEMON=/usr/bin/$NAME
-DAEMON_ARGS=-c /etc/ample/ample.conf -i /var/run/ample/$NAME.pid
-PIDFILE=/var/run/ample/$NAME.pid
+DAEMON_ARGS=-c /etc/ample/ample.conf -i /var/run/$NAME.pid
+PIDFILE=/var/run/$NAME.pid
 SCRIPTNAME=/etc/init.d/$NAME
 
 # Exit if the package is not installed
@@ -36,29 +36,22 @@
 fi
 
 if [ $DEFUSER -a $DEFGROUP ] ; then
-	CHUID=--chuid $DEFUSER:$DEFGROUP
+	DAEMON_ARGS=$DAEMON_ARGS -u $DEFUSER -g $DEFGROUP
 fi
 
 test $STARTAMPLE = yes || exit 0
 
 . /lib/lsb/init-functions
 
-if ! [ -d /var/run/ample ] ; then
-	mkdir -p /var/run/ample || true
-	if [ -d /var/run/ample ] ; then
-		chown ${DEFUSER:-nobody}:${DEFGROUP:-nogroup} /var/run/ample
-	fi
-fi
-
 do_start()
 {
 	# Return
 	#   0 if daemon has been started
 	#   1 if daemon was already running
 	#   2 if daemon could not be started
-	start-stop-daemon --start $CHUID --pidfile $PIDFILE --exec $DAEMON --test  /dev/null \
+	start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON --test  /dev/null \
 		|| return 1
-	start-stop-daemon --start $CHUID --pidfile $PIDFILE --exec $DAEMON -- \
+	start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON -- \
 		$DAEMON_ARGS \
 		|| return 2
 }
diff -u ample-0.5.7/debian/changelog ample-0.5.7/debian/changelog
--- ample-0.5.7/debian/changelog
+++ ample-0.5.7/debian/changelog
@@ -1,3 +1,12 @@
+ample (0.5.7-7) unstable; urgency=low
+
+  * QA upload.
+  * Move pidfile to /var/run/ample.pid (Closes: #689769)
+  * Drop privileges in ample, not with start-stop-daemon, so that pidfile can
+be created without being owned by nobody:nogroup.
+
+ -- Michael Stapelberg stapelb...@debian.org  Tue, 04 Dec 2012 22:05:44 +0100
+
 ample (0.5.7-6.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -u ample-0.5.7/debian/postrm ample-0.5.7/debian/postrm
--- ample-0.5.7/debian/postrm
+++ ample-0.5.7/debian/postrm
@@ -3,12 +3,7 @@
 set -e
 
 case $1 in
-purge|remove)
-if [ -d /var/run/ample ]; then
-rmdir /var/run/ample || true
-fi
-;;
-upgrade|abort-upgrade|failed-upgrade|abort-install|disapper)
+purge|remove|upgrade|abort-upgrade|failed-upgrade|abort-install|disapper)
 ;;
 
 *)
diff -u ample-0.5.7/debian/control ample-0.5.7/debian/control
--- ample-0.5.7/debian/control
+++ ample-0.5.7/debian/control
@@ -1,7 +1,7 @@
 Source: ample
 Section: sound
 Priority: optional
-Maintainer: Rene Mayorga rmayo...@debian.org.sv
+Maintainer: Debian QA Group packa...@qa.debian.org
 Build-Depends: debhelper (= 7), libwrap0-dev, quilt, lsb-base (= 3.0-6)
 Standards-Version: 3.8.0
 Homepage: http://ample.sourceforge.net
diff -u ample-0.5.7/debian/patches/series ample-0.5.7/debian/patches/series
--- ample-0.5.7/debian/patches/series
+++ ample-0.5.7/debian/patches/series
@@ -4,2 +4,3 @@
 add_pidfile_option.patch
+add_user_group.patch
 #add_i_option_to_manpage.patch
only in patch2:
unchanged:
--- ample-0.5.7.orig/debian/patches/add_user_group.patch
+++ ample-0.5.7/debian/patches/add_user_group.patch
@@ -0,0 +1,80 @@
+diff --git i/src/ample.c w/src/ample.c
+index da14086..622a152 100644
+--- i/src/ample.c
 w/src/ample.c
+@@ -54,6 +54,8 @@
+ int allow_severity = LOG_INFO;
+ int deny_severity = LOG_WARNING;
+ #endif
++#include pwd.h
++#include grp.h
+ 
+ 
+ #include ample.h
+@@ -502,6 +504,23 @@ main(int argc, char *argv[])
+ 	/**/
+ 
+ 	preparelog();

Bug#689147: unblock: gajim/0.15.1-1

2012-12-12 Thread Yann Leboulanger

On 12/12/2012 11:40, intrigeri wrote:

Hi,

Yann Leboulanger wrote (12 Dec 2012 07:57:30 GMT) :

On 12/12/2012 01:37 AM, intrigeri wrote:

Looks like this should be added to the embedded code copies list,
regardless of the minor diff:
https://wiki.debian.org/EmbeddedCodeCopies



This can also be in Gajim itself, and I'll do that for next release.


Great!

However, given this next release is highly unlikely to be in Wheezy,
it looks like Wheezy will ship with a Gajim that *has* a python-gnupg
embedded code copy -- and perhaps Squeeze has too?

Regardless of the future (much welcome!) upstream fixes, information
about the existing code duplication needs to be put on the dedicated
list, so that the security team can react appropriately in case
a security issue is discovered in the duplicated library.

(Adding secure-testing-team into the loop, keeping the unblock bug in
the Cc list too, as I doubt the package should be unblocked without
having a clear view of what's happening with the embedded
python-gnupg.)


Ok then we wait for an answer from secure-testing-team? I don't think I 
need to do somthing, do I?


note that the version of GnuPG in Gajim also handles some more errors 
like KEYEXPIRED and SIGEXPIRED.


--
Yann


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c86f81.7050...@lagaule.org



Bug#695761: unblock: debian-edu/1.702 and debian-edu-config/1.702

2012-12-12 Thread Holger Levsen
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
x-debbugs-cc: debian-...@lists.debian.org

Hi,

please unblock debian-edu/1.702 and debian-edu-config/1.702 even though the 
changes don't match the release policy, however, in previous years Debian Edu 
packages were allowed to still migrate anyway, as these changes can only harm 
the Debian Edu wheezy release (and because Debian Edu is a distro within 
Debian). Just as a change this time I'm asking for unblocks before the 
changelog diff alone has reached 100 lines ;-)

The current state of the Debian Edu wheezy release (=the diff to Debian 
wheezy) can be seen here:
http://ftp.skolelinux.org/skolelinux/wheezy_needs_love.html

debian-edu (1.702) unstable; urgency=low

  [ Andreas Tille ]
  * debian/control.stub:
 - Fix VCS fields.
 - Bump Standards-Version to 3.9.3 (no changes needed)
 - Versioned Build-Depends blends-dev (= 0.6.15) (because lower
   versions might cause upgrading problems).

  [ Petter Reinholdtsen ]
  * Change education-tasks to work with tasksel in wheezy, depend on
tasksel (= 3.00) and build-depend on blends-dev (= 0.6.16.2), to
make sure our tasks show up in tasksel and is installable by
tasksel.  (Closes: #694895)
  * Update tasksel tasks and meta package content to match the package
content currently available in Debian/Wheezy.

 -- Petter Reinholdtsen p...@debian.org  Tue, 04 Dec 2012 12:43:37 +0100

debian-edu-config (1.702) unstable; urgency=low

  [ Mike Gabriel ]
  * In gosa-create script: Invalidate libnss cache before applying chown
on new home directories. Fixes multiple failures during mass user
import into GOsa².
  * password-fix-squeeze-r0: allow home[0-9] as home directory.
  * Fix smbaddclient.sh, use ,,set +e'' instead of non-bash-syntax
,,unset -e''.

 -- Petter Reinholdtsen p...@debian.org  Sun, 02 Dec 2012 12:20:39 +0100

Please note that debian-edu 1.702 needs blends/0.6.16-2 to build, for which a 
seperate unblock request (#693700) has been filed.


Thanks,
Holger


signature.asc
Description: This is a digitally signed message part.


Re: Question on proposed integration of MediaWiki 1.19.3 in wheezy

2012-12-12 Thread Thorsten Glaser
On Wed, 12 Dec 2012, Niels Thykier wrote:

 The filtered diff looks reasonable, feel free to upload 1.19.3-0.1 to
 unstable.  Please file an unblock bug for it after it has been in
 unstable for some time.

Thanks Niels.

Dominik, please commit the changes needed, version as 1:1.19.3-1
and mark as “* Team upload”, then Jonathan or I can build and
upload it, now that you’re in the Alioth team.

I’ll even squeeze in some testing in a fusionforge setting ;-)

bye,
//mirabilos
-- 
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-314
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Boris Esser, Sebastian Mancke


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/alpine.deb.2.02.1212121347000.2...@tglase.lan.tarent.de



Bug#695764: unblock: packagekit/0.7.6-2

2012-12-12 Thread Matthias Klumpp
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package packagekit

The new PackageKit revision contains very important fixes for the PK Aptcc
backend.
The bugs found lead to wrong behaviour of the Aptcc backend, e.g. marking
packages as auto-installed if they aren't or emitting/not emitting information
about packages from untrusted sources.
Also, a locking issue is removed, causing packagekitd not to release archive
locks immediately.
It would be great if these patches go into Wheezy, because they fix serious
malfunctions.
Of course, no public API is touched. All patches are available upstream too and
are tested.

At time, because of the DM-permission-migration, the package is not yet
uploaded, but I will be available in unstable this week. (I thought notifying
about this earlier is a good idea)

A full debdiff between the two revisions is attached.
Kind regards,
Matthias

unblock packagekit/0.7.6-2

-- System Information:
Debian Release: wheezy/sid
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.5.0-19-generic (SMP w/2 CPU cores)
diff -Nru packagekit-0.7.6/debian/changelog packagekit-0.7.6/debian/changelog
--- packagekit-0.7.6/debian/changelog	2012-08-21 16:46:20.0 +0200
+++ packagekit-0.7.6/debian/changelog	2012-12-10 20:26:59.0 +0100
@@ -1,3 +1,13 @@
+packagekit (0.7.6-2) unstable; urgency=low
+
+  * aptcc: Release remaining lock on the archive after
+ a transaction has completed
+  * aptcc: Fix trusted/untrusted package handling
+  * aptcc: Don't accidentially mark packages as auto-installed
+  * Removed some unused build dependencies
+
+ -- Matthias Klumpp matth...@tenstral.net  Mon, 10 Dec 2012 19:16:33 +0100
+
 packagekit (0.7.6-1) unstable; urgency=low
 
   * New upstream bugfix release: 0.7.6
diff -Nru packagekit-0.7.6/debian/control packagekit-0.7.6/debian/control
--- packagekit-0.7.6/debian/control	2012-08-21 16:46:20.0 +0200
+++ packagekit-0.7.6/debian/control	2012-12-10 20:26:59.0 +0100
@@ -14,7 +14,6 @@
gtk-doc-tools,
libapt-pkg-dev (= 0.8.14),
libarchive-dev,
-   libcppunit-dev,
libgirepository1.0-dev (= 0.10.1),
libglib2.0-dev (= 2.24),
libgstreamer-plugins-base0.10-dev,
@@ -22,8 +21,6 @@
libgtk2.0-dev (= 2.24),
libnm-glib-dev [linux-any],
libnspr4-dev,
-   libpam0g-dev,
-   libpolkit-backend-1-dev,
libpolkit-gobject-1-dev,
libqt4-dev,
libsqlite3-dev,
diff -Nru packagekit-0.7.6/debian/patches/01_aptcc_untrusted-trusted-pkgs.patch packagekit-0.7.6/debian/patches/01_aptcc_untrusted-trusted-pkgs.patch
--- packagekit-0.7.6/debian/patches/01_aptcc_untrusted-trusted-pkgs.patch	1970-01-01 01:00:00.0 +0100
+++ packagekit-0.7.6/debian/patches/01_aptcc_untrusted-trusted-pkgs.patch	2012-12-10 20:26:59.0 +0100
@@ -0,0 +1,51 @@
+From 580ad4fc6269a8ab85e9136a00d3738037ec0303 Mon Sep 17 00:00:00 2001
+From: Daniel Nicoletti dantt...@gmail.com
+Date: Fri, 30 Nov 2012 19:25:15 -0200
+Subject: [PATCH] aptcc: Fix trusted packages not being emitted when an untrusted package was available
+ Backported to PackageKit 0.7.x series by Matthias Klumpp matth...@tenstral.net
+
+---
+ backends/aptcc/apt-intf.cpp |   27 +--
+ 1 files changed, 17 insertions(+), 10 deletions(-)
+
+--- a/backends/aptcc/apt-intf.cpp
 b/backends/aptcc/apt-intf.cpp
+@@ -1430,21 +1430,26 @@
+ if (untrusted.empty()) {
+ return true;
+ } else if (simulating) {
++// We are just simulating and have untrusted packages emit them
++// and return true to continue processing
+ emitPackages(untrusted, PK_FILTER_ENUM_NONE, PK_INFO_ENUM_UNTRUSTED);
+-}
++} else if (pk_backend_get_bool(m_backend, only_trusted)) {
++ // We are NOT simulating and have untrusted packages
++ // fail the transaction.
++ string warning(The following packages cannot be authenticated:\n);
++ warning += UntrustedList;
++ pk_backend_error_code(m_backend,
++   PK_ERROR_ENUM_CANNOT_INSTALL_REPO_UNSIGNED,
++   warning.c_str());
++ _error-Discard();
+ 
+-if (pk_backend_get_bool(m_backend, only_trusted) == false) {
+-g_debug (Authentication warning overridden.\n);
+-return true;
++ return false;
++} else {
++ // We are NOT simulating and have untrusted packages
++ // But the user didn't set ONLY_TRUSTED flag
++ g_debug (Authentication warning overridden.\n);
++ return true;
+ }
+-
+-string warning(The following packages cannot be authenticated:\n);
+-warning += UntrustedList;
+-pk_backend_error_code(m_backend,
+-  

Bug#685663: Upload to t-p-u

2012-12-12 Thread Mattias Ellert
Hi!

Since there was an RC bug reported against version 2.0.0-3 (some missing
Replaces/Breaks), allowing this version back in to testing again would
not be a good idea. I created a 2.0.0-3+wheezy1 version with the same
fix that is in 2.0.0-5 and uploaded it to testing-proposed-updates.

Mattias



signature.asc
Description: This is a digitally signed message part


Bug#695768: unblock globus-common/14.7-2

2012-12-12 Thread Mattias Ellert
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception

unblock globus-common/14.7-2

globus-common 14.7-2 implements a fix for an RC bug (#694392) that also
affects the current version in testing (14.6-1).

The changes between the 14.6 and 14.7 upstream source versions -
ignoring the autotools generated files (aclocal.m4, Makefile.in,
config.guess, config.sub, configure, install-sh, ltmain.sh, missing) -
only consist of the addition of doxygen documentation to some previously
undocumented functions and changing the version number. So no actual
code changes.

Mattias



signature.asc
Description: This is a digitally signed message part


Bug#695769: unblock: mlterm/3.1.2-1.3

2012-12-12 Thread Ivo De Decker
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Dear release team,

Please unblock mlterm 3.1.2-1.3. It fixes a piuparts upgrade test failure (bugs
#688603, #688604, #688605, #688606, #694153).

The previous fix (in -1.2) creates new problems (hence bug #694153). It seems
something (dpkg?) gets confused and follows the symlink when removing the
files from the old package on upgrade. This removes files from the -common
package (see the piuparts log attached to bug #694153).

My fix just copies the relevant part from the postinst of mlterm and
mlterm-tiny for the other packages. With this change (and a revert of the
changes in -1.2), the piuparts upgrade test works fine. The attached debdiff is
against version -1.1, which is currently in wheezy.

unblock mlterm/3.1.2-1.3


Thanks for all your work on the release!

Ivo


diff -Nru mlterm-3.1.2/debian/changelog mlterm-3.1.2/debian/changelog
--- mlterm-3.1.2/debian/changelog   2012-09-08 16:18:20.0 +0200
+++ mlterm-3.1.2/debian/changelog   2012-12-12 00:34:48.0 +0100
@@ -1,3 +1,19 @@
+mlterm (3.1.2-1.3) unstable; urgency=low
+
+  * Non-maintainer upload.
+  * Don't delete docs in preinst. Create correct symlinks in postinst.
+(closes: #688603, #688604, #688605, #688606, 694153).
+
+ -- Ivo De Decker ivo.dedec...@ugent.be  Wed, 12 Dec 2012 00:34:33 +0100
+
+mlterm (3.1.2-1.2) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Remove previous documentation directories prior to package installation
+(closes: #688603, #688604, #688605, #688606).
+
+ -- Michael Gilbert mgilb...@debian.org  Sun, 18 Nov 2012 07:18:33 +
+
 mlterm (3.1.2-1.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -Nru mlterm-3.1.2/debian/mlterm-im-ibus.postinst 
mlterm-3.1.2/debian/mlterm-im-ibus.postinst
--- mlterm-3.1.2/debian/mlterm-im-ibus.postinst 1970-01-01 01:00:00.0 
+0100
+++ mlterm-3.1.2/debian/mlterm-im-ibus.postinst 2012-12-12 00:12:38.0 
+0100
@@ -0,0 +1,19 @@
+#! /bin/sh
+
+set -e
+
+if [ $1 = configure ]; then
+# Replace documentation directory with symlink
+docdir=/usr/share/doc/mlterm-im-ibus
+if [ -d $docdir -a ! -L $docdir ]; then
+if rmdir $docdir 2/dev/null; then
+ln -sf /usr/share/doc/mlterm-common $docdir
+fi
+fi
+fi
+
+#DEBHELPER#
+
+exit 0
+
+
diff -Nru mlterm-3.1.2/debian/mlterm-im-m17nlib.postinst 
mlterm-3.1.2/debian/mlterm-im-m17nlib.postinst
--- mlterm-3.1.2/debian/mlterm-im-m17nlib.postinst  1970-01-01 
01:00:00.0 +0100
+++ mlterm-3.1.2/debian/mlterm-im-m17nlib.postinst  2012-12-12 
00:12:38.0 +0100
@@ -0,0 +1,19 @@
+#! /bin/sh
+
+set -e
+
+if [ $1 = configure ]; then
+# Replace documentation directory with symlink
+docdir=/usr/share/doc/mlterm-im-m17nlib
+if [ -d $docdir -a ! -L $docdir ]; then
+if rmdir $docdir 2/dev/null; then
+ln -sf /usr/share/doc/mlterm-common $docdir
+fi
+fi
+fi
+
+#DEBHELPER#
+
+exit 0
+
+
diff -Nru mlterm-3.1.2/debian/mlterm-im-scim.postinst 
mlterm-3.1.2/debian/mlterm-im-scim.postinst
--- mlterm-3.1.2/debian/mlterm-im-scim.postinst 1970-01-01 01:00:00.0 
+0100
+++ mlterm-3.1.2/debian/mlterm-im-scim.postinst 2012-12-12 00:12:38.0 
+0100
@@ -0,0 +1,19 @@
+#! /bin/sh
+
+set -e
+
+if [ $1 = configure ]; then
+# Replace documentation directory with symlink
+docdir=/usr/share/doc/mlterm-im-scim
+if [ -d $docdir -a ! -L $docdir ]; then
+if rmdir $docdir 2/dev/null; then
+ln -sf /usr/share/doc/mlterm-common $docdir
+fi
+fi
+fi
+
+#DEBHELPER#
+
+exit 0
+
+
diff -Nru mlterm-3.1.2/debian/mlterm-im-uim.postinst 
mlterm-3.1.2/debian/mlterm-im-uim.postinst
--- mlterm-3.1.2/debian/mlterm-im-uim.postinst  1970-01-01 01:00:00.0 
+0100
+++ mlterm-3.1.2/debian/mlterm-im-uim.postinst  2012-12-12 00:12:38.0 
+0100
@@ -0,0 +1,19 @@
+#! /bin/sh
+
+set -e
+
+if [ $1 = configure ]; then
+# Replace documentation directory with symlink
+docdir=/usr/share/doc/mlterm-im-uim
+if [ -d $docdir -a ! -L $docdir ]; then
+if rmdir $docdir 2/dev/null; then
+ln -sf /usr/share/doc/mlterm-common $docdir
+fi
+fi
+fi
+
+#DEBHELPER#
+
+exit 0
+
+
diff -Nru mlterm-3.1.2/debian/mlterm-tools.postinst 
mlterm-3.1.2/debian/mlterm-tools.postinst
--- mlterm-3.1.2/debian/mlterm-tools.postinst   1970-01-01 01:00:00.0 
+0100
+++ mlterm-3.1.2/debian/mlterm-tools.postinst   2012-12-12 00:12:38.0 
+0100
@@ -0,0 +1,19 @@
+#! /bin/sh
+
+set -e
+
+if [ $1 = configure ]; then
+# Replace documentation directory with symlink
+docdir=/usr/share/doc/mlterm-tools
+if [ -d $docdir -a ! -L $docdir ]; then
+if rmdir $docdir 2/dev/null; then
+ln -sf /usr/share/doc/mlterm-common $docdir
+fi
+fi
+fi
+
+#DEBHELPER#
+
+exit 0
+
+


Bug#695768: marked as done (unblock globus-common/14.7-2)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 15:13:04 +0100
with message-id 50c890f0.6080...@thykier.net
and subject line Re: Bug#695768: unblock globus-common/14.7-2
has caused the Debian Bug report #695768,
regarding unblock globus-common/14.7-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception

unblock globus-common/14.7-2

globus-common 14.7-2 implements a fix for an RC bug (#694392) that also
affects the current version in testing (14.6-1).

The changes between the 14.6 and 14.7 upstream source versions -
ignoring the autotools generated files (aclocal.m4, Makefile.in,
config.guess, config.sub, configure, install-sh, ltmain.sh, missing) -
only consist of the addition of doxygen documentation to some previously
undocumented functions and changing the version number. So no actual
code changes.

Mattias



signature.asc
Description: This is a digitally signed message part
---End Message---
---BeginMessage---
On 2012-12-12 14:01, Mattias Ellert wrote:
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: freeze-exception
 
 unblock globus-common/14.7-2
 
 globus-common 14.7-2 implements a fix for an RC bug (#694392) that also
 affects the current version in testing (14.6-1).
 
 The changes between the 14.6 and 14.7 upstream source versions -
 ignoring the autotools generated files (aclocal.m4, Makefile.in,
 config.guess, config.sub, configure, install-sh, ltmain.sh, missing) -
 only consist of the addition of doxygen documentation to some previously
 undocumented functions and changing the version number. So no actual
 code changes.
 
 Mattias
 

Unblocked, thanks.

~Niels---End Message---


Bug#695673: unblock: apt-show-versions/0.20

2012-12-12 Thread intrigeri
Control: tag -1 + moreinfo

Hi,

Christoph Martin wrote (11 Dec 2012 15:00:45 GMT) :
 Please unblock package apt-show-versions

 it contains debconf translations and updates, fixes a bug in parallel
 build mode and completes the list of official suites in Debian.

Sorry, I don't get how this satisfies the current freeze policy:
http://release.debian.org/wheezy/freeze_policy.html

Also, any pointer to the place where I can learn about the
testing-updates suite?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85ip874aa1@boum.org



Processed: Re: Bug#695673: unblock: apt-show-versions/0.20

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 + moreinfo
Bug #695673 [release.debian.org] unblock: apt-show-versions/0.20
Added tag(s) moreinfo.

-- 
695673: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695673
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b695673.135532241326564.transcr...@bugs.debian.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Nick Andrik
 No. A package which has been removed will always go back through NEW if
 it is reintroduced. After going through the NEW queue, it can go into
 either experimental or unstable.

 Since the discussion has drifted to full removal from the archive,
 I'd like to point out that a removal from testing only was requested.

Ah OK, this clears the things up.

I don't have strong feelings in any case, I don't expect someone to be
using this version of the package nowadays.
On the other hand, I don't also see the clear benefits from removing it.

I'm planning to adopt the package anyway, and I have prepared a
package with the latest upstream.
The actual upload (in experimental anyway) will take some time, since
kismet is a huge package that has to be thoroughly tested before
sponsored.

Nick


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANn5kOtP3pChU=XE5g6=ihf-p+thgj0nxatxqtuipten1zi...@mail.gmail.com



Processed: Re: Bug#695637: unblock: synaptic/0.75.13

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 + moreinfo
Bug #695637 [release.debian.org] unblock: synaptic/0.75.13
Added tag(s) moreinfo.

-- 
695637: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695637
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b695637.135532292330062.transcr...@bugs.debian.org



Bug#695637: unblock: synaptic/0.75.13

2012-12-12 Thread intrigeri
Control: tag -1 + moreinfo

Hi,

Bob Bib wrote (11 Dec 2012 00:52:28 GMT) :
 Please unblock package synaptic.

 Quick changelog:

* debian/synaptic.menu:
  - use x-terminal-emulator -e synaptic-pkexec to support systems
that do not have a GUI policykit agent running (closes: #678847)
* include all origins in the origin filter not just the first one
* show all archives in the origins view even if they are shadowed
  by another one

Please clarify how this satisfies the current freeze policy [1],
and if it does not, why this package should be treated differently.

  [1] http://release.debian.org/wheezy/freeze_policy.html

(Cc'ing the maintainer, who may have his opinion on the matter.)

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/854njr49xj@boum.org



Processed: Bug#689973: unblock: mimedefang/2.71-3 TPU pre-approval

2012-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # the requested patch for tpu was provided
 tags 689973 - moreinfo
Bug #689973 [release.debian.org] unblock: mimedefang/2.73-2
Removed tag(s) moreinfo.
 retitle 689973 unblock: mimedefang/2.71-3 (TPU pre-approval)
Bug #689973 [release.debian.org] unblock: mimedefang/2.73-2
Changed Bug title to 'unblock: mimedefang/2.71-3 (TPU pre-approval)' from 
'unblock: mimedefang/2.73-2'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
689973: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689973
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.135532302830718.transcr...@bugs.debian.org



Bug#689147: unblock: gajim/0.15.1-1

2012-12-12 Thread intrigeri
Hi,

Yann Leboulanger wrote (12 Dec 2012 11:50:25 GMT) :
 Ok then we wait for an answer from secure-testing-team?

I think so.

 I don't think I need to do somthing, do I?

I think you don't, now that I added them to the loop myself.

Which means we can now get back to why this update of an embedded
library should be unblocked. Why is this update needed? Is the version
embedded in testing / in unstable (based on) the same as the one
packaged in python-gnupg?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85txrr2uyy@boum.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread intrigeri
Hi,

Nick Andrik wrote (12 Dec 2012 14:32:35 GMT) :
 I don't have strong feelings in any case, I don't expect someone to be
 using this version of the package nowadays.
 On the other hand, I don't also see the clear benefits from removing it.

OK. I think the key question then becomes: as the upcoming maintainer
of kismet in Debian, do you want to commit to maintain 2008-05-R1-4.3
in stable once Wheezy is released? (as in: dealing with security
issues, fixing RC bugs through stable updates, answering bug
reports, etc.)

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85fw3b2u39@boum.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Nick Andrik
2012/12/12 intrigeri intrig...@debian.org:
 Hi,

 Nick Andrik wrote (12 Dec 2012 14:32:35 GMT) :
 I don't have strong feelings in any case, I don't expect someone to be
 using this version of the package nowadays.
 On the other hand, I don't also see the clear benefits from removing it.

 OK. I think the key question then becomes: as the upcoming maintainer
 of kismet in Debian, do you want to commit to maintain 2008-05-R1-4.3
 in stable once Wheezy is released? (as in: dealing with security
 issues, fixing RC bugs through stable updates, answering bug
 reports, etc.)

If there are any bugs reported on functionality (which I doubt) then
it makes no sense trying to fix the 2008 version.
All other bugs are OK.

BTW, I guess there is no chance to have the new package in wheezy once
it gets released, is this correct?
If we need to fix anything then I will have to keep different
branches, i.e. one for stable and one for testing, right?

--
=Do-
N.AND


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANn5kOvHgsrMkeGL+aBN9RhaL4FzEOX1YwGJHDv=hr6e3n4...@mail.gmail.com



Bug#695152: t-p-u pre-approval lftp/4.3.6-1+deb7u1

2012-12-12 Thread Andreas Henriksson
On Mon, Dec 10, 2012 at 10:44:43PM +0100, Julien Cristau wrote:
 On Tue, Dec  4, 2012 at 18:21:25 +0100, Ivo De Decker wrote:
 
  diff -Nru lftp-4.3.6/debian/patches/lftp_sys-stdint-kfreebsd.patch 
  lftp-4.3.6/debian/patches/lftp_sys-stdint-kfreebsd.patch
  --- lftp-4.3.6/debian/patches/lftp_sys-stdint-kfreebsd.patch
  1970-01-01 01:00:00.0 +0100
  +++ lftp-4.3.6/debian/patches/lftp_sys-stdint-kfreebsd.patch
  2012-12-01 17:42:44.0 +0100
  @@ -0,0 +1,18 @@
  +Description: prevent sys/_stdint.h from redefining intptr_t et.al.
  +Author: Andreas Henriksson andr...@fatal.se
  +Bug-Debian: http://bugs.debian.org/677861
  +Forwarded: no
  +
  +--- lftp-4.3.6.orig/lib/stdint.in.h
   lftp-4.3.6/lib/stdint.in.h
  +@@ -75,6 +75,10 @@
  +  _@GUARD_PREFIX@_STDINT_H is defined.
  +  The include_next requires a split double-inclusion guard.  */
  + # @INCLUDE_NEXT@ @NEXT_STDINT_H@
  ++#ifdef __FreeBSD_kernel__
  ++// prevent sys/_stdint.h from being included and redefine intptr_t et.al.
  ++#define _SYS__STDINT_H_
  ++#endif
  + #endif
  + 
  + #if ! defined _@GUARD_PREFIX@_STDINT_H  ! defined 
  _GL_JUST_INCLUDE_SYSTEM_STDINT_H
 
 That is rather horrible.  I probably don't want to know why this is
 necessary.  Reluctant ack, go ahead with the upload.

Sorry for sharing some insight despite you not wanting to know ;P

I fully agree with it being horrible, that's why I didn't want to upload
it myself. On the other hand, since the maintainer acked Ivos NMU it's
not my place to disagree either.

A much better solution would have been to actually fix the kFreeBSD
system headers! (The details are available in the original lftp bug report
referenced in the patch headers.) Unfortunately noone seems interested in
doing that. On the other hand, I guess it could also be considered a
bug in portability layers like gnulib to not correctly handle the
brokenness (even after kFreeBSD headers potentially gets fixed) so
someone should work with upstream gnulib to find a suitable longterm-
maintainable fix! (Completely blocking a system header isn't very nice.
Even though that header today just contain redundant crap, that could
potentially change in the future.)

This patch is a from my point of view a double workaround. Work around
kFreeBSD brokenness and work around the release teams need to punish
all (Linux) users of lftp with a removal because of kFreeBSD brokenness.
I would not want to carry a patch like this in a package I maintain.
I hope noone will blame me later for this patch, because please remember
that I did not upload it and take no responsability for it.

-- 
Andreas Henriksson


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121212153137.ga19...@amd64.fatal.se



Bug#695673: unblock: apt-show-versions/0.20

2012-12-12 Thread Adam D. Barratt

On 12.12.2012 14:25, intrigeri wrote:

Also, any pointer to the place where I can learn about the
testing-updates suite?


Nowhere. :-)

I did at least implicitly suggest in an earlier discussion that it not 
be included:


quote
I don't expect testing-updates to ever be used, at least under that
name - again, the real suite in this case is wheezy-updates, which 
has

been created in advance of the release. That makes it technically
testing-updates currently, but there won't be any packages in it 
until

it becomes stable-updates.
/quote

Regards,

Adam


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/02ff3331ce0299a13d0673c641deb...@mail.adsl.funky-badger.org



Bug#689147: unblock: gajim/0.15.1-1

2012-12-12 Thread Yann Leboulanger

On 12/12/2012 03:41 PM, intrigeri wrote:

Hi,

Yann Leboulanger wrote (12 Dec 2012 11:50:25 GMT) :

Ok then we wait for an answer from secure-testing-team?


I think so.


I don't think I need to do somthing, do I?


I think you don't, now that I added them to the loop myself.

Which means we can now get back to why this update of an embedded
library should be unblocked. Why is this update needed? Is the version
embedded in testing / in unstable (based on) the same as the one
packaged in python-gnupg?


this version of Gajim doesn't only fix this embedded library
But the version embedded fixes some unhandeled errors, as I told you in 
the previous mail. Full diff against python-gnupg-0.3.0 attached


--
Yann
--- /usr/share/pyshared/gnupg.py	2012-10-23 01:42:18.0 +0200
+++ gnupg.py	2012-12-02 19:43:09.0 +0100
@@ -64,7 +64,7 @@
 except NameError:
 _py3k = True
 
-logger = logging.getLogger(__name__)
+logger = logging.getLogger('gajim.c.gnupg')
 if not logger.handlers:
 logger.addHandler(NullHandler())
 
@@ -435,6 +435,7 @@
 self.gpg = gpg
 self.type = None
 self.fingerprint = None
+self.status = ''
 
 def __nonzero__(self):
 return self.fingerprint is not None
@@ -448,6 +449,8 @@
 if key in (USERID_HINT, NEED_PASSPHRASE, BAD_PASSPHRASE,
GOOD_PASSPHRASE, BEGIN_SIGNING, CARDCTRL):
 pass
+elif key in (KEYEXPIRED, SIGEXPIRED):
+self.status = 'key expired'
 elif key == SIG_CREATED:
 (self.type,
  algo, hashalgo, cls,


Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread intrigeri
Hi,

Nick Andrik wrote (12 Dec 2012 15:18:54 GMT) :
 2012/12/12 intrigeri intrig...@debian.org:
 OK. I think the key question then becomes: as the upcoming maintainer
 of kismet in Debian, do you want to commit to maintain 2008-05-R1-4.3
 in stable once Wheezy is released? (as in: dealing with security
 issues, fixing RC bugs through stable updates, answering bug
 reports, etc.)

 If there are any bugs reported on functionality (which I doubt) then
 it makes no sense trying to fix the 2008 version.
 All other bugs are OK.

I'm not sure I understand what you mean by bugs reported on
functionality.

If you mean feature requests, then they are not appropriate for
packages shipped in a stable release, so indeed it does not make
sense, and then I gather your answer was a yes.

If you mean anything else, please clarify :)

FYI, the stable suite update policy can be found on the Release Team
homepage [1].

 [1] http://release.debian.org/

 BTW, I guess there is no chance to have the new package in wheezy once
 it gets released, is this correct?

This is correct. The current freeze policy can be read there:
http://release.debian.org/wheezy/freeze_policy.html

 If we need to fix anything then I will have to keep different
 branches, i.e. one for stable and one for testing, right?

This is indeed one common way to organize your packaging VCS. In any
case, please refrain from pushing to unstable stuff that is not meant
for Wheezy, until it is released. You'll rather want to push to
experimental in the meantime.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8562471a0y@boum.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Nick Andrik
 If you mean feature requests, then they are not appropriate for
 packages shipped in a stable release, so indeed it does not make
 sense, and then I gather your answer was a yes.

Then, yes it is :)

 If you mean anything else, please clarify :)

 If we need to fix anything then I will have to keep different
 branches, i.e. one for stable and one for testing, right?

 This is indeed one common way to organize your packaging VCS. In any
 case, please refrain from pushing to unstable stuff that is not meant
 for Wheezy, until it is released. You'll rather want to push to
 experimental in the meantime.

Kismet would go to experimental anyway, since it is a huge update.

As of curiosity, even if I push anything to unstable it will not move
to testing because of the freeze policy, no?

Nikos


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/cann5kotzw1wfy1os8qrar3qjyto7trfiqdm5k5jskrzkrvr...@mail.gmail.com



Processed: Re: Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 - moreinfo
Bug #693351 [release.debian.org] RM: kismet/2008-05-R1-4.3
Removed tag(s) moreinfo.

-- 
693351: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693351
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b693351.13553327973584.transcr...@bugs.debian.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread intrigeri
Control: tag -1 - moreinfo

Hi,

Nick Andrik wrote (12 Dec 2012 17:07:14 GMT) :
 Then, yes it is :)

OK, thanks for the clarification.

So, I think this removal request should be closed.

 As of curiosity, even if I push anything to unstable it will not move
 to testing because of the freeze policy, no?

Yes. But it's better to leave room in unstable for potential bugfixed
packages that are meant for Wheezy (at least so that they can mature
in there, get some exposure to testing, before the unblock request is
considered).

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/85pq2fyyqk@boum.org



Bug#688966: tagging 688966

2012-12-12 Thread Julien Cristau
On Wed, Dec 12, 2012 at 01:30:14 +0100, intrigeri wrote:

 Hi,
 
 Julien Cristau wrote (01 Dec 2012 12:59:46 GMT) :
  tags 688966 + moreinfo
 
 FWIW, it's unclear to me what additional information is being
 requested, so it might be unclear for the submitter too: he was asked
 to provide a debdiff, and subsequently did.
 Sorry if I missed something.
 
That debdiff was too big so it didn't show up on the list AFAICT.

Cheers,
Julien


signature.asc
Description: Digital signature


Status of some open security issues in Wheezy

2012-12-12 Thread Moritz Muehlenhoff
Hi,
I made a systematic trackdown of open security issues in Wheezy and would like
to summarise some issues in this mail. Some security blocks might be lost in
the backlog, it would be nice if someone go through this list:


bacula / CVE-2012-4430
This was fixed in testing-proposed-updates in 5.2.6+dfsg-2.1
There's a larger unblock discussion with more changes in #689003
Please either unblock the revised package from
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689003#80 or
the tpu security fix.


icecast2 / CVE-2011-4612
I prepared a tpu backport a month ago. Can I go ahead and upload?
(691186)


pcp /CVE-2012-3418 CVE-2012-3419 CVE-2012-3420 CVE-2012-3421 CVE-2012-5530
Huge fix made in unstable (but many changes needed to fix the issue). Updated
package introduces shlibs changes (686868). No rdeps and low popcon. Could also
be removed IMO.


dnsmasq / CVE-2012-3411
There's a longstanding unblock request (690075). However, since this is of low
impact and would require additional fixes in libvirt, I'm inclined to leave it
as-is for Wheezy. Agreed?


weechat / CVE-2012-5534 / CVE-2012-5854
There's a tpu request in #693702


cityhash / CVE-2012-6051
Given the circumstances (694999) I think removal from Wheezy is the way to go
forward.


gimp / CVE-2012-5576
Blocked by missing s390x build. I've contacted the buildd maints, but got 
no reponse. Can anyone of you trigger a giveback?


yui / CVE-2012-5881 CVE-2012-5882 CVE-2012-5883
This package is a complete mess, for Jessie we'll need to migrate all packages
to yui3. For Wheezy we're stuck with two additional DFSG bugs. If they're
wheezy-ignored I can fix the security issues in a NMU.


qt4-x11 / CVE-2012-4929
The transition of the fix is blocked by the ia64 build failure. No idea where
that is coming from?

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121212182147.GA11016@pisco.westfalen.local



Processed: Re: Bug#683311: unblock: htop/1.0.1-2

2012-12-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 683311
Bug #683311 [release.debian.org] unblock: htop/1.0.1-2
Marked Bug as done
 quit
Stopping processing here.

Please contact me if you need assistance.
-- 
683311: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683311
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.135533864413818.transcr...@bugs.debian.org



Processed: Re: Bug#691186: unblock: icecast2/2.3.2-9+deb7u2

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #691186 [release.debian.org] unblock: icecast2/2.3.2-9+deb7u2
Added tag(s) confirmed.

-- 
691186: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691186
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b691186.135533915617001.transcr...@bugs.debian.org



Bug#691186: unblock: icecast2/2.3.2-9+deb7u2

2012-12-12 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Mon, 2012-10-22 at 20:53 +0200, Moritz Muehlenhoff wrote:
 Ok to upload to t-p-u with the attached debdiff?
 
 This fixes CVE-2011-4612 / #652663)

Much as I dislike wheel re-inventing, I'm assuming the patch matches how
upstream decided to resolve the issue; please go ahead. A more
descriptive changelog entry would be good. ;-)

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1355339044.13966.4.ca...@jacala.jungle.funky-badger.org



Bug#693702: tpu: weechat/0.3.8-2 (pre-approval)

2012-12-12 Thread Adam D. Barratt
Control: tags -1 + confirmed

Apologies for the delay in getting back to you about this.

On Mon, 2012-11-19 at 14:53 +0100, Emmanuel Bouthenot wrote:
 I'd like to get your approval about the upload of weechat 0.3.8-2 to
 testing-proposed-updates in order to fix 2 security issues:

0.3.8-1+deb7u1 would be more conventional as a version number; other
than that, please go ahead.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1355339406.13966.7.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#693702: tpu: weechat/0.3.8-2 (pre-approval)

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + confirmed
Bug #693702 [release.debian.org] tpu: weechat/0.3.8-2 (pre-approval)
Added tag(s) confirmed.

-- 
693702: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693702
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b693702.135533951419522.transcr...@bugs.debian.org



Re: Status of some open security issues in Wheezy

2012-12-12 Thread Adam D. Barratt
On Wed, 2012-12-12 at 19:21 +0100, Moritz Muehlenhoff wrote:
 I made a systematic trackdown of open security issues in Wheezy and would like
 to summarise some issues in this mail. Some security blocks might be lost in
 the backlog, it would be nice if someone go through this list:

Thanks for the list. Cherry-picking a little:

 icecast2 / CVE-2011-4612
 I prepared a tpu backport a month ago. Can I go ahead and upload?
 (691186)

Replied.

 weechat / CVE-2012-5534 / CVE-2012-5854
 There's a tpu request in #693702

Replied.

 cityhash / CVE-2012-6051
 Given the circumstances (694999) I think removal from Wheezy is the way to go
 forward.

Removal hint added.

 gimp / CVE-2012-5576
 Blocked by missing s390x build. I've contacted the buildd maints, but got 
 no reponse. Can anyone of you trigger a giveback?

dpkg-shlibdeps: error: dpkg-query --control-path libc6:s390x shlibs died
from signal 6

That doesn't look too healthy. :-/ Given back; let's see what happens.

 qt4-x11 / CVE-2012-4929
 The transition of the fix is blocked by the ia64 build failure. No idea where
 that is coming from?

It often happens, we generally end up with a pile of give-backs which
eventually work. The maintainers have raised it at
https://lists.debian.org/debian-ia64/2012/12/msg8.html

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1355340029.13966.13.ca...@jacala.jungle.funky-badger.org



Bug#683311: unblock: htop/1.0.1-2

2012-12-12 Thread Josh Triplett
On Wed, Dec 12, 2012 at 08:57:59PM +0200, Eugene V. Lyubimkin wrote:
 close 683311
 quit
 
 Hi all,
 
 On 2012-12-12 01:12, intrigeri wrote:
 [...]
   Can I still please ask for unblock for -2 as a part of asking to
   unblock -4?
   Please fix the bugs that were pointed in review...
  
  Ping?
 
 Thanks for ping. I didn't receive the 'please fix' email not being in
 recipients there.
 
 It's clear now that the original Josh-proposed plan 'just cherry-pick
 the upstream patch' is not accepted. Therefore, having no interest in
 maintaining modified upstream patch (let alone for the issue I didn't
 even original consider worth for passing the freeze) I'm closing this
 bug. Thanks everyone for the time/considering.

I meant to respond to the original mail with the same comment: it
doesn't seem worth maintaining a modified version of the upstream patch
here, so since the upstream patch didn't work out, I agree with just
closing this.

- Josh Triplett


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121212193505.GA2993@jtriplet-mobl1



Bug#694452: unblock: gjs/1.32.0-3

2012-12-12 Thread Josselin Mouette
Control: retitle -1 unblock: gjs/1.32.0-4

Le mardi 11 décembre 2012 à 23:04 +0100, Niels Thykier a écrit : 
  I’ll reupload with that additional patch.
  http://git.gnome.org/browse/gjs/commit/?id=5c90e776ce3c

 Please go ahead.

Done as 1.32.0-4 (it’s the only change).

Cheers,
-- 
 .''`.  Josselin Mouette
: :' :
`. `'
  `-


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1355341209.6659.1.camel@tomoyo



Processed: Re: Bug#694452: unblock: gjs/1.32.0-3

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 retitle -1 unblock: gjs/1.32.0-4
Bug #694452 [release.debian.org] unblock: gjs/1.32.0-3
Changed Bug title to 'unblock: gjs/1.32.0-4' from 'unblock: gjs/1.32.0-3'

-- 
694452: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694452
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b694452.135534121829944.transcr...@bugs.debian.org



Processed: Re: Bug#695174: t-p-u pre-approval owncloud/4.0.4debian2-3.1

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + moreinfo
Bug #695174 [release.debian.org] t-p-u pre-approval owncloud/4.0.4debian2-3.1
Added tag(s) moreinfo.

-- 
695174: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695174
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b695174.135534158632512.transcr...@bugs.debian.org



Bug#695174: t-p-u pre-approval owncloud/4.0.4debian2-3.1

2012-12-12 Thread Adam D. Barratt
Control: tags -1 + moreinfo

On Mon, 2012-12-10 at 20:14 +0100, Julien Cristau wrote:
 On Wed, Dec  5, 2012 at 22:18:54 +0100, Michael Banck wrote:
  
  On Wed, Dec 05, 2012 at 10:55:56AM +0100, Julien Cristau wrote:
   As far as I can tell this escapeHTML function is not defined in the
   current version?  Upstream git has it in core/js/js.js.
  
  Attached is a new candidate debdiff.
  
 Assuming this is tested, go ahead.

+Index: owncloud-4.0.4debian2/core/js/js.js
[...]
++function escapeHTML(s) {
[...]
+Index: owncloud-4.0.4debian2/3rdparty/fullcalendar/js/fullcalendar.js
[...]
+-  span class='fc-event-title' + event.title + 
/span +
++  span class='fc-event-title' + 
htmlEscape(event.title) + /span +

Should the htmlEscape() call in that last hunk be escapeHTML()?

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1355341478.13966.16.ca...@jacala.jungle.funky-badger.org



Re: Status of some open security issues in Wheezy

2012-12-12 Thread Philipp Kern
Dear Moritz,

On Wed, Dec 12, 2012 at 07:21:47PM +0100, Moritz Muehlenhoff wrote:
 gimp / CVE-2012-5576
 Blocked by missing s390x build. I've contacted the buildd maints, but got 
 no reponse.

I beg to differ:

pkern@grieg /org/buildd.debian.org/mbox (git)-[master] % grep 'gimp' s390*
1 pkern@grieg /org/buildd.debian.org/mbox (git)-[master] % grep 
'j...@debian.org' s390*
1 pkern@grieg /org/buildd.debian.org/mbox (git)-[master] %

Kind regards
Philipp Kern


signature.asc
Description: Digital signature


Bug#695174: t-p-u pre-approval owncloud/4.0.4debian2-3.1

2012-12-12 Thread Julien Cristau
On Wed, Dec 12, 2012 at 19:44:38 +, Adam D. Barratt wrote:

 Control: tags -1 + moreinfo
 
 On Mon, 2012-12-10 at 20:14 +0100, Julien Cristau wrote:
  On Wed, Dec  5, 2012 at 22:18:54 +0100, Michael Banck wrote:
   
   On Wed, Dec 05, 2012 at 10:55:56AM +0100, Julien Cristau wrote:
As far as I can tell this escapeHTML function is not defined in the
current version?  Upstream git has it in core/js/js.js.
   
   Attached is a new candidate debdiff.
   
  Assuming this is tested, go ahead.
 
 +Index: owncloud-4.0.4debian2/core/js/js.js
 [...]
 ++function escapeHTML(s) {
 [...]
 +Index: owncloud-4.0.4debian2/3rdparty/fullcalendar/js/fullcalendar.js
 [...]
 +-  span class='fc-event-title' + event.title 
 + /span +
 ++  span class='fc-event-title' + 
 htmlEscape(event.title) + /span +
 
 Should the htmlEscape() call in that last hunk be escapeHTML()?
 
iirc fullcalendar has its own preexisting escape function, with a
different name.

Cheers,
Julien


signature.asc
Description: Digital signature


Re: Bug#695715: fixed in cflow 1:1.4+dfsg1-1

2012-12-12 Thread Adam D. Barratt
On Wed, 2012-12-12 at 19:32 +, Serafeim Zanikolas wrote:
  cflow (1:1.4+dfsg1-1) unstable; urgency=high
  .
* Repackage with non DFSG-free texinfo files stripped out of the source and
  binary package (closes: #695715).

Thanks for fixing this. Unfortunately, the fact that you also made this
change:

* Raise debhelper compatibility level to 9 and update the debhelper version
  dependency, to enable security hardening

means the package is unlikely to get unblocked. fwiw, this is explicitly
mentioned in rule #1 on
http://release.debian.org/wheezy/freeze_policy.html

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1355343750.13966.28.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#695471: unblock: bootchart2/0.14.4-2

2012-12-12 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 - moreinfo
Bug #695471 [release.debian.org] unblock: bootchart2/0.14.4-2
Removed tag(s) moreinfo.

-- 
695471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695471
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b695471.135534427619998.transcr...@bugs.debian.org



Bug#695471: unblock: bootchart2/0.14.4-2

2012-12-12 Thread David Paleino
Control: tags -1 - moreinfo

On Mon, 10 Dec 2012 20:10:43 +, Adam D. Barratt wrote:

 On Sat, 2012-12-08 at 19:47 +0100, David Paleino wrote:
  I just uploaded bootchart2/0.14.4-2 to unstable. This upload fixes RC bug
  #694403 -- the package shipped a systemd unit, but no classic initscript.
 
 +# Define LSB log_* functions.
 +# Depend on lsb-base (= 3.0-6) to ensure that this file is present.
 +. /lib/lsb/init-functions
 
 As far as I can see, bootchart2 doesn't depend on lsb-base at all? (I
 realise it's basically guaranteed to be present.)

Uops.

Uploaded -3 to sid. Thanks for noticing this! :)

David

-- 
 . ''`.   Debian developer | http://wiki.debian.org/DavidPaleino
 : :'  : Linuxer #334216 --|-- http://www.hanskalabs.net/
 `. `'`  GPG: 1392B174 | http://deb.li/dapal
   `-   2BAB C625 4E66 E7B8 450A C3E1 E6AA 9017 1392 B174


signature.asc
Description: PGP signature


Bug#695804: unblock: moodle/2.2.3.dfsg-2.6~wheezy0

2012-12-12 Thread Tomasz Muras

Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package moodle

I am about to get new version of the package uploaded to 
testing-proposed-updates. The new version fixes a security issue that is 
forwarded but not yet fixed upstream.


diff -Nru moodle-2.2.3.dfsg/debian/changelog 
moodle-2.2.3.dfsg/debian/changelog

--- moodle-2.2.3.dfsg/debian/changelog  2012-11-16 09:07:18.0 +0100
+++ moodle-2.2.3.dfsg/debian/changelog  2012-12-12 19:19:22.0 +0100
@@ -1,3 +1,11 @@
+moodle (2.2.3.dfsg-2.6~wheezy1) testing-proposed-updates; urgency=low
+
+  * Fix possible security issue for curl in 3-rd party libraries:
+* phpCAS (CVE-2012-5583)
+* amazon-s3-php-class
+
+ -- Tomasz Muras nexor1...@gmail.com  Tue, 27 Nov 2012 23:15:45 +0100
+
 moodle (2.2.3.dfsg-2.6~wheezy0) testing-proposed-updates; urgency=low

   * Re-upload -2.6 towards Wheezy.
diff -Nru 
moodle-2.2.3.dfsg/debian/patches/0021-MDL-36818-Wrong-value-for-CURLOPT_SSL_VERIFYHOST.patch 
moodle-2.2.3.dfsg/debian/patches/0021-MDL-36818-Wrong-value-for-CURLOPT_SSL_VERIFYHOST.patch
--- 
moodle-2.2.3.dfsg/debian/patches/0021-MDL-36818-Wrong-value-for-CURLOPT_SSL_VERIFYHOST.patch 
1970-01-01 01:00:00.0 +0100
+++ 
moodle-2.2.3.dfsg/debian/patches/0021-MDL-36818-Wrong-value-for-CURLOPT_SSL_VERIFYHOST.patch 
2012-12-12 19:20:03.0 +0100

@@ -0,0 +1,49 @@
+From: Tomasz Muras tom...@muras.eu
+Last-Update: 2012-12-12
+Bug: http://tracker.moodle.org/browse/MDL-36818
+Bug-amazon-s3-php-class: 
https://github.com/tpyo/amazon-s3-php-class/pull/36

+Bug-phpCAS: https://github.com/Jasig/phpCAS/pull/58
+Forwarded: yes
+Description: Fix the value of CURLOPT_SSL_VERIFYHOST option.
+ Wrong use of CURLOPT_SSL_VERIFYHOST is a potential security issue.
+ The bug was reported by Alessandro Ghedini gh...@debian.org, patch
+ created by Tomasz Muras and forwarded to Moodle and Moodle's upstream -
+ amazon-s3-php-class and phpCAS. There is no Debian bug or CVE issued yet
+ but Debian Security Team has been notified. CVE for phpCAS is 
CVE-2012-5583.

+ The bug is not fixed in Moodle upstream yet.
+
+diff --git a/auth/cas/CAS/CAS/client.php b/auth/cas/CAS/CAS/client.php
+index 74d6893..d5c4212 100644
+--- a/auth/cas/CAS/CAS/client.php
 b/auth/cas/CAS/CAS/client.php
+@@ -2160,7 +2160,7 @@ class CASClient
+   if ($this-_cas_server_cert != ''  $this-_cas_server_ca_cert 
!= '') {
+ 			// This branch added by IDMS. Seems phpCAS implementor got a bit 
confused about the curl options CURLOPT_SSLCERT and CURLOPT_CAINFO

+   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 1);
+-  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 1);
++  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);
+   curl_setopt($ch, CURLOPT_SSLCERT, 
$this-_cas_server_cert);
+   curl_setopt($ch, CURLOPT_CAINFO, 
$this-_cas_server_ca_cert);
+   curl_setopt($ch, CURLOPT_VERBOSE, '1');
+@@ -2172,7 +2172,7 @@ class CASClient
+   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 1);
+   curl_setopt($ch, CURLOPT_CAINFO, 
$this-_cas_server_ca_cert);
+   } else {
+-  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 1);
++  curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);
+   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
+   }
+   
+diff --git a/repository/s3/S3.php b/repository/s3/S3.php
+index dadfb5a..b5a11b6 100644
+--- a/repository/s3/S3.php
 b/repository/s3/S3.php
+@@ -1140,7 +1140,7 @@ final class S3Request {
+   curl_setopt($curl, CURLOPT_USERAGENT, 'S3/php');
+
+   if (S3::$useSSL) {
+-  curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 1);
++  curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 2);
+   curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, 1);
+   }
+
diff -Nru moodle-2.2.3.dfsg/debian/patches/series 
moodle-2.2.3.dfsg/debian/patches/series
--- moodle-2.2.3.dfsg/debian/patches/series	2012-11-10 
16:09:16.0 +0100
+++ moodle-2.2.3.dfsg/debian/patches/series	2012-11-29 
18:00:57.0 +0100

@@ -18,3 +18,4 @@
 0018-MDL-34448-mod-data-Fixing-separate-groups-viewing-al.patch
 0019-MDL-33791-Portfolio-Fixed-security-issue-with-passin.patch
 0020-MDL-35558-mod_data-Show-only-own-entries-while-there.patch
+0021-MDL-36818-Wrong-value-for-CURLOPT_SSL_VERIFYHOST.patch


unblock moodle/2.2.3.dfsg-2.6~wheezy1


Tomasz Muras


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/50c8eb67.8060...@gmail.com



Re: Bug#695715: fixed in cflow 1:1.4+dfsg1-1

2012-12-12 Thread Serafeim Zanikolas
On Wed, Dec 12, 2012 at 08:22:30PM +, Adam D. Barratt wrote:
 On Wed, 2012-12-12 at 19:32 +, Serafeim Zanikolas wrote:
   cflow (1:1.4+dfsg1-1) unstable; urgency=high
   .
 * Repackage with non DFSG-free texinfo files stripped out of the source 
  and
   binary package (closes: #695715).
 
 Thanks for fixing this. Unfortunately, the fact that you also made this
 change:
 
 * Raise debhelper compatibility level to 9 and update the debhelper 
  version
   dependency, to enable security hardening
 
 means the package is unlikely to get unblocked. fwiw, this is explicitly
 mentioned in rule #1 on
 http://release.debian.org/wheezy/freeze_policy.html

oh sorry about that :-/

Shall I target the new release to unstable or testing-proposed-updates? (in
the case of the latter, I'll post a diff before doing the upload).

thanks,
sez

-- 
Every great idea is worthless without someone to do the work. --Neil Williams


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121212203951.GA13612@mobee



Bug#695806: RM: balazar/0.3.4.ds1-6.1

2012-12-12 Thread Tobias Hansen
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Hi,

please remove balazar from wheezy. It is a game and the RC bug #692753 was not
fixed for a month now. There is also the important bug #630946 that causes
the game to crash unless sound is deactivated. The last upload of the package
by the maintainer was in 2009. The consensus in #692753 was that removal of
the package is the best way to resolve the bug.

Best regards,
Tobias Hansen

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20121212205009.6091.72274.reportbug@dicker.tobinet



Bug#695471: marked as done (unblock: bootchart2/0.14.4-2)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 20:53:38 +
with message-id 1355345618.13966.29.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#695471: unblock: bootchart2/0.14.4-2
has caused the Debian Bug report #695471,
regarding unblock: bootchart2/0.14.4-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695471
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Hello RT,
I just uploaded bootchart2/0.14.4-2 to unstable. This upload fixes RC bug
#694403 -- the package shipped a systemd unit, but no classic initscript.

I'm attaching a git diff -- please note that this is a particular initscript,
since starting it effectively *stops* the daemon -- and that's why it's
started after all the other services (i.e. stop collecting boot info as soon as
all other initscripts did their job).

  unblock bootchart2/0.14.4-2

Thanks,
David

-- 
 . ''`.   Debian developer | http://wiki.debian.org/DavidPaleino
 : :'  : Linuxer #334216 --|-- http://www.hanskalabs.net/
 `. `'`  GPG: 1392B174 | http://deb.li/dapal
   `-   2BAB C625 4E66 E7B8 450A C3E1 E6AA 9017 1392 B174
diff --git a/debian/bootchart2.bootchart-done.init b/debian/bootchart2.bootchart-done.init
new file mode 100644
index 000..da3f590
--- /dev/null
+++ b/debian/bootchart2.bootchart-done.init
@@ -0,0 +1,58 @@
+#! /bin/sh
+
+### BEGIN INIT INFO
+# Provides:  bootchart2
+# Required-Start:$remote_fs $all
+# Required-Stop:
+# Default-Start: 1 2 3 4 5
+# Default-Stop:
+# Short-Description: Stop bootchartd
+# Description:   This script stops the bootchartd daemon after the
+#system booted.
+### END INIT INFO
+
+# Author: David Paleino da...@debian.org
+
+# Do NOT set -e
+
+# PATH should only include /usr/* if it runs after the mountnfs.sh script
+PATH=/sbin:/usr/sbin:/bin:/usr/bin
+DESC=boot process analyser
+NAME=bootchartd
+DAEMON=/sbin/$NAME
+DAEMON_ARGS=
+PIDFILE=/var/run/$NAME.pid
+SCRIPTNAME=/etc/init.d/bootchart2
+
+# Exit if the package is not installed
+[ -x $DAEMON ] || exit 0
+
+# Read configuration variable file if it is present
+[ -r /etc/bootchartd.conf ]  . /etc/bootchartd.conf
+
+# Load the VERBOSE setting and other rcS variables
+. /lib/init/vars.sh
+
+# Define LSB log_* functions.
+# Depend on lsb-base (= 3.0-6) to ensure that this file is present.
+. /lib/lsb/init-functions
+
+case $1 in
+  start)
+	[ $VERBOSE != no ]  log_daemon_msg Stopping $DESC $NAME
+	$DAEMON stop
+	case $? in
+		0|1) [ $VERBOSE != no ]  log_end_msg 0 ;;
+		2) [ $VERBOSE != no ]  log_end_msg 1 ;;
+	esac
+	;;
+  stop|restart|force-reload)
+	# do nothing
+	;;
+  *)
+	echo Usage: $SCRIPTNAME start 2
+	exit 3
+	;;
+esac
+
+:
diff --git a/debian/changelog b/debian/changelog
index 9876687..a769a35 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+bootchart2 (0.14.4-2) unstable; urgency=low
+
+  * Acknowledge NMU.
+  * Provide also an initscript (Closes: #694403)
+
+ -- David Paleino da...@debian.org  Sat, 08 Dec 2012 19:35:08 +0100
+
 bootchart2 (0.14.4-1.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff --git a/debian/rules b/debian/rules
index 0b97af1..158f0dc 100755
--- a/debian/rules
+++ b/debian/rules
@@ -13,3 +13,8 @@ override_dh_installchangelogs:
 
 override_dh_auto_test:
 
+override_dh_installinit:
+	dh_installinit \
+		--name=bootchart-done \
+		--no-start \
+		--update-rcd-params=start 99 1 2 3 4 5 6 . stop 99 0 .


signature.asc
Description: PGP signature
---End Message---
---BeginMessage---
On Wed, 2012-12-12 at 21:31 +0100, David Paleino wrote:
 On Mon, 10 Dec 2012 20:10:43 +, Adam D. Barratt wrote:
  +# Define LSB log_* functions.
  +# Depend on lsb-base (= 3.0-6) to ensure that this file is present.
  +. /lib/lsb/init-functions
  
  As far as I can see, bootchart2 doesn't depend on lsb-base at all? (I
  realise it's basically guaranteed to be present.)
 
 Uops.
 
 Uploaded -3 to sid. Thanks for noticing this! :)

Unblocked; thanks.

Regards,

Adam---End Message---


Bug#695806: marked as done (RM: balazar/0.3.4.ds1-6.1)

2012-12-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Dec 2012 20:58:37 +
with message-id 1355345917.13966.30.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#695806: RM: balazar/0.3.4.ds1-6.1
has caused the Debian Bug report #695806,
regarding RM: balazar/0.3.4.ds1-6.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
695806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Hi,

please remove balazar from wheezy. It is a game and the RC bug #692753 was not
fixed for a month now. There is also the important bug #630946 that causes
the game to crash unless sound is deactivated. The last upload of the package
by the maintainer was in 2009. The consensus in #692753 was that removal of
the package is the best way to resolve the bug.

Best regards,
Tobias Hansen

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
On Wed, 2012-12-12 at 21:50 +0100, Tobias Hansen wrote:
 please remove balazar from wheezy. It is a game and the RC bug #692753 was not
 fixed for a month now. There is also the important bug #630946 that causes
 the game to crash unless sound is deactivated. The last upload of the package
 by the maintainer was in 2009. The consensus in #692753 was that removal of
 the package is the best way to resolve the bug.

Removal hint added.

Regards,

Adam---End Message---


Bug#695808: RM: gnat-4.4/4.4.6-6

2012-12-12 Thread Tobias Hansen
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm

Hi,

please remove gnat-4.4 from wheezy. It FTBFS (RC bug #669513) and since the
only feasible way to fix this is updating to the new upstream version, 
Ludovic Brenta, one of its maintainers, agreed in that bug report that
it should be removed from testing. There should be no reverse dependencies
in testing. The reverse dependency ghdl that was mentioned in the bug was
removed from wheezy some time ago.

Best regards,
Tobias Hansen

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20121212215036.6565.25959.reportbug@dicker.tobinet



Bug#689588: Please unblock cracklib2/2.8.19-2

2012-12-12 Thread Jan Dittberner
On Wed, Dec 12, 2012 at 09:26:01AM +0100, Niels Thykier wrote:
 On 2012-12-12 09:04, Niels Thykier wrote:
  Control: tags -1 moreinfo
  
  On 2012-12-08 12:25, Jan Dittberner wrote:
  please unblock cracklib2/2.8.19-2 that I uploaded to unstable. See the
  debdiff that is already attached to the bug. The change is minimal and
  backward compatible. The test suite runs without problems with all 
  supported
  Python versions (2.6, 2.7, 3.2).
 
 
  Best regards
  Jan
  
  I have to admit, I would have appreciated if this change had been
  upstreamed.  Anyhow, I guess that will be your headache and not mine... :)
  
  [...]
 
 I just saw your original mail from Oct. 4th, so never mind the above
 comment.  I think the use of __DEBIAN_SPECIFIC__SafeFascistCheck will be
 okay for Wheezy (considering it avoids an API transition).
 
 Sorry for the delay in getting back to you (on your mail from Oct.),

I just uploaded an updated package with Markus' updated patch
(cracklib2_2.8.19-3) to unstable. The debdiffs from the version in testing
(2.8.19-1) and the version you already looked at (2.8.19-2) are attached to
this mail.

Please unblock the new version.


Best regards
Jan

-- 
Jan Dittberner - Debian Developer
GPG-key: 4096R/558FB8DD 2009-05-10
 B2FF 1D95 CE8F 7A22 DF4C  F09B A73E 0055 558F B8DD
http://www.dittberner.info/
diff -Nru cracklib2-2.8.19/debian/changelog cracklib2-2.8.19/debian/changelog
--- cracklib2-2.8.19/debian/changelog   2012-05-20 01:24:15.0 +0200
+++ cracklib2-2.8.19/debian/changelog   2012-12-12 22:57:15.0 +0100
@@ -1,3 +1,20 @@
+cracklib2 (2.8.19-3) unstable; urgency=low
+
+  * update debian/patches/libcrack2-error-safer-check-variant.patch with
+fixed version from http://bugs.debian.org/cgi-
+bin/bugreport.cgi?bug=689588#29
+
+ -- Jan Dittberner ja...@debian.org  Wed, 12 Dec 2012 22:56:46 +0100
+
+cracklib2 (2.8.19-2) unstable; urgency=low
+
+  * add debian/patches/libcrack2-error-safer-check-variant.patch to provide
+__DEBIAN_SPECIFIC__SafeFascistCheck that does not call exit (Closes:
+#682735)
+  * add __DEBIAN_SPECIFIC__SafeFascistCheck to debian/libcrack2.symbols
+
+ -- Jan Dittberner ja...@debian.org  Tue, 02 Oct 2012 09:15:16 +0200
+
 cracklib2 (2.8.19-1) unstable; urgency=low
 
   * New upstream version
diff -Nru cracklib2-2.8.19/debian/libcrack2.symbols 
cracklib2-2.8.19/debian/libcrack2.symbols
--- cracklib2-2.8.19/debian/libcrack2.symbols   2012-05-20 01:24:15.0 
+0200
+++ cracklib2-2.8.19/debian/libcrack2.symbols   2012-12-12 22:57:15.0 
+0100
@@ -27,3 +27,4 @@
  Trim@Base 2.8.12
  Uppercase@Base 2.8.12
  GetDefaultCracklibDict@Base 2.8.14
+ __DEBIAN_SPECIFIC__SafeFascistCheck@Base 2.8.19-2~
diff -Nru 
cracklib2-2.8.19/debian/patches/libcrack2-error-safer-check-variant.patch 
cracklib2-2.8.19/debian/patches/libcrack2-error-safer-check-variant.patch
--- cracklib2-2.8.19/debian/patches/libcrack2-error-safer-check-variant.patch   
1970-01-01 01:00:00.0 +0100
+++ cracklib2-2.8.19/debian/patches/libcrack2-error-safer-check-variant.patch   
2012-12-12 22:57:15.0 +0100
@@ -0,0 +1,189 @@
+Subject: add a safer check variant
+Author: Markus Wanner mar...@bluegap.ch
+Bug-Debian: http://bugs.debian.org/682735
+--- a/lib/fascist.c
 b/lib/fascist.c
+@@ -879,6 +879,48 @@
+ return res;
+ }
+ 
++/* This Debian specific method is a work-around for Debian #682735. Please
++   do not rely on it being available in future verisons of cracklib2. */
++int
++__DEBIAN_SPECIFIC__SafeFascistCheck(password, path, errstr)
++const char *password;
++const char *path;
++char **errstr;
++{
++PWDICT *pwp;
++char pwtrunced[STRINGSIZE];
++
++/* If passed null for the path, use a compiled-in default */
++if ( ! path )
++{
++  path = DEFAULT_CRACKLIB_DICT;
++}
++
++/* security problem: assume we may have been given a really long
++   password (buffer attack) and so truncate it to a workable size;
++   try to define workable size as something from which we cannot
++   extend a buffer beyond its limits in the rest of the code */
++
++strncpy(pwtrunced, password, TRUNCSTRINGSIZE);
++pwtrunced[TRUNCSTRINGSIZE - 1] = '\0'; /* enforce */
++
++/* perhaps someone should put something here to check if password
++   is really long and syslog() a message denoting buffer attacks?  */
++
++if (!(pwp = PWOpen(path, r)))
++{
++  return 0;
++}
++
++/* sure seems like we should close the database, since we're only likely 
to check one password */
++*errstr = FascistLook(pwp, pwtrunced);
++
++PWClose(pwp);
++pwp = (PWDICT *)0;
++
++return 1;
++}
++
+ const char *
+ GetDefaultCracklibDict()
+ {
+--- a/python/_cracklibmodule.c
 b/python/_cracklibmodule.c
+@@ -42,6 +42,7 @@
+ #ifdef HAVE_LIBINTL_H
+ #include libintl.h
+ #endif
++#include errno.h
+ 
+ #ifdef HAVE_PTHREAD_H
+ static pthread_mutex_t cracklib_mutex = PTHREAD_MUTEX_INITIALIZER;
+@@ -74,7 

Bug#691115: unblock libdvdread/4.2.0+20120521-3

2012-12-12 Thread Dmitry Smirnov
On Wed, 12 Dec 2012 21:30:14 intrigeri wrote:
 Dmitry Smirnov wrote (12 Dec 2012 01:16:15 GMT) :
  There were no reply from maintainer in #688574 so perhaps it would
  be better to set Daniel as owner of this bug...
 
 Please do it if you feel it's useful.

Waht would you do?

 
 A full new upstream version was uploaded to unstable since
 then, so an update in testing would now have to go through t-p-u.

Thank you, I didn't notice that new libdvdread was uploaded.


 Given the crash fixed by 4.2.0+20120521-3 has severity normal,
 I'm unsure it's worth the effort.

I'm not sure if normal is an adequate severity for crash.
For example handbrake (not in testing) was unusable (crashing on DVD open) 
with libdvdread prior to 4.2.0+20120521-3.

 
 Dmitry, you filed the unblock request that is now outdated,
 what do you think?

We can close it if you think that's the right thing to do. What else we can 
do?


  IMHO even if fix is not implemented properly it is still prevent certain
  crashes which can't be worse than what's in testing right now.
 
 I'm not sure this would be worse than what's in testing right now, but
 let's acknowledge that the fix has potential for future regressions,
 and does not only bring good: using internal implementation details of
 other libraries results in code that can break without notice, in the
 future, when the depended upon library is updated.

I'm with you. Indeed that's choosing between bad and the worse.
However decision making here is simple -- on one hand we have a certain 
(confirmed) crash when on the other we have potential for regressions that may 
or may not be manifested. To me crash is too serious to ignore because the 
whole functionality of the package is compromised.

Regards,
Dmitry.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201212130940.05955.only...@member.fsf.org



Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Chris Knadle
On Wednesday, December 12, 2012 10:18:54, Nick Andrik wrote:
 2012/12/12 intrigeri intrig...@debian.org:
  Hi,
  
  Nick Andrik wrote (12 Dec 2012 14:32:35 GMT) :
  I don't have strong feelings in any case, I don't expect someone to be
  using this version of the package nowadays.
  On the other hand, I don't also see the clear benefits from removing it.
  
  OK. I think the key question then becomes: as the upcoming maintainer
  of kismet in Debian, do you want to commit to maintain 2008-05-R1-4.3
  in stable once Wheezy is released? (as in: dealing with security
  issues, fixing RC bugs through stable updates, answering bug
  reports, etc.)
 
 If there are any bugs reported on functionality (which I doubt) then
 it makes no sense trying to fix the 2008 version.

Ubuntu has several SIGSEGV crashes reported on kismet 2008-05-R1-4.3:
   https://launchpad.net/ubuntu/+source/kismet/+bugs

Upstream (Mike Kershaw, who I see at MHVLUG meetings) is frustrated by the 
fact that this old version of kismet is still being shipped in Ubuntu, because 
he regularly gets bugs reported to him directly from users that he isn't able 
to help with because the version is ancient.  I'm adding Mike to the list of 
recipients so that he can have a chance to offer an opinion on whether 
2008-06-R1-4.3 should be shipped in Wheezy (and thus shipped for another two 
years in Debian).

It'll be good to get a newer Kismet package in Unstable, since Ubuntu is based 
on Unstable.

 All other bugs are OK.
 
 BTW, I guess there is no chance to have the new package in wheezy once
 it gets released, is this correct?

To get a new version in it would have had to have been in Unstable before the 
freeze in June.  Around that time I made a newer Kismet package using 
debhelper v9, but it wasn't ready before the freeze and the package I made 
still needs a couple of tweaks, which is why I hadn't tried to file an ITA.

Nick -- let me know if you'd like to see what I did re: /debian/* files.  The 
main thing that needs tweaking in the package I came up with had to do with 
the menu shortcut and how to handle access permissions correctly.

 If we need to fix anything then I will have to keep different branches,
 i.e. one for stable and one for testing, right?

Maybe.  There will be different package versions, but branches implies using 
a version control system which isn't a requirement AFAIK.

  -- Chris

--
Chris Knadle
chris.kna...@coredump.us


signature.asc
Description: This is a digitally signed message part.


Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Nick Andrik
 If there are any bugs reported on functionality (which I doubt) then
 it makes no sense trying to fix the 2008 version.

 Ubuntu has several SIGSEGV crashes reported on kismet 2008-05-R1-4.3:
https://launchpad.net/ubuntu/+source/kismet/+bugs

I think that the ubuntu situation is orthogonal to the debian one.
Since ubuntu takes its packages from unstable, whether or not we
remove the package from stable is irrelevant.
Removing it from unstable is a different story.

 Upstream (Mike Kershaw, who I see at MHVLUG meetings) is frustrated by the
 fact that this old version of kismet is still being shipped in Ubuntu, because
 he regularly gets bugs reported to him directly from users that he isn't able
 to help with because the version is ancient.  I'm adding Mike to the list of
 recipients so that he can have a chance to offer an opinion on whether
 2008-06-R1-4.3 should be shipped in Wheezy (and thus shipped for another two
 years in Debian).

 It'll be good to get a newer Kismet package in Unstable, since Ubuntu is based
 on Unstable.

My package is almost ready, I expect only minor comments from the
review process which will take quite much time since the package is
huge and the changes really extensive.

 All other bugs are OK.

 BTW, I guess there is no chance to have the new package in wheezy once
 it gets released, is this correct?

 To get a new version in it would have had to have been in Unstable before the
 freeze in June.  Around that time I made a newer Kismet package using
 debhelper v9, but it wasn't ready before the freeze and the package I made
 still needs a couple of tweaks, which is why I hadn't tried to file an ITA.

OK, this opportunity has passed, but at least I can aim to have the
package in unstable in time for the ubuntu 13.04 release.
This is first week of March, 2013.

 Nick -- let me know if you'd like to see what I did re: /debian/* files.  The
 main thing that needs tweaking in the package I came up with had to do with
 the menu shortcut and how to handle access permissions correctly.

Thanks for your offer, but I think I'm ok for now.
I think I have already taken care of these two things.

 If we need to fix anything then I will have to keep different branches,
 i.e. one for stable and one for testing, right?

 Maybe.  There will be different package versions, but branches implies using
 a version control system which isn't a requirement AFAIK.

Branches can be even two directories in my disk :)
In any case, I'm planning to put the package in a VCS after the review
process is finished.

BTW, something I'm curious in, is how many people will keep using the
old 2008 version in stable (if it is shipped after all) if ubuntu and
unstable/testing have the most recent one.
What would be your estimation? Is there any way to get statistics for
usage (popcon) depending on the release?

Would a response like please use the recent version in testing  be acceptable?

Nick


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANn5kOt+=jxrzfmnjasvafkugy77crsmfqexxi+an7ru4cj...@mail.gmail.com



Re: Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Chris Knadle
On Wednesday, December 12, 2012 18:50:45, Nick Andrik wrote:
  If there are any bugs reported on functionality (which I doubt) then
  it makes no sense trying to fix the 2008 version.
  
  Ubuntu has several SIGSEGV crashes reported on kismet 2008-05-R1-4.3:
 https://launchpad.net/ubuntu/+source/kismet/+bugs
 
 I think that the ubuntu situation is orthogonal to the debian one.
 Since ubuntu takes its packages from unstable, whether or not we
 remove the package from stable is irrelevant.

The bugs for the kismet package in Ubuntu are irrelevant IFF the package in 
Wheezy doesn't have these SIGSEGV bugs.  ;-)  [The package versions are 
essentially identical, and Ubuntu starts with the packages in Debian.]

 Removing it from unstable is a different story.

Concerning Unstable I'm only suggesting updating the version of Kismet, which 
is what you've already been working on.  ;-)  [Thanks for this, BTW.]

  Upstream (Mike Kershaw, who I see at MHVLUG meetings) is frustrated by
  the fact that this old version of kismet is still being shipped in
  Ubuntu, because he regularly gets bugs reported to him directly from
  users that he isn't able to help with because the version is ancient. 
  I'm adding Mike to the list of recipients so that he can have a chance
  to offer an opinion on whether 2008-06-R1-4.3 should be shipped in
  Wheezy (and thus shipped for another two years in Debian).
  
  It'll be good to get a newer Kismet package in Unstable, since Ubuntu is
  based on Unstable.
 
 My package is almost ready, I expect only minor comments from the
 review process which will take quite much time since the package is
 huge and the changes really extensive.

Yes, I got bogged down trying to understand the .diff in the existing package 
(and that's before even trying to do a diff between the old and new package), 
so I know what you mean.

  All other bugs are OK.
  
  BTW, I guess there is no chance to have the new package in wheezy once
  it gets released, is this correct?
  
  To get a new version in it would have had to have been in Unstable before
  the freeze in June.  Around that time I made a newer Kismet package
  using debhelper v9, but it wasn't ready before the freeze and the
  package I made still needs a couple of tweaks, which is why I hadn't
  tried to file an ITA.
 
 OK, this opportunity has passed, but at least I can aim to have the
 package in unstable in time for the ubuntu 13.04 release.
 This is first week of March, 2013.

That looks like the feature freeze date, yes.

  Nick -- let me know if you'd like to see what I did re: /debian/* files. 
  The main thing that needs tweaking in the package I came up with had to
  do with the menu shortcut and how to handle access permissions
  correctly.
 
 Thanks for your offer, but I think I'm ok for now.
 I think I have already taken care of these two things.

Ok, cool.

  If we need to fix anything then I will have to keep different branches,
  i.e. one for stable and one for testing, right?
  
  Maybe.  There will be different package versions, but branches implies
  using a version control system which isn't a requirement AFAIK.
 
 Branches can be even two directories in my disk :)

Well... /usually/ the versions of a package in Unstable, Testing, and Stable 
are all slightly different.  snapshot.debian.org keeps a copy of all of these 
versions, so you effectively automatically get these branches in a way.  
For instance for kismet:

   http://snapshot.debian.org/package/kismet/

 In any case, I'm planning to put the package in a VCS after the review
 process is finished.
 
 BTW, something I'm curious in, is how many people will keep using the
 old 2008 version in stable (if it is shipped after all) if ubuntu and
 unstable/testing have the most recent one.
 What would be your estimation?

Popcon shows 1472 installs of the current package, and 4 kismet installs of a 
newer version that is not in sid (I'm one of the latter).

 Is there any way to get statistics for
 usage (popcon) depending on the release?

Sort of -- this deliniation is not reported on popcon.debian.org, but I 
believe these are statistics that do exist within Debian internally.  This 
recently came up in tech-ctte bug #688772:

   https://lists.debian.org/debian-ctte/2012/09/msg00077.html
   https://lists.debian.org/debian-ctte/2012/09/msg00090.html

 Would a response like please use the recent version in testing  be
 acceptable?

IMHO, no.  To install the package in Testing on a Stable box requires 
switching Debian trees temporarily and usually ends up requiring upgrading 
other packages due to version dependencies, and thus results in the box being 
in a mixed tree state; then the admin switches trees back to Stable, whereby 
the box doesn't get security updates for the packages that came from Testing.  
[I occasionally do this, and so far I've gotten away with it, but it wouldn't 
be something I'd advise someone else to do.]

A better plan for this, IMHO, would be to 

Bug#693351: RM: kismet/2008-05-R1-4.3

2012-12-12 Thread Nick Andrik
 I think that the ubuntu situation is orthogonal to the debian one.
 Since ubuntu takes its packages from unstable, whether or not we
 remove the package from stable is irrelevant.

 The bugs for the kismet package in Ubuntu are irrelevant IFF the package in
 Wheezy doesn't have these SIGSEGV bugs.  ;-)  [The package versions are
 essentially identical, and Ubuntu starts with the packages in Debian.]

I was referring to the status of being shipped/removed with the
current distributions.
Of course I expect the same segfaults in both of them.

 Removing it from unstable is a different story.

 Concerning Unstable I'm only suggesting updating the version of Kismet, which
 is what you've already been working on.  ;-)  [Thanks for this, BTW.]

You're very welcome. I'm also doing a favour to me here :)

 Branches can be even two directories in my disk :)

 Well... /usually/ the versions of a package in Unstable, Testing, and Stable
 are all slightly different.  snapshot.debian.org keeps a copy of all of these
 versions, so you effectively automatically get these branches in a way.
 For instance for kismet:

http://snapshot.debian.org/package/kismet/

That's something I didn't know, thanks!

 Popcon shows 1472 installs of the current package, and 4 kismet installs of a
 newer version that is not in sid (I'm one of the latter).

 Is there any way to get statistics for
 usage (popcon) depending on the release?

 Sort of -- this deliniation is not reported on popcon.debian.org, but I
 believe these are statistics that do exist within Debian internally.  This
 recently came up in tech-ctte bug #688772:

https://lists.debian.org/debian-ctte/2012/09/msg00077.html
https://lists.debian.org/debian-ctte/2012/09/msg00090.html

OK, it's not that important. I was just curious to know how many
people are actually using the old version.

 Would a response like please use the recent version in testing  be
 acceptable?

 IMHO, no.  To install the package in Testing on a Stable box requires
 switching Debian trees temporarily and usually ends up requiring upgrading
 other packages due to version dependencies, and thus results in the box being
 in a mixed tree state; then the admin switches trees back to Stable, whereby
 the box doesn't get security updates for the packages that came from Testing.
 [I occasionally do this, and so far I've gotten away with it, but it wouldn't
 be something I'd advise someone else to do.]

 A better plan for this, IMHO, would be to use backports.debian.org for having
 an upgraded package for Stable available, which could thus stick with the
 packages in Stable as much as possible, and thus continue to get security
 updates.

Sure, backport is fine. Or provide they can always take the source
from testing and build it themselves.
I usually do this in Ubuntu: I have the deb-src of the next release in
order to package the backports I need myself.

Nick


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CANn5kOuWmXkidfp8jRfC1f3=ythada1vk2gqccrv6dsbvwq...@mail.gmail.com



Re: emacsen-common 2.0.4 - acceptable for wheezy?

2012-12-12 Thread Rob Browning
Adam D. Barratt a...@adam-barratt.org.uk writes:

 On Sun, 2012-12-09 at 17:03 -0600, Rob Browning wrote:
 And when I submit 2.0.5 here, should I include the debdiff against
 2.0.4, or the full debdiff against what's currently in wheezy (i.e
 including the 2.0.4 and 2.0.5 diffs)?

 We'd like at least the latter for review purposes; feel free to include
 an incremental debdiff as well if you think it'd help / be useful.

OK, so here's the new version (2.0.5).  Note that the new (2.0.5
specific) changes have also been examined and tested by Sébastien
Villemot, which you can see at the end of the bug thread here:

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693472

Please let me know if I you think I should proceed with an upload to
unstable (for wheezy).

diff -Nru emacsen-common-2.0.3/debian/changelog emacsen-common-2.0.5/debian/changelog
--- emacsen-common-2.0.3/debian/changelog	2012-05-22 22:55:35.0 -0500
+++ emacsen-common-2.0.5/debian/changelog	2012-12-12 20:21:04.0 -0600
@@ -1,3 +1,42 @@
+emacsen-common (2.0.5) unstable; urgency=low
+
+  * Don't ignore dependency install scripts in emacs-package-install.  The
+previous code didn't actually update the script name properly in the
+loop where it was trying to install all of an add-on package's
+dependencies.  As a result, none of the dependencies' install scripts
+were actually invoked. Thanks to Sébastien Villemot
+sebast...@debian.org for tracking down the problem, and providing
+the patch. (closes: #693472)
+
+  * Invoke each add-on install script correctly as new-style or old-style.
+Previously, emacs-package-install would invoke all of the add-on
+install scripts in a dependency chain as either old-style or
+new-style, based solely on whether or not the package that triggered
+the install was old-style or new-style.  Now it should invoke each
+package's install script based on whether or not the package itself is
+new-style or old-style, as determined by the presence or absence of
+the policy-required /usr/lib/emacsen-common/packages/compat/PACAKGE
+file.  Thanks to Sébastien Villemot sebast...@debian.org for the
+report.  (closes: #693472)
+
+ -- Rob Browning r...@defaultvalue.org  Wed, 12 Dec 2012 20:15:05 -0600
+
+emacsen-common (2.0.4) unstable; urgency=low
+
+  * Don't use the obsolete calc package as a policy example.
+Thanks to A. N. Other a.n.other.deb...@gmail.com for the report.
+(closes: #674181)
+
+  * Don't override /usr/local/* load-path entries in debian-run-directories.
+Previously, debian-run-directories would prepend all of the add-on
+package paths to load-path, which meant that (in violation of Debian
+policy) /usr/local wouldn't preceed the other entries.
+Thanks to Hendrik Tews hend...@askra.de for the report and Kevin
+Ryde use...@zip.com.au for an initial suggested patch -- posted to
+#454778. (closes: #676424)
+
+ -- Rob Browning r...@defaultvalue.org  Sun, 02 Dec 2012 16:03:18 -0600
+
 emacsen-common (2.0.3) unstable; urgency=low
 
   * Move #DEBHEPLER# up in the postinst to avoid an emacs complaint about
diff -Nru emacsen-common-2.0.3/debian-emacs-policy emacsen-common-2.0.5/debian-emacs-policy
--- emacsen-common-2.0.3/debian-emacs-policy	2012-05-14 19:00:38.0 -0500
+++ emacsen-common-2.0.5/debian-emacs-policy	2012-05-27 12:20:49.0 -0500
@@ -312,11 +312,9 @@
 
It's been suggested, and is probably a good idea that maintainers
switch to using autoload rather than load when possible in their
-   site-start.d files.
-
-   For example, instead of (load some-package), you should use
-   autoloads for all the top level, user visible functions.  Currently
-   the calc package has a good example of this.
+   site-start.d files.  For example, instead of (load some-package),
+   you should use autoloads for all the top level, user visible
+   functions.
 
 
 
diff -Nru emacsen-common-2.0.3/debian-startup.el emacsen-common-2.0.5/debian-startup.el
--- emacsen-common-2.0.3/debian-startup.el	2012-02-11 16:06:54.0 -0600
+++ emacsen-common-2.0.5/debian-startup.el	2012-12-02 19:20:28.0 -0600
@@ -73,14 +73,14 @@
 (nreverse result)))
 
 (defun debian-run-directories (rest dirs)
-
   Load each file of the form XXfilename.el or XXfilename.elc in any
 of the dirs, where XX must be a number.  The files will be run in
 alphabetical order.  If a file appears in more than one of the dirs,
 then the earlier dir takes precedence, and a .elc file always
 supercedes a .el file of the same name.
 
-  (let* ((paths dirs)
+  (let* ((paths (mapcar 'copy-sequence dirs)) ; Ensure we have unique objects.
+
  ;; Get a list of all the files in all the specified
  ;; directories that match the pattern.
  (files
@@ -89,10 +89,9 @@
   (lambda (dir) 
 (directory-files dir nil ^[0-9][0-9].*\\.elc?$ t))
   paths)))
- 
+