Bug#724861: pu: package intel-microcode/1.20130906.1

2013-09-29 Thread Henrique de Moraes Holschuh
On Sun, 29 Sep 2013, Cyril Brulebois wrote:
 There is not much data on what release managers think about rushing
 upgrades into p-u, but the fact there's no definitive data point on the
 microcode update, and the fact that it has been available for less than
 a week seem to point out that letting this update reach p-u before the
 next point release is highly unlikely.

Let it cook for a while if you think its best, it is not like we really know
how emergencial these updates are (or are not).  wheezy-backports is there
to help anyone that requires less latency on microcode updates.

However, this stable update was not exactly rushed in the sense that the new
package really just changes docs and a data file, so it has negligible
chance of extra breakage when compared to what is already in p-u.

[1] even if we don't know anything about what the Intel datafile changes
*do*.

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130929060427.ga26...@khazad-dum.debian.net



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: cups_1.5.3-5+deb7u1_armel.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqay3-0007nm...@franck.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: glusterfs_3.2.7-3+deb7u1_armel.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqbic-0006th...@franck.debian.org



Processed: block 723569 with 722041 722020 722035 722033 722042 722040 722044 722018 722023, tagging 722018

2013-09-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 block 723569 with 722041 722020 722035 722033 722042 722040 722044 722018 
 722023
Bug #723569 [release.debian.org] transition: evolution-data-server 3.8 and 
friends
723569 was blocked by: 722022
723569 was not blocking any bugs.
Added blocking bug(s) of 723569: 722040, 722020, 722035, 722042, 722023, 
722041, 722044, 722018, and 722033
 tags 722018 + jessie sid
Bug #722018 [src:evolution-mapi] evolution-mapi: FTBFS agains 
evolution-data-server 3.8
Added tag(s) sid and jessie.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
722018: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722018
723569: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723569
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13804507284835.transcr...@bugs.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: glusterfs_3.2.7-3+deb7u1_mips.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqezq-cl...@franck.debian.org



Bug#724895: pu: package perspectives-extension/4.3.1-1+deb7u1

2013-09-29 Thread David Prévot
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu

Hi,

As agreed with the security team and the current maintainer, we’d like
to include this security fix via the upcoming point release, because the
package has a low popcon and requires a very unusual configuration to
trigger the flaw (but with such a configuration, it completely
undermines the security model perspectives attempts to provide).

The proposed update aim to fix the issue disclosed recently on the
upstream project website [1] and the upstream bug tracker [2].

1: 
http://perspectives-project.org/2013/09/19/security-alert-incorrect-quorum-with-low-number-of-notaries-andor-low-quorum-percentage/
2: https://github.com/danwent/Perspectives/issues/87

The two upstream commits to fix this issue (cb3d991 and 1f85a52) apply
properly into stable once fe6551e is also applied, thus the three
patches.

Regards

David

P.-S.: The fix “already” made it to Jessie.

-- System Information:
Debian Release: 7.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 
'stable'), (150, 'testing'), (120, 'unstable'), (110, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru perspectives-extension-4.3.1/debian/changelog perspectives-extension-4.3.1/debian/changelog
--- perspectives-extension-4.3.1/debian/changelog	2012-06-28 16:45:35.0 -0400
+++ perspectives-extension-4.3.1/debian/changelog	2013-09-26 19:47:24.0 -0400
@@ -1,3 +1,11 @@
+perspectives-extension (4.3.1-1+deb7u1) wheezy; urgency=low
+
+  * Backport security fix from 4.3.6.
+Incorrect quorum length with low number of notaries and/or low quorum
+percentage.
+
+ -- David Prévot taf...@debian.org  Thu, 26 Sep 2013 19:25:32 -0400
+
 perspectives-extension (4.3.1-1) unstable; urgency=low
 
   * New upstream version.
diff -Nru perspectives-extension-4.3.1/debian/patches/0001-Pers_client_policy-Add-checks-against-quorum-size-0.patch perspectives-extension-4.3.1/debian/patches/0001-Pers_client_policy-Add-checks-against-quorum-size-0.patch
--- perspectives-extension-4.3.1/debian/patches/0001-Pers_client_policy-Add-checks-against-quorum-size-0.patch	1969-12-31 20:00:00.0 -0400
+++ perspectives-extension-4.3.1/debian/patches/0001-Pers_client_policy-Add-checks-against-quorum-size-0.patch	2013-09-26 19:23:54.0 -0400
@@ -0,0 +1,50 @@
+From: Dave Schaefer dave.schae...@gmail.com
+Date: Wed, 18 Sep 2013 21:26:48 -0600
+Subject: Pers_client_policy - Add checks against quorum size 0
+
+We should never return true nor report any duration for sizes  1.
+
+Origin: upstream, https://github.com/danwent/Perspectives/commit/cb3d9913217afb0973281275cd4269ed0c1acc2c
+Bug: https://github.com/danwent/Perspectives/issues/87
+---
+ plugin/chrome/content/client_policy.js | 13 +
+ 1 file changed, 13 insertions(+)
+
+diff --git a/plugin/chrome/content/client_policy.js b/plugin/chrome/content/client_policy.js
+index fd74f43..72f31c6 100644
+--- a/plugin/chrome/content/client_policy.js
 b/plugin/chrome/content/client_policy.js
+@@ -119,6 +119,10 @@ get_all_key_changes : function(results) {
+ } , 
+ 
+ check_current_consistency : function(test_key,results,quorum_size,stale_limit_secs,cur_time) {
++	if (quorum_size  1) {
++		Pers_debug.d_print(error, ERROR: quorum size cannot be less than 1.);
++		return false;
++	}
+   	//get_all_key_changes(results); 
+ 	var num_valid = Pers_client_policy.get_num_valid_notaries(test_key,results,stale_limit_secs,cur_time);
+ 	Pers_debug.d_print(policy, 
+@@ -127,6 +131,10 @@ check_current_consistency : function(test_key,results,quorum_size,stale_limit_se
+ }, 
+ 
+ has_quorum_at_time : function(test_key, results, quorum_size, time) {
++	if (quorum_size  1) {
++		Pers_debug.d_print(error, ERROR: quorum size cannot be less than 1.);
++		return false;
++	}
+ 	Pers_debug.d_print(policy, testing quorum for time  + time + 
+ 			 and key:  + test_key); 
+ 	var total_valid = 0; 
+@@ -156,6 +164,11 @@ has_quorum_at_time : function(test_key, results, quorum_size, time) {
+ // returns duration in seconds - i.e. days * 24 * 3600.
+ get_quorum_duration : function(test_key, results, quorum_size, stale_limit_secs, unixtime) { 
+ 
++	if (quorum_size  1) {
++		Pers_debug.d_print(error, ERROR: quorum size cannot be less than 1.);
++		return false;
++	}
++
+ 	if(! Pers_client_policy.check_current_consistency(test_key,results,quorum_size,
+ 	stale_limit_secs,unixtime)) { 
+ 		Pers_debug.d_print(policy,current_consistency_failed); 
diff -Nru perspectives-extension-4.3.1/debian/patches/0002-Perspectives-Move-quorum-calculation-to-its-own-func.patch perspectives-extension-4.3.1/debian/patches/0002-Perspectives-Move-quorum-calculation-to-its-own-func.patch
--- 

Bug#723569: transition: evolution-data-server 3.8 and friends

2013-09-29 Thread Michael Biebl
Hi,

Am 21.09.2013 13:13, schrieb Michael Biebl:
 Am 21.09.2013 12:49, schrieb Michael Biebl:
 I've filed RM requests for
 tasks
 contacts
 dates
 evolution-exchange
 and poked Luca about that.

done

 almanah, obexd and hdate-applet had sourceful uploads in the mean time
 (either removing EDS support or updating it to the new API).
 I've prepared an NMU for gnome-phone-manager, uploaded to DELAYED/3,
 patch/debdiff sent to the maintainer for review.

gnome-phone-manager has been built successfully everywhere.


 jana and glables have been fixed in experimental, maintainers have been
 poked to upload the package to unstable.

jana has been uploaded to unstable, glables upload still pending.

 Sjoerd is currently looking into the gnome-panel crash that resulted
 from updating it to the new libgweather API.

Sjoerd has made the upload for libgweather and gnome-panel in the mean time.

 I went through the remaining list, and I'd like to request the removal
 from testing for the following packages. I checked all of them for
 reverse (build) dependencies
 
 - evolution-mapi (fix available, currently blocked by samba4/samba)
 - evolution-webcal (we still need to decide if we want to keep that)
 - syncevolution (new upstream version available which is supposed to fix
 the FTBFS, a bit too much for an NMU I think)
 - sflphone (looks like a useful application, with popcon numbers which
 are a bit to high to simply request its removal)
 - ruby-revolution (not quite sure about this one, tbh. popcon very low,
 last upload 2012-06-26, might be RM candidate)
 - eweouz (Tollef has been updating the package in the past for EDS API
 changes, so I'd keep it for now)

Tollef is currently investigating that. Apparently the package is more
or less ready and just needs an upload.

 - ffgtk (maintainer seems to be active, last upload 2013-06-28)


Anything else we can help with?
Please let us know, so we can finish this transition as quickly as possible.

Cheers,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#723569: transition: evolution-data-server 3.8 and friends

2013-09-29 Thread Julien Cristau
On Sun, Sep 29, 2013 at 16:08:31 +0200, Michael Biebl wrote:

 Anything else we can help with?
 Please let us know, so we can finish this transition as quickly as possible.
 
I'm waiting for a decruft of the ood eds binaries.

Cheers,
Julien


signature.asc
Description: Digital signature


Proposal of two release goals: honor of the CC and CXX variables + clang as a second compiler for Debian

2013-09-29 Thread Sylvestre Ledru
Hello,

I would like to propose two release goals for Jessie (and probably
Jessie + 1).

First, I would like to propose a release goal which will aim to make
sure that the CC and CXX variables are honored.
Currently, last time I tried, around 40 % of the packages will not take
in account such declaration [1].
CC=/usr/bin/randomcompiler CXX=/usr/bin/randomcompiler++ dpkg-buildpackage

This will require fixes in Debian build system and, in some cases,
upstream build systems (even if autotools based and cmake based should
be fine).

This first release goal is interesting for my second item but also for
experimentations with other tools like scan-build (and maybe to cross
building purposes too).


Second, for those who know me, it won't be surprise ;). I would like to
propose the support of clang (the compiler based on LLVM) as a second
compiler for the Debian archive.
Even if this will require some fixes in Debian codes, I am going to take
some of the load on LLVM/Clang (One of the way will be to decrease the
number of warnings activated by default in Clang and move some errors to
warnings: the -O6 error for example).
Of course, this release goal depends on the first one (there are
workarounds but not very clean).

I am going to write the wiki pages probably tomorrow.

Regards,
Sylvestre

[1] Basically, I replaced
/usr/bin/gcc* and /usr/bin/g++* by a script like:
#!/bin/sh

echo This should not be used
exit 42

and relaunched a full rebuild


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/524836b8.70...@debian.org



Bug#723569: transition: evolution-data-server 3.8 and friends

2013-09-29 Thread Michael Biebl
Am 29.09.2013 16:15, schrieb Julien Cristau:
 On Sun, Sep 29, 2013 at 16:08:31 +0200, Michael Biebl wrote:
 
 Anything else we can help with?
 Please let us know, so we can finish this transition as quickly as possible.

 I'm waiting for a decruft of the ood eds binaries.

Ok, this is something for our ftp-masters and they already know about
this. Is anything blocking the decrufting of the eds binaries (where we,
pkg-gnome, can help with)?

Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: Bug#723569: transition: evolution-data-server 3.8 and friends

2013-09-29 Thread Julien Cristau
On Sun, Sep 29, 2013 at 16:20:27 +0200, Michael Biebl wrote:

 Is anything blocking the decrufting of the eds binaries (where we,
 pkg-gnome, can help with)?
 
No.

Cheers,
Julien


signature.asc
Description: Digital signature


Re: Proposal of two release goals: honor of the CC and CXX variables + clang as a second compiler for Debian

2013-09-29 Thread Julien Cristau
On Sun, Sep 29, 2013 at 16:18:32 +0200, Sylvestre Ledru wrote:

 Hello,
 
 I would like to propose two release goals for Jessie (and probably
 Jessie + 1).
 
 First, I would like to propose a release goal which will aim to make
 sure that the CC and CXX variables are honored.
 Currently, last time I tried, around 40 % of the packages will not take
 in account such declaration [1].
 CC=/usr/bin/randomcompiler CXX=/usr/bin/randomcompiler++ dpkg-buildpackage
 
I for one don't think package builds should obey random environment
variables, so I wouldn't consider a failure of the above command a bug,
let alone an important one.  And 40% of failures means this isn't even
close to achievable as a release goal, even if there was consensus
around the idea.

What would that buy you over changing /usr/bin/cc and /usr/bin/c++
anyway?

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#724849: pu: package perl/5.14.2-21+deb7u1

2013-09-29 Thread Dominic Hargreaves
On Sat, Sep 28, 2013 at 11:07:30PM +0100, Adam D. Barratt wrote:
 Control: tags -1 + confirmed wheezy
 
 On 2013-09-28 19:08, Dominic Hargreaves wrote:
 Attached are two patches against perl 5.14.2-21 for consideration for
 the next wheezy point release.
 
 The first patch contains mainly functional changes with associated
 Debian bugs. The second set are
 correctness/believed-to-be-non-exploitable
 security issues taken from 5.14.4.
 
 Please note that a separate bug report will follow for
 libdigest-sha-perl, which will need to be released at the same time.
 
 Please would you let me know whether I may upload packages including
 either or both sets of changes?
 
 Assuming the resulting packages have been tested on wheezy systems,
 please feel free to go ahead with both sets of changes; thanks.

Yep. Thanks, done.

Dominic.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130929153615.gi19...@urchin.earth.li



Bug#724850: pu: package libdigest-sha-perl/5.71-2+deb7u1

2013-09-29 Thread Dominic Hargreaves
On Sat, Sep 28, 2013 at 11:00:14PM +0100, Adam D. Barratt wrote:
 Control: tags -1 + wheezy confirmed
 
 On 2013-09-28 19:14, Dominic Hargreaves wrote:
 As discussed in #724849, this should be considered for the next
 wheezy
 point release.
 
 Please go ahead; thanks.

Thanks, done.


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130929153603.gh19...@urchin.earth.li



Your tntnet {,old}stable uploads

2013-09-29 Thread Adam D. Barratt
Hi,

I noticed that there are tntnet uploads sitting in the stable NEW
and oldstable NEW queues, which appear to have been prepared for you.

I'm afraid that I'll be rejecting them, at least on the grounds that the
version number for the stable upload is 2.1-2+deb6u1, which indicates
that it was intended for Debian 6, which is currently oldstable;
similarly, the oldstable upload is versioned as 1.6.3-4+deb5u1 - lenny
is not oldstable.

Two other questions relating to the uploads:

- Have they been discussed with the security team, in terms of whether
they wish to issue a DSA? There's no indication of such discussion in
the bug log for #724746 at least.

- What's the plan for getting the bug fixed in unstable? Where bugs
apply to both stable and unstable, they should be fixed in unstable
first, in order to (hopefully) allow at least serious issues with the
patch to be discovered before it reaches stable.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380472676.4577.21.ca...@jacala.jungle.funky-badger.org



chmsee and education-desktop-lxde

2013-09-29 Thread Adam D. Barratt
Hi,

We're considering removing chmsee from stable due to its
non-compatibility with newer iceweasel versions; see #723116.

chmsee only has one reverse-dependency in the archive -
education-desktop-lxde, which recommends it. Given the nature of the
software, I'm not really sure why that recommendation is in place, and I
couldn't find any hints in the changelog.

Would anyone be able to enlighten me or provide further information?

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380474039.4577.25.ca...@jacala.jungle.funky-badger.org



NEW changes in oldstable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_1.6.3-4+deb5u1_amd64.changes
  REJECT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqk9f-000794...@franck.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_2.1-2+deb6u1_amd64.changes
  REJECT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqk9c-000729...@franck.debian.org



automake transition breakages

2013-09-29 Thread Ondřej Surý
Hi,

recent automake transition to 1.14 broke (FTBFS) at least two of my
packages.

Would it be possible to coordinate the (next) transition better than
uploaddeal with breakages like we do with the rest of our packages?

O.
-- 
Ondřej Surý ond...@sury.org
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380474955.16141.27835205.4f731...@webmail.messagingengine.com



Re: Your tntnet {,old}stable uploads

2013-09-29 Thread Adam D. Barratt
On Sun, 2013-09-29 at 17:37 +0100, Adam D. Barratt wrote:
 - Have they been discussed with the security team, in terms of whether
 they wish to issue a DSA? There's no indication of such discussion in
 the bug log for #724746 at least.
 
 - What's the plan for getting the bug fixed in unstable? Where bugs
 apply to both stable and unstable, they should be fixed in unstable
 first, in order to (hopefully) allow at least serious issues with the
 patch to be discovered before it reaches stable.

For the record, Kari confirmed off-list that the security team do not
plan to issue a DSA and that the bug does not affect the version of the
package in testing / unstable.

The packages have been re-uploaded with corrected version numbers and
I'll process them soon.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380482446.4577.33.ca...@jacala.jungle.funky-badger.org



Re: Your tntnet {,old}stable uploads

2013-09-29 Thread Nico Golde
Hi,
* Adam D. Barratt a...@adam-barratt.org.uk [2013-09-29 18:42]:
[...] 
 - Have they been discussed with the security team, in terms of whether
 they wish to issue a DSA? There's no indication of such discussion in
 the bug log for #724746 at least.

Yes, we advised him to fix this particular issue via spu.

Cheers
Nico
-- 
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0


pgpZ0_6m3mFmz.pgp
Description: PGP signature


Re: DSA concerns for jessie architectures - mips/mipsel

2013-09-29 Thread Tollef Fog Heen

Hi Graham,

]] Graham Whaley 

sorry if you get an unwanted Cc on this, I'm not sure what, if any of
the lists you're reading.

  I'd like to respond to your call for help regards the release
 qualification matrix, in particular for hardware (buildd and porter
 machines), and in particular for mips and mipsel arch.
 
  I wish to work with you to remedy some of the listed issues. I've started
 working with MIPS hardware vendors on availability and pricing of hardware.

That's good news, once you have solid numbers, I'd be most interested in
seeing them.  Feel free to just mail d...@debian.org if the numbers are
confidential.

  Having researched your current mips/mipsel setup and the requirements for
 jessie, the issues as I see them, and hopefully solutions, are:
 
 1) reliability. Corelli and Gabrielli are unstable. I saw the thread way
 back where they were investigated, but it seems un-fixable (and the
 machines are now rather old). Let's work on replacing both of those, and
 maybe Lucatelli as well, as it appears to be the same hardware (but
 possibly stable?).

I think this makes sense.

 2) supportability. We'll work on this to see what the options are. I'm sure
 we all want boxes that can be maintained/replaced easily.
 
 3) speed. I see 'mips' (but not mipsel in particular) listed as 'too slow'.
 Sure, Can somebody point me at some indication of the minimum requirement
 here (not that I'm particularly aiming at the minimum, I just wish to
 ensure we reach it :-). And, is this just pure
 single-multi-core/thread-machine speed, or is it a solvable problem by
 using multiple machines if necessary ?

I think others have covered this: the buildds need to be able to keep
up, which can be done with multiple machines.

In addition the current MIPS machines are currently significantly slower
than even armel (so that upgrading packages and running samhain take
unreasonably long).  These are single-core performance tasks and don't
scale with the number of machines.

 4) I see there is a note about an 'opcode implementation error' for a
 mipsel porter box. Sounds like a new machine(s) is needed there as well.
 Could somebody point me at some data on the opcode issue (more out of
 interest really...).

The mono JIT doesn't work on our MIPS machines due to the machines not
implementing the full architecture spec, AIUI.  Porter and buildd boxes
should not have hardware bugs like that.

 From the three types of machines I see you currently have I believe
 there are more modern versions of all of those, and possibly some
 others. I believe we will be able to locate hardware to solve the
 issues.

That would be great.  Ideally, we'd want fast, server class machines
with working OOB (both power and console), that use standard hardware
(SATA/SAS drives, etc) and that we have some kind of warranty for, so we
can get them replaced when they fail.  Ideally world-wide, so we can
have them hosted where we want.

-- 
Tollef Fog Heen, DSA
UNIX is user friendly, it's just picky about who its friends are


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8761tjz890@qurzaw.varnish-software.com



Re: Proposal of two release goals: honor of the CC and CXX variables + clang as a second compiler for Debian

2013-09-29 Thread Sylvestre Ledru
On 29/09/2013 16:36, Julien Cristau wrote:
 On Sun, Sep 29, 2013 at 16:18:32 +0200, Sylvestre Ledru wrote:

 Hello,

 I would like to propose two release goals for Jessie (and probably
 Jessie + 1).

 First, I would like to propose a release goal which will aim to make
 sure that the CC and CXX variables are honored.
 Currently, last time I tried, around 40 % of the packages will not take
 in account such declaration [1].
 CC=/usr/bin/randomcompiler CXX=/usr/bin/randomcompiler++ dpkg-buildpackage

 I for one don't think package builds should obey random environment
 variables, so I wouldn't consider a failure of the above command a bug,
Why ? I am not sure that CC  CXX are random variables :)
 let alone an important one.  And 40% of failures means this isn't even
 close to achievable as a release goal, even if there was consensus
 around the idea.
I will have to double check the number. It might be lower... but it is
quite high :(
 What would that buy you over changing /usr/bin/cc and /usr/bin/c++
 anyway?

It is pretty much the same. To change /usr/bin/cc, you have to make sure
that the packages will be using it...

Sylvestre


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52488d4d.7090...@debian.org



Processed: Re: Bug#724850: pu: package libdigest-sha-perl/5.71-2+deb7u1

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + pending
Bug #724850 [release.debian.org] pu: package libdigest-sha-perl/5.71-2+deb7u1
Added tag(s) pending.

-- 
724850: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724850
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b724850.138048706630663.transcr...@bugs.debian.org



Bug#724850: pu: package libdigest-sha-perl/5.71-2+deb7u1

2013-09-29 Thread Adam D. Barratt
Control: tags -1 + pending

On Sun, 2013-09-29 at 16:36 +0100, Dominic Hargreaves wrote:
 On Sat, Sep 28, 2013 at 11:00:14PM +0100, Adam D. Barratt wrote:
  On 2013-09-28 19:14, Dominic Hargreaves wrote:
  As discussed in #724849, this should be considered for the next
  wheezy
  point release.
  
  Please go ahead; thanks.
 
 Thanks, done.

Flagged for acceptance; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380487055.4577.34.ca...@jacala.jungle.funky-badger.org



Bug#724857: pu: package python-defaults/2.7.3-4

2013-09-29 Thread Adam D. Barratt
Control: tags -1 + pending

On Sat, 2013-09-28 at 23:42 -0400, Scott Kitterman wrote:
 On Sunday, September 29, 2013 04:14:13 Cyril Brulebois wrote:
  Scott Kitterman deb...@kitterman.com (2013-09-28):
   In Wheezy, we inadvertently failed to include /usr/bin/python2.  Since the
   freeze/release, it's become clearer that the use of /usr/bin/python2 in
   third party scripts is increasing.  Leaving aside the sanity of this
   approach, it is the upstream Python recommendation to provide it and
   Debian's lack of it is causing problems for users.
 ...
  
  Looks reasonable to me, please upload.
 
 Uploaded.

Flagged for acceptance.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380487170.4577.36.ca...@jacala.jungle.funky-badger.org



Processed: Re: Bug#724849: pu: package perl/5.14.2-21+deb7u1

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + pending
Bug #724849 [release.debian.org] pu: package perl/5.14.2-21+deb7u1
Added tag(s) pending.

-- 
724849: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724849
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b724849.138048711530786.transcr...@bugs.debian.org



Processed: Re: Bug#724857: pu: package python-defaults/2.7.3-4

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + pending
Bug #724857 [release.debian.org] pu: package python-defaults/2.7.3-4
Added tag(s) pending.

-- 
724857: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724857
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b724857.138048717831083.transcr...@bugs.debian.org



Bug#724849: pu: package perl/5.14.2-21+deb7u1

2013-09-29 Thread Adam D. Barratt
Control: tags -1 + pending

On Sun, 2013-09-29 at 16:36 +0100, Dominic Hargreaves wrote:
 On Sat, Sep 28, 2013 at 11:07:30PM +0100, Adam D. Barratt wrote:
  On 2013-09-28 19:08, Dominic Hargreaves wrote:
  Attached are two patches against perl 5.14.2-21 for consideration for
  the next wheezy point release.
  
  The first patch contains mainly functional changes with associated
  Debian bugs. The second set are
  correctness/believed-to-be-non-exploitable
  security issues taken from 5.14.4.
  
  Please note that a separate bug report will follow for
  libdigest-sha-perl, which will need to be released at the same time.
  
  Please would you let me know whether I may upload packages including
  either or both sets of changes?
  
  Assuming the resulting packages have been tested on wheezy systems,
  please feel free to go ahead with both sets of changes; thanks.
 
 Yep. Thanks, done.

Flagged for acceptance; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1380487107.4577.35.ca...@jacala.jungle.funky-badger.org



Bug#693216: pu: firebird2.5/2.5.2.26539.ds4-1

2013-09-29 Thread Cyril Brulebois
Hi Damyan,

Damyan Ivanov d...@debian.org (2013-05-28):
 This all happened, and firebird2.5 version 2.5.2.26540.ds4-1 had 20
 days in unstable without new bugs. It migrated to testing after a
 giveback on sparc (first attempt crashed the compiler). Perhaps it is
 time to consider it for 7.0.1?

looking at it for 7.2 now, sorry it took so long.

 The last patch, out/crash-create-db-restricted.patch is for a crash 
 that is claimed fixed in upstream Svn, but the actual commit is 
 missing. I have produced it by looking at the surrounding code. 
 Upstream bug is at http://tracker.firebirdsql.org/browse/CORE-3996

Given the current status on this page, I suspect a proper commit is
available now, I guess you could double check your fix is alright.

Some more comments inline.

 diff --git a/debian/NEWS b/debian/NEWS
 new file mode 100644
 index 000..2d884bb
 --- /dev/null
 +++ b/debian/NEWS
 @@ -0,0 +1,16 @@
 +firebird2.5 (2.5.2.26540.ds4-1) unstable; urgency=low
 +
 +  Important for big-endian server installations:
 +
 +  It has been discovered that before Firebird 2.5.2 (as packaged in debian
 +  package version 2.5.2.26539.ds4-1), CHAR_TO_UUID and UUID_TO_CHAR
 +  built-in functions work incorrectly on big-endian servers. On such 
 machines,
 +  bytes/characters are swapped and go in wrong positions when converting. The
 +  bug is fixed in this release, but that means these functions now return
 +  different values than before for the same input parameter.
 +
 +  Additionally, the CHAR_TO_UUID2/UUID_TO_CHAR2 functions that were added as
 +  fixed variants of the buggy functions in the 2.5.2 development cycle are
 +  dropped in this release.
 +
 + -- Damyan Ivanov d...@debian.org  Wed, 07 Nov 2012 17:52:10 +0200

Versions aren't consistent, maybe that was due to an intermediate
package, or maybe you're just trying to get a lower version than what's
in jessie/sid?

If you're rebuilding the 2.5.2.26540.ds4-1 package for wheezy, you
probably should be adding a changelog entry on top of it, using
2.5.2.26540.ds4-1~deb7u1 as a version number to indicate this is a mere
rebuild in wheezy (when adding stuff to a given package in wheezy, we
usually use $version_in_stable+deb7u1 instead).

From a quick glance at the -1 → -4 changelog, it doesn't look like there
should be more things you'd like to consider for wheezy, so -1 should
still be the package to be stable-backported?

 diff --git a/debian/changelog b/debian/changelog
 index d46c066..eb0b227 100644
 --- a/debian/changelog
 +++ b/debian/changelog
 @@ -1,3 +1,63 @@
 +firebird2.5 (2.5.2.26540.ds4-1) unstable; urgency=low
 +
 +  * Official 2.5.2 release
 ++ CORE-3912: segfault in superclassic (Closes: #693192)
 ++ Restored the on-disk-structure compatibility with 2.5.1 index keys
 +  (Closes: #693193)
 ++ Fixed broken (working as no-op) sweep in SuperServer (Closes: #693195)
 ++ CORE-3902: Derived fields may not be optimized via an index
 +  (Closes: #693196)
 ++ CORE-3895: High memory usage when PSQL code SELECT's from stored
 +  procedure which modified some data (Closes: #693202)
 ++ CORE-3238: GEN_UUID returns a non-RFC-4122-compliant UUID
 +  (Closes: #693207)
 ++ CORE-3887: CHAR_TO_UUID and UUID_TO_CHAR works different in big endian
 +  architectures (Closes: #693209)
 ++ Enabled per-table runtime stats for sweeper
 ++ Changes not concerning Debian
 +  - CORE-3786: Hangs on MacOSX 10.7 (Lion) on DB create after reboot
 +  - CORE-3911: API entrypoints Bopen and BLOB_open are not visible on 
 Darwin
 +  - CORE-3740: SELECT using IN list with 413 elements causes crash on 
 Mac
 +(stack overflow with default stack size)
 +  - CORE-3740: optimisation bug in GCC on Darwin

Some bug reports above aren't marked in the BTS as affecting stable; it
would be nice to add the relevant found versions there if you get a
chance.

 +  * Update debian/copyright (two new files, no licensing changes)

ACK.

 +  * Add NEWS.Debian about incompatible fix in char↔UUID conversion functions

Joys of behavorial changes due to correctness fixes. :/ I guess that
fixing and announcing it through NEWS.Debian is the best we can do…

 +  * drop patches included in the upstream release:
 ++ upstream/r54702-cve-2012-5529.patch
 ++ upstream/r57728-cve-2013-2429.patch
 +  * refresh separate-file-and-sem-perms.patch to apply cleanly

ACK.

 +  * Patches taken from upstream SVN
 ++ r57516r57773-gbak-y-redirection.patch
 +  make gbak -y work with redirection again (regression from 2.5.1)
 +  http://tracker.firebirdsql.org/browse/CORE-3995
 ++ r57707r57710-lots-autonomous-trx-leaks-crash.patch
 +  fix engine crash/memory leak with many autonomous transactions (remote
 +  crash/memory leak)
 +  http://tracker.firebirdsql.org/browse/CORE-3908
 ++ r57349-bad-trn-num-logged-during-sweep.patch
 +  fix invalid transaction counters logged during sweep (trivial fix)
 +  

Bug#698502: marked as done (pu: glusterfs/3.2.7-3+deb7u1)

2013-09-29 Thread Debian Bug Tracking System
Your message dated Sun, 29 Sep 2013 23:09:08 +0200
with message-id 20130929210907.gb21...@mraw.org
and subject line Re: Bug#698502: unblock: glusterfs/3.2.7-4
has caused the Debian Bug report #698502,
regarding pu: glusterfs/3.2.7-3+deb7u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
698502: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698502
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package glusterfs

It fixes the security bug #693112 aka CVE-2012-4417.



diff -Naur '--exclude=.svn' 3.2.7-3/debian/changelog 3.2.7-4/debian/changelog
--- 3.2.7-3/debian/changelog2012-11-12 20:37:46.218864002 +0100
+++ 3.2.7-4/debian/changelog2013-01-19 14:10:01.323965193 +0100
@@ -1,3 +1,12 @@
+glusterfs (3.2.7-4) unstable; urgency=medium
+
+  * Add backported upstream patch 04-CVE-2012-4417 to fix CVE-2012-4417:
+glusterfs allows local users to overwrite arbitrary files via a symlink
+attack on temporary files with predictable names.
+Closes: #693112
+
+ -- Patrick Matthäi pmatth...@debian.org  Sat, 19 Jan 2013 13:53:18 +0100
+
 glusterfs (3.2.7-3) unstable; urgency=low
 
   * Remove duplicated and faulty call of the glusterd daemon from the init
diff -Naur '--exclude=.svn' 3.2.7-3/debian/patches/04-CVE-2012-4417.diff 
3.2.7-4/debian/patches/04-CVE-2012-4417.diff
--- 3.2.7-3/debian/patches/04-CVE-2012-4417.diff1970-01-01 
01:00:00.0 +0100
+++ 3.2.7-4/debian/patches/04-CVE-2012-4417.diff2013-01-19 
14:10:01.323965193 +0100
@@ -0,0 +1,121 @@
+# Backported upstream patch to fix CVE-2012-4417:
+# GlusterFS 3.3.0, as used in Red Hat Storage server 2.0, allows local users to
+# overwrite arbitrary files via a symlink attack on temporary files with
+# predictable names.
+# Closes: #693112
+
+diff -Naur glusterfs-3.2.7.orig/libglusterfs/src/common-utils.h 
glusterfs-3.2.7/libglusterfs/src/common-utils.h
+--- glusterfs-3.2.7.orig/libglusterfs/src/common-utils.h   2012-06-10 
19:44:15.0 +0200
 glusterfs-3.2.7/libglusterfs/src/common-utils.h2013-01-19 
13:49:26.415982036 +0100
+@@ -134,6 +134,16 @@
+ }   \
+   } while (0);
+ 
++#define GF_REMOVE_SLASH_FROM_PATH(path, string) \
++do {\
++int i = 0;  \
++for (i = 1; i  strlen (path); i++) {   \
++string[i-1] = path[i];  \
++if (string[i-1] == '/') \
++string[i-1] = '-';  \
++}   \
++} while (0)
++
+ #define GF_FILE_CONTENT_REQUESTED(_xattr_req,_content_limit) \
+   (dict_get_uint64 (_xattr_req, glusterfs.content, _content_limit) == 0)
+ 
+diff -Naur glusterfs-3.2.7.orig/libglusterfs/src/statedump.c 
glusterfs-3.2.7/libglusterfs/src/statedump.c
+--- glusterfs-3.2.7.orig/libglusterfs/src/statedump.c  2012-06-10 
19:44:15.0 +0200
 glusterfs-3.2.7/libglusterfs/src/statedump.c   2013-01-19 
13:49:26.415982036 +0100
+@@ -62,15 +62,11 @@
+ 
+ 
+ static int
+-gf_proc_dump_open (void)
++gf_proc_dump_open (char *tmpname)
+ {
+-char path[256];
+ int  dump_fd = -1;
+ 
+-memset (path, 0, sizeof (path));
+-snprintf (path, sizeof (path), %s.%d, GF_DUMP_LOGFILE_ROOT, getpid 
());
+-
+-dump_fd = open (path, O_CREAT|O_RDWR|O_TRUNC|O_APPEND, 0600);
++dump_fd = mkstemp (tmpname);
+ if (dump_fd  0)
+ return -1;
+ 
+@@ -408,12 +404,13 @@
+ void
+ gf_proc_dump_info (int signum)
+ {
+-int   ret = -1;
+-glusterfs_ctx_t   *ctx = NULL;
+-
++int   ret = -1;
++glusterfs_ctx_t  *ctx = NULL;
++char brick_name[PATH_MAX] = {0,};
++char  tmp_dump_name[] = /tmp/dumpXX;
++char   path[PATH_MAX] = {0,};
+ 
+ gf_proc_dump_lock ();
+-ret = gf_proc_dump_open ();
+ if (ret  0)
+ goto out;
+ 
+@@ -422,23 +419,32 @@
+ if (ret  0)
+ goto out;
+ 
+-if (GF_PROC_DUMP_IS_OPTION_ENABLED (mem))
+-gf_proc_dump_mem_info ();
+-
+ ctx = glusterfs_ctx_get ();
+ 
+-

NEW changes in oldstable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_1.6.3-4+deb6u1_amd64.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqon8-0003mc...@franck.debian.org



Bug#698778: preapproval of expect/5.45-3

2013-09-29 Thread Cyril Brulebois
[ Dropping Holger from Cc, jenkins is more or less irrelevant anyway. ]

Julien Cristau jcris...@debian.org (2013-03-19):
 On Tue, Mar 19, 2013 at 13:36:31 +0100, intrigeri wrote:
 
  I suggest preparing and proposing a Jenkins dist-upgrade job (either
  as a patch against an existing appropriate job, or as a new job) to
  Holger (Cc'd), so that we have an easy way to verify that the Squeeze
  to Wheezy upgrade is indeed working fine with the proposed change.
  
 Does this test random combinations of installed packages?

I'm slightly conflicted (no pun intended) about this proposed update.
The change looks rather straightforward, and the amount of involved
packages isn't too huge (expectk + xsmbrowser, which seems to be
confirmed by simulating expectk's removal from oldstable). But adding
Breaks or Conflicts sometimes leads to huge side effects as far as
upgrade computations are concerned in the package manager land.

Julien, any prefered action?

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#698778: preapproval of expect/5.45-3

2013-09-29 Thread Sergei Golovan
Hi Cyril,

On Mon, Sep 30, 2013 at 1:37 AM, Cyril Brulebois k...@debian.org wrote:
 [ Dropping Holger from Cc, jenkins is more or less irrelevant anyway. ]

 Julien Cristau jcris...@debian.org (2013-03-19):
 On Tue, Mar 19, 2013 at 13:36:31 +0100, intrigeri wrote:

  I suggest preparing and proposing a Jenkins dist-upgrade job (either
  as a patch against an existing appropriate job, or as a new job) to
  Holger (Cc'd), so that we have an easy way to verify that the Squeeze
  to Wheezy upgrade is indeed working fine with the proposed change.
 
 Does this test random combinations of installed packages?

 I'm slightly conflicted (no pun intended) about this proposed update.
 The change looks rather straightforward, and the amount of involved
 packages isn't too huge (expectk + xsmbrowser, which seems to be
 confirmed by simulating expectk's removal from oldstable). But adding
 Breaks or Conflicts sometimes leads to huge side effects as far as
 upgrade computations are concerned in the package manager land.

I've uploaded this change to unstable (and it already hit testing). No
complains whatsoever.

Cheers!
-- 
Sergei Golovan


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/caoq2pxhyw26-hvlwzb2mnz+dodxlyypt5unq2crgipqmbjo...@mail.gmail.com



Bug#699806: unblock: dlocate/1.02+nmu3

2013-09-29 Thread Cyril Brulebois
Control: tag -1 patch

Adam D. Barratt a...@adam-barratt.org.uk (2013-04-28):
 On Sat, 2013-04-27 at 16:47 +0200, John Paul Adrian Glaubitz wrote:
  On 04/27/2013 04:45 PM, Adam D. Barratt wrote:
   Apologies for not getting back to you about this again sooner.
   Unfortunately it's now too late to get these fixes in to r0, but I do
   think we should consider whether some of them are appropriate for a
   stable update at a later point.
  
  Sounds like a great idea.
  
  So, I should push that to wheezy-proposed-updates after the release? I 
  haven't done any stable updates before, that's why I'm asking :).
 
 I think it's worth a review after the release of the requests we've
 postponed, before we ack them. I'll aim to do that in the couple of
 weeks after the release (after a couple of days recuperation), but feel
 free to ping us if you don't hear anything.

I've just had a look. I think it looks mostly good to me, I'm just not
an expert for the following parts:
 - PIPESTATUS,
 - bash completion,

so a second pair of eyes would be appreciated for those.

It doesn't look like many bugs were reported lately, so I guess we could
indeed consider dlocate for wheezy-proposed-updates; since that would be
a rebuild of 1.02+nmu3 for wheezy, we would probably welcome a changelog
entry on top of the current source package, using the following version:
1.02+nmu3~deb7u1.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#699806: unblock: dlocate/1.02+nmu3

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 patch
Bug #699806 [release.debian.org] pu: dlocate/1.02+deb7u1
Ignoring request to alter tags of bug #699806 to the same tags previously set

-- 
699806: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699806
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b699806.138049182223607.transcr...@bugs.debian.org



Bug#698778: preapproval of expect/5.45-3

2013-09-29 Thread Cyril Brulebois
Hi Sergei,

Sergei Golovan sgolo...@nes.ru (2013-09-30):
 I've uploaded this change to unstable (and it already hit testing). No
 complains whatsoever.

yes, I saw that, and that's nice. That doesn't buy us squeeze→wheezy
upgrade testing, though, which is what we would like to avoid breaking
or worsening.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#698778: preapproval of expect/5.45-3

2013-09-29 Thread Sergei Golovan
On Mon, Sep 30, 2013 at 1:59 AM, Cyril Brulebois k...@debian.org wrote:
 Hi Sergei,

 Sergei Golovan sgolo...@nes.ru (2013-09-30):
 I've uploaded this change to unstable (and it already hit testing). No
 complains whatsoever.

 yes, I saw that, and that's nice. That doesn't buy us squeeze→wheezy
 upgrade testing, though, which is what we would like to avoid breaking
 or worsening.

True. But as far as I see, the current situation with this upgrade is
far from perfect. It silently breaks expectk and packages which depend
on it. With conflict the user can choose whether to remove expectk or
to retain the old expect.

Cheers!
-- 
Sergei Golovan


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/caoq2pxf0dwj0ib-2n+q+h5hoiksjaaalrrxh8ewtmc0nzab...@mail.gmail.com



Bug#702278: busybox upload

2013-09-29 Thread Cyril Brulebois
Control: tag -1 -confirmed

Michael Tokarev m...@tls.msk.ru (2013-05-09):
 Control: reopen -1
 
 05.05.2013 12:00, Michael Tokarev wrote:
  Control: retitle -1 pu: busybox/1:1.20.0-8
 
 Hmm.  I didn't notice the bug has been closed...
 Reopening it (now re-titled as a pu), instead of
 submiting a new report, so that all the information
 is in one place.
 
 Thanks, and sorry for all the noize.
 
 /mjt

For the record, I think I would like to see some automated d-i
non-regression tests implemented before touching busybox in stable.

Spending more time with -release@ stuff those days, but still spending
some with -boot@, so hopefully we're getting those $some_day.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#702278: busybox upload

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 -confirmed
Bug #702278 [release.debian.org] pu: busybox/1:1.20.0-8
Removed tag(s) confirmed.

-- 
702278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702278
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b702278.138049255327686.transcr...@bugs.debian.org



Re: Upcoming changes in Tcl/Tk packaging

2013-09-29 Thread Sergei Golovan
Hi Matthias,

On Wed, Sep 25, 2013 at 5:12 PM, Matthias Klose d...@debian.org wrote:
 Am 25.09.2013 14:52, schrieb Sergei Golovan:

 There are 17 packages which build when 8.5 is the default version but
 fail to build
 after switching to 8.6. Most of them are patchable, though I'm not
 sure if they will
 work properly after that.

 would be nice to track these in some place.

I've created two pages on the wiki:
https://wiki.debian.org/Teams/DebianTclTk/UpgradeDefaultTclTkTo86 and
https://wiki.debian.org/Teams/DebianTclTk/TclTk84Removal and started
to report FTBFS bugs (with fixes if I can propose a fix). The first
page contains more than just tracking upgrade to 8.6. It contains
FTBFS due to various reasons, sometimes pretty unexpected.

Cheers!
-- 
Sergei Golovan


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAOq2pXGPHJx=fyq3he8ftazz8kc14fyk4p1k+e1bequl15_...@mail.gmail.com



Bug#704601: unblock: hdf5/1.8.8-9.1

2013-09-29 Thread Cyril Brulebois
Andreas Beckmann a...@debian.org (2013-04-03):
 This update fixes several upgrade issues (see #667599 and duplicates)
 involving hdf5. While it is not a perfect solution (there are still some
 upgrade paths failing), it is an improvement over what is currently in
 wheezy. A better solution would require significant reorganization of
 the hdf5 package stack.

I'm not sure I can possibly review this, and that we can possibly come
up with some metrics to find out whether the proposed diff makes the
situation strictly better than the current one. Especially since it's
already known that it doesn't lead to an ideal situation anyway.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#706209: unblock: ejabberd 2.1.10-5

2013-09-29 Thread Cyril Brulebois
Adam D. Barratt a...@adam-barratt.org.uk (2013-08-19):
 On Wed, 2013-05-22 at 22:15 +0100, Adam D. Barratt wrote:
  On Sat, 2013-05-11 at 18:26 +0100, Adam D. Barratt wrote:
   On Fri, 2013-04-26 at 15:46 +0400, Konstantin Khomoutov wrote:
It fixes one important bug [1] which prevents certain (correct) XMPP
client implementations (namely, the XMPP library used by git-annex) to
authenticate against the ejabberd server while using the SCRAM SHA-1
SASL authentication mechanism.
   
   Please go ahead with a stable upload, using 2.1.10-4+deb7u1 as the
   version and wheezy as the distribution.
  
  Any news on that?
 
 Ping?

Konstantin, it would be nice to have an answer. Otherwise I think we'll
just close this pu request and move on.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#706281: t-p-u: libusb/0.1.12-20+nmu2

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 moreinfo
Bug #706281 [release.debian.org] pu: libusb/0.1.12-20+nmu2
Added tag(s) moreinfo.

-- 
706281: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706281
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b706281.138049345032642.transcr...@bugs.debian.org



Bug#706281: t-p-u: libusb/0.1.12-20+nmu2

2013-09-29 Thread Cyril Brulebois
Control: tag -1 moreinfo

Andreas Beckmann a...@debian.org (2013-06-03):
 On 2013-05-22 01:57, Cyril Brulebois wrote:
  I'm not sure about the practical impact, besides “it's not nice to
  have undeterministic behaviours”. AFAICT, the extra .so doesn't hurt
  when it's here (you wouldn't suggest shipping it in the package
  otherwise, right?), and nobody has ever complained about its being
  missing AFAICT from your bug report.
 
 the src:json-c packages in unstable have a similar problem and people
 are getting spurious libjson0: error while loading shared libraries:
 libjson.so.0 errors (#709512), maybe that could be attributed to this
 ldconfig issue: leaving around a dangling SONAME symlink for an
 indefinite time

That's not really an answer to the question about practical impacts.

  So I guess I'll prefer sticking to the current status quo…

Accordingly, that's still true.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#706799: pu: net-snmp/5.4.3-3+wheezy1

2013-09-29 Thread Cyril Brulebois
Last ping before we close this pu request.

Mraw,
KiBi.

Adam D. Barratt a...@adam-barratt.org.uk (2013-08-19):
 Ping?
 
 On Sun, 2013-05-26 at 12:06 +0100, Adam D. Barratt wrote:
  On Sun, 2013-05-05 at 14:54 +0900, Hideki Yamane wrote:
I'd like to upload net-snmp package due to fix piuparts
failure with upgrade to newer version. Please check attached
debdiff (as I mistake, it contains unnecessary .ex file but
not remove it, just as is)
  
  If it's not meant to be there, why did you include it in the diff?
  
  A few comments on the proposed changes:
  
  +net-snmp (5.4.3~dfsg-3+wheezy1) stable-proposed-updates; urgency=low
  
  The version needs to be lower than the version in testing, so
  5.4.3~dfsg-3~deb7u1.
  
  +  if [ -h $docdir ]; then
  + rm -rf $docdir
  +  fi
  
  If the directory's a link, you only need rm $docdir.
  
  -   rm -rf debian/libsnmp-dev/usr/share/doc/libsnmp-dev
  -   rm -rf 
  debian/libsnmp$(LIB_VERSION)-dbg/usr/share/doc/libsnmp$(LIB_VERSION)-dbg
  -   rm -rf debian/libsnmp-perl/usr/share/doc/libsnmp-perl
  -   ln -sf libsnmp$(LIB_VERSION) 
  debian/libsnmp-dev/usr/share/doc/libsnmp-dev
  -   ln -sf libsnmp$(LIB_VERSION) 
  debian/libsnmp$(LIB_VERSION)-dbg/usr/share/doc/libsnmp$(LIB_VERSION)-dbg
  -   ln -sf libsnmp$(LIB_VERSION) 
  debian/libsnmp-perl/usr/share/doc/libsnmp-perl
  
  There's also a new preinst for libsnmp15, but under what circumstances
  would that ever be a symlink?
  
  Regards,
  
  Adam


signature.asc
Description: Digital signature


Bug#708521: marked as done (pu: package gcc-4.7/4.7.2-5+deb7u1)

2013-09-29 Thread Debian Bug Tracking System
Your message dated Mon, 30 Sep 2013 00:30:38 +0200
with message-id 20130929223038.gl21...@mraw.org
and subject line Re: Bug#708521: pu: package gcc-4.7/4.7.2-5+deb7u1
has caused the Debian Bug report #708521,
regarding pu: package gcc-4.7/4.7.2-5+deb7u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
708521: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708521
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu

Hi,

I'd like to get gcc-4.7 updated in wheezy to add an extra Breaks that
will fix some upgrade paths from squeeze (#690172).
It's mainly about giving apt a small push to remove some obsolete
packages (that existed in squeeze but no longer exist in wheezy) and
therefore properly upgrade all packages and don't 'keep back' that many.

I ve been testing this in piuparts for a long time now without running
into problems, but getting much cleaner upgrade results :-)

I would clearly prefer a maintainer upload (perhaps with some more
cherry-picked fixes) instead of doing a NMU.


Andreas
diff -u gcc-4.7-4.7.2/debian/control gcc-4.7-4.7.2/debian/control
--- gcc-4.7-4.7.2/debian/control
+++ gcc-4.7-4.7.2/debian/control
@@ -18,7 +18,7 @@
 Priority: required
 Depends: ${misc:Depends}
 Replaces: ${base:Replaces}
-Breaks: gcj-4.4-base ( 4.4.6-9~), gnat-4.4-base ( 4.4.6-3~), gcj-4.6-base ( 4.6.1-4~), gnat-4.6 ( 4.6.1-5~), dehydra (= 0.9.hg20110609-2)
+Breaks: gcc-4.4-base ( 4.4.7), gcj-4.4-base ( 4.4.6-9~), gnat-4.4-base ( 4.4.6-3~), gcj-4.6-base ( 4.6.1-4~), gnat-4.6 ( 4.6.1-5~), dehydra (= 0.9.hg20110609-2)
 Description: GCC, the GNU Compiler Collection (base package)
  This package contains files common to all languages and libraries
  contained in the GNU Compiler Collection (GCC).
diff -u gcc-4.7-4.7.2/debian/control.m4 gcc-4.7-4.7.2/debian/control.m4
--- gcc-4.7-4.7.2/debian/control.m4
+++ gcc-4.7-4.7.2/debian/control.m4
@@ -105,7 +105,7 @@
 Priority: PRI(required)
 Depends: ${misc:Depends}
 Replaces: ${base:Replaces}
-Breaks: gcj-4.4-base ( 4.4.6-9~), gnat-4.4-base ( 4.4.6-3~), gcj-4.6-base ( 4.6.1-4~), gnat-4.6 ( 4.6.1-5~), dehydra (= 0.9.hg20110609-2)
+Breaks: gcc-4.4-base ( 4.4.7), gcj-4.4-base ( 4.4.6-9~), gnat-4.4-base ( 4.4.6-3~), gcj-4.6-base ( 4.6.1-4~), gnat-4.6 ( 4.6.1-5~), dehydra (= 0.9.hg20110609-2)
 Description: GCC, the GNU Compiler Collection (base package)
  This package contains files common to all languages and libraries
  contained in the GNU Compiler Collection (GCC).
diff -u gcc-4.7-4.7.2/debian/changelog gcc-4.7-4.7.2/debian/changelog
--- gcc-4.7-4.7.2/debian/changelog
+++ gcc-4.7-4.7.2/debian/changelog
@@ -1,3 +1,10 @@
+gcc-4.7 (4.7.2-5.0anbe0piuparts0gcc47.1) UNRELEASED; urgency=low
+
+  * Non-maintainer upload.
+  * gcc-4.7-base: Add Breaks: gcc-4.4-base ( 4.4.7)  (Closes: #690172)
+
+ -- Andreas Beckmann deb...@abeckmann.de  Thu, 17 Jan 2013 14:10:12 +0100
+
 gcc-4.7 (4.7.2-5) unstable; urgency=low
 
   * Add __gnu_* symbols to the libgcc1 symbols file for armel and armhf.
---End Message---
---BeginMessage---
Julien Cristau jcris...@debian.org (2013-06-03):
 On Mon, Jun  3, 2013 at 20:02:45 +0200, Andreas Beckmann wrote:
 
  I'm pretty confident this only has an influence on the upgrades that
  didn't upgrade gcc-4.4-base (and kept the version from squeeze).
  I can help testing upgrade paths in advance if you can describe some
  squeeze package sets you are interested in.
  And I'll help debugging+fixing in case there are any unexpected failures
  caused by this.
  
 The time to play with/debug/fix the upgrade path is a year ago, not post
 release, IMO.  For non-critical issues (and a few packages are held
 back and need manual handling certainly isn't critical), I don't think
 we should be doing anything at this stage.  I don't think any amount of
 testing is going to convince me otherwise.  OMMV.

Same mileage here. Already not happy with situations which are way
easier, so certainly not going to play around with core packages like
those. Closing accordingly.

Mraw,
KiBi.


signature.asc
Description: Digital signature
---End Message---


Processed: tagging 724861, tagging 724895

2013-09-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 724861 + wheezy
Bug #724861 [release.debian.org] pu: package intel-microcode/1.20130906.1
Added tag(s) wheezy.
 tags 724895 + wheezy
Bug #724895 [release.debian.org] pu: package 
perspectives-extension/4.3.1-1+deb7u1
Added tag(s) wheezy.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
724861: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724861
724895: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724895
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13804942915537.transcr...@bugs.debian.org



Bug#711551: pu: package redmine/1.4.4+dfsg1-2

2013-09-29 Thread Cyril Brulebois
Control: tag -1 -moreinfo +confirmed

Jérémy Lal kapo...@melix.org (2013-06-10):
 --- redmine-1.4.4+dfsg1/debian/changelog  2013-01-19 15:54:09.0 
 +0100
 +++ redmine-1.4.4+dfsg1/debian/changelog  2013-06-10 01:01:48.0 
 +0200
 @@ -1,3 +1,14 @@
 +redmine (1.4.4+dfsg1-2+deb7u1) proposed-updates; urgency=low

Even though that would work, I'd be happy to see wheezy in there,
which can be useful after a while to figure out which suite was targeted
at that point (without having to look at the version number, and its
meaning).

 +  [ Ondřej Surý ]
 +  * Pull upstream fixes for Ruby 1.9 as default interpreter:
 ++ Use DateTime.parse as alternative to ParseDate.parsedate,
 +  fixing time series and schedule SVG graphs. (Closes: #700754)
 ++ Use ::Time from global namespace, fixing REST Issue API.
 +  (Closes: #79)

Assuming the latter change doesn't break the Ruby 1.8 use case (and
doesn't need a dance similar to the respond_to one in the former),
please upload (with or without an edit for the above mentioned point).

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#711551: pu: package redmine/1.4.4+dfsg1-2

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 -moreinfo +confirmed
Bug #711551 [release.debian.org] pu: package redmine/1.4.4+dfsg1-2
Removed tag(s) moreinfo.
Bug #711551 [release.debian.org] pu: package redmine/1.4.4+dfsg1-2
Added tag(s) confirmed.

-- 
711551: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711551
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b711551.13804945227123.transcr...@bugs.debian.org



Bug#714140: pu: package tgt/1.0.17-1

2013-09-29 Thread Cyril Brulebois
Hi Thomas,

Thomas Goirand z...@debian.org (2013-06-26):
 Dear release team,
 
 Wheezy has been released with a version of tgt which doesn't have an init
 script. I fixed the version in Sid on the 2013-05-21 (adding the missing
 init.d script).
 
 Now, I would like to upload a fix for Wheezy. The debdiff between
 1:1.0.17-1 and 1:1.0.17-1.1 is attached.
 
 Would you allow me to upload the fixed tgt package into s-p-u?

if I get the picture right, that package reached the archive on 2011-06-21
but no bug was reported about that missing init script, and that was only
implemented on 2013-05-21. It doesn't appear to have been a huge lack, so
I don't think it's worse a stable upload. Waiting a bit to see if other
team members disagree.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#715552: pu: package nova/2012.1.1-18+deb7u1

2013-09-29 Thread Cyril Brulebois
Adam D. Barratt a...@adam-barratt.org.uk (2013-08-10):
 Control: tags -1 + confirmed
 
 On Wed, 2013-07-10 at 14:09 +0200, Julien Cristau wrote:
  this proposed update for nova fixes CVE-2013-2096.  AFAIK this is just a
  DoS, so probably not worth a DSA.
  The fix for sid is pending NEW processing, AIUI.

The fix is now in, apparently; also, it looks like the BTS wants to be told
wheezy is affected as well.

 Please go ahead; sorry for the delay.

Ping? :)

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#716816: pu: package firetray/0.4.6-1~deb7u1

2013-09-29 Thread Cyril Brulebois
Hi David,

David Prévot taf...@debian.org (2013-07-12):
 The recent ice{weasel,dove} upgrade via debian-security broke some
 xul-ext-$stuff, and some of them can simply be fixed by updating the
 supported versions.
 
 FireTray is not among those, not only it will FTBFS with the
 xulrunner-dev coming from wheezy-security (#713526), but it becomes
 totally incompatible with the new icedove version (#648890, #678575).
 
 The new upstream version that has just been uploaded to Sid works
 already fine in Wheezy, but the 0.4 branch has nothing in common with
 the 0.3 one: it’s a complete rewrite in js-ctypes.
 
 On the bright side: it works, and since it became Architecture: All,
 FTBFS is a lot less likely to happen again. There is currently no tight
 versioned dependency to ice{weasel,dove}.
 
 On the other side, the upstream code doesn’t have anything in common
 with the version currently in Wheezy, and the few preferences get lost
 on upgrade.

thanks for all the details.

 Please find attached the minimalist debdiff of the packaging I was able
 to provide while preparing the 0.4.6-0.1 NMU. I ended up adopting the
 package, so the actual debdiff is a bit more invasive, mostly removing
 useless stuff (e.g. patches, build dependencies) and properly
 documenting the copyright).
 
 So would you consider updating firetray to the version currently in Sid
 once it spent the necessary amount of time you’ll judge reasonable in
 Jessie (I’ll then prepare a ~deb7u1 version built in Wheezy)? 

Given the highly suboptimal situation with ice* through security, I
guess the proposed plan looks as reasonable as it gets. Does that
version work with the ice* packages we currently have in stable still?

(Haven't looked at the source package or at the diff at the moment.)

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#717445: pu: package ndiswrapper/1.57-1+deb7u1

2013-09-29 Thread Cyril Brulebois
Control: tag -1 moreinfo

Julian Andres Klode j...@debian.org (2013-07-21):
 But it might make sense to include the patch:
 
   * Patch userland for 3.X kernels
 
 While there is no bug report for that, it fixes the ndiswrapper
 tool to use modprobe.d and modprobe.conf on 3.X kernels, instead of
 modutils/ and modules.conf.

Speaking of which, that only works for 3.x.y kernels:

 --- /dev/null
 +++ b/debian/patches/Add-support-for-3.x-kernel-versions.patch
 @@ -0,0 +1,28 @@
 +From 71ec9e8a80b74652d660232b560bbe1dfa7915ba Mon Sep 17 00:00:00 2001
 +From: Tim Gardner tim.gard...@canonical.com
 +Date: Mon, 13 Feb 2012 14:19:58 -0700
 +Subject: [PATCH] Add support for 3.x kernel versions
 +
 +As suggested by Kano on Freenode #ubuntu-kernel
 +
 +Signed-off-by: Tim Gardner tim.gard...@canonical.com
 +---
 + utils/ndiswrapper | 2 +-
 + 1 file changed, 1 insertion(+), 1 deletion(-)
 +
 +diff --git a/utils/ndiswrapper b/utils/ndiswrapper
 +index 4bb91f2..ba082a3 100755
 +--- a/utils/ndiswrapper
  b/utils/ndiswrapper
 +@@ -55,7 +55,7 @@ if (@ARGV  1) {
 + 
 + my $modconf;
 + if (`uname -r` =~ /(\d+)\.(\d+)\.(\d+)/) {
 +-if ($2  4) {
 ++if (($2  4) || ($1  2)) {

The regex isn't anchored (^) and wants 3 components. The third one was
dropped a while ago, but maybe in a version higher than what this module
supports anyway. Just thought I'd mention it…

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#717445: pu: package ndiswrapper/1.57-1+deb7u1

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 moreinfo
Bug #717445 [release.debian.org] pu: package ndiswrapper/1.57-1+deb7u1
Added tag(s) moreinfo.

-- 
717445: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717445
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b717445.138049605115744.transcr...@bugs.debian.org



Bug#717493: pu: package sympa/6.1.11~dfsg-5.1~deb7u1

2013-09-29 Thread Cyril Brulebois
Julien Cristau jcris...@debian.org (2013-07-21):
 On Sun, Jul 21, 2013 at 15:27:17 +0200, Andreas Beckmann wrote:
 
  On 2013-07-21 15:13, Adam D. Barratt wrote:
   Whichever solution was chosen, it looks like this bug is not fixed in
   unstable yet?
  
  Yes, I wanted to write a sentence about this as well ...
  
  If the release team considers adding a pre-depends in stable as
  acceptable, I would first upload a NMU to sid (same patch, just omitting
  the wheezy changelog entry) and later on to wheezy.
  Instead of doing NMUs, maintainer uploads would be welcome of course!
  
 I think adding a pre-depends in stable would be worse than this bug.

Indeed.

To reduce user perplexity, I guess we could consider getting sympa to
catch this situation instead, which would reduce side effects. I think
something along the lines of this commit would go in a better direction
that adding a Pre-Depends:
  
http://anonscm.debian.org/gitweb/?p=collab-maint/sympa.git;a=commitdiff;h=7ab6b9b7de9ec7cd27ebf2d8046f7ea227b583a6

(I'm attaching it for reference.)

Mentioning how to fix the issue would be even nicer.

Mraw,
KiBi.
Description: Raise a warning instead of an error when the CA bundle file is not 
readable.
  For its internal usage (to make https request and verify smime mail 
signatures) Sympa
  needs access to the Certificates Authorities installed on the system.

  Certificates Authorities are available in the package ca-certificates and
  this package also provides a single file with all the CA concatenated.
  The location of this file is /etc/ssl/certs/ca-certificates.crt

  Sympa package provides a symlink from /usr/share/sympa/default/ca-bundle.crt
  to /etc/ssl/certs/ca-certificates.crt

  Recently, to fix bug #537051 the ca-certificates package maintainer has
  decided to replace the CA bundle generation
  (/etc/ssl/certs/ca-certificates.crt) in the postinst by a trigger.

  During installation of Sympa, if ca-certificates is not present, it is
  installed as a Sympa dependency but the sympa postinst will always be
  executed before the ca-certificates triggers.
  It means that Sympa start will fail with an error because
  /etc/ssl/certs/ca-certificates.crt does not exists (not yet generated by the
  ca-certificates trigger).

  The following patch tries to detect if the CA bundle configured in sympa is a
  symlink to /etc/ssl/certs/ca-certificates.crt. In that case, a warning raised
  instead of en error.

  This is a purely Debian specific fix, which is quite ugly but it works.

  A better patch will be very much appreciated.
Author: Emmanuel Bouthenot kol...@debian.org
Bug-Debian: http://bugs.debian.org/706965
Forwarded: not-needed
Last-Update: 2013-07-02
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
--- a/src/lib/Conf.pm
+++ b/src/lib/Conf.pm
@@ -920,7 +920,11 @@
 
 ## Check cafile and capath access
 if (defined $Conf{'cafile'}  $Conf{'cafile'}) {
-   unless (-f $Conf{'cafile'}  -r $Conf{'cafile'}) {
+   my $debian_ca_bundle = '/etc/ssl/certs/ca-certificates.crt';
+   if (-l $Conf{'cafile'}  ! -r $Conf{'cafile'}  
readlink($Conf{'cafile'}) == $debian_ca_bundle) {
+   do_log('warning', 'cafile (%s) is a symlink to the Debian CA 
certificates bundle (%s) which is not yet installed yet (see #706965)', 
$Conf{'cafile'}, $debian_ca_bundle);
+   }
+   elsif (! -f $Conf{'cafile'} || ! -r $Conf{'cafile'}) {
do_log('err', 'Cannot access cafile %s', $Conf{'cafile'});
unless (List::send_notify_to_listmaster('cannot_access_cafile', 
$Conf{'domain'}, [$Conf{'cafile'}])) {
do_log('err', 'Unable to send notify cannot access cafile to 
listmaster');   


signature.asc
Description: Digital signature


Bug#717498: pu: package bootchart/0.10~svn407-4.1~deb7u1

2013-09-29 Thread Cyril Brulebois
Andreas Beckmann a...@debian.org (2013-07-21):
 On 2013-07-21 18:11, Adam D. Barratt wrote:
  On Sun, 2013-07-21 at 16:51 +0200, Andreas Beckmann wrote:
  the change I suggested for sysvinit (#694252) and got applied in
  sysvinit/2.88dsf-41+deb7u1 does not fix the bootchart upgrade path
  lenny-squeeze-wheezy, but instead renders bootchart uninstallable in
  stable (and sid as well): #717495.
  
  Hmmm, I'd rather assumed that was the point, given that the Breaks
  matches the only version of bootchart in the archive.
 
 but it makes a package in stable uninstallable without planning to
 remove it from stable ... and that does not fix the upgrade issue in sysv-rc
 
  Is keeping bootchart around still useful? The last upload of any kind
  was in 2009, with the last maintainer upload in early 2008.
 
 If the package were removed entirely (or at least version -3.3+1 would
 be forced to rename the initscript), we could have sysv-rc use
 dpkg-maintscript-helper rm_conffile to get rid of that script ... that
 would even cover the case where bootchart lenny was installed, removed,
 the initscript remained and the system would be upgraded to squeeze and
 wheezy later on.
 
  Going back through the history of the sysvinit bug, I have to admit to
  being rather confused. You state that 0.10~svn407-3.3 was the last
  existing and therefore broken version in lenny (and on
  snapshots.d.o). However, the lenny packages files (as on archive.d.o)
  indicates that lenny contained -3; the fix for #491391 in bootchart was
  included in -3.1. Please clarify... :-|
 
 I think I have mixed up the versions -3 vs. -3.3 at some point,
 therefore suggesting to add the wrong Breaks against  -4, after seeing
 that a Breaks against -3 was not sufficient to fix that upgrade path.
 That Breaks actually worked, but it was not sufficient to ensure -3.3
 gets configured before sysv-rc, leaving the bad initscript still around.
 
 At the time I initially filed the bug I didn't have piuparts ready to
 easily do upgrade tests with the new --testdebs-repo option, otherwise I
 might have tried the Breaks approach myself (and seen that it does not
 work as planned).
 
 
 Entirely new approach to fix this much less intrusively:
 
 bootchart.preinst:
 on upgrade from  -4
 sed -i 's/rmnologin/$all/' /etc/init.d/bootchart
 # makes the initscript identical to the new shipped one, so no conffile
 prompts (unless there were other user modifications)
 
 bump version to -4.1 / -4.1~deb7u1 to satisfy initscripts

I'm really tempted by not even trying to fix it, adding layers of
patches on top of each others, trying to compensate for things that are
unmaintained and broken isn't very nice (reminds me of sgml-base…).

Adam, what's your take on this one?

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#716816: pu: package firetray/0.4.6-1~deb7u1

2013-09-29 Thread David Prévot
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Cyril,

Thanks for getting back to this request.

Le 29/09/2013 18:58, Cyril Brulebois a écrit :

 Does that
 version work with the ice* packages we currently have in stable still?

Just tested again (I think I already did, but since I didn’t mentioned
it in my previous longish message, I have a doubt now), and it works
fine with the 10.0 versions currently in stable too (and of course with
the 17.0 version from stable-security, where it is already used daily on
some machines for a while).

 (Haven't looked at the source package or at the diff at the moment.)

That’s a painful thing to do (been there, done that…).

Regards

David


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJSSLf8AAoJEAWMHPlE9r08VDYIAIfUgITBTx1mW1SYmtORuMZ2
EDof7YrUjPL8E3/7vRKjLOFIGU0VWij0cqpjJNcuusFNgC6XpT+wHzw5lHCNssQw
zu8k3cyYPxGNFjC/7/3Q21lW67UQhW/9KJJef4g8eHwuOJ5sIpslgHKTysi/ywwD
63fBGYlcFcq99DbZ+lJ7hmFoEyfagZEhzEO2s5FaW73Ic9QLT6PApKPPufhOXl6H
U8T6IvVLtIZeOdqnFl8Q8cfNz+wfz1J0Gn8IrKCdaqrkq9ukMVC//NwwaLosgA9/
9NMU/77vXKJoLa029SiG0WvJXWuMr440/G9Pn4gSm2/ENmWqnkbyDvPikNUTPUk=
=TWVG
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5248b7fc.3020...@debian.org



Bug#719520: pu: package coherence/0.6.6.2-6

2013-09-29 Thread Cyril Brulebois
Control: tag -1 -patch +confirmed

[ We don't use the patch tag for pu requests. ;) ]

Hi Eric,

Eric Evans eev...@sym-link.com (2013-09-23):
 [ Cyril Brulebois ]
  it looks reasonable to me; please post a debdiff with that patch applied
  on top of 0.6.6.2-6, versioned as 0.6.6.2-6+deb7u1 (I don't mind updated
  Maintainer/Uploaders in the process), targeting 'wheezy' for a last review.
 
 Great; debdiff attached
 
 Thanks!
 
 -- 
 Eric Evans
 eev...@sym-link.com

 diff -Nru coherence-0.6.6.2/debian/changelog 
 coherence-0.6.6.2/debian/changelog
 --- coherence-0.6.6.2/debian/changelog2011-07-31 21:52:04.0 
 -0500
 +++ coherence-0.6.6.2/debian/changelog2013-09-23 15:41:41.0 
 -0500
 @@ -1,3 +1,9 @@
 +coherence (0.6.6.2-6+deb7u1) unstable; urgency=low
 wheezy, please ;)
 +
 +  * Patch to fix tracebacks for missing attribute (Closes: #664027).

I guess you could mention this fixes incompatibilities in newer Twisted
releases. FWIW that's not because we like to nitpick, but because we
then use info from changelog to write down oneliners for stable update
announces.

Otherwise, looks good to me, feel free to upload with the distribution
fixed, optionally with a slightly more verbose changelog entry.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#719520: pu: package coherence/0.6.6.2-6

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 -patch +confirmed
Bug #719520 [release.debian.org] pu: package coherence/0.6.6.2-6
Removed tag(s) patch.
Bug #719520 [release.debian.org] pu: package coherence/0.6.6.2-6
Added tag(s) confirmed.

-- 
719520: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719520
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b719520.138049772724381.transcr...@bugs.debian.org



Bug#716816: pu: package firetray/0.4.6-1~deb7u1

2013-09-29 Thread Cyril Brulebois
David Prévot taf...@debian.org (2013-09-29):
 Le 29/09/2013 18:58, Cyril Brulebois a écrit :
  Does that version work with the ice* packages we currently have in
  stable still?
 
 Just tested again (I think I already did, but since I didn’t mentioned
 it in my previous longish message, I have a doubt now), and it works
 fine with the 10.0 versions currently in stable too (and of course
 with the 17.0 version from stable-security, where it is already used
 daily on some machines for a while).

Fine, I think firetray/0.4.6-1~deb7u1 is the best we can hope for then.

Thanks for the quick follow-up.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#715552: marked as done (pu: package nova/2012.1.1-18+deb7u1)

2013-09-29 Thread Debian Bug Tracking System
Your message dated Mon, 30 Sep 2013 01:41:20 +0200
with message-id 20130929234120.gi3...@mraw.org
and subject line Re: Bug#715552: pu: package nova/2012.1.1-18+deb7u1
has caused the Debian Bug report #715552,
regarding pu: package nova/2012.1.1-18+deb7u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
715552: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715552
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: n...@packages.debian.org

Hi,

this proposed update for nova fixes CVE-2013-2096.  AFAIK this is just a
DoS, so probably not worth a DSA.
The fix for sid is pending NEW processing, AIUI.

diff -Nru nova-2012.1.1/debian/changelog nova-2012.1.1/debian/changelog
--- nova-2012.1.1/debian/changelog  2013-04-10 13:14:21.0 +0200
+++ nova-2012.1.1/debian/changelog  2013-07-10 12:10:00.0 +0200
@@ -1,3 +1,10 @@
+nova (2012.1.1-18+deb7u1) UNRELEASED; urgency=low
+
+  * CVE-2013-2096: Check QCOW2 image size during root disk creation
+(closes: #710157).  Apply patch from Jamie Strandboge.
+
+ -- Julien Cristau julien.cris...@logilab.fr  Fri, 14 Jun 2013 14:02:42 +0200
+
 nova (2012.1.1-18) unstable; urgency=low
 
   * nova-common isn't anymore using /usr/share/doc to store configuration files
diff -Nru nova-2012.1.1/debian/patches/CVE-2013-2096_essex.patch 
nova-2012.1.1/debian/patches/CVE-2013-2096_essex.patch
--- nova-2012.1.1/debian/patches/CVE-2013-2096_essex.patch  1970-01-01 
01:00:00.0 +0100
+++ nova-2012.1.1/debian/patches/CVE-2013-2096_essex.patch  2013-07-10 
12:10:00.0 +0200
@@ -0,0 +1,31 @@
+Author: Jamie Strandboge ja...@canonical.com
+Description: Check QCOW2 image size during root disk creation
+ glance can only tell us the size of the file, not the virtual
+ size of the QCOW2. As such we need to check the virtual size of
+ the image once its cached and ensure it's = to the flavor's
+ root disk size. Based on I833467284126557eb598b8350a84e10c06292fa9
+Bug: https://launchpad.net/bugs/1177830
+
+Index: nova/nova/virt/libvirt/connection.py
+===
+--- nova.orig/nova/virt/libvirt/connection.py
 nova/nova/virt/libvirt/connection.py
+@@ -1125,6 +1125,18 @@ class LibvirtConnection(driver.ComputeDr
+ if cow:
+ cow_base = base
+ if size:
++# NOTE(cfb): Having a flavor that sets the root size 
to
++#0 and having nova effectively ignore that
++#size and use the size of the image is
++#considered a feature at this time, not a
++#bug.
++if os.path.exists(cow_base) and \
++size  disk.get_image_virtual_size(cow_base):
++LOG.error(_(%(base)s virtual size larger than 
++flavor root disk size %(size)s %
++{'base': cow_base, 'size': size}))
++raise exception.ImageTooLarge()
++
+ size_gb = size / (1024 * 1024 * 1024)
+ cow_base += _%d % size_gb
+ if not os.path.exists(cow_base):
diff -Nru nova-2012.1.1/debian/patches/series 
nova-2012.1.1/debian/patches/series
--- nova-2012.1.1/debian/patches/series 2013-04-10 13:14:21.0 +0200
+++ nova-2012.1.1/debian/patches/series 2013-07-10 12:10:00.0 +0200
@@ -12,3 +12,4 @@
 CVE-2013-0335_VNC-unit-tests-fixes.patch
 CVE-2013-1838-Nova_DoS_by_allocating_all_Fixed_IPs_essex.patch
 Fixed_broken_vncproxy_flush_tokens.patch
+CVE-2013-2096_essex.patch

Cheers,
Julien
-- 
Julien Cristau  julien.cris...@logilab.fr
Logilab http://www.logilab.fr/
Informatique scientifique  gestion de connaissances
---End Message---
---BeginMessage---
Cyril Brulebois k...@debian.org (2013-09-30):
 Adam D. Barratt a...@adam-barratt.org.uk (2013-08-10):
  Control: tags -1 + confirmed
  
  On Wed, 2013-07-10 at 14:09 +0200, Julien Cristau wrote:
   this proposed update for nova fixes CVE-2013-2096.  AFAIK this is just a
   DoS, so probably not worth a DSA.
   The fix for sid is pending NEW processing, AIUI.
 
 The fix is now in, apparently; also, it looks like the BTS wants to be told
 wheezy is affected as well.
 
  Please go ahead; sorry for 

Processed: Re: Bug#720426: pu: package openssl/1.0.1e-2

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 moreinfo
Bug #720426 [release.debian.org] pu: package openssl/1.0.1e-2
Added tag(s) moreinfo.

-- 
720426: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720426
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b720426.138049839927995.transcr...@bugs.debian.org



Bug#721625: pu: package lvm2/2.02.95-8

2013-09-29 Thread Cyril Brulebois
Cyril Brulebois k...@debian.org (2013-09-23):
 ping? The p-u freeze for 7.2 is getting closer:
   https://lists.debian.org/debian-release/2013/09/msg00477.html

It's now 1 week closer.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#720426: pu: package openssl/1.0.1e-2

2013-09-29 Thread Cyril Brulebois
Control: tag -1 moreinfo

Kurt Roeckx k...@roeckx.be (2013-09-23):
 I actually consider the arm assembler and nistp curves to be
 important, even if the bugs might only be filed at severity
 level wishlist.  The nistp curves are even security related
 since they are then implemented with constant time removing
 a side channel attack.

Then the BTS should know, and/or you should have mentioned it in your
pu request. You also didn't attach the source debdiff we should be
considering, and a manual debdiff between -2 and -3 shows unrelated
things.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Bug#723632: pu: fai/4.0.8 - wheezy point-release update for FAI

2013-09-29 Thread Cyril Brulebois
Control: tag -1 confirmed

Michael Prokop m...@debian.org (2013-09-23):
 New debdiff attached.

Looks good to me, please upload.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#723632: pu: fai/4.0.8 - wheezy point-release update for FAI

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 confirmed
Bug #723632 [release.debian.org] pu: fai/4.0.8 - wheezy point-release update 
for FAI
Added tag(s) confirmed.

-- 
723632: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723632
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b723632.138049870929611.transcr...@bugs.debian.org



Bug#724895: pu: package perspectives-extension/4.3.1-1+deb7u1

2013-09-29 Thread Cyril Brulebois
Control: tag -1 confirmed

David Prévot taf...@debian.org (2013-09-29):
 Hi,
 
 As agreed with the security team and the current maintainer, we’d like
 to include this security fix via the upcoming point release, because the
 package has a low popcon and requires a very unusual configuration to
 trigger the flaw (but with such a configuration, it completely
 undermines the security model perspectives attempts to provide).
 
 The proposed update aim to fix the issue disclosed recently on the
 upstream project website [1] and the upstream bug tracker [2].
 
 1: 
 http://perspectives-project.org/2013/09/19/security-alert-incorrect-quorum-with-low-number-of-notaries-andor-low-quorum-percentage/
 2: https://github.com/danwent/Perspectives/issues/87
 
 The two upstream commits to fix this issue (cb3d991 and 1f85a52) apply
 properly into stable once fe6551e is also applied, thus the three
 patches.
 
 Regards
 
 David
 
 P.-S.: The fix “already” made it to Jessie.

It would be nice if this could be tracked in the Debian BTS as well,
both for users and for pu reviewers. Changes look good to me (as far
as I can parse JS anyway), feel free to upload with a closes: added
once you have opened a bug report to track this issue.

Thanks already.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#724895: pu: package perspectives-extension/4.3.1-1+deb7u1

2013-09-29 Thread Debian Bug Tracking System
Processing control commands:

 tag -1 confirmed
Bug #724895 [release.debian.org] pu: package 
perspectives-extension/4.3.1-1+deb7u1
Added tag(s) confirmed.

-- 
724895: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724895
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.b724895.13804997123067.transcr...@bugs.debian.org



Bug#724895: pu: package perspectives-extension/4.3.1-1+deb7u1

2013-09-29 Thread David Prévot
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

Le 29/09/2013 20:08, Cyril Brulebois a écrit :

 It would be nice if this could be tracked in the Debian BTS as well,

#724960 opened.

 feel free to upload with a closes: added

Done, thanks for your quick and positive feedback.

Regards

David



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJSSNXPAAoJEAWMHPlE9r08UHoH/3K8z4j4x7KIM6RfxeiUWOFv
b4HO4c3wzwjt6CCCchiWtb+iR+wzckwfPAWO9Ai0puDRfF1x/gsvYVDWpizBqjb0
T62U0BR5gzqlj8pHCaf+lLfUT2hGIVvaDp6eZ1BxC71/qxau2XOk//6t32rpsuOw
MHbzzBpgqLoEJLE9ATgcChZ8y34ercnDV30hGMXIvyVwiCNQfNYDS98yhl5VOgRZ
V2JUyBTz5+l1hU/QyulNdBx9PFvqwQ3Ca0SurURu/w1ZqNT8nuFuulrMXb54ki2f
RNB1hCwDzXlYdMN/Wh0DXO4D4I1IiofVUzWet9Eta5mpDheU+GHN7LOgD2PyHro=
=I059
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5248d5cf.6050...@tilapin.org



Re: automake transition breakages

2013-09-29 Thread Eric Dorland
* Ondřej Surý (ond...@sury.org) wrote:
 Hi,
 
 recent automake transition to 1.14 broke (FTBFS) at least two of my
 packages.
 
 Would it be possible to coordinate the (next) transition better than
 uploaddeal with breakages like we do with the rest of our packages?

Did the transition from automake 1.13 to automake 1.14 cause your
package to FTBFS? Can you point me at logs because that's not supposed
to happen under the new versioning scheme upstream is following (ie
1.X versions should now be backwards compatible). 

If you were going from an earlier version to 1.14 (or 1.13) I have
seen a few reports of problems with unit test framework.

Right now the automake package is always tracking the latest upstream
version and new versions sometimes break things. If you're worried
about that kind of breakage then build depending on a specific version
of automake might be a better bet. If people don't like this current
scheme we can discuss if the current scheme is a bad idea.

-- 
Eric Dorland e...@kuroneko.ca
ICQ: #61138586, Jabber: ho...@jabber.com



signature.asc
Description: Digital signature


NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: glusterfs_3.2.7-3+deb7u1_powerpc.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_amd64.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_armel.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_ia64.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_kfreebsd-amd64.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_kfreebsd-i386.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_s390.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_s390x.changes
  ACCEPT
Processing changes file: tntnet_2.1-2+deb7u1_i386.changes
  ACCEPT
Processing changes file: tntnet_2.1-2+deb7u1_kfreebsd-amd64.changes
  ACCEPT
Processing changes file: tntnet_2.1-2+deb7u1_s390.changes
  ACCEPT
Processing changes file: tntnet_2.1-2+deb7u1_s390x.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vquv1-0004vk...@franck.debian.org



NEW changes in oldstable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_1.6.3-4+deb6u1_i386.changes
  ACCEPT
Processing changes file: tntnet_1.6.3-4+deb6u1_ia64.changes
  ACCEPT
Processing changes file: tntnet_1.6.3-4+deb6u1_kfreebsd-amd64.changes
  ACCEPT
Processing changes file: tntnet_1.6.3-4+deb6u1_kfreebsd-i386.changes
  ACCEPT
Processing changes file: tntnet_1.6.3-4+deb6u1_s390.changes
  ACCEPT
Processing changes file: tntnet_1.6.3-4+deb6u1_sparc.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vquvx-00056l...@franck.debian.org



NEW changes in oldstable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_1.6.3-4+deb6u1_armel.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqv9w-00084j...@franck.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: perl_5.14.2-21+deb7u1_amd64.changes
  ACCEPT
Processing changes file: perl_5.14.2-21+deb7u1_s390x.changes
  ACCEPT
Processing changes file: libdigest-sha-perl_5.71-2+deb7u1_sparc.changes
  ACCEPT
Processing changes file: tntnet_2.1-2+deb7u1_ia64.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqv9u-0007vu...@franck.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_2.1-2+deb7u1_armel.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqvct-00043v...@franck.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: perl_5.14.2-21+deb7u1_s390.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqvr0-0005y4...@franck.debian.org



NEW changes in stable-new

2013-09-29 Thread Debian FTP Masters
Processing changes file: tntnet_2.1-2+deb7u1_sparc.changes
  ACCEPT


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vqw5w-0008n1...@franck.debian.org