Re: Handling Japanese new era "令和 (Reiwa)"
On Fri, 12 Apr 2019 10:32:54 +0100 Alastair McKinstry wrote: > unicode-data in Buster is currently at 11.0.0; there being a major > release upstream 12.0.0 just after Buster freeze. > > I've uploaded 12.0.0 to unstable; 12.1 is not officially released yet. > unicode-data itself is small and easy to validate, but the following > packages will need to be rebuilt as they build-depend on unicode-data > (and typically hard-code the tables internally): > > * ibus > * node-unicode-tr51 > * julia > * node-unicode-property-aliases > * node-unicode-property-value-aliases > * cyrus-imapd > * libxmlada > * courier-unicode > * node-unicode-property-aliases-ecmascript > * *wine* > * *slang2* > * re2 > * fntsample > * console-data > * wine-development > * utf8proc > * node-unicode-property-value-aliases-ecmascript > * gucharmap > * node-unicode-data > * fonttools > * wcwidth > * jing-trang Thanks Alastair, it's not good way to rebuild all the packages you've mentioned, IMO. How about just adding "令和 (Reiwa)" data diff between 12.0 and 12.1 and push it later? -- Hideki Yamane
Bug#927042: unblock: gpac/gpac 0.5.2-426-gc5ad4e4+dfsg5-5
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gpac Moritz has kindly pointed out and backported the relevant patches from upstream that fixes this issue. Here is the relevant part of debian/changelog: * Bug fix: "CVE-2019-11222: Buffer-overflow in gf_bin128_parse", thanks to Salvatore Bonaccorso (Closes: #926961). * Bug fix: "CVE-2019-11221: buffer-overflow issue in gf_import_message() in media_import.c", thanks to Salvatore Bonaccorso (Closes: #926963). unblock gpac/gpac 0.5.2-426-gc5ad4e4+dfsg5-5 Thanks for considering. -rt diff -Nru gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog --- gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog 2019-04-01 17:07:02.0 -0400 +++ gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/changelog 2019-04-13 16:41:15.0 -0400 @@ -1,3 +1,13 @@ +gpac (0.5.2-426-gc5ad4e4+dfsg5-5) unstable; urgency=medium + + [ Moritz Muehlenhoff ] + * Bug fix: "CVE-2019-11222: Buffer-overflow in gf_bin128_parse", thanks +to Salvatore Bonaccorso (Closes: #926961). + * Bug fix: "CVE-2019-11221: buffer-overflow issue in gf_import_message() +in media_import.c", thanks to Salvatore Bonaccorso (Closes: #926963). + + -- Reinhard Tartler Sat, 13 Apr 2019 16:41:15 -0400 + gpac (0.5.2-426-gc5ad4e4+dfsg5-4.1) unstable; urgency=medium * CVE-2018-7752 (Closes: #892526) diff -Nru gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch --- gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch 1969-12-31 19:00:00.0 -0500 +++ gpac-0.5.2-426-gc5ad4e4+dfsg5/debian/patches/CVE-2019-11221.patch 2019-04-13 16:41:15.0 -0400 @@ -0,0 +1,180 @@ +From f4616202e5578e65746cf7e7ceeba63bee1b094b Mon Sep 17 00:00:00 2001 +From: Aurelien David +Date: Thu, 11 Apr 2019 14:18:58 +0200 +Subject: [PATCH] fix a bunch of vsprintf -> vsnprintf + +closes #1203 +--- + applications/mp4client/main.c | 2 +- + applications/osmo4_sym/osmo4_view.cpp | 2 +- + src/media_tools/media_export.c| 2 +- + src/media_tools/media_import.c| 2 +- + src/scene_manager/loader_bt.c | 4 ++-- + src/scene_manager/loader_isom.c | 2 +- + src/scene_manager/loader_qt.c | 2 +- + src/scene_manager/loader_svg.c| 8 + src/scene_manager/loader_xmt.c| 14 +++--- + src/scene_manager/swf_parse.c | 6 +++--- + src/scene_manager/swf_svg.c | 2 +- + src/scenegraph/xbl_process.c | 2 +- + src/utils/alloc.c | 2 +- + src/utils/xml_parser.c| 24 +--- + 15 files changed, 49 insertions(+), 47 deletions(-) + +--- a/applications/mp4client/main.c b/applications/mp4client/main.c +@@ -1023,7 +1023,7 @@ static void on_gpac_log(void *cbk, u32 l + + if (rti_logs && (lm & GF_LOG_RTI)) { + char szMsg[2048]; +- vsprintf(szMsg, fmt, list); ++ vsnprintf(szMsg, 2048, fmt, list); + UpdateRTInfo(szMsg + 6 /*"[RTI] "*/); + } else { + if (log_time_start) { +--- a/src/media_tools/media_export.c b/src/media_tools/media_export.c +@@ -57,7 +57,7 @@ static GF_Err gf_export_message(GF_Media + va_list args; + char szMsg[1024]; + va_start(args, format); +- vsprintf(szMsg, format, args); ++ vsnprintf(szMsg, 1024, format, args); + va_end(args); + GF_LOG((u32) (e ? GF_LOG_ERROR : GF_LOG_WARNING), GF_LOG_AUTHOR, ("%s\n", szMsg) ); + } +--- a/src/media_tools/media_import.c b/src/media_tools/media_import.c +@@ -50,7 +50,7 @@ GF_Err gf_import_message(GF_MediaImporte + va_list args; + char szMsg[1024]; + va_start(args, format); +- vsprintf(szMsg, format, args); ++ vsnprintf(szMsg, 1024, format, args); + va_end(args); + GF_LOG((u32) (e ? GF_LOG_WARNING : GF_LOG_INFO), GF_LOG_AUTHOR, ("%s\n", szMsg) ); + } +--- a/src/scene_manager/loader_bt.c b/src/scene_manager/loader_bt.c +@@ -121,7 +121,7 @@ static GF_Err gf_bt_report(GF_BTParser * + char szMsg[2048]; + va_list args; + va_start(args, format); +- vsprintf(szMsg, format, args); ++ vsnprintf(szMsg, 2048, format, args); + va_end(args); + GF_LOG((u32) (e ? GF_LOG_ERROR : GF_LOG_WARNING), GF_LOG_PARSER, ("[BT/WRL Parsing] %s (line %d)\n", szMsg, parser->line)); + } +--- a/src/scene_manager/loader_isom.c b/src/scene_manager/loader_isom.c +@@ -144,7 +144,7 @@ static void mp4_report(GF_SceneLoader *l + char szMsg[1024]; + va_list args; + va_start(args, format); +-
Bug#926397: stretch-pu: package debian-security-support/2019.02.02~deb9u1
On Sat, Apr 13, 2019 at 09:57:09PM +0100, Adam D. Barratt wrote: > Please go ahead. thanks, done. -- tschau, Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C In Europe there are people prosecuted by courts because they saved other people from drowning in the Mediterranean Sea. That is almost as absurd as if there were people being prosecuted because they save humans from drowning in the sea. signature.asc Description: PGP signature
Bug#927035: unblock: mozc/2.23.2815.102+dfsg-4
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package mozc to fix the important bug #927030. See also the attached debdiff. changelog: mozc (2.23.2815.102+dfsg-4) unstable; urgency=medium * Add d/patches/add_support_new_japanese_era.patch. This adds Japan's new era 令和 (Reiwa) support. (Closes: #927030) -- Nobuhiro Iwamatsu Sun, 14 Apr 2019 06:25:53 +0900 unblock mozc/2.23.2815.102+dfsg-4 -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386, riscv64, armhf Kernel: Linux 4.19.0-2-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=ja_JP.utf8, LC_CTYPE=ja_JP.utf8 (charmap=UTF-8), LANGUAGE=ja_JP.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru mozc-2.23.2815.102+dfsg/debian/changelog mozc-2.23.2815.102+dfsg/debian/changelog --- mozc-2.23.2815.102+dfsg/debian/changelog2018-12-01 07:40:07.0 +0900 +++ mozc-2.23.2815.102+dfsg/debian/changelog2019-04-14 06:25:53.0 +0900 @@ -1,3 +1,10 @@ +mozc (2.23.2815.102+dfsg-4) unstable; urgency=medium + + * Add d/patches/add_support_new_japanese_era.patch. +This adds Japan's new era 令和 (Reiwa) support. (Closes: #927030) + + -- Nobuhiro Iwamatsu Sun, 14 Apr 2019 06:25:53 +0900 + mozc (2.23.2815.102+dfsg-3) unstable; urgency=medium * Update .desktop file. diff -Nru mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch --- mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch 1970-01-01 09:00:00.0 +0900 +++ mozc-2.23.2815.102+dfsg/debian/patches/add_support_new_japanese_era.patch 2019-04-14 06:25:53.0 +0900 @@ -0,0 +1,83 @@ +Description: Add support new Japanese era +Bug-Ubuntu: https://bugs.launchpad.net/mozc/+bug/1823444 +Author: Mitsuya Shibata + +Index: mozc-2.23.2815.102+dfsg/src/data/dictionary_oss/dictionary08.txt +=== +--- mozc-2.23.2815.102+dfsg.orig/src/data/dictionary_oss/dictionary08.txt mozc-2.23.2815.102+dfsg/src/data/dictionary_oss/dictionary08.txt +@@ -8591,6 +8591,8 @@ + れいれいと 12 12 7349れいれいと + れいろう 184718477276玲瓏 + れいわ 184718478251例話 ++れいわ 189518951690令和 ++れいわ 189818984000令和 + れいんこーと184718475568レインコート + れいんじゃー184718477459レインジャー + れいんず 191719173548レインズ +Index: mozc-2.23.2815.102+dfsg/src/data/symbol/symbol.tsv +=== +--- mozc-2.23.2815.102+dfsg.orig/src/data/symbol/symbol.tsv mozc-2.23.2815.102+dfsg/src/data/symbol/symbol.tsv +@@ -528,6 +528,7 @@ POSCHARReading (space separated) descr + 記号㊦ した げ丸下 + 記号㊧ ひだり 丸左 + 記号㊨ みぎ 丸右 ++記号㋿ れいわ ねんごう年号 OTHER + 記号㍻ へいせい ねんごう 年号 OTHER + 記号㍼ しょうわ ねんごう 年号 OTHER + 記号㍽ たいしょう ねんごう 年号 OTHER +Index: mozc-2.23.2815.102+dfsg/src/data/unicode/UnicodeData.txt +=== +--- mozc-2.23.2815.102+dfsg.orig/src/data/unicode/UnicodeData.txt mozc-2.23.2815.102+dfsg/src/data/unicode/UnicodeData.txt +@@ -11314,6 +11314,7 @@ + 32FC;CIRCLED KATAKANA WI;So;0;L; 30F0N; + 32FD;CIRCLED KATAKANA WE;So;0;L; 30F1N; + 32FE;CIRCLED KATAKANA WO;So;0;L; 30F2N; ++32FF;SQUARE ERA NAME REIWA;So;0;L; 4EE4 548CN;SQUARED TWO IDEOGRAPHS ERA NAME REIWA + 3300;SQUARE APAATO;So;0;L; 30A2 30D1 30FC 30C8N;SQUARED APAATO + 3301;SQUARE ARUHUA;So;0;L; 30A2 30EB 30D5 30A1N;SQUARED ARUHUA + 3302;SQUARE ANPEA;So;0;L; 30A2 30F3 30DA 30A2N;SQUARED ANPEA +Index: mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter.cc +=== +--- mozc-2.23.2815.102+dfsg.orig/src/rewriter/date_rewriter.cc mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter.cc +@@ -1239,6 +1239,10 @@ const YearData kEraData[] = { + 1989, + "平成", + "へいせい", ++ }, { ++2019, ++"令和", ++"れいわ", + } + }; + +Index: mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter_test.cc +=== +--- mozc-2.23.2815.102+dfsg.orig/src/rewriter/date_rewriter_test.cc mozc-2.23.2815.102+dfsg/src/rewriter/date_rewriter_test.cc +@@ -469,6 +469,22 @@ TEST_F(DateRewriterTest, ADToERA) { + "平成10", + "平成十"); + ++ // AD.2019 is "平成31(年)" or "平成三十一(年)" or "令和元(年)" ++ results.clear(); ++ rewriter.AdToEra(2019, ); ++
Bug#926190: stretch-pu: package postfix/3.1.12-0+deb9u1
On Saturday, April 13, 2019 09:58:15 PM Adam D. Barratt wrote: > Control: tags -1 + confirmed > > On Mon, 2019-04-01 at 14:30 -0400, Scott Kitterman wrote: > > This is the next in a series. It contains upstream bug fix releases > > 3.1.10, > > 3.1.11, and 3.1.12. I held off after 3.1.10 since it contains > > somewhat more > > new/changed code than these usually do. Both 3.1.11 and 3.1.12 have > > since > > been released with no corrections needed to the refactored code. > > Please go ahead. Thanks, postfix_3.1.12-0+deb9u1_amd64.changes ACCEPTED into proposed-updates->stable- new Scott K
Bug#927028: unblock: soundscaperenderer/0.5.0~dfsg-4
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package soundscaperenderer Due to a typo in the installation-paths, soundscaperenderer-nox currently fails to (un)install its "alternatives" properly. this makes the upgrade from stretch a suboptimal experience, and has been reported as RC-critical #926311. The attached debdiff fixes the typo and thus the issue. (the debdiff also bumps the standards version, as no further changes were required to do so). thanks for considering, vfmdsaf IOhannes unblock soundscaperenderer/0.5.0~dfsg-4 -- System Information: Debian Release: buster/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled diff -Nru soundscaperenderer-0.5.0~dfsg/debian/changelog soundscaperenderer-0.5.0~dfsg/debian/changelog --- soundscaperenderer-0.5.0~dfsg/debian/changelog 2018-11-20 11:07:41.0 +0100 +++ soundscaperenderer-0.5.0~dfsg/debian/changelog 2019-04-13 20:06:32.0 +0200 @@ -1,3 +1,11 @@ +soundscaperenderer (0.5.0~dfsg-4) unstable; urgency=medium + + * Fix typo in ssr-nox install paths (Closes: #926311) + * Bump standards version to 4.3.0 +- no changes required + + -- IOhannes m zmölnig (Debian/GNU) Sat, 13 Apr 2019 20:06:32 +0200 + soundscaperenderer (0.5.0~dfsg-3) unstable; urgency=medium * Don't build Qt-packages on armel/armhf (Closes: #914143) diff -Nru soundscaperenderer-0.5.0~dfsg/debian/control soundscaperenderer-0.5.0~dfsg/debian/control --- soundscaperenderer-0.5.0~dfsg/debian/control2018-11-20 11:07:41.0 +0100 +++ soundscaperenderer-0.5.0~dfsg/debian/control2019-04-13 20:06:32.0 +0200 @@ -20,7 +20,7 @@ texlive-latex-recommended, texlive-latex-extra, texlive-fonts-recommended, -Standards-Version: 4.2.1 +Standards-Version: 4.3.0 Rules-Requires-Root: no Homepage: http://spatialaudio.net/ssr/ Vcs-Git: https://salsa.debian.org/multimedia-team/soundscaperenderer.git diff -Nru soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install --- soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install 2018-11-20 11:07:41.0 +0100 +++ soundscaperenderer-0.5.0~dfsg/debian/soundscaperenderer-nox.install 2019-04-13 20:06:32.0 +0200 @@ -1,2 +1,2 @@ debian/tmp/nox/usr/bin/ssr-* /usr/bin/ -build/nox.deb/alternatives /usr/share/soundscaperendere-nox/ +build/nox.deb/alternatives /usr/share/soundscaperenderer-nox/
Bug#919043: nmu: ckermit_302-5.3 (stretch)
On Fri, 2019-02-15 at 00:04 +0100, Sebastian Andrzej Siewior wrote: > On 2019-02-02 14:46:54 [+0100], Andreas Beckmann wrote: > > I'm not going to touch that package, please go ahead with preparing > > a > > NMU (or probably rather QA upload if it is gone from sid) to > > stretch, > > since you seem to know how to properly fix this bug once and for > > all :-) > > I'm proposing this attached debdiff. > For testing I compiled it against libssl1.0-dev 1.0.2j-5 and then > upgraded to the version provided by the security repository. No error > message. I expect it work - it would be awesome if the reporter could > confirm this (I can provided the binary packages if required). Did anything happen there? Regards, Adam
Processed: Bug#924463: stretch-pu: package waagent/2.2.34-3~deb9u1
Processing control commands: > tags -1 + confirmed Bug #924463 [release.debian.org] stretch-pu: package waagent/2.2.34-3~deb9u1 Added tag(s) confirmed. -- 924463: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924463 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#924463: stretch-pu: package waagent/2.2.34-3~deb9u1
Control: tags -1 + confirmed [Note that the size of the original e-mail meant that it never reached debian-release] On Wed, 2019-03-1]3 at 10:08 +0100, Bastian Blank wrote: > The Azure agent provides the provisioning part of the Microsoft Azure > platform. It is necessary to tell the platform about the state of > the > systems. Therefor it is part of the "hardware" support for the Azure > platform. > > This updates includes a lot of upstream fixes, primarily necessary > for > Azure Stack handling. > Please go ahead. Regards, Adam
Processed: Re: Bug#924493: stretch-pu: package publicsuffix/20190221.0923-0+deb9u1
Processing control commands: > tags -1 + confirmed Bug #924493 [release.debian.org] stretch-pu: package publicsuffix/20190221.0923-0+deb9u1 Added tag(s) confirmed. -- 924493: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924493 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#924493: stretch-pu: package publicsuffix/20190221.0923-0+deb9u1
Control: tags -1 + confirmed On Wed, 2019-03-13 at 11:12 -0400, Daniel Kahn Gillmor wrote: > Please consider an update to publicsuffix in debian stretch. > > This package reflects the state of the network, and keeping it > current > is useful for all the packages that depend on it. > Please go ahead. Regards, Adam
Bug#925569: stretch-pu: package flatpak/0.8.9-0+deb9u3
Control: tags -1 + confirmed On Tue, 2019-03-26 at 22:04 +, Simon McVittie wrote: > I've prepared a flatpak update for stable to fix CVE-2019-10063 in > the next point release. The security team told me they don't intend > to > release a DSA for this. > Please go ahead. Regards, Adam
Processed: Re: Bug#925569: stretch-pu: package flatpak/0.8.9-0+deb9u3
Processing control commands: > tags -1 + confirmed Bug #925569 [release.debian.org] stretch-pu: package flatpak/0.8.9-0+deb9u3 Added tag(s) confirmed. -- 925569: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925569 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: Re: Bug#926050: stretch-pu: package python-pip/9.0.1-2+deb9u1
Processing control commands: > tags -1 + confirmed Bug #926050 [release.debian.org] stretch-pu: package python-pip/9.0.1-2+deb9u1 Added tag(s) confirmed. -- 926050: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926050 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#926050: stretch-pu: package python-pip/9.0.1-2+deb9u1
Control: tags -1 + confirmed On Sun, 2019-03-31 at 00:11 +0100, Thomas Goirand wrote: > I would like to upload a fix to python-pip to Stretch, fixing pip > download > when using --extra-index-url. Pip is indeed broken because of the way > pip > handles exceptions from the vendored requests module, and the way > Debian > de-embbed requests. The patch is pretty short (2 lines are changed). > Please go ahead. Regards, Adam
Processed: Re: Bug#924939: stretch-pu: package runc/0.1.1+dfsg1-2+deb9u1
Processing control commands: > tags -1 + confirmed Bug #924939 [release.debian.org] stretch-pu: package runc/0.1.1+dfsg1-2+deb9u1 Added tag(s) confirmed. -- 924939: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924939 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#924939: stretch-pu: package runc/0.1.1+dfsg1-2+deb9u1
Control: tags -1 + confirmed On Tue, 2019-03-19 at 01:11 +0800, Shengjing Zhu wrote: > This includes patch for CVE-2019-5736. > > As discussed with security-team, there's no urgency to go through > scurity-upload. So let's fix it through stable-proposed-updates. > Please go ahead. Regards, Adam
Bug#926190: stretch-pu: package postfix/3.1.12-0+deb9u1
Control: tags -1 + confirmed On Mon, 2019-04-01 at 14:30 -0400, Scott Kitterman wrote: > This is the next in a series. It contains upstream bug fix releases > 3.1.10, > 3.1.11, and 3.1.12. I held off after 3.1.10 since it contains > somewhat more > new/changed code than these usually do. Both 3.1.11 and 3.1.12 have > since > been released with no corrections needed to the refactored code. > Please go ahead. Regards, Adam
Processed: Re: Bug#926190: stretch-pu: package postfix/3.1.12-0+deb9u1
Processing control commands: > tags -1 + confirmed Bug #926190 [release.debian.org] stretch-pu: package postfix/3.1.12-0+deb9u1 Added tag(s) confirmed. -- 926190: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926190 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: Re: Bug#926397: stretch-pu: package debian-security-support/2019.02.02~deb9u1
Processing control commands: > tags -1 + confirmed Bug #926397 [release.debian.org] stretch-pu: package debian-security-support/2019.02.02~deb9u1 Added tag(s) confirmed. -- 926397: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926397 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#926397: stretch-pu: package debian-security-support/2019.02.02~deb9u1
Control: tags -1 + confirmed On Thu, 2019-04-04 at 14:44 +0200, Holger Levsen wrote: > Please accept debian-security-support/2019.02.02~deb9u1 into stretch > to > bring it in line with the version in unstable (and soon buster). > Please go ahead. Regards, Adam
Bug#926506: stretch-pu: package bwa/0.7.15-2+deb9u1
Control: tags -1 + confirmed On Sat, 2019-04-06 at 10:26 +0200, Dylan Aïssi wrote: > Upstream has fixed CVE-2019-10269 which is non-dsa. > I have already backported a patch to unstable/testing and now I would > like to fix the Stretch version. > Please find attached a corresponding debdiff. > Please go ahead. Regards, Adam
Bug#926481: stretch-pu: package open-vm-tools/2:10.1.5-5055683-4+deb9u2
Control: tags -1 + confirmed On Fri, 2019-04-05 at 23:15 +0200, Bernd Zeimetz wrote: > as discuassed with the security team, I'd like to fix #925959 > with the next stable pointrelease. The proposed debdiff is attached. > Please go ahead. Regards, Adam
Processed: Re: Bug#926481: stretch-pu: package open-vm-tools/2:10.1.5-5055683-4+deb9u2
Processing control commands: > tags -1 + confirmed Bug #926481 [release.debian.org] stretch-pu: package open-vm-tools/2:10.1.5-5055683-4+deb9u2 Added tag(s) confirmed. -- 926481: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926481 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: Re: Bug#926506: stretch-pu: package bwa/0.7.15-2+deb9u1
Processing control commands: > tags -1 + confirmed Bug #926506 [release.debian.org] stretch-pu: package bwa/0.7.15-2+deb9u1 Added tag(s) confirmed. -- 926506: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926506 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: Re: Bug#926870: stretch-pu: package ca-certificates-java/20170929~deb9u2
Processing control commands: > tags -1 + confirmed Bug #926870 [release.debian.org] stretch-pu: package ca-certificates-java/20170929~deb9u2 Added tag(s) confirmed. -- 926870: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926870 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#926894: stretch-pu: package igraph/0.7.1-2.1+deb9u1
Control: tags -1 + confirmed On Thu, 2019-04-11 at 22:43 +0200, Dylan Aïssi wrote: > Upstream has fixed CVE-2018-20349 which is non-dsa. > The patch is already backported to unstable/testing and now I would > like to fix the Stretch version. > Please go ahead. Regards, Adam
Bug#926870: stretch-pu: package ca-certificates-java/20170929~deb9u2
Control: tags -1 + confirmed On Thu, 2019-04-11 at 07:20 -0700, tony mancill wrote: > My upload of ca-certificates-java_20170929~deb9u2 (currently in > stable-pu) [1] introduced a printf syntax problem in the postinst. > More discussion can be found in #923176 starting at message 38: > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923176#38 > > Thank you to Andreas Beckmann for catching the issue. > Please go ahead. Regards, Adam
Processed: Re: Bug#926894: stretch-pu: package igraph/0.7.1-2.1+deb9u1
Processing control commands: > tags -1 + confirmed Bug #926894 [release.debian.org] stretch-pu: package igraph/0.7.1-2.1+deb9u1 Added tag(s) confirmed. -- 926894: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926894 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#924459: transition: libdmtx
On Wed, 13 Mar 2019 at 08:55:29 +, Simon McVittie wrote: > As discussed with jmw at the Cambridge BSP, libdmtx0a has broken ABI > without changing its SONAME (#908815). ... > Only a few packages are affected: > > dmtx-utils: dmtx-utils > openrpt: libopenrpt1v5 > openrpt > postbooks: postbooks > prison-kf5: libkf5prison5 > visp: libvisp-detection3.1 I've uploaded libdmtx/0.7.5-2.2; please unblock it (debdiff attached) and schedule binNMUs as appropriate. I think this might be the right incantation: unblock libdmtx/0.7.5-2.2 and nmu dmtx-utils_0.7.6-1.1 openrpt_3.3.14-2 prison-kf5_5.54.0-1 visp_3.1.0-2 . ANY . -m 'Rebuild against libdmtx0b' dw dmtx-utils_0.7.6-1.1 openrpt_3.3.14-2 prison-kf5_5.54.0-1 visp_3.1.0-2 . ANY . -m 'libdmtx-dev (>= 0.7.5-2.2)' nmu postbooks_4.11.3-2 . ANY . -m 'Rebuild against libdmtx0b' dw postbooks_4.11.3-2 . ANY . -m 'libopenrpt-dev (>= 3.3.14-2+b1)' libdmtx does still have a RC bug regarding an inconsistent d/copyright, opened after its excursion through the NEW queue (#926646); but only the maintainer can fix that one, and IMO a buster-ignore might be appropriate. Thanks, smcv diffstat for libdmtx-0.7.5 libdmtx-0.7.5 changelog | 19 +++ control |7 ++-- libdmtx-dev.maintscript |2 - libdmtx0a.docs |6 --- libdmtx0a.install |1 libdmtx0a.symbols | 81 libdmtx0b.docs |6 +++ libdmtx0b.install |1 libdmtx0b.symbols | 81 rules |2 - 10 files changed, 113 insertions(+), 93 deletions(-) diff -Nru libdmtx-0.7.5/debian/changelog libdmtx-0.7.5/debian/changelog --- libdmtx-0.7.5/debian/changelog 2018-11-21 07:29:23.0 + +++ libdmtx-0.7.5/debian/changelog 2019-04-12 20:26:32.0 +0100 @@ -1,3 +1,22 @@ +libdmtx (0.7.5-2.2) unstable; urgency=medium + + * Non-maintainer upload. + * Upload libdmtx0b to unstable + + -- Simon McVittie Fri, 12 Apr 2019 20:26:32 +0100 + +libdmtx (0.7.5-2.1) experimental; urgency=medium + + * Non-maintainer upload. + * Rename shared library package to libdmtx0b, due to another ABI +break without a corresponding SONAME update (in 0.7.5-1). +Add Conflicts/Replaces on libdmtx0a, and add missing Replaces on +libdmtx0 while I'm there. (Closes: #908815) + * Release to experimental for now, to wait for NEW processing and stage +the transition. + + -- Simon McVittie Sun, 10 Mar 2019 17:13:33 + + libdmtx (0.7.5-2) unstable; urgency=low * Proper fix for simple_test compiler warnings. diff -Nru libdmtx-0.7.5/debian/control libdmtx-0.7.5/debian/control --- libdmtx-0.7.5/debian/control2018-11-21 07:29:23.0 + +++ libdmtx-0.7.5/debian/control2019-04-12 20:26:32.0 +0100 @@ -6,12 +6,13 @@ Standards-Version: 4.2.1 Homepage: http://libdmtx.sourceforge.net -Package: libdmtx0a +Package: libdmtx0b Architecture: any Multi-Arch: same Pre-Depends: ${misc:Pre-Depends} Depends: ${shlibs:Depends}, ${misc:Depends} -Conflicts: libdmtx0 +Conflicts: libdmtx0, libdmtx0a +Replaces: libdmtx0, libdmtx0a Description: Data Matrix barcodes (runtime library) Libdmtx is a library for reading and writing Data Matrix 2D barcodes, two-dimensional symbols that hold a dense pattern of data with built-in error @@ -24,7 +25,7 @@ Architecture: any Multi-Arch: same Pre-Depends: ${misc:Pre-Depends} -Depends: ${shlibs:Depends}, ${misc:Depends}, libdmtx0a (= ${binary:Version}) +Depends: ${shlibs:Depends}, ${misc:Depends}, libdmtx0b (= ${binary:Version}) Description: Data Matrix barcodes (development files and static libraries) Libdmtx is a library for reading and writing Data Matrix 2D barcodes, two-dimensional symbols that hold a dense pattern of data with built-in error diff -Nru libdmtx-0.7.5/debian/libdmtx0a.docs libdmtx-0.7.5/debian/libdmtx0a.docs --- libdmtx-0.7.5/debian/libdmtx0a.docs 2018-08-08 21:03:35.0 +0100 +++ libdmtx-0.7.5/debian/libdmtx0a.docs 1970-01-01 01:00:00.0 +0100 @@ -1,6 +0,0 @@ -AUTHORS -KNOWNBUG -NEWS -README -README.linux -TODO diff -Nru libdmtx-0.7.5/debian/libdmtx0a.install libdmtx-0.7.5/debian/libdmtx0a.install --- libdmtx-0.7.5/debian/libdmtx0a.install 2012-03-06 01:55:08.0 + +++ libdmtx-0.7.5/debian/libdmtx0a.install 1970-01-01 01:00:00.0 +0100 @@ -1 +0,0 @@ -usr/lib/*/libdmtx.so.* diff -Nru libdmtx-0.7.5/debian/libdmtx0a.symbols libdmtx-0.7.5/debian/libdmtx0a.symbols --- libdmtx-0.7.5/debian/libdmtx0a.symbols 2018-11-21 07:29:23.0 + +++ libdmtx-0.7.5/debian/libdmtx0a.symbols 1970-01-01 01:00:00.0 +0100 @@ -1,81 +0,0 @@ -libdmtx.so.0 libdmtx0a #MINVER# -*Build-Depends-Package: libdmtx-dev - dmtxByteListBuild@Base 0.7.4 - dmtxByteListClear@Base 0.7.4 - dmtxByteListCopy@Base 0.7.4 - dmtxByteListHasCapacity@Base 0.7.4 -
Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)
Control: tags -1 confirmed moreinfo Hi Stephen, On Sat, Apr 13, 2019 at 04:18:44PM +0200, Stephen Kitt wrote: > On Sat, 13 Apr 2019 13:22:01 +0200, Ivo De Decker wrote: > > On Sat, Apr 13, 2019 at 10:26:04AM +0200, Stephen Kitt wrote: > > > I have a couple of fixes pending upload for gcc-mingw-w64, and I’m > > > wondering if they’d pass muster for Buster. The attached patches fix, > > > in order: > > > > > > * #923214 — an ICE hit with external static data members > > > * #925172 — std::filesystem support is broken in the current Buster > > > package > > > > > > I’m requesting approval for these fixes before uploading them to > > > unstable. The candidate source package would contain only those fixes > > > plus the result of running "dch -r". Note that because of the way > > > gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or > > > whatever version is in unstable when the package is built) in too. > > > > I haven't looked at the details of these patches yet, but I notice that this > > doesn't address #923698 (which you set to serious). What's your plan with > > that one? > > I’m still working on it, it’s taking longer than I hoped to figure out what’s > broken. I thought it would be worth getting the fixes I do have into the > archive sooner rather than later, especially since #923214 prevents > meaningful testing in a number of cases! OK. That sounds reasonable. I had a look at the patches, and they seem like something that would be acceptable for buster. Please go ahead with the upload to unstable and remove the moreinfo tag from this bug once the builds are done. Thanks, Ivo
Processed: Re: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)
Processing control commands: > tags -1 confirmed moreinfo Bug #926994 [release.debian.org] unblock: gcc-mingw-w64/21.2 (pre-upload approval request) Added tag(s) moreinfo and confirmed. -- 926994: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926994 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)
Hi Ivo, On Sat, 13 Apr 2019 13:22:01 +0200, Ivo De Decker wrote: > On Sat, Apr 13, 2019 at 10:26:04AM +0200, Stephen Kitt wrote: > > I have a couple of fixes pending upload for gcc-mingw-w64, and I’m > > wondering if they’d pass muster for Buster. The attached patches fix, > > in order: > > > > * #923214 — an ICE hit with external static data members > > * #925172 — std::filesystem support is broken in the current Buster > > package > > > > I’m requesting approval for these fixes before uploading them to > > unstable. The candidate source package would contain only those fixes > > plus the result of running "dch -r". Note that because of the way > > gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or > > whatever version is in unstable when the package is built) in too. > > I haven't looked at the details of these patches yet, but I notice that this > doesn't address #923698 (which you set to serious). What's your plan with > that one? I’m still working on it, it’s taking longer than I hoped to figure out what’s broken. I thought it would be worth getting the fixes I do have into the archive sooner rather than later, especially since #923214 prevents meaningful testing in a number of cases! Regards, Stephen pgp9_pWREFjbI.pgp Description: OpenPGP digital signature
Bug#926931: marked as done (unblock: golang-github-go-debos-fakemachine/0.0~git20181105.9316584-2)
Your message dated Sat, 13 Apr 2019 13:55:14 + with message-id and subject line unblock golang-github-go-debos-fakemachine has caused the Debian Bug report #926931, regarding unblock: golang-github-go-debos-fakemachine/0.0~git20181105.9316584-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 926931: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926931 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package golang-github-go-debos-fakemachine Fixes release critical bug which causes package to be unusable diff -Nru golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog --- golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog 2018-11-09 10:15:18.0 +0100 +++ golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/changelog 2019-04-12 11:53:04.0 +0200 @@ -1,3 +1,10 @@ +golang-github-go-debos-fakemachine (0.0~git20181105.9316584-2) unstable; urgency=medium + + * fakemachine: execution fails due to missing shared lib +(Closes: #924392) + + -- Héctor Orón Martínez Fri, 12 Apr 2019 11:53:04 +0200 + golang-github-go-debos-fakemachine (0.0~git20181105.9316584-1) unstable; urgency=medium * New upstream version 0.0~git20181105.9316584 diff -Nru golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch --- golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch 1970-01-01 01:00:00.0 +0100 +++ golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/0001-Add-libresolve.so.2-in-the-initramfs.patch 2019-04-12 11:47:40.0 +0200 @@ -0,0 +1,25 @@ +From: Sjoerd Simons +Date: Tue, 5 Mar 2019 10:17:57 +0100 +Subject: Add libresolve.so.2 in the initramfs + +busybox in buster depends on libresolve.so.2 so copy it to the +initramfs; Potentially in future fakemachine should move to +busybox-static + +Signed-off-by: Sjoerd Simons +--- + machine.go | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/machine.go b/machine.go +index 4a9bd83..021ee67 100644 +--- a/machine.go b/machine.go +@@ -457,6 +457,7 @@ func (m *Machine) startup(command string, extracontent [][2]string) (int, error) + if mergedUsrSystem() { + prefix = "/usr" + } ++ w.CopyFile(prefix + "/lib/x86_64-linux-gnu/libresolv.so.2") + w.CopyFile(prefix + "/lib/x86_64-linux-gnu/libc.so.6") + w.CopyFile(prefix + "/bin/busybox") + diff -Nru golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series --- golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series 1970-01-01 01:00:00.0 +0100 +++ golang-github-go-debos-fakemachine-0.0~git20181105.9316584/debian/patches/series 2019-04-12 11:47:40.0 +0200 @@ -0,0 +1 @@ +0001-Add-libresolve.so.2-in-the-initramfs.patch unblock golang-github-go-debos-fakemachine/0.0~git20181105.9316584-2 -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: armhf Kernel: Linux 4.19.0-4-amd64 (SMP w/16 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8), LANGUAGE=ca_AD.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled --- End Message --- --- Begin Message --- Unblocked golang-github-go-debos-fakemachine.--- End Message ---
Bug#926199: stretch-pu: package libreoffice/1:5.2.7-1+deb9u7 (was: Re: Bug#926199: stretch-pu: package libreoffice/1:5.2.7-1+deb9u6)
On Thu, Apr 11, 2019 at 10:32:31PM +0200, Rene Engelhard wrote: > this is now 1:5.2.7-1+deb9u7 given the Reiwa fix... > > New diff will follow. Here it is: diff -Nru libreoffice-5.2.7/debian/changelog libreoffice-5.2.7/debian/changelog --- libreoffice-5.2.7/debian/changelog 2019-04-11 21:48:53.0 +0200 +++ libreoffice-5.2.7/debian/changelog 2019-01-23 18:51:09.0 +0100 @@ -1,3 +1,15 @@ +libreoffice (1:5.2.7-1+deb9u7) stretch; urgency=medium + + * debian/patches/mention-java-common-package.diff: update message to +reflect current config dir... + * debian/patches/disableClassPathURLCheck.diff: revert openjdk is fixed + + * debian/control.in: +- make -core conflict against openjdk-8-jre-headless (= 8u181-b13-2~deb9u1) + (closes: 913641#) and build-conflict against it + + -- Rene Engelhard Wed, 23 Jan 2019 18:51:09 +0100 + libreoffice (1:5.2.7-1+deb9u6) stable; urgency=medium * debian/patches/jp-JP-Reiwa.diff: Introduce next Japanese gengou diff -Nru libreoffice-5.2.7/debian/control libreoffice-5.2.7/debian/control --- libreoffice-5.2.7/debian/control2019-04-11 21:48:53.0 +0200 +++ libreoffice-5.2.7/debian/control2019-01-23 18:51:09.0 +0100 @@ -183,6 +183,7 @@ nvidia-glx-dev, nvidia-glx-legacy-dev, nvidia-libopencl1, + openjdk-8-jre-headless (= 8u181-b13-2~deb9u1), qt3-dev-tools Standards-Version: 3.9.4 Vcs-Git: https://anonscm.debian.org/git/pkg-openoffice/libreoffice.git @@ -430,7 +431,10 @@ myspell-sw (<< 1:3.1.0-3), myspell-th (<< 1:3.1.0-3), myspell-tl (<< 0.4-0-5) -Conflicts: cacao-oj6-jre, libreoffice-filter-binfilter, libreoffice-unbundled +Conflicts: cacao-oj6-jre, + libreoffice-filter-binfilter, + libreoffice-unbundled, + openjdk-8-jre-headless (= 8u181-b13-2~deb9u1) Provides: libreoffice-bundled Replaces: libreoffice-calc (<< 1:3.3.2-5), libreoffice-common (<< 1:4.4.0~rc3-1), diff -Nru libreoffice-5.2.7/debian/control.in libreoffice-5.2.7/debian/control.in --- libreoffice-5.2.7/debian/control.in 2019-04-11 21:48:53.0 +0200 +++ libreoffice-5.2.7/debian/control.in 2019-01-23 18:51:09.0 +0100 @@ -20,6 +20,7 @@ libc6-dev (= 2.6.1-4) [i386 amd64], libcairo2 (= 1.4.8-1), libxul-dev (= 1.8.0.13~pre070720-0etch1), + openjdk-8-jre-headless (= 8u181-b13-2~deb9u1), nvidia-glx-dev, nvidia-glx-legacy-dev, qt3-dev-tools, @@ -269,7 +270,7 @@ myspell-th (<< 1:3.1.0-3), myspell-tl (<< 0.4-0-5), browser-plugin-libreoffice -Conflicts: cacao-oj6-jre, libreoffice-filter-binfilter, libreoffice-unbundled +Conflicts: cacao-oj6-jre, libreoffice-filter-binfilter, libreoffice-unbundled, openjdk-8-jre-headless (= 8u181-b13-2~deb9u1) Provides: libreoffice-bundled Replaces: libreoffice-calc (<< 1:3.3.2-5), libreoffice-common (<< 1:4.4.0~rc3-1), diff -Nru libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff --- libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff 2019-04-11 21:48:53.0 +0200 +++ libreoffice-5.2.7/debian/patches/disableClassPathURLCheck.diff 1970-01-01 01:00:00.0 +0100 @@ -1,10 +0,0 @@ a/configure.ac-old 2018-12-28 11:10:35.953066686 +0100 -+++ b/configure.ac 2018-12-28 11:11:06.049403639 +0100 -@@ -6976,6 +6976,7 @@ - - # set to limit VM usage for JunitTests - JAVAIFLAGS=-Xmx64M -+JAVAIFLAGS="$JAVAIFLAGS -Djdk.net.URLClassPath.disableClassPathURLCheck=true" - # set to limit VM usage for javac - JAVAFLAGS=-J-Xmx128M - fi diff -Nru libreoffice-5.2.7/debian/patches/mention-java-common-package.diff libreoffice-5.2.7/debian/patches/mention-java-common-package.diff --- libreoffice-5.2.7/debian/patches/mention-java-common-package.diff 2019-04-11 21:48:53.0 +0200 +++ libreoffice-5.2.7/debian/patches/mention-java-common-package.diff 2019-01-23 18:51:09.0 +0100 @@ -8,7 +8,7 @@ fprintf(stderr,"javaldx: Could not find a Java Runtime Environment! \n"); +fprintf(stderr,"Please ensure that a JVM and the package libreoffice-java-common\n"); +fprintf(stderr,"is installed.\n"); -+fprintf(stderr,"If it is already installed then try removing ~/.libreoffice/3/user/config/javasettings_Linux_*.xml\n"); ++fprintf(stderr,"If it is already installed then try removing ~/.config/libreoffice/4/user/config/javasettings_Linux_*.xml\n"); return false; } else if (errcode != JFW_E_NONE && errcode != JFW_E_DIRECT_MODE) diff -Nru libreoffice-5.2.7/debian/patches/series libreoffice-5.2.7/debian/patches/series --- libreoffice-5.2.7/debian/patches/series 2019-04-11
Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)
Hi, On Sat, Apr 13, 2019 at 10:26:04AM +0200, Stephen Kitt wrote: > I have a couple of fixes pending upload for gcc-mingw-w64, and I’m > wondering if they’d pass muster for Buster. The attached patches fix, > in order: > > * #923214 — an ICE hit with external static data members > * #925172 — std::filesystem support is broken in the current Buster > package > > I’m requesting approval for these fixes before uploading them to > unstable. The candidate source package would contain only those fixes > plus the result of running "dch -r". Note that because of the way > gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or > whatever version is in unstable when the package is built) in too. I haven't looked at the details of these patches yet, but I notice that this doesn't address #923698 (which you set to serious). What's your plan with that one? Thanks, Ivo
Bug#927004: unblock: nvidia-cuda-toolkit/9.2.148-7
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package nvidia-cuda-toolkit Hi, while preparing the CUDA 10.1 packaging for experimental/NEW I noticed some issues that have already been fixed in sid and I'd like to see in buster (if we won't get 10.1 into buster). * The examples were installed in an old location compared to the documentation that moved with debhelper compat 11 some time ago. * We were using several (outdated) copies of upstream configuration files and wrapper scripts that contained our modifications. Turn these into modifications into a patch and drop the copies instead. * Finally use libjs-jquery and friends instead of shipping the .js files. * Simplify the packaging by using more substvars, avoiding the need to change the same setting in several locations (and usually forgetting one). unblock nvidia-cuda-toolkit/9.2.148-7 Thanks for considering, Andreas nvidia-cuda-toolkit_9.2.148-7.dsc.diff.gz Description: application/gzip
Bug#925214: adding logrotate 'missingok' for stretch
Hi, I've now uploaded these two packages in the hope that they can make it into the next point release. Andreas
Bug#919395: Heads up to release team about MariadB 10.3
Hi, I think with the removal of the transitional libmariadbclient18 from testing we can consider this transition as finished. The corresponding manual tracker should be archived as well, there are only a few sid-only packages left depending on cruft. Andreas
Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)
It’s always better *with* the patches... Stephen From 4b854c788af23f01c01afbd35a3befb060536297 Mon Sep 17 00:00:00 2001 From: Stephen Kitt Date: Tue, 9 Apr 2019 09:01:55 +0200 Subject: [PATCH 1/2] Apply upstream dllimport fix for static data members Closes: #923214 --- debian/changelog| 7 +++ debian/patches/gcc9-pr88568-2.patch | 40 + debian/patches/series2 | 3 +-- 3 files changed, 48 insertions(+), 2 deletions(-) create mode 100644 debian/patches/gcc9-pr88568-2.patch diff --git a/debian/changelog b/debian/changelog index d9b3631..e540504 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +gcc-mingw-w64 (21.2) UNRELEASED; urgency=medium + + * Apply upstream dllimport fix for static data members. +Closes: #923214. + + -- Stephen Kitt Thu, 21 Mar 2019 10:45:08 +0100 + gcc-mingw-w64 (21.1) unstable; urgency=medium * Avoid attempting to strip plugins using the target strip; should fix diff --git a/debian/patches/gcc9-pr88568-2.patch b/debian/patches/gcc9-pr88568-2.patch new file mode 100644 index 000..3ad3568 --- /dev/null +++ b/debian/patches/gcc9-pr88568-2.patch @@ -0,0 +1,40 @@ +2019-03-05 Jakub Jelinek + + PR c/88568 + * attribs.c (handle_dll_attribute): Don't clear TREE_STATIC for + dllimport on VAR_DECLs with RECORD_TYPE or UNION_TYPE DECL_CONTEXT. + + * g++.dg/other/pr88568.C: New test. + +--- a/src/gcc/attribs.c 2019-01-10 11:44:07.122511397 +0100 b/src/gcc/attribs.c 2019-03-05 13:59:51.745924578 +0100 +@@ -1691,8 +1691,11 @@ handle_dll_attribute (tree * pnode, tree + a function global scope, unless declared static. */ + if (current_function_decl != NULL_TREE && !TREE_STATIC (node)) + TREE_PUBLIC (node) = 1; +- /* Clear TREE_STATIC because DECL_EXTERNAL is set. */ +- TREE_STATIC (node) = 0; ++ /* Clear TREE_STATIC because DECL_EXTERNAL is set, unless ++ it is a C++ static data member. */ ++ if (DECL_CONTEXT (node) == NULL_TREE ++ || !RECORD_OR_UNION_TYPE_P (DECL_CONTEXT (node))) ++ TREE_STATIC (node) = 0; + } + + if (*no_add_attrs == false) +--- a/src/gcc/testsuite/g++.dg/other/pr88568.C 2019-03-05 14:03:20.132509560 +0100 b/src/gcc/testsuite/g++.dg/other/pr88568.C 2019-03-05 14:01:39.674155860 +0100 +@@ -0,0 +1,13 @@ ++// PR c/88568 ++// { dg-do compile } ++// { dg-require-dll "" } ++ ++struct S { ++ __attribute__((dllimport)) static const char foo[]; ++}; ++ ++int ++foo (int x) ++{ ++ return S::foo[x]; ++} diff --git a/debian/patches/series2 b/debian/patches/series2 index 6f5002f..4f7963a 100644 --- a/debian/patches/series2 +++ b/debian/patches/series2 @@ -6,5 +6,4 @@ win-std-filesystem.patch hide-path-iostream-operators.patch filesystem_error-no-throw-copyable.patch overload-distance-and-advance.patch -#update-path-compare-logic.patch -#fix-filesystem-path-lexically_normal.patch +gcc9-pr88568-2.patch -- 2.11.0 From e2b9e4ff772453fb81634b9715a83c83deb07d4a Mon Sep 17 00:00:00 2001 From: Stephen Kitt Date: Wed, 10 Apr 2019 18:01:26 +0200 Subject: [PATCH 2/2] Explicitly enable std::filesystem ... with the appropriate upstream patch. Closes: #925172 --- debian/changelog | 2 + debian/g++-mingw-w64-i686.install.in | 2 +- debian/g++-mingw-w64-x86-64.install.in | 2 +- debian/patches/series2 | 1 + .../set-shared_ptr-lock-policy-at-build-time.patch | 336 + debian/rules | 8 +- 6 files changed, 346 insertions(+), 5 deletions(-) create mode 100644 debian/patches/set-shared_ptr-lock-policy-at-build-time.patch diff --git a/debian/changelog b/debian/changelog index e540504..baee837 100644 --- a/debian/changelog +++ b/debian/changelog @@ -2,6 +2,8 @@ gcc-mingw-w64 (21.2) UNRELEASED; urgency=medium * Apply upstream dllimport fix for static data members. Closes: #923214. + * Explicitly enable std::filesystem, with the appropriate upstream +patch. Closes: #925172. -- Stephen Kitt Thu, 21 Mar 2019 10:45:08 +0100 diff --git a/debian/g++-mingw-w64-i686.install.in b/debian/g++-mingw-w64-i686.install.in index e2aea2e..f79b2aa 100644 --- a/debian/g++-mingw-w64-i686.install.in +++ b/debian/g++-mingw-w64-i686.install.in @@ -7,5 +7,5 @@ usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++-6.dll usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++.a usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++.dll.a usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++.dll.a-gdb.py -#usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++fs.a +usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libstdc++fs.a usr/lib/gcc/i686-w64-mingw32/@@VERSION@@*/libsupc++.a diff --git a/debian/g++-mingw-w64-x86-64.install.in b/debian/g++-mingw-w64-x86-64.install.in index 76b0ea4..544290e 100644 --- a/debian/g++-mingw-w64-x86-64.install.in +++ b/debian/g++-mingw-w64-x86-64.install.in @@ -7,5
Bug#926994: unblock: gcc-mingw-w64/21.2 (pre-upload approval request)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, I have a couple of fixes pending upload for gcc-mingw-w64, and I’m wondering if they’d pass muster for Buster. The attached patches fix, in order: * #923214 — an ICE hit with external static data members * #925172 — std::filesystem support is broken in the current Buster package I’m requesting approval for these fixes before uploading them to unstable. The candidate source package would contain only those fixes plus the result of running "dch -r". Note that because of the way gcc-mingw-w64 works, this would involve pulling gcc-8 8.3.0-6 (or whatever version is in unstable when the package is built) in too. Regards, Stephen unblock gcc-mingw-w64/21.2 -- System Information: Debian Release: 9.8 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable'), (100, 'unstable-debug'), (100, 'testing-debug'), (100, 'unstable'), (100, 'testing'), (1, 'experimental-debug'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-8-amd64 (SMP w/8 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
Processed: unblock: sia/1.3.0-1.1
Processing control commands: > tag -1 moreinfo Bug #926992 [release.debian.org] unblock: sia/1.3.0-1.1 Added tag(s) moreinfo. -- 926992: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926992 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#926992: unblock: sia/1.3.0-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Control: tag -1 moreinfo Please unblock package sia This NMU adds 'missingok' to the logrotate config, fixing piuparts failures in sid, buster and upgrades to buster, where logrotate configuration is now being checked by piuparts. I missed this package in my previous round of NMUs and therefore it only enetred DELAYED/5 a few minutes ago. unblock sia/1.3.0-1.1 Thanks for considering, Andreas diff -Nru sia-1.3.0/debian/changelog sia-1.3.0/debian/changelog --- sia-1.3.0/debian/changelog 2017-11-01 00:54:54.0 +0100 +++ sia-1.3.0/debian/changelog 2019-04-13 09:42:04.0 +0200 @@ -1,3 +1,10 @@ +sia (1.3.0-1.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add 'missingok' to logrotate config. (Closes: #910439) + + -- Andreas Beckmann Sat, 13 Apr 2019 09:42:04 +0200 + sia (1.3.0-1) unstable; urgency=medium [ Bjorn Dolk ] diff -Nru sia-1.3.0/debian/sia.logrotate sia-1.3.0/debian/sia.logrotate --- sia-1.3.0/debian/sia.logrotate 2017-11-01 00:54:54.0 +0100 +++ sia-1.3.0/debian/sia.logrotate 2019-04-13 09:32:11.0 +0200 @@ -3,4 +3,5 @@ copytruncate rotate 14 compress +missingok }
Bug#926991: unblock: rinetd/0.62.1sam-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package rinetd This NMU adds 'missingok' to the logrotate config, fixing piuparts failures in sid, buster and upgrades to buster, where logrotate configuration is now being checked by piuparts. unblock rinetd/0.62.1sam-1.1 Thanks for considering, Andreas
Bug#926990: unblock: net-acct/0.71-9.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package net-acct This NMU adds 'missingok' to the logrotate config, fixing piuparts failures in sid, buster and upgrades to buster, where logrotate configuration is now being checked by piuparts. unblock net-acct/0.71-9.1 Thanks for considering, Andreas diff -Nru net-acct-0.71/debian/changelog net-acct-0.71/debian/changelog --- net-acct-0.71/debian/changelog 2009-11-01 12:37:29.0 +0100 +++ net-acct-0.71/debian/changelog 2019-04-02 19:59:09.0 +0200 @@ -1,3 +1,10 @@ +net-acct (0.71-9.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add 'missingok' to logrotate config. (Closes: #916647) + + -- Andreas Beckmann Tue, 02 Apr 2019 19:59:09 +0200 + net-acct (0.71-9) unstable; urgency=low * Move patches to upstream to quilt series diff -Nru net-acct-0.71/debian/net-acct.logrotate net-acct-0.71/debian/net-acct.logrotate --- net-acct-0.71/debian/net-acct.logrotate 2009-10-29 23:23:21.0 +0100 +++ net-acct-0.71/debian/net-acct.logrotate 2019-03-21 11:02:10.0 +0100 @@ -2,6 +2,7 @@ rotate 14 daily compress + missingok prerotate if test -r /var/run/nacctd.pid; then # Stop writing out entries @@ -20,6 +21,7 @@ rotate 2 daily compress + missingok prerotate if test -r /var/run/nacctd.pid; then # Stop writing out entries
Bug#926989: unblock: nagzilla/2.0-1.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package nagzilla This NMU fixes a logrotate problem after package removal discovered by piuparts. No longer delete the user and group after package removal since it is still referenced in the config file. Also keep the user/group after purge which is the nowadays generally recommended way of handling system users. I verified that the package reinstalls without problems after it has been purged, but the user/group remained. unblock nagzilla/2.0-1.1 Thanks for considering, Andreas diff -Nru nagzilla-2.0/debian/changelog nagzilla-2.0/debian/changelog --- nagzilla-2.0/debian/changelog 2016-01-20 00:14:45.0 +0100 +++ nagzilla-2.0/debian/changelog 2019-04-02 20:16:12.0 +0200 @@ -1,3 +1,11 @@ +nagzilla (2.0-1.1) unstable; urgency=medium + + * Non-maintainer upload. + * Do not delete the nagzilla user and group after package removal. +(Closes: #915662) + + -- Andreas Beckmann Tue, 02 Apr 2019 20:16:12 +0200 + nagzilla (2.0-1) unstable; urgency=medium * New upstream release, obsoleting patch 05_fix-logrotate-file and diff -Nru nagzilla-2.0/debian/postrm nagzilla-2.0/debian/postrm --- nagzilla-2.0/debian/postrm 2016-01-18 21:35:54.0 +0100 +++ nagzilla-2.0/debian/postrm 1970-01-01 01:00:00.0 +0100 @@ -1,39 +0,0 @@ -#!/bin/sh -# postrm script for nagzilla -# -# see: dh_installdeb(1) - -set -e - -# summary of how this script can be called: -#* `remove' -#* `purge' -#* `upgrade' -#* `failed-upgrade' -#* `abort-install' -#* `abort-install' -#* `abort-upgrade' -#* `disappear' -# -# for details, see http://www.debian.org/doc/debian-policy/ or -# the debian-policy package - - -case "$1" in -purge|remove|upgrade|failed-upgrade|abort-install|abort-upgrade|disappear) -deluser --quiet --system nagzilla > /dev/null || true -delgroup --quiet --system nagzilla > /dev/null || true -;; - -*) -echo "postrm called with unknown argument \`$1'" >&2 -exit 1 -;; -esac - -# dh_installdeb will replace this with shell code automatically -# generated by other debhelper scripts. - -#DEBHELPER# - -exit 0
Bug#926987: marked as done (unblock: homer-api/5.0.6+dfsg2-3.1)
Your message dated Sat, 13 Apr 2019 08:04:00 + with message-id <7acb3d5f-09e1-00e2-3daf-bbaf8c046...@thykier.net> and subject line Re: Bug#926987: unblock: homer-api/5.0.6+dfsg2-3.1 has caused the Debian Bug report #926987, regarding unblock: homer-api/5.0.6+dfsg2-3.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 926987: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926987 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package homer-api This update adds 'missingok' to the logrotate config, fixing piuparts failures in sid, buster and upgrades to buster, where logrotate configuration is now being checked by piuparts. unblock homer-api/5.0.6+dfsg2-3.1 Thanks for considering, Andreas diff -Nru homer-api-5.0.6+dfsg2/debian/changelog homer-api-5.0.6+dfsg2/debian/changelog --- homer-api-5.0.6+dfsg2/debian/changelog 2016-09-25 10:35:57.0 +0200 +++ homer-api-5.0.6+dfsg2/debian/changelog 2019-04-02 20:06:08.0 +0200 @@ -1,3 +1,10 @@ +homer-api (5.0.6+dfsg2-3.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add 'missingok' to logrotate config. (Closes: #911294) + + -- Andreas Beckmann Tue, 02 Apr 2019 20:06:08 +0200 + homer-api (5.0.6+dfsg2-3) unstable; urgency=medium * More lintian fixes. diff -Nru homer-api-5.0.6+dfsg2/debian/homer-api.logrotate homer-api-5.0.6+dfsg2/debian/homer-api.logrotate --- homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2016-09-24 14:22:38.0 +0200 +++ homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2019-03-21 11:22:45.0 +0100 @@ -1,6 +1,7 @@ /var/log/homer.log { sharedscripts +missingok postrotate invoke-rc.d rsyslog rotate > /dev/null endscript --- End Message --- --- Begin Message --- Andreas Beckmann: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > > Please unblock package homer-api > > This update adds 'missingok' to the logrotate config, fixing piuparts > failures in sid, buster and upgrades to buster, where logrotate > configuration is now being checked by piuparts. > > unblock homer-api/5.0.6+dfsg2-3.1 > > > Thanks for considering, > > Andreas > Unblocked, thanks. ~Niels--- End Message ---
Bug#926987: unblock: homer-api/5.0.6+dfsg2-3.1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package homer-api This update adds 'missingok' to the logrotate config, fixing piuparts failures in sid, buster and upgrades to buster, where logrotate configuration is now being checked by piuparts. unblock homer-api/5.0.6+dfsg2-3.1 Thanks for considering, Andreas diff -Nru homer-api-5.0.6+dfsg2/debian/changelog homer-api-5.0.6+dfsg2/debian/changelog --- homer-api-5.0.6+dfsg2/debian/changelog 2016-09-25 10:35:57.0 +0200 +++ homer-api-5.0.6+dfsg2/debian/changelog 2019-04-02 20:06:08.0 +0200 @@ -1,3 +1,10 @@ +homer-api (5.0.6+dfsg2-3.1) unstable; urgency=medium + + * Non-maintainer upload. + * Add 'missingok' to logrotate config. (Closes: #911294) + + -- Andreas Beckmann Tue, 02 Apr 2019 20:06:08 +0200 + homer-api (5.0.6+dfsg2-3) unstable; urgency=medium * More lintian fixes. diff -Nru homer-api-5.0.6+dfsg2/debian/homer-api.logrotate homer-api-5.0.6+dfsg2/debian/homer-api.logrotate --- homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2016-09-24 14:22:38.0 +0200 +++ homer-api-5.0.6+dfsg2/debian/homer-api.logrotate2019-03-21 11:22:45.0 +0100 @@ -1,6 +1,7 @@ /var/log/homer.log { sharedscripts +missingok postrotate invoke-rc.d rsyslog rotate > /dev/null endscript
Bug#926982: marked as done (unblock: ocserv/0.12.2-3)
Your message dated Sat, 13 Apr 2019 07:54:00 + with message-id <847f09c0-8e16-3984-8193-717f30e95...@thykier.net> and subject line Re: Bug#926982: unblock: ocserv/0.12.2-3 has caused the Debian Bug report #926982, regarding unblock: ocserv/0.12.2-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 926982: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926982 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, Please unblock package ocserv It fixes a segfault problem in the worker binary as described in upstream bug tracker: https://gitlab.com/openconnect/ocserv/issues/197 Attached is the debdiff between 0.12.2-2 and 0.12.2-3. unblock ocserv/0.12.2-3 Regards, Aron ocserv_0.12.2-3.debdiff Description: Binary data --- End Message --- --- Begin Message --- Aron Xu: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: unblock > > Hi, > > Please unblock package ocserv > > It fixes a segfault problem in the worker binary as described in > upstream bug tracker: > https://gitlab.com/openconnect/ocserv/issues/197 > > Attached is the debdiff between 0.12.2-2 and 0.12.2-3. > > unblock ocserv/0.12.2-3 > > Regards, > Aron > Unblocked, thanks. ~Niels--- End Message ---
Bug#926982: unblock: ocserv/0.12.2-3
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, Please unblock package ocserv It fixes a segfault problem in the worker binary as described in upstream bug tracker: https://gitlab.com/openconnect/ocserv/issues/197 Attached is the debdiff between 0.12.2-2 and 0.12.2-3. unblock ocserv/0.12.2-3 Regards, Aron ocserv_0.12.2-3.debdiff Description: Binary data