Bug#984899: buster-pu: package hwloc-contrib/1.11.12-3+deb10u1

2021-03-09 Thread Samuel Thibault
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Hello,

I have uploaded a proposed 1.11.12-3+deb10u1 version of hwloc-contrib
for buster.

[ Reason ]
PowerPC systems provide much better bandwidth between CPUs and NVIDIA
GPUs thanks to NVLink, they are thus currently very often used for
running NVIDIA GPUs (top500.org has a lot of them for instance). But
hwloc currently does not show NVIDIA GPUs on ppc64el because the
hwloc-contrib package is not getting built there.  This makes it much
harder for applications to determine the locality of GPUs in the system
and thus where to place data etc. to get efficient execution.

This is not a regression over oldstable, which did not have it built on
ppc64el either.

[ Impact ]
If this isn't included, people will have to build hwloc by hand to get
the locality information and thus efficient execution.

[ Tests ]
The hwloc-contrib package has a full testsuite which I could run on a
ppc64el system.

[ Risks ]
There is no risk for the only other arch (amd64), because the change
disables the libcuda1 build-dep only on ppc64el, and it drops libcuda
from the link of a test which is not getting shipped anyway.

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
There is no libcuda1 on ppc64el, so this dependency had to be disabled.
This disables one test (cuda), but otherwise the functionalities of the
built package are the same.

The cudart test used to be linked against libcuda, but that was actually
spurious, upstream doesn't link it against libcuda any more since a long
time actually.

With regards,
Samuel
diff -Nru hwloc-contrib-1.11.12/debian/changelog 
hwloc-contrib-1.11.12/debian/changelog
--- hwloc-contrib-1.11.12/debian/changelog  2019-02-09 00:46:55.0 
+0100
+++ hwloc-contrib-1.11.12/debian/changelog  2021-03-10 00:22:29.0 
+0100
@@ -1,3 +1,11 @@
+hwloc-contrib (1.11.12-3+deb10u1) buster; urgency=medium
+
+  * control: Enable build on ppc64el with libcuda1 build-dep disabled.
+  * patches/cuda-ppc64el: Upstream fix for cudart test that does not actually
+need libcuda1.
+
+ -- Samuel Thibault   Wed, 10 Mar 2021 00:22:29 +0100
+
 hwloc-contrib (1.11.12-3) unstable; urgency=medium
 
   * control: Add libcuda1 dependency, not brought by nvidia-cuda-dev any more.
diff -Nru hwloc-contrib-1.11.12/debian/control 
hwloc-contrib-1.11.12/debian/control
--- hwloc-contrib-1.11.12/debian/control2019-02-09 00:46:06.0 
+0100
+++ hwloc-contrib-1.11.12/debian/control2021-03-09 23:55:17.0 
+0100
@@ -3,7 +3,7 @@
 Maintainer: Samuel Thibault 
 Build-Depends: debhelper (>= 9), libltdl-dev,
   valgrind [amd64 arm64 armhf i386 mips mipsel powerpc ppc64el s390x mips64el 
ppc64],
-  libx11-dev, libxext-dev, nvidia-cuda-dev, libcuda1, libxnvctrl-dev,
+  libx11-dev, libxext-dev, nvidia-cuda-dev, libcuda1 [!ppc64el], 
libxnvctrl-dev,
   libpciaccess-dev, pkg-config,
   libibverbs-dev [linux-any],
   ocl-icd-opencl-dev [!hurd-i386] | opencl-dev, opencl-headers,
@@ -18,7 +18,7 @@
 Vcs-Browser: https://github.com/open-mpi/hwloc-debian/tree/contrib
 
 Package: libhwloc-contrib-plugins
-Architecture: amd64
+Architecture: amd64 ppc64el
 Multi-Arch: same
 Depends: ${shlibs:Depends}, ${misc:Depends}, libhwloc5 (>= 
${source:Upstream-Version}~), libhwloc5 (<< ${source:Upstream-Version}A)
 Description: Hierarchical view of the machine - contrib plugins
diff -Nru hwloc-contrib-1.11.12/debian/patches/cuda-ppc64el 
hwloc-contrib-1.11.12/debian/patches/cuda-ppc64el
--- hwloc-contrib-1.11.12/debian/patches/cuda-ppc64el   1970-01-01 
01:00:00.0 +0100
+++ hwloc-contrib-1.11.12/debian/patches/cuda-ppc64el   2021-03-10 
00:21:15.0 +0100
@@ -0,0 +1,21 @@
+commit 542fb5677723e13980056ea5f1023b5120bd2e0d
+Author: Samuel Thibault 
+Date:   Wed Mar 10 00:20:05 2021 +0100
+
+tests/cudart: Do not link against libcuda
+
+ppc64el doesn't have libcuda and the cudart test does not need it anyway.
+
+diff --git a/tests/Makefile.am b/tests/Makefile.am
+index cc9ce5039..5129b8a34 100644
+--- a/tests/Makefile.am
 b/tests/Makefile.am
+@@ -104,7 +104,7 @@ openfabrics_verbs_LDADD = $(LDADD) -libverbs
+ myriexpress_LDADD = $(LDADD) -lmyriexpress
+ opencl_LDADD = $(LDADD) $(HWLOC_OPENCL_LIBS) $(HWLOC_OPENCL_LDFLAGS)
+ cuda_LDADD = $(LDADD) -lcuda
+-cudart_LDADD = $(LDADD) -lcuda -lcudart
++cudart_LDADD = $(LDADD) -lcudart
+ nvml_LDADD = $(LDADD) -lnvidia-ml
+ hwloc_bind_LDADD = $(LDADD)
+ if HWLOC_HAVE_PTHREAD
diff -Nru hwloc-contrib-1.11.12/debian/patches/series 
hwloc-contrib-1.11.12/debian/patches/series
--- hwloc-contrib-1.11.12/debian/patches/series 2019-02-09 00:46:08.0 
+0100
+++ hwloc-contrib-1.11.12/debian/patches/series 2021-03-10 00:02:11.0 
+0100
@@ -1,2 +1,3 @@
 

Bug#984896: buster-pu: package jquery/3.3.1~dfsg-3

2021-03-09 Thread Roberto C. Sanchez
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Release Team,

[ Reason ]

I would like to fix CVE-2020-11022 and CVE-2020-11023.  The same fix has
been prepared for stretch and will be uploaded concurrently with the
buster fix.  The security team has marked these issues as no-dsa.

[ Impact ]

jquery would be vulnerable if not approved.

[ Tests ]

Backported patch was reviewed and approved by the Debian package
maintainers.  Sadly, no reproducers were released.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them, along with the
  maintainers of jquery
  [x] attach debdiff against the package in (old)stable
  [N/A] the issue is verified as fixed in unstable (jquery is not
present in unstable/testing)

Regards,

- -Roberto

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEIYZ1DR4ae5UL01q7ldFmTdL1kUIFAmBH//4ACgkQldFmTdL1
kULu7w/+KzQq0SMV/rDPj/BUs+wyoeqGfvLiMhOcA019wDblB17wW2x/4kWQWCMa
75tXD7kep+6b1lLNBPj75fcC9xHNiV9XTGgAwViHOBQ85bxfbc1Zi0YEnXfrgjeG
vi1xtHeLUNgDrCG/+UQP8qJn7+asURfism9v1WhmH93jd8+J9AleHOvUR0WjUVz2
tKIHXPBNQ0yDbJO34HXzvXio7IvJxXlNZ+ivK0AlUQVwam1LThy+tCk4hob8NXQg
JGvomGG/GDbMnQ/yNMc3IRHVDas0nLbmaa026kcHE05pQjhdPYOYckL/Jl5MW84s
5L+foc1dfAi7A4a3Bo898FDkaJqD41VCAgKjUbjD0aBc38D310ksqGlep3scOqn0
uX5GUCWcvTg05OHCKGrd28YyYckUDDRaL1Ln0MtSfYGQGgG3DyXqAGpAPCxA6PeW
gGMuBDy3t68kkCQoAqYzqkpn/oTS+3T6LWm35/c2X5FJAChM9gsDAaJ3IaofX84x
pzPu6VX7O3cPLMaV7cBKj4Ix85iBdKNHKRZlbruiCxRtzWgiMyyDLhsaj4Fbp989
hWddYqdb6Wj01CCAoDkHvsfg6GuSd/WGiEt1MCP0EqDUQ6WRJjmugELCThYj7c3U
PXxNmveHtehpN7+5MG1lNlLJ8hLydLS5CfphwwCrsOF2+MfRzRk=
=WoIV
-END PGP SIGNATURE-
diff -Nru jquery-3.3.1~dfsg/debian/changelog jquery-3.3.1~dfsg/debian/changelog
--- jquery-3.3.1~dfsg/debian/changelog  2019-04-19 02:52:35.0 -0400
+++ jquery-3.3.1~dfsg/debian/changelog  2021-03-09 14:42:16.0 -0500
@@ -1,3 +1,13 @@
+jquery (3.3.1~dfsg-3+deb10u1) buster; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * Prevent untrusted code execution when passing untrusted HTML to DOM
+manipulation methods.  (CVE-2020-11022)
+  * Prevent untrusted code execution when passing HTML containing 
+elements to DOM manipulation methods.  (CVE-2020-11023)
+
+ -- Roberto C. Sánchez   Tue, 09 Mar 2021 14:42:16 -0500
+
 jquery (3.3.1~dfsg-3) unstable; urgency=medium
 
   * Team upload
diff -Nru jquery-3.3.1~dfsg/debian/patches/CVE-2020-11022.patch 
jquery-3.3.1~dfsg/debian/patches/CVE-2020-11022.patch
--- jquery-3.3.1~dfsg/debian/patches/CVE-2020-11022.patch   1969-12-31 
19:00:00.0 -0500
+++ jquery-3.3.1~dfsg/debian/patches/CVE-2020-11022.patch   2021-03-09 
14:42:16.0 -0500
@@ -0,0 +1,1749 @@
+From 1d61fd9407e6fbe82fe55cb0b938307aa0791f77 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Micha=C5=82=20Go=C5=82=C4=99biowski-Owczarek?=
+ 
+Date: Mon, 16 Mar 2020 21:49:29 +0100
+Subject: [PATCH] Manipulation: Make jQuery.htmlPrefilter an identity function
+
+Closes gh-4642
+
+(cherry picked from 90fed4b453a5becdb7f173d9e3c1492390a1441f)
+---
+ src/manipulation.js   |   9 +--
+ test/data/testinit.js |   2 +-
+ test/localfile.html   |   2 +-
+ test/unit/ajax.js |   8 +--
+ test/unit/attributes.js   |  46 ++---
+ test/unit/basic.js|  24 +++
+ test/unit/core.js |  14 ++--
+ test/unit/css.js  | 112 +++
+ test/unit/data.js |  20 +++---
+ test/unit/deprecated.js   |   2 +-
+ test/unit/dimensions.js   |  30 -
+ test/unit/effects.js  |  22 +++---
+ test/unit/event.js|  26 +++
+ test/unit/manipulation.js | 138 ++
+ test/unit/offset.js   |  10 +--
+ test/unit/selector.js |   4 +-
+ test/unit/traversing.js   |  22 +++---
+ test/unit/wrap.js |  12 ++--
+ 18 files changed, 246 insertions(+), 257 deletions(-)
+
+--- a/src/manipulation.js
 b/src/manipulation.js
+@@ -32,13 +32,6 @@
+ 
+ var
+ 
+-  /* eslint-disable max-len */
+-
+-  // See https://github.com/eslint/eslint/issues/3229
+-  rxhtmlTag = 
/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([a-z][^\/\0>\x20\t\r\n\f]*)[^>]*)\/>/gi,
+-
+-  /* eslint-enable */
+-
+   // Support: IE <=10 - 11, Edge 12 - 13 only
+   // In IE/Edge using regex groups here causes severe slowdowns.
+   // See https://connect.microsoft.com/IE/feedback/details/1736512/
+@@ -235,7 +228,7 @@
+ 
+ jQuery.extend( {
+   htmlPrefilter: function( html ) {
+-  return html.replace( rxhtmlTag, "<$1>" );
++  return html;
+   },
+ 
+   clone: function( elem, dataAndEvents, deepDataAndEvents ) {
+--- a/test/data/testinit.js
 b/test/data/testinit.js
+@@ -244,7 +244,7 @@
+   }
+   wrapper.call( QUnit, title, function( assert ) {
+   var done = assert.async(),
+-  

NEW changes in stable-new

2021-03-09 Thread Debian FTP Masters
Processing changes file: fwupdate_12-4+deb10u3_amd64-buildd.changes
  ACCEPT
Processing changes file: fwupdate_12-4+deb10u3_arm64-buildd.changes
  ACCEPT
Processing changes file: fwupdate_12-4+deb10u3_armhf-buildd.changes
  ACCEPT
Processing changes file: fwupdate_12-4+deb10u3_i386-buildd.changes
  ACCEPT



Bug#984892: marked as done (unblock: libbio-db-ncbihelper-perl/1.7.6-4)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 09 Mar 2021 21:09:46 +
with message-id 
and subject line unblock libbio-db-ncbihelper-perl
has caused the Debian Bug report #984892,
regarding unblock: libbio-db-ncbihelper-perl/1.7.6-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984892: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984892
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libbio-db-ncbihelper-perl

[ Reason ]
Current version of libbio-db-ncbihelper-perl in Testing, in
version 1.7.6-2, is affected by release critical bugs #983239
and #984475.  Due to the autopkgtest now marked "superficial",
I don't expect it will reach Testing on it's own past the hard
freeze date this Friday.

[ Impact ]
Removal of libbio-db-ncbihelper-perl from Testing would trigger
the removal of bioperl, and the entire ecosystem of Med packages
which are based on bioperl.  That represents more than 40 source
packages, some with relatively high popcon by Debian Med
standards.

[ Tests ]
I manually ran the test needing Internet on version 1.7.6-4 in
Sid and Testing, architectures amd64 and arm64 (schroot + qemu),
and modulo the minor failing test which is triggered by events
outside of our control and documented in #983239, they ran fine.
I also ran the build and autopkgtest suite in normal conditions
(superficial) without any issues on Sid and Testing, amd64 and
arm64, just in case.

[ Risks ]
Changes affect diverse test suites to not depend on the network
anymore, so should be more stable, yet superficial.  Also, I
don't see how the Breaks+Replace statement added to the control
file could break the package (but I might be surprised of
course).  Overall I think the risk of upgrading the package in
Testing is rather low.

[ Checklist ]
  [*] all changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in testing

[ Other info ]
The similar libbio-db-embl-perl, which had the same transitive
removal implications, made it's way to Testing fortunately.  But
I'm not too sure of the timing yet for libbio-db-biofetch-perl,
nor it's impact on the bioperl ecosystem.  I might open one
other unblock request for libbio-db-biofetch-perl this week end
if it turns out to be necessary.

unblock libbio-db-ncbihelper-perl/1.7.6-4


Have a nice day,  :)
-- 
Étienne Mollier 
Fingerprint:  8f91 b227 c7d6 f2b1 948c  8236 793c f67e 8f0d 11da
Sent from /dev/pts/1, please excuse my verbosity.
diff -Nru libbio-db-ncbihelper-perl-1.7.6/debian/changelog 
libbio-db-ncbihelper-perl-1.7.6/debian/changelog
--- libbio-db-ncbihelper-perl-1.7.6/debian/changelog2020-01-05 
07:56:13.0 +0100
+++ libbio-db-ncbihelper-perl-1.7.6/debian/changelog2021-03-04 
09:01:01.0 +0100
@@ -1,3 +1,24 @@
+libbio-db-ncbihelper-perl (1.7.6-4) unstable; urgency=medium
+
+  * Team upload.
+  * Breaks+Replaces: bioperl (<< 1.7.3)
+Closes: #984475
+
+ -- Andreas Tille   Thu, 04 Mar 2021 09:01:01 +0100
+
+libbio-db-ncbihelper-perl (1.7.6-3) unstable; urgency=medium
+
+  * Team upload.
+  * Prevent build time tests and autodep8-perl test to fetch resources on the
+Internet.
+Closes: #983238
+  * Ensured autopkgtest remained offline, and marked the smoke test as
+superficial, since all tests within are skipped without Internet access.
+  * Side-tracked maintainer notifications from debian-...@lists.debian.org to
+debian-med-packag...@lists.alioth.debian.org like the other packages.
+
+ -- Étienne Mollier   Mon, 22 Feb 2021 22:45:11 
+0100
+
 libbio-db-ncbihelper-perl (1.7.6-2) unstable; urgency=medium
 
   * Be more strict about the libbio-asn1-entrezgene-perl dependency
diff -Nru libbio-db-ncbihelper-perl-1.7.6/debian/control 
libbio-db-ncbihelper-perl-1.7.6/debian/control
--- libbio-db-ncbihelper-perl-1.7.6/debian/control  2020-01-05 
07:55:51.0 +0100
+++ libbio-db-ncbihelper-perl-1.7.6/debian/control  2021-03-04 
09:01:01.0 +0100
@@ -1,8 +1,7 @@
 Source: libbio-db-ncbihelper-perl
-Maintainer: Debian Med team 
-Uploaders: Michael R. Crusoe 
+Maintainer: Debian Med Packaging Team 

+Uploaders: Michael R. Crusoe 
 Section: perl
-Testsuite: autopkgtest-pkg-perl
 Priority: optional
 Build-Depends: debhelper-compat (= 12)
 Build-Depends-Indep: libbio-perl-perl,
@@ -34,6 +33,8 @@
  liburi-perl,
  libwww-perl,
  libxml-twig-perl
+Breaks: bioperl (<< 1.7.3)
+Replaces: bioperl (<< 1.7.3)
 

Bug#984895: unblock: geeqie/1.6-8

2021-03-09 Thread Andreas Rönnquist
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package geeqie

The version in unstable has a patch cherry-picked from upstream which
fixes showing images when using wayland, which has been problematic
before, and it hasn't worked with some combinations of wayland and
libclutter. This fixes two bugs (#983207, #977189) with severity
important (and I fully believe that more bugs would be reported on the
package if the fix isn't included).

The patch fixes showing only a white image on some setups (wayland),
which before the patch needs a setting change, or cli option to fix.

[ Checklist ]
  [X] all changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in testing


unblock geeqie/1.6-8

-- Andreas Rönnquist
gus...@debian.org
diff -Nru geeqie-1.6/debian/changelog geeqie-1.6/debian/changelog
--- geeqie-1.6/debian/changelog	2021-02-27 13:36:57.0 +0100
+++ geeqie-1.6/debian/changelog	2021-03-09 20:17:40.0 +0100
@@ -1,3 +1,11 @@
+geeqie (1:1.6-8) unstable; urgency=medium
+
+  * Add patch to make image visible on wayland too, independent on
+if we are using the clutter library or not
+(Closes: #983207, #977189)
+
+ -- Andreas Rönnquist   Tue, 09 Mar 2021 20:17:40 +0100
+
 geeqie (1:1.6-7) unstable; urgency=medium
 
   * Add patch fixing regression --remote option failing
diff -Nru geeqie-1.6/debian/patches/0007-Fix-644-Images-fail-to-render-on-MacOS.patch geeqie-1.6/debian/patches/0007-Fix-644-Images-fail-to-render-on-MacOS.patch
--- geeqie-1.6/debian/patches/0007-Fix-644-Images-fail-to-render-on-MacOS.patch	1970-01-01 01:00:00.0 +0100
+++ geeqie-1.6/debian/patches/0007-Fix-644-Images-fail-to-render-on-MacOS.patch	2021-03-09 20:17:16.0 +0100
@@ -0,0 +1,317 @@
+From: Colin Clark 
+Date: Sat, 6 Mar 2021 13:23:46 +
+Subject: Fix #644: Images fail to render on MacOS
+
+https://github.com/BestImageViewer/geeqie/issues/644
+
+Change the way the "draw" signal is handled.
+
+Overlay guidelines are disabled.
+
+This patch also fixes showing the image on Wayland, without it we often
+only get a white rectangle where the image was supposed to show.
+
+---
+ src/image-overlay.c  |  51 +++--
+ src/renderer-tiles.c | 127 +++
+ 2 files changed, 143 insertions(+), 35 deletions(-)
+
+diff --git a/src/image-overlay.c b/src/image-overlay.c
+index 6116b5a..ff377e8 100644
+--- a/src/image-overlay.c
 b/src/image-overlay.c
+@@ -202,7 +202,6 @@ gint image_osd_histogram_get_mode(ImageWindow *imd)
+ void image_osd_toggle(ImageWindow *imd)
+ {
+ 	OsdShowFlags show;
+-
+ 	if (!imd) return;
+ 
+ 	show = image_osd_get(imd);
+@@ -522,30 +521,32 @@ static GdkPixbuf *image_osd_guidelines_render(OverlayStateData *osd)
+ 	GdkPixbuf *rectangles;
+ 	ImageWindow *imd = osd->imd;
+ 
+-	pixbuf_renderer_get_scaled_size((PixbufRenderer *)imd->pr, , );
+-
+-	if (width && height)
+-		{
+-		rectangles = gdk_pixbuf_new(GDK_COLORSPACE_RGB, TRUE, 8, width, height);
+-		if (rectangles)
+-			{
+-			pixbuf_set_rect_fill(rectangles, 0, 0, width, height, 255, 255, 255, 0);
+-			pixbuf_set_rect(rectangles, 0, 0 + (height / 3), width, height / 3,
+-0, 0, 0, 255,
+-1, 1, 1, 1);
+-			pixbuf_set_rect(rectangles, 0, 0 + (height / 3 + 1), width, height / 3 - 2,
+-255, 255, 255, 255,
+-1, 1, 1, 1);
+-
+-			pixbuf_set_rect(rectangles, 0 + width / 3, 0 , width / 3, height,
+-0, 0, 0, 255,
+-1, 1, 1, 1);
+-			pixbuf_set_rect(rectangles, 0 + width / 3 + 1, 0, width / 3 - 2, height,
+-255, 255, 255, 255,
+-1, 1, 1, 1);
+-			return rectangles;
+-			}
+-		}
++/* FIXME: guidelines does not work with revised draw signal handling
++ */
++	//~ pixbuf_renderer_get_scaled_size((PixbufRenderer *)imd->pr, , );
++
++	//~ if (width && height)
++		//~ {
++		//~ rectangles = gdk_pixbuf_new(GDK_COLORSPACE_RGB, TRUE, 8, width, height);
++		//~ if (rectangles)
++			//~ {
++			//~ pixbuf_set_rect_fill(rectangles, 0, 0, width, height, 255, 255, 255, 0);
++			//~ pixbuf_set_rect(rectangles, 0, 0 + (height / 3), width, height / 3,
++//~ 0, 0, 0, 255,
++//~ 1, 1, 1, 1);
++			//~ pixbuf_set_rect(rectangles, 0, 0 + (height / 3 + 1), width, height / 3 - 2,
++//~ 255, 255, 255, 255,
++//~ 1, 1, 1, 1);
++
++			//~ pixbuf_set_rect(rectangles, 0 + width / 3, 0 , width / 3, height,
++//~ 0, 0, 0, 255,
++//~ 1, 1, 1, 1);
++			//~ pixbuf_set_rect(rectangles, 0 + width / 3 + 1, 0, width / 3 - 2, height,
++//~ 255, 255, 255, 255,
++//~ 1, 1, 1, 1);
++			//~ return rectangles;
++			//~ }
++		//~ }
+ 
+ 	return NULL;
+ }
+diff --git a/src/renderer-tiles.c b/src/renderer-tiles.c
+index 9b4f049..cc0483a 100644
+--- a/src/renderer-tiles.c
 b/src/renderer-tiles.c
+@@ -1,6 +1,6 @@
+ /*
+  * Copyright (C) 2006 John Ellis
+- * 

Bug#984635: marked as done (unblock: tqdm/4.57.0-2)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 9 Mar 2021 21:19:15 +0100
with message-id <3d72f61b-7fe6-edc1-7c05-602f040c1...@debian.org>
and subject line Re: unblock: tqdm/4.57.0-2
has caused the Debian Bug report #984635,
regarding unblock: tqdm/4.57.0-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984635: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984635
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package tqdm

[ Reason ]
the last upload of tqdm fixes a RC bug

the effects of that bug are only visible in reverse dependencies, and they were
caused by disabling setuptools_scm during build (as that interferes with our
build process).  That result in a package that would ship a egginfo with version
equals to 0.0.0.

Packages requiring a specific version would fail because that versoin would be
higher that 0.0.0.

the fix was using one of the common practices (documented via a link) of
retrieving the module version from a source file in setup.py, and update the
existing patch for disabling setuptools_scm to include this change.

[ Impact ]
(What is the impact for the user if the unblock isn't granted?)

[ Tests ]
i waited to open this request until all rdeps autopkgtests have completed

[ Risks ]
trivial fix

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing


unblock tqdm/4.57.0-2

-- System Information:
Debian Release: 10.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.6.0-1-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff --git a/debian/changelog b/debian/changelog
index ea9325b..0904f85 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+tqdm (4.57.0-2) unstable; urgency=medium
+
+  * debian/patches/dont-use-setuptools-scm.patch
+- since we disabled setuptools_scm, we need to explicly retrieve and set
+  tqdm version, so that egginfo has the right version too; Closes: #983007
+
+ -- Sandro Tosi   Fri, 05 Mar 2021 03:57:27 -0500
+
 tqdm (4.57.0-1) unstable; urgency=medium
 
   * New upstream release
diff --git a/debian/patches/dont-use-setuptools-scm.patch 
b/debian/patches/dont-use-setuptools-scm.patch
index 88aad5f..d34c346 100644
--- a/debian/patches/dont-use-setuptools-scm.patch
+++ b/debian/patches/dont-use-setuptools-scm.patch
@@ -1,11 +1,24 @@
 --- a/setup.py
 +++ b/setup.py
-@@ -13,4 +13,4 @@ if sys.argv[1].lower().strip() == 'make'
+@@ -5,6 +5,12 @@ from os import path
+ 
+ from setuptools import setup
+ 
++
++# https://packaging.python.org/guides/single-sourcing-package-version/
++version = {}
++with open('tqdm/_dist_ver.py') as fp:
++exec(fp.read(), version)
++
+ src_dir = path.abspath(path.dirname(__file__))
+ if sys.argv[1].lower().strip() == 'make':  # exec Makefile commands
+ import pymake
+@@ -13,4 +19,4 @@ if sys.argv[1].lower().strip() == 'make'
  # Stop to avoid setup.py raising non-standard command error
  sys.exit(0)
  
 -setup(use_scm_version=True)
-+setup()
++setup(version=version['__version__'])
 --- a/setup.cfg
 +++ b/setup.cfg
 @@ -74,7 +74,7 @@ classifiers =
--- End Message ---
--- Begin Message ---
Hi,

On Fri, 05 Mar 2021 23:42:46 -0500 Sandro Tosi  wrote:
> Please unblock package tqdm

unblocked.

Paul



OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---


NEW changes in stable-new

2021-03-09 Thread Debian FTP Masters
Processing changes file: fwupdate_12-4+deb10u3_source.changes
  ACCEPT



Bug#984892: unblock: libbio-db-ncbihelper-perl/1.7.6-4

2021-03-09 Thread Étienne Mollier
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libbio-db-ncbihelper-perl

[ Reason ]
Current version of libbio-db-ncbihelper-perl in Testing, in
version 1.7.6-2, is affected by release critical bugs #983239
and #984475.  Due to the autopkgtest now marked "superficial",
I don't expect it will reach Testing on it's own past the hard
freeze date this Friday.

[ Impact ]
Removal of libbio-db-ncbihelper-perl from Testing would trigger
the removal of bioperl, and the entire ecosystem of Med packages
which are based on bioperl.  That represents more than 40 source
packages, some with relatively high popcon by Debian Med
standards.

[ Tests ]
I manually ran the test needing Internet on version 1.7.6-4 in
Sid and Testing, architectures amd64 and arm64 (schroot + qemu),
and modulo the minor failing test which is triggered by events
outside of our control and documented in #983239, they ran fine.
I also ran the build and autopkgtest suite in normal conditions
(superficial) without any issues on Sid and Testing, amd64 and
arm64, just in case.

[ Risks ]
Changes affect diverse test suites to not depend on the network
anymore, so should be more stable, yet superficial.  Also, I
don't see how the Breaks+Replace statement added to the control
file could break the package (but I might be surprised of
course).  Overall I think the risk of upgrading the package in
Testing is rather low.

[ Checklist ]
  [*] all changes are documented in the d/changelog
  [*] I reviewed all changes and I approve them
  [*] attach debdiff against the package in testing

[ Other info ]
The similar libbio-db-embl-perl, which had the same transitive
removal implications, made it's way to Testing fortunately.  But
I'm not too sure of the timing yet for libbio-db-biofetch-perl,
nor it's impact on the bioperl ecosystem.  I might open one
other unblock request for libbio-db-biofetch-perl this week end
if it turns out to be necessary.

unblock libbio-db-ncbihelper-perl/1.7.6-4


Have a nice day,  :)
-- 
Étienne Mollier 
Fingerprint:  8f91 b227 c7d6 f2b1 948c  8236 793c f67e 8f0d 11da
Sent from /dev/pts/1, please excuse my verbosity.
diff -Nru libbio-db-ncbihelper-perl-1.7.6/debian/changelog 
libbio-db-ncbihelper-perl-1.7.6/debian/changelog
--- libbio-db-ncbihelper-perl-1.7.6/debian/changelog2020-01-05 
07:56:13.0 +0100
+++ libbio-db-ncbihelper-perl-1.7.6/debian/changelog2021-03-04 
09:01:01.0 +0100
@@ -1,3 +1,24 @@
+libbio-db-ncbihelper-perl (1.7.6-4) unstable; urgency=medium
+
+  * Team upload.
+  * Breaks+Replaces: bioperl (<< 1.7.3)
+Closes: #984475
+
+ -- Andreas Tille   Thu, 04 Mar 2021 09:01:01 +0100
+
+libbio-db-ncbihelper-perl (1.7.6-3) unstable; urgency=medium
+
+  * Team upload.
+  * Prevent build time tests and autodep8-perl test to fetch resources on the
+Internet.
+Closes: #983238
+  * Ensured autopkgtest remained offline, and marked the smoke test as
+superficial, since all tests within are skipped without Internet access.
+  * Side-tracked maintainer notifications from debian-...@lists.debian.org to
+debian-med-packag...@lists.alioth.debian.org like the other packages.
+
+ -- Étienne Mollier   Mon, 22 Feb 2021 22:45:11 
+0100
+
 libbio-db-ncbihelper-perl (1.7.6-2) unstable; urgency=medium
 
   * Be more strict about the libbio-asn1-entrezgene-perl dependency
diff -Nru libbio-db-ncbihelper-perl-1.7.6/debian/control 
libbio-db-ncbihelper-perl-1.7.6/debian/control
--- libbio-db-ncbihelper-perl-1.7.6/debian/control  2020-01-05 
07:55:51.0 +0100
+++ libbio-db-ncbihelper-perl-1.7.6/debian/control  2021-03-04 
09:01:01.0 +0100
@@ -1,8 +1,7 @@
 Source: libbio-db-ncbihelper-perl
-Maintainer: Debian Med team 
-Uploaders: Michael R. Crusoe 
+Maintainer: Debian Med Packaging Team 

+Uploaders: Michael R. Crusoe 
 Section: perl
-Testsuite: autopkgtest-pkg-perl
 Priority: optional
 Build-Depends: debhelper-compat (= 12)
 Build-Depends-Indep: libbio-perl-perl,
@@ -34,6 +33,8 @@
  liburi-perl,
  libwww-perl,
  libxml-twig-perl
+Breaks: bioperl (<< 1.7.3)
+Replaces: bioperl (<< 1.7.3)
 Description: collection of routines useful for queries to NCBI databases
  Provides a single place to setup some common methods for querying NCBI web
  databases. Bio::DB::NCBIHelper just centralizes the methods for constructing
diff -Nru libbio-db-ncbihelper-perl-1.7.6/debian/rules 
libbio-db-ncbihelper-perl-1.7.6/debian/rules
--- libbio-db-ncbihelper-perl-1.7.6/debian/rules2020-01-04 
12:44:53.0 +0100
+++ libbio-db-ncbihelper-perl-1.7.6/debian/rules2021-03-04 
09:01:01.0 +0100
@@ -1,10 +1,7 @@
 #!/usr/bin/make -f
 
-ifneq (,$(DEB_MAINTAINER_MODE))
-NETWORK = --network
-else()
-export NO_NETWORK_TESTING
-endif
+# prevent the test suite to fetch resources on the Internet at build time.
+export NO_NETWORK_TESTING=1
 
 %:
dh $@
diff -Nru 

Re: Update luajit to git master version

2021-03-09 Thread Ivo De Decker

Hi,

On 3/8/21 11:05 AM, YunQiang Su wrote:

John Paul Adrian Glaubitz  于2021年3月8日周一 下午5:57写道:


Hello YunQiang!

On 3/8/21 10:50 AM, YunQiang Su wrote:

I upload the cur exp version to unstable with 2 days delay.


That's probably not such a good idea at this point of the release.

You should better check back with the release team as we're in the middle
of a freeze.


OK, dcuted. and CC release team.


You Cc-ed the release list without a specific question, so that's not 
very clear. If you want to ask for an unblock, please file an unblock 
request as described in

https://release.debian.org/bullseye/FAQ.html

However, if you are asking if it's a good idea to do an upload of luajit 
to unstable based on the current version in experimental, the answer is no.


Also, please note that your upload is still in the deferred queue, so if 
you tried to remove it, that must have failed somehow.


Cheers,

Ivo



Bug#984697: marked as done (unblock: setuptools/52.0.0-3)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 9 Mar 2021 20:01:10 +0100
with message-id <93670f8a-1407-2a18-347e-ec506cc56...@debian.org>
and subject line Re: Bug#984697: unblock: setuptools/52.0.0-3
has caused the Debian Bug report #984697,
regarding unblock: setuptools/52.0.0-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984697: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984697
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
X-Debbugs-CC: Stefano Rivera 

please unblock: setuptools/52.0.0-3, fixing the same issue #982921 as fixed in
python-packaging in
https://tracker.debian.org/news/1232090/accepted-python-packaging-209-2-source-into-unstable/
and already migrated to testing.

Discussed with Stefano Rivero, that we don't want to unvendor packaging at this
point.
--- End Message ---
--- Begin Message ---
Hi,

On 07-03-2021 12:45, Matthias Klose wrote:
> please unblock: setuptools/52.0.0-3, fixing the same issue #982921 as fixed in

unblocked.

Next time, can you please make sure the meta data is correct?
user/usertags. There's a high risk it slips otherwise.

Paul



OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---


Bug#984861: marked as done (unblock: gnome-remote-desktop/0.1.9-5)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 9 Mar 2021 19:54:37 +0100
with message-id <83a46acd-3669-fdf7-7bd5-a87fab9a6...@debian.org>
and subject line Re: Bug#984861: unblock: gnome-remote-desktop/0.1.9-5
has caused the Debian Bug report #984861,
regarding unblock: gnome-remote-desktop/0.1.9-5
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984861
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: David Mohammed 

Please unblock package gnome-remote-desktop.

[ Reason ]
Change gnome-shell dependency to gnome-shell|budgie-desktop,
plus appropriate version constraints. What gnome-remote-desktop actually
needs is any compositor based on a version of mutter that was compiled with
pipewire 0.3, and those two are the mutter-based compositors in Debian.

[ Impact ]
Previously, budgie-desktop users could not use gnome-remote-desktop
to provide screen-sharing in Budgie unless they also unnecessarily
installed gnome-shell.

[ Tests ]
Manually smoke-tested: I installed the proposed package on a bullseye GNOME
system, enabled screen sharing in gnome-control-center and connected to
it with remmima.

Budgie maintainer David Mohammed has confirmed that the alternative
dependency has the desired effect.

[ Risks ]
Low-risk dependency change.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock gnome-remote-desktop/0.1.9-5
diffstat for gnome-remote-desktop-0.1.9 gnome-remote-desktop-0.1.9

 changelog  |   10 ++
 control|2 +-
 control.in |2 +-
 3 files changed, 12 insertions(+), 2 deletions(-)

diff -Nru gnome-remote-desktop-0.1.9/debian/changelog gnome-remote-desktop-0.1.9/debian/changelog
--- gnome-remote-desktop-0.1.9/debian/changelog	2021-02-11 16:14:14.0 +
+++ gnome-remote-desktop-0.1.9/debian/changelog	2021-03-09 10:31:04.0 +
@@ -1,3 +1,13 @@
+gnome-remote-desktop (0.1.9-5) unstable; urgency=medium
+
+  * Team upload
+
+  [ David Mohammed ]
+  * debian/control: add budgie-desktop as an alternate for gnome-shell
+(Closes: #982937)
+
+ -- Simon McVittie   Tue, 09 Mar 2021 10:31:04 +
+
 gnome-remote-desktop (0.1.9-4) unstable; urgency=medium
 
   * debian/patches: Fix use-after-free crash on repeated VNC connections
diff -Nru gnome-remote-desktop-0.1.9/debian/control gnome-remote-desktop-0.1.9/debian/control
--- gnome-remote-desktop-0.1.9/debian/control	2021-02-11 16:14:14.0 +
+++ gnome-remote-desktop-0.1.9/debian/control	2021-03-09 10:31:04.0 +
@@ -28,7 +28,7 @@
 Architecture: linux-any
 Depends: ${misc:Depends},
  ${shlibs:Depends},
- gnome-shell (>= 3.37.92-2~),
+ gnome-shell (>= 3.37.92-2~) | budgie-desktop (>= 10.5.2),
  libmutter-7-0 (>= 3.37.92-1~),
  pipewire (>= 0.3.0)
 Description: Remote desktop daemon for GNOME using PipeWire
diff -Nru gnome-remote-desktop-0.1.9/debian/control.in gnome-remote-desktop-0.1.9/debian/control.in
--- gnome-remote-desktop-0.1.9/debian/control.in	2021-02-11 16:14:14.0 +
+++ gnome-remote-desktop-0.1.9/debian/control.in	2021-03-09 10:31:04.0 +
@@ -24,7 +24,7 @@
 Architecture: linux-any
 Depends: ${misc:Depends},
  ${shlibs:Depends},
- gnome-shell (>= 3.37.92-2~),
+ gnome-shell (>= 3.37.92-2~) | budgie-desktop (>= 10.5.2),
  libmutter-7-0 (>= 3.37.92-1~),
  pipewire (>= 0.3.0)
 Description: Remote desktop daemon for GNOME using PipeWire
--- End Message ---
--- Begin Message ---
Hi Simon,

On 09-03-2021 11:58, Simon McVittie wrote:
> Please unblock package gnome-remote-desktop.

unblocked.

Paul



OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---


Bug#984885: marked as done (unblock: vlc/3.0.12-3)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 09 Mar 2021 18:52:46 +
with message-id 
and subject line unblock vlc
has caused the Debian Bug report #984885,
regarding unblock: vlc/3.0.12-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984885
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: sramac...@debian.org

Please unblock package vlc/3.0.12-3.

[ Reason ]
vlc 3.0.x suffers from a long standing issue that causes vlc to freeze
on exit when running with a mesa GPU driver. A proper fix would also
require changes to mesa (cf
https://gitlab.freedesktop.org/mesa/mesa/-/issues/116 for the mesa bug),
but attempts to fix mesa caused other regressions, so this fix was
reverted. vlc upstream now added a workaround to no longer trigger the
condition that leads to the freeze.

[ Impact ]
Users with affected drivers can reenable hardware accelerated video
decoding.

[ Tests ]
No automated test coverage, but manually tested.

[ Risks ]
Even if the fix was incomplete, users can continue to disable hardware
acceleration or kill the stuck vlc process.

vlc is a key package, so requires an unblock.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock vlc/3.0.12-3
-- 
Sebastian Ramacher
diff --git a/debian/changelog b/debian/changelog
index b96fc96a8..1b3237d27 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+vlc (3.0.12-3) unstable; urgency=medium
+
+  * debian/patches: Apply upstream patches to prevent process freeze on exit
+(Closes: #916595) (LP: #1819543)
+
+ -- Sebastian Ramacher   Tue, 09 Mar 2021 17:42:00 +0100
+
 vlc (3.0.12-2) unstable; urgency=medium
 
   * debian/: Disable live555 plugin due to #981439
diff --git 
a/debian/patches/0004-qt-add-a-private-structure-for-window-provider.patch 
b/debian/patches/0004-qt-add-a-private-structure-for-window-provider.patch
new file mode 100644
index 0..7788dd33b
--- /dev/null
+++ b/debian/patches/0004-qt-add-a-private-structure-for-window-provider.patch
@@ -0,0 +1,88 @@
+From: =?utf-8?q?R=C3=A9mi_Denis-Courmont?= 
+Date: Sat, 6 Feb 2021 15:00:02 +0200
+Subject: qt: add a private structure for window provider
+
+---
+ modules/gui/qt/qt.cpp | 33 ++---
+ 1 file changed, 22 insertions(+), 11 deletions(-)
+
+diff --git a/modules/gui/qt/qt.cpp b/modules/gui/qt/qt.cpp
+index ab912fd..d5a22d9 100644
+--- a/modules/gui/qt/qt.cpp
 b/modules/gui/qt/qt.cpp
+@@ -708,6 +708,10 @@ static void ShowDialog( intf_thread_t *p_intf, int 
i_dialog_event, int i_arg,
+  */
+ static int WindowControl( vout_window_t *, int i_query, va_list );
+ 
++typedef struct {
++MainInterface *mi;
++} vout_window_qt_t;
++
+ static int WindowOpen( vout_window_t *p_wnd, const vout_window_cfg_t *cfg )
+ {
+ if( cfg->is_standalone )
+@@ -737,21 +741,26 @@ static int WindowOpen( vout_window_t *p_wnd, const 
vout_window_cfg_t *cfg )
+ if (unlikely(!active))
+ return VLC_EGENERIC;
+ 
+-MainInterface *p_mi = p_intf->p_sys->p_mi;
++vout_window_qt_t *sys = new vout_window_qt_t;
++
++sys->mi = p_intf->p_sys->p_mi;
+ msg_Dbg( p_wnd, "requesting video window..." );
+ 
+-if( !p_mi->getVideo( p_wnd, cfg->width, cfg->height, cfg->is_fullscreen ) 
)
++if (!sys->mi->getVideo(p_wnd, cfg->width, cfg->height, 
cfg->is_fullscreen))
++{
++delete sys;
+ return VLC_EGENERIC;
++}
+ 
+ p_wnd->info.has_double_click = true;
+ p_wnd->control = WindowControl;
+-p_wnd->sys = (vout_window_sys_t*)p_mi;
++p_wnd->sys = (vout_window_sys_t *)sys;
+ return VLC_SUCCESS;
+ }
+ 
+ static int WindowControl( vout_window_t *p_wnd, int i_query, va_list args )
+ {
+-MainInterface *p_mi = (MainInterface *)p_wnd->sys;
++vout_window_qt_t *sys = (vout_window_qt_t *)p_wnd->sys;
+ QMutexLocker locker ();
+ 
+ if (unlikely(!active))
+@@ -759,12 +768,12 @@ static int WindowControl( vout_window_t *p_wnd, int 
i_query, va_list args )
+ msg_Warn (p_wnd, "video already released before control");
+ return VLC_EGENERIC;
+ }
+-return p_mi->controlVideo( i_query, args );
++return sys->mi->controlVideo(i_query, args);
+ }
+ 
+ static void WindowClose( vout_window_t *p_wnd )
+ {
+-MainInterface *p_mi = (MainInterface *)p_wnd->sys;
++vout_window_qt_t *sys = 

Bug#983071: marked as done (unblock: xz-utils/5.2.5-1.1)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 9 Mar 2021 19:40:49 +0100
with message-id <97b3dd45-509d-b22d-4ed1-f68c953b3...@debian.org>
and subject line Re: Bug#983071: unblock: xz-utils/5.2.5-1.1
has caused the Debian Bug report #983071,
regarding unblock: xz-utils/5.2.5-1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
983071: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983071
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package xz-utils.

I NMUed xz-utils to 5.2.5-1.0 fixing a few bugs including #844770 and
#975981. Both bugs were fixed by upstream differently / more complete.
I prepared an NMU 5.2.5-1.1, #983067 by replacing my patches with
upstream patches:
- #844770 "xzcmp: SIGPIPE is raised because CMP does exit while the XZ
  commands are still writing to the pipe"
  
https://git.tukaani.org/?p=xz.git;a=commitdiff;h=194029ffaf74282a81f0c299c07f73caca3232ca

- #975981 "xz-utils: "unxz -k" should not refuse to decompress a file
  because it has more than one hard link"
  
https://git.tukaani.org/?p=xz.git;a=commitdiff;h=074259f4f3966aeac6edb205fecbc1a8d2b58bb2

I would like to avoid having different changes to the package (and
possibly creating new bugs) and therefore keep what upstream applied
here. The patches were reviewed at least by the maintainer of the
upstream package.
During that review a similar SIGPIPE problem was found and fixed in
xzgrep:
   Scripts: Fix exit status of xzgrep.
   
https://git.tukaani.org/?p=xz.git;a=commitdiff;h=73c555b3077c19dda29b6f4592ced2af876f8333

This bug was never reported and fixed within the Debian package. If it
is okay with the release then I would backport the patch and NMU it as
part of the 5.2.5-1.1 upload.
Otherwise I would stick with the replacement of the two patches as can
been seen in the attached debdiff.
The package was not yet uploaded, I plan to upload it to delayed/5 once
the release team agrees.

unblock xz-utils/5.2.5-1.1

Sebastian
diff -Nru xz-utils-5.2.5/debian/changelog xz-utils-5.2.5/debian/changelog
--- xz-utils-5.2.5/debian/changelog 2020-12-28 11:25:06.0 +0100
+++ xz-utils-5.2.5/debian/changelog 2021-02-18 23:12:30.0 +0100
@@ -1,3 +1,10 @@
+xz-utils (5.2.5-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Update the patches for #844770 and #975981 to what upstream applied.
+
+ -- Sebastian Andrzej Siewior   Thu, 18 Feb 2021 
23:12:30 +0100
+
 xz-utils (5.2.5-1.0) unstable; urgency=medium
 
   * Non-maintainer upload.
diff -Nru 
xz-utils-5.2.5/debian/patches/0001-Scripts-Fix-exit-status-of-xzdiff-xzcmp.patch
 
xz-utils-5.2.5/debian/patches/0001-Scripts-Fix-exit-status-of-xzdiff-xzcmp.patch
--- 
xz-utils-5.2.5/debian/patches/0001-Scripts-Fix-exit-status-of-xzdiff-xzcmp.patch
1970-01-01 01:00:00.0 +0100
+++ 
xz-utils-5.2.5/debian/patches/0001-Scripts-Fix-exit-status-of-xzdiff-xzcmp.patch
2021-02-17 23:52:05.0 +0100
@@ -0,0 +1,118 @@
+From: Lasse Collin 
+Date: Mon, 11 Jan 2021 22:01:51 +0200
+Subject: Scripts: Fix exit status of xzdiff/xzcmp.
+MIME-Version: 1.0
+Content-Type: text/plain; charset="utf-8"
+Content-Transfer-Encoding: 8bit
+
+This is a minor fix since this affects only the situation when
+the files differ and the exit status is something else than 0.
+In such case there could be SIGPIPE from a decompression tool
+and that would result in exit status of 2 from xzdiff/xzcmp
+while the correct behavior would be to return 1 or whatever
+else diff or cmp may have returned.
+
+This commit omits the -q option from xz/gzip/bzip2/lzop arguments.
+I'm not sure why the -q was used in the first place, perhaps it
+hides warnings in some situation that I cannot see at the moment.
+Hopefully the removal won't introduce a new bug.
+
+With gzip the -q option was harmful because it made gzip return 2
+instead of >= 128 with SIGPIPE. Ignoring exit status 2 (warning
+from gzip) isn't practical because bzip2 uses exit status 2 to
+indicate corrupt input file. It's better if SIGPIPE results in
+exit status >= 128.
+
+With bzip2 the removal of -q seems to be good because with -q
+it prints nothing if input is corrupt. The other tools aren't
+silent in this situation even with -q. On the other hand, if
+zstd support is added, it will need -q since otherwise it's
+noisy in normal situations.
+
+Thanks to Étienne Mollier and Sebastian Andrzej Siewior.
+---
+ src/scripts/xzdiff.in | 35 +--
+ 1 file changed, 21 insertions(+), 

Bug#984886: buster-pu: package xcftools/1.0.7-6

2021-03-09 Thread Markus Koschany
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: a...@debian.org

Dear release team,

[ Reason ]

I would like to fix CVE-2019-5086 and CVE-2019-5087. The same fix has
been applied in unstable and stretch already. The security team marked
these issues as no-dsa.

[ Impact ]

xcftools would still be vulnerable if not approved.

[ Tests ]
Tested with a manipulated xcf file.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

Regards,

Markus
diff -Nru xcftools-1.0.7/debian/changelog xcftools-1.0.7/debian/changelog
--- xcftools-1.0.7/debian/changelog 2016-05-18 12:34:05.0 +0200
+++ xcftools-1.0.7/debian/changelog 2021-02-09 23:17:14.0 +0100
@@ -1,3 +1,16 @@
+xcftools (1.0.7-6+deb10u1) buster; urgency=medium
+
+  * Non-maintainer upload by the LTS team.
+  * Fix CVE-2019-5086 and CVE-2019-5087:
+An exploitable integer overflow vulnerability exists in the
+flattenIncrementally function in the xcf2png and xcf2pnm binaries of
+xcftools. An integer overflow can occur while walking through tiles that
+could be exploited to corrupt memory and execute arbitrary code. In order
+to trigger this vulnerability, a victim would need to open a specially
+crafted XCF file.
+
+ -- Markus Koschany   Tue, 09 Feb 2021 23:17:14 +0100
+
 xcftools (1.0.7-6) unstable; urgency=medium
 
   * Team upload (collab-maint)
diff -Nru xcftools-1.0.7/debian/patches/CVE-2019-5086-and-CVE-2019-5087.patch 
xcftools-1.0.7/debian/patches/CVE-2019-5086-and-CVE-2019-5087.patch
--- xcftools-1.0.7/debian/patches/CVE-2019-5086-and-CVE-2019-5087.patch 
1970-01-01 01:00:00.0 +0100
+++ xcftools-1.0.7/debian/patches/CVE-2019-5086-and-CVE-2019-5087.patch 
2021-02-09 23:17:14.0 +0100
@@ -0,0 +1,53 @@
+From: Markus Koschany 
+Date: Mon, 8 Feb 2021 17:57:56 +0100
+Subject: CVE-2019-5086 and CVE-2019-5087
+
+Patch by Anton Gladky and Markus Koschany.
+
+Bug-Debian: https://bugs.debian.org/945317
+Origin: https://github.com/j-jorge/xcftools/pull/15
+---
+ xcf-general.c | 23 +++
+ 1 file changed, 23 insertions(+)
+
+diff --git a/xcf-general.c b/xcf-general.c
+index 9d0b4dc..7cb1613 100644
+--- a/xcf-general.c
 b/xcf-general.c
+@@ -19,6 +19,8 @@
+ #include "xcftools.h"
+ #include 
+ #include 
++#include 
++#include 
+ #ifdef HAVE_ICONV
+ # include 
+ #elif !defined(ICONV_CONST)
+@@ -182,6 +184,27 @@ xcfString(uint32_t ptr,uint32_t *after)
+ void
+ computeDimensions(struct tileDimensions *d)
+ {
++  // [ CVE-2019-5086 and CVE-2019-5087 ]
++  // This part of the code is the check to prevent integer overflow, see 
CVE-2019-5086 and CVE-2019-5087
++
++  if (d->c.l < INT_MIN/4) {
++fprintf(stderr,("d->c.l is too small (%d)! Stopping execution...\n"), 
(d->c.l));
++exit(0);
++  }
++  if (d->c.t < INT_MIN/4) {
++fprintf(stderr,("d->c.t is too small (%d)! Stopping execution...\n"), 
(d->c.t));
++exit(0);
++  }
++  if (d->width > (INT_MAX - d->c.l)/4) {
++fprintf(stderr,("Width is too large (%d)! Stopping execution...\n"), 
(d->c.l + d->width));
++exit(0);
++  }
++  if (d->height > (INT_MAX - d->c.t)/4) {
++fprintf(stderr,("Height is too large (%d)! Stopping execution...\n"), 
(d->c.t + d->height));
++exit(0);
++  }
++  // [ CVE-2019-5086 and CVE-2019-5087 ]
++
+   d->c.r = d->c.l + d->width ;
+   d->c.b = d->c.t + d->height ;
+   d->tilesx = (d->width+TILE_WIDTH-1)/TILE_WIDTH ;
diff -Nru xcftools-1.0.7/debian/patches/series 
xcftools-1.0.7/debian/patches/series
--- xcftools-1.0.7/debian/patches/series2016-05-18 12:27:32.0 
+0200
+++ xcftools-1.0.7/debian/patches/series2021-02-09 23:17:14.0 
+0100
@@ -4,3 +4,4 @@
 fix-as-needed-linking
 libpng16.patch
 fix-test-UTF8.patch
+CVE-2019-5086-and-CVE-2019-5087.patch


Bug#984648: unblock: packages with unversioned python dependencies

2021-03-09 Thread Matthias Klose
linkchecker is fixed in 10.0.1-2



Bug#984885: unblock: vlc/3.0.12-3

2021-03-09 Thread Sebastian Ramacher
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: sramac...@debian.org

Please unblock package vlc/3.0.12-3.

[ Reason ]
vlc 3.0.x suffers from a long standing issue that causes vlc to freeze
on exit when running with a mesa GPU driver. A proper fix would also
require changes to mesa (cf
https://gitlab.freedesktop.org/mesa/mesa/-/issues/116 for the mesa bug),
but attempts to fix mesa caused other regressions, so this fix was
reverted. vlc upstream now added a workaround to no longer trigger the
condition that leads to the freeze.

[ Impact ]
Users with affected drivers can reenable hardware accelerated video
decoding.

[ Tests ]
No automated test coverage, but manually tested.

[ Risks ]
Even if the fix was incomplete, users can continue to disable hardware
acceleration or kill the stuck vlc process.

vlc is a key package, so requires an unblock.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock vlc/3.0.12-3
-- 
Sebastian Ramacher
diff --git a/debian/changelog b/debian/changelog
index b96fc96a8..1b3237d27 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+vlc (3.0.12-3) unstable; urgency=medium
+
+  * debian/patches: Apply upstream patches to prevent process freeze on exit
+(Closes: #916595) (LP: #1819543)
+
+ -- Sebastian Ramacher   Tue, 09 Mar 2021 17:42:00 +0100
+
 vlc (3.0.12-2) unstable; urgency=medium
 
   * debian/: Disable live555 plugin due to #981439
diff --git 
a/debian/patches/0004-qt-add-a-private-structure-for-window-provider.patch 
b/debian/patches/0004-qt-add-a-private-structure-for-window-provider.patch
new file mode 100644
index 0..7788dd33b
--- /dev/null
+++ b/debian/patches/0004-qt-add-a-private-structure-for-window-provider.patch
@@ -0,0 +1,88 @@
+From: =?utf-8?q?R=C3=A9mi_Denis-Courmont?= 
+Date: Sat, 6 Feb 2021 15:00:02 +0200
+Subject: qt: add a private structure for window provider
+
+---
+ modules/gui/qt/qt.cpp | 33 ++---
+ 1 file changed, 22 insertions(+), 11 deletions(-)
+
+diff --git a/modules/gui/qt/qt.cpp b/modules/gui/qt/qt.cpp
+index ab912fd..d5a22d9 100644
+--- a/modules/gui/qt/qt.cpp
 b/modules/gui/qt/qt.cpp
+@@ -708,6 +708,10 @@ static void ShowDialog( intf_thread_t *p_intf, int 
i_dialog_event, int i_arg,
+  */
+ static int WindowControl( vout_window_t *, int i_query, va_list );
+ 
++typedef struct {
++MainInterface *mi;
++} vout_window_qt_t;
++
+ static int WindowOpen( vout_window_t *p_wnd, const vout_window_cfg_t *cfg )
+ {
+ if( cfg->is_standalone )
+@@ -737,21 +741,26 @@ static int WindowOpen( vout_window_t *p_wnd, const 
vout_window_cfg_t *cfg )
+ if (unlikely(!active))
+ return VLC_EGENERIC;
+ 
+-MainInterface *p_mi = p_intf->p_sys->p_mi;
++vout_window_qt_t *sys = new vout_window_qt_t;
++
++sys->mi = p_intf->p_sys->p_mi;
+ msg_Dbg( p_wnd, "requesting video window..." );
+ 
+-if( !p_mi->getVideo( p_wnd, cfg->width, cfg->height, cfg->is_fullscreen ) 
)
++if (!sys->mi->getVideo(p_wnd, cfg->width, cfg->height, 
cfg->is_fullscreen))
++{
++delete sys;
+ return VLC_EGENERIC;
++}
+ 
+ p_wnd->info.has_double_click = true;
+ p_wnd->control = WindowControl;
+-p_wnd->sys = (vout_window_sys_t*)p_mi;
++p_wnd->sys = (vout_window_sys_t *)sys;
+ return VLC_SUCCESS;
+ }
+ 
+ static int WindowControl( vout_window_t *p_wnd, int i_query, va_list args )
+ {
+-MainInterface *p_mi = (MainInterface *)p_wnd->sys;
++vout_window_qt_t *sys = (vout_window_qt_t *)p_wnd->sys;
+ QMutexLocker locker ();
+ 
+ if (unlikely(!active))
+@@ -759,12 +768,12 @@ static int WindowControl( vout_window_t *p_wnd, int 
i_query, va_list args )
+ msg_Warn (p_wnd, "video already released before control");
+ return VLC_EGENERIC;
+ }
+-return p_mi->controlVideo( i_query, args );
++return sys->mi->controlVideo(i_query, args);
+ }
+ 
+ static void WindowClose( vout_window_t *p_wnd )
+ {
+-MainInterface *p_mi = (MainInterface *)p_wnd->sys;
++vout_window_qt_t *sys = (vout_window_qt_t *)p_wnd->sys;
+ QMutexLocker locker ();
+ 
+ /* Normally, the interface terminates after the video. In the contrary, 
the
+@@ -776,11 +785,13 @@ static void WindowClose( vout_window_t *p_wnd )
+  * That assumes the video output will behave sanely if it window is
+  * destroyed asynchronously.
+  * XCB and Xlib-XCB are fine with that. Plain Xlib wouldn't, */
+-if (unlikely(!active))
++if (likely(active))
+ {
+-msg_Warn (p_wnd, "video already released");
+-return;
++msg_Dbg(p_wnd, "releasing video...");
++sys->mi->releaseVideo();
+ }
+-msg_Dbg (p_wnd, "releasing video...");
+-p_mi->releaseVideo();
++else
++msg_Warn (p_wnd, "video already released");
++
++

Bug#983407: marked as done (Pam: Multiple issues Affecting Upgrades)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 09 Mar 2021 12:36:03 -0500
with message-id 
and subject line PAm Upgrades Migrated to Testing
has caused the Debian Bug report #983407,
regarding Pam: Multiple issues Affecting Upgrades
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
983407: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983407
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
X-Debbugs-Cc: vor...@debian.org

Hi.  I'm writing with my pam uploader hat on to give you a heads up about two 
issues  that are kind of nasty and affect upgrades.  This is just a FYI, opened 
as a bug because you've expressed a preference for that communication style.
Feel free to close now; if this is still open when I have an unblock ready, 
I'll close and file the unblock.

I hope to have something in experimental or unstable by end of this
week.  Depending on my confidence in the fixes, I may be ready for an
unblock at that point, or I may want to ask for additional review
before I'm ready to recommend inclusion in testing.


* 982530: removal of pam_tally

Up through buster, there were pam_tally and pam_tally2 modules available to 
provide lockout.
These modules were not in the default configuration, but apparently various 
hardening guides turned them on.

They were deprecated upstream, and we've chosen to remove them from bullseye.
Unfortunately, if your pam config  includes these modules, then probably you 
can't login until you boot with rescue media and fix the pam config.
Moreover, while you probably get reasonable errors in the journal, you probably 
can't see that because you can't log in.

Plan is to detect the situation and scream in the preinst.
Down side is that means new strings that need translation (debconf templates)

* 982295: pam won't deal with upgrades without an init script

Pam restarts various services on upgrade (including buster to bullseye).  The 
consequence of not restarting can be segfaults or failed pam authentications 
going forward.  (libpam-modules gets out of sync with libpam0g and ether fails 
to dlopen or segfaults depending).
The logic in libpam0g.postinst is init-script specific.

Our current policy allows init scripts to be removed, and apparently
various users and downstreams are removing init scripts even when the
package still contains them.
I'm testing a patch to  use systemd facilities for doing restarts if booted 
with systemd as init.





-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing'), (500, 'stable'), (200, 
'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-3-amd64 (SMP w/4 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Fixes to the two upgrade issues we discussed migrated to bullseye.
However, there are some bugs discovered in code review I requested of
the fixes as well as a whole slew of translation updates.  I will be
submitting an unblock in the next few days, but this tracking bug has
been dealt with.--- End Message ---


Bug#984882: unblock: debian-science/1.14.1

2021-03-09 Thread Andreas Tille
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-science-maintain...@lists.alioth.debian.org

Please unblock package debian-science

(Please provide enough (but not too much) information to help
the release team to judge the request efficiently. E.g. by
filling in the sections below.)

[ Reason ]
The debian-science metapackages should have been uploaded right before
the freeze.  Due to an unfortunate sequence of blockers (specifically an
additional binary (meta)package) it was to late to meet the deadline.

[ Impact ]
I consider it important to have this version in testing right now to
have a potentially minimum diff (or may be no need for another upload)
in case some of the dependencies will be removed in the deep freeze
period.

[ Tests ]
The metapackages do not contain any real code, just dependencies.
So there are no real tests.

[ Risks ]
The code is trivial - I do not see any risk.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [ ] attach debdiff against the package in testing
  (I do not see any reason for a debdiff of the autogenerated package)


unblock debian-science/1.14.1



Bug#984642: unblock refpolicy / policycoreutils

2021-03-09 Thread Graham Inggs
Hi Russell

Neither refpolicy nor policycoreutils are in the list of key packages.
In the upcoming hard freeze, for non-key packages with (non-trivial)
autopkgtests, the rules of the soft freeze still apply [1].

So you could avoid the need for unblocks for these packages by adding
an autopkgtest that tests the as-installed packages in a new upload.

Regards
Graham


[1] https://release.debian.org/bullseye/freeze_policy.html#hard



Re: Bug#984852: firmware-amd-graphics: Please add cezanne ("green sardine")

2021-03-09 Thread Diederik de Haas
On dinsdag 9 maart 2021 10:31:33 CET maximilian attems wrote:
> > I've received my new laptop with a Ryzen R7 5800U ...
> > The relevant files are amdgpu/green_sardine_*
> 
> right, they only got pushed upstream in linux-firmware git on 11/2/2021
> after the latest 20210208 release, hence unfortunately they miss out the
> next debian release
> https://release.debian.org/bullseye/freeze_policy.html

I realize that kernel and firmware are not the (exact) same thing, but the 
impression I got wrt freeze is:
- new features: NO
- new hardware support: YES

It looks to me that this falls in the latter category. The update should only 
contain the amdgpu/green_sardine_* firmware files and nothing else.
A manual unblock is needed ofc, but that can be requested.

Maybe the Release Team could clarify this?



signature.asc
Description: This is a digitally signed message part.


Bug#984861: unblock: gnome-remote-desktop/0.1.9-5

2021-03-09 Thread Simon McVittie
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: David Mohammed 

Please unblock package gnome-remote-desktop.

[ Reason ]
Change gnome-shell dependency to gnome-shell|budgie-desktop,
plus appropriate version constraints. What gnome-remote-desktop actually
needs is any compositor based on a version of mutter that was compiled with
pipewire 0.3, and those two are the mutter-based compositors in Debian.

[ Impact ]
Previously, budgie-desktop users could not use gnome-remote-desktop
to provide screen-sharing in Budgie unless they also unnecessarily
installed gnome-shell.

[ Tests ]
Manually smoke-tested: I installed the proposed package on a bullseye GNOME
system, enabled screen sharing in gnome-control-center and connected to
it with remmima.

Budgie maintainer David Mohammed has confirmed that the alternative
dependency has the desired effect.

[ Risks ]
Low-risk dependency change.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock gnome-remote-desktop/0.1.9-5
diffstat for gnome-remote-desktop-0.1.9 gnome-remote-desktop-0.1.9

 changelog  |   10 ++
 control|2 +-
 control.in |2 +-
 3 files changed, 12 insertions(+), 2 deletions(-)

diff -Nru gnome-remote-desktop-0.1.9/debian/changelog gnome-remote-desktop-0.1.9/debian/changelog
--- gnome-remote-desktop-0.1.9/debian/changelog	2021-02-11 16:14:14.0 +
+++ gnome-remote-desktop-0.1.9/debian/changelog	2021-03-09 10:31:04.0 +
@@ -1,3 +1,13 @@
+gnome-remote-desktop (0.1.9-5) unstable; urgency=medium
+
+  * Team upload
+
+  [ David Mohammed ]
+  * debian/control: add budgie-desktop as an alternate for gnome-shell
+(Closes: #982937)
+
+ -- Simon McVittie   Tue, 09 Mar 2021 10:31:04 +
+
 gnome-remote-desktop (0.1.9-4) unstable; urgency=medium
 
   * debian/patches: Fix use-after-free crash on repeated VNC connections
diff -Nru gnome-remote-desktop-0.1.9/debian/control gnome-remote-desktop-0.1.9/debian/control
--- gnome-remote-desktop-0.1.9/debian/control	2021-02-11 16:14:14.0 +
+++ gnome-remote-desktop-0.1.9/debian/control	2021-03-09 10:31:04.0 +
@@ -28,7 +28,7 @@
 Architecture: linux-any
 Depends: ${misc:Depends},
  ${shlibs:Depends},
- gnome-shell (>= 3.37.92-2~),
+ gnome-shell (>= 3.37.92-2~) | budgie-desktop (>= 10.5.2),
  libmutter-7-0 (>= 3.37.92-1~),
  pipewire (>= 0.3.0)
 Description: Remote desktop daemon for GNOME using PipeWire
diff -Nru gnome-remote-desktop-0.1.9/debian/control.in gnome-remote-desktop-0.1.9/debian/control.in
--- gnome-remote-desktop-0.1.9/debian/control.in	2021-02-11 16:14:14.0 +
+++ gnome-remote-desktop-0.1.9/debian/control.in	2021-03-09 10:31:04.0 +
@@ -24,7 +24,7 @@
 Architecture: linux-any
 Depends: ${misc:Depends},
  ${shlibs:Depends},
- gnome-shell (>= 3.37.92-2~),
+ gnome-shell (>= 3.37.92-2~) | budgie-desktop (>= 10.5.2),
  libmutter-7-0 (>= 3.37.92-1~),
  pipewire (>= 0.3.0)
 Description: Remote desktop daemon for GNOME using PipeWire


Bug#984837: marked as done (unblock: gsoap/2.8.104-3)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 09 Mar 2021 10:43:24 +
with message-id 
and subject line unblock gsoap
has caused the Debian Bug report #984837,
regarding unblock: gsoap/2.8.104-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984837: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984837
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

I have submitted an update for the gsoap package, back-porting several
fixes for CVEs from upstream. It fixes the RC bug:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983596

Due to the current soft freeze, the migration delay is 10 days, which
would mean 18 March. However the hard freeze starts March 12, after
which migration requires an explicit unblock. Hence this unblock
request.

Due to the RC bug, the package is marked for auto-removal, together
with many packages that depend on it:

Marked for autoremoval on 11 April: #983596 high
Version 2.8.104-2 of gsoap is marked for autoremoval from testing on
Sun 11 Apr 2021. It is affected by #983596. The removal of gsoap will
also cause the removal of (transitive) reverse dependencies: arc-gui-
clients, cgsi-gsoap, davix, gfal2, gridsite, lcas-lcmaps-gt4-interface,
lcmaps, lcmaps-plugins-basic, lcmaps-plugins-jobrep, lcmaps-plugins-
verify-proxy, lcmaps-plugins-voms, myproxy, nordugrid-arc, nordugrid-
arc-nagios-plugins, openstack-cluster-installer, srm-ifce, voms, voms-
mysql-plugin, xrootd. You should try to prevent the removal by fixing
these RC bugs.

I hope you will consider unblocking the update.

Debdiff attached.

Mattias

diff -Nru gsoap-2.8.104/debian/changelog gsoap-2.8.104/debian/changelog
--- gsoap-2.8.104/debian/changelog	2020-07-25 08:30:12.0 +0200
+++ gsoap-2.8.104/debian/changelog	2021-03-08 14:06:23.0 +0100
@@ -1,3 +1,12 @@
+gsoap (2.8.104-3) unstable; urgency=high
+
+  * Backporting upstream fixes (Closes: #983596)
+- Fixes CVE: CVE-2020-13574 CVE-2020-13575 CVE-2020-13577 CVE-2020-13578
+- Fixes CVE: CVE-2020-13576
+  * Urgency high due to fixing RC bug
+
+ -- Mattias Ellert   Mon, 08 Mar 2021 14:06:23 +0100
+
 gsoap (2.8.104-2) unstable; urgency=medium
 
   * Re-upload source only
diff -Nru gsoap-2.8.104/debian/control gsoap-2.8.104/debian/control
--- gsoap-2.8.104/debian/control	2020-07-22 15:23:55.0 +0200
+++ gsoap-2.8.104/debian/control	2021-03-08 14:06:23.0 +0100
@@ -13,7 +13,7 @@
 Build-Depends-Indep:
  doxygen,
  graphviz
-Standards-Version: 4.5.0
+Standards-Version: 4.5.1
 Section: devel
 Vcs-Browser: https://salsa.debian.org/ellert/gsoap
 Vcs-Git: https://salsa.debian.org/ellert/gsoap.git
diff -Nru gsoap-2.8.104/debian/copyright gsoap-2.8.104/debian/copyright
--- gsoap-2.8.104/debian/copyright	2020-07-22 15:23:55.0 +0200
+++ gsoap-2.8.104/debian/copyright	2021-03-08 14:06:23.0 +0100
@@ -171,7 +171,7 @@
 Files: debian/*
 Copyright:
  2003-2007, Thomas Wana 
- 2011-2020, Mattias Ellert 
+ 2011-2021, Mattias Ellert 
 License: GPL-2+
  On Debian systems, the complete text of the GPL version 2 license can be
  found in '/usr/share/common-licenses/GPL-2'.
diff -Nru gsoap-2.8.104/debian/patches/gsoap-plugins-hardening.patch gsoap-2.8.104/debian/patches/gsoap-plugins-hardening.patch
--- gsoap-2.8.104/debian/patches/gsoap-plugins-hardening.patch	1970-01-01 01:00:00.0 +0100
+++ gsoap-2.8.104/debian/patches/gsoap-plugins-hardening.patch	2021-03-08 11:28:34.0 +0100
@@ -0,0 +1,336 @@
+diff -ur gsoap2-code-r191/gsoap/plugin/httpda.c gsoap2-code-r192/gsoap/plugin/httpda.c
+--- gsoap2-code-r191/gsoap/plugin/httpda.c	2020-06-30 21:06:47.0 +0200
 gsoap2-code-r192/gsoap/plugin/httpda.c	2020-11-19 19:29:25.0 +0100
+@@ -1460,7 +1460,7 @@
+   MUTEX_LOCK(http_da_session_lock);
+ 
+   for (session = http_da_session; session; session = session->next)
+-if (!strcmp(session->realm, realm) && !strcmp(session->nonce, nonce) && !strcmp(session->opaque, opaque))
++if (session->realm && session->nonce && session->opaque && !strcmp(session->realm, realm) && !strcmp(session->nonce, nonce) && !strcmp(session->opaque, opaque))
+   break;
+ 
+   if (session)
+diff -ur gsoap2-code-r191/gsoap/plugin/wsaapi.c gsoap2-code-r192/gsoap/plugin/wsaapi.c
+--- gsoap2-code-r191/gsoap/plugin/wsaapi.c	2020-06-30 21:06:47.0 +0200
 gsoap2-code-r192/gsoap/plugin/wsaapi.c	2020-11-19 19:29:25.0 +0100
+@@ -1056,7 +1056,7 @@
+   oldheader->SOAP_WSA(FaultTo)->Address = 

NEW changes in stable-new

2021-03-09 Thread Debian FTP Masters
Processing changes file: fwupdate-amd64-signed_12+4+deb10u2_amd64-buildd.changes
  ACCEPT
Processing changes file: fwupdate-arm64-signed_12+4+deb10u2_arm64-buildd.changes
  ACCEPT
Processing changes file: linux-signed-i386_4.19.177+1_i386.changes
  ACCEPT



NEW changes in stable-new

2021-03-09 Thread Debian FTP Masters
Processing changes file: fwupdate-i386-signed_12+4+deb10u2_i386.changes
  ACCEPT



Bug#984501: marked as done (unblock: libqb/2.0.3-1)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 09 Mar 2021 08:30:20 +
with message-id 
and subject line unblock libqb
has caused the Debian Bug report #984501,
regarding unblock: libqb/2.0.3-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984501: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984501
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

Please unblock package libqb

Dear Release Team,

Upstream made a new minor release of libqb yesterday.  Since a new
upload wouldn't migrate before the hard freeze with the current 10 day
delay, I'm asking for an unblock in advance.

2.0.3 contains a single new feature extending the API and ABI in a
backwards-compatible way with a message-id parameter, which isn't the
main reason for this request.

Included are two doxygen2man fixes, one of them already present in the
current 2.0.2-1 package as a Debian patch, and another fixing a groff
error in libqb's own manual pages.

The really interesting stuff is a memory safety fix in the internal
strlcpy() implementation and a more thorough cleanup procedure, which
avoids filling up /dev/shm with stale files in certain error and
recovery conditions.

Locking errors (insufficient locking) are also fixed in the timer code,
and the unit tests are extended appropriately.

The last fix corrects another unit test but entails no change in
behaviour.

It would be possible to cherry pick the fix commits into Debian patches
leaving out the final one adding the new API, but I'd prefer the
cleaner solution of uploading 2.0.3 at this stage.

debdiff against the package in testing:

diff -Nru libqb-2.0.2/ChangeLog libqb-2.0.3/ChangeLog
--- libqb-2.0.2/ChangeLog   2020-12-03 14:07:32.0 +0100
+++ libqb-2.0.3/ChangeLog   2021-03-03 09:34:26.0 +0100
@@ -1,3 +1,57 @@
+2021-03-03  Christine Caulfield  
+
+   release: bump library version for 2.0.3 release
+
+2021-03-01  Aleksei Burlakov  
+   root  
+
+   syslog: Add a message-id parameter for messages (#433)
+   The message-id parameter will enable systemd catalogs.
+   To enable message-id's the libqb should be configured with the
+--enable-systemd-journal option.
+
+2021-02-08  Chrissie Caulfield  
+
+   tests: Fix up resources.test (#435)
+   resources.test has not checked the right filenames for a while.
+   Fix this, and also make sure we don't count (but remove) the dlock
+   test files.
+
+   timers: Add some locking (#436)
+   Fix several locking issues reported by helgrind
+
+2021-01-25  Chrissie Caulfield  
+
+   ipcc: Have a few goes at tidying up after a dead server (#434)
+   This is an attempt to make sure that /dev/shm is cleaned up when a
+   server exits unexpectedly. Normally it's the server's responsibility
+   to tidy up sockets, but if it crashes or is killed with SIGKILL then
+   the client (us) makes a reasonable attempt to tidy up the server sockets
+   we have connected. The extra delay here just gives the server chance to
+   disappear fully. As a client we can get here pretty quickly but shutting
+   down a large server may take a little longer even when SIGKILLed.
+   The 1/100th of a second is an arbitrary delay (of course) but seems to
+   catch most servers in 2 tries or less.
+
+2021-01-13  Chrissie Caulfield  
+
+   strlcpy: Check for maxlen underflow (#432)
+   * strlcpy: Check for maxlen underflow
+   https://github.com/ClusterLabs/libqb/issues/429
+   * Always terminate the string if maxlen is > 0
+
+2021-01-07  Chrissie Caulfield  
+
+   doxygen2man: fix printing of lines starting with '.' (#431)
+   if a line starts with a '.' (eg the '...' in qbarray.h) then
+   nroff thinks it's looking for a macro called '..'.
+   The easiest solution is to add a dummy format at the start of the line
+   (just adding \ seems not to work).
+
+2021-01-04  wferi  
+
+   doxygen2man: ignore all-whitespace brief descriptions (#430)
+
 2020-12-03  Christine Caulfield  
 
lib: Update library version for 2.0.2 release
diff -Nru libqb-2.0.2/configure libqb-2.0.3/configure
--- libqb-2.0.2/configure   2020-12-03 14:07:14.0 +0100
+++ libqb-2.0.3/configure   2021-03-03 09:34:07.0 +0100
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.69 for libqb 2.0.2.
+# Generated by GNU Autoconf 2.69 for libqb 

Bug#984501: unblock: libqb/2.0.3-1

2021-03-09 Thread wferi
Sebastian Ramacher  writes:

> The changes look ok. Under the assumption that the upload happens soon,
> please go ahead.

Thank you, uploaded.
-- 
Regards,
Feri



Bug#984834: marked as done (unblock firmware-nonfree 20210208-3 upload)

2021-03-09 Thread Debian Bug Tracking System
Your message dated Tue, 9 Mar 2021 09:08:08 +0100
with message-id 
and subject line Re: Bug#984834: Acknowledgement (unblock firmware-nonfree 
20210208-3 upload)
has caused the Debian Bug report #984834,
regarding unblock firmware-nonfree 20210208-3 upload
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
984834: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984834
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Thanks

please unblock firmware-nonfree 20210208-3

it is the version that has the relevant firmware packages for
the targeted version of linux in bullseye.

It will need a small amount of fixes on top that are preprared
in git and will be uploaded as soon it has migrated.

thank you.

-- 
maks


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
closing as "firmware-nonfree 20210208-3 MIGRATED to testing".--- End Message ---